ºÚ¿ÍÔÚ°µÍø¹«¿ªÒÔÉ«ÁÐÊÓÆµ¹«Ë¾Promo 2200ÍòÓû§¼Í¼£»Ð¶ñÒâÈí¼þEnsiko¿É¼ÓÃÜÖ¸±êÎļþ£¬Õë¶ÔÖ÷Á÷²Ù×÷ϵͳ

°ä²¼¹¦·ò 2020-07-29

1.ºÚ¿ÍÔÚ°µÍø¹«¿ªÒÔÉ«ÁÐÊÓÆµ¹«Ë¾Promo 2200ÍòÓû§¼Í¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍøÂ簲ȫµý±¨¹«Ë¾CloudSEK·¢ÏÖ£¬ºÚ¿ÍÔÚ°µÍø¹«¿ªÁËÒÔÉ«ÁеÄÓªÏúÊÓÆµ´´½¨ÍøÕ¾Promo.comÔ̺¬2200ÍòÓû§¼Í¼µÄÊý¾Ý¿â£¬¸ÃÊý¾Ý¿âÔ̺¬Óû§µÄµç×ÓÓʼþµØÖ·¡¢Ãû³Æ¡¢ÐԱ𡢵ØÀíµØÎ»ÒÔ¼°²¿ÃÅÓû§µÄ¹þÏ£ÃÜÂë ¡£²¢ÇÒ£¬ºÚ¿ÍÒѳɹ¦ÆÆ½âÁË140ÍòÓû§ÃÜÂ룬ÕâÒâζ׏¥»÷ÕßÄܹ»µ±¼´µÇ¼ÕâЩÓû§µÄÕÊ»§£¬»òÕßÔÚÆäËûÕ¾µãÌáÒéÍ´´¦Ìî³ä¹¥»÷ ¡£Promo°ä²¼ÁËÊý¾Ýй¶֪ͨ£¬²¢Ö¸³öÕâ´ÎÊý¾Ýй¶ÊÇÓÉÓÚÆäµÚÈý·½ºÏ×÷¹«Ë¾´æÔÚ°²È«·ì϶ ¡£Promo·¢Õ¹ÁËÄÚ²¿µ÷²é£¬²¢°µÊ¾Õâ´ÎÊÂÎñ²¢ÎÞ²ÆÕþÐÅϢй¶ ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/promocom-discloses-data-breach-after-22m-user-records-leaked-online/


2.Cloudflare IPµØÖ·¿â½ü300Íò¸öÕæÊµIPµØÖ·ÔÚ°µÍø¹«¿ª


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÎÚ¿ËÀ¼¹ú¶ÈÍøÂ簲ȫЭµ÷ÖÐÐÄÐû³ÆCloudflare²úÉúÁËÊý¾Ýй©£¬µ¼ÖÂÆäIPµØÖ·¿â½ü300Íò¸öÕæÊµIPµØÖ·ÔÚ°µÍø¹«¿ª ¡£Ä¿Ç°£¬¸Ã»ú¹¹°ä²¼µÄ¼Í¼ÖÐÔ̺¬45ÌõÓµÓÐ gov.ua¶¥¼¶ÓòÃû£¨TLD£©µÄ¼Í¼£¬ÒÔ¼°6500¸öÓµÓÐ .ua TLDµÄ¼Í¼£¬ÕâÅú×¢Ô̺¬¹Ø¼ü»ù´¡ÉèÊ©ÔÚÄڵĺöàÎÚ¿ËÀ¼Õ¾µã±»ÒѾ­Ð¹Â¶ ¡£CloudflareÉêÃ÷£¬Õâ´Îй©¿ÉÄÜÊÇͨ¹ý¹«ÍøÉϵÄDNS²éÎÊ»ñµÃµÄÊý¾Ý£¬²¢·Çй©»ò·ÛËéµÄÁË¾Ö ¡£¾ÍÔÚ¼¸ÖÜǰ£¬Cloudflare·þÎñÖжϵ¼ÖÂһЩ¶¥¼¶ÍøÕ¾ÔÚÈ«ÇòÁìÓòÄÚÀëÏß ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/cloudflare-data-leak-expose-ip-addresses-ukraine/


3.»¯×±Æ·¹«Ë¾AvonÔÆ·þÎñÆ÷ÅäÖÃÃýÎó£¬Ð¹Â¶1900ÍòÌõÓû§¼Í¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


SafetyDetectives·¢ÏÖ£¬È«Çò»¯×±Æ·¹«Ë¾AvonÒòÔÆ·þÎñÆ÷ÅäÖÃÃýÎóй¶ÁË1900Íò±Ê¼Í¼£¬ÆäÖÐÔ̺¬Ó×ÎÒÐÅÏ¢ºÍ¼¼ÊõÈÕÖ¾ ¡£Õâ´Îй¶µÄÊý¾ÝÔ̺¬¿Í»§ºÍÔ±¹¤µÄÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©£¬ÆäÖÐÔ̺¬È«Ãû¡¢µç»°ºÅÂë¡¢ÉúÈÕ¡¢µç×ÓÓʼþºÍ¼ÒͥסַÒÔ¼°GPS×ø±ê£¬´Ë±í»¹ÓÐ40000¶à¸ö°²È«ÁîÅÆ¡¢OAuthÁîÅÆ¡¢ÄÚ²¿ÈÕÖ¾¡¢ÕÊ»§ÉèÖúͼ¼Êõ·þÎñÆ÷ÐÅÏ¢ ¡£SafetyDetectives°µÊ¾£¬PIIÄܹ»±»ÓÃÀ´½øÐÐÉí·ÝڲƭºÍºóÐøµÄÍøÂç´¹µöÚ¿Æ­£¬Í¬Ê±£¬Ð¹Â¶µÄ¼¼Êõϸ½ÚÒ²¸øAvon´øÀ´ÁË·çÏÕ£¬ºÚ¿Í¿ÉÀûÓÃÕâЩÐÅÏ¢»ñµÃ·þÎñÆ÷µÄÆëÈ«½ÚÔìȨ²¢ÌáÒé·ÛËéÐԵĹ¥»÷ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cosmetics-giant-avon-leaks-19/


4.ºÚ¿ÍÀûÓÃαÔìµÄSharePoint֪ͨÇÔÈ¡Óû§Office 365ƾ֤


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÚÐÂÒ»ÂÖµÄÍøÂç´¹µö»î¶¯ÖУ¬ºÚ¿ÍÀûÓÃαÔìµÄSharePoint֪ͨÇÔÈ¡Óû§Office 365ƾ֤ ¡£Æ¾¾Ýµç×ÓÓʼþ°²È«¹«Ë¾Abnormal SecurityµÄͳ¼Æ£¬µ½Ä¿Ç°ÎªÖ¹£¬¸ÃÀàµç×ÓÓʼþÒÑ·¢Ë͵½50000¶à¸öÓÊÏä ¡£ÔÚµç×ÓÓʼþÕýÎÄÖУ¬ºÚ¿ÍÂÅ´ÎʹÓÃÊÕ¼þÈ˵Ĺ«Ë¾Ãû³Æ£¬Ê¹µÃÓʼþ¿´ÆðÀ´¸üÏñÊÇÄÚ²¿Îĵµ ¡£Ö®ºó£¬Êܺ¦Õß±ØÖصã»÷Á´½ÓÒÔÏÂÔØÓʼþÖÐÌáµ½µÄ³ÁÒªÎĵµ£¬¸ÃÁ´½Ó½«Æä³Á¶¨Ïòµ½´¹µöÍøÕ¾²¢ÒªÇóËûÃÇÌá½»µÇ¼ʹ´¦ ¡£Office 365Óû§ÔÚ½ñÄêÔâ·ê¶à¶à´¹µö¹¥»÷£¬Ô̺¬Î±ÔìµÄZoom¾¯±¨¡¢VPNÅäÖá¢Microsoft TeamsºÍSGF¾ÈÖú½ð ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/office-365-phishing-baits-employees-with-fake-sharepoint-alerts/


5.жñÒâÈí¼þEnsiko¿É¼ÓÃÜÖ¸±êÎļþ£¬Õë¶ÔÖ÷Á÷²Ù×÷ϵͳ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Íþв×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖеÄÖ°ÄÜ·á˶µÄ¶ñÒâÈí¼þEnsiko£¬¿É¼ÓÃÜÖ¸±êÎļþ£¬Õë¶ÔWindows£¬macOSºÍLinux Web·þÎñÆ÷µÈÖ÷Á÷²Ù×÷ϵͳ ¡£¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÓÃPHP±àдµÄWeb Shell£¬¹¥»÷ÕßÄܹ»Ê¹ÓÃËüÀ´Ô¶³Ì½ÚÔìÊÜϰȾµÄϵͳ ¡£EnsikoÓµÓÐÎļþ¼ÓÃÜ×é¼þ£¬Ëü¿ÉÓÃÓÚÕë¶Ô·þÎñÆ÷µÄÀÕË÷Èí¼þ¹¥»÷£¬Ç÷Ïò¿Æ¼¼µÄ×êÑÐÈËÔ±·¢ÏÖËüʹÓÃÁËCBCģʽµÄ¶Ô³ÆRijnadel-128¼ÓÃÜÎļþ ¡£Ensiko»¹Äܹ»Í¨¹ýÃÜÂë±£»¤À´È·±£°²È«½Ó¼û£¬²¢Ô¤·ÀÏñEmotetÄÇÑù±»ÊÕÊÜ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/feature-rich-ensiko-malware-can-encrypt-targets-windows-macos-linux/


6.Dussmann×Ó¹«Ë¾ÔâNefilimÀÕË÷Èí¼þ¹¥»÷£¬200GBÊý¾Ý±»µÁ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


µÂ¹úDussmann Group×Ó¹«Ë¾DresdnerK¨¹hlanlagenbauGmbH£¨DKA£©Ôâµ½ÁËNefilimÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂδ¼ÓÃܵÄÎļþй¶ ¡£NefilimÍÅ»ïÔÚÆäÊý¾Ýй©վµã°ä²¼ÁËÁ½¸öÎļþ¼Ð£¬Ô̺¬ÁË14 GBµÄ±»µÁÎļþ£¬Æ¾¾Ý¸ÃÎļþÁбí£¬ÕâЩÎļþ¼ÐÔ̺¬WordÎĵµ¡¢Í¼Ïñ¡¢¹ÜÕÊÎĵµºÍAutoCADͼÐÎ ¡£¸ÃºÚ¿Í×éÖ¯°µÊ¾£¬ËûÃǼÓÃÜÁËËĸöÓò²¢µÁÈ¡ÁËԼĪ200GBµÄÊý¾Ý ¡£Ä¿Ç°£¬Éв»Ã÷ÏÔNefilimÍÅ»ïÊÇÈôºÎ»ñµÃDKAÍøÂç½Ó¼ûȨÏ޵ģ¬ÍøÂçµý±¨¹«Ë¾Bad PacketsÒ²²¢Î´·¢ÏÖDKAÍøÂçÉϵĴæÔÚÒ×Êܹ¥»÷µÄVPNÍø¹Ø»òÉ豸 ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/business-giant-dussmann-groups-data-leaked-after-ransomware-attack/