NordPass³ÆÓÐÉÏÍò¸öÅäÖÃÃýÎóµÄÊý¾Ý¿âй¶100Òڱʼͼ£»CISA¡¢DODºÍFBI½áºÏ°ä²¼Õë¶ÔÐÂÐͶñÒâÈí¼þTaidoor¾¯±¨

°ä²¼¹¦·ò 2020-08-04

1.NordPass³ÆÓÐÉÏÍò¸öÅäÖÃÃýÎóµÄÊý¾Ý¿âй¶100Òڱʼͼ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


NordPassÓÚ2019Äê6ÔÂÖÁ2020Äê6Ô£¬ÓëÄäÃû°×ñºÚ¿ÍºÏ×÷ɨÃèÍøÂçÉϵÄElasticsearchºÍMongoDB¿â£¬·¢ÏÖÁ˽üÍò¸öÅäÖÃÃýÎóµÄÊý¾Ý¿âй¶ÁË105ÒÚÌõÀ´×Ô20¸ö¹ú¶ÈºÍµØÓòµÄÊý¾Ý¡£¾Ýͳ¼Æ£¬Ð¹Â¶Êý¾Ý×î¶àµÄÈý¸ö¹ú¶ÈÖУ¬·¨¹úÒÔ51ÒÚÌõλ¾Ó°ñÊ×£¬ÖйúÒÔ26ÒÚÌõ½ôËæÆäºó£¬ÃÀ¹úÒÔ23ÒÚÌõλ¾ÓµÚÈý¡£ÅäÖÃÃýÎóµÄÊý¾Ý¿âÊýÁ¿×î¶àµÄ¹ú¶ÈÖУ¬Öйúλ¾ÓµÚÒ»£¨4000¸ö£©£¬Æä´ÎÊÇÃÀ¹ú£¨3000£©ºÍÓ¡¶È£¨500£©¡£¾Ý³Æ£¬ÕâЩй¶Êý¾Ý¿âͨ³£Ô̺¬µç×ÓÓʼþµØÖ·£¬ÃÜÂëºÍµç»°ºÅÂë¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/07/30/10-billion-records-exposed-unsecured-databases/


2.ºÚ¿ÍÔÚ°µÍø¹«¿ª¼Ò×°ÍøÕ¾HavenlyµÄ130ÍòÓû§Êý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÚ¿ÍÔÚ°µÍø¹«¿ªÃÀ¹úÊÒÄÚÉè¼ÆÍøÕ¾HavenlyµÄ130ÍòÓû§Êý¾Ý¡£´Ó¸ÃÊý¾Ý¿âµÄÑù±¾Öз¢ÏÖ£¬Ð¹Â©Êý¾ÝÔ̺¬Óû§µÄµÇ¼Ãû¡¢È«Ãû¡¢MD5¹þÏ£ÃÜÂë¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢ÓÊÕþ±àÂëÒÔ¼°Óë¸ÃÕ¾µãµÄʹÓÃÓйصĸ÷ÀàÆäËûÊý¾Ý£¬´Ë±í£¬Óû§ÐÅÓþ¿¨µÄ×îºóËÄλÊý¿ÉÄÜÒÑй¶¡£¾ÝBleepingComputer»ã±¨³Æ£¬ºÚ¿Í×éÖ¯ShinyHuntersÒÑÔÚ°µÍøÉÏÃâ·Ñ¹«¿ªÁË18¼Ò¹«Ë¾µÄÊý¾Ý¿â£¬×ܼÆÔ̺¬3.86ÒÚÌõÓû§¼Í¼£¬¶øHavenlyÒ²ÊÇÆäÖÐÖ®Ò»¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/


3.LedgerÊý¾Ý¿âÖдæÔÚ·ì϶£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§ÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


LedgerÈ·ÈÏÆäµç×ÓÉÌÎñºÍÏúÊÛÊý¾Ý¿âµÄ´æÔÚÑϳÁµÄ°²È«·ì϶£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§ÐÅϢй¶¡£7ÔÂ14ÈÕ£¬Æä×êÑÐÈËÔ±·¢ÏÖLedgerÍøÕ¾ÉÏ¿ÉÄÜ´æÔÚÊý¾Ýй¶ÎÊÌ⣬²¢ÔÚ½øÐÐÁËÄÚ²¿µ÷²éºóµ±¼´½¨¸´Á˸÷ì϶¡£½¨¸´·ì϶ºóÒ»ÖÜ£¬¸Ã¹«Ë¾·¢ÏÖ·ì϶ÔÚ6ÔÂ25ÈÕÒѱ»ÀûÓ㬺ڿͽӼûÁËÆäµç×ÓÉÌÎñºÍÏúÊÛÊý¾Ý¿â¡£Õâ´ÎÊÂÎñ¿ÉÄܵ¼ÖÂÊý°ÙÍòÈ˵ç×ÓÓʼþµØÖ·µÈÐÅϢй¶£¬ÒÔ¼°½üÍòÈËÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©Ð¹Â¶£¬Ô̺¬Ãû×ÖºÍÐÕÊÏ¡¢ÓÊÕþµØÖ·¡¢µç»°ºÅÂëºÍ¶©¹ºµÄ²úÆ·µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/crypto-firm-ledgers-breach-one/


4.CISA¡¢DODºÍFBI½áºÏ°ä²¼Õë¶ÔÐÂÐͶñÒâÈí¼þTaidoor¾¯±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹úµ±¾ÖµÄÈý¸ö»ú¹¹CISA¡¢DODºÍFBI½áºÏ°ä²¼Á˹ØÓÚÐÂÐͶñÒâÈí¼þTaidooµÄ¾¯±¨¡£¾ÝÕâÈý¸ö»ú¹¹³Æ£¬´Ë¶ñÒâÈí¼þÓµÓÐ32λºÍ64λϵͳ°æ±¾£¬Í¨³£×÷Ϊ·þÎñ¶¯Ì¬Á´½Ó¿â£¨DLL£©×°ÖÃÔÚÊܺ¦ÕßµÄϵͳÉÏ¡£¸ÃDLLÔ̺¬ÆäËûÁ½¸öÎļþ£¬ÆäÒ»ÊÇ×÷Ϊ·þÎñÆô¶¯µÄ¼ÓÔØ·¨Ê½£¬»á½âÃܲ¢ÔÚÄÚ´æÖÐÖ´Ðеڶþ¸öÖØÒªµÄÔ¶³Ì½Ó¼ûľÂí£¨RAT£©Îļþ¡£FBI°µÊ¾£¬ºÚ¿Íͨ³£»á½«TaidoorÓë´úÀí·þÎñÆ÷һ·²¿Êð£¬ÒÔ°µ²Ø¶ñÆäÕæÊ·´Ô´¡£DOD°µÊ¾£¬×Ô2008ÄêÒÔÀ´£¬Taidoor»òÒÑÔÚÒ°±í±»ÀûÓÃÖÁÉÙ12Äê¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cisa-dod-fbi-expose-new-chinese-malware-strain-named-taidoor/#ftag=RSSbaffb68


5.мäµýÈí¼þ¼Ù×°³É×ãÇò¾ãÀÖ²¿µÄÀûÓÃÕë¶ÔAndroidÓû§


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Zscaler ThreatLabZÍŶӷ¢ÏÖ£¬Ð¼äµýÈí¼þ¼Ù×°³É×ãÇò¾ãÀÖ²¿µÄÀûÓÃÕë¶ÔAndroidÓû§¡£ÆäÕë¶Ô·ÇÖÞÁ½¸ö×î³ÛÃû×ãÇò¾ãÀÖ²¿²¢¼Ù×°³É¾ãÀÖ²¿µÄ¹Ù·½ÀûÓÃSimba SCºÍYanga£¨Young Africans£©SC¡£ÓµÓÐÔĶÁ¶ÌÐÅ¡¢»ñÈ¡ÁªÏµÈË¡¢Â¼ÔìÒôƵ¡¢Í¨»°Ö°ÄÜ¡¢½Ó¼ûʵʱµØÎ»¡¢¶Á/д±í²¿´æ´¢¡¢ÍµÕÕÆ¬ºÍ´æÈ¡Ïà»úµÄÖ°ÄÜ¡£¾­¹ý½øÒ»²½·ÖÎö£¬·¢ÏÖÕâЩAPKÊÇʹÓÃÊ¢ÐеļäµýÈí¼þ¹¤¾ßSpyMax¿ª·¢µÄ£¬SpyMaxµÄǰÉíSpyNoteÊÇʹÓÃ×î¿í·ºµÄ¼äµýÈí¼þ¿ò¼ÜÖ®Ò»¡£ÓÉÓڸüäµýÈí¼þÔÚ·ÖÎöÆÚ¼äδ´¦Óڻ״̬£¬Òò¶ø×êÑÐÈËÔ±²¢Î´×·Òäµ½ÆäºÅÁîºÍ½ÚÔ죨C£¦C£©·þÎñÆ÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.zscaler.com/blogs/research/android-spyware-targeting-tanzania-premier-league


6.ABIÔ¤¼Æµ½2026ÄêIoTÊý¾ÝÖÎÀí·þÎñ½«´ï429ÒÚÃÀÔª


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ABI Research°µÊ¾ÎïÁªÍøÊý¾ÝÖÎÀí·þÎñÊÇÒ»¸ö¼±¾çÔö³¤µÄÊг¡£¬²¢Ô¤¼Æµ½2026Ä꽫¸ß´ï429ÒÚÃÀÔª¡£Á÷´¦ÖúͷÖÎö½â¾ö¹æ»®µÄ³öÏÖΪÊý¾Ý¾ö²ßºÍÆóÒµ¶´²ìÌṩÁ˶¯Á¦£¬Ä¿Ç°ÓÐÁ½´ó¼¯Ìå¶ÔÆä½øÐÐÖ÷µ¼£¬±ðÀëÎªÔÆÓÅÏȺͱßÔµÓÅÏÈ¡£Azure¡¢AWS¡¢IBM΢Èí¡¢Cloudera¡¢Informatica¡¢Software AG ApamaºÍTIBCO¶¼ÝÓÈÆÒÔÔÆÎªÖÐÐĵķ½Ê½ÌṩÊý¾ÝÖÎÀí·þÎñ£¬ÕâÊÇËûÃǶÔÒѾ­´æÔÚµÄÈ«²Ö¿â¶Ëµ½¶ËÎïÁªÍø²úÆ·ºÍÄÜÁ¦µÄ²¹³ä¡£ScaleOut¡¢ Crosser¡¢ SWIM.aiºÍClearBladeʹÓÃÁËÒ»ÖÖÒÔ±ßԵΪÖÐÐĵIJ½Ö裬²¢ÓëÔÆ¹©¸øÉ̺Ï×÷£¬ÌṩÐÐҵרÓõÄÊý¾ÝÖÎÀíµ±Ó÷¨Ê½¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/08/03/iot-data-management-services-42-9-billion-by-2026/