HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£»£»£»ÐµÄË®¿Ó¹¥»÷»î¶¯Earth KitsuneÕë¶Ôº«¹úÇÈÃñ

Ðû²¼Ê±¼ä 2020-11-02

1.HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ


1.png


HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£¬£¬£¬£¬ £¬³Æ¿çÕ¾µã¾ç±¾£¨XSS£©ÊÇ×î³£¼ûµÄÎó²îÀàÐÍ£¬£¬£¬£¬ £¬±È2019ÄêÔöÌíÁË134% ¡£¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬ £¬XSSÎó²îÕ¼Á˱¨¸æµÄËùÓÐÎó²îµÄ18%£¬£¬£¬£¬ £¬×ܼƻñµÃÁË420ÍòÃÀÔªµÄ½±½ð(±ÈÈ¥ÄêÔöÌíÁË26%) ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬²»µ±»á¼û¿ØÖÆÎó²îËù»ñµÃµÄ½±½ð¶î¶È±ÈÈ¥Äêͬ±ÈÔöÌí134£¥£¬£¬£¬£¬ £¬¸ßµÖ´ï400ÍòÃÀÔª£¬£¬£¬£¬ £¬Æä´ÎÊÇÐÅÏ¢Åû¶Îó²î£¬£¬£¬£¬ £¬Í¬±ÈÔöÌí63£¥ ¡£¡£¡£¡£¡£¡£¡£ÕâÁ½ÖÖ·½·¨¶¼»áй¶DZÔÚµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬ £¬ÀýÈçСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

hackerone.com/hacker-powered-security-report


2.Ñо¿Ö°Ô±³ÆÈÔÓÐÁè¼Ý10Íǫ̀ÅÌËã»úÒ×ÊÜSMBGhost¹¥»÷


2.jpg


Ñо¿Ö°Ô±Jan Kopriva³ÆÈÔÓÐÁè¼Ý10Íǫ̀ÅÌËã»úÒ×ÊÜSMBGhost¹¥»÷ ¡£¡£¡£¡£¡£¡£¡£SMBGhostÎó²î£¨CVE-2020-0796£©ÎªMicrosoftЧÀÍÆ÷ÐÂÎſ飨SMB£©Ð­ÒéÖеÄÒ»¸öÔ¶³ÌÖ´ÐдúÂëÎó²î£¬£¬£¬£¬ £¬Ê¹ÓøÃÎó²î¿É¾ÙÐÐÈ䳿¹¥»÷£¬£¬£¬£¬ £¬ÒÔÈö²¥µ½ÆäËûÅÌËã»úÉÏ£¬£¬£¬£¬ £¬MicrosoftÒÑÔÚÈýÔ·ÝÐÞ¸´¸ÃÎÊÌâ ¡£¡£¡£¡£¡£¡£¡£Jan Kopriva·¢Ã÷ÈÔÓÐÁè¼Ý103000̨ÅÌËã»úÒ×ÊÜ´ËÀ๥»÷£¬£¬£¬£¬ £¬ÆäÖдó´ó¶¼Î»ÓŲ́Í壨22£¥£©£¬£¬£¬£¬ £¬Æä´ÎÊÇÈÕ±¾£¨20£¥£©ºÍ¶íÂÞ˹£¨11£¥£© ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110247/hacking/smbghost-vulnerable-machines-dangers.html


3.еÄË®¿Ó¹¥»÷»î¶¯Earth KitsuneÕë¶Ôº«¹úÇÈÃñ


3.jpg


Ç÷ÊÆ¿Æ¼¼µÄÑо¿Ö°Ô±Åû¶ÁËеÄË®¿Ó¹¥»÷»î¶¯Earth Kitsune£¬£¬£¬£¬ £¬Ö÷ÒªÕë¶Ôº«¹úÇÈÃñ ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷¹¥»÷±¬·¢ÔÚ3Ô¡¢5ÔºÍ9Ô£¬£¬£¬£¬ £¬ºÚ¿ÍʹÓÃÁ˶ñÒâÈí¼þSLUB(¼´SLackºÍgithUB)ºÍÁ½¸öкóÃÅ£¬£¬£¬£¬ £¬dneSpyºÍagfSpy£¬£¬£¬£¬ £¬Ö¼ÔÚ½ÓÊÜÊÜѬȾµÄϵͳ²¢´ÓÖÐÇÔÈ¡Êý¾Ý ¡£¡£¡£¡£¡£¡£¡£ÓëÆäËû¹¥»÷²î±ðµÄÊÇ£¬£¬£¬£¬ £¬ËüÔÚÊܺ¦»úеÉϰ²ÅÅÁË´ó×ÚµÄÑù±¾£¬£¬£¬£¬ £¬Ê¹ÓÃÁ˶à¸öÏÂÁîºÍ¿ØÖÆ(C&C)ЧÀÍÆ÷£¬£¬£¬£¬ £¬»¹Ê¹ÓÃÁË4¸öN-dayÎó²î ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110192/apt/operation-earth-kitsune.html


4.FireEye·¢Ã÷EmotetÒÔÍòÊ¥½ÚÔ¼ÇëΪÖ÷Ìâ¾ÙÐÐÈö²¥


4.jpg


FireEyeÑо¿Ö°Ô±Alex Lanstein·¢Ã÷EmotetÒÔÍòÊ¥½ÚÔ¼ÇëΪÖ÷Ìâ¾ÙÐÐÈö²¥ ¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍÒÔ2020ÍòÊ¥½ÚΪÖ÷Ì⣬£¬£¬£¬ £¬»Ñ³ÆÔ¼ÇëÊܺ¦Õß¼ÓÈëÍòÊ¥½ÚÅɶÔ£¬£¬£¬£¬ £¬²¢ÌåÏÖËùÓÐÏêϸÐÅÏ¢¶¼ÔÚ¸½¼þÖУ¬£¬£¬£¬ £¬ÒÔÓÕʹÓû§·­¿ª¶ñÒ⸽¼þ ¡£¡£¡£¡£¡£¡£¡£Ò»µ©Óû§·­¿ª¸½¼þ£¬£¬£¬£¬ £¬¾Í»á±»ÒªÇóµã»÷ÆôÓñ༭ºÍÆôÓÃÄÚÈݰ´Å¥£¬£¬£¬£¬ £¬Ö¼ÔÚ×°ÖÃEmotet Trojan ¡£¡£¡£¡£¡£¡£¡£ÀÖ³É×°ÖöñÒâÈí¼þºó£¬£¬£¬£¬ £¬Emotet½«Ê¹ÓøÃÅÌËã»ú·¢ËÍÀ¬»øÓʼþ£¬£¬£¬£¬ £¬²¢ÌᳫÀÕË÷Èí¼þ¹¥»÷ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/emotet-malware-wants-to-invite-you-to-a-halloween-party/


5.ÓÎÏ·¹«Ë¾Gaming PartnersѬȾREvilµ¼Ö²¿·ÖÊý¾Ýй¶


5.jpg


ÓÎÏ·¹«Ë¾Gaming PartnersѬȾREvil£¬£¬£¬£¬ £¬²¢µ¼Ö²¿·ÖÊý¾Ýй¶ ¡£¡£¡£¡£¡£¡£¡£Gaming Partners International£¨GPI£©ÊÇÒ»¼ÒΪȫÇò¶Ä³¡Ìṩ²©²Ê¼Ò¾ßºÍ×°±¸µÄÈ«·½Î»Ð§À͹©Ó¦ÉÌ ¡£¡£¡£¡£¡£¡£¡£REvilÍÅ»ïÉù³ÆÆäÒѼÓÃܸù«Ë¾ÏµÍ³£¬£¬£¬£¬ £¬²¢ÇÔÈ¡ÁË540GbµÄÊÖÒպͽðÈÚÎļþ ¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¹«Ë¾Ö÷ÒªÐÅÏ¢¡¢ÊÖÒÕÊý¾Ý¡¢²ÆÎñÎļþ¡¢ÓëÀ­Ë¹Î¬¼Ó˹¡¢°ÄÃÅ¡¢Å·ÖÞËùÓжij¡µÄÌõÔ¼¡¢ÒøÐÐÎļþµÈ ¡£¡£¡£¡£¡£¡£¡£¸ÃÍŻﻹ½«Ð¹Â¶Êý¾ÝµÄ½ØÍ¼¹ûÕæÔÚÆäÊý¾Ýй¶վµã£¬£¬£¬£¬ £¬²¢ÌåÏÖ¹«Ë¾72СʱÄÚ²»Ö§¸¶Êê½ð£¬£¬£¬£¬ £¬ËûÃǽ«¹ûÕæËùÓб»µÁÊý¾Ý ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110237/cyber-crime/gaming-partners-international-revil-ransomware.html


6.ºÚ¿ÍÔÚ°µÍø³öÊÛ´Ó17¼Ò¹«Ë¾ÇÔÈ¡µÄ3400ÍòÌõÓû§¼Í¼


6.png


10ÔÂ28ÈÕ£¬£¬£¬£¬ £¬ºÚ¿ÍÔÚ°µÍø³öÊÛ´Ó17¼Ò¹«Ë¾ÇÔÈ¡µÄ3400ÍòÌõÓû§¼Í¼ ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ð¹Â¶Êý¾ÝÏÔʾ£¬£¬£¬£¬ £¬ËùÓб»³öÊÛµÄÊý¾Ý¿â¶¼ÊÇÔÚ2020Äê±»µÁµÄ£¬£¬£¬£¬ £¬ÆäÖÐй¶×î¶àµÄÊÇGeekie.com.br£¬£¬£¬£¬ £¬ÓÐ810ÍòÌõ£¬£¬£¬£¬ £¬¶øÊÜÓ°Ïì×î´óµÄÊÇÐÂ¼ÓÆÂµÄRedMart ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÜÓ°ÏìµÄ17¼Ò¹«Ë¾»®·ÖΪGeekie.com.br£¨810Íò£©¡¢Clip.mx£¨470Íò£©¡¢Wongnai.com£¨430Íò£©¡¢Cermati.com£¨290Íò£©¡¢Everything5pounds.com£¨290Íò£©¡¢Eatigo.com£¨280Íò£©¡¢Katapult.com£¨220Íò£©¡¢Wedmegood.com£¨130Íò£©¡¢RedMart£¨110Íò£©¡¢Coupontools.com£¨100Íò£©¡¢W3layouts.com£¨78.9Íò£©¡¢Game24h.vn£¨77.9Íò£©¡¢Invideo.io£¨57.1Íò£©ºÍApps-builder.com£¨38.6£© ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacker-is-selling-34-million-user-records-stolen-from-17-companies/