Central TicketsÈ·ÈÏÊý¾Ýй¶£¬£¬£¬ £¬ºÚ¿Íй¶100ÍòÓû§Êý¾Ý

Ðû²¼Ê±¼ä 2024-10-16
1. Central TicketsÈ·ÈÏÊý¾Ýй¶£¬£¬£¬ £¬ºÚ¿Íй¶100ÍòÓû§Êý¾Ý


10ÔÂ14ÈÕ£¬£¬£¬ £¬Â׶صÄÕÛ¿Û¾çԺƱÎñƽ̨Central Tickets½üÆÚÔâÓöÁËÒ»´ÎÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬²¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅÏ¢±»µÁ£¬£¬£¬ £¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈ¡£¡£¡£¡£¡£¡£¡£Ö»¹Üй¶±¬·¢ÔÚ7ÔÂ1ÈÕ£¬£¬£¬ £¬µ«¹«Ë¾Ö±µ½9Ô²ÅÒâʶµ½´ËÊ£¬£¬£¬ £¬ÆäʱÂ׶ؾ¯Ô±ÌüÔÚ°µÍøÉÏ·¢Ã÷Á˹ØÓÚ±»µÁÊý¾ÝµÄÌÖÂÛ¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍÓÖÃû0xy0um0m£¬£¬£¬ £¬ÓÚ7ÔÂ2ÈÕ»á¼ûÁËCentral TicketsµÄϵͳ£¬£¬£¬ £¬²¢ÊÔͼÒÔ3000ÃÀÔªµÄ¼ÛÇ®³öÊÛÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Central TicketsÈ·ÈÏÈëÇÖÓ°ÏìÁËÓÃÓÚ²âÊÔµÄÔÝʱÊý¾Ý¿â£¬£¬£¬ £¬¸ÃÊý¾Ý¿âËäÓëÖ÷ϵͳ¸ôÀ룬£¬£¬ £¬µ«°üÀ¨Óû§Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¹«Ë¾Ëæºóƾ֤GDPR»®¶¨ÏòÐÅϢרԱ°ì¹«ÊÒ±¨¸æ£¬£¬£¬ £¬²¢Á¬Ã¦Ëø¶¨ÁËÊÜѬȾµÄÊý¾Ý¿â£¬£¬£¬ £¬Ç¿ÖÆÓû§ÖØÖÃÃÜÂ룬£¬£¬ £¬²¢Õö¿ªÊӲ졣¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìÓû§ÊýĿδÅû¶£¬£¬£¬ £¬µ«¹«Ë¾ÖÒÑÔÓû§¿ÉÄÜÒ×ÊÜÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬ £¬²¢±Þ²ßËûÃǼá³ÖСÐÄ¡£¡£¡£¡£¡£¡£¡£Hackread.com×·×ÙÁ˺ڿͻ£¬£¬£¬ £¬²¢Ö¸³öºÚ¿ÍÔÚBreach ForumsÉÏй¶ÁË100Íò¿Í»§µÄÊý¾ÝºÍÄÚ²¿ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£×¨¼ÒÆ·ÆÀCentral TicketsÔÚ·¢Ã÷ÈëÇÖÊÂÎñ·½Ãæ±£´æÑÓ³Ù£¬£¬£¬ £¬±Þ²ßÆóҵȷ±£Óв½·¥ÊµÊ±¼ì²âºÍÓ¦¶ÔÍøÂçÊÂÎñ¡£¡£¡£¡£¡£¡£¡£


https://hackread.com/central-tickets-data-breach-hacker-leaks-user-data/


2. ʹÓÃÕýµ±ÊðÃûÖ¤ÊéµÄHijack Loader¼°XWorm¶ñÒâÈí¼þ»î¶¯ÆØ¹â


10ÔÂ15ÈÕ£¬£¬£¬ £¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Õ¹ÏÖÁËеĶñÒâÈí¼þ»î¶¯£¬£¬£¬ £¬¸Ã»î¶¯Ê¹ÓÃÕýÏÖ´úÂëÊðÃûÖ¤ÊéÊðÃûµÄHijack Loader¹¤¼þ¡£¡£¡£¡£¡£¡£¡£·¨¹úÍøÂçÇå¾²¹«Ë¾HarfangLabÓÚ±¾Ô³õ¼à²âµ½ÕâÒ»Ö¼ÔÚ°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòLummaµÄ¹¥»÷Á´¡£¡£¡£¡£¡£¡£¡£Hijack Loader£¨ÓÖ³ÆDOILoader¡¢IDAT LoaderºÍSHADOWLADDER£©×Ô2023Äê9ÔÂÊ×´ÎÆØ¹â£¬£¬£¬ £¬Í¨³£Í¨¹ýÓÕÆ­Óû§ÏÂÔØ´øÓÐÏÝÚåµÄ¶þ½øÖÆÎļþʵÑé¹¥»÷¡£¡£¡£¡£¡£¡£¡£½üÆÚ±äÖÖ½«Óû§µ¼ÏòÐéαCAPTCHAÒ³Ãæ£¬£¬£¬ £¬ÒªÇó¸´ÖƺÍÔËÐÐPowerShellÏÂÁîÒÔÊͷŶñÒâ¸ºÔØ¡£¡£¡£¡£¡£¡£¡£HarfangLabÊӲ쵽Èý¸ö²î±ð°æ±¾µÄPowerShell¾ç±¾£¬£¬£¬ £¬Éæ¼°mshta.exe¡¢Invoke-ExpressionºÍmsiexec.exeÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£¡£¡£ZIP´æµµ°üÀ¨Ò×ÊÜDLL²à¼ÓÔØÓ°ÏìµÄ¿ÉÖ´ÐÐÎļþºÍ¶ñÒâDLL£¬£¬£¬ £¬ÓÃÓÚ½âÃܲ¢Ö´ÐмÓÃÜÎļþ¡£¡£¡£¡£¡£¡£¡£ÎªÌӱܼì²â£¬£¬£¬ £¬´«ËÍ»úÖÆÒÑ´ÓDLL²à¼ÓÔØ×ª±äΪʹÓöà¸öÊðÃû¶þ½øÖÆÎļþ£¬£¬£¬ £¬µ«Ö¤ÊéÏÖÒѱ»×÷·Ï¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ £¬´úÂëÊðÃû×Ô¼º²»¿É×÷Ϊ¿ÉÐŶȻù×¼¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬SonicWall Capture LabsÖÒÑԳƣ¬£¬£¬ £¬CoreWarrior¶ñÒâÈí¼þѬȾWindows»úеµÄÍøÂç¹¥»÷ÊýÄ¿¼¤Ôö£¬£¬£¬ £¬¶øÍøÂç´¹ÂڻҲͨ¹ýWindows¾ç±¾ÎļþÈö²¥XWorm¶ñÒâÈí¼þ£¬£¬£¬ £¬¸Ã¶ñÒâÈí¼þ¹¦Ð§ÆÕ±é¡£¡£¡£¡£¡£¡£¡£

https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html


3. ¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹ÝÔâÍøÂç¹¥»÷±»ÆÈÏÞÖÆÐ§ÀÍ


10ÔÂ16ÈÕ£¬£¬£¬ £¬¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹Ý½üÆÚÒòÔâÊÜÍøÂç¹¥»÷¶ø±»ÆÈÏÞÖÆÐ§ÀÍ£¬£¬£¬ £¬Ó°ÏìÁ˸ÃÊÐ130ÍòסÃñ¡£¡£¡£¡£¡£¡£¡£¸ÃͼÊé¹ÝϵͳӵÓÐ22¸ö·ÖÖ§»ú¹¹£¬£¬£¬ £¬ÓÚÖÜÎåÊ״ιûÕæÖÒÑÔ³ÆÔâÓöÁË¡°ÍøÂçÇå¾²Îó²î¡±£¬£¬£¬ £¬µ¼Ö²¿·ÖϵͳÊܵ½Íþв¡£¡£¡£¡£¡£¡£¡£Í¼Êé¹ÝËæ¼´¹Ø±ÕËùÓÐЧÀÍÆ÷ºÍÅÌËã»ú£¬£¬£¬ £¬²¢ÓÚÖÜÎåÌáǰ±Õ¹Ý¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÖÜÈý¸÷ËùÔÚ»Ö¸´ÁËÕý³£¿£¿£¿£¿£¿£¿ª·Åʱ¼ä£¬£¬£¬ £¬µ«Ð§ÀÍÒѾÙÐе÷½â£¬£¬£¬ £¬¿Í»§½öÄÜʹÓ÷ÇÊÖÒÕÊֶεÄͼÊé¹Ý¿Õ¼äºÍЧÀÍ¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÍøÂç¹¥»÷£¬£¬£¬ £¬Í¼Êé¹ÝÕýÂÄÀúÑÏÖØµÄЧÀÍÖÐÖ¹£¬£¬£¬ £¬°üÀ¨Í¼ÊéËÍ»¹Ð§ÀÍ¡¢ÊÖÒÕºÍÊý×ÖЧÀÍ£¨ÈçÅÌËãʱ»ú¼û¡¢´òÓ¡¡¢WiFiµÈ£©ÒÔ¼°Êý×ÖͼÊé¹ÝºÍµç×Ó×ÊÔ´¹¤¾ß¾ù²»¿ÉÓᣡ£¡£¡£¡£¡£¡£Í¼Êé¹Ýδ͸¶»Ö¸´Õý³£Ð§À͵Äʱ¼ä£¬£¬£¬ £¬µ«ÌåÏÖÏ£Íû¾¡¿ì»Ö¸´¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬ £¬¼¸ÏîÏÈǰ°²ÅŵĻÈÔ½«¼ÌÐø¾ÙÐС£¡£¡£¡£¡£¡£¡£½üÄêÀ´£¬£¬£¬ £¬Í¼Êé¹ÝÒòÌṩÖ÷ҪЧÀͶø³ÉΪÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷Ä¿µÄ£¬£¬£¬ £¬¼ÓÄôó¶à¸öÖ÷Òª¶¼»áµÄͼÊé¹ÝϵͳҲÔâÊÜÁËÀàËÆ¹¥»÷£¬£¬£¬ £¬µ¼ÖÂЧÀÍÊܵ½ÑÏÖØÓ°Ïì¡£¡£¡£¡£¡£¡£¡£

https://therecord.media/calgary-public-library-limits-services


4. ¹«¹²Æû³µ¼¯ÍÅÔâ8BaseÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬ £¬Éù³ÆÇÔÈ¡´ó×ÚÉñÃØÐÅÏ¢


10ÔÂ15ÈÕ£¬£¬£¬ £¬¹«¹²Æû³µ¼¯ÍŽüÆÚ½ÒÏþÉùÃ÷»ØÓ¦ÁËÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬ £¬Ò»¸öÃûΪ8BaseµÄÀÕË÷Èí¼þ×éÖ¯Éù³ÆÒÑ´Ó¸ÃÆû³µÖÆÔìÉ̵ÄϵͳÖÐÇÔÈ¡Á˰üÀ¨·¢Æ±¡¢ÊÕÌõ¡¢»á¼ÆÎļþ¡¢Ð¡ÎÒ˽¼ÒÊý¾Ý¡¢Ö¤Êé¡¢¹ÍÓ¶ÌõÔ¼¡¢ÈËʵµ°¸µÈÔÚÄڵġ°´ó×ÚÉñÃØÐÅÏ¢¡±¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬¹«¹²Æû³µ½²»°ÈËÌåÏÖ£¬£¬£¬ £¬¹«¹²Æû³µ¼¯ÍŵÄIT»ù´¡ÉèÊ©²¢Î´Êܵ½Ó°Ï죬£¬£¬ £¬²¢½«¼ÌÐøÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬¸Ã¹«Ë¾ÉÐδ͸¶Óйش˴ÎÍøÂç¹¥»÷µÄÈÎºÎÆäËûÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬Ö»¹Ü8BaseÀÕË÷Èí¼þ×éÖ¯ÔÚÍøÕ¾ÉÏÐû²¼Á˹«¹²Æû³µµÄÊê½ðÏÞÆÚÒѵ½£¬£¬£¬ £¬µ«ºÚ¿ÍËÆºõ²¢Î´¹ûÕæÈκα»µÁÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£8Base×Ô2023ÄêÍ·¾ÍÒѱ£´æ£¬£¬£¬ £¬Æù½ñΪֹÒÑÐû²¼ÁË400¶àÃûÊܺ¦ÕßµÄÃû×Ö¡£¡£¡£¡£¡£¡£¡£ÍøÂç·¸·¨·Ö×ÓÒ»µ©»ñµÃÄ¿µÄ×é֯ϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬ £¬¾Í»áÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÏòÊܺ¦ÕßʩѹÒÔÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/volkswagen-says-it-infrastructure-not-affected-after-ransomware-gang-claims-data-theft/


5. Google PlayÉÏÁè¼Ý200¸ö¶ñÒâÓ¦ÓÃÏÂÔØÁ¿½ü800Íò


10ÔÂ15ÈÕ£¬£¬£¬ £¬ZscalerµÄÍþвÇ鱨Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬ £¬ÔÚ2023Äê6ÔÂÖÁ2024Äê4ÔÂʱ´ú£¬£¬£¬ £¬Android¹Ù·½ÊÐËÁGoogle Play·Ö·¢ÁËÁè¼Ý200¸ö¶ñÒâÓ¦ÓóÌÐò£¬£¬£¬ £¬ÀÛ¼ÆÏÂÔØÁ¿¿¿½ü800Íò´Î¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üÀ¨ÐÅÏ¢ÇÔÈ¡ÕßJoker¡¢¹ã¸æÈí¼þ¡¢FacebookÕÊ»§Æ¾Ö¤ÇÔÈ¡³ÌÐòFacestealer¡¢ÐÅÏ¢ÇÔÈ¡ºÍ¶ÌÐÅ×èµ²³ÌÐòCoperµÈ¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹È¸èÓµÓмì²â¶ñÒâÓ¦ÓóÌÐòµÄÇå¾²»úÖÆ£¬£¬£¬ £¬µ«ÍþвÐÐΪÕßÈÔʹÓÃһЩ¼¼ÇÉÈÆ¹ýÑéÖ¤Àú³Ì¡£¡£¡£¡£¡£¡£¡£ZscalerµÄ±¨¸æÖ¸³ö£¬£¬£¬ £¬½üÒ»°ë¶ñÒâÓ¦ÓóÌÐòÊÇÔÚGoogle PlayµÄ¹¤¾ß¡¢¸öÐÔ»¯¡¢ÉãÓ°¡¢Éú²úÁ¦ºÍÉúÑÄ·½·¨ÖÖ±ðÏÂÐû²¼µÄ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬È¥ÄêGoogle PlayÉÏÒ²·ºÆðÁËÆäËû¶ñÒâÈí¼þ£¬£¬£¬ £¬ÈçNecro¡¢GoldosonºÍSpyLoanµÈ£¬£¬£¬ £¬ËüÃǵÄÏÂÔØÁ¿»®·ÖµÖ´ï1100Íò´Î¡¢1ÒڴκÍÁè¼Ý1200Íò´Î¡£¡£¡£¡£¡£¡£¡£±¨¸æ»¹ÏÔʾ£¬£¬£¬ £¬ÊÜÒÆ¶¯¶ñÒâÈí¼þ¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÓ¡¶ÈºÍÃÀ¹ú£¬£¬£¬ £¬½ÌÓýÐÐÒµ³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¡£ÎªÁËïÔÌ­±»Google Play¶ñÒâÈí¼þѬȾµÄʱ»ú£¬£¬£¬ £¬½¨ÒéÓû§ÔĶÁ̸ÂÛ¡¢¼ì²éÓ¦ÓóÌÐòÐû²¼ÕßÒÔ¼°×°ÖÃʱÇëÇóµÄȨÏÞ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-200-malicious-apps-on-google-play-downloaded-millions-of-times/


6. WordPress Jetpack ²å¼þÑÏÖØÎó²îÓ°Ïì2700Íò¸öÍøÕ¾


10ÔÂ15ÈÕ£¬£¬£¬ £¬WordPress Jetpack²å¼þ¿ËÈÕÐû²¼ÁËÒ»ÏîÒªº¦¸üУ¬£¬£¬ £¬ÐÞ¸´ÁËÒ»¸ö×Ô2016ÄêÒÔÀ´Ò»Ö±±£´æµÄÑÏÖØÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ²å¼þµÄÁªÏµ±íµ¥¹¦Ð§ÖУ¬£¬£¬ £¬¿ÉÄÜÔÊÐíÈκεÇÂ¼ÍøÕ¾µÄÓû§Éó²éÍ³Ò»ÍøÕ¾ÉÏÆäËûÈËÌá½»µÄ±íµ¥¡£¡£¡£¡£¡£¡£¡£JetpackÊÇÒ»¿îÊ¢ÐеÄWordPress²å¼þ£¬£¬£¬ £¬ÓÉWordPress.com±³ºóµÄ¹«Ë¾Automattic¿ª·¢£¬£¬£¬ £¬ÌṩÁËһϵÁй¦Ð§À´ÔöÇ¿ÍøÕ¾µÄ¹¦Ð§¡¢Çå¾²ÐÔºÍÐÔÄÜ£¬£¬£¬ £¬ÏÖÔÚÒѱ»2700Íò¸öWordPressÍøÕ¾Ê¹Óᣡ£¡£¡£¡£¡£¡£ËäȻά»¤Ö°Ô±²¢Î´·¢Ã÷¸ÃÎó²îÒѱ»Ò°Íâ¹¥»÷ʹÓõÄÖ¤¾Ý£¬£¬£¬ £¬µ«ÈÔ±Þ²ßÓû§¾¡¿ì¸üÐÂÖÁ×îа汾13.9.1£¬£¬£¬ £¬ÒÔÈ·±£ÍøÕ¾µÄÇå¾²¡£¡£¡£¡£¡£¡£¡£´ó´ó¶¼ÍøÕ¾ÒѾ­»ò¼´½«×Ô¶¯¸üÐÂÖÁ×îа汾¡£¡£¡£¡£¡£¡£¡£JetpackÍŶӶԴ˴θøÓû§´øÀ´µÄδ±ãÌåÏÖǸÒ⣬£¬£¬ £¬²¢ÔÊÐí½«¼ÌÐø°´ÆÚÉóºË´úÂë¿â£¬£¬£¬ £¬È·±£Óû§ÍøÕ¾µÄÇå¾²¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/169848/uncategorized/wordpress-jetpack-plugin-critical-flaw.html