µÂ¹úBSIÖÒÑÔËÄ¿îÊÖ»ú±£´æºóÃÅ£¬£¬£¬£¬£¬Ó°Ïì2ÍòÓû§£»£»£»£»£»£»£»ÓÎÏ·ÍøÕ¾Emuparadiseй¶110Íò»áÔ±µÄÕÊ»§ÐÅÏ¢
Ðû²¼Ê±¼ä 2019-06-11
ÓÎÏ·ÍøÕ¾EmuparadiseÔÚ2018Äê4ÔÂÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬µ¼Ö½ü110ÍòÂÛ̳³ÉÔ±µÄÕË»§ÐÅϢй¶¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÕË»§µÄµç×ÓÓʼþµØµã¡¢IPµØµã¡¢Óû§ÃûºÍ¼ÓÑÎMD5¹þÏ£ÃÜÂë¡£¡£¡£¡£¡£Have I Been PwndÍøÕ¾³ÆËüÔÚ2019Äê6ÔÂ9ÈÕ´ÓDeHashed.comÎüÊÕµ½¸ÃÊý¾Ý¿â£¬£¬£¬£¬£¬µ«DeHashedÔõÑù»ñµÃ¸ÃÊý¾Ý¿âµÄ·½·¨ÈÔȻδ֪¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/retro-gaming-site-emuparadise-suffered-data-breach-exposing-account-details-of-11-million-members-3ffd53d5
2¡¢ÃÀ¹úº£¹ØºÍÁìÍÁ±£»£»£»£»£»£»£»¤¾Ö·Ö°üÉÌй¶ÓοͳµÅƼ°ÕÕÆ¬

ÃÀ¹úº£¹ØºÍÁìÍÁ±£»£»£»£»£»£»£»¤¾Ö£¨CBP£©Ö¤ÊµÆäÒ»¸ö·Ö°üÉÌÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬µ¼ÖÂÓο͵ijµÅƺÍÕÕÆ¬ÐÅϢй¶¡£¡£¡£¡£¡£CBPÔÚÐÂΟåÖÐÌåÏÖ£¬£¬£¬£¬£¬¸Ã·Ö°üÉÌÎ¥·´ÁËCBPµÄÕþ²ß£¬£¬£¬£¬£¬Î´¾ÊÚȨµØ½«CBPÍøÂçµÄ³µÅƺÍÓοÍÕÕÆ¬´æ´¢ÔÚ¹«Ë¾ÄÚ²¿Ð§ÀÍÆ÷ÖУ¬£¬£¬£¬£¬²¢ÔÚºÚ¿ÍÈëÇÖÊÂÎñÖÐй¶¡£¡£¡£¡£¡£CBP²¢Î´Í¸Â¶¸Ã·Ö°üÉ̵ÄÃû×Ö£¬£¬£¬£¬£¬µ«Ïà¹ØÃ½Ì屨µÀÖ¸³ö¿ÉÄÜÊÇPerceptics¹«Ë¾¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/cbp-says-hackers-stole-license-plate-and-travelers-photos/
3¡¢µÂ¹úBSIÖÒÑÔËÄ¿îÊÖ»ú±£´æºóÃÅ£¬£¬£¬£¬£¬Ó°Ïì2ÍòÓû§

µÂ¹úÁª°îÐÅÏ¢Çå¾²°ì¹«ÊÒ£¨BSI£©ÖÒÑÔÔڸùúÏúÊÛµÄÖÁÉÙËÄ¿îÖÇÄÜÊÖ»úÐͺŵĹ̼þÖб»Ö²ÈëºóÃÅ£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÐͺŰüÀ¨Doogee BL7000¡¢M-Horse Pure 1¡¢Keecoo P11ºÍVKworld Mix Plus¡£¡£¡£¡£¡£ÕâËÄ¿îÊÖ»ú¶¼ÊǵͶËAndroidÊÖ»ú¡£¡£¡£¡£¡£BSI³ÆÕâЩÊÖ»úµÄ¹Ì¼þ°üÀ¨Ò»¸öÃûΪAndr/Xgen2-CYµÄºóÃÅľÂí¡£¡£¡£¡£¡£¸ÃľÂí¿ÉÍøÂç×°±¸µÄÏêϸÐÅÏ¢²¢Æ¾Ö¤C&CµÄÏÂÁîÖ´ÐжñÒâ²Ù×÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/germany-backdoor-found-in-four-smartphone-models-20000-users-infected/
4¡¢Ð¶ñÒâÍÚ¿ó»î¶¯£¬£¬£¬£¬£¬Ê¹ÓÃWebLogicÎó²î·Ö·¢ÃÅÂÞ±Ò¿ó¹¤

Ç÷ÊÆ¿Æ¼¼·¢Ã÷Ò»¸öʹÓÃWebLogicÎó²î·Ö·¢ÃÅÂޱҿ󹤵ÄжñÒâÍÚ¿ó»î¶¯¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃ4Ô·ݱ»ÐÞ¸´µÄWebLogic·´ÐòÁл¯Îó²î£¨CVE-2019-2725£©ÊµÑé¹¥»÷£¬£¬£¬£¬£¬¸ÃÎó²î¿Éµ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÏÂÁîÖ´ÐС£¡£¡£¡£¡£¹¥»÷ÕßʹÓõĻìÏýÊÖÒÕÒ²ºÜÌØÊ⣺ËûÃǽ«¶ñÒâ´úÂëÒþ²ØÔÚÖ¤ÊéÎļþÖС£¡£¡£¡£¡£ÕâЩ֤ÊéÎļþ¿´ÆðÀ´ÏñͨË×µÄÒþ˽ÔöÇ¿Óʼþ£¨PEM£©ÃûÌÃÖ¤Ê飬£¬£¬£¬£¬µ«ÏÖʵÉϰüÀ¨ÓÃÓÚÏÂÔØºÍÖ´ÐÐpayloadµÄ¶ñÒâPowerShell¾ç±¾¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/cve-2019-2725-exploited-and-certificate-files-used-for-obfuscation-to-deliver-monero-miner/
5¡¢MuddyWaterй¥»÷»î¶¯£¬£¬£¬£¬£¬·Ö·¢¶à½×¶ÎºóÃÅPOWERSTATS V3

Ç÷ÊÆ¿Æ¼¼Çå¾²Ñо¿Ö°Ô±·¢Ã÷MuddyWaterÔÚй¥»÷»î¶¯ÖÐʹÓÃÁËеĶà½×¶ÎPowerShellºóÃÅPOWERSTATS v3¡£¡£¡£¡£¡£¸ÃºóÃű»ÓÃÓÚÕë¶ÔÔ¼µ©´óѧºÍÍÁ¶úÆäÕþ¸®µÄÍøÂç´¹ÂÚ¹¥»÷ÖС£¡£¡£¡£¡£¸ÃºóÃÅ¿ÉÍøÂç²Ù×÷ϵͳµÄÐÅÏ¢²¢ÉÏ´«ÖÁC&CЧÀÍÆ÷£¬£¬£¬£¬£¬ÔÚÎüÊÕµ½ÏìÓ¦µÄÏÂÁîºó£¬£¬£¬£¬£¬¸ÃºóÃÅ»¹¿ÉÓÃÓÚÏÂÔØºÍ×°ÖÃÆäËüpayload¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼ÊӲ쵽¹¥»÷ÕßÔÚ1Ô·ݷַ¢.NETºóÃÅSHARPSTATS£¬£¬£¬£¬£¬²¢ÔÚͳһ¸öÔÂÇл»µ½DelphiºóÃÅDELPHSTATS£»£»£»£»£»£»£»ÔÚ3ÔºÍ4Ô¹¥»÷ÕßÖ÷Òª·Ö·¢POWERSTATS v2£¬£¬£¬£¬£¬²¢ÔÚ5Ô·ÝÇл»µ½POWERSTATS v3¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/muddywater-resurfaces-uses-multi-stage-backdoor-powerstats-v3-and-new-post-exploitation-tools/
6¡¢VLC²¥·ÅÆ÷Ðû²¼Ð°汾3.0.7£¬£¬£¬£¬£¬ÐÞ¸´43¸öÇå¾²Îó²î

VLC²¥·ÅÆ÷ÔÚа汾3.0.7ÖÐÐÞ¸´ÁË43¸öÇå¾²Îó²î£¬£¬£¬£¬£¬°üÀ¨2¸ö¸ßΣÎó²î¡¢21ÆäÖÐΣÎó²îºÍ20¸öµÍΣÎó²î¡£¡£¡£¡£¡£Á½¸ö¸ßΣÎó²î»®·ÖÊÇÒÀÀµ¿âfaad2ÖеÄÔ½½çдÎó²îºÍRISTÄ£¿£¿£¿£¿éÖеÄÕ»»º³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£ÆäËüÎó²î°üÀ¨Ô½½ç¶Á¡¢¶ÑÒç³ö¡¢NULL½âÒýÓá¢use-after-freeµÈÇå¾²ÎÊÌâ¡£¡£¡£¡£¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://gbhackers.com/vlc-3-0-7-released/