Daimler Git´æ´¢¿â̻¶µ¼Ö¼²³ÛOLUÔ´´úÂëй¶£»£»£»£»£»£»£»º½¿Õ¹«Ë¾EasyJet 900Íò¿Í»§ÐÅϢй¶
Ðû²¼Ê±¼ä 2020-05-201.Daimler 580¶à¸öGit´æ´¢¿â̻¶£¬£¬£¬£¬¼²³Û×é¼þOLUÔ´´úÂëй¶
¾ÝZDNet±¨µÀ£¬£¬£¬£¬Daimler 580¶à¸öGit´æ´¢¿â̻¶£¬£¬£¬£¬ÆäÖаüÀ¨×°ÖÃÔÚMercedez¼²³Û»õ³µÖеİåÔØÂß¼µ¥Î»£¨OLU£©µÄÔ´´úÂë¡£¡£¡£¹¤³ÌʦTill Kottmann·¢Ã÷£¬£¬£¬£¬ËûÔÚMercedez¼²³ÛµÄ´úÂëÍйÜÍøÕ¾DaimlerÖÐʹÓÃí§Òâµç×ÓÓʼþ×¢²áÒ»¸öÕ˺ţ¬£¬£¬£¬±ã¿ÉÒÔ»á¼ûÆäÁè¼Ý580¸öGit´æ´¢¿â¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨OLUÔ´´úÂë¡¢Raspberry PiÓ³Ïñ¡¢Ð§ÀÍÆ÷Ó³Ïñ¡¢ÓÃÓÚÖÎÀíÔ¶³ÌOLUµÄÄÚ²¿Daimler×é¼þ¡¢ÄÚ²¿Îĵµ¡¢´úÂëʾÀýµÈ¡£¡£¡£ÍþвÇ鱨¹«Ë¾UnderÌåÏÖ£¬£¬£¬£¬ËûÃÇͨ¹ýÉó²é»¹·¢Ã÷ÁËDaimlerÄÚ²¿ÏµÍ³µÄÃÜÂëºÍAPIÁîÅÆ£¬£¬£¬£¬¿É±»ºÚ¿ÍÓÃÀ´ÈëÇÖDaimlerÔÆºÍÄÚ²¿ÍøÂç¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/mercedes-benz-onboard-logic-unit-olu-source-code-leaks-online/
2.µÂÖÝÔÙÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Õë¶ÔÆä½»Í¨ÔËÊ䲿ϵͳ
Ò»¸öÔÂÄڵ¿ËÈøË¹ÖÝÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬´Ë´Î¹¥»÷Õë¶ÔµÄÊǸÃÖݵĽ»Í¨ÔËÊ䲿ϵͳ£¬£¬£¬£¬ÏÖÔÚ¸ÃϵͳÒѱ»ÆÈ¹Ø±Õ¡£¡£¡£µÂÖݽ»Í¨ÔËÊ䲿£¨TxDOT£©È·ÈÏ£¬£¬£¬£¬5ÔÂ14ÈÕÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ÓÐδ¾ÊÚȨ»á¼û¸Ã»ú¹¹ÍøÂ磬£¬£¬£¬¸Ã»ú¹¹·¢Ã÷ºóÁ¬Ã¦½ÓÄɲ½·¥£¬£¬£¬£¬±ÜÃâ½øÒ»²½¹¥»÷¡£¡£¡£5ÔÂ8ÈÕ£¬£¬£¬£¬µÂ¿ËÈøË¹ÖÝÔâµ½µÚÒ»´Î¹¥»÷£¬£¬£¬£¬ÀÕË÷Èí¼þ²¡¶¾Ñ¬È¾Á˸ÃÖݵķ¨ÔºÏµÍ³¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Éв»ÇåÎúÁ½´Î¹¥»÷ÊÇ·ñÓйØÁª£¬£¬£¬£¬Ò²Ã»ÓйØÓÚÕâÁ½´Î¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/103410/cyber-crime/txdot-ransomware-attack.html
3.Ó¢¹úº½¿Õ¹«Ë¾EasyJetÔâ¹¥»÷£¬£¬£¬£¬900Íò¿Í»§ÐÅϢй¶
Ó¢¹ú×î´óµÄº½¿Õ¹«Ë¾EasyJeÌåÏÖ£¬£¬£¬£¬ËûÃÇÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬²¢Ð¹Â¶ÁË900Íò¿Í»§µÄÐÅÏ¢¡£¡£¡£ÔÚÕâ´Î¹¥»÷ÖУ¬£¬£¬£¬ºÚ¿Í»á¼ûÁ˸ù«Ë¾900Íò¿Í»§µÄµç×ÓÓʼþµØµãºÍÂÃÐÐÐÅÏ¢£¬£¬£¬£¬ÉÐÓÐÆäÖÐ2208λ¿Í»§µÄÐÅÓÿ¨ÏêϸÐÅÏ¢¡£¡£¡£EasyJetÔÚ·¢Ã÷´ËÊÂÎñºó£¬£¬£¬£¬±ã֪ͨÁËÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐĺÍICO£¬£¬£¬£¬²¢ÌåÏÖÏÖÔÚËûÃÇÕýÔÚ֪ͨÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬Ô¤¼ÆÔÚ2020Äê5ÔÂ26ÈÕ֮ǰËùÓÐÊÜÓ°Ïì¿Í»§¶¼½«ÊÕµ½Í¨Öª¡£¡£¡£ÏÖÔÚÉÐÎÞ´ËÊÂÎñµÄÏêϸÐÅÏ¢¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/easyjet-hacked-data-breach-affects-9-million-customers/
4.ºÚ¿Íð³äÃÀ¹ú²ÆÎñ²¿Óô¹ÂÚÓʼþ·Ö·¢»ùÓÚNode.jsµÄRAT
Abuse.ch·¢Ã÷ÁËеĴ¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬ºÚ¿Íαװ³ÉÃÀ¹ú²ÆÎñ²¿À´·Ö·¢»ùÓÚNode.jsµÄÔ¶³Ì»á¼ûľÂí£¨RAT£©ºÍÇÔÈ¡ÃÜÂëµÄ¶ñÒâÈí¼þ¡£¡£¡£Ê×ÏȺڿͻáÉù³ÆÓÉÓÚÒøÐÐÐÅÏ¢²»×¼È·£¬£¬£¬£¬Î´Ö§¸¶Õþ¸®ÌõÔ¼µÄ¿î×Ó£¬£¬£¬£¬Ö®ºó»áͨ¹ýµç×ÓÓʼþÌáÐÑÓû§¼ì²é¸½¼þÎĵµÊÇ·ñÓÐÎ󡣡£¡£Óʼþ¸½¼þÖаüÀ¨ÃûΪCONTRACT PAYMENT.jarµÄÎļþ£¬£¬£¬£¬Óû§Ö´Ðкó½«ÏÂÔØNode.jsºÍWizard.js¾ç±¾²¢´æ´¢ÔÚ£¥UserProfile \ qnodejs-node-v13.13.0-win-x64Îļþ¼ÐÖС£¡£¡£¸ÃNode.js¶ñÒâÈí¼þQNodeService¾ßÓÐ×ÔÎÒ¸üС¢»ñÈ¡»úеÐÅÏ¢£¨ÀýÈçIPµØµã¡¢»úеÃû³Æ¡¢Î»Öá¢Óû§ÃûºÍ²Ù×÷ϵͳ°æ±¾£©¡¢Ö´ÐÐÏÂÁɾ³ýºÍдÈëÎļþ¡¢´ÓÖÖÖÖÓ¦ÓóÌÐò£¨ÀýÈçChromeºÍFirefox£©ÖÐÇÔÈ¡ÃÜÂëµÄ¹¦Ð§¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fake-us-dept-of-treasury-emails-spreads-new-nodejs-malware/
5.FBIÐû²¼ÖÒÑÔ£¬£¬£¬£¬ÀÕË÷Èí¼þProLockʹÓÃQakbot¹¥»÷Ä¿µÄÍøÂç
FBIÐû²¼ÁËÒ»¸öÇå¾²¾¯±¨£¬£¬£¬£¬ËµÃ÷ÎúÐÂÐÍÀÕË÷Èí¼þProLock¿ÉÒÔʹÓÃQakbot¹¥»÷Ä¿µÄÍøÂç¡£¡£¡£¸Ã²¡¶¾ÓÚ2020Äê3ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬Òѱ»ÓÃÓÚÒ½ÁƱ£½¡×éÖ¯¡¢Õþ¸®»ú¹¹¡¢½ðÈÚ»ú¹¹ºÍÁãÊÛ×éÖ¯µÄ¹¥»÷»î¶¯ÖС£¡£¡£FBI·¢Ã÷ProLock¿ÉÒÔͨ¹ýQakbot»á¼û±»ºÚµÄÍøÂ磬£¬£¬£¬Òò´ËÒ»µ©·¢Ã÷ѬȾÁËQakbotµÄÅÌËã»ú£¬£¬£¬£¬±ØÐ辡¿ì½«ÆäÓëÍøÂçµÄÆäÓಿ·Ö¸ôÀë¡£¡£¡£ÁíÍ⣬£¬£¬£¬FBI»¹ÖÒÑÔºÚ¿ÍÍÅ»ïÔÚÊܺ¦ÕßÖ§¸¶Êê½ðºóÌṩµÄ½âÃÜÆ÷¿ÉÄÜÎÞ·¨Õý³£ÊÂÇ飬£¬£¬£¬»áÆÆËð´óÓÚ64MBµÄÎļþ£¬£¬£¬£¬²¢¿ÉÄܵ¼ÖÂ100MBÒÔÉϵÄÎļþÿ1KBɥʧԼĪ1¸ö×Ö½Ú¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fbi-prolock-ransomware-gains-access-to-victim-networks-via-qakbot-infections/
6.VerizonÐû²¼2020ÄêÊý¾Ýй¶ÊӲ챨¸æ£¬£¬£¬£¬DoS¹¥»÷Ôö¶à
VerizonÐû²¼ÁË2020ÄêÊý¾Ýй¶ÊӲ챨¸æ£¬£¬£¬£¬ÆÊÎöÁË16¸ö±ÊÖ±ÐÐÒµµÄ32002ÆðÇå¾²ÊÂÎñºÍ3950ÆðÊý¾Ýй¶ÊÂÎñ¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬ÒÑÍùÒ»ÄêDoS¹¥»÷µÄÊýÄ¿ÓÐËùÔöÌí£¨1.3ÍòÆð£¬£¬£¬£¬Õ¼Çå¾²ÊÂÎñµÄ40£¥£©£¬£¬£¬£¬Óë´Ëͬʱ£¬£¬£¬£¬ÍøÂçÌØ¹¤¹¥»÷ïÔÌ£¬£¬£¬£¬ÔÚÊý¾Ýй¶ÊÂÎñÖеÄÕ¼±È´Ó13.5£¥Ï½µµ½3.2£¥¡£¡£¡£ÔÚÊý¾Ýй¶·½Ã棬£¬£¬£¬¿ìÒªÒ»°ë£¨45£¥£©µÄÊÂÎñÊÇÓÉÓÚÏÖʵ¹¥»÷£¬£¬£¬£¬¶ø22£¥ÔòÓÉÓÚÉç»á¹¤³Ì¹¥»÷¡£¡£¡£22£¥µÄÈëÇÖÉæ¼°µ½¶ñÒâÈí¼þ£¬£¬£¬£¬¶ø17£¥ÊÇÓɹýʧÔì³ÉµÄ¡£¡£¡£8£¥µÄй¶Դ×ÔÓÚÊÚȨÓû§µÄÎóÓᣡ£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/verizon-data-breach-report-dos-skyrockets-espionage-dips/155843/


¾©¹«Íø°²±¸11010802024551ºÅ