Òò»ù´¡¼Ü¹¹ÉèÖùýʧ΢ÈíºÍAdobeµÈÔ­Âëй¶£»£»£»£»£»£»£»FBIÖÒÑÔCoAP¡¢WS-DD¡¢ARMSºÍJenkins³ÉDDoS¹¥»÷ÐÂǰÑÔ

Ðû²¼Ê±¼ä 2020-07-28

1.Òò»ù´¡¼Ü¹¹ÉèÖùýʧ£¬£¬£¬Î¢ÈíºÍAdobeµÈ¹«Ë¾Ô­´úÂëй¶



¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÓÉÓÚ»ù´¡¼Ü¹¹ÉèÖùýʧ£¬£¬£¬ÊýÊ®¼Ò¹«Ë¾µÄÔ´´úÂëй¶£¬£¬£¬Ð¹Â¶¹«Ë¾°üÀ¨Î¢Èí¡¢Adobe¡¢åÚÏë¡¢AMD¡¢¸ßͨ¡¢Ä¦ÍÐÂÞÀ­¡¢º£Ë¼£¨»ªÎªÓµÓУ©¡¢Áª·¢¿Æ¼¼¡¢GE¼Òµç¡¢ÈÎÌìÌá¢Roblox¡¢µÏÊ¿Äá¡¢½­É­×ԿصÈ×ÅÃû¹«Ë¾¡£¡£¡£¡£ÕâЩй¶Êý¾ÝÊÇÓÉ¿ª·¢Ö°Ô±Tillie KottmannÍøÂçµÄ£¬£¬£¬ÆäÌåÏÖÔÚGitLabµÄ¹«¹²´æ´¢¿âÖпÉÒÔÕÒµ½´ó×Ú´ËÀàÊý¾Ý¡£¡£¡£¡£¿£¿£¿ª·¢Ö°Ô±ÌåÏÖ£¬£¬£¬ÉÐÓиü¶à¹«Ë¾Ê¹ÓÃÉèÖùýʧµÄdevopsµ¼ÖÂÆäÔ´´úÂë̻¶£¬£¬£¬±ðµÄ£¬£¬£¬ËûÃÇÒ²·¢Ã÷ÁËÊýǧ¼Ò¹«Ë¾Î´ÄÜ׼ȷÔËÐÐSonarQube£¬£¬£¬´Ó¶øÌ»Â¶ÁËÉñÃØ´úÂë¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/source-code-from-dozens-of-companies-leaked-online/


2.ºÚ¿ÍÔÚ°µÍø³öÊÛ27.8ÍòInstacart¿Í»§ÐÅÏ¢£¬£¬£¬ÈªÔ´Î´Öª


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿ÍÔÚ°µÍø³öÊÛԼĪ278531¸öInstacart¿Í»§ÐÅÏ¢£¬£¬£¬Êý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÐÅÓÿ¨ºÅµÄºóËÄλÊý×ֺͶ©µ¥ÀúÊ·¼Í¼µÈÐÅÏ¢¡£¡£¡£¡£Instacart·ñ¶¨Æä±¬·¢ÁËÊý¾Ýй¶ÊÂÎñ£¬£¬£¬²¢ÌåÏÖ¹¥»÷Õß¿ÉÄÜ»áʹÓÃÍøÂç´¹ÂÚ»òƾ֤Ìî³äÊÖÒÕÀ´¹¥»÷СÎÒ˽¼Ò£¬£¬£¬ÒÔÇÔÊØÐÅÏ¢¡£¡£¡£¡£¿ÉÊÇÉó²éÊý¾ÝµÄÇå¾²Ñо¿Ö°Ô±ÔòÌåÏÖ£¬£¬£¬ÕâЩÊý¾ÝËÆºõÊÇÕæÊµµÄ£¬£¬£¬²¢ÇÒBuzzFeedÒѾ­Óëй¶Êý¾ÝµÄÁ½Ãû¿Í»§ÑéÖ¤ÏêϸÐÅÏ¢¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ÕâЩÕË»§ÐÅÏ¢ÒÔÿÃû¿Í»§2ÃÀÔªµÄ¼ÛÇ®³öÊÛ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://9to5mac.com/2020/07/23/instacart-customer-records/


3.ºÚ¿ÍÔÚ°µÍø¹ûÕæ¶íÂÞ˹AvitoºÍYula¹«Ë¾µÄ60ÍòÓû§Êý¾Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿ÍÔÚ°µÍø¹ûÕæÁËÁù¸öCSVÃûÌõÄÎļþ£¬£¬£¬Ã¿¸öÎļþ°üÀ¨Ô¼Äª10ÍòÓû§µÄÊý¾Ý£¬£¬£¬ÆäÖÐÈý¸öÊý¾Ý¿â°üÀ¨AvitoÓû§µÄÐÅÏ¢£¬£¬£¬ÁíÍâÈý¸ö°üÀ¨YulaÓû§µÄÐÅÏ¢¡£¡£¡£¡£ÕâЩй¶Êý¾ÝÓйØÓû§µÄÆÜÉíµØÇø¡¢µç»°ºÅÂë¡¢µØµã¡¢²úÆ·ÖÖ±ðºÍÊ±ÇøµÄÐÅÏ¢¡£¡£¡£¡£YulaÌåÏÖ£¬£¬£¬Ð¹Â¶µÄÎļþ²»°üÀ¨Óû§µÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬ÊÇÈκÎÈ˶¼¿ÉÒÔÖ±½Ó´ÓÍøÕ¾»òͨ¹ýÆÊÎö¹ã¸æ»ñµÃµÄÐÅÏ¢£¬£¬£¬AvitoÔòÒÔΪÊý¾Ý¿âÖаüÀ¨µÄÓû§Êý¾ÝÊǹûÕæµÄ¡£¡£¡£¡£AecurionÖ¸³ö£¬£¬£¬ÕâЩÊý¾ÝÉõÖÁ¿ÉÄÜÊÇÊÖ¹¤ÍøÂçµÄ£¬£¬£¬²¢ÇÒ¿ÉÒÔ±»ºÚ¿ÍʹÓþÙÐÐÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/07/databases-of-users-of-russian-ad.html


4.CISAºÍNCSCÁªºÏÖÒÑÔ£¬£¬£¬6.2ÍòQNAP NAS×°±¸ÒÑѬȾQSnatch


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹úCISAºÍÓ¢¹úNCSCÁªºÏ·¢³öµÄÇå¾²¾¯±¨£¬£¬£¬ÌåÏÖÒÑÓÐ62000̨QNAPÍøÂçÅþÁ¬´æ´¢£¨NAS£©×°±¸Ñ¬È¾¶ñÒâÈí¼þQSnatch¡£¡£¡£¡£QSnatchÓÚ2019Äêµ×Ê״η¢Ã÷£¬£¬£¬±¨¸æµÄѬȾÊýÄ¿´Ó2019Äê10ÔµÄ7000̨װ±¸ÔöÌíµ½2020Äê6ÔÂÖеÄ62000̨£¬£¬£¬ÆäÖÐ7600̨λÓÚÃÀ¹ú£¬£¬£¬3900̨λÓÚÓ¢¹ú¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖзºÆðÁ˶ñÒâÈí¼þQSnatchµÄбäÌ壬£¬£¬Ëü¾ßÓÐCGIÃÜÂë¼Í¼¹¦Ð§¡¢Æ¾Ö¤ÇÔÈ¡¹¦Ð§¡¢SSHºóÃÅ¡¢ÉøÍ¸¹¦Ð§ÒÔ¼°ÓÃÓÚÔ¶³Ì»á¼ûµÄWebshell¹¦Ð§¡£¡£¡£¡£CISAºÍNCSCÁªºÏ±Þ²ß¹«Ë¾£¬£¬£¬¾¡¿ìÐÞ¸´QNAP NAS×°±¸¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cisa-says-62000-qnap-nas-devices-have-been-infected-with-the-qsnatch-malware/#ftag=RSSbaffb68


5.FBIÖÒÑÔCoAP¡¢WS-DD¡¢ARMSºÍJenkins³ÉΪDDoS¹¥»÷ÐÂǰÑÔ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


FBI·¢³ö¾¯±¨£¬£¬£¬·¢Ã÷CoAP£¨ÊÜÔ¼ÊøµÄÓ¦ÓÃЭÒ飩¡¢WS-DD£¨WebЧÀͶ¯Ì¬·¢Ã÷£©¡¢ARMS£¨AppleÔ¶³ÌÖÎÀíЧÀÍ£©ºÍ»ùÓÚWebµÄ×Ô¶¯»¯Èí¼þJenkinsÒѱ»ÀÄÓÃÓÚÌᳫ´ó¹æÄ£ÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¡£¡£¡£¡£2018Äê12Ô£¬£¬£¬ºÚ¿Í×îÏÈÀÄÓÃCoAP¾ÙÐÐDDoS·´ÉäºÍ·Å´ó¹¥»÷£¬£¬£¬·Å´ó±¶ÊýΪ34£»£»£»£»£»£»£»2019Äê5ÔºÍ8Ô£¬£¬£¬ºÚ¿ÍʹÓÃWS-DDЭÒéÌᳫÁË130¶àÖÖDDoS¹¥»÷£¬£¬£¬ÆäÖÐÁ½´Î¹¥»÷»®·ÖµÖ´ïÁËÿÃë350GbpsÒÔÉϹæÄ££»£»£»£»£»£»£»2019Äê10Ô£¬£¬£¬ºÚ¿ÍʹÓÃARMS¾ÙÐÐDDoS·Å´ó¹¥»÷£»£»£»£»£»£»£»2020Äê2Ô£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Jenkins¿ÉÓÃÀ´¾ÙÐÐDDoS·Å´ó¹¥»÷µÄÈí¼þ¿ª·¢£¬£¬£¬¿É·Å´ó100±¶DDoS¹¥»÷Á÷Á¿¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-warns-of-new-ddos-attack-vectors-coap-ws-dd-arms-and-jenkins/#ftag=RSSbaffb68


6.Ñо¿ÍŶӷ¢Ã÷ºÚ¿ÍʹÓÃÀ¬»øÓʼþ·Ö·¢¶ñÒâÈí¼þValak


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


´Ó2020Äê4Ôµ½6Ô£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ºÚ¿Í×éÖ¯Shathak£¨»òTA551£©Ê¹ÓÃÀ¬»øÓʼþ»î¶¯´ó×Ú·Ö·¢¶ñÒâÈí¼þValak¡£¡£¡£¡£ValakÊÇÐÅÏ¢ÇÔÈ¡Æ÷ºÍ¶ñÒâÈí¼þ¼ÓÔØÆ÷£¬£¬£¬ÓÚÔÚ2019Äêµ×Ê״α»·¢Ã÷¡£¡£¡£¡£ÆäÒÀÀµÓÚʹÃüÍýÏëºÍWindows×¢²á±í¸üÐÂÔÚWindowsÖ÷»úÉÏDZÔÚ£¬£¬£¬Ê¹ÓÃÌæ»»Êý¾ÝÁ÷(ADS)ÔÚÊÜѬȾµÄÖ÷»úÉÏÔËÐкóÐø¶ñÒâÈí¼þ£¬£¬£¬Ê¹Óõĸü¶àµÄ»ìÏý´úÂëÒÔ×èÖ¹±»·¢Ã÷¡£¡£¡£¡£×î½ü¼¸¸öÔ£¬£¬£¬Valakͨ¹ý¶ñÒâÀ¬»øÓʼþ·Ö·¢£¬£¬£¬Í¨¹ýÒÔ.cab×îºóµÄhttp»òhttpsÁ´½Ó×°Öᣡ£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/valak-evolution/