AvastÐû²¼ÓйØGoogle PlayÉ϶ñÒâÈí¼þµÄÆÊÎö±¨¸æ£»£»£»£»£»£»£»FBI³ÆºÚ¿ÍʹÓÃSonarQubeÇÔÈ¡Õþ¸®ºÍÆóÒµÔ´´úÂë
Ðû²¼Ê±¼ä 2020-10-28ɱ¶¾Èí¼þÖÆÔìÉÌAvastÐû²¼ÓйØGoogle PlayÉ϶ñÒâÈí¼þµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ³ÆGoogle PlayÊÐËÁÖÐÓÐ21¸öѬȾÁËHiddenAds¶ñÒâÈí¼þµÄAndroidÓ¦ÓóÌÐò£¬£¬£¬£¬GoogleÒÑÓÚÖÜĩɾ³ýÁËÆäÖеÄ15¸ö¡£¡£¡£¡£¡£¡£Avast¶ñÒâÈí¼þÆÊÎöʦÌåÏÖ£¬£¬£¬£¬ÕâЩӦÓÃÄ£ÄâÁËÊ¢ÐеÄÓÎÏ·£¬£¬£¬£¬Ò»µ©Óû§×°ÖÃÁËÕâЩӦÓ㬣¬£¬£¬HiddenAds¾Í»áÒþ²Ø¸ÃÓ¦ÓóÌÐòµÄͼ±êʹÓû§ÄÑÒÔ¾ÙÐÐɾ³ý£¬£¬£¬£¬È»ºó×îÏÈÓÃ¹ã¸æºäÕ¨Óû§¡£¡£¡£¡£¡£¡£AvastÌåÏÖ£¬£¬£¬£¬×èÖ¹ÉÏÖÜÕâЩӦÓóÌÐòÒÑ´ï700Íò´ÎÏÂÔØÁ¿¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.avast.com/new-malware-apps-on-google-play-avast
2.FBI³ÆºÚ¿ÍʹÓÃSonarQubeÇÔÈ¡Õþ¸®ºÍÆóÒµÔ´´úÂë
Áª°îÊÓ²ì¾Ö£¨FBI£©³Æ£¬£¬£¬£¬ºÚ¿ÍʹÓÃSonarQube´ÓÃÀ¹úÕþ¸®»ú¹¹ºÍÆóÒµÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£SonarQubeÊÇÒ»¸ö¿ª·ÅÔ´´úÂëÆ½Ì¨£¬£¬£¬£¬ÓÃÓÚ×Ô¶¯´úÂëÖÊÁ¿ÉóºËºÍ¾²Ì¬ÆÊÎö£¬£¬£¬£¬ÒÔ·¢Ã÷ʹÓÃ27ÖÖ±à³ÌÓïÑÔ¿ª·¢µÄÏîÄ¿ÖеĹýʧºÍÇå¾²Îó²î¡£¡£¡£¡£¡£¡£´Ó2020Äê4ÔÂ×îÏÈ£¬£¬£¬£¬FBI¾ÍÊӲ쵽ÃÀ¹úÕþ¸®»ú¹¹ºÍÊÖÒÕ¡¢½ðÈÚ¡¢ÁãÊÛ¡¢Ê³Îï¡¢µç×ÓÉÌÎñºÍÖÆÔìÒµ¹«Ë¾ÓÉÓÚSonarQube²»Çå¾²µ¼ÖµÄÔ´´úÂëй¶ÊÂÎñ£¬£¬£¬£¬ÆäÖаüÀ¨Microsoft¡¢Adobe¡¢Lenovo¡¢AMD¡¢Qualcomm¡¢Motorola¡¢NintendoºÍµÏÊ¿ÄáµÈ¹«Ë¾¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fbi-hackers-stole-government-source-code-via-sonarqube-instances/
3.ºÚ¿Í´ÓHarvest FinanceÇÔÈ¡¼ÛÖµ2400ÍòÃÀÔª¼ÓÃÜÇ®±Ò
ºÚ¿Í´ÓÊèɢʽ½ðÈÚЧÀÍ£¨DeFi£©Ð§ÀÍHarvest FinanceÖÐÇÔÈ¡Á˼ÛÖµÔ¼2400ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã¹«Ë¾ÊӲ죬£¬£¬£¬ºÚ¿Í×ܹ²ÇÔÈ¡Á˼ÛÖµ1300ÍòÃÀÔªµÄUSD Coin£¨USDC£©ºÍ¼ÛÖµ1100ÍòÃÀÔªµÄTether£¨USDT£©¡£¡£¡£¡£¡£¡£ÔÚ¹¥»÷±¬·¢Á½·ÖÖӺ󣬣¬£¬£¬ºÚ¿Í»¹Ïò¸Ãƽ̨ÍË»¹ÁË250ÍòÃÀÔª£¬£¬£¬£¬µ«ÆäÔµ¹ÊÔÓÉÈÔ²»ÇåÎú¡£¡£¡£¡£¡£¡£Harvest FinanceÈϿɣ¬£¬£¬£¬´Ë´Î¹¥»÷ÊÇÓÉÓÚ×Ô¼ºµÄʧÎóΪ¹¥»÷ÕßÌṩÁËʱ»ú£¬£¬£¬£¬²¢ÐüÉÍ40ÍòÃÀÔªÒÔ½±ÀøÕÒµ½±»µÁ×ʽð²¢ËÍ»¹µÄÈË¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hacker-steals-24-million-from-cryptocurrency-service-harvest-finance/
4.Áè¼Ý100¸öICC PRO½½¹àϵͳ̻¶£¬£¬£¬£¬Ö÷ÒªÂþÑÜÔÚÒÔÉ«ÁÐ
Çå¾²¹«Ë¾Security Joes·¢Ã÷Áè¼Ý100¸öICC PRO½½¹àϵͳ̻¶£¬£¬£¬£¬ÆäÖÐÌ©°ëÂþÑÜÔÚÒÔÉ«ÁС£¡£¡£¡£¡£¡£Security JoesÌåÏÖÓû§ÔÚ×°ÖÃICC PROϵͳʱδ¸ü¸ÄĬÈϳö³§ÉèÖ㬣¬£¬£¬Òò´Ë¿ÉʹÓÃShodanµÈÎïÁªÍøËÑË÷ÒýÇæÇáËɵØÕÒµ½ËüÃÇ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÕÒµ½¿É»á¼ûµÄICC PROϵͳºó£¬£¬£¬£¬Í¨¹ýÊäÈëĬÈÏÖÎÀíÔ±Óû§Ãû¼´¿É»á¼ûÖÇÄܽ½¹à¿ØÖÆÃæ°å£¬£¬£¬£¬È»ºóÔÝÍ£»£»£»£»£»£»£»ò×èÖ¹½½Ë®¡¢¸ü¸ÄÉèÖᢿØÖÆÔËË͵½±ÃµÄË®Á¿ºÍѹÁ¦¡¢»òͨ¹ýɾ³ýÓû§À´Ëø¶¨½½¹àϵͳ¡£¡£¡£¡£¡£¡£ÕâЩϽµµÍè¼ÝÒ»°ëλÓÚÒÔÉ«ÁУ¬£¬£¬£¬ÆäÓàµÄÂþÑÜÔÚÈ«Çò¸÷µØ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/over-100-irrigation-systems-left-exposed-online-without-a-password/
5.Nando's¿Í»§Ô⵽ƾ֤Ìî³ä¹¥»÷µ¼Ö´ó×Ú×ʽ𱻵Á
Nando's¿Í»§Ô⵽ƾ֤Ìî³ä¹¥»÷µ¼Ö´ó×Ú×ʽ𱻵Á¡£¡£¡£¡£¡£¡£Nando'sÊÇÖ÷ҪλÓÚÓ¢¹úºÍÅ·ÖÞ¶¼»áµÄ¼¦ÈâÁ¬Ëø²ÍÌü£¬£¬£¬£¬ÓÚÉÏÖÜÎåÔâµ½ÁËÆ¾Ö¤Ìî³ä¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã²ÍÌü³ÆÆäϵͳ²¢Î´Ôâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬ºÚ¿Í´ÓÆäËûµØ·½ÇÔÈ¡ÁËÆä¿Í»§µÄµç×ÓÓʼþµØµãºÍÃÜÂ룬£¬£¬£¬²¢»á¼ûËûÃǵÄNando'sÕÊ»§£¬£¬£¬£¬ÆäÖÐÒ»ÃûÊܺ¦Õß±»µÁÁËԼĪ870ÃÀÔª¡£¡£¡£¡£¡£¡£Akamai³Æ£¬£¬£¬£¬ÔÚ2018Äê7ÔÂÖÁ½ñÄê6ÔÂÖ®¼ä£¬£¬£¬£¬×ܹ²±¬·¢ÁËÁè¼Ý1000ÒÚÆðƾ֤Ìî³ä¹¥»÷£¬£¬£¬£¬ÆäÖÐ640ÒÚÆðÕë¶ÔÁãÊÛ¡¢ÂÃÓκÍÂùÝÐÐÒµ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/nandos-hackers-customer-accounts/160527/
6.ÃÀ¹úÂÉËùFragomenÔâµ½¹¥»÷µ¼Ö¹ȸèÔ±¹¤ÐÅϢй¶
ÃÀ¹úÒÆÃñ״ʦÊÂÎñËùFragomenÔâµ½¹¥»÷µ¼Ö¹ȸèÔ±¹¤ÐÅϢй¶¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ðû²¼Í¨Öª³Æ£¬£¬£¬£¬ÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬ºÚ¿Í»á¼ûÁ˰üÀ¨I-9¾ÍÒµÑé֤ЧÀÍСÎÒ˽¼ÒÐÅÏ¢µÄÎļþ£¬£¬£¬£¬Éæ¼°µ½Á˹ȸèÔ±¹¤ºÍǰԱ¹¤¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñй¶ÁËÔ±¹¤µÄÈ«Ãû¡¢Óʼĵص㡢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢Éç»á°ü¹ÜºÅ¡¢»¤ÕÕºÅÂëºÍÆäËûÒÆÃñ±êʶ·û¡£¡£¡£¡£¡£¡£FragomenΪËùÓÐÊÜÓ°ÏìµÄGoogleÔ±¹¤ÌṩÁËÒ»ÄêµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/google-employees-personal-info-exposed-in-law-firm-data-breach/