GTPЭÒé±£´æÎó²î£¬ £¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓöԷäÎÑÍøÂç¾ÙÐÐDoS¹¥»÷£»£»£»£»£»£»ºÚ¿Íð³äÇå¾²ÍøÕ¾privnote.comÇÔÈ¡±ÈÌØ±Ò

Ðû²¼Ê±¼ä 2020-06-15

1.GTPЭÒé±£´æÎó²î£¬ £¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓöԷäÎÑÍøÂç¾ÙÐÐDoS¹¥»÷


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Positive TechnologiesÐû²¼±¨¸æÌåÏÖ£¬ £¬£¬£¬£¬£¬£¬GTPЭÒé±£´æÎó²î£¬ £¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓöԷäÎÑÍøÂç¾ÙÐÐDoS¹¥»÷¡¢Ú²Æ­¹¥»÷ºÍÊý¾ÝÇÔÈ¡¡£¡£¡£¡£ ¡£¡£¸ÃÎó²îÓ°ÏìÁËʹÓÃ2G¡¢3G¡¢4GÍøÂçµÄ×°±¸£¬ £¬£¬£¬£¬£¬£¬ÒÔ¼°²¿·ÖʹÓÃ5GÍøÂçµÄÊÖ»ú×°±¸¡£¡£¡£¡£ ¡£¡£±¨¸æÌåÏÖ£¬ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ëù²âÊÔµÄÿһ¸öÍøÂç¶¼±£´æ¸ÃÎó²î£¬ £¬£¬£¬£¬£¬£¬¿É±»ºÚ¿ÍʹÓÃÌᳫDoS¹¥»÷¡¢ÆÆËðÕýµ±Óû§µÄ»á¼ûȨÏÞ¡¢ÇÔÈ¡ÍøÂçЧÀͺʹø¿í»òÕßй¶Óû§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£ ¡£¡£Positive TechnologiesÌåÏÖ£¬ £¬£¬£¬£¬£¬£¬¸ÃÎó²î±£´æÓÚЭÒéµÄϵͳ½á¹¹Öжø²»ÊÇ×ÅʵÏÖÖУ¬ £¬£¬£¬£¬£¬£¬²¢ÇÒÑо¿Ö°Ô±½¨ÒéÓû§ÔÚGTP¼¶±ð¹ýÂËÁ÷Á¿²¢½ÓÄÉGSMAÇå¾²½¨ÒéÒÔ·ÀÓù¹¥»÷¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/vulnerabilities---threats/protocol-vulnerability-threatens-mobile-networks/d/d-id/1338068


2.Ó¢¹úÁè¼Ý10Íò¸öÉãÏñÍ·±£´æÎó²î£¬ £¬£¬£¬£¬£¬£¬Ò×±»ºÚ¿ÍʹÓÃ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ó¢¹úÒ»ÏîÊÓ²ìÏÔʾ£¬ £¬£¬£¬£¬£¬£¬¸Ã¹úµÄ¼ÒÍ¥ºÍÆóÒµÖÐÓÐÁè¼Ý10Íò¸öÊÒÄÚÉãÏñÍ·¿ÉÄܱ£´æÇå¾²Îó²î£¬ £¬£¬£¬£¬£¬£¬Ê¹ÆäÈÝÒ×Êܵ½ºÚ¿Í¹¥»÷¡£¡£¡£¡£ ¡£¡£¾ÝÆÊÎö£¬ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÓ¦ÓÃCamHiµÄÉãÏñÍ·£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÖîÈçAccfly£¬ £¬£¬£¬£¬£¬£¬ieGeekºÍSV3CµÈÊܽӴýµÄÆ·ÅÆ£¬ £¬£¬£¬£¬£¬£¬¶¼±£´æ¸ÃÎó²î¡£¡£¡£¡£ ¡£¡£ºÚ¿Í¿ÉÒÔʹÓøÃÎó²îÇÔÈ¡Êý¾Ý¡¢Õë¶ÔÆäËûÎïÁªÍø×°±¸·¢¶¯¹¥»÷»òÕß¼àÊÓÓû§¡£¡£¡£¡£ ¡£¡£½öÔÚÒÑÍùµÄÈý¸öÔÂÖУ¬ £¬£¬£¬£¬£¬£¬¾ÍÓÐÁè¼Ý12Íò¸ö×°±¸ÒÑÔÚÓ¢¹ú¼¤»îʹÓ㬠£¬£¬£¬£¬£¬£¬¶øÔ¤¼ÆÈ«ÇòÔ¼ÓÐ350Íò´ËÀàÉãÏñÍ·ÕýÔÚ±»Ê¹Ó㬠£¬£¬£¬£¬£¬£¬²¢ÇÒÖ÷ÒªÂþÑÜÔÚÔÚÑÇÖÞµØÇø¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/uk-security-cameras-risk-hacking/


3.Messenger±£´æÎó²î£¬ £¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓÃÖ´ÐжñÒâÈí¼þ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÍøÂçÇå¾²¹«Ë¾Reason SecurityµÄÑо¿Ö°Ô±·¢Ã÷ÁËFacebook Messenger±£´æÇå¾²Îó²î£¬ £¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËWindows 460.16°æµÄFacebook Messenger¡£¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±Ú¹ÊÍ£¬ £¬£¬£¬£¬£¬£¬ËûÃÇ·¢Ã÷ÓÐŲÓüÓÔØÁËc:\ Python27Ŀ¼ÏµÄPython27£¬ £¬£¬£¬£¬£¬£¬ÕâÊÇÒ»¸öµÍÍêÕûÐÔµÄλÖ㬠£¬£¬£¬£¬£¬£¬Òâζ×Åÿ¸ö¶ñÒâ³ÌÐòÔÚûÓÐÈκÎȨÏÞµÄÇéÐÎ϶¼¿ÉÒÔ»á¼û¸Ã·¾¶¡£¡£¡£¡£ ¡£¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßÐ®ÖÆÐÅʹ´úÂëÖеÄ×ÊԴŲÓ㬠£¬£¬£¬£¬£¬£¬ÒÔÔËÐжñÒâÈí¼þ¡£¡£¡£¡£ ¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬FacebookÐû²¼ÁË480.5°æMessenger£¬ £¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´´ËÎó²î¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/06/14/facebook-messenger-app-vulnerability-allowed-persistent-malware-attacks/


4.ºÚ¿Íð³äÇå¾²ÍøÕ¾privnote.comÇÔÈ¡±ÈÌØ±Ò


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


¾Ý±¨µÀ£¬ £¬£¬£¬£¬£¬£¬ºÚ¿ÍαÔìÁËÃûΪPrivnotes.com µÄÍøÕ¾£¬ £¬£¬£¬£¬£¬£¬Ã°³äÇå¾²ÍøÕ¾privnote.comÒÔÇÔÈ¡±ÈÌØ±Ò¡£¡£¡£¡£ ¡£¡£Krebs·¢Ã÷ºÚ¿Í½¨ÉèPrivnotes.comÊÇΪÁËÇÔȡͨ¹ýÆäƽ̨·¢Ë͵ļÓÃÜÇ®±Ò¸¶¿îÇëÇó£¬ £¬£¬£¬£¬£¬£¬µ±Óû§Õ³ÌùµÄÄÚÈݰüÀ¨±ÈÌØ±ÒµØµãʱ£¬ £¬£¬£¬£¬£¬£¬¸ÃαÔìÍøÕ¾½«¸ü¸Ä±ÈÌØ±ÒµØµã£¬ £¬£¬£¬£¬£¬£¬ÒÔʵÑéÇÔÈ¡¼ÓÃÜÇ®±Ò¡£¡£¡£¡£ ¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬ÎªÁË×èÖ¹±»·¢Ã÷£¬ £¬£¬£¬£¬£¬£¬¸ü¸ÄºóµÄµØµãµÄǰËĸö×Ö·ûÓëԭʼճÌùµÄµØµãÏàͬ£¬ £¬£¬£¬£¬£¬£¬²¢ÇÒÖ»ÓÐÔÚÓ뽨ÉèÕß²î±ðµÄIPµØµãÕ³Ìùʱ£¬ £¬£¬£¬£¬£¬£¬ÍøÕ¾²Å»á¸ü¸Ä±ÈÌØ±ÒµØµã£¬ £¬£¬£¬£¬£¬£¬ÒÔÌá¸ßÒþ²ØÐÔ¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/attackers-impersonate-secure-messaging-site-to-steal-bitcoins/


5.×Éѯ¹«Ë¾Threadstone AdvisorsÔâMazeÀÕË÷Èí¼þ¹¥»÷


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÃÀ¹ú´Óʲ¢¹ºÊÕ¹ºµÄ×Éѯ¹«Ë¾Threadstone AdvisorsÔâµ½MazeÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬Êý¾Ýй¶¡£¡£¡£¡£ ¡£¡£¸ÃºÚ¿Í×éÖ¯ÔÚÌᳫ¹¥»÷ºó£¬ £¬£¬£¬£¬£¬£¬±ãÐû²¼ÁËÊê½ð֪ͨÒÔ¼°Threadstone¶­ÊÂ×Ü˾ÀíJoshua GoldbergµÄµç»°ºÅÂëºÍµç×ÓÓʼþµØµã£¬ £¬£¬£¬£¬£¬£¬ÏÖÔÚÓÖÔÚÆäй¶վµãÉÏÐû²¼ÁË¿´ËÆÊÇ´ÓThreadstoneϵͳµÁ×ßµÄÎļþ¡£¡£¡£¡£ ¡£¡£ThreadstoneÊÇÒ»¼ÒλÓÚÂóµÏÑ·´ó½ÖµÄ×Éѯ¹«Ë¾£¬ £¬£¬£¬£¬£¬£¬¹«Ë¾¿Í»§°üÀ¨Victoria Beckham¡¢Charles S. Cohen¡¢Æ¥×ȱ¤Æ¡¾Æ¹«Ë¾, Harrys of LondonÒÔ¼° Xcel Brands.¡£¡£¡£¡£ ¡£¡£ÏÖÔÚÉв»ÇåÎúThreadstoneÊÇ·ñÒÑÖ§¸¶Êê½ð¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/104718/cyber-crime/threadstone-advisors-maze-ransomware.html


6.ÀÕË÷Èí¼þBlack KingdomʹÓÃPulse VPNµÄÎó²î¹¥»÷ÍøÂç


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


²¨À¼µÄÇ徲ЧÀ͹«Ë¾REDTEAM.PL·¢Ã÷£¬ £¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þBlack KingdomÕýÔÚʹÓÃPulse Secure VPNÖеÄÎó²î£¨CVE-2019-11510£©¹¥»÷ÆóÒµÍøÂç¡£¡£¡£¡£ ¡£¡£¸ÃÎó²î±£´æÓÚ2019Äê4ÔÂǰµÄ°æ±¾ÖУ¬ £¬£¬£¬£¬£¬£¬¶ø¸ÃÎó²îµÄ²¹¶¡³ÌÐòÒѾ­Ðû²¼£¬ £¬£¬£¬£¬£¬£¬µ«²¿·Ö×éÖ¯ÒÀȻûÓоÙÐиüÐÂÉý¼¶¡£¡£¡£¡£ ¡£¡£¸ÃÀÕË÷Èí¼þͨ¹ýð³äΪGoogle Chromeä¯ÀÀÆ÷µÄÍýÏë±íʹÃüÀ´Òþ²Ø£¬ £¬£¬£¬£¬£¬£¬¸ÃʹÃü½«ÔÚÒþ²ØµÄPowerShell´°¿ÚÖÐÔËÐÐBase64±àÂëµÄ×Ö·û´®´úÂ룬 £¬£¬£¬£¬£¬£¬ÒÔ»ñÈ¡ ¾ç±¾reverse.ps1£¬ £¬£¬£¬£¬£¬£¬²¢Í¨¹ý¸Ã¾ç±¾ÔÚÊÜѬȾÖ÷»úÉÏ·­¿ª·´ÏòShell¡£¡£¡£¡£ ¡£¡£¾ç±¾reverse.ps1ËùÔÚµÄIPµØµãÊÇ198.13.49.179£¬ £¬£¬£¬£¬£¬£¬¿É±»ÆÊÎöΪÈý¸öÓò£¬ £¬£¬£¬£¬£¬£¬ÆäÖÐÒ»¸öÓòÅþÁ¬µ½ÍйÜAndroidºÍ¼ÓÃÜÇ®±ÒÍÚ¾ò¶ñÒâÈí¼þµÄÃÀ¹úºÍÒâ´óÀûµÄЧÀÍÆ÷¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/black-kingdom-ransomware-hacks-networks-with-pulse-vpn-flaws/