HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£»£»£»£»£»ÐµÄË®¿Ó¹¥»÷»î¶¯Earth KitsuneÕë¶Ôº«¹úÇÈÃñ

Ðû²¼Ê±¼ä 2020-11-02

1.HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ


1.png


HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£¬£¬£¬£¬£¬£¬£¬³Æ¿çÕ¾µã¾ç±¾£¨XSS£©ÊÇ×î³£¼ûµÄÎó²îÀàÐÍ£¬£¬£¬£¬£¬£¬£¬±È2019ÄêÔöÌíÁË134%¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬XSSÎó²îÕ¼Á˱¨¸æµÄËùÓÐÎó²îµÄ18%£¬£¬£¬£¬£¬£¬£¬×ܼƻñµÃÁË420ÍòÃÀÔªµÄ½±½ð(±ÈÈ¥ÄêÔöÌíÁË26%)¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬²»µ±»á¼û¿ØÖÆÎó²îËù»ñµÃµÄ½±½ð¶î¶È±ÈÈ¥Äêͬ±ÈÔöÌí134£¥£¬£¬£¬£¬£¬£¬£¬¸ßµÖ´ï400ÍòÃÀÔª£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÐÅÏ¢Åû¶Îó²î£¬£¬£¬£¬£¬£¬£¬Í¬±ÈÔöÌí63£¥¡£¡£¡£¡£¡£¡£ÕâÁ½ÖÖ·½·¨¶¼»áй¶DZÔÚµÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ÀýÈçСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

hackerone.com/hacker-powered-security-report


2.Ñо¿Ö°Ô±³ÆÈÔÓÐÁè¼Ý10Íǫ̀ÅÌËã»úÒ×ÊÜSMBGhost¹¥»÷


2.jpg


Ñо¿Ö°Ô±Jan Kopriva³ÆÈÔÓÐÁè¼Ý10Íǫ̀ÅÌËã»úÒ×ÊÜSMBGhost¹¥»÷¡£¡£¡£¡£¡£¡£SMBGhostÎó²î£¨CVE-2020-0796£©ÎªMicrosoftЧÀÍÆ÷ÐÂÎſ飨SMB£©Ð­ÒéÖеÄÒ»¸öÔ¶³ÌÖ´ÐдúÂëÎó²î£¬£¬£¬£¬£¬£¬£¬Ê¹ÓøÃÎó²î¿É¾ÙÐÐÈ䳿¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÒÔÈö²¥µ½ÆäËûÅÌËã»úÉÏ£¬£¬£¬£¬£¬£¬£¬MicrosoftÒÑÔÚÈýÔ·ÝÐÞ¸´¸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£Jan Kopriva·¢Ã÷ÈÔÓÐÁè¼Ý103000̨ÅÌËã»úÒ×ÊÜ´ËÀ๥»÷£¬£¬£¬£¬£¬£¬£¬ÆäÖдó´ó¶¼Î»ÓŲ́Í壨22£¥£©£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÈÕ±¾£¨20£¥£©ºÍ¶íÂÞ˹£¨11£¥£©¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110247/hacking/smbghost-vulnerable-machines-dangers.html


3.еÄË®¿Ó¹¥»÷»î¶¯Earth KitsuneÕë¶Ôº«¹úÇÈÃñ


3.jpg


Ç÷ÊÆ¿Æ¼¼µÄÑо¿Ö°Ô±Åû¶ÁËеÄË®¿Ó¹¥»÷»î¶¯Earth Kitsune£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹úÇÈÃñ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷¹¥»÷±¬·¢ÔÚ3Ô¡¢5ÔºÍ9Ô£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÁ˶ñÒâÈí¼þSLUB(¼´SLackºÍgithUB)ºÍÁ½¸öкóÃÅ£¬£¬£¬£¬£¬£¬£¬dneSpyºÍagfSpy£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ½ÓÊÜÊÜѬȾµÄϵͳ²¢´ÓÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£ÓëÆäËû¹¥»÷²î±ðµÄÊÇ£¬£¬£¬£¬£¬£¬£¬ËüÔÚÊܺ¦»úеÉϰ²ÅÅÁË´ó×ÚµÄÑù±¾£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁ˶à¸öÏÂÁîºÍ¿ØÖÆ(C&C)ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁË4¸öN-dayÎó²î¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110192/apt/operation-earth-kitsune.html


4.FireEye·¢Ã÷EmotetÒÔÍòÊ¥½ÚÔ¼ÇëΪÖ÷Ìâ¾ÙÐÐÈö²¥


4.jpg


FireEyeÑо¿Ö°Ô±Alex Lanstein·¢Ã÷EmotetÒÔÍòÊ¥½ÚÔ¼ÇëΪÖ÷Ìâ¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£ºÚ¿ÍÒÔ2020ÍòÊ¥½ÚΪÖ÷Ì⣬£¬£¬£¬£¬£¬£¬»Ñ³ÆÔ¼ÇëÊܺ¦Õß¼ÓÈëÍòÊ¥½ÚÅɶÔ£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖËùÓÐÏêϸÐÅÏ¢¶¼ÔÚ¸½¼þÖУ¬£¬£¬£¬£¬£¬£¬ÒÔÓÕʹÓû§·­¿ª¶ñÒ⸽¼þ¡£¡£¡£¡£¡£¡£Ò»µ©Óû§·­¿ª¸½¼þ£¬£¬£¬£¬£¬£¬£¬¾Í»á±»ÒªÇóµã»÷ÆôÓñ༭ºÍÆôÓÃÄÚÈݰ´Å¥£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ×°ÖÃEmotet Trojan¡£¡£¡£¡£¡£¡£ÀÖ³É×°ÖöñÒâÈí¼þºó£¬£¬£¬£¬£¬£¬£¬Emotet½«Ê¹ÓøÃÅÌËã»ú·¢ËÍÀ¬»øÓʼþ£¬£¬£¬£¬£¬£¬£¬²¢ÌᳫÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/emotet-malware-wants-to-invite-you-to-a-halloween-party/


5.ÓÎÏ·¹«Ë¾Gaming PartnersѬȾREvilµ¼Ö²¿·ÖÊý¾Ýй¶


5.jpg


ÓÎÏ·¹«Ë¾Gaming PartnersѬȾREvil£¬£¬£¬£¬£¬£¬£¬²¢µ¼Ö²¿·ÖÊý¾Ýй¶¡£¡£¡£¡£¡£¡£Gaming Partners International£¨GPI£©ÊÇÒ»¼ÒΪȫÇò¶Ä³¡Ìṩ²©²Ê¼Ò¾ßºÍ×°±¸µÄÈ«·½Î»Ð§À͹©Ó¦ÉÌ¡£¡£¡£¡£¡£¡£REvilÍÅ»ïÉù³ÆÆäÒѼÓÃܸù«Ë¾ÏµÍ³£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË540GbµÄÊÖÒպͽðÈÚÎļþ¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¹«Ë¾Ö÷ÒªÐÅÏ¢¡¢ÊÖÒÕÊý¾Ý¡¢²ÆÎñÎļþ¡¢ÓëÀ­Ë¹Î¬¼Ó˹¡¢°ÄÃÅ¡¢Å·ÖÞËùÓжij¡µÄÌõÔ¼¡¢ÒøÐÐÎļþµÈ¡£¡£¡£¡£¡£¡£¸ÃÍŻﻹ½«Ð¹Â¶Êý¾ÝµÄ½ØÍ¼¹ûÕæÔÚÆäÊý¾Ýй¶վµã£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖ¹«Ë¾72СʱÄÚ²»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬ËûÃǽ«¹ûÕæËùÓб»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110237/cyber-crime/gaming-partners-international-revil-ransomware.html


6.ºÚ¿ÍÔÚ°µÍø³öÊÛ´Ó17¼Ò¹«Ë¾ÇÔÈ¡µÄ3400ÍòÌõÓû§¼Í¼


6.png


10ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ°µÍø³öÊÛ´Ó17¼Ò¹«Ë¾ÇÔÈ¡µÄ3400ÍòÌõÓû§¼Í¼¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ð¹Â¶Êý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬ËùÓб»³öÊÛµÄÊý¾Ý¿â¶¼ÊÇÔÚ2020Äê±»µÁµÄ£¬£¬£¬£¬£¬£¬£¬ÆäÖÐй¶×î¶àµÄÊÇGeekie.com.br£¬£¬£¬£¬£¬£¬£¬ÓÐ810ÍòÌõ£¬£¬£¬£¬£¬£¬£¬¶øÊÜÓ°Ïì×î´óµÄÊÇÐÂ¼ÓÆÂµÄRedMart¡£¡£¡£¡£¡£¡£´Ë´ÎÊÜÓ°ÏìµÄ17¼Ò¹«Ë¾»®·ÖΪGeekie.com.br£¨810Íò£©¡¢Clip.mx£¨470Íò£©¡¢Wongnai.com£¨430Íò£©¡¢Cermati.com£¨290Íò£©¡¢Everything5pounds.com£¨290Íò£©¡¢Eatigo.com£¨280Íò£©¡¢Katapult.com£¨220Íò£©¡¢Wedmegood.com£¨130Íò£©¡¢RedMart£¨110Íò£©¡¢Coupontools.com£¨100Íò£©¡¢W3layouts.com£¨78.9Íò£©¡¢Game24h.vn£¨77.9Íò£©¡¢Invideo.io£¨57.1Íò£©ºÍApps-builder.com£¨38.6£©¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacker-is-selling-34-million-user-records-stolen-from-17-companies/