Central TicketsÈ·ÈÏÊý¾Ýй¶£¬£¬£¬£¬£¬£¬ºÚ¿Íй¶100ÍòÓû§Êý¾Ý

Ðû²¼Ê±¼ä 2024-10-16
1. Central TicketsÈ·ÈÏÊý¾Ýй¶£¬£¬£¬£¬£¬£¬ºÚ¿Íй¶100ÍòÓû§Êý¾Ý


10ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬Â׶صÄÕÛ¿Û¾çԺƱÎñƽ̨Central Tickets½üÆÚÔâÓöÁËÒ»´ÎÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬²¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅÏ¢±»µÁ£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈ¡£¡£¡£¡£Ö»¹Üй¶±¬·¢ÔÚ7ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬µ«¹«Ë¾Ö±µ½9Ô²ÅÒâʶµ½´ËÊ£¬£¬£¬£¬£¬£¬ÆäʱÂ׶ؾ¯Ô±ÌüÔÚ°µÍøÉÏ·¢Ã÷Á˹ØÓÚ±»µÁÊý¾ÝµÄÌÖÂÛ¡£¡£¡£¡£ºÚ¿ÍÓÖÃû0xy0um0m£¬£¬£¬£¬£¬£¬ÓÚ7ÔÂ2ÈÕ»á¼ûÁËCentral TicketsµÄϵͳ£¬£¬£¬£¬£¬£¬²¢ÊÔͼÒÔ3000ÃÀÔªµÄ¼ÛÇ®³öÊÛÊý¾Ý¡£¡£¡£¡£Central TicketsÈ·ÈÏÈëÇÖÓ°ÏìÁËÓÃÓÚ²âÊÔµÄÔÝʱÊý¾Ý¿â£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿âËäÓëÖ÷ϵͳ¸ôÀ룬£¬£¬£¬£¬£¬µ«°üÀ¨Óû§Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¹«Ë¾Ëæºóƾ֤GDPR»®¶¨ÏòÐÅϢרԱ°ì¹«ÊÒ±¨¸æ£¬£¬£¬£¬£¬£¬²¢Á¬Ã¦Ëø¶¨ÁËÊÜѬȾµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬Ç¿ÖÆÓû§ÖØÖÃÃÜÂ룬£¬£¬£¬£¬£¬²¢Õö¿ªÊӲ졣¡£¡£¡£ÊÜÓ°ÏìÓû§ÊýĿδÅû¶£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÖÒÑÔÓû§¿ÉÄÜÒ×ÊÜÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬²¢±Þ²ßËûÃǼá³ÖСÐÄ¡£¡£¡£¡£Hackread.com×·×ÙÁ˺ڿͻ£¬£¬£¬£¬£¬£¬²¢Ö¸³öºÚ¿ÍÔÚBreach ForumsÉÏй¶ÁË100Íò¿Í»§µÄÊý¾ÝºÍÄÚ²¿ÐÅÏ¢¡£¡£¡£¡£×¨¼ÒÆ·ÆÀCentral TicketsÔÚ·¢Ã÷ÈëÇÖÊÂÎñ·½Ãæ±£´æÑÓ³Ù£¬£¬£¬£¬£¬£¬±Þ²ßÆóҵȷ±£Óв½·¥ÊµÊ±¼ì²âºÍÓ¦¶ÔÍøÂçÊÂÎñ¡£¡£¡£¡£


https://hackread.com/central-tickets-data-breach-hacker-leaks-user-data/


2. ʹÓÃÕýµ±ÊðÃûÖ¤ÊéµÄHijack Loader¼°XWorm¶ñÒâÈí¼þ»î¶¯ÆØ¹â


10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Õ¹ÏÖÁËеĶñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÕýÏÖ´úÂëÊðÃûÖ¤ÊéÊðÃûµÄHijack Loader¹¤¼þ¡£¡£¡£¡£·¨¹úÍøÂçÇå¾²¹«Ë¾HarfangLabÓÚ±¾Ô³õ¼à²âµ½ÕâÒ»Ö¼ÔÚ°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòLummaµÄ¹¥»÷Á´¡£¡£¡£¡£Hijack Loader£¨ÓÖ³ÆDOILoader¡¢IDAT LoaderºÍSHADOWLADDER£©×Ô2023Äê9ÔÂÊ×´ÎÆØ¹â£¬£¬£¬£¬£¬£¬Í¨³£Í¨¹ýÓÕÆ­Óû§ÏÂÔØ´øÓÐÏÝÚåµÄ¶þ½øÖÆÎļþʵÑé¹¥»÷¡£¡£¡£¡£½üÆÚ±äÖÖ½«Óû§µ¼ÏòÐéαCAPTCHAÒ³Ãæ£¬£¬£¬£¬£¬£¬ÒªÇó¸´ÖƺÍÔËÐÐPowerShellÏÂÁîÒÔÊͷŶñÒâ¸ºÔØ¡£¡£¡£¡£HarfangLabÊӲ쵽Èý¸ö²î±ð°æ±¾µÄPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬Éæ¼°mshta.exe¡¢Invoke-ExpressionºÍmsiexec.exeÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£ZIP´æµµ°üÀ¨Ò×ÊÜDLL²à¼ÓÔØÓ°ÏìµÄ¿ÉÖ´ÐÐÎļþºÍ¶ñÒâDLL£¬£¬£¬£¬£¬£¬ÓÃÓÚ½âÃܲ¢Ö´ÐмÓÃÜÎļþ¡£¡£¡£¡£ÎªÌӱܼì²â£¬£¬£¬£¬£¬£¬´«ËÍ»úÖÆÒÑ´ÓDLL²à¼ÓÔØ×ª±äΪʹÓöà¸öÊðÃû¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬µ«Ö¤ÊéÏÖÒѱ»×÷·Ï¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬´úÂëÊðÃû×Ô¼º²»¿É×÷Ϊ¿ÉÐŶȻù×¼¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬SonicWall Capture LabsÖÒÑԳƣ¬£¬£¬£¬£¬£¬CoreWarrior¶ñÒâÈí¼þѬȾWindows»úеµÄÍøÂç¹¥»÷ÊýÄ¿¼¤Ôö£¬£¬£¬£¬£¬£¬¶øÍøÂç´¹ÂڻҲͨ¹ýWindows¾ç±¾ÎļþÈö²¥XWorm¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¹¦Ð§ÆÕ±é¡£¡£¡£¡£

https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html


3. ¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹ÝÔâÍøÂç¹¥»÷±»ÆÈÏÞÖÆÐ§ÀÍ


10ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹Ý½üÆÚÒòÔâÊÜÍøÂç¹¥»÷¶ø±»ÆÈÏÞÖÆÐ§ÀÍ£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˸ÃÊÐ130ÍòסÃñ¡£¡£¡£¡£¸ÃͼÊé¹ÝϵͳӵÓÐ22¸ö·ÖÖ§»ú¹¹£¬£¬£¬£¬£¬£¬ÓÚÖÜÎåÊ״ιûÕæÖÒÑÔ³ÆÔâÓöÁË¡°ÍøÂçÇå¾²Îó²î¡±£¬£¬£¬£¬£¬£¬µ¼Ö²¿·ÖϵͳÊܵ½Íþв¡£¡£¡£¡£Í¼Êé¹ÝËæ¼´¹Ø±ÕËùÓÐЧÀÍÆ÷ºÍÅÌËã»ú£¬£¬£¬£¬£¬£¬²¢ÓÚÖÜÎåÌáǰ±Õ¹Ý¡£¡£¡£¡£Ö»¹ÜÖÜÈý¸÷ËùÔÚ»Ö¸´ÁËÕý³£¿£¿ £¿ª·Åʱ¼ä£¬£¬£¬£¬£¬£¬µ«Ð§ÀÍÒѾÙÐе÷½â£¬£¬£¬£¬£¬£¬¿Í»§½öÄÜʹÓ÷ÇÊÖÒÕÊֶεÄͼÊé¹Ý¿Õ¼äºÍЧÀÍ¡£¡£¡£¡£ÓÉÓÚÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Í¼Êé¹ÝÕýÂÄÀúÑÏÖØµÄЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬°üÀ¨Í¼ÊéËÍ»¹Ð§ÀÍ¡¢ÊÖÒÕºÍÊý×ÖЧÀÍ£¨ÈçÅÌËãʱ»ú¼û¡¢´òÓ¡¡¢WiFiµÈ£©ÒÔ¼°Êý×ÖͼÊé¹ÝºÍµç×Ó×ÊÔ´¹¤¾ß¾ù²»¿ÉÓᣡ£¡£¡£Í¼Êé¹Ýδ͸¶»Ö¸´Õý³£Ð§À͵Äʱ¼ä£¬£¬£¬£¬£¬£¬µ«ÌåÏÖÏ£Íû¾¡¿ì»Ö¸´¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¼¸ÏîÏÈǰ°²ÅŵĻÈÔ½«¼ÌÐø¾ÙÐС£¡£¡£¡£½üÄêÀ´£¬£¬£¬£¬£¬£¬Í¼Êé¹ÝÒòÌṩÖ÷ҪЧÀͶø³ÉΪÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬¼ÓÄôó¶à¸öÖ÷Òª¶¼»áµÄͼÊé¹ÝϵͳҲÔâÊÜÁËÀàËÆ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂЧÀÍÊܵ½ÑÏÖØÓ°Ïì¡£¡£¡£¡£

https://therecord.media/calgary-public-library-limits-services


4. ¹«¹²Æû³µ¼¯ÍÅÔâ8BaseÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡´ó×ÚÉñÃØÐÅÏ¢


10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬¹«¹²Æû³µ¼¯ÍŽüÆÚ½ÒÏþÉùÃ÷»ØÓ¦ÁËÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ8BaseµÄÀÕË÷Èí¼þ×éÖ¯Éù³ÆÒÑ´Ó¸ÃÆû³µÖÆÔìÉ̵ÄϵͳÖÐÇÔÈ¡Á˰üÀ¨·¢Æ±¡¢ÊÕÌõ¡¢»á¼ÆÎļþ¡¢Ð¡ÎÒ˽¼ÒÊý¾Ý¡¢Ö¤Êé¡¢¹ÍÓ¶ÌõÔ¼¡¢ÈËʵµ°¸µÈÔÚÄڵġ°´ó×ÚÉñÃØÐÅÏ¢¡±¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¹«¹²Æû³µ½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬¹«¹²Æû³µ¼¯ÍŵÄIT»ù´¡ÉèÊ©²¢Î´Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬²¢½«¼ÌÐøÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÉÐδ͸¶Óйش˴ÎÍøÂç¹¥»÷µÄÈÎºÎÆäËûÐÅÏ¢¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Ö»¹Ü8BaseÀÕË÷Èí¼þ×éÖ¯ÔÚÍøÕ¾ÉÏÐû²¼Á˹«¹²Æû³µµÄÊê½ðÏÞÆÚÒѵ½£¬£¬£¬£¬£¬£¬µ«ºÚ¿ÍËÆºõ²¢Î´¹ûÕæÈκα»µÁÐÅÏ¢¡£¡£¡£¡£8Base×Ô2023ÄêÍ·¾ÍÒѱ£´æ£¬£¬£¬£¬£¬£¬Æù½ñΪֹÒÑÐû²¼ÁË400¶àÃûÊܺ¦ÕßµÄÃû×Ö¡£¡£¡£¡£ÍøÂç·¸·¨·Ö×ÓÒ»µ©»ñµÃÄ¿µÄ×é֯ϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬¾Í»áÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÏòÊܺ¦ÕßʩѹÒÔÖ§¸¶Êê½ð¡£¡£¡£¡£


https://www.securityweek.com/volkswagen-says-it-infrastructure-not-affected-after-ransomware-gang-claims-data-theft/


5. Google PlayÉÏÁè¼Ý200¸ö¶ñÒâÓ¦ÓÃÏÂÔØÁ¿½ü800Íò


10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ZscalerµÄÍþвÇ鱨Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ÔÚ2023Äê6ÔÂÖÁ2024Äê4ÔÂʱ´ú£¬£¬£¬£¬£¬£¬Android¹Ù·½ÊÐËÁGoogle Play·Ö·¢ÁËÁè¼Ý200¸ö¶ñÒâÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿¿¿½ü800Íò´Î¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üÀ¨ÐÅÏ¢ÇÔÈ¡ÕßJoker¡¢¹ã¸æÈí¼þ¡¢FacebookÕÊ»§Æ¾Ö¤ÇÔÈ¡³ÌÐòFacestealer¡¢ÐÅÏ¢ÇÔÈ¡ºÍ¶ÌÐÅ×èµ²³ÌÐòCoperµÈ¡£¡£¡£¡£Ö»¹Ü¹È¸èÓµÓмì²â¶ñÒâÓ¦ÓóÌÐòµÄÇå¾²»úÖÆ£¬£¬£¬£¬£¬£¬µ«ÍþвÐÐΪÕßÈÔʹÓÃһЩ¼¼ÇÉÈÆ¹ýÑéÖ¤Àú³Ì¡£¡£¡£¡£ZscalerµÄ±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬½üÒ»°ë¶ñÒâÓ¦ÓóÌÐòÊÇÔÚGoogle PlayµÄ¹¤¾ß¡¢¸öÐÔ»¯¡¢ÉãÓ°¡¢Éú²úÁ¦ºÍÉúÑÄ·½·¨ÖÖ±ðÏÂÐû²¼µÄ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬È¥ÄêGoogle PlayÉÏÒ²·ºÆðÁËÆäËû¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÈçNecro¡¢GoldosonºÍSpyLoanµÈ£¬£¬£¬£¬£¬£¬ËüÃǵÄÏÂÔØÁ¿»®·ÖµÖ´ï1100Íò´Î¡¢1ÒڴκÍÁè¼Ý1200Íò´Î¡£¡£¡£¡£±¨¸æ»¹ÏÔʾ£¬£¬£¬£¬£¬£¬ÊÜÒÆ¶¯¶ñÒâÈí¼þ¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÓ¡¶ÈºÍÃÀ¹ú£¬£¬£¬£¬£¬£¬½ÌÓýÐÐÒµ³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ¡£¡£¡£¡£ÎªÁËïÔÌ­±»Google Play¶ñÒâÈí¼þѬȾµÄʱ»ú£¬£¬£¬£¬£¬£¬½¨ÒéÓû§ÔĶÁ̸ÂÛ¡¢¼ì²éÓ¦ÓóÌÐòÐû²¼ÕßÒÔ¼°×°ÖÃʱÇëÇóµÄȨÏÞ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-200-malicious-apps-on-google-play-downloaded-millions-of-times/


6. WordPress Jetpack ²å¼þÑÏÖØÎó²îÓ°Ïì2700Íò¸öÍøÕ¾


10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬WordPress Jetpack²å¼þ¿ËÈÕÐû²¼ÁËÒ»ÏîÒªº¦¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÒ»¸ö×Ô2016ÄêÒÔÀ´Ò»Ö±±£´æµÄÑÏÖØÎó²î¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ²å¼þµÄÁªÏµ±íµ¥¹¦Ð§ÖУ¬£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐíÈκεÇÂ¼ÍøÕ¾µÄÓû§Éó²éÍ³Ò»ÍøÕ¾ÉÏÆäËûÈËÌá½»µÄ±íµ¥¡£¡£¡£¡£JetpackÊÇÒ»¿îÊ¢ÐеÄWordPress²å¼þ£¬£¬£¬£¬£¬£¬ÓÉWordPress.com±³ºóµÄ¹«Ë¾Automattic¿ª·¢£¬£¬£¬£¬£¬£¬ÌṩÁËһϵÁй¦Ð§À´ÔöÇ¿ÍøÕ¾µÄ¹¦Ð§¡¢Çå¾²ÐÔºÍÐÔÄÜ£¬£¬£¬£¬£¬£¬ÏÖÔÚÒѱ»2700Íò¸öWordPressÍøÕ¾Ê¹Óᣡ£¡£¡£ËäȻά»¤Ö°Ô±²¢Î´·¢Ã÷¸ÃÎó²îÒѱ»Ò°Íâ¹¥»÷ʹÓõÄÖ¤¾Ý£¬£¬£¬£¬£¬£¬µ«ÈÔ±Þ²ßÓû§¾¡¿ì¸üÐÂÖÁ×îа汾13.9.1£¬£¬£¬£¬£¬£¬ÒÔÈ·±£ÍøÕ¾µÄÇå¾²¡£¡£¡£¡£´ó´ó¶¼ÍøÕ¾ÒѾ­»ò¼´½«×Ô¶¯¸üÐÂÖÁ×îа汾¡£¡£¡£¡£JetpackÍŶӶԴ˴θøÓû§´øÀ´µÄδ±ãÌåÏÖǸÒ⣬£¬£¬£¬£¬£¬²¢ÔÊÐí½«¼ÌÐø°´ÆÚÉóºË´úÂë¿â£¬£¬£¬£¬£¬£¬È·±£Óû§ÍøÕ¾µÄÇå¾²¡£¡£¡£¡£


https://securityaffairs.com/169848/uncategorized/wordpress-jetpack-plugin-critical-flaw.html