Central TicketsÈ·ÈÏÊý¾Ýй¶£¬£¬£¬ºÚ¿Íй¶100ÍòÓû§Êý¾Ý
Ðû²¼Ê±¼ä 2024-10-1610ÔÂ14ÈÕ£¬£¬£¬Â׶صÄÕÛ¿Û¾çԺƱÎñƽ̨Central Tickets½üÆÚÔâÓöÁËÒ»´ÎÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬²¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅÏ¢±»µÁ£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈ¡£¡£¡£¡£¡£¡£¡£Ö»¹Üй¶±¬·¢ÔÚ7ÔÂ1ÈÕ£¬£¬£¬µ«¹«Ë¾Ö±µ½9Ô²ÅÒâʶµ½´ËÊ£¬£¬£¬ÆäʱÂ׶ؾ¯Ô±ÌüÔÚ°µÍøÉÏ·¢Ã÷Á˹ØÓÚ±»µÁÊý¾ÝµÄÌÖÂÛ¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍÓÖÃû0xy0um0m£¬£¬£¬ÓÚ7ÔÂ2ÈÕ»á¼ûÁËCentral TicketsµÄϵͳ£¬£¬£¬²¢ÊÔͼÒÔ3000ÃÀÔªµÄ¼ÛÇ®³öÊÛÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Central TicketsÈ·ÈÏÈëÇÖÓ°ÏìÁËÓÃÓÚ²âÊÔµÄÔÝʱÊý¾Ý¿â£¬£¬£¬¸ÃÊý¾Ý¿âËäÓëÖ÷ϵͳ¸ôÀ룬£¬£¬µ«°üÀ¨Óû§Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¹«Ë¾Ëæºóƾ֤GDPR»®¶¨ÏòÐÅϢרԱ°ì¹«ÊÒ±¨¸æ£¬£¬£¬²¢Á¬Ã¦Ëø¶¨ÁËÊÜѬȾµÄÊý¾Ý¿â£¬£¬£¬Ç¿ÖÆÓû§ÖØÖÃÃÜÂ룬£¬£¬²¢Õö¿ªÊӲ졣¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìÓû§ÊýĿδÅû¶£¬£¬£¬µ«¹«Ë¾ÖÒÑÔÓû§¿ÉÄÜÒ×ÊÜÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬²¢±Þ²ßËûÃǼá³ÖСÐÄ¡£¡£¡£¡£¡£¡£¡£Hackread.com×·×ÙÁ˺ڿͻ£¬£¬£¬²¢Ö¸³öºÚ¿ÍÔÚBreach ForumsÉÏй¶ÁË100Íò¿Í»§µÄÊý¾ÝºÍÄÚ²¿ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£×¨¼ÒÆ·ÆÀCentral TicketsÔÚ·¢Ã÷ÈëÇÖÊÂÎñ·½Ãæ±£´æÑÓ³Ù£¬£¬£¬±Þ²ßÆóҵȷ±£Óв½·¥ÊµÊ±¼ì²âºÍÓ¦¶ÔÍøÂçÊÂÎñ¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/central-tickets-data-breach-hacker-leaks-user-data/
2. ʹÓÃÕýµ±ÊðÃûÖ¤ÊéµÄHijack Loader¼°XWorm¶ñÒâÈí¼þ»î¶¯ÆØ¹â
10ÔÂ15ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Õ¹ÏÖÁËеĶñÒâÈí¼þ»î¶¯£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÕýÏÖ´úÂëÊðÃûÖ¤ÊéÊðÃûµÄHijack Loader¹¤¼þ¡£¡£¡£¡£¡£¡£¡£·¨¹úÍøÂçÇå¾²¹«Ë¾HarfangLabÓÚ±¾Ô³õ¼à²âµ½ÕâÒ»Ö¼ÔÚ°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòLummaµÄ¹¥»÷Á´¡£¡£¡£¡£¡£¡£¡£Hijack Loader£¨ÓÖ³ÆDOILoader¡¢IDAT LoaderºÍSHADOWLADDER£©×Ô2023Äê9ÔÂÊ×´ÎÆØ¹â£¬£¬£¬Í¨³£Í¨¹ýÓÕÆÓû§ÏÂÔØ´øÓÐÏÝÚåµÄ¶þ½øÖÆÎļþʵÑé¹¥»÷¡£¡£¡£¡£¡£¡£¡£½üÆÚ±äÖÖ½«Óû§µ¼ÏòÐéαCAPTCHAÒ³Ãæ£¬£¬£¬ÒªÇó¸´ÖƺÍÔËÐÐPowerShellÏÂÁîÒÔÊͷŶñÒâ¸ºÔØ¡£¡£¡£¡£¡£¡£¡£HarfangLabÊӲ쵽Èý¸ö²î±ð°æ±¾µÄPowerShell¾ç±¾£¬£¬£¬Éæ¼°mshta.exe¡¢Invoke-ExpressionºÍmsiexec.exeÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£¡£¡£ZIP´æµµ°üÀ¨Ò×ÊÜDLL²à¼ÓÔØÓ°ÏìµÄ¿ÉÖ´ÐÐÎļþºÍ¶ñÒâDLL£¬£¬£¬ÓÃÓÚ½âÃܲ¢Ö´ÐмÓÃÜÎļþ¡£¡£¡£¡£¡£¡£¡£ÎªÌӱܼì²â£¬£¬£¬´«ËÍ»úÖÆÒÑ´ÓDLL²à¼ÓÔØ×ª±äΪʹÓöà¸öÊðÃû¶þ½øÖÆÎļþ£¬£¬£¬µ«Ö¤ÊéÏÖÒѱ»×÷·Ï¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬´úÂëÊðÃû×Ô¼º²»¿É×÷Ϊ¿ÉÐŶȻù×¼¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬SonicWall Capture LabsÖÒÑԳƣ¬£¬£¬CoreWarrior¶ñÒâÈí¼þѬȾWindows»úеµÄÍøÂç¹¥»÷ÊýÄ¿¼¤Ôö£¬£¬£¬¶øÍøÂç´¹ÂڻҲͨ¹ýWindows¾ç±¾ÎļþÈö²¥XWorm¶ñÒâÈí¼þ£¬£¬£¬¸Ã¶ñÒâÈí¼þ¹¦Ð§ÆÕ±é¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html
3. ¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹ÝÔâÍøÂç¹¥»÷±»ÆÈÏÞÖÆÐ§ÀÍ
10ÔÂ16ÈÕ£¬£¬£¬¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹Ý½üÆÚÒòÔâÊÜÍøÂç¹¥»÷¶ø±»ÆÈÏÞÖÆÐ§ÀÍ£¬£¬£¬Ó°ÏìÁ˸ÃÊÐ130ÍòסÃñ¡£¡£¡£¡£¡£¡£¡£¸ÃͼÊé¹ÝϵͳӵÓÐ22¸ö·ÖÖ§»ú¹¹£¬£¬£¬ÓÚÖÜÎåÊ״ιûÕæÖÒÑÔ³ÆÔâÓöÁË¡°ÍøÂçÇå¾²Îó²î¡±£¬£¬£¬µ¼Ö²¿·ÖϵͳÊܵ½Íþв¡£¡£¡£¡£¡£¡£¡£Í¼Êé¹ÝËæ¼´¹Ø±ÕËùÓÐЧÀÍÆ÷ºÍÅÌËã»ú£¬£¬£¬²¢ÓÚÖÜÎåÌáǰ±Õ¹Ý¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÖÜÈý¸÷ËùÔÚ»Ö¸´ÁËÕý³£¿£¿£¿£¿£¿ª·Åʱ¼ä£¬£¬£¬µ«Ð§ÀÍÒѾÙÐе÷½â£¬£¬£¬¿Í»§½öÄÜʹÓ÷ÇÊÖÒÕÊֶεÄͼÊé¹Ý¿Õ¼äºÍЧÀÍ¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÍøÂç¹¥»÷£¬£¬£¬Í¼Êé¹ÝÕýÂÄÀúÑÏÖØµÄЧÀÍÖÐÖ¹£¬£¬£¬°üÀ¨Í¼ÊéËÍ»¹Ð§ÀÍ¡¢ÊÖÒÕºÍÊý×ÖЧÀÍ£¨ÈçÅÌËãʱ»ú¼û¡¢´òÓ¡¡¢WiFiµÈ£©ÒÔ¼°Êý×ÖͼÊé¹ÝºÍµç×Ó×ÊÔ´¹¤¾ß¾ù²»¿ÉÓᣡ£¡£¡£¡£¡£¡£Í¼Êé¹Ýδ͸¶»Ö¸´Õý³£Ð§À͵Äʱ¼ä£¬£¬£¬µ«ÌåÏÖÏ£Íû¾¡¿ì»Ö¸´¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬¼¸ÏîÏÈǰ°²ÅŵĻÈÔ½«¼ÌÐø¾ÙÐС£¡£¡£¡£¡£¡£¡£½üÄêÀ´£¬£¬£¬Í¼Êé¹ÝÒòÌṩÖ÷ҪЧÀͶø³ÉΪÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷Ä¿µÄ£¬£¬£¬¼ÓÄôó¶à¸öÖ÷Òª¶¼»áµÄͼÊé¹ÝϵͳҲÔâÊÜÁËÀàËÆ¹¥»÷£¬£¬£¬µ¼ÖÂЧÀÍÊܵ½ÑÏÖØÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/calgary-public-library-limits-services
4. ¹«¹²Æû³µ¼¯ÍÅÔâ8BaseÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬Éù³ÆÇÔÈ¡´ó×ÚÉñÃØÐÅÏ¢
10ÔÂ15ÈÕ£¬£¬£¬¹«¹²Æû³µ¼¯ÍŽüÆÚ½ÒÏþÉùÃ÷»ØÓ¦ÁËÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬Ò»¸öÃûΪ8BaseµÄÀÕË÷Èí¼þ×éÖ¯Éù³ÆÒÑ´Ó¸ÃÆû³µÖÆÔìÉ̵ÄϵͳÖÐÇÔÈ¡Á˰üÀ¨·¢Æ±¡¢ÊÕÌõ¡¢»á¼ÆÎļþ¡¢Ð¡ÎÒ˽¼ÒÊý¾Ý¡¢Ö¤Êé¡¢¹ÍÓ¶ÌõÔ¼¡¢ÈËʵµ°¸µÈÔÚÄڵġ°´ó×ÚÉñÃØÐÅÏ¢¡±¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬¹«¹²Æû³µ½²»°ÈËÌåÏÖ£¬£¬£¬¹«¹²Æû³µ¼¯ÍŵÄIT»ù´¡ÉèÊ©²¢Î´Êܵ½Ó°Ï죬£¬£¬²¢½«¼ÌÐøÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸Ã¹«Ë¾ÉÐδ͸¶Óйش˴ÎÍøÂç¹¥»÷µÄÈÎºÎÆäËûÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Ö»¹Ü8BaseÀÕË÷Èí¼þ×éÖ¯ÔÚÍøÕ¾ÉÏÐû²¼Á˹«¹²Æû³µµÄÊê½ðÏÞÆÚÒѵ½£¬£¬£¬µ«ºÚ¿ÍËÆºõ²¢Î´¹ûÕæÈκα»µÁÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£8Base×Ô2023ÄêÍ·¾ÍÒѱ£´æ£¬£¬£¬Æù½ñΪֹÒÑÐû²¼ÁË400¶àÃûÊܺ¦ÕßµÄÃû×Ö¡£¡£¡£¡£¡£¡£¡£ÍøÂç·¸·¨·Ö×ÓÒ»µ©»ñµÃÄ¿µÄ×é֯ϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬¾Í»áÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÏòÊܺ¦ÕßʩѹÒÔÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/volkswagen-says-it-infrastructure-not-affected-after-ransomware-gang-claims-data-theft/
5. Google PlayÉÏÁè¼Ý200¸ö¶ñÒâÓ¦ÓÃÏÂÔØÁ¿½ü800Íò
10ÔÂ15ÈÕ£¬£¬£¬ZscalerµÄÍþвÇ鱨Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬ÔÚ2023Äê6ÔÂÖÁ2024Äê4ÔÂʱ´ú£¬£¬£¬Android¹Ù·½ÊÐËÁGoogle Play·Ö·¢ÁËÁè¼Ý200¸ö¶ñÒâÓ¦ÓóÌÐò£¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿¿¿½ü800Íò´Î¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üÀ¨ÐÅÏ¢ÇÔÈ¡ÕßJoker¡¢¹ã¸æÈí¼þ¡¢FacebookÕÊ»§Æ¾Ö¤ÇÔÈ¡³ÌÐòFacestealer¡¢ÐÅÏ¢ÇÔÈ¡ºÍ¶ÌÐÅ×èµ²³ÌÐòCoperµÈ¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹È¸èÓµÓмì²â¶ñÒâÓ¦ÓóÌÐòµÄÇå¾²»úÖÆ£¬£¬£¬µ«ÍþвÐÐΪÕßÈÔʹÓÃһЩ¼¼ÇÉÈÆ¹ýÑéÖ¤Àú³Ì¡£¡£¡£¡£¡£¡£¡£ZscalerµÄ±¨¸æÖ¸³ö£¬£¬£¬½üÒ»°ë¶ñÒâÓ¦ÓóÌÐòÊÇÔÚGoogle PlayµÄ¹¤¾ß¡¢¸öÐÔ»¯¡¢ÉãÓ°¡¢Éú²úÁ¦ºÍÉúÑÄ·½·¨ÖÖ±ðÏÂÐû²¼µÄ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬È¥ÄêGoogle PlayÉÏÒ²·ºÆðÁËÆäËû¶ñÒâÈí¼þ£¬£¬£¬ÈçNecro¡¢GoldosonºÍSpyLoanµÈ£¬£¬£¬ËüÃǵÄÏÂÔØÁ¿»®·ÖµÖ´ï1100Íò´Î¡¢1ÒڴκÍÁè¼Ý1200Íò´Î¡£¡£¡£¡£¡£¡£¡£±¨¸æ»¹ÏÔʾ£¬£¬£¬ÊÜÒÆ¶¯¶ñÒâÈí¼þ¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÓ¡¶ÈºÍÃÀ¹ú£¬£¬£¬½ÌÓýÐÐÒµ³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¡£ÎªÁËïÔ̱»Google Play¶ñÒâÈí¼þѬȾµÄʱ»ú£¬£¬£¬½¨ÒéÓû§ÔĶÁ̸ÂÛ¡¢¼ì²éÓ¦ÓóÌÐòÐû²¼ÕßÒÔ¼°×°ÖÃʱÇëÇóµÄȨÏÞ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-200-malicious-apps-on-google-play-downloaded-millions-of-times/
6. WordPress Jetpack ²å¼þÑÏÖØÎó²îÓ°Ïì2700Íò¸öÍøÕ¾
10ÔÂ15ÈÕ£¬£¬£¬WordPress Jetpack²å¼þ¿ËÈÕÐû²¼ÁËÒ»ÏîÒªº¦¸üУ¬£¬£¬ÐÞ¸´ÁËÒ»¸ö×Ô2016ÄêÒÔÀ´Ò»Ö±±£´æµÄÑÏÖØÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ²å¼þµÄÁªÏµ±íµ¥¹¦Ð§ÖУ¬£¬£¬¿ÉÄÜÔÊÐíÈκεÇÂ¼ÍøÕ¾µÄÓû§Éó²éÍ³Ò»ÍøÕ¾ÉÏÆäËûÈËÌá½»µÄ±íµ¥¡£¡£¡£¡£¡£¡£¡£JetpackÊÇÒ»¿îÊ¢ÐеÄWordPress²å¼þ£¬£¬£¬ÓÉWordPress.com±³ºóµÄ¹«Ë¾Automattic¿ª·¢£¬£¬£¬ÌṩÁËһϵÁй¦Ð§À´ÔöÇ¿ÍøÕ¾µÄ¹¦Ð§¡¢Çå¾²ÐÔºÍÐÔÄÜ£¬£¬£¬ÏÖÔÚÒѱ»2700Íò¸öWordPressÍøÕ¾Ê¹Óᣡ£¡£¡£¡£¡£¡£ËäȻά»¤Ö°Ô±²¢Î´·¢Ã÷¸ÃÎó²îÒѱ»Ò°Íâ¹¥»÷ʹÓõÄÖ¤¾Ý£¬£¬£¬µ«ÈÔ±Þ²ßÓû§¾¡¿ì¸üÐÂÖÁ×îа汾13.9.1£¬£¬£¬ÒÔÈ·±£ÍøÕ¾µÄÇå¾²¡£¡£¡£¡£¡£¡£¡£´ó´ó¶¼ÍøÕ¾ÒѾ»ò¼´½«×Ô¶¯¸üÐÂÖÁ×îа汾¡£¡£¡£¡£¡£¡£¡£JetpackÍŶӶԴ˴θøÓû§´øÀ´µÄδ±ãÌåÏÖǸÒ⣬£¬£¬²¢ÔÊÐí½«¼ÌÐø°´ÆÚÉóºË´úÂë¿â£¬£¬£¬È·±£Óû§ÍøÕ¾µÄÇå¾²¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/169848/uncategorized/wordpress-jetpack-plugin-critical-flaw.html


¾©¹«Íø°²±¸11010802024551ºÅ