Central TicketsÈ·ÈÏÊý¾Ýй¶ £¬ºÚ¿Íй¶100ÍòÓû§Êý¾Ý

Ðû²¼Ê±¼ä 2024-10-16
1. Central TicketsÈ·ÈÏÊý¾Ýй¶ £¬ºÚ¿Íй¶100ÍòÓû§Êý¾Ý


10ÔÂ14ÈÕ £¬Â׶صÄÕÛ¿Û¾çԺƱÎñƽ̨Central Tickets½üÆÚÔâÓöÁËÒ»´ÎÖØ´óÊý¾Ýй¶Ê¼þ £¬²¿ÃÅÓû§µÄ¸öÈËÐÅÏ¢±»µÁ £¬°üÂÞÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈ¡£¾¡¹Üй¶·¢ÉúÔÚ7ÔÂ1ÈÕ £¬µ«¹«Ë¾Ö±µ½9Ô²ÅÒâʶµ½´ËÊ £¬ÆäʱÂ׶ؾ¯²ìÌüÔÚ°µÍøÉÏ·¢ÏÖÁ˹ØÓÚ±»µÁÊý¾ÝµÄÌÖÂÛ¡£ºÚ¿Í±ðÃû0xy0um0m £¬ÓÚ7ÔÂ2ÈÕ·ÃÎÊÁËCentral TicketsµÄϵͳ £¬²¢ÊÔͼÒÔ3000ÃÀÔªµÄ¼Û¸ñ³öÊÛÊý¾Ý¡£Central TicketsÈ·ÈÏÈëÇÖÓ°ÏìÁËÓÃÓÚ²âÊÔµÄÁÙʱÊý¾Ý¿â £¬¸ÃÊý¾Ý¿âËäÓëÖ÷ϵͳ¸ôÀë £¬µ«°üÂÞÓû§Ãô¸ÐÐÅÏ¢¡£¹«Ë¾Ëæºóƾ¾ÝGDPR¹æ¶¨ÏòÐÅϢרԱ°ì¹«ÊÒ³ÂËß £¬²¢Á¢¼´Ëø¶¨ÁËÊÜѬȾµÄÊý¾Ý¿â £¬Ç¿ÖÆÓû§ÖØÖÃÃÜÂë £¬²¢Õ¹¿ªÊӲ졣ÊÜÓ°ÏìÓû§ÊýÁ¿Î´Åû¶ £¬µ«¹«Ë¾¾¯¸æÓû§¿ÉÄÜÒ×ÊÜÍøÂçµöÓã¹¥»÷ £¬²¢¶Ø´ÙËûÃDZ£³Ö¾¯Ìè¡£Hackread.com×·×ÙÁ˺ڿͻ £¬²¢Ö¸³öºÚ¿ÍÔÚBreach ForumsÉÏй¶ÁË100Íò¿Í»§µÄÊý¾ÝºÍÄÚ²¿ÐÅÏ¢¡£×¨¼ÒÅúÆÀCentral TicketsÔÚ·¢ÏÖÈëÇÖʼþ·½Ãæ´æÔÚÑÓ³Ù £¬¶Ø´ÙÆóҵȷ±£ÓдëÊ©¼°Ê±¼ì²âºÍÓ¦¶ÔÍøÂçʼþ¡£


https://hackread.com/central-tickets-data-breach-hacker-leaks-user-data/


2. ÀûÓúϷ¨Ç©ÃûÖ¤ÊéµÄHijack Loader¼°XWorm¶ñÒâÈí¼þ»î¶¯Æعâ


10ÔÂ15ÈÕ £¬ÍøÂçÄþ¾²Ñо¿ÈËÔ±½ÒʾÁËеĶñÒâÈí¼þ»î¶¯ £¬¸Ã»î¶¯ÀûÓúϷ¨´úÂëÇ©ÃûÖ¤ÊéÇ©ÃûµÄHijack Loader¹¤¼þ¡£·¨¹úÍøÂçÄþ¾²¹«Ë¾HarfangLabÓÚ±¾Ô³õ¼à²âµ½ÕâÒ»Ö¼ÔÚ²¿ÊðÐÅÏ¢ÇÔÈ¡·¨Ê½LummaµÄ¹¥»÷Á´¡£Hijack Loader£¨ÓÖ³ÆDOILoader¡¢IDAT LoaderºÍSHADOWLADDER£©×Ô2023Äê9ÔÂÊ×´ÎÆعâ £¬Í¨³£Í¨¹ýÓÕÆ­Óû§ÏÂÔØ´øÓÐÏÝÚåµÄ¶þ½øÖÆÎļþʵʩ¹¥»÷¡£½üÆÚ±äÖÖ½«Óû§µ¼ÏòÐé¼ÙCAPTCHAÒ³Ãæ £¬ÒªÇó¸´ÖƺÍÔËÐÐPowerShellÃüÁîÒÔÊͷŶñÒ⸺ÔØ¡£HarfangLabÊӲ쵽Èý¸ö²îÒì°æ±¾µÄPowerShell½Å±¾ £¬Éæ¼°mshta.exe¡¢Invoke-ExpressionºÍmsiexec.exeÖ´ÐÐÔ¶³Ì´úÂë¡£ZIP´æµµ°üÂÞÒ×ÊÜDLL²à¼ÓÔØÓ°ÏìµÄ¿ÉÖ´ÐÐÎļþºÍ¶ñÒâDLL £¬ÓÃÓÚ½âÃܲ¢Ö´ÐмÓÃÜÎļþ¡£ÎªÌӱܼì²â £¬´«ËÍ»úÖÆÒÑ´ÓDLL²à¼ÓÔØת±äΪʹÓöà¸öÇ©Ãû¶þ½øÖÆÎļþ £¬µ«Ö¤ÊéÏÖÒѱ»È¡Ïû¡£³ÂËßÖ¸³ö £¬´úÂëÇ©Ãû×Ô¼º²»ÄÜ×÷Ϊ¿ÉÐŶȻù×¼¡£´ËÍâ £¬SonicWall Capture Labs¾¯¸æ³Æ £¬CoreWarrior¶ñÒâÈí¼þѬȾWindows»úÆ÷µÄÍøÂç¹¥»÷ÊýÁ¿¼¤Ôö £¬¶øÍøÂçµöÓã»î¶¯Ò²Í¨¹ýWindows½Å±¾ÎļþÁ÷´«XWorm¶ñÒâÈí¼þ £¬¸Ã¶ñÒâÈí¼þ¹¦Ð§¹ã·º¡£

https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html


3. ¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹ÝÔâÍøÂç¹¥»÷±»ÆÈÏÞÖÆ·þÎñ


10ÔÂ16ÈÕ £¬¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹Ý½üÆÚÒòÔâÊÜÍøÂç¹¥»÷¶ø±»ÆÈÏÞÖÆ·þÎñ £¬Ó°ÏìÁ˸ÃÊÐ130Íò¾ÓÃñ¡£¸ÃͼÊé¹ÝϵͳӵÓÐ22¸ö·ÖÖ§»ú¹¹ £¬ÓÚÖÜÎåÊ״ιûÈ»¾¯¸æ³ÆÔâÓöÁË¡°ÍøÂçÄþ¾²Â©¶´¡± £¬µ¼Ö²¿ÃÅϵͳÊܵ½Íþв¡£Í¼Êé¹ÝËæ¼´¹Ø±ÕËùÓзþÎñÆ÷ºÍ¼ÆËã»ú £¬²¢ÓÚÖÜÎåÌáÇ°±Õ¹Ý¡£¾¡¹ÜÖÜÈý¸÷ËùÔÚ»Ö¸´ÁËÕý³£¿ª·Åʱ¼ä £¬µ«·þÎñÒѽøÐе÷Õû £¬¿Í»§½öÄÜʹÓ÷Ǽ¼ÊõÊֶεÄͼÊé¹Ý¿Õ¼äºÍ·þÎñ¡£ÓÉÓÚÍøÂç¹¥»÷ £¬Í¼Êé¹ÝÕý¾­ÀúÑÏÖصķþÎñÖÐ¶Ï £¬°üÂÞͼÊé¹é»¹·þÎñ¡¢¼¼ÊõºÍÊý×Ö·þÎñ£¨Èç¼ÆËã»ú·ÃÎÊ¡¢´òÓ¡¡¢WiFiµÈ£©ÒÔ¼°Êý×ÖͼÊé¹ÝºÍµç×Ó×ÊÔ´¹¤¾ß¾ù²»ÐÐÓá£Í¼Êé¹Ýδ͸¶»Ö¸´Õý³£·þÎñµÄʱ¼ä £¬µ«ÌåÏÖÏ£Íû¾¡¿ì»Ö¸´¡£Í¬Ê± £¬¼¸ÏîÏÈÇ°²¿ÊðµÄ»î¶¯ÈÔ½«¼ÌÐø½øÐС£½üÄêÀ´ £¬Í¼Êé¹ÝÒòÌṩÖØÒª·þÎñ¶ø³ÉΪÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷Ä¿±ê £¬¼ÓÄôó¶à¸öÖ÷Òª¶¼ÊеÄͼÊé¹ÝϵͳҲÔâÊÜÁËÀàËƹ¥»÷ £¬µ¼Ö·þÎñÊܵ½ÑÏÖØÓ°Ïì¡£

https://therecord.media/calgary-public-library-limits-services


4. ¹«¹²Æû³µ¼¯ÍÅÔâ8BaseÀÕË÷Èí¼þ×éÖ¯¹¥»÷ £¬Éù³ÆÇÔÈ¡´óÁ¿»úÃÜÐÅÏ¢


10ÔÂ15ÈÕ £¬¹«¹²Æû³µ¼¯ÍŽüÆÚ·¢±íÉùÃ÷»ØÓ¦ÁËÒ»ÆðÍøÂç¹¥»÷ʼþ¡£¾ÝϤ £¬Ò»¸öÃûΪ8BaseµÄÀÕË÷Èí¼þ×éÖ¯Éù³ÆÒÑ´Ó¸ÃÆû³µÖÆÔìÉ̵ÄϵͳÖÐÇÔÈ¡ÁË°üÂÞ·¢Æ±¡¢Êվݡ¢»á¼ÆÎļþ¡¢¸öÈËÊý¾Ý¡¢Ö¤Êé¡¢¹ÍÓ¶ºÏͬ¡¢ÈËʵµ°¸µÈÔÚÄڵġ°´óÁ¿»úÃÜÐÅÏ¢¡±¡£È»¶ø £¬¹«¹²Æû³µ·¢ÑÔÈËÌåÏÖ £¬¹«¹²Æû³µ¼¯ÍŵÄIT»ù´¡ÉèÊ©²¢Î´Êܵ½Ó°Ïì £¬²¢½«¼ÌÐøÃÜÇйØ×¢ÊÂ̬Éú³¤¡£Ä¿Ç° £¬¸Ã¹«Ë¾ÉÐδ͸¶Óйش˴ÎÍøÂç¹¥»÷µÄÈκÎÆäËûÐÅÏ¢¡£ÖµµÃ×¢ÒâµÄÊÇ £¬¾¡¹Ü8BaseÀÕË÷Èí¼þ×éÖ¯ÔÚÍøÕ¾ÉÏÐû²¼Á˹«¹²Æû³µµÄÊê½ðÆÚÏÞÒѵ½ £¬µ«ºÚ¿ÍËƺõ²¢Î´¹ûÈ»Èκα»µÁÐÅÏ¢¡£8Base×Ô2023Äê³õ¾ÍÒÑ´æÔÚ £¬Æù½ñΪֹÒÑÐû²¼ÁË400¶àÃûÊܺ¦ÕßµÄÃû×Ö¡£ÍøÂç·¸×ï·Ö×ÓÒ»µ©»ñµÃÄ¿±ê×é֯ϵͳµÄ·ÃÎÊȨÏÞ £¬¾Í»áÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÏòÊܺ¦ÕßʩѹÒÔÖ§¸¶Êê½ð¡£


https://www.securityweek.com/volkswagen-says-it-infrastructure-not-affected-after-ransomware-gang-claims-data-theft/


5. Google PlayÉÏÁè¼Ý200¸ö¶ñÒâÓ¦ÓÃÏÂÔØÁ¿½ü800Íò


10ÔÂ15ÈÕ £¬ZscalerµÄÍþвÇ鱨Ñо¿ÈËÔ±·¢ÏÖ £¬ÔÚ2023Äê6ÔÂÖÁ2024Äê4ÔÂÆÚ¼ä £¬Android¹Ù·½É̵êGoogle Play·Ö·¢ÁËÁè¼Ý200¸ö¶ñÒâÓ¦Ó÷¨Ê½ £¬ÀÛ¼ÆÏÂÔØÁ¿½Ó½ü800Íò´Î¡£ÕâЩ¶ñÒâÈí¼þ°üÂÞÐÅÏ¢ÇÔÈ¡ÕßJoker¡¢¹ã¸æÈí¼þ¡¢FacebookÕÊ»§Æ¾Ö¤ÇÔÈ¡·¨Ê½Facestealer¡¢ÐÅÏ¢ÇÔÈ¡ºÍ¶ÌÐÅÀ¹½Ø·¨Ê½CoperµÈ¡£¾¡¹Ü¹È¸èÓµÓмì²â¶ñÒâÓ¦Ó÷¨Ê½µÄÄþ¾²»úÖÆ £¬µ«ÍþвÐÐΪÕßÈÔʹÓÃһЩ¼¼ÇÉÈƹýÑéÖ¤¹ý³Ì¡£ZscalerµÄ³ÂËßÖ¸³ö £¬½üÒ»°ë¶ñÒâÓ¦Ó÷¨Ê½ÊÇÔÚGoogle PlayµÄ¹¤¾ß¡¢¸öÐÔ»¯¡¢ÉãÓ°¡¢Éú²úÁ¦ºÍÉú»î·½Ê½Àà±ðÏÂÐû²¼µÄ¡£´ËÍâ £¬È¥ÄêGoogle PlayÉÏÒ²·ºÆðÁËÆäËû¶ñÒâÈí¼þ £¬ÈçNecro¡¢GoldosonºÍSpyLoanµÈ £¬ËüÃǵÄÏÂÔØÁ¿·Ö±ðµ½´ï1100Íò´Î¡¢1ÒڴκÍÁè¼Ý1200Íò´Î¡£³ÂËß»¹ÏÔʾ £¬ÊÜÒƶ¯¶ñÒâÈí¼þ¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÓ¡¶ÈºÍÃÀ¹ú £¬½ÌÓýÐÐÒµ³ÉΪÖ÷Òª¹¥»÷Ä¿±ê¡£ÎªÁ˼õÉÙ±»Google Play¶ñÒâÈí¼þѬȾµÄ»ú»á £¬½¨ÒéÓû§ÔĶÁÆÀÂÛ¡¢¼ì²éÓ¦Ó÷¨Ê½Ðû²¼ÕßÒÔ¼°°²×°Ê±ÇëÇóµÄȨÏÞ¡£


https://www.bleepingcomputer.com/news/security/over-200-malicious-apps-on-google-play-downloaded-millions-of-times/


6. WordPress Jetpack ²å¼þÑÏÖØ©¶´Ó°Ïì2700Íò¸öÍøÕ¾


10ÔÂ15ÈÕ £¬WordPress Jetpack²å¼þ½üÈÕÐû²¼ÁËÒ»ÏîÒªº¦¸üР£¬ÐÞ¸´ÁËÒ»¸ö×Ô2016ÄêÒÔÀ´Ò»Ö±´æÔÚµÄÑÏÖØ©¶´¡£¸Ã©¶´´æÔÚÓÚ²å¼þµÄÁªÏµ±íµ¥¹¦Ð§ÖÐ £¬¿ÉÄÜÔÊÐíÈκεǼÍøÕ¾µÄÓû§¼ì²ìͬһÍøÕ¾ÉÏÆäËûÈËÌá½»µÄ±íµ¥¡£JetpackÊÇÒ»¿îÁ÷ÐеÄWordPress²å¼þ £¬ÓÉWordPress.com±³ºóµÄ¹«Ë¾Automattic¿ª·¢ £¬ÌṩÁËһϵÁй¦Ð§À´ÔöÇ¿ÍøÕ¾µÄ¹¦Ð§¡¢Äþ¾²ÐÔºÍÐÔÄÜ £¬Ä¿Ç°Òѱ»2700Íò¸öWordPressÍøվʹÓá£ËäȻά»¤ÈËÔ±²¢Î´·¢Ïָ鶴Òѱ»Ò°Íâ¹¥»÷ÀûÓõÄÖ¤¾Ý £¬µ«ÈԶشÙÓû§¾¡¿ì¸üÐÂÖÁ×îа汾13.9.1 £¬ÒÔÈ·±£ÍøÕ¾µÄÄþ¾²¡£´ó¶àÊýÍøÕ¾ÒѾ­»ò¼´½«×Ô¶¯¸üÐÂÖÁ×îа汾¡£JetpackÍŶӶԴ˴θøÓû§´øÀ´µÄδ±ãÌåÏÖǸÒâ £¬²¢ÔÊÐí½«¼ÌÐø¶¨ÆÚÉóºË´úÂë¿â £¬È·±£Óû§ÍøÕ¾µÄÄþ¾²¡£


https://securityaffairs.com/169848/uncategorized/wordpress-jetpack-plugin-critical-flaw.html