NordPass³ÆÓÐÉÏÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶100ÒÚÌõ¼Í¼£»£»£»£»£»£» £»£»CISA¡¢DODºÍFBIÁªºÏÐû²¼Õë¶ÔÐÂÐͶñÒâÈí¼þTaidoor¾¯±¨

Ðû²¼Ê±¼ä 2020-08-04

1.NordPass³ÆÓÐÉÏÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶100ÒÚÌõ¼Í¼


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


NordPassÓÚ2019Äê6ÔÂÖÁ2020Äê6Ô£¬£¬£¬£¬£¬£¬£¬ÓëÄäÃû°×ñºÚ¿ÍÏàÖúɨÃèÍøÂçÉϵÄElasticsearchºÍMongoDB¿â£¬£¬£¬£¬£¬£¬£¬·¢Ã÷Á˽üÍò¸öÉèÖùýʧµÄÊý¾Ý¿âй¶ÁË105ÒÚÌõÀ´×Ô20¸ö¹ú¼ÒºÍµØÇøµÄÊý¾Ý¡£ ¡£¡£¡£¡£¾Ýͳ¼Æ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý×î¶àµÄÈý¸ö¹ú¼ÒÖУ¬£¬£¬£¬£¬£¬£¬·¨¹úÒÔ51ÒÚÌõλ¾Ó°ñÊ×£¬£¬£¬£¬£¬£¬£¬ÖйúÒÔ26ÒÚÌõ½ôËæØÊºó£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÒÔ23ÒÚÌõλ¾ÓµÚÈý¡£ ¡£¡£¡£¡£ÉèÖùýʧµÄÊý¾Ý¿âÊýÄ¿×î¶àµÄ¹ú¼ÒÖУ¬£¬£¬£¬£¬£¬£¬Öйúλ¾ÓµÚÒ»£¨4000¸ö£©£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÃÀ¹ú£¨3000£©ºÍÓ¡¶È£¨500£©¡£ ¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬£¬ÕâЩй¶Êý¾Ý¿âͨ³£°üÀ¨µç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬£¬ÃÜÂëºÍµç»°ºÅÂë¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/07/30/10-billion-records-exposed-unsecured-databases/


2.ºÚ¿ÍÔÚ°µÍø¹ûÕæ¼Ò×°ÍøÕ¾HavenlyµÄ130ÍòÓû§Êý¾Ý


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


ºÚ¿ÍÔÚ°µÍø¹ûÕæÃÀ¹úÊÒÄÚÉè¼ÆÍøÕ¾HavenlyµÄ130ÍòÓû§Êý¾Ý¡£ ¡£¡£¡£¡£´Ó¸ÃÊý¾Ý¿âµÄÑù±¾Öз¢Ã÷£¬£¬£¬£¬£¬£¬£¬×ß©Êý¾Ý°üÀ¨Óû§µÄµÇ¼Ãû¡¢È«Ãû¡¢MD5¹þÏ£ÃÜÂë¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÓÊÕþ±àÂëÒÔ¼°Óë¸ÃÕ¾µãµÄʹÓÃÓйصÄÖÖÖÖÆäËûÊý¾Ý£¬£¬£¬£¬£¬£¬£¬±ðµÄ£¬£¬£¬£¬£¬£¬£¬Óû§ÐÅÓÿ¨µÄ×îºóËÄλÊý¿ÉÄÜÒÑй¶¡£ ¡£¡£¡£¡£¾ÝBleepingComputer±¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯ShinyHuntersÒÑÔÚ°µÍøÉÏÃâ·Ñ¹ûÕæÁË18¼Ò¹«Ë¾µÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬×ܼưüÀ¨3.86ÒÚÌõÓû§¼Í¼£¬£¬£¬£¬£¬£¬£¬¶øHavenlyÒ²ÊÇÆäÖÐÖ®Ò»¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/havenly-discloses-data-breach-after-13m-accounts-leaked-online/


3.LedgerÊý¾Ý¿âÖб£´æÎó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§ÐÅϢй¶


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


LedgerÈ·ÈÏÆäµç×ÓÉÌÎñºÍÏúÊÛÊý¾Ý¿âµÄ±£´æÑÏÖØµÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§ÐÅϢй¶¡£ ¡£¡£¡£¡£7ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬ÆäÑо¿Ö°Ô±·¢Ã÷LedgerÍøÕ¾ÉÏ¿ÉÄܱ£´æÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬£¬£¬£¬²¢ÔÚ¾ÙÐÐÁËÄÚ²¿ÊÓ²ìºóÁ¬Ã¦ÐÞ¸´Á˸ÃÎó²î¡£ ¡£¡£¡£¡£ÐÞ¸´Îó²îºóÒ»ÖÜ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾·¢Ã÷Îó²îÔÚ6ÔÂ25ÈÕÒѱ»Ê¹Ó㬣¬£¬£¬£¬£¬£¬ºÚ¿Í»á¼ûÁËÆäµç×ÓÉÌÎñºÍÏúÊÛÊý¾Ý¿â¡£ ¡£¡£¡£¡£´Ë´ÎÊÂÎñ¿ÉÄܵ¼ÖÂÊý°ÙÍòÈ˵ç×ÓÓʼþµØµãµÈÐÅϢй¶£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°½üÍòÈËСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©Ð¹Â¶£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ãû×ÖºÍÐÕÊÏ¡¢ÓÊÕþµØµã¡¢µç»°ºÅÂëºÍ¶©¹ºµÄ²úÆ·µÈ¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/crypto-firm-ledgers-breach-one/


4.CISA¡¢DODºÍFBIÁªºÏÐû²¼Õë¶ÔÐÂÐͶñÒâÈí¼þTaidoor¾¯±¨


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


ÃÀ¹úÕþ¸®µÄÈý¸ö»ú¹¹CISA¡¢DODºÍFBIÁªºÏÐû²¼Á˹ØÓÚÐÂÐͶñÒâÈí¼þTaidooµÄ¾¯±¨¡£ ¡£¡£¡£¡£¾ÝÕâÈý¸ö»ú¹¹³Æ£¬£¬£¬£¬£¬£¬£¬´Ë¶ñÒâÈí¼þ¾ßÓÐ32λºÍ64λϵͳ°æ±¾£¬£¬£¬£¬£¬£¬£¬Í¨³£×÷ΪЧÀͶ¯Ì¬Á´½Ó¿â£¨DLL£©×°ÖÃÔÚÊܺ¦ÕßµÄϵͳÉÏ¡£ ¡£¡£¡£¡£¸ÃDLL°üÀ¨ÆäËûÁ½¸öÎļþ£¬£¬£¬£¬£¬£¬£¬ÆäÒ»ÊÇ×÷ΪЧÀÍÆô¶¯µÄ¼ÓÔØ³ÌÐò£¬£¬£¬£¬£¬£¬£¬»á½âÃܲ¢ÔÚÄÚ´æÖÐÖ´Ðеڶþ¸öÖ÷ÒªµÄÔ¶³Ì»á¼ûľÂí£¨RAT£©Îļþ¡£ ¡£¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ³£»£»£»£»£»£» £»£»á½«TaidoorÓëÊðÀíЧÀÍÆ÷Ò»Æð°²ÅÅ£¬£¬£¬£¬£¬£¬£¬ÒÔÒþ²Ø¶ñÆäÕæÊµÈªÔ´¡£ ¡£¡£¡£¡£DODÌåÏÖ£¬£¬£¬£¬£¬£¬£¬×Ô2008ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬£¬Taidoor»òÒÑÔÚÒ°ÍⱻʹÓÃÖÁÉÙ12Äê¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cisa-dod-fbi-expose-new-chinese-malware-strain-named-taidoor/#ftag=RSSbaffb68


5.ÐÂÌØ¹¤Èí¼þαװ³É×ãÇò¾ãÀÖ²¿µÄÓ¦ÓÃÕë¶ÔAndroidÓû§


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


Zscaler ThreatLabZÍŶӷ¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÐÂÌØ¹¤Èí¼þαװ³É×ãÇò¾ãÀÖ²¿µÄÓ¦ÓÃÕë¶ÔAndroidÓû§¡£ ¡£¡£¡£¡£ÆäÕë¶Ô·ÇÖÞÁ½¸ö×îÖøÃû×ãÇò¾ãÀÖ²¿²¢Î±×°³É¾ãÀÖ²¿µÄ¹Ù·½Ó¦ÓÃSimba SCºÍYanga£¨Young Africans£©SC¡£ ¡£¡£¡£¡£¾ßÓÐÔĶÁ¶ÌÐÅ¡¢»ñÈ¡ÁªÏµÈË¡¢Â¼ÖÆÒôƵ¡¢Í¨»°¹¦Ð§¡¢»á¼ûʵʱλÖᢶÁ/дÍⲿ´æ´¢¡¢ÍµÕÕÆ¬ºÍ´æÈ¡Ïà»úµÄ¹¦Ð§¡£ ¡£¡£¡£¡£¾­ÓɽøÒ»²½ÆÊÎö£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÕâЩAPKÊÇʹÓÃÊ¢ÐеÄÌØ¹¤Èí¼þ¹¤¾ßSpyMax¿ª·¢µÄ£¬£¬£¬£¬£¬£¬£¬SpyMaxµÄǰÉíSpyNoteÊÇʹÓÃ×îÆÕ±éµÄÌØ¹¤Èí¼þ¿ò¼ÜÖ®Ò»¡£ ¡£¡£¡£¡£ÓÉÓÚ¸ÃÌØ¹¤Èí¼þÔÚÆÊÎöʱ´úδ´¦Óڻ״̬£¬£¬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±²¢Î´×·Ëݵ½ÆäÏÂÁîºÍ¿ØÖÆ£¨C£¦C£©Ð§ÀÍÆ÷¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zscaler.com/blogs/research/android-spyware-targeting-tanzania-premier-league


6.ABIÔ¤¼Æµ½2026ÄêIoTÊý¾ÝÖÎÀíЧÀͽ«´ï429ÒÚÃÀÔª


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


ABI ResearchÌåÏÖÎïÁªÍøÊý¾ÝÖÎÀíЧÀÍÊÇÒ»¸ö¿ìËÙÔöÌíµÄÊг¡£¬£¬£¬£¬£¬£¬£¬²¢Ô¤¼Æµ½2026Ä꽫¸ß´ï429ÒÚÃÀÔª¡£ ¡£¡£¡£¡£Á÷´¦Öóͷ£ºÍÆÊÎö½â¾ö¼Æ»®µÄ·ºÆðΪÊý¾Ý¾öæÅºÍÆóÒµ¶´²ìÌṩÁ˶¯Á¦£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÓÐÁ½´óÕûÌå¶ÔÆä¾ÙÐÐÖ÷µ¼£¬£¬£¬£¬£¬£¬£¬»®·ÖÎªÔÆÓÅÏȺͱßÑØÓÅÏÈ¡£ ¡£¡£¡£¡£Azure¡¢AWS¡¢IBM΢Èí¡¢Cloudera¡¢Informatica¡¢Software AG ApamaºÍTIBCO¶¼Î§ÈÆÒÔÔÆÎªÖÐÐĵķ½·¨ÌṩÊý¾ÝÖÎÀíЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÕâÊÇËûÃǶÔÒѾ­±£´æµÄÈ«¿ÍÕ»¶Ëµ½¶ËÎïÁªÍø²úÆ·ºÍÄÜÁ¦µÄÔö²¹¡£ ¡£¡£¡£¡£ScaleOut¡¢ Crosser¡¢ SWIM.aiºÍClearBladeʹÓÃÁËÒ»ÖÖÒÔ±ßÑØÎªÖÐÐĵÄÒªÁ죬£¬£¬£¬£¬£¬£¬²¢ÓëÔÆ¹©Ó¦ÉÌÏàÖú£¬£¬£¬£¬£¬£¬£¬ÌṩÐÐҵרÓõÄÊý¾ÝÖÎÀíÓ¦ÓóÌÐò¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/08/03/iot-data-management-services-42-9-billion-by-2026/