Central TicketsÈ·ÈÏÊý¾Ýй¶£¬£¬£¬£¬£¬£¬ºÚ¿Íй¶100ÍòÓû§Êý¾Ý

Ðû²¼Ê±¼ä 2024-10-16
1. Central TicketsÈ·ÈÏÊý¾Ýй¶£¬£¬£¬£¬£¬£¬ºÚ¿Íй¶100ÍòÓû§Êý¾Ý


10ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬Â׶صÄÕÛ¿Û¾çԺƱÎñƽ̨Central Tickets½üÆÚÔâÓöÁËÒ»´ÎÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬²¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅÏ¢±»µÁ£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëµÈ¡£¡£¡£¡£¡£Ö»¹Üй¶±¬·¢ÔÚ7ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬µ«¹«Ë¾Ö±µ½9Ô²ÅÒâʶµ½´ËÊ£¬£¬£¬£¬£¬£¬ÆäʱÂ׶ؾ¯Ô±ÌüÔÚ°µÍøÉÏ·¢Ã÷Á˹ØÓÚ±»µÁÊý¾ÝµÄÌÖÂÛ¡£¡£¡£¡£¡£ºÚ¿ÍÓÖÃû0xy0um0m£¬£¬£¬£¬£¬£¬ÓÚ7ÔÂ2ÈÕ»á¼ûÁËCentral TicketsµÄϵͳ£¬£¬£¬£¬£¬£¬²¢ÊÔͼÒÔ3000ÃÀÔªµÄ¼ÛÇ®³öÊÛÊý¾Ý¡£¡£¡£¡£¡£Central TicketsÈ·ÈÏÈëÇÖÓ°ÏìÁËÓÃÓÚ²âÊÔµÄÔÝʱÊý¾Ý¿â£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿âËäÓëÖ÷ϵͳ¸ôÀ룬£¬£¬£¬£¬£¬µ«°üÀ¨Óû§Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¹«Ë¾Ëæºóƾ֤GDPR»®¶¨ÏòÐÅϢרԱ°ì¹«ÊÒ±¨¸æ£¬£¬£¬£¬£¬£¬²¢Á¬Ã¦Ëø¶¨ÁËÊÜѬȾµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬Ç¿ÖÆÓû§ÖØÖÃÃÜÂ룬£¬£¬£¬£¬£¬²¢Õö¿ªÊӲ졣¡£¡£¡£¡£ÊÜÓ°ÏìÓû§ÊýĿδÅû¶£¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÖÒÑÔÓû§¿ÉÄÜÒ×ÊÜÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬²¢±Þ²ßËûÃǼá³ÖСÐÄ¡£¡£¡£¡£¡£Hackread.com×·×ÙÁ˺ڿͻ£¬£¬£¬£¬£¬£¬²¢Ö¸³öºÚ¿ÍÔÚBreach ForumsÉÏй¶ÁË100Íò¿Í»§µÄÊý¾ÝºÍÄÚ²¿ÐÅÏ¢¡£¡£¡£¡£¡£×¨¼ÒÆ·ÆÀCentral TicketsÔÚ·¢Ã÷ÈëÇÖÊÂÎñ·½Ãæ±£´æÑÓ³Ù£¬£¬£¬£¬£¬£¬±Þ²ßÆóҵȷ±£Óв½·¥ÊµÊ±¼ì²âºÍÓ¦¶ÔÍøÂçÊÂÎñ¡£¡£¡£¡£¡£


https://hackread.com/central-tickets-data-breach-hacker-leaks-user-data/


2. ʹÓÃÕýµ±ÊðÃûÖ¤ÊéµÄHijack Loader¼°XWorm¶ñÒâÈí¼þ»î¶¯ÆØ¹â


10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Õ¹ÏÖÁËеĶñÒâÈí¼þ»î¶¯£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓÃÕýÏÖ´úÂëÊðÃûÖ¤ÊéÊðÃûµÄHijack Loader¹¤¼þ¡£¡£¡£¡£¡£·¨¹úÍøÂçÇå¾²¹«Ë¾HarfangLabÓÚ±¾Ô³õ¼à²âµ½ÕâÒ»Ö¼ÔÚ°²ÅÅÐÅÏ¢ÇÔÈ¡³ÌÐòLummaµÄ¹¥»÷Á´¡£¡£¡£¡£¡£Hijack Loader£¨ÓÖ³ÆDOILoader¡¢IDAT LoaderºÍSHADOWLADDER£©×Ô2023Äê9ÔÂÊ×´ÎÆØ¹â£¬£¬£¬£¬£¬£¬Í¨³£Í¨¹ýÓÕÆ­Óû§ÏÂÔØ´øÓÐÏÝÚåµÄ¶þ½øÖÆÎļþʵÑé¹¥»÷¡£¡£¡£¡£¡£½üÆÚ±äÖÖ½«Óû§µ¼ÏòÐéαCAPTCHAÒ³Ãæ£¬£¬£¬£¬£¬£¬ÒªÇó¸´ÖƺÍÔËÐÐPowerShellÏÂÁîÒÔÊͷŶñÒâ¸ºÔØ¡£¡£¡£¡£¡£HarfangLabÊӲ쵽Èý¸ö²î±ð°æ±¾µÄPowerShell¾ç±¾£¬£¬£¬£¬£¬£¬Éæ¼°mshta.exe¡¢Invoke-ExpressionºÍmsiexec.exeÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£ZIP´æµµ°üÀ¨Ò×ÊÜDLL²à¼ÓÔØÓ°ÏìµÄ¿ÉÖ´ÐÐÎļþºÍ¶ñÒâDLL£¬£¬£¬£¬£¬£¬ÓÃÓÚ½âÃܲ¢Ö´ÐмÓÃÜÎļþ¡£¡£¡£¡£¡£ÎªÌӱܼì²â£¬£¬£¬£¬£¬£¬´«ËÍ»úÖÆÒÑ´ÓDLL²à¼ÓÔØ×ª±äΪʹÓöà¸öÊðÃû¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬µ«Ö¤ÊéÏÖÒѱ»×÷·Ï¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬´úÂëÊðÃû×Ô¼º²»¿É×÷Ϊ¿ÉÐŶȻù×¼¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬SonicWall Capture LabsÖÒÑԳƣ¬£¬£¬£¬£¬£¬CoreWarrior¶ñÒâÈí¼þѬȾWindows»úеµÄÍøÂç¹¥»÷ÊýÄ¿¼¤Ôö£¬£¬£¬£¬£¬£¬¶øÍøÂç´¹ÂڻҲͨ¹ýWindows¾ç±¾ÎļþÈö²¥XWorm¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¹¦Ð§ÆÕ±é¡£¡£¡£¡£¡£

https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html


3. ¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹ÝÔâÍøÂç¹¥»÷±»ÆÈÏÞÖÆÐ§ÀÍ


10ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬¿¨¶û¼ÓÀ﹫¹²Í¼Êé¹Ý½üÆÚÒòÔâÊÜÍøÂç¹¥»÷¶ø±»ÆÈÏÞÖÆÐ§ÀÍ£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˸ÃÊÐ130ÍòסÃñ¡£¡£¡£¡£¡£¸ÃͼÊé¹ÝϵͳӵÓÐ22¸ö·ÖÖ§»ú¹¹£¬£¬£¬£¬£¬£¬ÓÚÖÜÎåÊ״ιûÕæÖÒÑÔ³ÆÔâÓöÁË¡°ÍøÂçÇå¾²Îó²î¡±£¬£¬£¬£¬£¬£¬µ¼Ö²¿·ÖϵͳÊܵ½Íþв¡£¡£¡£¡£¡£Í¼Êé¹ÝËæ¼´¹Ø±ÕËùÓÐЧÀÍÆ÷ºÍÅÌËã»ú£¬£¬£¬£¬£¬£¬²¢ÓÚÖÜÎåÌáǰ±Õ¹Ý¡£¡£¡£¡£¡£Ö»¹ÜÖÜÈý¸÷ËùÔÚ»Ö¸´ÁËÕý³£¿£¿£¿£¿£¿£¿ª·Åʱ¼ä£¬£¬£¬£¬£¬£¬µ«Ð§ÀÍÒѾÙÐе÷½â£¬£¬£¬£¬£¬£¬¿Í»§½öÄÜʹÓ÷ÇÊÖÒÕÊֶεÄͼÊé¹Ý¿Õ¼äºÍЧÀÍ¡£¡£¡£¡£¡£ÓÉÓÚÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Í¼Êé¹ÝÕýÂÄÀúÑÏÖØµÄЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬°üÀ¨Í¼ÊéËÍ»¹Ð§ÀÍ¡¢ÊÖÒÕºÍÊý×ÖЧÀÍ£¨ÈçÅÌËãʱ»ú¼û¡¢´òÓ¡¡¢WiFiµÈ£©ÒÔ¼°Êý×ÖͼÊé¹ÝºÍµç×Ó×ÊÔ´¹¤¾ß¾ù²»¿ÉÓᣡ£¡£¡£¡£Í¼Êé¹Ýδ͸¶»Ö¸´Õý³£Ð§À͵Äʱ¼ä£¬£¬£¬£¬£¬£¬µ«ÌåÏÖÏ£Íû¾¡¿ì»Ö¸´¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¼¸ÏîÏÈǰ°²ÅŵĻÈÔ½«¼ÌÐø¾ÙÐС£¡£¡£¡£¡£½üÄêÀ´£¬£¬£¬£¬£¬£¬Í¼Êé¹ÝÒòÌṩÖ÷ҪЧÀͶø³ÉΪÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬¼ÓÄôó¶à¸öÖ÷Òª¶¼»áµÄͼÊé¹ÝϵͳҲÔâÊÜÁËÀàËÆ¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂЧÀÍÊܵ½ÑÏÖØÓ°Ïì¡£¡£¡£¡£¡£

https://therecord.media/calgary-public-library-limits-services


4. ¹«¹²Æû³µ¼¯ÍÅÔâ8BaseÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡´ó×ÚÉñÃØÐÅÏ¢


10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬¹«¹²Æû³µ¼¯ÍŽüÆÚ½ÒÏþÉùÃ÷»ØÓ¦ÁËÒ»ÆðÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ8BaseµÄÀÕË÷Èí¼þ×éÖ¯Éù³ÆÒÑ´Ó¸ÃÆû³µÖÆÔìÉ̵ÄϵͳÖÐÇÔÈ¡Á˰üÀ¨·¢Æ±¡¢ÊÕÌõ¡¢»á¼ÆÎļþ¡¢Ð¡ÎÒ˽¼ÒÊý¾Ý¡¢Ö¤Êé¡¢¹ÍÓ¶ÌõÔ¼¡¢ÈËʵµ°¸µÈÔÚÄڵġ°´ó×ÚÉñÃØÐÅÏ¢¡±¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¹«¹²Æû³µ½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬¹«¹²Æû³µ¼¯ÍŵÄIT»ù´¡ÉèÊ©²¢Î´Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬²¢½«¼ÌÐøÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÉÐδ͸¶Óйش˴ÎÍøÂç¹¥»÷µÄÈÎºÎÆäËûÐÅÏ¢¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Ö»¹Ü8BaseÀÕË÷Èí¼þ×éÖ¯ÔÚÍøÕ¾ÉÏÐû²¼Á˹«¹²Æû³µµÄÊê½ðÏÞÆÚÒѵ½£¬£¬£¬£¬£¬£¬µ«ºÚ¿ÍËÆºõ²¢Î´¹ûÕæÈκα»µÁÐÅÏ¢¡£¡£¡£¡£¡£8Base×Ô2023ÄêÍ·¾ÍÒѱ£´æ£¬£¬£¬£¬£¬£¬Æù½ñΪֹÒÑÐû²¼ÁË400¶àÃûÊܺ¦ÕßµÄÃû×Ö¡£¡£¡£¡£¡£ÍøÂç·¸·¨·Ö×ÓÒ»µ©»ñµÃÄ¿µÄ×é֯ϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬¾Í»áÇÔÈ¡Ãô¸ÐÊý¾Ý²¢ÏòÊܺ¦ÕßʩѹÒÔÖ§¸¶Êê½ð¡£¡£¡£¡£¡£


https://www.securityweek.com/volkswagen-says-it-infrastructure-not-affected-after-ransomware-gang-claims-data-theft/


5. Google PlayÉÏÁè¼Ý200¸ö¶ñÒâÓ¦ÓÃÏÂÔØÁ¿½ü800Íò


10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ZscalerµÄÍþвÇ鱨Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ÔÚ2023Äê6ÔÂÖÁ2024Äê4ÔÂʱ´ú£¬£¬£¬£¬£¬£¬Android¹Ù·½ÊÐËÁGoogle Play·Ö·¢ÁËÁè¼Ý200¸ö¶ñÒâÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬ÀÛ¼ÆÏÂÔØÁ¿¿¿½ü800Íò´Î¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üÀ¨ÐÅÏ¢ÇÔÈ¡ÕßJoker¡¢¹ã¸æÈí¼þ¡¢FacebookÕÊ»§Æ¾Ö¤ÇÔÈ¡³ÌÐòFacestealer¡¢ÐÅÏ¢ÇÔÈ¡ºÍ¶ÌÐÅ×èµ²³ÌÐòCoperµÈ¡£¡£¡£¡£¡£Ö»¹Ü¹È¸èÓµÓмì²â¶ñÒâÓ¦ÓóÌÐòµÄÇå¾²»úÖÆ£¬£¬£¬£¬£¬£¬µ«ÍþвÐÐΪÕßÈÔʹÓÃһЩ¼¼ÇÉÈÆ¹ýÑéÖ¤Àú³Ì¡£¡£¡£¡£¡£ZscalerµÄ±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬½üÒ»°ë¶ñÒâÓ¦ÓóÌÐòÊÇÔÚGoogle PlayµÄ¹¤¾ß¡¢¸öÐÔ»¯¡¢ÉãÓ°¡¢Éú²úÁ¦ºÍÉúÑÄ·½·¨ÖÖ±ðÏÂÐû²¼µÄ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬È¥ÄêGoogle PlayÉÏÒ²·ºÆðÁËÆäËû¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÈçNecro¡¢GoldosonºÍSpyLoanµÈ£¬£¬£¬£¬£¬£¬ËüÃǵÄÏÂÔØÁ¿»®·ÖµÖ´ï1100Íò´Î¡¢1ÒڴκÍÁè¼Ý1200Íò´Î¡£¡£¡£¡£¡£±¨¸æ»¹ÏÔʾ£¬£¬£¬£¬£¬£¬ÊÜÒÆ¶¯¶ñÒâÈí¼þ¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÓ¡¶ÈºÍÃÀ¹ú£¬£¬£¬£¬£¬£¬½ÌÓýÐÐÒµ³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£ÎªÁËïÔÌ­±»Google Play¶ñÒâÈí¼þѬȾµÄʱ»ú£¬£¬£¬£¬£¬£¬½¨ÒéÓû§ÔĶÁ̸ÂÛ¡¢¼ì²éÓ¦ÓóÌÐòÐû²¼ÕßÒÔ¼°×°ÖÃʱÇëÇóµÄȨÏÞ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-200-malicious-apps-on-google-play-downloaded-millions-of-times/


6. WordPress Jetpack ²å¼þÑÏÖØÎó²îÓ°Ïì2700Íò¸öÍøÕ¾


10ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬WordPress Jetpack²å¼þ¿ËÈÕÐû²¼ÁËÒ»ÏîÒªº¦¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÒ»¸ö×Ô2016ÄêÒÔÀ´Ò»Ö±±£´æµÄÑÏÖØÎó²î¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ²å¼þµÄÁªÏµ±íµ¥¹¦Ð§ÖУ¬£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐíÈκεÇÂ¼ÍøÕ¾µÄÓû§Éó²éÍ³Ò»ÍøÕ¾ÉÏÆäËûÈËÌá½»µÄ±íµ¥¡£¡£¡£¡£¡£JetpackÊÇÒ»¿îÊ¢ÐеÄWordPress²å¼þ£¬£¬£¬£¬£¬£¬ÓÉWordPress.com±³ºóµÄ¹«Ë¾Automattic¿ª·¢£¬£¬£¬£¬£¬£¬ÌṩÁËһϵÁй¦Ð§À´ÔöÇ¿ÍøÕ¾µÄ¹¦Ð§¡¢Çå¾²ÐÔºÍÐÔÄÜ£¬£¬£¬£¬£¬£¬ÏÖÔÚÒѱ»2700Íò¸öWordPressÍøÕ¾Ê¹Óᣡ£¡£¡£¡£ËäȻά»¤Ö°Ô±²¢Î´·¢Ã÷¸ÃÎó²îÒѱ»Ò°Íâ¹¥»÷ʹÓõÄÖ¤¾Ý£¬£¬£¬£¬£¬£¬µ«ÈÔ±Þ²ßÓû§¾¡¿ì¸üÐÂÖÁ×îа汾13.9.1£¬£¬£¬£¬£¬£¬ÒÔÈ·±£ÍøÕ¾µÄÇå¾²¡£¡£¡£¡£¡£´ó´ó¶¼ÍøÕ¾ÒѾ­»ò¼´½«×Ô¶¯¸üÐÂÖÁ×îа汾¡£¡£¡£¡£¡£JetpackÍŶӶԴ˴θøÓû§´øÀ´µÄδ±ãÌåÏÖǸÒ⣬£¬£¬£¬£¬£¬²¢ÔÊÐí½«¼ÌÐø°´ÆÚÉóºË´úÂë¿â£¬£¬£¬£¬£¬£¬È·±£Óû§ÍøÕ¾µÄÇå¾²¡£¡£¡£¡£¡£


https://securityaffairs.com/169848/uncategorized/wordpress-jetpack-plugin-critical-flaw.html