ºÚ¿Íй¶¶íÂÞ˹Éç½»ÍøÂçVK 3.9ÒÚÓû§Êý¾Ý
Ðû²¼Ê±¼ä 2024-09-049ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¡°HikkI-Chan¡±ÔÚ²»·¨ºÚ¿ÍÂÛ̳Breach ForumsÉϹûÕæÁ˾ªÈ˵Ä3.9ÒÚVKÓû§Êý¾Ý¡£¡£¡£¡£¡£¡£¡£VK×÷Ϊ¶íÂÞ˹¼°¶«Å·µØÇø¹ãÊܽӴýµÄÉ罻ýÌåÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬ÆäÓû§Ð¡ÎÒ˽¼ÒÐÅÏ¢°üÀ¨¶¼»á¡¢¹ú¼Ò¡¢È«Ãû¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬURLµÈÃô¸ÐÄÚÈݲ»ÐÒ±»Ð¹Â¶£¬£¬£¬£¬£¬£¬£¬×ÜÁ¿¸ß´ï390,425,719Ìõ¼Í¼£¬£¬£¬£¬£¬£¬£¬Êý¾Ý¹æÄ£Áè¼Ý27GB¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü´Ë´Îй¶µÄÐÅÏ¢Á¿Öش󣬣¬£¬£¬£¬£¬£¬µ«²¢Î´°üÀ¨Óû§µÄµç»°ºÅÂë»òÃÜÂ룬£¬£¬£¬£¬£¬£¬¼õÇáÁËÖ±½ÓÇå¾²Íþв¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬Óû§È«Ãû¡¢¶¼»á¼°¹ú¼ÒµÈÐÅÏ¢µÄ̻¶ÈÔ¿ÉÄÜÒý·¢Ò»ÏµÁÐΣº¦£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇ˼Á¿µ½ÕâЩÐÅϢΪ¶íÓ£¬£¬£¬£¬£¬£¬Ëä¿ÉÄÜÏÞÖÆ·Ç¶íÓïÍþвÕßµÄÖ±½ÓʹÓ㬣¬£¬£¬£¬£¬£¬µ«Òþ»¼ÈÔ½ûÖ¹ºöÊÓ¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í¡°HikkI-Chan¡±Éù³Æ´Ë´Î²¢·ÇÖ±½ÓÈëÇÖVKЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬¶øÊÇÒ»´ÎËùνµÄ¡°¶þ½×¡±ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¼´Ê¹ÓÃ´ÓÆäËûµÚÈý·½ÇþµÀ²»·¨»ñÈ¡µÄÊý¾ÝÀ´¼ä½Ó»ñÈ¡VKÓû§ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£VK²¢·ÇÊ×´ÎÔâÓöÊý¾Ýй¶Σ»£»£»£»£»£»ú£¬£¬£¬£¬£¬£¬£¬ÔçÔÚ2016Ä꣬£¬£¬£¬£¬£¬£¬¾ÍÓб¨µÀÖ¸³ö¸Ãƽ̨µÄÓû§ÕË»§ÔøÔÚ°µÍøÉϱ»³öÊÛ¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/hacker-leaks-data-of-vk-users-russian-social-network/
2. ÅûÈøÁ¬ËøµêƵÔâÍøÂç´¹ÂÚÕ©Æ£¬£¬£¬£¬£¬£¬£¬ÇÔÊØÐÅÓÿ¨Êý¾Ý
9ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬È«Çò¹æÄ£ÄÚ£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊǼÓÄô󣬣¬£¬£¬£¬£¬£¬¶à¼Ò×ÅÃûÅûÈøÁ¬ËøµêÕýÔâÊÜÍøÂç´¹ÂÚթƵÄÇÖÏ®£¬£¬£¬£¬£¬£¬£¬Õ©ÆÕßʹÓÃÓòÃûÓÕÆ¡¢ÍøÂç´¹ÂÚ¼°ÌìÉúʽÈ˹¤ÖÇÄܵÈÊֶΣ¬£¬£¬£¬£¬£¬£¬½¨Éè¸ß¶È·ÂÕæµÄ¶ñÒâÍøÕ¾£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Ö÷¹ËÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Ôì³ÉÖØ´ó¾¼ÃËðʧ¡£¡£¡£¡£¡£¡£¡£Õⳡ×Ô2023Äê±ã×îÏȵÄթƻ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÄ£ÄâÕýµ±ÅûÈøÍâÂôÍøÕ¾µÄ¶©µ¥Ò³Ã棬£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§ÊäÈëСÎÒ˽¼ÒÐÅÏ¢¼°Ò»´ÎÐÔÃÜÂ룬£¬£¬£¬£¬£¬£¬½ø¶øÍµÊØÐÅÓÿ¨Êý¾Ý¡£¡£¡£¡£¡£¡£¡£³ýÐÂ¼ÓÆÂµÄDomino's PizzaÍ⣬£¬£¬£¬£¬£¬£¬¼ÓÄôó±¾ÍÁµÄÅûÈø³øÊ¦¡¢±ÈÈø±ÈÈø¡¢²¨Ê¿¶ÙÅûÈøµÈ×ÅÃûÆ·ÅÆÒàδÄÜÐÒÃâ¡£¡£¡£¡£¡£¡£¡£Õ©ÆÕßͨ¹ý¸¶·ÑËÑË÷ÒýÇæ¹ã¸æÌáÉý¶ñÒâÓòÃûÆØ¹â¶È£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÆ´Ð´¹ýʧ¡¢Í¬ÐÎÒìÒå´ÊµÈ¼¼ÇÉÎóµ¼Óû§£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÒ»Ö±×¢²áÐÂÓòÃû¡¢¸üÐÂÏÖÓÐÓòÃû¼°Ìæ»»IPµØµãÀ´Ìӱܼì²â¡£¡£¡£¡£¡£¡£¡£´ËÀ๥»÷²»µ«ÊÖÒÕÖØ´ó£¬£¬£¬£¬£¬£¬£¬ÇÒ¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬£¬¶ÔÈ«ÇòÅûÈøÐÐÒµ×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¡£¡£¡£ÎªÁËÌá·À´ËÀàÍøÂç´¹ÂÚÕ©Æ£¬£¬£¬£¬£¬£¬£¬Ö÷¹ËÐèÌá¸ßСÐÄ£¬£¬£¬£¬£¬£¬£¬×Ðϸ¼ì²éÓòÃûÖеÄÒì³£Ðźţ¬£¬£¬£¬£¬£¬£¬¹Ø×¢×¢²áÈÕÆÚ£¬£¬£¬£¬£¬£¬£¬ÆôÓöàÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬²¢ÊµÊ±ÏòÖ´·¨²¿·Ö±¨¸æ¿ÉÒÉÉúÒâ¡£¡£¡£¡£¡£¡£¡£
https://hackread.com/phishing-scam-canadian-pizza-chains-credit-card-data/
3. CISA½ôÆÈ±Þ²ßÐÞ²¹Draytek·ÓÉÆ÷Óë½ðɽWPS OfficeÇå¾²Îó²î
9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½ôÆÈÐû²¼Á˹ØÓÚÈý¸öÕý±»Æð¾¢Ê¹ÓõÄÑÏÖØÎó²îµÄ¾¯Ê¾£¬£¬£¬£¬£¬£¬£¬±Þ²ßÈ«Çò×éÖ¯ÓÈÆäÊÇÁª°î»ú¹¹Ñ¸ËÙÓ¦¶Ô¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬Draytek VigorConnect ·ÓÉÆ÷̻¶µÄ CVE-2021-20123 ºÍ CVE-2021-20124 Îó²î£¬£¬£¬£¬£¬£¬£¬ÈÃδÊÚȨ¹¥»÷ÕßÄÜÈÝÒ×»á¼ûÃô¸ÐÎļþ£¬£¬£¬£¬£¬£¬£¬×é³ÉÊý¾Ýй¶¼°ÏµÍ³ÈëÇÖµÄÖØ´óÍþв¡£¡£¡£¡£¡£¡£¡£ÁíÒ»Ïî¸ßΣº¦Îó²î CVE-2024-7262 ¾Û½¹ÓÚ½ðɽWPS Office£¬£¬£¬£¬£¬£¬£¬Õâ¿îÔÚ¶«ÑǵØÇøÆÕ±éʹÓõİ칫Ì×¼þ£¬£¬£¬£¬£¬£¬£¬Òò±£´æÑÏÖØµÄ·¾¶±éÀúÎÊÌ⣨CVSS ÆÀ·Ö¸ß´ï9.8£©£¬£¬£¬£¬£¬£¬£¬³ÉΪº«¹ú¹ØÁªÍøÂçÌØ¹¤×éÖ¯APT-C-60µÄ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¡£Ê¹ÓôËÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬APT-C-60°²ÅÅÁËSpyGlaceºóÃÅ£¬£¬£¬£¬£¬£¬£¬´ËÎó²îµÄ½¹µãÔÚÓÚ¶ÔÓû§Îļþ·¾¶ÑéÖ¤µÄÊèºö£¬£¬£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷ÕßÄÜÉÏ´«²¢Ö´ÐÐí§ÒâWindows¿â£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬ÖÜÈ«¿ØÖÆÊܺ¦ÏµÍ³£¬£¬£¬£¬£¬£¬£¬²¢ºã¾ÃÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£ÎªÓ¦¶ÔÕâÒ»½ôÆÈÐÎÊÆ£¬£¬£¬£¬£¬£¬£¬CISAÒÑÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·ÖÔÚ2024Äê9ÔÂ24ÈÕǰÍê³ÉÎó²îÐÞ²¹¡£¡£¡£¡£¡£¡£¡£
https://securityonline.info/cisa-issues-alert-three-actively-exploited-vulnerabilities-demand-immediate-attention/
4. Head MareºÚ¿Í×éÖ¯Õë¶Ô¶íº×·¢¶¯ÍøÂç¹¥»÷ÓëÀÕË÷
9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬Head MareºÚ¿Í×éÖ¯×Ô2023ÄêÆð»îÔ¾£¬£¬£¬£¬£¬£¬£¬×¨ÃÅÕë¶Ô¶íÂÞ˹ºÍ°×¶íÂÞ˹µÄ×éÖ¯·¢¶¯ÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯½ÓÄÉÏȽøÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬ÈçʹÓÃWinRARÖеÄCVE-2023-38831Îó²îÖ´ÐжñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬ÒÔÔöÇ¿Æä¹¥»÷Òþ²ØÐÔºÍЧÂÊ¡£¡£¡£¡£¡£¡£¡£Head Mare²»µ«Ð¹Â¶Êܺ¦ÕßÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬»¹Í¨¹ýLockBit£¨Õë¶ÔWindows£©ºÍBabuk£¨Õë¶ÔLinux£©¼ÓÃÜ×°±¸£¬£¬£¬£¬£¬£¬£¬Ë÷ÒªÊê½ð¡£¡£¡£¡£¡£¡£¡£Æä¹¤¾ß°ü°üÀ¨PhantomDLºÍPhantomCoreµÈ¶¨ÖƺóÃÅ£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÉÏ´«ÎļþºÍÖ´ÐÐÏÂÁ£¬£¬£¬£¬£¬£¬Î±×°³É΢Èí¸üÐÂʹÃüÒÔ»ìÏýÊÓÌý¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯»¹Ê¹ÓÃSliverµÈ¿ªÔ´C2¿ò¼Ü¼°¶àÖÖ¹ûÕæ¹¤¾ß¾ÙÐкáÏòÒÆ¶¯ºÍÆ¾Ö¤ÍøÂç¡£¡£¡£¡£¡£¡£¡£¹¥»÷ͨ³£ÒÔÍøÂç´¹ÂÚÓʼþЯ´øË«À©Õ¹ÃûÎĵµÎªÆðÔ´£¬£¬£¬£¬£¬£¬£¬×îÖÕ°²ÅÅÀÕË÷Èí¼þ²¢ÁôÏÂÊê½ðÒªÇ󡣡£¡£¡£¡£¡£¡£¿£¿£¿¨°Í˹»ùÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Head MareµÄÕ½Êõ¡¢ÊÖÒպͳÌÐòÓë¶íÎÚ³åÍ»Åä¾°ÏÂÆäËûÕë¶Ô¶í°×Á½¹úµÄºÚ¿Í×éÖ¯ÏàËÆ£¬£¬£¬£¬£¬£¬£¬µ«ÆäÌØÉ«ÔÚÓÚʹÓö¨ÖƶñÒâÈí¼þºÍ×îÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖÁ˸߶ȵÄרҵÐÔºÍÕë¶ÔÐÔ¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2024/09/hacktivists-exploits-winrar.html
5. Booking.comÔâÓöÖØ´óÍøÂç´¹ÂÚ¹¥»÷
9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬OSINTMATTER×îб¨¸æÕ¹ÏÖÁËÕë¶ÔBooking.comµÄÖØ´óÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬£¬ÆäÕ½ÂÔ°üÀ¨¶à½×¶ÎÈëÇÖ£¬£¬£¬£¬£¬£¬£¬´ÓÂùÝ˾ÀíÕË»§µ½Ö±½ÓÓÕÆ¿Í»§¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓ÷ÂðÓòÃû¡°extraknet-booking.com¡±ÓÕÆÓû§½øÈëÍâ¹Û±ÆÕæµÄÐéÎ±ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨µÇ¼ƾ֤¡¢Ð¡ÎÒ˽¼ÒÊý¾ÝºÍ²ÆÎñÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸ÃÍøÕ¾Í¨¹ýJavaScript»ìÏýÊÖÒÕÒþ²Ø¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬²¢¿ÉÄÜÓëNinja TrojanµÈ¶ñÒâÈí¼þÏà¹ØÁª¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃSTUN°ó¶¨ÇëÇóÒþ²Ø¶ñÒâÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ý¶¯Ì¬Î±×°ÊÖÒÕÆ¾Ö¤Óû§ÌØÕ÷չʾ²î±ðÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬ÒÔÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£ÌØÊâÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÍøÂçÖеÄiFrameÅþÁ¬ÖÁÒ»ÆäÖÐÐÄÊàŦ£¬£¬£¬£¬£¬£¬£¬¼¯ÖпØÖƲ¢À©´ó´¹ÂÚ¹æÄ£¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷͹ÏÔÁËÍøÂç´¹ÂÚÊֶεÄÈÕÒæÖØ´óÓëÒþ²Ø£¬£¬£¬£¬£¬£¬£¬¶ÔÂÃÓÎÒµÇå¾²×é³ÉÑÏÖØÍþв£¬£¬£¬£¬£¬£¬£¬¾¯Ê¾Óû§ºÍÆóÒµÐèÔöǿСÐÄ£¬£¬£¬£¬£¬£¬£¬×ÔÁ¦ÑéÖ¤ÍøÕ¾Õýµ±ÐÔ£¬£¬£¬£¬£¬£¬£¬Ìá·ÀСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£
https://securityonline.info/travelers-targeted-booking-com-phishing-scam-unveiled/
6. ¿¨°Í˹»ù½ÒÆÆ£ºICMPºóÃŹ¥»÷ÔÙÏÖ£¬£¬£¬£¬£¬£¬£¬ÒÉËÆToddyCat APTÊÖ·¨
9ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬¿¨°Í˹»ùÈ«ÇòÓ¦¼±ÏìӦС×飨GERT£©µÄÍøÂçÇ徲ר¼Ò½ÒÆÆÁËÒ»ÖÖÖØ´óµÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÆäÊÖ·¨Óë×ÅÃûAPT×éÖ¯ToddyCatµÄÕ½ÂԸ߶ÈÏàËÆ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Õë¶Ô¿Í»§Óò¿ØÖÆÆ÷ºÍExchangeЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬Ê¹ÓðüÀ¨Microsoft ExchangeÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-26855£©¼°ÒÑÐÞ²¹µÄIKEEXTЧÀ;ÉÎó²îÔÚÄڵĶàÖÖÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÀֳɻñÈ¡³õʼ»á¼ûȨ²¢¹¹½¨³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÓÈΪ½ÆÕ©µØÖØÓÃÁËÓëwlbsctrl.dll¿âÏà¹ØµÄ¾ÉÎó²î£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÌæ»»system32Ŀ¼ÏµĸÿâÎļþ£¬£¬£¬£¬£¬£¬£¬Ê¹IKEEXTЧÀÍÿ´ÎŲÓÃʱ¾ùÖ´ÐкóÃÅ´úÂ룬£¬£¬£¬£¬£¬£¬ÎÞÐè¸ü¸ÄͨÀýÆô¶¯ÉèÖᣡ£¡£¡£¡£¡£¡£½øÒ»²½µØ£¬£¬£¬£¬£¬£¬£¬ËûÃÇʹÓÃSMBÐÒéÉèÖÃ×Ô½ç˵·À»ðǽ¹æÔò£¬£¬£¬£¬£¬£¬£¬ÈöñÒâdllhost.exe¼àÌýÌØ¶¨¶Ë¿Ú£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÍøÂçÖеĺáÏòÒÆ¶¯£¬£¬£¬£¬£¬£¬£¬ÇÄÎÞÉùÏ¢µØÀ©Õ¹¹¥»÷¹æÄ£¡£¡£¡£¡£¡£¡£¡£ÓÈΪҪº¦µÄÊÇ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß°²ÅÅÁËÒ»¸öICMPºóÃÅ£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¸ÃºóÃÅÒÔ¼ÓÔØ³ÌÐòÐÎʽÔËÐУ¬£¬£¬£¬£¬£¬£¬Ö´ÐÐÖØ´ó²Ù×÷ÒÔά³ÖÒþ²ØÐÔ¡£¡£¡£¡£¡£¡£¡£¸ÃºóÃÅÊ×Ïȼì²é»¥³âËøÒÔ×èÖ¹ÖØ¸´ÔËÐУ¬£¬£¬£¬£¬£¬£¬Ëæºó½âÃܲ¢Ö´Ðд洢ÔÚWindows×¢²á±íÖеÄÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬£¬ÕâЩ¸ºÔØÒÔ¡°CAFEBABE¡±Îª±êʶ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃICMPÌ×½Ó×ÖÎüÊÕ²¢Ö´ÐÐÀ´×Ô¹¥»÷ÕßµÄÖ¸Á£¬£¬£¬£¬£¬£¬´Ó¶øÔÚ²»½¨Éè³öÕ¾ÅþÁ¬µÄÇéÐÎÏÂʵÏÖÔ¶³Ì¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬¼«´ó½µµÍÁ˱»¼ì²âµÄΣº¦¡£¡£¡£¡£¡£¡£¡£
https://securityonline.info/researcher-identifies-toddycat-inspired-apt-attack-leveraging-icmp-backdoor-and-microsoft-exchange-flaws/


¾©¹«Íø°²±¸11010802024551ºÅ