Strava½¡ÉíÓ¦Óñ»ÆØÐ¹Â¶¶à¹ú×Üͳ°²±£Ö°Ô±Î»ÖÃÐÅÏ¢

Ðû²¼Ê±¼ä 2024-10-31

1. Strava½¡ÉíÓ¦Óñ»ÆØÐ¹Â¶¶à¹ú×Üͳ°²±£Ö°Ô±Î»ÖÃÐÅÏ¢


10ÔÂ29ÈÕ£¬£¬ £¬£¬£¬£¬StravaÊÇÒ»¿îÈ«Çò¹ãÊܽӴýµÄ½¡ÉíÓ¦ÓóÌÐò£¬£¬ £¬£¬£¬£¬ÓµÓÐ1.2ÒÚÓû§£¬£¬ £¬£¬£¬£¬Äܹ»¼Í¼Åܲ½¡¢ÆïÐеÈÔ˶¯¹ì¼£¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬·¨¹úýÌå¡¶Ììϱ¨¡··¢Ã÷£¬£¬ £¬£¬£¬£¬Strava±£´æÐ¹Â¶Ãô¸ÐλÖÃÐÅÏ¢µÄΣº¦£¬£¬ £¬£¬£¬£¬°üÀ¨ÃÀ¹ú×Üͳ¼°Æä¾ºÑ¡È˵ÄÌùÉí°²±£Ö°Ô±Î»Öᣡ£¡£¾Ý±¨µÀ£¬£¬ £¬£¬£¬£¬ÖÁÉÙ26ÃûÃÀ¹úÌØ¹¤ÔÚStravaÉÏÓµÓй«¹²ÕË»§£¬£¬ £¬£¬£¬£¬ÇÒÔÚÌØÀÊÆÕÔâÓöıº¦Î´ËìÊÂÎñºóÈÔ»îÔ¾ÓÚ¸ÃÆ½Ì¨¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬·¨¹úºÍ¶íÂÞ˹µÄ×Üͳ°²±£Ö°Ô±Ò²±»·¢Ã÷ʹÓøÃÓ¦Ó㬣¬ £¬£¬£¬£¬Éæ¼°12Ãû·¨¹úGSPR³ÉÔ±ºÍ6Ãû¶íÂÞ˹FSO³ÉÔ±¡£¡£¡£ÕâЩÇå¾²Ö°Ô±ÔÚStravaÉϵÄÐж¯¿ÉÄܵ¼ÖÂÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬ÓÉÓÚËûÃǵÄÔ˶¯¹ì¼£¿£¿£¿£¿£¿ÉÄÜ̻¶Ïòµ¼ÈËÏÂ齺;ۻáËùÔÚµÄÐÅÏ¢£¬£¬ £¬£¬£¬£¬ÉõÖÁСÎÒ˽¼ÒÉúÑÄϸ½ÚÒ²¿ÉÄܱ»¶ñÒâʹÓᣡ£¡£Ö»¹ÜÃÀ¹úÌØÇھֺͷ¨¹ú×Üͳ¹Ù·½»ú¹¹¶Ô´Ë¾ÙÐÐÁË»ØÓ¦£¬£¬ £¬£¬£¬£¬³ÆÊ¹ÓÃStrava²»»á¶Ô°²±£Ðж¯×é³ÉÍþв£¬£¬ £¬£¬£¬£¬µ«´ËǰStravaÐû²¼µÄÈ«Çò½¡ÉíÈÈÇøÍ¼¾ÍÔøÌ»Â¶ÃÀ¾üÔÚÖж«µØÇøµÄÉñÃØ»î¶¯Î»Ö㬣¬ £¬£¬£¬£¬Òý·¢ÕùÒé¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬½¡ÉíÓ¦ÓóÌÐòÊý¾Ý»¹¿ÉÄܱ»¹¥»÷ÕßÓÃÓÚ×·×ÙDZÔÚÊܺ¦Õߣ¬£¬ £¬£¬£¬£¬ÔöÌí¸ú×Ù¡¢ÇÀ½ÙµÈ·¸·¨Î£º¦¡£¡£¡£Òò´Ë£¬£¬ £¬£¬£¬£¬Ê¹ÓôËÀàÓ¦ÓÃʱÐèÉóÉ÷£¬£¬ £¬£¬£¬£¬×èֹй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£


https://cybernews.com/news/fitness-app-strava-location-biden-trump-harris/


2. Metaƽ̨Ôâ¶ñÒâ¹ã¸æ»î¶¯ÇÖÏ®£¬£¬ £¬£¬£¬£¬SYS01ÐÅÏ¢ÇÔÈ¡³ÌÐòÈ«ÇòËÁŰ


10ÔÂ30ÈÕ£¬£¬ £¬£¬£¬£¬Ò»ÏîеĶñÒâ¹ã¸æ»î¶¯ÕýÔÚʹÓà Meta ƽ̨Èö²¥ SYS01 ÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬ £¬£¬£¬£¬¸Ã³ÌÐòרÃÅÕë¶Ô 45 ËêÒÔÉϵÄÄÐÐÔÓû§£¬£¬ £¬£¬£¬£¬Í¨¹ýαװ³ÉÊ¢ÐÐÈí¼þ¡¢ÓÎÏ·ºÍÔÚÏßЧÀ͵ÄÐéα¹ã¸æ¾ÙÐй¥»÷¡£¡£¡£¸Ã»î¶¯×Ô 2024 Äê 9 ÔÂÊ״α»·¢Ã÷ÒÔÀ´£¬£¬ £¬£¬£¬£¬ÒÑÔÚÈ«Çò¹æÄ£ÄÚÔì³ÉÆÕ±éÓ°Ï죬£¬ £¬£¬£¬£¬°üÀ¨Å·ÃË¡¢±±ÃÀ¡¢°Ä´óÀûÑǺÍÑÇÖ޵ȵء£¡£¡£SYS01 ³ÌÐò»áÇÔÈ¡ Facebook ƾ֤£¬£¬ £¬£¬£¬£¬ÌØÊâÊÇÖÎÀíÉÌÒµÒ³ÃæµÄÕË»§£¬£¬ £¬£¬£¬£¬²¢Ê¹ÓÃÕâЩÕË»§½øÒ»²½Èö²¥¹¥»÷¡£¡£¡£¹¥»÷Õßͨ¹ý MediaFire Á´½ÓÌṩ¿´ËÆÕýµ±µÄÈí¼þÏÂÔØ£¬£¬ £¬£¬£¬£¬ÕâЩÏÂÔØÄÚÈݰüÀ¨¶ñÒâµÄ Electron Ó¦ÓóÌÐò£¬£¬ £¬£¬£¬£¬Ò»µ©Ö´ÐУ¬£¬ £¬£¬£¬£¬¾Í»áÖ²Èë²¢ÔËÐÐ SYS01 ³ÌÐò¡£¡£¡£¸Ã³ÌÐòÁ¬ÏµÁË·´É³ºÐ¼ì²éÒÔÌӱܼì²â£¬£¬ £¬£¬£¬£¬²¢»áÌáÈ¡°üÀ¨½¹µã¶ñÒâÈí¼þ×é¼þµÄÊÜÃÜÂë±£»£»£»£»£»¤µÄ´æµµ¡£¡£¡£±»µÁÕË»§²»µ«ÓÃÓÚ½øÒ»²½¹¥»÷/Õ©Æ­£¬£¬ £¬£¬£¬£¬»¹±»ÓÃÀ´ÖÆ×÷жñÒâ¹ã¸æ£¬£¬ £¬£¬£¬£¬ÈƹýÇå¾²¹ýÂËÆ÷£¬£¬ £¬£¬£¬£¬ÐγÉÒ»¸ö×ÔÎÒά³ÖµÄÑ­»·¡£¡£¡£Òò´Ë£¬£¬ £¬£¬£¬£¬Óû§ÔÚ Facebook ÉÏ£¬£¬ £¬£¬£¬£¬ÓÈÆäÊÇÔËÓªÉÌÒµÒ³ÃæµÄÓû§£¬£¬ £¬£¬£¬£¬±ØÐèСÐÄ´ËÀàÍþв¡£¡£¡£


https://hackread.com/fake-meta-ads-hijacking-facebook-sys01-infostealer/


3. ÃØÂ³InterbankÔâÊý¾Ýй¶£¬£¬ £¬£¬£¬£¬ºÚ¿ÍÉù³ÆÇÔÈ¡300Íò¿Í»§ÐÅÏ¢


10ÔÂ30ÈÕ£¬£¬ £¬£¬£¬£¬ÃØÂ³×ÅÃû½ðÈÚ»ú¹¹Interbank½üÆÚÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬ £¬£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÈëÇÖÆäϵͳ²¢ÍµÈ¡Á˿ͻ§Êý¾Ý£¬£¬ £¬£¬£¬£¬ËæºóÔÚÍøÉϾÙÐÐй¶¡£¡£¡£Ö»¹ÜInterbankδ͸¶ÏêϸÊÜÓ°ÏìµÄ¿Í»§ÊýÄ¿£¬£¬ £¬£¬£¬£¬µ«Dark Web Informer·¢Ã÷£¬£¬ £¬£¬£¬£¬Ò»ÃûʹÓá°kzoldyck¡±Óû§ÃûµÄºÚ¿ÍÕýÔÚ¶à¸öÂÛ̳³öÊ۾ݳƴӸÃÒøÐÐÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¾ÝºÚ¿ÍÉù³Æ£¬£¬ £¬£¬£¬£¬ËûÃÇÄܹ»»ñÈ¡Interbank¿Í»§µÄÈ«Ãû¡¢ÕË»§ID¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãºÍIPµØµãµÈÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬£¬ÒÔ¼°ÐÅÓÿ¨ÐÅÏ¢¡¢ÒøÐÐÉúÒâÊý¾ÝµÈ£¬£¬ £¬£¬£¬£¬×ÜÁ¿Áè¼Ý3.7TB¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬ºÚ¿Í»¹Éù³ÆÓµÓпͻ§µÄÃ÷È·Óû§ÃûºÍÃÜÂëÐÅÏ¢£¬£¬ £¬£¬£¬£¬¿ÉÒÔ´ÓÃØÂ³IP¿é»á¼ûÒøÐÐÕË»§¡£¡£¡£ºÚ¿ÍÌåÏÖ£¬£¬ £¬£¬£¬£¬ËûÃÇÁ½ÖÜÇ°ÔøÊµÑéÓëInterbankÖÎÀí²ã̸Åе«Î´¹û£¬£¬ £¬£¬£¬£¬Òò´Ë¾öÒé¹ûÕæÐ¹Â¶Êý¾Ý¡£¡£¡£InterbankÒÑÈ·Èϱ¬·¢Êý¾Ýй¶£¬£¬ £¬£¬£¬£¬²¢ÌåÏÖÒѰ²ÅÅÌØÊâÇå¾²²½·¥±£»£»£»£»£»¤¿Í»§ÐÅÏ¢ºÍÔËÓª£¬£¬ £¬£¬£¬£¬Í¬Ê±°ü¹Ü¿Í»§´æ¿îÇå¾²£¬£¬ £¬£¬£¬£¬²¢Ö¸³ö´ó´ó¶¼ÓªÒµÇþµÀÒѻָ´ÔÚÏß¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interbank-confirms-data-breach-following-failed-extortion-data-leak/


4. ³¯ÏʺڿÍ×éÖ¯AndarielÉæÏÓ¼ÓÈëPlayÀÕË÷Èí¼þÐж¯²¢ÌÓ±ÜÖÆ²Ã


10ÔÂ30ÈÕ£¬£¬ £¬£¬£¬£¬³¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯Andariel±»×·×ÙÓëPlayÀÕË÷Èí¼þÐж¯ÓйØÁª£¬£¬ £¬£¬£¬£¬¾ÝPalo Alto Networks¼°ÆäUnit 42Ñо¿Ö°Ô±µÄ±¨¸æ³Æ£¬£¬ £¬£¬£¬£¬Andariel¿ÉÄÜÊÇPlayµÄÁ¥Êô»ú¹¹»ò³õʼ»á¼ûÊðÀí£¬£¬ £¬£¬£¬£¬Ð­ÖúÔÚÆäÈëÇÖµÄÍøÂçÉϰ²ÅŶñÒâÈí¼þ¡£¡£¡£AndarielÊÇÒ»¸öÊܳ¯ÏÊÕþ¸®Ö§³ÖµÄAPT×éÖ¯£¬£¬ £¬£¬£¬£¬Ó볯ÏʾüÊÂÇ鱨»ú¹¹Õì̽×ܾÖÓйØÁª£¬£¬ £¬£¬£¬£¬ÔøÒò¹¥»÷ÃÀ¹úÀûÒæ¶øÊܵ½ÃÀ¹úÖÆ²Ã¡£¡£¡£´Ëǰ£¬£¬ £¬£¬£¬£¬AndarielÒ²ÔøÓëMauiÀÕË÷Èí¼þÐж¯Óйء£¡£¡£ÔÚ2024Äê9ÔµÄÒ»´ÎPlayÀÕË÷Èí¼þÊÂÎñÏìÓ¦ÖУ¬£¬ £¬£¬£¬£¬Unit 42·¢Ã÷AndarielÔÚÆä¿Í»§µÄÊÜÑ¬È¾ÍøÂçÖл£¬£¬ £¬£¬£¬£¬²¢ÔÚ¼¸¸öÔºóPlayÀÕË÷Èí¼þ²ÅÔÚÍøÂçÉÏÖ´ÐС£¡£¡£Ñо¿Ö°Ô±ÒÔΪAndarielµÄ±£´æºÍPlayÔÚÍ³Ò»ÍøÂçÉϵݲÅÅÓйØÁª£¬£¬ £¬£¬£¬£¬µ«²»È·¶¨AndarielÊÇ·ñ³äµ±ÁËPlayÁ¥Êô»ú¹¹»òÏò¹¥»÷Õß³öÊÛÁËÊÜÑ¬È¾ÍøÂçµÄ»á¼ûȨÏÞ¡£¡£¡£Í¨¹ýÓëÀÕË÷Èí¼þÍÅ»ïÏàÖú£¬£¬ £¬£¬£¬£¬AndarielµÃÒÔÌӱܹú¼ÊÖÆ²Ã£¬£¬ £¬£¬£¬£¬ÕâÖÖÕ½ÂÔÀàËÆÓÚ֮ǰÊܵ½ÖƲõĶíÂÞ˹ºÚ¿Í×éÖ¯Evil CorpºÍÒÁÀÊÍþвÐÐΪÕß¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-govt-hackers-linked-to-play-ransomware-attack/


5. Android°æFakeCall¶ñÒâÈí¼þÐ®ÖÆÒøÐе绰£¬£¬ £¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÐÅÏ¢


10ÔÂ30ÈÕ£¬£¬ £¬£¬£¬£¬Android°æFakeCall¶ñÒâÈí¼þµÄа汾ͨ¹ý½«×Ô¼ºÉèÖÃΪĬÈϺô½Ð´¦Öóͷ£³ÌÐò£¬£¬ £¬£¬£¬£¬Äܹ»Ð®ÖÆÓû§²¦´òÒøÐе绰µÄºô½Ð£¬£¬ £¬£¬£¬£¬²¢½«ÆäÖØ¶¨Ïòµ½¹¥»÷Õߵĵ绰ºÅÂë¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÔÓïÒôÍøÂç´¹ÂÚÎªÖØµã£¬£¬ £¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÈËÃǵÄÃô¸ÐÐÅÏ¢ºÍÒøÐÐÕË»§×ʽ𡣡£¡£³ýÁËÓïÒôÍøÂç´¹ÂÚ£¬£¬ £¬£¬£¬£¬Ëü»¹Äܲ¶»ñʵʱÒôƵºÍÊÓÆµÁ÷¡£¡£¡£×îа汾µÄFakeCallÔöÌíÁ˶àÏîˢк͹¥»÷»úÖÆ£¬£¬ £¬£¬£¬£¬ÈçÀ¶ÑÀ¼àÌýÆ÷¡¢ÆÁĻ״̬¼àÊÓÆ÷ºÍ¸¨Öú¹¦Ð§Ð§ÀÍ£¬£¬ £¬£¬£¬£¬ÒÔ»ñµÃ¶ÔÓû§½çÃæµÄÆÕ±é¿ØÖÆ£¬£¬ £¬£¬£¬£¬²¢ÔÊÐí¹¥»÷ÕßÖ´ÐÐÖݪֲÙ×÷£¬£¬ £¬£¬£¬£¬Èç»ñȡװ±¸Î»Öá¢É¾³ýÓ¦ÓóÌÐò¡¢Â¼ÖÆÒôƵ»òÊÓÆµÒÔ¼°±à¼­ÁªÏµÈË¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹ÔÚÆð¾¢¿ª·¢ÖУ¬£¬ £¬£¬£¬£¬ÔöÌíÁ˽«¶ñÒâÈí¼þÉèÖÃΪĬÈϺô½Ð´¦Öóͷ£³ÌÐò¡¢ÊµÊ±²¥·Å×°±¸ÆÁÄ»ÄÚÈݵÈй¦Ð§¡£¡£¡£ZimperiumÐû²¼ÁËÈëÇÖÖ¸±êÁбíÒÔ×ÊÖúÓû§±Ü¿ª¶ñÒâÓ¦Ó㬣¬ £¬£¬£¬£¬µ«½¨ÒéÓû§´ÓGoogle Play×°ÖÃÓ¦ÓÃÒÔ×èֹΣº¦¡£¡£¡£


https://www.bleepingcomputer.com/news/security/android-malware-fakecall-now-reroutes-bank-calls-to-attackers/


6. EmeraldWhaleɨÃèGitÉèÖÃÎļþ£¬£¬ £¬£¬£¬£¬ÇÔÈ¡15,000¸öÔÆÕÊ»§Æ¾Ö¤


10ÔÂ30ÈÕ£¬£¬ £¬£¬£¬£¬ÃûΪ¡°EmeraldWhale¡±µÄ´ó¹æÄ£¶ñÒâ²Ù×÷ʹÓÃ×Ô¶¯»¯¹¤¾ßɨÃè̻¶µÄGitÉèÖÃÎļþ£¬£¬ £¬£¬£¬£¬´ÓÊýǧ¸ö˽ÈË´æ´¢¿âÖÐÇÔÈ¡ÁËÁè¼Ý15,000¸öÔÆÕÊ»§Æ¾Ö¤¡£¡£¡£ÕâЩƾ֤±»ÓÃÓÚÏÂÔØ´æ´¢ÔÚGitHub¡¢GitLabºÍBitBucketÉϵĴ洢¿â£¬£¬ £¬£¬£¬£¬²¢½øÒ»²½É¨ÃèÒÔ»ñÈ¡¸ü¶àƾ֤¡£¡£¡£±»µÁÊý¾Ý±»Ð¹Â¶ÖÁÆäËûÊܺ¦ÕßµÄAmazon S3´æ´¢Í°ÖУ¬£¬ £¬£¬£¬£¬²¢±»ÓÃÓÚÍøÂç´¹ÂÚ¡¢À¬»øÓʼþ»î¶¯»òÖ±½Ó³öÊÛ¸øÆäËûÍøÂç·¸·¨·Ö×Ó¡£¡£¡£EmeraldWhale±³ºóµÄÍþвÐÐΪÕßʹÓÿªÔ´¹¤¾ßɨÃèÔ¼5ÒÚ¸öIPµØµãÉϵÄÍøÕ¾£¬£¬ £¬£¬£¬£¬ÌØÊâÊǼì²éLaravelÓ¦ÓóÌÐòÖеÄ/.git/configÎļþºÍÇéÐÎÎļþ(.env)ÊÇ·ñ̻¶¡£¡£¡£ÕâЩÎļþÖпÉÄܰüÀ¨APIÃÜÔ¿¡¢ÔÆÆ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£SysdigÊӲ쵽£¬£¬ £¬£¬£¬£¬ºÚ¿ÍʹÓÃÉÌÆ·¹¤¾ß¼¯¼ò»¯ÕâÒ»Á÷³Ì£¬£¬ £¬£¬£¬£¬²¢ÔÚ̻¶µÄS3´æ´¢Í°Öз¢Ã÷ÁË´ó×ÚÉñÃØÐÅÏ¢¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬ £¬£¬£¬£¬Õâ´Î»î¶¯ÒÀÀµÓÚÉÌÆ·¹¤¾ßºÍ×Ô¶¯»¯£¬£¬ £¬£¬£¬£¬µ«ÈÔÈ»ÀÖ³ÉÇÔÈ¡ÁËÊýǧ¸ö¿ÉÄܵ¼ÖÂÔÖÄÑÐÔÊý¾Ýй¶µÄÉñÃØ¡£¡£¡£Èí¼þ¿ª·¢Ö°Ô±Ó¦Ê¹ÓÃרÓõÄÉñÃØÖÎÀí¹¤¾ßÀ´½µµÍΣº¦¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-steal-15-000-cloud-credentials-from-exposed-git-config-files/