Strava½¡ÉíÓ¦Óñ»ÆØÐ¹Â¶¶à¹ú×Üͳ°²±£Ö°Ô±Î»ÖÃÐÅÏ¢

Ðû²¼Ê±¼ä 2024-10-31

1. Strava½¡ÉíÓ¦Óñ»ÆØÐ¹Â¶¶à¹ú×Üͳ°²±£Ö°Ô±Î»ÖÃÐÅÏ¢


10ÔÂ29ÈÕ£¬ £¬£¬£¬£¬£¬£¬£¬StravaÊÇÒ»¿îÈ«Çò¹ãÊܽӴýµÄ½¡ÉíÓ¦ÓóÌÐò£¬ £¬£¬£¬£¬£¬£¬£¬ÓµÓÐ1.2ÒÚÓû§£¬ £¬£¬£¬£¬£¬£¬£¬Äܹ»¼Í¼Åܲ½¡¢ÆïÐеÈÔ˶¯¹ì¼£¡£¡£¡£¡£¡£È»¶ø£¬ £¬£¬£¬£¬£¬£¬£¬·¨¹úýÌå¡¶Ììϱ¨¡··¢Ã÷£¬ £¬£¬£¬£¬£¬£¬£¬Strava±£´æÐ¹Â¶Ãô¸ÐλÖÃÐÅÏ¢µÄΣº¦£¬ £¬£¬£¬£¬£¬£¬£¬°üÀ¨ÃÀ¹ú×Üͳ¼°Æä¾ºÑ¡È˵ÄÌùÉí°²±£Ö°Ô±Î»Öᣡ£¡£¡£¡£¾Ý±¨µÀ£¬ £¬£¬£¬£¬£¬£¬£¬ÖÁÉÙ26ÃûÃÀ¹úÌØ¹¤ÔÚStravaÉÏÓµÓй«¹²ÕË»§£¬ £¬£¬£¬£¬£¬£¬£¬ÇÒÔÚÌØÀÊÆÕÔâÓöıº¦Î´ËìÊÂÎñºóÈÔ»îÔ¾ÓÚ¸ÃÆ½Ì¨¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬£¬·¨¹úºÍ¶íÂÞ˹µÄ×Üͳ°²±£Ö°Ô±Ò²±»·¢Ã÷ʹÓøÃÓ¦Ó㬠£¬£¬£¬£¬£¬£¬£¬Éæ¼°12Ãû·¨¹úGSPR³ÉÔ±ºÍ6Ãû¶íÂÞ˹FSO³ÉÔ±¡£¡£¡£¡£¡£ÕâЩÇå¾²Ö°Ô±ÔÚStravaÉϵÄÐж¯¿ÉÄܵ¼ÖÂÇå¾²Îó²î£¬ £¬£¬£¬£¬£¬£¬£¬ÓÉÓÚËûÃǵÄÔ˶¯¹ì¼£¿£¿£¿£¿£¿£¿ÉÄÜ̻¶Ïòµ¼ÈËÏÂ齺;ۻáËùÔÚµÄÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬£¬ÉõÖÁСÎÒ˽¼ÒÉúÑÄϸ½ÚÒ²¿ÉÄܱ»¶ñÒâʹÓᣡ£¡£¡£¡£Ö»¹ÜÃÀ¹úÌØÇھֺͷ¨¹ú×Üͳ¹Ù·½»ú¹¹¶Ô´Ë¾ÙÐÐÁË»ØÓ¦£¬ £¬£¬£¬£¬£¬£¬£¬³ÆÊ¹ÓÃStrava²»»á¶Ô°²±£Ðж¯×é³ÉÍþв£¬ £¬£¬£¬£¬£¬£¬£¬µ«´ËǰStravaÐû²¼µÄÈ«Çò½¡ÉíÈÈÇøÍ¼¾ÍÔøÌ»Â¶ÃÀ¾üÔÚÖж«µØÇøµÄÉñÃØ»î¶¯Î»Ö㬠£¬£¬£¬£¬£¬£¬£¬Òý·¢ÕùÒé¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬£¬½¡ÉíÓ¦ÓóÌÐòÊý¾Ý»¹¿ÉÄܱ»¹¥»÷ÕßÓÃÓÚ×·×ÙDZÔÚÊܺ¦Õߣ¬ £¬£¬£¬£¬£¬£¬£¬ÔöÌí¸ú×Ù¡¢ÇÀ½ÙµÈ·¸·¨Î£º¦¡£¡£¡£¡£¡£Òò´Ë£¬ £¬£¬£¬£¬£¬£¬£¬Ê¹ÓôËÀàÓ¦ÓÃʱÐèÉóÉ÷£¬ £¬£¬£¬£¬£¬£¬£¬×èֹй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£


https://cybernews.com/news/fitness-app-strava-location-biden-trump-harris/


2. Metaƽ̨Ôâ¶ñÒâ¹ã¸æ»î¶¯ÇÖÏ®£¬ £¬£¬£¬£¬£¬£¬£¬SYS01ÐÅÏ¢ÇÔÈ¡³ÌÐòÈ«ÇòËÁŰ


10ÔÂ30ÈÕ£¬ £¬£¬£¬£¬£¬£¬£¬Ò»ÏîеĶñÒâ¹ã¸æ»î¶¯ÕýÔÚʹÓà Meta ƽ̨Èö²¥ SYS01 ÐÅÏ¢ÇÔÈ¡³ÌÐò£¬ £¬£¬£¬£¬£¬£¬£¬¸Ã³ÌÐòרÃÅÕë¶Ô 45 ËêÒÔÉϵÄÄÐÐÔÓû§£¬ £¬£¬£¬£¬£¬£¬£¬Í¨¹ýαװ³ÉÊ¢ÐÐÈí¼þ¡¢ÓÎÏ·ºÍÔÚÏßЧÀ͵ÄÐéα¹ã¸æ¾ÙÐй¥»÷¡£¡£¡£¡£¡£¸Ã»î¶¯×Ô 2024 Äê 9 ÔÂÊ״α»·¢Ã÷ÒÔÀ´£¬ £¬£¬£¬£¬£¬£¬£¬ÒÑÔÚÈ«Çò¹æÄ£ÄÚÔì³ÉÆÕ±éÓ°Ï죬 £¬£¬£¬£¬£¬£¬£¬°üÀ¨Å·ÃË¡¢±±ÃÀ¡¢°Ä´óÀûÑǺÍÑÇÖ޵ȵØ¡£¡£¡£¡£¡£SYS01 ³ÌÐò»áÇÔÈ¡ Facebook ƾ֤£¬ £¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÖÎÀíÉÌÒµÒ³ÃæµÄÕË»§£¬ £¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÕâЩÕË»§½øÒ»²½Èö²¥¹¥»÷¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý MediaFire Á´½ÓÌṩ¿´ËÆÕýµ±µÄÈí¼þÏÂÔØ£¬ £¬£¬£¬£¬£¬£¬£¬ÕâЩÏÂÔØÄÚÈݰüÀ¨¶ñÒâµÄ Electron Ó¦ÓóÌÐò£¬ £¬£¬£¬£¬£¬£¬£¬Ò»µ©Ö´ÐУ¬ £¬£¬£¬£¬£¬£¬£¬¾Í»áÖ²Èë²¢ÔËÐÐ SYS01 ³ÌÐò¡£¡£¡£¡£¡£¸Ã³ÌÐòÁ¬ÏµÁË·´É³ºÐ¼ì²éÒÔÌӱܼì²â£¬ £¬£¬£¬£¬£¬£¬£¬²¢»áÌáÈ¡°üÀ¨½¹µã¶ñÒâÈí¼þ×é¼þµÄÊÜÃÜÂë±£»£»£»£»¤µÄ´æµµ¡£¡£¡£¡£¡£±»µÁÕË»§²»µ«ÓÃÓÚ½øÒ»²½¹¥»÷/Õ©Æ­£¬ £¬£¬£¬£¬£¬£¬£¬»¹±»ÓÃÀ´ÖÆ×÷жñÒâ¹ã¸æ£¬ £¬£¬£¬£¬£¬£¬£¬ÈƹýÇå¾²¹ýÂËÆ÷£¬ £¬£¬£¬£¬£¬£¬£¬ÐγÉÒ»¸ö×ÔÎÒά³ÖµÄÑ­»·¡£¡£¡£¡£¡£Òò´Ë£¬ £¬£¬£¬£¬£¬£¬£¬Óû§ÔÚ Facebook ÉÏ£¬ £¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇÔËÓªÉÌÒµÒ³ÃæµÄÓû§£¬ £¬£¬£¬£¬£¬£¬£¬±ØÐèСÐÄ´ËÀàÍþв¡£¡£¡£¡£¡£


https://hackread.com/fake-meta-ads-hijacking-facebook-sys01-infostealer/


3. ÃØÂ³InterbankÔâÊý¾Ýй¶£¬ £¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÉù³ÆÇÔÈ¡300Íò¿Í»§ÐÅÏ¢


10ÔÂ30ÈÕ£¬ £¬£¬£¬£¬£¬£¬£¬ÃØÂ³×ÅÃû½ðÈÚ»ú¹¹Interbank½üÆÚÔâÓöÊý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÈëÇÖÆäϵͳ²¢ÍµÈ¡Á˿ͻ§Êý¾Ý£¬ £¬£¬£¬£¬£¬£¬£¬ËæºóÔÚÍøÉϾÙÐÐй¶¡£¡£¡£¡£¡£Ö»¹ÜInterbankδ͸¶ÏêϸÊÜÓ°ÏìµÄ¿Í»§ÊýÄ¿£¬ £¬£¬£¬£¬£¬£¬£¬µ«Dark Web Informer·¢Ã÷£¬ £¬£¬£¬£¬£¬£¬£¬Ò»ÃûʹÓá°kzoldyck¡±Óû§ÃûµÄºÚ¿ÍÕýÔÚ¶à¸öÂÛ̳³öÊ۾ݳƴӸÃÒøÐÐÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¾ÝºÚ¿ÍÉù³Æ£¬ £¬£¬£¬£¬£¬£¬£¬ËûÃÇÄܹ»»ñÈ¡Interbank¿Í»§µÄÈ«Ãû¡¢ÕË»§ID¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãºÍIPµØµãµÈÃô¸ÐÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÐÅÓÿ¨ÐÅÏ¢¡¢ÒøÐÐÉúÒâÊý¾ÝµÈ£¬ £¬£¬£¬£¬£¬£¬£¬×ÜÁ¿Áè¼Ý3.7TB¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬£¬ºÚ¿Í»¹Éù³ÆÓµÓпͻ§µÄÃ÷È·Óû§ÃûºÍÃÜÂëÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ´ÓÃØÂ³IP¿é»á¼ûÒøÐÐÕË»§¡£¡£¡£¡£¡£ºÚ¿ÍÌåÏÖ£¬ £¬£¬£¬£¬£¬£¬£¬ËûÃÇÁ½ÖÜÇ°ÔøÊµÑéÓëInterbankÖÎÀí²ã̸Åе«Î´¹û£¬ £¬£¬£¬£¬£¬£¬£¬Òò´Ë¾öÒé¹ûÕæÐ¹Â¶Êý¾Ý¡£¡£¡£¡£¡£InterbankÒÑÈ·Èϱ¬·¢Êý¾Ýй¶£¬ £¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÒѰ²ÅÅÌØÊâÇå¾²²½·¥±£»£»£»£»¤¿Í»§ÐÅÏ¢ºÍÔËÓª£¬ £¬£¬£¬£¬£¬£¬£¬Í¬Ê±°ü¹Ü¿Í»§´æ¿îÇå¾²£¬ £¬£¬£¬£¬£¬£¬£¬²¢Ö¸³ö´ó´ó¶¼ÓªÒµÇþµÀÒѻָ´ÔÚÏß¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/interbank-confirms-data-breach-following-failed-extortion-data-leak/


4. ³¯ÏʺڿÍ×éÖ¯AndarielÉæÏÓ¼ÓÈëPlayÀÕË÷Èí¼þÐж¯²¢ÌÓ±ÜÖÆ²Ã


10ÔÂ30ÈÕ£¬ £¬£¬£¬£¬£¬£¬£¬³¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯Andariel±»×·×ÙÓëPlayÀÕË÷Èí¼þÐж¯ÓйØÁª£¬ £¬£¬£¬£¬£¬£¬£¬¾ÝPalo Alto Networks¼°ÆäUnit 42Ñо¿Ö°Ô±µÄ±¨¸æ³Æ£¬ £¬£¬£¬£¬£¬£¬£¬Andariel¿ÉÄÜÊÇPlayµÄÁ¥Êô»ú¹¹»ò³õʼ»á¼ûÊðÀí£¬ £¬£¬£¬£¬£¬£¬£¬Ð­ÖúÔÚÆäÈëÇÖµÄÍøÂçÉϰ²ÅŶñÒâÈí¼þ¡£¡£¡£¡£¡£AndarielÊÇÒ»¸öÊܳ¯ÏÊÕþ¸®Ö§³ÖµÄAPT×éÖ¯£¬ £¬£¬£¬£¬£¬£¬£¬Ó볯ÏʾüÊÂÇ鱨»ú¹¹Õì̽×ܾÖÓйØÁª£¬ £¬£¬£¬£¬£¬£¬£¬ÔøÒò¹¥»÷ÃÀ¹úÀûÒæ¶øÊܵ½ÃÀ¹úÖÆ²Ã¡£¡£¡£¡£¡£´Ëǰ£¬ £¬£¬£¬£¬£¬£¬£¬AndarielÒ²ÔøÓëMauiÀÕË÷Èí¼þÐж¯ÓйØ¡£¡£¡£¡£¡£ÔÚ2024Äê9ÔµÄÒ»´ÎPlayÀÕË÷Èí¼þÊÂÎñÏìÓ¦ÖУ¬ £¬£¬£¬£¬£¬£¬£¬Unit 42·¢Ã÷AndarielÔÚÆä¿Í»§µÄÊÜÑ¬È¾ÍøÂçÖл£¬ £¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¼¸¸öÔºóPlayÀÕË÷Èí¼þ²ÅÔÚÍøÂçÉÏÖ´ÐС£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪAndarielµÄ±£´æºÍPlayÔÚÍ³Ò»ÍøÂçÉϵݲÅÅÓйØÁª£¬ £¬£¬£¬£¬£¬£¬£¬µ«²»È·¶¨AndarielÊÇ·ñ³äµ±ÁËPlayÁ¥Êô»ú¹¹»òÏò¹¥»÷Õß³öÊÛÁËÊÜÑ¬È¾ÍøÂçµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£Í¨¹ýÓëÀÕË÷Èí¼þÍÅ»ïÏàÖú£¬ £¬£¬£¬£¬£¬£¬£¬AndarielµÃÒÔÌӱܹú¼ÊÖÆ²Ã£¬ £¬£¬£¬£¬£¬£¬£¬ÕâÖÖÕ½ÂÔÀàËÆÓÚ֮ǰÊܵ½ÖƲõĶíÂÞ˹ºÚ¿Í×éÖ¯Evil CorpºÍÒÁÀÊÍþвÐÐΪÕß¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-govt-hackers-linked-to-play-ransomware-attack/


5. Android°æFakeCall¶ñÒâÈí¼þÐ®ÖÆÒøÐе绰£¬ £¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Ãô¸ÐÐÅÏ¢


10ÔÂ30ÈÕ£¬ £¬£¬£¬£¬£¬£¬£¬Android°æFakeCall¶ñÒâÈí¼þµÄа汾ͨ¹ý½«×Ô¼ºÉèÖÃΪĬÈϺô½Ð´¦Öóͷ£³ÌÐò£¬ £¬£¬£¬£¬£¬£¬£¬Äܹ»Ð®ÖÆÓû§²¦´òÒøÐе绰µÄºô½Ð£¬ £¬£¬£¬£¬£¬£¬£¬²¢½«ÆäÖØ¶¨Ïòµ½¹¥»÷Õߵĵ绰ºÅÂë¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÒÔÓïÒôÍøÂç´¹ÂÚÎªÖØµã£¬ £¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÈËÃǵÄÃô¸ÐÐÅÏ¢ºÍÒøÐÐÕË»§×ʽ𡣡£¡£¡£¡£³ýÁËÓïÒôÍøÂç´¹ÂÚ£¬ £¬£¬£¬£¬£¬£¬£¬Ëü»¹Äܲ¶»ñʵʱÒôƵºÍÊÓÆµÁ÷¡£¡£¡£¡£¡£×îа汾µÄFakeCallÔöÌíÁ˶àÏîˢк͹¥»÷»úÖÆ£¬ £¬£¬£¬£¬£¬£¬£¬ÈçÀ¶ÑÀ¼àÌýÆ÷¡¢ÆÁĻ״̬¼àÊÓÆ÷ºÍ¸¨Öú¹¦Ð§Ð§ÀÍ£¬ £¬£¬£¬£¬£¬£¬£¬ÒÔ»ñµÃ¶ÔÓû§½çÃæµÄÆÕ±é¿ØÖÆ£¬ £¬£¬£¬£¬£¬£¬£¬²¢ÔÊÐí¹¥»÷ÕßÖ´ÐÐÖݪֲÙ×÷£¬ £¬£¬£¬£¬£¬£¬£¬Èç»ñȡװ±¸Î»Öá¢É¾³ýÓ¦ÓóÌÐò¡¢Â¼ÖÆÒôƵ»òÊÓÆµÒÔ¼°±à¼­ÁªÏµÈË¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹ÔÚÆð¾¢¿ª·¢ÖУ¬ £¬£¬£¬£¬£¬£¬£¬ÔöÌíÁ˽«¶ñÒâÈí¼þÉèÖÃΪĬÈϺô½Ð´¦Öóͷ£³ÌÐò¡¢ÊµÊ±²¥·Å×°±¸ÆÁÄ»ÄÚÈݵÈй¦Ð§¡£¡£¡£¡£¡£ZimperiumÐû²¼ÁËÈëÇÖÖ¸±êÁбíÒÔ×ÊÖúÓû§±Ü¿ª¶ñÒâÓ¦Ó㬠£¬£¬£¬£¬£¬£¬£¬µ«½¨ÒéÓû§´ÓGoogle Play×°ÖÃÓ¦ÓÃÒÔ×èֹΣº¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/android-malware-fakecall-now-reroutes-bank-calls-to-attackers/


6. EmeraldWhaleɨÃèGitÉèÖÃÎļþ£¬ £¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡15,000¸öÔÆÕÊ»§Æ¾Ö¤


10ÔÂ30ÈÕ£¬ £¬£¬£¬£¬£¬£¬£¬ÃûΪ¡°EmeraldWhale¡±µÄ´ó¹æÄ£¶ñÒâ²Ù×÷ʹÓÃ×Ô¶¯»¯¹¤¾ßɨÃè̻¶µÄGitÉèÖÃÎļþ£¬ £¬£¬£¬£¬£¬£¬£¬´ÓÊýǧ¸ö˽ÈË´æ´¢¿âÖÐÇÔÈ¡ÁËÁè¼Ý15,000¸öÔÆÕÊ»§Æ¾Ö¤¡£¡£¡£¡£¡£ÕâЩƾ֤±»ÓÃÓÚÏÂÔØ´æ´¢ÔÚGitHub¡¢GitLabºÍBitBucketÉϵĴ洢¿â£¬ £¬£¬£¬£¬£¬£¬£¬²¢½øÒ»²½É¨ÃèÒÔ»ñÈ¡¸ü¶àƾ֤¡£¡£¡£¡£¡£±»µÁÊý¾Ý±»Ð¹Â¶ÖÁÆäËûÊܺ¦ÕßµÄAmazon S3´æ´¢Í°ÖУ¬ £¬£¬£¬£¬£¬£¬£¬²¢±»ÓÃÓÚÍøÂç´¹ÂÚ¡¢À¬»øÓʼþ»î¶¯»òÖ±½Ó³öÊÛ¸øÆäËûÍøÂç·¸·¨·Ö×Ó¡£¡£¡£¡£¡£EmeraldWhale±³ºóµÄÍþвÐÐΪÕßʹÓÿªÔ´¹¤¾ßɨÃèÔ¼5ÒÚ¸öIPµØµãÉϵÄÍøÕ¾£¬ £¬£¬£¬£¬£¬£¬£¬ÌØÊâÊǼì²éLaravelÓ¦ÓóÌÐòÖеÄ/.git/configÎļþºÍÇéÐÎÎļþ(.env)ÊÇ·ñ̻¶¡£¡£¡£¡£¡£ÕâЩÎļþÖпÉÄܰüÀ¨APIÃÜÔ¿¡¢ÔÆÆ¾Ö¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£SysdigÊӲ쵽£¬ £¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÉÌÆ·¹¤¾ß¼¯¼ò»¯ÕâÒ»Á÷³Ì£¬ £¬£¬£¬£¬£¬£¬£¬²¢ÔÚ̻¶µÄS3´æ´¢Í°Öз¢Ã÷ÁË´ó×ÚÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬ £¬£¬£¬£¬£¬£¬£¬Õâ´Î»î¶¯ÒÀÀµÓÚÉÌÆ·¹¤¾ßºÍ×Ô¶¯»¯£¬ £¬£¬£¬£¬£¬£¬£¬µ«ÈÔÈ»ÀÖ³ÉÇÔÈ¡ÁËÊýǧ¸ö¿ÉÄܵ¼ÖÂÔÖÄÑÐÔÊý¾Ýй¶µÄÉñÃØ¡£¡£¡£¡£¡£Èí¼þ¿ª·¢Ö°Ô±Ó¦Ê¹ÓÃרÓõÄÉñÃØÖÎÀí¹¤¾ßÀ´½µµÍΣº¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-steal-15-000-cloud-credentials-from-exposed-git-config-files/