¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180620

Ðû²¼Ê±¼ä 2018-06-20

¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷APT×éÖ¯Olympic DestroyerÕë¶ÔÅ·ÖÞµÄÐÂÄ¿µÄÌᳫ¹¥»÷


2018Äê5ÔÂÖÁ6Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷ÊôÓÚAPT×éÖ¯Olympic DestroyerµÄд¹ÂÚÎļþÑù±¾ £¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÏÖÔÚÕýÔÚÕë¶Ô¶íÂÞ˹µÄ½ðÈÚ»ú¹¹ºÍÅ·ÖÞµÄÉúÎïºÍ»¯Ñ§ÊµÑéÊÒ¡£¡£¡£¡£Olympic DestroyerÔøÔÚ2018Äê3ÔÂÕë¶Ôº«¹úƽ²ý¶¬°Â»áµÄ×éÖ¯Õß¡¢¹©Ó¦É̺ÍÏàÖúͬ°éÌᳫ¹¥»÷¡£¡£¡£¡£Ñо¿ÍŶÓÅû¶Á˸Ã×éÖ¯µÄй¥»÷»î¶¯µÄÏà¹ØIoC¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/olympic-destroyer-is-still-alive/86169/


¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±³ÆmacOSµÄQuickLook¹¦Ð§¿Éµ¼ÖÈÎÃüÜ´ÅÅ̵ÄÊý¾Ýй¶


Digita SecurityµÄÑо¿Ö°Ô±Patrick WardleÖÒÑÔ³ÆmacOSÓû§´æ´¢ÔÚ¼ÓÃÜ´ÅÅÌÉϵÄÊý¾Ý²¢Ã»ÓлñµÃºÜºÃµÄ±£»£»£»¤ £¬£¬£¬£¬£¬£¬£¬ÓÉÓÚmacOSµÄQuickLook¹¦Ð§¿ÉÒÔÉúÑÄͼƬµÈÎļþµÄÔ¤ÀÀ¡£¡£¡£¡£µ±Í¨¹ýUIÉó²éĿ¼ʱ £¬£¬£¬£¬£¬£¬£¬QuickLook½«×Ô¶¯½¨É軺ºÍ´æÎļþµÄËõÂÔͼ £¬£¬£¬£¬£¬£¬£¬ÕâЩËõÂÔͼÉúÑÄÔÚSQLiteÊý¾Ý¿âÖÐ £¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ýÏà¹ØÏÂÁî¾ÙÐÐÌáÈ¡¡£¡£¡£¡£×ÝȻԭʼÎļþ±»É¾³ý £¬£¬£¬£¬£¬£¬£¬ÕâЩ»º´æÒÀ¾É±£´æ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/macos-quicklook-feature-leaks-data-despite-encrypted-drive/132905/


¡¾ÀÕË÷Èí¼þ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚÀÕË÷Èí¼þSamSamµÄбäÌåµÄÆÊÎö±¨¸æ


Malwarebytes LabsÑо¿ÍŶÓÐû²¼¹ØÓÚSamSamµÄбäÌåµÄÆÊÎö±¨¸æ £¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þSamSamµÄÓÐÓúÉÔØ£¨ÏÖʵִÐдÅÅ̼ÓÃܵĴúÂ룩ÊÇÔËÐÐʱ½âÃÜµÄ £¬£¬£¬£¬£¬£¬£¬ÐèÒª¹¥»÷ÕßÊÖ¶¯ÊäÈëÃÜÂëÀ´Ö´Ðй¥»÷ £¬£¬£¬£¬£¬£¬£¬ÕâÊÇSamSamµÄÌØÕ÷¡£¡£¡£¡£¸ÃÌØÕ÷ʹµÃSamSam²»»á×ÔÐÐÈö²¥ £¬£¬£¬£¬£¬£¬£¬ÒâÍâÏÂÔØºÍÖ´ÐиöñÒâÈí¼þµÄÓû§²»»áÊܵ½Î£ÏÕ £¬£¬£¬£¬£¬£¬£¬ÕâÒ²ÒâζÕßSamSamÖ÷ÒªÓÃÓÚÓÐÕë¶ÔÐԵĹ¥»÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://blog.malwarebytes.com/threat-analysis/2018/06/samsam-ransomware-controlled-distribution/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔAndroidµÄжñÒâÈí¼þHeroRat


ESETÑо¿ÍŶӷ¢Ã÷Ò»¸öеÄAndroid Rat¼Ò×åHeroRat £¬£¬£¬£¬£¬£¬£¬¸ÃRat¼Ò×åÖÁÉÙ´Ó2017Äê8ÔÂ×îÏÈ»îÔ¾ £¬£¬£¬£¬£¬£¬£¬Ö÷ҪʹÓÃTelegramЭÒé¾ÙÐÐÏÂÁîºÍ¿ØÖÆÒÔ¼°Êý¾Ýй¶¡£¡£¡£¡£HeroRatͨ¹ý¶àÖÖ·½·¨Èö²¥ £¬£¬£¬£¬£¬£¬£¬°üÀ¨µÚÈý·½Ó¦ÓÃÊÐËÁ¡¢É罻ýÌåºÍ̸ÌìÓ¦Óᣡ£¡£¡£HeroRatÖ÷ÒªÕë¶ÔÒÁÀÊ £¬£¬£¬£¬£¬£¬£¬ÆäÌØ¹¤¹¦Ð§°üÀ¨×èµ²Îı¾ÐÂÎźÍÁªÏµÈËÐÅÏ¢¡¢·¢ËͶÌÐÅ¡¢²¦´òµç»°¡¢Â¼ÖÆÉùÒôºÍÆÁÄ»¡¢»ñȡװ±¸Î»ÖÃÒÔ¼°ÐÞ¸ÄϵͳÉèÖᣡ£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.welivesecurity.com/2018/06/18/new-telegram-abusing-android-rat/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷ÕýÔÚ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius


Check PointµÄÑо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÕýÔÚ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius £¬£¬£¬£¬£¬£¬£¬¸ÃľÂíͨ¹ýRIG Exploit Kit¾ÙÐзַ¢ £¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÖ´ÐÐweb×¢Èë¹¥»÷½«ÌØÁíÍâ×Ö¶ÎÌí¼Óµ½ÒøÐеÄÕýµ±µÇÂ¼Ò³Ãæ £¬£¬£¬£¬£¬£¬£¬²¢½«Óû§ÊäÈëµÄÐÅÏ¢·¢Ë͸ø¹¥»÷Õß¡£¡£¡£¡£KariusÓÉÈý¸öÎļþ×é³É £¬£¬£¬£¬£¬£¬£¬°üÀ¨injector32\64.exe¡¢proxy32\64.dllºÍmod32\64.dll £¬£¬£¬£¬£¬£¬£¬ÕâÈý¸öÎļþÅäÊÊÓÃÓÚ×èµ²Óû§µÄͨѶ £¬£¬£¬£¬£¬£¬£¬µ«¸Ã¶ñÒâÈí¼þËÆºõÈÔ´¦ÓÚ¿ª·¢»ò²âÊÔ״̬ £¬£¬£¬£¬£¬£¬£¬ÕâÒ²ÊÇΪʲôÆäÉÐδÕë¶ÔÈκÎÏêϸµÄ½ðÈÚ»ú¹¹¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://research.checkpoint.com/banking-trojans-development/


¡¾Çå¾²²¥±¨¡¿Ç°CIA¹ÍÔ±±»Ö¸¿ØÏòWikiLeaksй¶Vault 7ϵÁеÄCIAºÚ¿Í¹¤¾ß


ÃÀ¹ú˾·¨²¿Ðû²¼¶ÔǰCIAÈí¼þ¹¤³ÌʦJoshua SchulteÌá³öеÄÖ¸¿Ø £¬£¬£¬£¬£¬£¬£¬³ÆÆäÉæÏÓÏòWikiLeaksй¶CIAÉñÃØÎļþ¡¢Èí¼þÏîÄ¿ºÍºÚ¿Í¹¤¾ß¡£¡£¡£¡£ÕâЩйÃÜÄÚÈݱ»³ÆÎªVault 7ϵÁÐ £¬£¬£¬£¬£¬£¬£¬ËüÏÔʾÁËCIAÔõÑùʹÓúڿ͹¤¾ßÀ´¼à¿ØÅÌËã»ú¡¢ÊÖ»ú¡¢µçÊÓ¡¢ÍøÂçÉãÏñÍ·ºÍSSLÅþÁ¬µÈ¡£¡£¡£¡£Âü¹þ¶ÙÉó²é¹ÙGeoffrey S. Berman³Æ £¬£¬£¬£¬£¬£¬£¬ÕâÖÖ²»·¨Ð¹ÃÜ¿ÉÄܶԹú¼ÒÇå¾²Ôì³ÉÑÏÖØµÄÍþв £¬£¬£¬£¬£¬£¬£¬Ç±ÔÚµØÎ£¼°ÃÀ¹úÈËÃñµÄÇå¾²¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/government/ex-cia-employee-charged-with-leak-of-classified-cia-vault-7-hacking-tools/