¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180620
Ðû²¼Ê±¼ä 2018-06-20


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷APT×éÖ¯Olympic DestroyerÕë¶ÔÅ·ÖÞµÄÐÂÄ¿µÄÌᳫ¹¥»÷
2018Äê5ÔÂÖÁ6Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷ÊôÓÚAPT×éÖ¯Olympic DestroyerµÄд¹ÂÚÎļþÑù±¾£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÏÖÔÚÕýÔÚÕë¶Ô¶íÂÞ˹µÄ½ðÈÚ»ú¹¹ºÍÅ·ÖÞµÄÉúÎïºÍ»¯Ñ§ÊµÑéÊÒ¡£¡£¡£¡£Olympic DestroyerÔøÔÚ2018Äê3ÔÂÕë¶Ôº«¹úƽ²ý¶¬°Â»áµÄ×éÖ¯Õß¡¢¹©Ó¦É̺ÍÏàÖúͬ°éÌᳫ¹¥»÷¡£¡£¡£¡£Ñо¿ÍŶÓÅû¶Á˸Ã×éÖ¯µÄй¥»÷»î¶¯µÄÏà¹ØIoC¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/olympic-destroyer-is-still-alive/86169/


¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±³ÆmacOSµÄQuickLook¹¦Ð§¿Éµ¼ÖÈÎÃüÜ´ÅÅ̵ÄÊý¾Ýй¶
Digita SecurityµÄÑо¿Ö°Ô±Patrick WardleÖÒÑÔ³ÆmacOSÓû§´æ´¢ÔÚ¼ÓÃÜ´ÅÅÌÉϵÄÊý¾Ý²¢Ã»ÓлñµÃºÜºÃµÄ±£»£»£»¤£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚmacOSµÄQuickLook¹¦Ð§¿ÉÒÔÉúÑÄͼƬµÈÎļþµÄÔ¤ÀÀ¡£¡£¡£¡£µ±Í¨¹ýUIÉó²éĿ¼ʱ£¬£¬£¬£¬£¬£¬£¬QuickLook½«×Ô¶¯½¨É軺ºÍ´æÎļþµÄËõÂÔͼ£¬£¬£¬£¬£¬£¬£¬ÕâЩËõÂÔͼÉúÑÄÔÚSQLiteÊý¾Ý¿âÖУ¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ýÏà¹ØÏÂÁî¾ÙÐÐÌáÈ¡¡£¡£¡£¡£×ÝÈ»ÔʼÎļþ±»É¾³ý£¬£¬£¬£¬£¬£¬£¬ÕâЩ»º´æÒÀ¾É±£´æ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/macos-quicklook-feature-leaks-data-despite-encrypted-drive/132905/


¡¾ÀÕË÷Èí¼þ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚÀÕË÷Èí¼þSamSamµÄбäÌåµÄÆÊÎö±¨¸æ
Malwarebytes LabsÑо¿ÍŶÓÐû²¼¹ØÓÚSamSamµÄбäÌåµÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þSamSamµÄÓÐÓúÉÔØ£¨ÏÖʵִÐдÅÅ̼ÓÃܵĴúÂ룩ÊÇÔËÐÐʱ½âÃܵ쬣¬£¬£¬£¬£¬£¬ÐèÒª¹¥»÷ÕßÊÖ¶¯ÊäÈëÃÜÂëÀ´Ö´Ðй¥»÷£¬£¬£¬£¬£¬£¬£¬ÕâÊÇSamSamµÄÌØÕ÷¡£¡£¡£¡£¸ÃÌØÕ÷ʹµÃSamSam²»»á×ÔÐÐÈö²¥£¬£¬£¬£¬£¬£¬£¬ÒâÍâÏÂÔØºÍÖ´ÐиöñÒâÈí¼þµÄÓû§²»»áÊܵ½Î£ÏÕ£¬£¬£¬£¬£¬£¬£¬ÕâÒ²ÒâζÕßSamSamÖ÷ÒªÓÃÓÚÓÐÕë¶ÔÐԵĹ¥»÷¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.malwarebytes.com/threat-analysis/2018/06/samsam-ransomware-controlled-distribution/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔAndroidµÄжñÒâÈí¼þHeroRat
ESETÑо¿ÍŶӷ¢Ã÷Ò»¸öеÄAndroid Rat¼Ò×åHeroRat£¬£¬£¬£¬£¬£¬£¬¸ÃRat¼Ò×åÖÁÉÙ´Ó2017Äê8ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬£¬Ö÷ҪʹÓÃTelegramÐÒé¾ÙÐÐÏÂÁîºÍ¿ØÖÆÒÔ¼°Êý¾Ýй¶¡£¡£¡£¡£HeroRatͨ¹ý¶àÖÖ·½·¨Èö²¥£¬£¬£¬£¬£¬£¬£¬°üÀ¨µÚÈý·½Ó¦ÓÃÊÐËÁ¡¢É罻ýÌåºÍ̸ÌìÓ¦Óᣡ£¡£¡£HeroRatÖ÷ÒªÕë¶ÔÒÁÀÊ£¬£¬£¬£¬£¬£¬£¬ÆäÌØ¹¤¹¦Ð§°üÀ¨×èµ²Îı¾ÐÂÎźÍÁªÏµÈËÐÅÏ¢¡¢·¢ËͶÌÐÅ¡¢²¦´òµç»°¡¢Â¼ÖÆÉùÒôºÍÆÁÄ»¡¢»ñȡװ±¸Î»ÖÃÒÔ¼°ÐÞ¸ÄϵͳÉèÖᣡ£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.welivesecurity.com/2018/06/18/new-telegram-abusing-android-rat/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷ÕýÔÚ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius
Check PointµÄÑо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÕýÔÚ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius£¬£¬£¬£¬£¬£¬£¬¸ÃľÂíͨ¹ýRIG Exploit Kit¾ÙÐзַ¢£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÖ´ÐÐweb×¢Èë¹¥»÷½«ÌØÁíÍâ×Ö¶ÎÌí¼Óµ½ÒøÐеÄÕýµ±µÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬£¬£¬²¢½«Óû§ÊäÈëµÄÐÅÏ¢·¢Ë͸ø¹¥»÷Õß¡£¡£¡£¡£KariusÓÉÈý¸öÎļþ×é³É£¬£¬£¬£¬£¬£¬£¬°üÀ¨injector32\64.exe¡¢proxy32\64.dllºÍmod32\64.dll£¬£¬£¬£¬£¬£¬£¬ÕâÈý¸öÎļþÅäÊÊÓÃÓÚ×èµ²Óû§µÄͨѶ£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¶ñÒâÈí¼þËÆºõÈÔ´¦ÓÚ¿ª·¢»ò²âÊÔ״̬£¬£¬£¬£¬£¬£¬£¬ÕâÒ²ÊÇΪʲôÆäÉÐδÕë¶ÔÈκÎÏêϸµÄ½ðÈÚ»ú¹¹¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://research.checkpoint.com/banking-trojans-development/


¡¾Çå¾²²¥±¨¡¿Ç°CIA¹ÍÔ±±»Ö¸¿ØÏòWikiLeaksй¶Vault 7ϵÁеÄCIAºÚ¿Í¹¤¾ß
ÃÀ¹ú˾·¨²¿Ðû²¼¶ÔǰCIAÈí¼þ¹¤³ÌʦJoshua SchulteÌá³öеÄÖ¸¿Ø£¬£¬£¬£¬£¬£¬£¬³ÆÆäÉæÏÓÏòWikiLeaksй¶CIAÉñÃØÎļþ¡¢Èí¼þÏîÄ¿ºÍºÚ¿Í¹¤¾ß¡£¡£¡£¡£ÕâЩйÃÜÄÚÈݱ»³ÆÎªVault 7ϵÁУ¬£¬£¬£¬£¬£¬£¬ËüÏÔʾÁËCIAÔõÑùʹÓúڿ͹¤¾ßÀ´¼à¿ØÅÌËã»ú¡¢ÊÖ»ú¡¢µçÊÓ¡¢ÍøÂçÉãÏñÍ·ºÍSSLÅþÁ¬µÈ¡£¡£¡£¡£Âü¹þ¶ÙÉó²é¹ÙGeoffrey S. Berman³Æ£¬£¬£¬£¬£¬£¬£¬ÕâÖÖ²»·¨Ð¹ÃÜ¿ÉÄܶԹú¼ÒÇå¾²Ôì³ÉÑÏÖØµÄÍþв£¬£¬£¬£¬£¬£¬£¬Ç±ÔÚµØÎ£¼°ÃÀ¹úÈËÃñµÄÇå¾²¡£¡£¡£¡£


¾©¹«Íø°²±¸11010802024551ºÅ