¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180621

Ðû²¼Ê±¼ä 2018-06-21

¡¾ÆÊÎö±¨¸æ¡¿Ñо¿»ú¹¹Ðû²¼2018ÄêQ1±±ÃÀÍøÂçÍþвÇ÷ÊÆµÄÆÊÎö±¨¸æ


Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶÓÐû²¼2018ÄêµÚÒ»¼¾¶ÈµÄ±±ÃÀÍþвÇ÷ÊÆ±¨¸æ£¬£¬ £¬£¬£¬£¬£¬£¬±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£ºÐÅÏ¢ÇÔÈ¡Àà¶ñÒâÈí¼þÈÔÈ»Êǵ±½ñ×îÊ¢ÐеĶñÒâÈí¼þÖ®Ò»£»£»£»Ö»¹ÜÀÕË÷Èí¼þ¹¥»÷µÄÊýÄ¿ÓÐËùϽµ£¬£¬ £¬£¬£¬£¬£¬£¬ÆäÈÔÈ»ÊǼì²âÊýÄ¿×î¶àµÄÍþв£»£»£»¶ñÒâÍÚ¿óÈí¼þµÄÈȶÈÈÔÈ»ºÜ¸ß ¡£¡£¡£¡£¡£´¹ÂÚÓʼþºÍ¶ñÒâÍøÕ¾³ÉΪÖ÷ÒªµÄÈö²¥Ç°ÑÔ ¡£¡£¡£¡£¡£ÌØÊâÊÇ´¹ÂÚÓʼþ£¬£¬ £¬£¬£¬£¬£¬£¬Æä¾ßÓмòÆÓÐÔºÍÓÐÓÃÐÔ£¬£¬ £¬£¬£¬£¬£¬£¬Òò´ËÔÚÍøÂç·¸·¨·Ö×ÓÖÐÆÕ±éʹÓà ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://documents.trendmicro.com/assets/proactive-incident-response-north-america-threat-landscape-2018-q1.pdf


¡¾¹¥»÷ÊÂÎñ¡¿º«¹ú¼ÓÃÜÇ®±ÒÉúÒâËùBithumbÒ»ÄêÄÚµÚ¶þ´ÎÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬£¬Ô¼3100ÍòÃÀÔª±»ÇÔ


ƾ֤º«¹ú¼ÓÃÜÇ®±ÒÉúÒâËùBithumbµÄÉùÃ÷£¬£¬ £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ6ÔÂ19ÈÕÖÁ20ÈÕµÄÒ¹¼äÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬£¬£¬£¬¼ÛÖµÔ¼350ÒÚº«Ôª£¨3160ÍòÃÀÔª£©µÄ¼ÓÃÜÇ®±Ò±»ÇÔ ¡£¡£¡£¡£¡£BithumbûÓÐ͸¶¹ØÓڴ˴ι¥»÷µÄ¸ü¶àϸ½Ú£¬£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ºÚ¿ÍÔõÑù½øÈëϵͳºÍÔõÑùÇÔÈ¡×ʽ𠡣¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÍýÏëʹÓô¢±¸»ù½ðÀ´Åâ³¥ÊÜËðʧµÄÓû§ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bithumb-hacked-second-time-in-a-year-hackers-steal-31-million/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÈÕ±¾ºÍº«¹úµÄAndroid¶ñÒâÈí¼þFakeSpy


Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Ò»¸öеÄAndroid¶ñÒâÈí¼þFakeSpy£¬£¬ £¬£¬£¬£¬£¬£¬FakeSpyͨ¹ýSMS¶ÌОÙÐÐÈö²¥£¬£¬ £¬£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚÇÔÈ¡ÊÜѬȾװ±¸µÄ¶ÌÐÅ¡¢ÕË»§¡¢ÁªÏµÈ˺Íͨ»°¼Í¼µÈÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬£¬»¹¿ÉÒÔÓÃÓÚ·Ö·¢ÒøÐÐľÂí ¡£¡£¡£¡£¡£FakeSpyÏÖÔÚÖ÷ÒªÕë¶ÔÈÕ±¾ºÍº«¹ú£¬£¬ £¬£¬£¬£¬£¬£¬µ«Ò²ÓпÉÄÜ»áÀ©Õ¹Æä¹¥»÷¹æÄ£ ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/fakespy-android-information-stealing-malware-targets-japanese-and-korean-speaking-users/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿Ö°Ô±ÔÚºÚ¿ÍÂÛ̳ÉÏ·¢Ã÷жñÒâÈí¼þKardon Loader


Çå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¿îеĶñÒâÈí¼þKardon Loader£¬£¬ £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÔÚºÚ¿ÍÂÛ̳ÉÏÒÔ50ÃÀÔªµÄ¼ÛÇ®³öÊÛ£¬£¬ £¬£¬£¬£¬£¬£¬²¢Ö§³Ö±ÈÌØ±ÒÖ§¸¶ ¡£¡£¡£¡£¡£Kardon LoaderÏÖÔÚ»¹´¦ÓÚ¿ª·¢½×¶Î£¬£¬ £¬£¬£¬£¬£¬£¬ËüÊÇÒ»ÖÖ¶ñÒâÈí¼þ¼ÓÔØ³ÌÐò£¬£¬ £¬£¬£¬£¬£¬£¬Í¨³£×÷ΪµÚÒ»½×¶Î¶ñÒâÈí¼þ¾ÙÐа²ÅÅ£¬£¬ £¬£¬£¬£¬£¬£¬ÓÃÓÚѬȾĿµÄ²¢»ñÈ¡³¤ÆÚÐÔ£¬£¬ £¬£¬£¬£¬£¬£¬½ø¶øÏÂÔØºÍ×°Öõڶþ½×¶ÎµÄÓÐÓúÉÔØ£¨ÒøÐÐľÂí¡¢ÀÕË÷Èí¼þµÈ£© ¡£¡£¡£¡£¡£Kardon LoaderµÄ¿ª·¢ÕßYattaze·ÅÆúÁË֮ǰµÄÒ»¸öÀàËÆµÄÏîÄ¿ZeroCool£¬£¬ £¬£¬£¬£¬£¬£¬×ª¶øÊ¹ÓÃÆä´úÂëÀ´¿ª·¢Kardon Loader ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hacking-forum-ad-peddles-new-kardon-loader-malware/


¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±ÖÒÑԳƴ¹ÂÚÓʼþ¿Éͨ¹ýZeroFontÊÖÒÕÈÆ¹ýOffice 365µÄ±£»£»£»¤


AvananµÄÇå¾²Ñо¿Ö°Ô±ÖÒÑÔ³ÆÍøÂç·¸·¨·Ö×ÓÕýÔÚʹÓÃZeroFontÊÖÒÕÀ´Èƹý´ó´ó¶¼µç×ÓÓʼþЧÀ͵Ĵ¹ÂÚ¼ì²â»úÖÆ ¡£¡£¡£¡£¡£¸ÃÊÖÒÕÉæ¼°ÔÚ´¹ÂÚÓʼþµÄÄÚÈÝÖвåÈë×ÖÌå¾ÞϸΪ0µÄÒþ²ØÎÄ×Ö£¬£¬ £¬£¬£¬£¬£¬£¬Ê¹ÆäÊÓ¾õÍâ¹ÛÎȹÌ£¬£¬ £¬£¬£¬£¬£¬£¬Í¬Ê±¿ÉÈÆ¹ýµç×ÓÓʼþµÄÇ徲ɨÃè³ÌÐò ¡£¡£¡£¡£¡£¸Ã¹«Ë¾³ÆMicrosoft Office 365Ò²²»¿É¼ì²â³öͨ¹ýZeroFontÊÖÒÕÖÆ×÷µÄ¶ñÒâÓʼþ ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/06/email-phishing-protection.html


¡¾Îó²î²¹¶¡¡¿Ñо¿ÍŶÓÅû¶Insteon HubÖеĶà¸ö¿Éµ¼ÖÂRCEºÍDoSµÄÇå¾²Îó²î


˼¿ÆTalosÑо¿ÍŶÓÅû¶Insteon HubÖеÄ12¸öÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨Ô¶³Ì´úÂëÖ´Ðк;ܾøÐ§ÀÍµÈ ¡£¡£¡£¡£¡£Insteon HubÊÇÒ»ÆäÖÐÑë¿ØÖÆÆ÷£¬£¬ £¬£¬£¬£¬£¬£¬¿ÉÔÊÐíÓû§Í¨¹ýÊÖ»úÔ¶³ÌÅþÁ¬ºÍÖÎÀíÆä¼ÒÖеÄ×°±¸ ¡£¡£¡£¡£¡£´ó²¿·ÖÎó²îµÄȪԴÊDz»Çå¾²µØÊ¹ÓÃÁËstrcpy()º¯Êý£¬£¬ £¬£¬£¬£¬£¬£¬µ¼Ö»º³åÇøÒç³ö ¡£¡£¡£¡£¡£ÏêϸÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.talosintelligence.com/2018/06/multiple-vuln-insteon.html