¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180803

Ðû²¼Ê±¼ä 2018-08-03

¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔMikroTik·ÓÉÆ÷µÄ´ó¹æÄ£¶ñÒâÍÚ¿ó¹¥»÷


Çå¾²Ñо¿Ö°Ô±Simon Kenin·¢Ã÷Ò»¸öÕë¶ÔMikroTik·ÓÉÆ÷µÄ´ó¹æÄ£¶ñÒâÍÚ¿ó¹¥»÷¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯×î³õÖ÷ÒªÕë¶Ô°ÍÎ÷£¬£¬£¬£¬£¬ £¬£¬Ñ¬È¾ÁËÔ¼7.2Íǫ̀MikroTik·ÓÉÆ÷£¬£¬£¬£¬£¬ £¬£¬Ëæºó×îÏÈÕë¶ÔÈ«ÇòµÄMikroTik·ÓÉÆ÷£¬£¬£¬£¬£¬ £¬£¬ÏÖÔÚÊÜÓ°ÏìµÄ·ÓÉÆ÷ÒÑÁè¼Ý20Íǫ̀¡£¡£¡£¡£KeninÌåÏÖ¹¥»÷ÕßʹÓÃÁË4Ô·ݷ¢Ã÷µÄMikroTik·ÓÉÆ÷ÁãÈÕÎó²î£¬£¬£¬£¬£¬ £¬£¬Ð®ÖÆÓû§µÄÁ÷Á¿²¢ÔÚͨ¹ý·ÓÉÆ÷µÄÍøÕ¾Ò³ÃæÖÐ×¢ÈëCoinhiveÍÚ¿ó¾ç±¾¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/massive-coinhive-cryptojacking-campaign-touches-over-200-000-mikrotik-routers/


¡¾ÍþвÇ鱨¡¿CCleanerÌíÔöÇ¿ÖÆÐÔµÄÊý¾ÝÍøÂ繦Ч£¬£¬£¬£¬£¬ £¬£¬Òý·¢¶ÔÓû§Òþ˽±£»£»£»£»£»¤µÄµ£ÐÄ


AvastÔÚCCleanerµÄа汾5.45ÖÐÌí¼ÓÁËÇ¿ÖÆÐÔµÄϵͳÊý¾ÝÍøÂ繦Ч£¬£¬£¬£¬£¬ £¬£¬²¢ÇÒÓû§ÎÞ·¨¹Ø±Õ¸Ã¹¦Ð§¡£¡£¡£¡£CCleanerÊÇÒ»¸ö×ÊÖúÓû§ÕûÀí×°±¸À¬»øÎļþÒÔÓÅ»¯ºÍÔöÇ¿ÐÔÄܵÄС¹¤¾ß£¬£¬£¬£¬£¬ £¬£¬ÆäÏÂÔØÁ¿´ï20ÒÚ¡£¡£¡£¡£CCleaner 5.45µÄ¼à¿Ø¹¦Ð§ÔÊÐíÆä½«ÍøÂçµÄϵͳʹÓÃÊý¾Ý·¢»Ø¹«Ë¾µÄЧÀÍÆ÷£¬£¬£¬£¬£¬ £¬£¬²¢Ã¿12Сʱ·¢ËÍÒ»´ÎÐÄÌø¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬CCleanerµÄÒþ˽Õþ²ß»¹ÌåÏÖËü¿ÉÒÔÓëµÚÈý·½¹«Ë¾¹²ÏíÍøÂçµÄÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬ÕâÒý·¢Á˶ÔÓû§Òþ˽±£»£»£»£»£»¤µÄµ£ÐÄ¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/ccleaner-software-download.html


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚÍøÂç·¸·¨ÍÅ»ïGorgonµÄÆÊÎö±¨¸æ


´Ó2018Äê2ÔÂ×îÏÈ£¬£¬£¬£¬£¬ £¬£¬Palo Alto NetworksµÄUnit 42Ñо¿ÍŶӼì²âµ½ÍøÂç·¸·¨ÍÅ»ïGorgonÕë¶ÔÓ¢¹ú¡¢Î÷°àÑÀ¡¢¶íÂÞ˹ºÍÃÀ¹úµÄÕþ¸®»ú¹¹µÄ¹¥»÷»î¶¯¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬£¬ÔÚ´Ëʱ´úGorgonµÄ³ÉÔ±»¹Ê¹ÓÃÕâЩ¹²ÏíµÄ»ù´¡ÉèÊ©ÔÚÈ«Çò¹æÄ£ÄÚÌᳫÓÐÕë¶ÔÐԵĹ¥»÷»î¶¯¡£¡£¡£¡£³ýÁËʹÓùŰåµÄÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷Ö®Í⣬£¬£¬£¬£¬ £¬£¬Gorgon»¹Ê¹Óó£¼ûµÄURL¶ÌÁ´½ÓЧÀÍÀ´·Ö·¢ÓÐÓúÉÔØ£¬£¬£¬£¬£¬ £¬£¬ÕâҲΪÎÒÃÇÌṩÁ˵ã»÷´ÎÊýºÍͳ¼ÆÊý¾ÝµÄÁбí¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/08/unit42-gorgon-group-slithering-nation-state-cybercrime/


¡¾ÍþвÇ鱨¡¿Ñо¿»ú¹¹ÖÒÑÔ³ÆÒÁÀÊAPT×éÖ¯RASPITEÕýÔÚÃé×¼ÃÀ¹úµçÁ¦¹«Ë¾


ƾ֤Dragos¹«Ë¾µÄÑо¿£¬£¬£¬£¬£¬ £¬£¬ÒÁÀÊAPT×éÖ¯RASPITEÒ»Ö±ÔÚÕë¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢Öж«ºÍ¶«ÑǵØÇøµÄÆóÒµ¡£¡£¡£¡£¸Ã×éÖ¯ÖÁÉÙ´Ó2017ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¡£¡£¡£Dragos¼ì²âµ½¸Ã×éÖ¯Õë¶ÔµçÁ¦¹«ÓÃÊÂÒµµÄй¥»÷»î¶¯£¬£¬£¬£¬£¬ £¬£¬Õâ¸ö»î¶¯ÏÖÔÚÖ÷ÒªÕë¶ÔÃÀ¹ú¡£¡£¡£¡£Dragos³ÆÏÖÔÚûÓм£ÏóÅú×¢¸Ã×éÖ¯¾ßÓÐÌá³«ÆÆËðÐÔµÄICS¹¥»÷µÄÄÜÁ¦£¨ÀýÈçÎÚ¿ËÀ¼ÄÇÑùµÄ´ó¹æÄ£Í£µç£©¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75006/apt/raspite-rgets-us-electric-utilities.html


¡¾Ö´ÂÉÀýÔò¡¿ÃÀ˾·¨²¿¶Ô·¸·¨ÍÅ»ïFIN7µÄ3Ãû³ÉÔ±Ìá³ö26Ïî·¸·¨Ö¸¿Ø


±¾ÖÜÈýÃÀ¹ú˾·¨²¿Ðû²¼¶ÔÍøÂç·¸·¨ÍÅ»ïFIN7µÄÈýÃû³ÉÔ±Ìá³ö26Ïî·¸·¨Ö¸¿Ø£¬£¬£¬£¬£¬ £¬£¬ÉæÏÓÕ©Æ­¡¢µç×Óڲƭ¡¢ÈëÇÖÅÌËã»úϵͳºÍÉí·Ý͵ÇԵȡ£¡£¡£¡£FIN7¼¯ÍÅÖ÷ÒªÕë¶ÔPoS»úϵͳ£¬£¬£¬£¬£¬ £¬£¬ÔøÈëÇÖ47¸öÖݵÄ3600¸öÁ¬ËøÃŵ꣬£¬£¬£¬£¬ £¬£¬´Ó6500¶à¸öPoS»úÖÐÇÔÈ¡Áè¼Ý1500ÍòÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£ÕâÈýÃûÏÓ·¸»®·ÖÊÇ44ËêµÄDmytro Fedorov¡¢33ËêµÄFedir HladyrºÍ30ËêµÄAndrii Kopakov£¬£¬£¬£¬£¬ £¬£¬ËûÃÇÓÚÈ¥Äê1ÔÂÖÁ6ÔÂʱ´úÔÚÅ·ÖÞ±»²¶¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/fin7-carbanak-cobalt-hackers.html


¡¾Îó²î²¹¶¡¡¿Î¢ÈíÐÞ¸´Edgeä¯ÀÀÆ÷ÖеÄÒ»¸ö¿Éµ¼ÖÂÎļþÇÔÈ¡µÄÇå¾²Îó²î


΢ÈíÐÞ¸´Edgeä¯ÀÀÆ÷ÖеÄÒ»¸ö¿Éµ¼ÖÂÎļþÇÔÈ¡µÄÇå¾²Îó²î£¬£¬£¬£¬£¬ £¬£¬¸ÃÎó²îÓëä¯ÀÀÆ÷ÖеÄͬԴսÂÔ£¨SOP£©¹¦Ð§ÓйØ¡£¡£¡£¡£NetsparkerÇå¾²Ñо¿Ô±Ziyahan Albeniz·¢Ã÷µ±Óû§ÏÂÔØ²¢ÔËÐжñÒâµÄHTMLÎļþʱ£¬£¬£¬£¬£¬ £¬£¬¶ñÒâ´úÂ뽫ͨ¹ýfile://ЭÒé¼ÓÔØ£¬£¬£¬£¬£¬ £¬£¬²¢ÍøÂçºÍÇÔÈ¡¿É»á¼ûµÄÍâµØÎļþ¡£¡£¡£¡£Ñо¿Ö°Ô±Ðû²¼Á˸ù¥»÷µÄÑéÖ¤ÊÓÆµ£¬£¬£¬£¬£¬ £¬£¬²¢ÖÒÑÔÓû§²»ÒªÔËÐÐδ֪ȪԴµÄHTMLÎļþ¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-edge-flaw-lets-hackers-steal-local-files/