¶ò¹Ï¶à¶ûÒÑÔâÁè¼Ý4000Íò´ÎºÚ¿Í¹¥»÷£»£»£» £»£» £»£»£»Ð¹¥»÷»î¶¯Scranos Operation£»£»£» £»£» £»£»£»ÀÕË÷Èí¼þBitPaymerбäÌå

Ðû²¼Ê±¼ä 2019-04-17
1¡¢OracleÐû²¼4ÔÂÖ÷Òª²¹¶¡¸üУ¬£¬£¬£¬ÐÞ¸´297¸öÎó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
4ÔÂ16ÈÕOracleÐû²¼Ö÷Òª²¹¶¡¸üУ¬£¬£¬£¬¹²ÐÞ¸´297¸öÎó²î£¬£¬£¬£¬ÆäÖаüÀ¨Database ServerÖеÄ6¸öÎó²î¡¢Communication ApplicationsÖеÄ26¸öÎó²î¡¢E-Business SuiteÖеÄ35¸öÎó²î¡¢Fusion MiddlewareÖеÄ53¸öÎó²î¡¢MySQLÖеÄ45¸öÎó²îºÍRetail ApplicationsÖеÄ24¸öÎó²î¡£¡£¡£¡£ÏêϸÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£Æ¾Ö¤OracleµÄÖ÷Òª²¹¶¡Ðû²¼ÍýÏ룬£¬£¬£¬ÏÂÒ»´ÎÖ÷Òª²¹¶¡¸üн«ÓÚ2019Äê7ÔÂ16ÈÕÐû²¼¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

2¡¢Gnosticplayers³öÊÛµÚÎåÅúÓû§Êý¾Ý£¬£¬£¬£¬°üÀ¨6500¶àÍò¸öÕ˺Å

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
ºÚ¿ÍGnosticplayersÔÚ°µÍøÂÛ̳DreamMarketÉϳöÊÛµÚÎåÅú±»µÁµÄÓû§Êý¾Ý£¬£¬£¬£¬ÕâÅúÊý¾Ý°üÀ¨Áè¼Ý6500Íò¸öÓû§ÕË»§£¬£¬£¬£¬ÊÛ¼ÛΪ0.8463±ÈÌØ±Ò£¨4350ÃÀÔª£©¡£¡£¡£¡£ÕâÅú±»µÁµÄÓû§¼Í¼ÊôÓÚÁù¼Òй«Ë¾£¬£¬£¬£¬°üÀ¨ÓÎϷƽ̨Mindjolt£¨2800Íò£©¡¢ÔÚÏß¹ºÎïÉçÇøWanelo£¨2300Íò£©¡¢Æ»¹ûάÐÞÖÐÐÄiCracked£¨150Íò£©¡¢ÂÃÓι«Ë¾Yanolja£¨150Íò£©¡¢µç×ÓÔ¼ÇëЧÀÍEvite£¨1000Íò£©ºÍÅ®×ÓʱװµêModa Operandi£¨150Íò£©¡£¡£¡£¡£ÏÖÔÚΪֹGnosticplayers³öÊ۵ı»µÁÓû§¼Í¼×ÜÊýÒÑ´ï9.32ÒÚÌõ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/gnosticplayers-hacker-returns-with-fifth-dataset-containing-over-65-million-user-accounts-for-sale-95450e99

3¡¢·¸·¨ÍÅ»ïʹÓÃRATVERMINºóÃŹ¥»÷ÎÚ¿ËÀ¼¶à¸ö¾üʲ¿·Ö

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
FireEyeÑо¿ÍŶӷ¢Ã÷Ò»¸öÕë¶ÔÎÚ¿ËÀ¼¶à¸ö¾üʲ¿·ÖµÄÓã²æÊ½´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬¸Ã¹¥»÷»î¶¯ÊÇ2018ÄêÕë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹¥»÷»î¶¯µÄÑÓÐø£¬£¬£¬£¬¹¥»÷ÕßÓëLPRÓйØ¡£¡£¡£¡£Æ¾Ö¤¶Ô¶ñÒâÈí¼þ±àÒëʱ¼äµÄÆÊÎö£¬£¬£¬£¬¸Ã¹¥»÷×éÖ¯ËÆºõÖÁÉÙÓÚ2014ÄêÒÔÀ´Ò»Ö±´¦ÓÚ»îԾ״̬£¬£¬£¬£¬ÆäÄ¿µÄÖ÷ÒªÊÇÎÚ¿ËÀ¼¡£¡£¡£¡£ÔÚ×î½üµÄ¹¥»÷»î¶¯ÖУ¬£¬£¬£¬¸Ã×é֯ʹÓÃÁ˶ñÒâÈí¼þQUASARRATºÍRATVERMIN¡£¡£¡£¡£RATVERMINÊÇÒ»¸ö.NETºóÃÅ£¬£¬£¬£¬¿ÉÍøÂçÊܺ¦ÕßµÄÐÅÏ¢²¢ÔËÐÐÖÖÖÖÏÂÁî¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hacker-group-uses-ratvermin-backdoor-to-target-ukrainian-military/

4¡¢°¢É£Ææ±»²¶ºó£¬£¬£¬£¬¶ò¹Ï¶à¶ûÒÑÔâÊÜÁè¼Ý4000Íò´ÎºÚ¿Í¹¥»÷

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
×Ôά»ù½âÃÜÊ×´´ÈËÖìÀû°²?°¢É£Ææ±»²¶ÒÔÀ´£¬£¬£¬£¬¶ò¹Ï¶à¶û¹«¹²»ú¹¹µÄÍøÕ¾ÔâÊÜÁË4000Íò´ÎÍøÂç¹¥»÷¡£¡£¡£¡£ÉÏÖܶò¹Ï¶à¶û³·»ØÁ˶԰¢É£ÆæµÄÕþÖκǻ¤£¬£¬£¬£¬Õâµ¼ÖºóÕß±»²¶¡£¡£¡£¡£¶ò¹Ï¶à¶ûÐÅÏ¢ºÍͨѶÊÖÒÕ²¿¸±²¿³¤Patricio Real͸¶³Æ£¬£¬£¬£¬¹¥»÷Ö÷ÒªÀ´×ÔÓÚÃÀ¹ú¡¢°ÍÎ÷¡¢ºÉÀ¼¡¢µÂ¹ú¡¢ÂÞÂíÄáÑÇ¡¢·¨¹ú¡¢°ÂµØÀû¡¢Ó¢¹úºÍ¶ò¹Ï¶à¶û×ÔÉí¡£¡£¡£¡£´ó²¿·Ö¹¥»÷¶¼Õë¶ÔÍâ½»²¿¡¢ÖÐÑëÒøÐС¢×Üͳ°ì¹«ÊÒ¡¢¹ú˰¾ÖµÈ²¿·ÖºÍ¼¸¸ö´óѧµÄÍøÕ¾¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83940/hacktivism/julian-assange-arrest-ddoss.html

5¡¢Ð¹¥»÷»î¶¯Scranos Operation£¬£¬£¬£¬Ê¹ÓÃÓÐÓÃÊðÃûµÄRootkitÇÔÈ¡Óû§ÐÅÏ¢

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
Ò»¸ö¾ßÓÐÓÐÓÃÊðÃûµÄrootkit£¨±»³ÆÎªScranos£©ÕýÔÚ¶à¸ö¹ú¼ÒÈö²¥£¬£¬£¬£¬Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡¢Ö§¸¶ÐÅÏ¢ºÍä¯ÀÀÆ÷ÀúÊ·¼Í¼£¬£¬£¬£¬»¹¿ÉÓÃÓÚÔÚÉç½»ÍøÂçÉÏÈö²¥À¬»øÐÅÏ¢ºÍ¹ã¸æ¡£¡£¡£¡£Scranosαװ³ÉÊÓÆµÇý¶¯³ÌÐò£¬£¬£¬£¬ÆäʹÓõÄÖ¤ÊéÊÇDigiCertÏòÉϺ£Ò»¼Ò¿µ½¡ÖÎÀí×Éѯ¹«Ë¾½ÒÏþµÄÖ¤Ê飬£¬£¬£¬ÏÖÔÚÖ¤ÊéÈÔÈ»ÓÐÓ㬣¬£¬£¬¹¥»÷Õß¿ÉÄÜÊǵÁÓÃÁ˸ÃÖ¤Êé¡£¡£¡£¡£Bitdefender³ÆScranos OperationÒ»Ö±Éú³¤£¬£¬£¬£¬ÒѾ­Ñ¬È¾ÁËÓ¡¶È¡¢ÂÞÂíÄáÑÇ¡¢°ÍÎ÷¡¢·¨¹ú¡¢Òâ´óÀûºÍÓ¡ÄáµÈ¹ú¼ÒµÄÓû§¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/scranos-operation-uses-signed-rootkit-to-steal-login-and-payment-info/

6¡¢ÀÕË÷Èí¼þBitPaymerбäÌ壬£¬£¬£¬Ê¹ÓÃPsExecѬȾÃÀ¹úÖÆÔ칫˾

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷ÃÀ¹úÒ»¼ÒÖÆÔ칫˾Ôâµ½ÀÕË÷Èí¼þBitPaymerбäÌåµÄ¹¥»÷¡£¡£¡£¡£¸Ã±äÌ壨Ransom.Win32.BITPAYMER.TGACAJ£©Ê¹ÓÃPsExec¾ÙÐзַ¢£¬£¬£¬£¬²¢ÔÚÊê½ðƱ¾ÝºÍ¼ÓÃÜÎļþµÄÀ©Õ¹ÃûÖÐʹÓÃÁËÊܺ¦¹«Ë¾µÄÃû³Æ¡£¡£¡£¡£¹¥»÷ÊÂÎñ±¬·¢ÔÚ2ÔÂ18ÈÕÍíÉÏ9µã40·ÖÖÁÍíÉÏ11:03Ö®¼ä£¬£¬£¬£¬ÓÉÓÚ¹¥»÷ÕßÖÁÉÙÐèÒªÒ»¸ö¾ßÓÐÖÎÀíԱȨÏÞµÄÕÊ»§²Å»ªÍ¨¹ýPsExecÔËÐÐÏÂÁ£¬£¬£¬ÕâÒâζ×ÅÔÚÀÕË÷Èí¼þ×°ÖÃ֮ǰ¹¥»÷ÕßÒѾ­Í¨¹ýijÖÖÊֶλñµÃÁËÖÎÀíԱȨÏÞ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/new-bitpaymer-ransomware-variant-infected-us-manufacturing-company-via-psexec-3450ef8c