΢Èí½«ÓëÃÀ¹úNISTÁªºÏ½¨ÉèÆóÒµ²¹¶¡ÐÞ¸´Ö¸ÄÏ£»£»£»£»£»£»£»£»¼ÓÄôóLeaflyÒâÍâй¶Óû§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬µ«²»°üÀ¨ÐÅÓÿ¨Êý¾Ý

Ðû²¼Ê±¼ä 2019-10-14

1¡¢Proofpoint³Æ2019ÄêÕë¶ÔÒ½ÁÆÐÐÒµµÄÓʼþÕ©Æ­¹¥»÷¼¤Ôö


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ProofpointÔÚÆä×îеġ¶Ò½ÁƱ£½¡ÐÐÒµÍþв±¨¸æ¡·ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄµç×ÓÓʼþÕ©Æ­¹¥»÷ÔÚ2019Ä꼤Ôö£¬£¬£¬£¬£¬£¬£¬£¬ÓëÈ¥ÄêͬÆÚÏà±ÈÔöÌíÁË300%¡£¡£¡£¡£¡£¡£ÔÚÊܹ¥»÷µÄÒ½ÁÆÆóÒµÖУ¬£¬£¬£¬£¬£¬£¬£¬ÏÕЩËùÓУ¨95%£©µÄ¹«Ë¾¶¼ÌåÏÖ¿´µ½ÁËαװ³É×Ô¼ºµÄ¿ÉÐÅÓòÃûµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÓʼþͬʱÕë¶Ô»¼ÕßºÍÆóÒµµÄÏàÖúͬ°é¡£¡£¡£¡£¡£¡£´ó´ó¶¼Óʼþ¹¥»÷µÄÖ÷ÌâÖж¼°üÀ¨¡°½ôÆÈ¡±»ò¡°ÇëÇ󡱵ȴÊÓ£¬£¬£¬£¬£¬£¬£¬ÒÔÔöÌíÊܺ¦ÕߵĿֻÅÇéÐ÷¡£¡£¡£¡£¡£¡£Æ½¾ù¶øÑÔ£¬£¬£¬£¬£¬£¬£¬£¬´ËÀàµç×ÓÓʼþÓÕÆ­ÁËÒ½ÁƱ£½¡ÐÐÒµÖжà´ï15ÃûÔ±¹¤¡£¡£¡£¡£¡£¡£¹¥»÷Õß»á½ÓÄɶàÖÖÉí·ÝÀ´ÔöÌíÀֳɵÄʱ»ú¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.itproportal.com/news/email-scam-attacks-against-healthcare-targets-see-huge-rise/


2¡¢¹¥»÷ÕßʹÓÃÐéα¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨JMT Trader·Ö·¢ºóÃÅ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿ÍŶÓMalwareHunterTeam·¢Ã÷Ò»¸öеÄÕ©Æ­¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½¨ÉèÁËÒ»¸öÐéα¹«Ë¾£¬£¬£¬£¬£¬£¬£¬£¬Í¨Ì«¹ý·¢¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨JMT TraderÀ´ÏòMac»òWindowsÓû§×°ÖúóÃÅ¡£¡£¡£¡£¡£¡£ÎªÁËÍÆ¹ã¸ÃÓ¦Ó㬣¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹½¨ÉèÁËÏìÓ¦µÄTwitterÕÊ»§¡£¡£¡£¡£¡£¡£¸ÃJMT TradeÏÖʵÉÏÊÇÕýµ±QT Bitcoin Trader³ÌÐòµÄ¿Ë¡°æ±¾£¬£¬£¬£¬£¬£¬£¬£¬µ«Æ¾Ö¤ÄæÏò¹¤³ÌʦVitali KremezµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬£¬µ±×°ÖÃJMT TraderʱװÖóÌÐò»¹½«Ìáȡһ¸öÃûΪCrashReporter.exeµÄ¸¨Öú³ÌÐò£¬£¬£¬£¬£¬£¬£¬£¬¸Ã³ÌÐòÊǺóÃųÌÐò£¬£¬£¬£¬£¬£¬£¬£¬Ëü½«ÅþÁ¬µ½C&CÓòbeastgoc[.]com²¢ÎüÊÕÏÂÁî¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÖªµÀ¸Ã¶ñÒâÈí¼þÊÇ·ñÑïÆúÁËÆäËûpayload£¬£¬£¬£¬£¬£¬£¬£¬»òÖ»ÊÇÓÃ×÷ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°üµÄºóÃÅ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÔÚVirusTotalµÄ¼ì³öÂʽöΪ5/69¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿¨°Í˹»ùÇå¾²Ñо¿Ô±Seongsu ParkÒÔΪJMT TraderÓ볯ÏÊLazarus APTºÜ¿ÉÄܱ£´æ¹ØÁª¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/attackers-create-elaborate-crypto-trading-scheme-to-install-malware/


3¡¢ÐÂÓʼþÕ©Æ­»î¶¯Ö÷ÒªÕë¶Ô°Ä´óÀûÑÇÓ¢Áª°îÒøÐÐ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


MailGuardÖÒÑÔÒ»¸öÕë¶Ô°Ä´óÀûÑÇÓ¢Áª°îÒøÐÐÓû§µÄд¹ÂÚÓʼþÕ©Æ­¹¥»÷¡£¡£¡£¡£¡£¡£¸ÃÓʼþÉù³ÆÓû§µÄÕË»§Öмì²âµ½²»Õý³£»£»£»£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬ÆäÕË»§Òѱ»ÏÞÖÆ»á¼û£¬£¬£¬£¬£¬£¬£¬£¬ÒªÇóÓû§µã»÷ÓʼþÖеġ°»Ö¸´»á¼ûȨÏÞ¡±Á´½Ó¡£¡£¡£¡£¡£¡£µ«¸ÃÁ´½ÓÖÒÑÔ³ÆÎÞ·¨»Ö¸´ÕË»§»á¼û£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶ø½«Óû§Ö¸µ¼ÖÁÁíÒ»¸öÁª°îÒøÐÐÆ·ÅƵÄÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬£¬ÒªÇóÓû§ÌîÈëÆ¾Ö¤¡¢¿¨ºÅ¡¢ÓÐÓÃÈÕÆÚ¼°Çå¾²ÂëµÈÑéÖ¤ÆäÉí·Ý¡£¡£¡£¡£¡£¡£Ó¢Áª°îÒøÐÐÓµÓÐ1590Íò¿Í»§£¬£¬£¬£¬£¬£¬£¬£¬½¨ÒéÓû§ÉóÉ÷¿´´ýÀ´×Ô¸ÃÒøÐеÄÈκεç×ÓÓʼþ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://au.finance.yahoo.com/news/159-million-aussies-told-to-beware-of-commonwealth-bank-scam-222719508.html


4¡¢Î¢Èí½«ÓëÃÀ¹úNISTÁªºÏ½¨ÉèÆóÒµ²¹¶¡ÐÞ¸´Ö¸ÄÏ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


΢Èí½«ÓëÃÀ¹ú¹ú¼Ò±ê×¼ÊÖÒÕÑо¿Ôº£¨NIST£©ÏàÖú½¨ÉèÆóÒµ²¹¶¡ÐÞ¸´Ö¸ÄÏ£¬£¬£¬£¬£¬£¬£¬£¬ÕâÏîÊÂÇéµÄЧ¹û½«ÊÇÒ»·ÝNISTÌØÊâ³öÊéÎï1800ʵ¼ùÖ¸ÄÏ£¬£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÖ¸µ¼ÏµÍ³ÖÎÀíÔ±ÖÎÀí»òÓÅ»¯¹«Ë¾µÄÄÚ²¿²¹¶¡ÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£¡£ÔÚ¸ÃÏîÄ¿ÖУ¬£¬£¬£¬£¬£¬£¬£¬Î¢ÈíºÍNISTÌåÏÖËûÃÇÍýÏëÑо¿¡°ÔõÑùʹÓÃÉÌÒµºÍ¿ªÔ´¹¤¾ßÀ´Ð­ÖúÐÞ²¹ÆóÒµITϵͳÖеÄÌôÕ½£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÏµÍ³ÌØÕ÷ºÍÓÅÏȼ¶»®·Ö¡¢²¹¶¡²âÊÔºÍʵÑé¸ú×ÙÓëÑéÖ¤¡£¡£¡£¡£¡£¡£¡±Î¢ÈíÓëNISTÕýÔÚÔ¼ÇëÆäËû¸ÐÐËȤµÄ¸÷·½£¨¹©Ó¦ÉÌ¡¢¹«Ë¾»òСÎÒ˽¼Ò£©Îª¸ÃÐÂÖ¸ÄÏÌṩÒâ¼û¡£¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏÔÚNIST£¨ÃÀ¹úÕþ¸®ÈÏÕæÖÆ¶©ÐÐÒµÖ¸ÄϵÄ×éÖ¯£©µÄÖ§³ÖÏ£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÍû±¬·¢ÖØ´óµÄÓ°Ïì¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-and-nist-partner-to-create-enterprise-patching-guide/


5¡¢Nemty 1.6ͨ¹ýRIG EKÆð¾¢·Ö·¢£¬£¬£¬£¬£¬£¬£¬£¬½âÃÜÆ÷ÈÔÈ»¿ÉÓÃ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


RIG EKÕýÔÚ·Ö·¢Ò»ÏµÁжñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÀÕË÷Èí¼þNemtyµÄбäÖÖ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÉÇå¾²Ñо¿Ö°Ô±mol69·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÃé×¼ÈÔÔÚʹÓÃInternet ExplorerºÍFlash PlayerµÄÆóÒµÓû§¡£¡£¡£¡£¡£¡£NemtyбäÌåÖÐ×îÏÔ×ŵÄת±äÊÇÊê½ðƱ¾ÝÖÐÏÔʾµÄ°æ±¾ºÅΪ1.6¡£¡£¡£¡£¡£¡£Æ¾Ö¤Çå¾²³§ÉÌTesorionµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬£¬Nemty 1.6»¹ÐÞ¸ÄÁ˼ÓÃÜËã·¨£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃWindows¼ÓÃÜ¿âÌæ»»ÁË×Ô¼ºÊµÏÖµÄAESËã·¨¡£¡£¡£¡£¡£¡£ÕâºÜÓпÉÄÜÊÇΪÁËÆÆËðTesorionÐû²¼µÄ½âÃܳÌÐò£¬£¬£¬£¬£¬£¬£¬£¬µ«ÍýÏ벢δÀֳɣ¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚTesorionµÄ½âÃܳÌÐòÈÔ¿ÉÒÔÕý³£ÊÂÇé¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/nemty-16-ransomware-released-and-pushed-via-rig-exploit-kit/


6¡¢¼ÓÄôóLeaflyÒâÍâй¶Óû§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬µ«²»°üÀ¨ÐÅÓÿ¨Êý¾Ý


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¼ÓÄôóLeaflyÔÚ9ÔÂ30ÈÕ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÍøÕ¾µÄÒ»¸ö¸¨ÖúÊý¾Ý¿âÒâÍâ̻¶ÁËÓû§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÖд洢µÄÓû§¼Í¼¿É×·ËÝÖÁ2016Äê7ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Óû§µÄµç×ÓÓʼþµØµã¡¢Óû§ÃûºÍ¼ÓÃܵÄÃÜÂë¡¢ÐÕÃû¡¢ÄêËê¡¢ÐÔ±ð¡¢Î»ÖÃÒÔ¼°ÊÖ»úºÅÂëµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£LeaflyÌåÏָù«Ë¾Ã»ÓÐÍøÂç»ò´æ´¢Óû§µÄ¹ú¼Òʶ±ðÂë¼°ÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬Ò²Ã»ÓÐÖ¤¾ÝÅú×¢ÆäÉú²úÍøÕ¾ÔâδÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Í¨ÖªÁËÊÜÓ°ÏìµÄÓû§£¬£¬£¬£¬£¬£¬£¬£¬²¢ÕýÔÚ¶ÔÊÂÎñ¾ÙÐÐÊÓ²ìºÍÆÀ¹À¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶ÊÜÓ°ÏìÓû§µÄÏêϸÈËÊý¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/leafly-cannabis-website-leaked-user-info-via-exposed-database/