µÂ¹ú¹ºÎïÍøÕ¾windeln.deÊý¾Ý¿â̻¶£¬£¬£¬Ð¹Â¶60ÒÚÌõ¼Í¼£»£»£»£»£»£»µÂ¹úµÄÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬¼ä½Óµ¼Ö»¼ÕßéæÃü
Ðû²¼Ê±¼ä 2020-09-181.µÂ¹ú¹ºÎïÍøÕ¾windeln.deÊý¾Ý¿â̻¶£¬£¬£¬Ð¹Â¶60ÒÚÌõ¼Í¼

Safety DetectivesµÄÑо¿Ö°Ô±ÔÚÍøÂçÉÏ·¢Ã÷ÁËÒ»¸ö̻¶µÄÊý¾Ý¿â£¬£¬£¬¾ÊÓ²ì¸ÃÊý¾Ý¿âÊôÓڵ¹úÔÚÏß¹ºÎïÍøÕ¾windeln.de¡£¡£¡£¡£¡£Æä̻¶ÁË6.4TBµÄÊý¾Ý£¬£¬£¬ÆäÖаüÀ¨60ÒÚÌõ¼Í¼£¬£¬£¬Ð¹Â¶ÁËÁè¼Ý700000Ãû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñµÄй¶ÐÅÏ¢°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©ºÍÆäËûÊý¾Ý£¬£¬£¬ÀýÈ緢Ʊ¡¢È«Ãû¡¢IPµØµã¡¢ÄÚ²¿ÈÕÖ¾¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢¼ÒÍ¥µØµã¡¢É¢ÁÐÃÜÂë¡¢¸¶¿î·½·¨ºÍÓû§µÄº¢×ÓСÎÒ˽¼ÒÐÅÏ¢µÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/shopping-site-leaks-miners-data-database-mess-up/
2.ºÚ¿ÍÔÚ°µÍøÉϹûÕæAndroidľÂíCerberusµÄÔ´´úÂë

ºÚ¿ÍÔÚÅÄÂôʧ°Üºó£¬£¬£¬ÔÚ°µÍøÉϹûÕæAndroidľÂíCerberusµÄÔ´´úÂë¡£¡£¡£¡£¡£CerberusÊÇÕë¶ÔGoogle Android²Ù×÷ϵͳµÄÊÖ»úÒøÐÐľÂí£¬£¬£¬ÖÁÉÙ´Ó2019Äê7ÔÂ×îÏÈ»îÔ¾£¬£¬£¬¾ßÓÐÉñÃØ¼àÊÓ¡¢×赲ͨѶ¡¢¸Ä¶¯×°±¸¹¦Ð§£¬£¬£¬²¢Í¨¹ýÔÚÏÖÓеÄÒøÐС¢ÁãÊÛºÍÉç½»ÍøÂçÓ¦ÓóÌÐòÉϽ¨Éèµþ¼Ó£¬£¬£¬ÇÔÈ¡°üÀ¨ÒøÐÐÖ¤ÊéÔÚÄÚµÄÊý¾Ý¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿£¿¨°Í˹»ùÍøÂçÇå¾²Ñо¿Ô±Dmitry GalovÌåÏÖ£¬£¬£¬ÕâÖÖÐÐΪ¶ÔÖÇÄÜÊÖ»úÓû§ºÍÕû¸öÒøÐÐÒµ×é³ÉÁËÖØ´óµÄÍþв¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cerberus-banking-trojan-source-code-released-for-free-to-cyberattackers/
3.ÃÀ¹úÖ¸¿ØÁ½¶í¼®ºÚ¿Í´¹ÂÚ¹¥»÷Èý¼ÒÇ®±ÒÉúÒâËùµÄÓû§

ÃÀ¹úÖ¸¿ØÁ½Ãû¶íÂÞ˹ºÚ¿ÍʹÓÃÍøÂç´¹ÂÚ¹¥»÷ÁËPoloniex¡¢BinanceºÍGeminiÈý¼Ò¼ÓÃÜÇ®±ÒÉúÒâËùµÄÊý°ÙÃûÓû§£¬£¬£¬×ܼÆÇÔÈ¡ÁË1680ÍòÃÀÔª¡£¡£¡£¡£¡£±»Ö¸¿ØµÄÁ½ÃûºÚ¿Í£¨ Danil PotekhinºÍDmitrii Karasavidi£©Ô¼ÄªÔÚ2017Äê6ÔÂ×îÏȻ£¬£¬£¬Í¨¹ý¿Ë¡¼ÓÃÜÇ®±ÒÉúÒâËùµÄÍøÕ¾½¨Éè´¹ÂÚÍøÕ¾£¬£¬£¬Ê¹ÓÃÆäÒýÓÕÓû§ÒÔÍøÂçËûÃǵÄÕË»§Æ¾Ö¤¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Éæ¼°µ½ÁË313¸öµÄPoloniexÓû§¡¢142¸öBinanceÓû§ºÍ42¸öGeminiÓû§£¬£¬£¬ËðʧԤ¼ÆÎª16876000ÃÀÔª¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-charges-two-russians-for-stealing-16-8m-via-cryptocurrency-phishing-sites/
4.CISAÅû¶ÒÁÀʺڿÍËùʹÓõÄWeb ShellµÄÏêϸÐÅÏ¢

CISA±¨¸æ£¬£¬£¬ÒÁÀʵÄAPT×éÖ¯Pioneer KittenÕýÔÚʹÓü¸¸öÒÑÖªµÄWeb Shell£¬£¬£¬Õë¶ÔÕû¸öÃÀ¹úµÄIT¡¢Õþ¸®¡¢Ò½ÁÆ¡¢½ðÈںͰü¹Ü×éÖ¯¾ÙÐй¥»÷¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚÒÑÍùµÄ¼¸¸öÔÂÀïÒ»Ö±ÔÚÊÔͼʹÓÃÆóÒµVPNÖÐÎó²î£¬£¬£¬°üÀ¨CVE-2019-11510¡¢CVE-2019-11539¡¢CVE-2019-19781ºÍCVE-2020-5902£¬£¬£¬²¢ÔÚÈ«Çò¹æÄ£ÄÚÕë¶ÔPulse Secure¡¢Fortinet¡¢Palo Alto NetworksºÍCitrix VPNµÈ¹«Ë¾¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108357/malware/cisa-web-shells-iranian-hackers.html
5.NSAÐû²¼ÓйØUEFIÇå¾²Æô¶¯×Ô½ç˵µÄÇå¾²Ö¸ÄÏ

ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©Ðû²¼ÁËÓйØÍ³Ò»¿ÉÀ©Õ¹¹Ì¼þ½Ó¿Ú£¨UEFI£©Çå¾²Æô¶¯×Ô½ç˵µÄÖ¸ÄÏ¡£¡£¡£¡£¡£½ü¼¸ÄêÀ´£¬£¬£¬×¨¼ÒÃÇÊӲ쵽һЩʹÓÃrootkitµÄ¹¥»÷£¬£¬£¬ÆäרÃÅÕë¶Ô¹Ì¼þ¿ª·¢ÒÔʵÏÖ³¤ÆÚÐÔ²¢ÈƹýÇå¾²½â¾ö¼Æ»®¡£¡£¡£¡£¡£Çå¾²ÆôÄîÍ·ÖÆÖ»ÔÊÐíÖ´ÐÐÊÜÔʼװ±¸ÖÆÔìÉÌ(OEM)ÐÅÈεÄÈí¼þ£¬£¬£¬ÖÎÀíԱͨ¹ý×Ô½ç˵Çå¾²Æô¶¯·ÀÓù¶ñÒâÈí¼þ¡¢»º½âÄÚ²¿ÍþвºÍ±£»£»£»£»£»£»¤Êý¾Ý¾²Ö¹¡£¡£¡£¡£¡£NSAÖ¸³ö£¬£¬£¬Çå¾²Æô¶¯¿ÉÒÔÉèÖÃΪÉó¼Æ¹Ì¼þÄ£¿£¿£¿£¿£¿£¿£¿£¿é¡¢À©Õ¹×°±¸ºÍ¿ÉÖ¸µ¼µÄOSÓ³Ïñ£¬£¬£¬¿ÉʹÓÿÉÐÅÆ½Ì¨Ä£¿£¿£¿£¿£¿£¿£¿£¿é(TPM)ÑéÖ¤UEFIÇå¾²Ö¸µ¼µÄÍêÕûÐÔ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108367/security/nsa-uefi-secure-boot-customization.html
6.µÂ¹úµÄÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬¼ä½Óµ¼Ö»¼ÕßéæÃü

µÂ¹ú¶ÅÈû¶û¶à·ò´óѧҽԺÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬¼ä½Óµ¼Ö»¼ÕßéæÃü¡£¡£¡£¡£¡£¸ÃÒ½ÔºÓÚ9ÔÂ10ÈÕÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬30¶ą̀ÄÚ²¿Ð§ÀÍÆ÷±»Ñ¬È¾£¬£¬£¬µ¼Ö¸ÃҽԺδÄÜÕý³£ÎüÊÕÐèÒª½ôÆÈÖÎÁƵÄÅ®ÐÔ£¬£¬£¬ÖÂʹ¸ÃÃû»¼ÕßÔÚ×ªÒÆµ½30¹«ÀïÍâµÄÎéçêËþ¶ûÊÐÒ»¼ÒÒ½ÔººóéæÃü¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬µÂ¹úÕþ¸®ÕýÔÚÊÓ²ì¸ÃÊÂÎñ£¬£¬£¬²¢ÌåÏÖÈôÊÇ·¢Ã÷ÀÕË÷Èí¼þ¹¥»÷ºÍҽԺͣ»£»£»£»£»£»úÖ±½ÓÔì³É¸ÃŮʿµÄéæÃü£¬£¬£¬Äǽ«ÆäÊÓ²ìתΪһÆðÐд̰¸¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÍÅ»ïÒ²Ôڵ¹ú¾¯·½½éÈëºó³·»ØÁËÀÕË÷ÒªÇ󣬣¬£¬²¢·¢ËͽâÃÜÆ÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/first-death-reported-following-a-ransomware-attack-on-a-german-hospital/


¾©¹«Íø°²±¸11010802024551ºÅ