¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180803

Ðû²¼Ê±¼ä 2018-08-03

¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔMikroTik·ÓÉÆ÷µÄ´ó¹æÄ£¶ñÒâÍÚ¿ó¹¥»÷


Çå¾²Ñо¿Ö°Ô±Simon Kenin·¢Ã÷Ò»¸öÕë¶ÔMikroTik·ÓÉÆ÷µÄ´ó¹æÄ£¶ñÒâÍÚ¿ó¹¥»÷¡£¡£¡£¡£ ¡£¸Ã¹¥»÷»î¶¯×î³õÖ÷ÒªÕë¶Ô°ÍÎ÷£¬£¬£¬£¬£¬£¬£¬Ñ¬È¾ÁËÔ¼7.2Íǫ̀MikroTik·ÓÉÆ÷£¬£¬£¬£¬£¬£¬£¬Ëæºó×îÏÈÕë¶ÔÈ«ÇòµÄMikroTik·ÓÉÆ÷£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÊÜÓ°ÏìµÄ·ÓÉÆ÷ÒÑÁè¼Ý20Íǫ̀¡£¡£¡£¡£ ¡£KeninÌåÏÖ¹¥»÷ÕßʹÓÃÁË4Ô·ݷ¢Ã÷µÄMikroTik·ÓÉÆ÷ÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬Ð®ÖÆÓû§µÄÁ÷Á¿²¢ÔÚͨ¹ý·ÓÉÆ÷µÄÍøÕ¾Ò³ÃæÖÐ×¢ÈëCoinhiveÍÚ¿ó¾ç±¾¡£¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/massive-coinhive-cryptojacking-campaign-touches-over-200-000-mikrotik-routers/


¡¾ÍþвÇ鱨¡¿CCleanerÌíÔöÇ¿ÖÆÐÔµÄÊý¾ÝÍøÂ繦Ч£¬£¬£¬£¬£¬£¬£¬Òý·¢¶ÔÓû§Òþ˽±£» £»£» £»£»¤µÄµ£ÐÄ


AvastÔÚCCleanerµÄа汾5.45ÖÐÌí¼ÓÁËÇ¿ÖÆÐÔµÄϵͳÊý¾ÝÍøÂ繦Ч£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÓû§ÎÞ·¨¹Ø±Õ¸Ã¹¦Ð§¡£¡£¡£¡£ ¡£CCleanerÊÇÒ»¸ö×ÊÖúÓû§ÕûÀí×°±¸À¬»øÎļþÒÔÓÅ»¯ºÍÔöÇ¿ÐÔÄܵÄС¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÆäÏÂÔØÁ¿´ï20ÒÚ¡£¡£¡£¡£ ¡£CCleaner 5.45µÄ¼à¿Ø¹¦Ð§ÔÊÐíÆä½«ÍøÂçµÄϵͳʹÓÃÊý¾Ý·¢»Ø¹«Ë¾µÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬²¢Ã¿12Сʱ·¢ËÍÒ»´ÎÐÄÌø¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬CCleanerµÄÒþ˽Õþ²ß»¹ÌåÏÖËü¿ÉÒÔÓëµÚÈý·½¹«Ë¾¹²ÏíÍøÂçµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÕâÒý·¢Á˶ÔÓû§Òþ˽±£» £»£» £»£»¤µÄµ£ÐÄ¡£¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/ccleaner-software-download.html


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚÍøÂç·¸·¨ÍÅ»ïGorgonµÄÆÊÎö±¨¸æ


´Ó2018Äê2ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬Palo Alto NetworksµÄUnit 42Ñо¿ÍŶӼì²âµ½ÍøÂç·¸·¨ÍÅ»ïGorgonÕë¶ÔÓ¢¹ú¡¢Î÷°àÑÀ¡¢¶íÂÞ˹ºÍÃÀ¹úµÄÕþ¸®»ú¹¹µÄ¹¥»÷»î¶¯¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÔÚ´Ëʱ´úGorgonµÄ³ÉÔ±»¹Ê¹ÓÃÕâЩ¹²ÏíµÄ»ù´¡ÉèÊ©ÔÚÈ«Çò¹æÄ£ÄÚÌᳫÓÐÕë¶ÔÐԵĹ¥»÷»î¶¯¡£¡£¡£¡£ ¡£³ýÁËʹÓùŰåµÄÏÂÁîºÍ¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷Ö®Í⣬£¬£¬£¬£¬£¬£¬Gorgon»¹Ê¹Óó£¼ûµÄURL¶ÌÁ´½ÓЧÀÍÀ´·Ö·¢ÓÐÓúÉÔØ£¬£¬£¬£¬£¬£¬£¬ÕâҲΪÎÒÃÇÌṩÁ˵ã»÷´ÎÊýºÍͳ¼ÆÊý¾ÝµÄÁÐ±í¡£¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/08/unit42-gorgon-group-slithering-nation-state-cybercrime/


¡¾ÍþвÇ鱨¡¿Ñо¿»ú¹¹ÖÒÑÔ³ÆÒÁÀÊAPT×éÖ¯RASPITEÕýÔÚÃé×¼ÃÀ¹úµçÁ¦¹«Ë¾


ƾ֤Dragos¹«Ë¾µÄÑо¿£¬£¬£¬£¬£¬£¬£¬ÒÁÀÊAPT×éÖ¯RASPITEÒ»Ö±ÔÚÕë¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢Öж«ºÍ¶«ÑǵØÇøµÄÆóÒµ¡£¡£¡£¡£ ¡£¸Ã×éÖ¯ÖÁÉÙ´Ó2017ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£¡£¡£¡£ ¡£Dragos¼ì²âµ½¸Ã×éÖ¯Õë¶ÔµçÁ¦¹«ÓÃÊÂÒµµÄй¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬Õâ¸ö»î¶¯ÏÖÔÚÖ÷ÒªÕë¶ÔÃÀ¹ú¡£¡£¡£¡£ ¡£Dragos³ÆÏÖÔÚûÓм£ÏóÅú×¢¸Ã×éÖ¯¾ßÓÐÌá³«ÆÆËðÐÔµÄICS¹¥»÷µÄÄÜÁ¦£¨ÀýÈçÎÚ¿ËÀ¼ÄÇÑùµÄ´ó¹æÄ£Í£µç£©¡£¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75006/apt/raspite-rgets-us-electric-utilities.html


¡¾Ö´ÂÉÀýÔò¡¿ÃÀ˾·¨²¿¶Ô·¸·¨ÍÅ»ïFIN7µÄ3Ãû³ÉÔ±Ìá³ö26Ïî·¸·¨Ö¸¿Ø


±¾ÖÜÈýÃÀ¹ú˾·¨²¿Ðû²¼¶ÔÍøÂç·¸·¨ÍÅ»ïFIN7µÄÈýÃû³ÉÔ±Ìá³ö26Ïî·¸·¨Ö¸¿Ø£¬£¬£¬£¬£¬£¬£¬ÉæÏÓÕ©Æ­¡¢µç×Óڲƭ¡¢ÈëÇÖÅÌËã»úϵͳºÍÉí·Ý͵ÇԵȡ£¡£¡£¡£ ¡£FIN7¼¯ÍÅÖ÷ÒªÕë¶ÔPoS»úϵͳ£¬£¬£¬£¬£¬£¬£¬ÔøÈëÇÖ47¸öÖݵÄ3600¸öÁ¬ËøÃŵ꣬£¬£¬£¬£¬£¬£¬´Ó6500¶à¸öPoS»úÖÐÇÔÈ¡Áè¼Ý1500ÍòÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£ ¡£ÕâÈýÃûÏÓ·¸»®·ÖÊÇ44ËêµÄDmytro Fedorov¡¢33ËêµÄFedir HladyrºÍ30ËêµÄAndrii Kopakov£¬£¬£¬£¬£¬£¬£¬ËûÃÇÓÚÈ¥Äê1ÔÂÖÁ6ÔÂʱ´úÔÚÅ·ÖÞ±»²¶¡£¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/fin7-carbanak-cobalt-hackers.html


¡¾Îó²î²¹¶¡¡¿Î¢ÈíÐÞ¸´Edgeä¯ÀÀÆ÷ÖеÄÒ»¸ö¿Éµ¼ÖÂÎļþÇÔÈ¡µÄÇå¾²Îó²î


΢ÈíÐÞ¸´Edgeä¯ÀÀÆ÷ÖеÄÒ»¸ö¿Éµ¼ÖÂÎļþÇÔÈ¡µÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓëä¯ÀÀÆ÷ÖеÄͬԴսÂÔ£¨SOP£©¹¦Ð§Óйء£¡£¡£¡£ ¡£NetsparkerÇå¾²Ñо¿Ô±Ziyahan Albeniz·¢Ã÷µ±Óû§ÏÂÔØ²¢ÔËÐжñÒâµÄHTMLÎļþʱ£¬£¬£¬£¬£¬£¬£¬¶ñÒâ´úÂ뽫ͨ¹ýfile://ЭÒé¼ÓÔØ£¬£¬£¬£¬£¬£¬£¬²¢ÍøÂçºÍÇÔÈ¡¿É»á¼ûµÄÍâµØÎļþ¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±Ðû²¼Á˸ù¥»÷µÄÑéÖ¤ÊÓÆµ£¬£¬£¬£¬£¬£¬£¬²¢ÖÒÑÔÓû§²»ÒªÔËÐÐδ֪ȪԴµÄHTMLÎļþ¡£¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-edge-flaw-lets-hackers-steal-local-files/