¡¾Êý¾Ýй¶¡¿°®¶ûÀ¼µçÐŹ«Ë¾EirµÄһ̨Ìõ¼Ç±¾±»µÁ£¬£¬£¬µ¼ÖÂÔ¼3.7ÍòÓû§µÄÐÅϢй¶
ƾ֤°®¶ûÀ¼µçÐŹ«Ë¾Eir¹ÙÍøÉϵÄ֪ͨ£¬£¬£¬¸Ã¹«Ë¾µÄһ̨°üÀ¨Óû§Êý¾ÝµÄδ¼ÓÃܵÄÌõ¼Ç±¾µçÄÔÔâÇÔ£¬£¬£¬µ¼ÖÂÔ¼3.7ÍòÓû§µÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëºÍeirÕ˺𣡣¡£¡£¸Ã¹«Ë¾³ÆÐ¹Â¶µÄÊý¾Ý²»°üÀ¨ÈκÎÓû§µÄ²ÆÎñÊý¾Ý¡£¡£¡£¡£ÏÖÔڸù«Ë¾ÒÑÏòÊý¾Ý±£»£»£»£»£»¤×¨Ô±ºÍ°®¶ûÀ¼¾¯Ô±×ª´ïÁË´Ë´ÎÊÂÎñ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75655/data-breach/eir-data-breach.html
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӳÆÈýÐÇ¡¢»ªÎªµÈ11¼Ò³§É̵ÄAndroidÊÖ»úÒ×ÊÜATÏÂÁî¹¥»÷
Çå¾²Ñо¿ÍŶӷ¢Ã÷11¸öÊÖ»ú³§É̵ÄAndroidÖÇÄÜÊÖ»úÒ×ÊÜATÏÂÁîµÄ¹¥»÷£¬£¬£¬°üÀ¨»ªË¶¡¢Google¡¢HTC¡¢»ªÎª¡¢åÚÏë¡¢LG¡¢Ä¦ÍÐÂÞÀ¡¢ÈýÐÇ¡¢Ë÷Äá¡¢ÖÐÐ˺ÍLineageOS¡£¡£¡£¡£¸ÃÑо¿ÍŶӯÊÎöÁËÕâ11¼Ò³§É̵Ä2000¶à¸öAndroid¹Ì¼þ¾µÏñ£¬£¬£¬·¢Ã÷ÕâЩװ±¸Ö§³ÖÁè¼Ý3500ÖÖ²î±ðÀàÐ͵ÄATÏÂÁ£¬£¬ÆäÖÐһЩÏÂÁî¿ÉÒÔ»á¼ûºÜÊÇΣÏյĹ¦Ð§¡£¡£¡£¡£ÕâЩÏÂÁî¿ÉÒÔͨ¹ýUSB¶Ë¿Ú»á¼û¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/smartphones-from-11-oems-vulnerable-to-attacks-via-hidden-at-commands/
¡¾ÍþвÇ鱨¡¿GoogleÑо¿Ö°Ô±³Æ±¤ÀÝÖ®Ò¹µÄAndroid appÒ×ÊÜMitD¹¥»÷
GoogleÇå¾²Ñо¿Ö°Ô±·¢Ã÷ºÜÊÇÊܽӴýµÄÓÎÏ·±¤ÀÝÖ®Ò¹µÄAndroid°æÒ×ÊÜMitD¹¥»÷¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÒÑ×°ÖÃÔÚÓû§ÊÖ»úÉϵĵÍȨÏÞ¶ñÒâappÐ®ÖÆ±¤ÀÝÖ®Ò¹appµÄ×°ÖÃÀú³Ì²¢×°ÖþßÓиü¸ßȨÏÞ¼¶±ðµÄÆäËü¶ñÒâÓ¦Óᣡ£¡£¡£Ñо¿Ö°Ô±»¹·ÖÏíÁËÒ»¸ö¹¥»÷Àú³ÌµÄÑÝʾÊÓÆµ¡£¡£¡£¡£±¤ÀÝÖ®Ò¹µÄ¿ª·¢ÉÌEpic GamesÐû²¼ÁËа汾2.1.0ÒÔÐÞ¸´´ËÎÊÌâ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/fortnite-android-app-vulnerable-to-man-in-the-disk-attacks/
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÈÕ±¾µÄ´ó¹æÄ£À¬»øÓʼþ»î¶¯
Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÈÕ±¾µÄ´ó¹æÄ£À¬»øÓʼþ»î¶¯¡£¡£¡£¡£¸ÃÀ¬»øÓʼþ»î¶¯Óɽ©Ê¬ÍøÂçCutwail·Ö·¢£¬£¬£¬Ê¹Óû¥ÁªÍøÅÌÎÊÎļþIQYÈö²¥¶ñÒâÈí¼þBEBLOHºÍURSNIF¡£¡£¡£¡£Ñо¿ÍŶÓÔÚ2018Äê8ÔÂ6ÈÕ¼ì²âµ½¸Ã»î¶¯£¬£¬£¬¸Ã»î¶¯¿¢ÊÂÓÚ8ÔÂ9ÈÕ£¬£¬£¬¹²·Ö·¢ÁËÔ¼50Íò·âÀ¬»øÓʼþ¡£¡£¡£¡£ÈôÊǼì²âµ½·ÇÈÕ±¾µÄIPµØµã£¬£¬£¬Ôò²»»áÏÂÔØ¶ñÒâµÄÓÐÓúÉÔØ¡£¡£¡£¡£ÆäÓÐÓúÉÔØBEBLOHÊÇÒ»¸öÒøÐÐľÂí£¬£¬£¬¶øURSNIFÔòÊÇÒ»¸öÖøÃûµÄÓÃÓÚÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/iqy-and-powershell-abused-by-spam-campaign-to-infect-users-in-japan-with-bebloh-and-ursnif/
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÑÝʾͨ¹ýUSB³äµçÏßÈëÇÖÅÌËã»úµÄUSBHarpoon¹¥»÷
Çå¾²Ñо¿ÍŶÓÑÝʾÔõÑùʹÓÃUSB³äµçÏßÈëÇÖÅÌËã»úµÄUSBHarpoon¹¥»÷¡£¡£¡£¡£USBHarpoonʹÓóäµçÏß¶ø²»ÊÇUSBÇý¶¯Æ÷À´Íê³ÉÈëÇÖ£¬£¬£¬ÕâʹÆäÔ½·¢ÒþÄä¡£¡£¡£¡£¸Ã³äµçÏß´øÓÐˢеÄÅþÁ¬Æ÷£¬£¬£¬ÔÊÐíµçÁ÷ºÍÊý¾Ýͨ¹ý£¬£¬£¬´Ë¹¦Ð§Ê¹Æä¿ÉÒÔÅäºÏÈκÎUSB×°±¸¶ø²»»áÒýÆðÏÓÒÉ¡£¡£¡£¡£USBHarpoon¹¥»÷¿ÉÒÔÆô¶¯ÏÂÔØºÍÖ´ÐÐÓÐÓúÉÔØµÄÏÂÁî¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75644/hacking/usbharpoon-attack.html
¡¾ÍþвÇ鱨¡¿FireEyeÅû¶ÒÉËÆÒÁÀÊÌᳫµÄÕë¶ÔÃÀ¹ú¡¢Ó¢¹úºÍÖж«µÄÐéαÐÂÎÅÍøÂç
FireEye¿ËÈÕ·¢Ã÷ÁËÒ»ÏîËÆºõÀ´×ÔÒÁÀʵĿÉÒɻ£¬£¬£¬¸Ã¶ñÒâ»î¶¯Ê¹Óöà¸öÉ罻ýÌåÆ½Ì¨ÉϵÄÐéαÐÂÎÅÍøÕ¾ºÍÏà¹ØÕË»§µÄ¼¯ÈºÍøÂ磬£¬£¬Ðû²¼ÇкÏÒÁÀÊÀûÒæµÄÕþÖÎÐÂÎÅ¡£¡£¡£¡£ÆäÕë¶ÔµÄµØÇø°üÀ¨ÃÀ¹ú¡¢Ó¢¹ú¡¢À¶¡ÃÀÖÞºÍÖж«µØÇø£¬£¬£¬Ðû´«µÄÄÚÈݰüÀ¨·´É³Ìذ¢À²®¡¢·´ÒÔÉ«ÁкÍÇ×°ÍÀÕ˹̹ÒÔ¼°Ö§³ÖÃÀ¹úÓÐÀûÓÚÒÁÀʵÄÏêϸÕþ²ß£¬£¬£¬ÈçÃÀÒÁºËÐÒ飨JCPOA£©µÈ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.fireeye.com/blog/threat-research/2018/08/suspected-iranian-influence-operation.html