¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180620

°ä²¼¹¦·ò 2018-06-20

rightrightright¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖAPT×éÖ¯Olympic DestroyerÕë¶ÔÅ·ÖÞµÄÐÂÖ¸±êÌáÒé¹¥»÷


2018Äê5ÔÂÖÁ6Ô¿¨°Í˹»ù³¢ÊÔÊÒ·¢ÏÖÊôÓÚAPT×éÖ¯Olympic DestroyerµÄд¹µöÎļþÑù±¾£¬¸Ã×éÖ¯´Ë¿ÌÔÚÕë¶Ô¶íÂÞ˹µÄ½ðÈÚ»ú¹¹ºÍÅ·ÖÞµÄÉúÎïºÍ»¯Ñ§³¢ÊÔÊÒ ¡£Olympic DestroyerÔøÔÚ2018Äê3ÔÂÕë¶Ôº«¹úƽ²ý¶¬°Â»áµÄ×éÖ¯Õß¡¢¹©¸øÉ̺ͺÏ×÷ͬ°éÌáÒé¹¥»÷ ¡£×êÑÐÍŶÓÅû¶Á˸Ã×éÖ¯µÄй¥»÷»î¶¯µÄÓйØIoC ¡£


Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/olympic-destroyer-is-still-alive/86169/


rightrightright¡¾Íþвµý±¨¡¿×êÑÐÈËÔ±³ÆmacOSµÄQuickLookÖ°Äܿɵ¼Ö¼ÓÃÜ´ÅÅ̵ÄÊý¾Ýй¶


Digita SecurityµÄ×êÑÐÈËÔ±Patrick WardleÖÒ¸æ³ÆmacOSÓû§´æ´¢ÔÚ¼ÓÃÜ´ÅÅÌÉϵÄÊý¾Ý²¢Ã»Óеõ½ºÜºÃµÄ±£»¤£¬ÓÉÓÚmacOSµÄQuickLookÖ°ÄÜÄܹ»±£ÁôͼƬµÈÎļþµÄÔ¤ÀÀ ¡£µ±Í¨¹ýUI²é¿´Ä¿Â¼Ê±£¬QuickLook½«×Ô¶¯´´½¨»ººÍ´æÎļþµÄËõÂÔͼ£¬ÕâЩËõÂÔͼ±£ÁôÔÚSQLiteÊý¾Ý¿âÖУ¬¿Éͨ¹ýÓйغÅÁî½øÐÐÌáÈ¡ ¡£¼´±ãԭʼÎļþ±»É¾³ý£¬ÕâЩ»º´æÈԾɴæÔÚ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/macos-quicklook-feature-leaks-data-despite-encrypted-drive/132905/


rightrightright¡¾ÀÕË÷Èí¼þ¡¿×êÑÐÍŶӰ䲼¹ØÓÚÀÕË÷Èí¼þSamSamµÄбäÌåµÄ·ÖÎö»ã±¨


Malwarebytes Labs×êÑÐÍŶӰ䲼¹ØÓÚSamSamµÄбäÌåµÄ·ÖÎö»ã±¨£¬ÀÕË÷Èí¼þSamSamµÄÓÐЧºÉÔØ£¨ÏÖʵִÐдÅÅ̼ÓÃܵĴúÂ룩ÊÇÔËÐÐʱ½âÃܵÄ£¬±ØÒª¹¥»÷ÕßÊÖ¶¯ÊäÈëÃÜÂëÀ´Ö´Ðй¥»÷£¬ÕâÊÇSamSamµÄÌØµã ¡£¸ÃÌØµãʹµÃSamSam²»»á×ÔÐд«²¼£¬Òâ±íÏÂÔØºÍÖ´ÐиöñÒâÈí¼þµÄÓû§²»»áÊܵ½ÖÐÉË£¬ÕâÒ²ÒâζÕßSamSamÖØÒªÓÃÓÚÓÐÕë¶ÔÐԵĹ¥»÷ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://blog.malwarebytes.com/threat-analysis/2018/06/samsam-ransomware-controlled-distribution/


rightrightright¡¾¶ñÒâÈí¼þ¡¿×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶ÔAndroidµÄжñÒâÈí¼þHeroRat


ESET×êÑÐÍŶӷ¢ÏÖÒ»¸öеÄAndroid Rat¼Ò×åHeroRat£¬¸ÃRat¼Ò×åÖÁÉÙ´Ó2017Äê8ÔÂÆðÍ·»îÔ¾£¬ÖØÒªÀûÓÃTelegramºÍ̸½øÐкÅÁîºÍ½ÚÔìÒÔ¼°Êý¾Ýй¶ ¡£HeroRatͨ¹ý¶àÖÖ·½Ê½´«²¼£¬Ô̺¬µÚÈý·½ÀûÓÃÉ̵ꡢÉ罻ýÌåºÍ̸ÌìÀûÓà ¡£HeroRatÖØÒªÕë¶ÔÒÁÀÊ£¬Æä¼äµýÖ°ÄÜÔ̺¬À¹½ØÎı¾ÐÂÎźÍÁªÏµÈËÐÅÏ¢¡¢·¢ËͶÌÐÅ¡¢²¦´òµç»°¡¢Â¼ÔìÉùÒôºÍÆÁÄ»¡¢»ñÈ¡É豸µØÎ»ÒÔ¼°Åú¸ÄϵͳÉèÖà ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.welivesecurity.com/2018/06/18/new-telegram-abusing-android-rat/


rightrightright¡¾¶ñÒâÈí¼þ¡¿×êÑÐÍŶӷ¢Èç½ñ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius


Check PointµÄ×êÑÐÍŶӷ¢ÏÖÁËÒ»¸öÔÚ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius£¬¸ÃľÂíͨ¹ýRIG Exploit Kit½øÐзַ¢£¬Ö¼ÔÚÖ´ÐÐweb×¢Èë¹¥»÷½«¶î±íµÄ×Ö¶ÎÔö³¤µ½ÒøÐеĺϷ¨µÇÂ¼Ò³Ãæ£¬²¢½«Óû§ÊäÈëµÄÐÅÏ¢·¢Ë͸ø¹¥»÷Õß ¡£KariusÓÉÈý¸öÎļþ×é³É£¬Ô̺¬injector32\64.exe¡¢proxy32\64.dllºÍmod32\64.dll£¬ÕâÈý¸öÎļþ¹²Í¬ÓÃÓÚÀ¹½ØÓû§µÄͨѶ£¬µ«¸Ã¶ñÒâÈí¼þËÆºõÈÔ´¦ÓÚ¿ª·¢»ò²âÊÔ״̬£¬ÕâÒ²ÊÇΪʲôÆäÉÐδÕë¶ÔÈκξßÌåµÄ½ðÈÚ»ú¹¹ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://research.checkpoint.com/banking-trojans-development/


rightrightright¡¾°²È«²¥±¨¡¿Ç°CIA¹ÍÔ±±»Ö¸¿ØÏòWikiLeaksй¶Vault 7ϵÁеÄCIAºÚ¿Í¹¤¾ß


ÃÀ¹ú˾·¨²¿°ä·¢¶ÔǰCIAÈí¼þ¹¤³ÌʦJoshua SchulteÌá³öеÄÖ¸¿Ø£¬³ÆÆäÉæÏÓÏòWikiLeaksй¶CIA»úÃÜÎļþ¡¢Èí¼þÏîÄ¿ºÍºÚ¿Í¹¤¾ß ¡£ÕâЩйÃÜÄÚÈݱ»³ÆÎªVault 7ϵÁУ¬ËüÏÔʾÁËCIAÈôºÎÀûÓúڿ͹¤¾ßÀ´¼à¿ØÍÆËã»ú¡¢ÊÖ»ú¡¢µçÊÓ¡¢ÍøÂçÉãÏñÍ·ºÍSSLÏνӵÈ ¡£Âü¹þ¶Ù¼ì²ì¹ÙGeoffrey S. Berman³Æ£¬ÕâÖÖ·¸·¨Ð¹ÃÜ¿ÉÄܶԹú¶È°²È«Ôì³ÉÑϳÁµÄÍþв£¬Ç±ÔÚµØÎ£¼°ÃÀ¹úÈËÃñµÄ°²È« ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/government/ex-cia-employee-charged-with-leak-of-classified-cia-vault-7-hacking-tools/