¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180620
°ä²¼¹¦·ò 2018-06-20


¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖAPT×éÖ¯Olympic DestroyerÕë¶ÔÅ·ÖÞµÄÐÂÖ¸±êÌáÒé¹¥»÷
2018Äê5ÔÂÖÁ6Ô¿¨°Í˹»ù³¢ÊÔÊÒ·¢ÏÖÊôÓÚAPT×éÖ¯Olympic DestroyerµÄд¹µöÎļþÑù±¾£¬¸Ã×éÖ¯´Ë¿ÌÔÚÕë¶Ô¶íÂÞ˹µÄ½ðÈÚ»ú¹¹ºÍÅ·ÖÞµÄÉúÎïºÍ»¯Ñ§³¢ÊÔÊÒ¡£Olympic DestroyerÔøÔÚ2018Äê3ÔÂÕë¶Ôº«¹úƽ²ý¶¬°Â»áµÄ×éÖ¯Õß¡¢¹©¸øÉ̺ͺÏ×÷ͬ°éÌáÒé¹¥»÷¡£×êÑÐÍŶÓÅû¶Á˸Ã×éÖ¯µÄй¥»÷»î¶¯µÄÓйØIoC¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/olympic-destroyer-is-still-alive/86169/


¡¾Íþвµý±¨¡¿×êÑÐÈËÔ±³ÆmacOSµÄQuickLookÖ°Äܿɵ¼Ö¼ÓÃÜ´ÅÅ̵ÄÊý¾Ýй¶
Digita SecurityµÄ×êÑÐÈËÔ±Patrick WardleÖÒ¸æ³ÆmacOSÓû§´æ´¢ÔÚ¼ÓÃÜ´ÅÅÌÉϵÄÊý¾Ý²¢Ã»Óеõ½ºÜºÃµÄ±£»¤£¬ÓÉÓÚmacOSµÄQuickLookÖ°ÄÜÄܹ»±£ÁôͼƬµÈÎļþµÄÔ¤ÀÀ¡£µ±Í¨¹ýUI²é¿´Ä¿Â¼Ê±£¬QuickLook½«×Ô¶¯´´½¨»ººÍ´æÎļþµÄËõÂÔͼ£¬ÕâЩËõÂÔͼ±£ÁôÔÚSQLiteÊý¾Ý¿âÖУ¬¿Éͨ¹ýÓйغÅÁî½øÐÐÌáÈ¡¡£¼´±ãÔʼÎļþ±»É¾³ý£¬ÕâЩ»º´æÈԾɴæÔÚ¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/macos-quicklook-feature-leaks-data-despite-encrypted-drive/132905/


¡¾ÀÕË÷Èí¼þ¡¿×êÑÐÍŶӰ䲼¹ØÓÚÀÕË÷Èí¼þSamSamµÄбäÌåµÄ·ÖÎö»ã±¨
Malwarebytes Labs×êÑÐÍŶӰ䲼¹ØÓÚSamSamµÄбäÌåµÄ·ÖÎö»ã±¨£¬ÀÕË÷Èí¼þSamSamµÄÓÐЧºÉÔØ£¨ÏÖʵִÐдÅÅ̼ÓÃܵĴúÂ룩ÊÇÔËÐÐʱ½âÃܵ쬱ØÒª¹¥»÷ÕßÊÖ¶¯ÊäÈëÃÜÂëÀ´Ö´Ðй¥»÷£¬ÕâÊÇSamSamµÄÌØµã¡£¸ÃÌØµãʹµÃSamSam²»»á×ÔÐд«²¼£¬Òâ±íÏÂÔØºÍÖ´ÐиöñÒâÈí¼þµÄÓû§²»»áÊܵ½ÖÐÉË£¬ÕâÒ²ÒâζÕßSamSamÖØÒªÓÃÓÚÓÐÕë¶ÔÐԵĹ¥»÷¡£
ÔÎÄÁ´½Ó£ºhttps://blog.malwarebytes.com/threat-analysis/2018/06/samsam-ransomware-controlled-distribution/


¡¾¶ñÒâÈí¼þ¡¿×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶ÔAndroidµÄжñÒâÈí¼þHeroRat
ESET×êÑÐÍŶӷ¢ÏÖÒ»¸öеÄAndroid Rat¼Ò×åHeroRat£¬¸ÃRat¼Ò×åÖÁÉÙ´Ó2017Äê8ÔÂÆðÍ·»îÔ¾£¬ÖØÒªÀûÓÃTelegramºÍ̸½øÐкÅÁîºÍ½ÚÔìÒÔ¼°Êý¾Ýй¶¡£HeroRatͨ¹ý¶àÖÖ·½Ê½´«²¼£¬Ô̺¬µÚÈý·½ÀûÓÃÉ̵ꡢÉ罻ýÌåºÍ̸ÌìÀûÓá£HeroRatÖØÒªÕë¶ÔÒÁÀÊ£¬Æä¼äµýÖ°ÄÜÔ̺¬À¹½ØÎı¾ÐÂÎźÍÁªÏµÈËÐÅÏ¢¡¢·¢ËͶÌÐÅ¡¢²¦´òµç»°¡¢Â¼ÔìÉùÒôºÍÆÁÄ»¡¢»ñÈ¡É豸µØÎ»ÒÔ¼°Åú¸ÄϵͳÉèÖá£
ÔÎÄÁ´½Ó£ºhttps://www.welivesecurity.com/2018/06/18/new-telegram-abusing-android-rat/


¡¾¶ñÒâÈí¼þ¡¿×êÑÐÍŶӷ¢Èç½ñ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius
Check PointµÄ×êÑÐÍŶӷ¢ÏÖÁËÒ»¸öÔÚ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius£¬¸ÃľÂíͨ¹ýRIG Exploit Kit½øÐзַ¢£¬Ö¼ÔÚÖ´ÐÐweb×¢Èë¹¥»÷½«¶î±íµÄ×Ö¶ÎÔö³¤µ½ÒøÐеĺϷ¨µÇÂ¼Ò³Ãæ£¬²¢½«Óû§ÊäÈëµÄÐÅÏ¢·¢Ë͸ø¹¥»÷Õß¡£KariusÓÉÈý¸öÎļþ×é³É£¬Ô̺¬injector32\64.exe¡¢proxy32\64.dllºÍmod32\64.dll£¬ÕâÈý¸öÎļþ¹²Í¬ÓÃÓÚÀ¹½ØÓû§µÄͨѶ£¬µ«¸Ã¶ñÒâÈí¼þËÆºõÈÔ´¦ÓÚ¿ª·¢»ò²âÊÔ״̬£¬ÕâÒ²ÊÇΪʲôÆäÉÐδÕë¶ÔÈκξßÌåµÄ½ðÈÚ»ú¹¹¡£
ÔÎÄÁ´½Ó£ºhttps://research.checkpoint.com/banking-trojans-development/


¡¾°²È«²¥±¨¡¿Ç°CIA¹ÍÔ±±»Ö¸¿ØÏòWikiLeaksй¶Vault 7ϵÁеÄCIAºÚ¿Í¹¤¾ß
ÃÀ¹ú˾·¨²¿°ä·¢¶ÔǰCIAÈí¼þ¹¤³ÌʦJoshua SchulteÌá³öеÄÖ¸¿Ø£¬³ÆÆäÉæÏÓÏòWikiLeaksй¶CIA»úÃÜÎļþ¡¢Èí¼þÏîÄ¿ºÍºÚ¿Í¹¤¾ß¡£ÕâЩйÃÜÄÚÈݱ»³ÆÎªVault 7ϵÁУ¬ËüÏÔʾÁËCIAÈôºÎÀûÓúڿ͹¤¾ßÀ´¼à¿ØÍÆËã»ú¡¢ÊÖ»ú¡¢µçÊÓ¡¢ÍøÂçÉãÏñÍ·ºÍSSLÏνӵȡ£Âü¹þ¶Ù¼ì²ì¹ÙGeoffrey S. Berman³Æ£¬ÕâÖÖ·¸·¨Ð¹ÃÜ¿ÉÄܶԹú¶È°²È«Ôì³ÉÑϳÁµÄÍþв£¬Ç±ÔÚµØÎ£¼°ÃÀ¹úÈËÃñµÄ°²È«¡£


¾©¹«Íø°²±¸11010802024551ºÅ