¡¾·ÖÎö»ã±¨¡¿×êÑлú¹¹°ä²¼2018ÄêQ1±±ÃÀÍøÂçÍþвÇ÷ÏòµÄ·ÖÎö»ã±¨
Ç÷Ïò¿Æ¼¼×êÑÐÍŶӰ䲼2018ÄêµÚÒ»¼¾¶ÈµÄ±±ÃÀÍþвÇ÷Ïò»ã±¨£¬»ã±¨µÄÖØÒª·¢ÏÖÔ̺¬£ºÐÅÏ¢ÇÔÈ¡Àà¶ñÒâÈí¼þÒÀÈ»Êǵ±½ñ×îÊ¢ÐеĶñÒâÈí¼þÖ®Ò»£»Ö»¹ÜÀÕË÷Èí¼þ¹¥»÷µÄÊýÁ¿ÓÐËù½µÂ䣬ÆäÒÀÈ»ÊǼì²âÊýÁ¿×î¶àµÄÍþв£»¶ñÒâÍÚ¿óÈí¼þµÄÈȶÈÒÀÈ»ºÜ¸ß¡£´¹µöÓʼþºÍ¶ñÒâÍøÕ¾³ÉÎªÖØÒªµÄ´«²¼Ã½½é¡£³ö¸ñÊÇ´¹µöÓʼþ£¬ÆäÓµÓе¥Ò»ÐÔºÍÓÐЧÐÔ£¬Òò¶øÔÚÍøÂç·¸×ï·Ö×ÓÖÐ¿í·ºÊ¹Óá£
ÔÎÄÁ´½Ó£ºhttps://documents.trendmicro.com/assets/proactive-incident-response-north-america-threat-landscape-2018-q1.pdf
¡¾¹¥»÷ÊÂÎñ¡¿º«¹ú¼ÓÃÜÇ®±ÒÂòÂôËùBithumbÒ»ÄêÄÚµÚ¶þ´ÎÔâºÚ¿ÍÈëÇÖ£¬Ô¼3100ÍòÃÀÔª±»ÇÔ
ƾ¾Ýº«¹ú¼ÓÃÜÇ®±ÒÂòÂôËùBithumbµÄÉêÃ÷£¬¸Ã¹«Ë¾ÔÚ6ÔÂ19ÈÕÖÁ20ÈÕµÄÒ¹¼äÔâµ½ºÚ¿ÍÈëÇÖ£¬¼ÛÖµÔ¼350ÒÚº«Ôª£¨3160ÍòÃÀÔª£©µÄ¼ÓÃÜÇ®±Ò±»ÇÔ¡£BithumbûÓÐй©¹ØÓÚÕâ´Î¹¥»÷µÄ¸ü¶àϸ½Ú£¬Ô̺¬ºÚ¿ÍÈôºÎ½øÈëϵͳºÍÈôºÎÇÔÈ¡×ʽ𡣸ù«Ë¾°µÊ¾´òËãÀûÓô¢Ðî»ù½ðÀ´Åâ³¥ÊÜËðʧµÄÓû§¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bithumb-hacked-second-time-in-a-year-hackers-steal-31-million/
¡¾¶ñÒâÈí¼þ¡¿×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶ÔÈÕ±¾ºÍº«¹úµÄAndroid¶ñÒâÈí¼þFakeSpy
Ç÷Ïò¿Æ¼¼×êÑÐÍŶӷ¢ÏÖÒ»¸öеÄAndroid¶ñÒâÈí¼þFakeSpy£¬FakeSpyͨ¹ýSMS¶ÌÐŽøÐд«²¼£¬ÖØÒªÓÃÓÚÇÔÈ¡ÊÜϰȾÉ豸µÄ¶ÌÐÅ¡¢ÕË»§¡¢ÁªÏµÈ˺Íͨ»°¼Í¼µÈÐÅÏ¢£¬»¹Äܹ»ÓÃÓÚ·Ö·¢ÒøÐÐľÂí¡£FakeSpyÄ¿Ç°ÖØÒªÕë¶ÔÈÕ±¾ºÍº«¹ú£¬µ«Ò²ÓпÉÄÜ»áÀ©´óÆä¹¥»÷ÁìÓò¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/fakespy-android-information-stealing-malware-targets-japanese-and-korean-speaking-users/
¡¾¶ñÒâÈí¼þ¡¿×êÑÐÈËÔ±ÔÚºÚ¿ÍÂÛ̳ÉÏ·¢ÏÖжñÒâÈí¼þKardon Loader
°²È«×êÑÐÈËÔ±·¢ÏÖÒ»¿îеĶñÒâÈí¼þKardon Loader£¬¸Ã¶ñÒâÈí¼þÔÚºÚ¿ÍÂÛ̳ÉÏÒÔ50ÃÀÔªµÄ¼ÛÖµÏúÊÛ£¬²¢Ö§³Ö±ÈÌØ±ÒÖ§¸¶¡£Kardon LoaderĿǰ»¹´¦ÓÚ¿ª·¢½×¶Î£¬ËüÊÇÒ»ÖÖ¶ñÒâÈí¼þ¼ÓÔØ·¨Ê½£¬Í¨³£×÷ΪµÚÒ»½×¶Î¶ñÒâÈí¼þ½øÐв¿Êð£¬ÓÃÓÚϰȾָ±ê²¢»ñÈ¡ÓÆ¾ÃÐÔ£¬½ø¶øÏÂÔØºÍ×°Öõڶþ½×¶ÎµÄÓÐЧºÉÔØ£¨ÒøÐÐľÂí¡¢ÀÕË÷Èí¼þµÈ£©¡£Kardon LoaderµÄ¿ª·¢ÕßYattazeÉÕ»ÙÁË֮ǰµÄÒ»¸öÀàËÆµÄÏîÄ¿ZeroCool£¬×ª¶øÊ¹ÓÃÆä´úÂëÀ´¿ª·¢Kardon Loader¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hacking-forum-ad-peddles-new-kardon-loader-malware/
¡¾Íþвµý±¨¡¿×êÑÐÈËÔ±ÖÒ¸æ³Æ´¹µöÓʼþ¿Éͨ¹ýZeroFont¼¼ÊõÈÆ¹ýOffice 365µÄ±£»¤
AvananµÄ°²È«×êÑÐÈËÔ±ÖÒ¸æ³ÆÍøÂç·¸×ï·Ö×ÓÔÚʹÓÃZeroFont¼¼ÊõÀ´Èƹý´óÎÞÊýµç×ÓÓʼþ·þÎñµÄ´¹µö¼ì²â»úÔì¡£¸Ã¼¼ÊõÉæ¼°ÔÚ´¹µöÓʼþµÄÄÚÈÝÖвåÈë×ÖÌå´óÓ×Ϊ0µÄ°µ²ØÎÄ×Ö£¬Ê¹ÆäÊÓ¾õ±í¹Û²»±ä£¬Í¬Ê±¿ÉÈÆ¹ýµç×ÓÓʼþµÄ°²È«É¨Ã跨ʽ¡£¸Ã¹«Ë¾³ÆMicrosoft Office 365Ò²²»Äܼì²â³öͨ¹ýZeroFont¼¼ÊõÔì×÷µÄ¶ñÒâÓʼþ¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/06/email-phishing-protection.html
¡¾·ì϶²¹¶¡¡¿×êÑÐÍŶÓÅû¶Insteon HubÖеĶà¸ö¿Éµ¼ÖÂRCEºÍDoSµÄ°²È«·ì϶
˼¿ÆTalos×êÑÐÍŶÓÅû¶Insteon HubÖеÄ12¸ö°²È«·ì϶£¬·ì϶ÁìÓòÔ̺¬Ô¶³Ì´úÂëÖ´Ðкͻؾø·þÎñµÈ¡£Insteon HubÊÇÒ»¸öÖÐÑë½ÚÔìÆ÷£¬¿ÉÔÊÐíÓû§Í¨¹ýÊÖ»úÔ¶³ÌÏνӺÍÖÎÀíÆä¼ÒÖеÄÉ豸¡£´ó²¿ÃÅ·ì϶µÄ±¾ÔÊDz»°²È«µØÊ¹ÓÃÁËstrcpy()º¯Êý£¬µ¼Ö»º³åÇøÒç³ö¡£¾ßÌå·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£
ÔÎÄÁ´½Ó£ºhttps://blog.talosintelligence.com/2018/06/multiple-vuln-insteon.html