¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180706

°ä²¼¹¦·ò 2018-07-06

¡¾¶ñÒâÈí¼þ¡¿×êÑÐÍŶӰ䲼¹ØÓÚ¶ñÒâÈí¼þTrojan-Ransom.Win32.RakhniµÄ·ÖÎö»ã±¨


¿¨°Í˹»ù³¢ÊÔÊÒ°ä²¼¹ØÓÚ¶ñÒâÈí¼þTrojan-Ransom.Win32.RakhniµÄ·ÖÎö»ã±¨¡£¸Ã¶ñÒâÈí¼þ×îÔç³öÏÖÓÚ2013Ä꣬×êÑÐÈËÔ±·¢ÏָöñÒâÈí¼þµÄÐÂÑù±¾ÖØÒªÕë¶Ô¶íÂÞ˹£¨95.57%£©£¬´Ë±í¹þÈø¿Ë˹̹¡¢ÎÚ¿ËÀ¼¡¢µÂ¹úºÍÓ¡¶ÈµÄ²¿ÃÅÓû§Ò²ÊÜÓ°Ïì¡£À¬»øÓʼþ»î¶¯ÒÀÈ»ÊǸöñÒâÈí¼þµÄÖØÒª·Ö·¢·½Ê½¡£¸Ã¶ñÒâÈí¼þ»áƾ¾ÝÓû§ÏµÍ³ÉÏÊÇ·ñ´æÔÚ£¥AppData£¥\BitcoinÎļþ¼ÐÀ´¾ö¶¨ÊÇÏÂÔØ¼ÓÃÜÀàÀÕË÷Èí¼þ»¹ÊÇÏÂÔØ¶ñÒâÍÚ¿óÈí¼þ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/to-crypt-or-to-mine-that-is-the-question/86307/


¡¾·ì϶²¹¶¡¡¿Google°ä²¼2018Äê7ÔµÄAndroid°²È«¸üУ¬¹²½¨¸´70¸ö·ì϶


2018Äê7ÔµÄAndroid°²È«¸üй²Ô̺¬2¸ö²¹¶¡°ü£¨2018-07-01ºÍ2018-07-05£©£¬¹²½¨¸´¶à¸ö×é¼þÖеÄ44¸ö°²È«·ì϶£¬ÊÜÓ°ÏìµÄ×é¼þÔ̺¬Framework¡¢Media Framework¡¢Kernel¡¢¸ßͨ×é¼þÒÔ¼°¸ßͨ¹ØÔ´×é¼þ¡£ÆäÖÐ×îΪÑϳÁµÄ·ì϶ÊÇMedia FrameworkÖеĸßΣԶ³Ì´úÂëÖ´Ðзì϶£¨CVE-2018-9411£©¡£´Ë±í£¬Google»¹½¨¸´ÁËPixelºÍNexusÉ豸ÖеÄ26¸ö°²È«·ì϶¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://news.softpedia.com/news/google-releases-june-2018-s-android-security-patch-to-fix-70-vulnerabilities-521829.shtml


¡¾·ì϶²¹¶¡¡¿»ªÎª½¨¸´Æä¶à¸ö²úÆ·ÖеÄÈõ¼ÓÃÜËã·¨·ì϶£¨CVE-2017-17174£©


»ªÎª°ä²¼¶à¸ö²úÆ·µÄ°²È«¸üУ¬½¨¸´2017Ëêĺ·¢ÏÖµÄÈõ¼ÓÃÜËã·¨·ì϶£¨CVE-2017-17174£©¡£¸Ã·ì϶Óë²»°²È«µÄ¼ÓÃÜËã·¨Ö´ÐÐÓйØ£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÀûÓø÷ì϶À´½âÃÜ·þÎñÆ÷ºÍ¿Í»§¶ËÖ®¼äµÄ»á»°ÃÜÔ¿£¬´Ó¶øµ¼ÖÂÐÅϢй¶»òÖÐÑëÈ˹¥»÷¡£ÊÜÓ°ÏìµÄ²úÆ·Ô̺¬RSE6500¡¢SoftCo¡¢VP9660ºÍeSpace U1981¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/74152/hacking/hawei-encryption-bug.html


¡¾Íþвµý±¨¡¿Gentoo LinuxÍŶӳƹ¥»÷Õßͨ¹ýÃÜÂë²Â²â»ñµÃÆäGitHubÕË»§µÄÃÜÂë

Gentoo Linux¿ª·¢ÍŶӰ䲼¹ØÓÚGitHubÕË»§ÔâºÚ¿ÍÈëÇÖÊÂÎñµÄµ÷²é»ã±¨¡£¸ÃÍŶӳƹ¥»÷Õßͨ¹ýÃÜÂë²Â²â»ñµÃÆäGitHubÕË»§µÄÃÜÂë¼°ÖÎÀíȨÏÞ£¬µ÷²é·¢ÏÖµÄÎÊÌ⻹Ô̺¬Î´Ñ¡È¡Ë«³É·ÖÈÏÖ¤¡¢Î´±£ÁôGitHub Organization¾ßÌåÐÅÏ¢µÄ±¸·ÝÒÔ¼°systemd repoÖ±½Ó´æ´¢ÔÚGitHubÉÏ¡£ÐÒÔ˵ÄÊÇ£¬GentooºÍGithub¶Ô¸ÃÊÂÎñµÄÏìÓ¦½Ïʵʱ£¬Ê¹µÃ¹¥»÷Ö»³ÖÐøÁËÔ¼70·ÖÖÓ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/07/github-hacking-gentoo-linux.html


¡¾Íþвµý±¨¡¿×êÑÐÍŶÓÑÝʾͨ¹ý¼üÅÌÈȲÐÁôÀ´ÇÔÈ¡ÃÜÂëµÄThermanator¹¥»÷¼¼Êõ


ƾ¾Ý¼ÓÖÝ´óѧŷÎÄ·ÖУ£¨UCI£©µÄÈýλ¿ÆÑ§¼ÒµÄ×êÑУ¬Óû§ÔÚ¼üÅÌÉÏÊäÈëÎı¾Ê±´æÔÚÈȲÐÁô£¬¶ñÒâ¹¥»÷Õß¿ÉÀûÓÃÈȳÉÏñÉãÏñ»ú¼Í¼ÕâЩÈȲÐÁô²¢ÇÔÈ¡Óû§µÄÃÜÂë¡£ÕâÖÖ¹¥»÷¼¼Êõ±»³ÆÎªThermanator£¬³¢ÊÔÅú×¢ÔÚÓû§ÊäÈëÃÜÂëºóµÄ30ÃëÄڼͼµÄÈÈÊý¾Ý×ãÒÔÓÃÀ´¸´Ô­Óû§µÄÊäÈëÄÚÈÝ£¬ÕâЩÄÚÈÝ¿ÉÄÜÊǶÌÎı¾µÄÑéÖ¤Âë¡¢ÒøÐÐÃÜÂë»òµÇ¼ÃÜÂë¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/thermanator-attack-steals-passwords-by-reading-thermal-residue-on-keyboards/


¡¾¹¥»÷ÊÂÎñ¡¿ÒÔÉ«ÁÐÖ¸¿Ø¹þÂí˹¿Ö²À×é֯ͨ¹ý¼äµýÈí¼þ¹¥»÷ÒÔÉ«ÁÐÊ¿±ø

ÒÔÉ«Áа²È«»ú¹¹Ö¸¿Ø¹þÂí˹¿Ö²ÀÖ÷Òå×é֯ͨ¹ý¼äµýÈí¼þϰȾÒÔÉ«ÁÐÊ¿±øµÄÊÖ»ú£¬ÒÔÍøÂçÓйØÐÅÏ¢¡£ÕâЩ¼äµýÈí¼þÒÔÊÀ½ç±­appºÍÔÚÏßÔ¼»áappµÄ´ó¾ÖÉÏ´«ÖÁGoogle PlayÉ̵꣬Լ100È˳ÉΪÊܺ¦Õß¡£ÕâЩ¼äµýÈí¼þµÄÖ°ÄÜÔ̺¬¼Í¼Óû§µÄµç»°¡¢ÅÄÕÕ¡¢ÇÔÈ¡ÁªÏµÈ˺ͶÌÐÅ¡¢ÇÔÈ¡É豸ÉϵÄͼƬºÍÊÓÆµÒÔ¼°¼Í¼Óû§µÄGPSµØÎ»µÈ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2018/07/05/an-invasive-spyware-attack-on-military-mobile-devices/