¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180713
°ä²¼¹¦·ò 2018-07-13¡¾¶ñÒâÈí¼þ¡¿ÒøÐÐľÂíHancitor¾íÍÁ³ÁÀ´£¬ÖØÒªÍ¨¹ý´¹µöÓʼþ´«²¼
ÒøÐÐľÂíHancitor×îÔçÓÚ2014Äê±»·¢ÏÖ£¬ÓÃÓÚÏÂÔØÆäËü¶ñÒâÈí¼þ²¢ÇÔÈ¡Óû§µÄÍ´´¦¡£SentinelOne¹Û²ìµ½Hancitorͨ¹ýÍøÂç´¹µöÓʼþ½øÐд«²¼µÄ¶ñÒâ»î¶¯¡£Ò»Ð©´¹µöÓʼþÒÔÍ£³µ·£¿îµ¥ÎªÖ÷Ì⣬ºýŪÓû§µã»÷Æä¶ñÒâÁ´½Ó²¢ÏÂÔØ¶ñÒâwordÎĵµ¡£»¹ÓÐһЩÀ¬»øÓʼþÀ´×ÔÓÚIntuit»òHalloFax£¬ºýŪÓû§ÏÂÔØ¶ñÒâ´«ÕæÎļþ¡£×êÑÐÈËÔ±Åû¶Á˸öñÒâ»î¶¯µÄ¶ñÒâ·Ö·¢ÍøÖ·¼°C2·þÎñÆ÷¡¢ÓÐЧºÉÔØµÈÈëÇÖÖ¸±ê£¨IoC£©¡£
ÔÎÄÁ´½Ó£ºhttps://www.sentinelone.com/blog/hancitor-banking-trojan-is-back-%7C-using-malicious-word-attachment/
¡¾¶ñÒâÈí¼þ¡¿×êÑÐÍŶӰ䲼¹ØÓÚHawkeye KeyloggerµÄбäÌåµÄ·ÖÎö»ã±¨
΢ÈíOFFICE 365×êÑÐÍŶӰ䲼¹ØÓÚ¶ñÒâÈí¼þHawkeye KeyloggerµÄбäÌåµÄ·ÖÎö»ã±¨¡£Hawkeye KeyloggerÓÖ±»³ÆÎªiSpy Keylogger£¬ÖØÒªÓÃÓÚÇÔÈ¡Óû§µÄÐÅÏ¢£¬Æä×îºóÒ»´Î³Ê´Ë¿Ì2016Äê¡£µ«×êÑÐÈËÔ±ÔÚ2018Äê4Ô·¢ÏָöñÒâÈí¼þÔٴγöÏÖ£¬ÖØÒªÕë¶ÔÈí¼þºÍ¼¼ÊõÐÐÒµ£¨52%£©£¬ÒÔ¼°ÒøÐУ¨11%£©¡¢ÄÜÔ´£¨8%£©¡¢»¯¹¤£¨5%£©ºÍÆû³µ£¨5%£©ÐÐÒµ¡£ÊÜÓ°ÏìµÄ¹ú¶È/µØÓòÔ̺¬°¢ÁªÇõ£¨19%£©¡¢ºÉÀ¼£¨15%£©¡¢ÃÀ¹ú£¨11%£©¡¢ÄÏ·Ç£¨6%£©ÒÔ¼°Ó¢¹ú£¨5%£©¡£
ÔÎÄÁ´½Ó£ºhttps://cloudblogs.microsoft.com/microsoftsecure/2018/07/11/hawkeye-keylogger-reborn-v8-an-in-depth-campaign-analysis/
¡¾¶ñÒâÈí¼þ¡¿×êÑÐÍŶÓÔÚGoogle PlayÖз¢ÏÖмäµýÈí¼þGolden Cup
McAfee Labs×êÑÐÍŶÓÔÚGoogle PlayÉÏ·¢ÏÖÓëÊÀ½ç±Ö÷ÌâÓйصÄмäµýÈí¼þGolden Cup¡£ÔÚδ¾Óû§Ô޳ɵÄÇé¿öÏ£¬Golden Cup»áÔÚºó¶Ü¾²Ä¬ÍøÂçÓû§µÄÐÅÏ¢²¢·¢ËÍÖÁ·þÎñÆ÷£¬ÕâЩÐÅÏ¢Ô̺¬Óû§µÄµç»°ºÅÂë¡¢ÒÑ×°ÖÃÀûÓÃÁÐ±í¡¢É豸ID¡¢Android°æ±¾¡¢IMEI¡¢IMSI¡¢¿ÉÓô洢ÈÝÁ¿ÒÔ¼°É豸µÄÐͺ𢳧É̺ÍÐòÁкš£×êÑÐÈËÔ±»¹·¢ÏÖÁËͳһÍþвµÄÁí±íÁ½¸ö±äÌ壬Google PlayÒѾɾ³ýÁËÕâЩ¶ñÒâÀûÓá£
ÔÎÄÁ´½Ó£ºhttps://securingtomorrow.mcafee.com/mcafee-labs/google-play-users-risk-a-yellow-card-with-android-foulgoal-a/
¡¾¹¥»÷ÊÂÎñ¡¿VSDC¹ÙÍø1¸öÔÂÄÚÈý´ÎÔâºÚ¿ÍÈëÇÖ£¬ÆäÈí¼þÏÂÔØÁ´½Ó±»½Ù³Ö
VSDCÊÇÒ»¼ÒÌṩÃâ·ÑÊÓÆµ±à×ëÈí¼þµÄ¹«Ë¾£¬Æä¹ÙÍøÔÚ1¸öÔÂÄÚÈý´ÎÔâµ½ºÚ¿ÍÈëÇÖ£¨6ÔÂ18ÈÕ¡¢7ÔÂ2ÈÕºÍ7ÔÂ6ÈÕ£©£¬¹¥»÷Õß½«ÆäVSDCÈí¼þµÄÏÂÔØÁ´½Ó´úÌæÎª¶ñÒâÁ´½Ó£¬±ðÀ뽫Óû§³Á¶¨ÏòÖÁÈý¸ö¶ñÒâÈí¼þ£¨Ò»¸öÓÃÓÚÇÔÈ¡Óû§ÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬Ò»¸ö¼üÅ̼ͼÆ÷ºÍÒ»¸öÔ¶¿ØÄ¾ÂíRAT£©¡£VSDCÈ·ÈÏÁËÕâЩÊÂÎñ£¬²¢³ÆÆäÒѾ½¨¸´ÁËÍøÕ¾¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/popular-software-site-hacked-to-redirect-users-to-keylogger-infostealer-more/
¡¾¹¥»÷ÊÂÎñ¡¿ÃÀ¹ú¿¨Ë¹µØÓòµÄÒ½ÁÆÖÐÐÄÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷
ÃÀ¹úÃÜËÕÀïÖÝ¿¨Ë¹µØÓòµÄÒ½ÁÆÖÐÐÄ³ÆÆäÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷£¬ÆäÄÚ²¿Í¨Ñ¶ÏµÍ³ºÍµç×Ó½¡È«µµ°¸ÏµÍ³£¨EHR£©ÊÜÓ°Ïì¡£¸ÃÒ½ÁÆÖÐÐijÆÃ»ÓÐÖ¤¾ÝÅú×¢»¼ÕßµÄÊý¾Ý±»½Ó¼û¡£Ä¿Ç°»¹²»Ã÷ÏÔÆäÍÆËã»ú/·þÎñÆ÷ÈôºÎ±»Ï°È¾£¬µ«Óйط¨Âɲ¿ÃÅÒѾȾָ½øÐе÷²é¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/cass-regional-medical-center-hit-with-unidentified-ransomware/
¡¾·ì϶²¹¶¡¡¿µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGO½¨¸´ÆäHMI²úÆ·ÖеĶà¸ö·ì϶
µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGO½¨¸´Æäe!DISPLAY 7300TÈË»ú½çÃæ£¨HMI£©²úÆ·ÖеĶà¸ö°²È«·ì϶£¬Ô̺¬XSS·ì϶£¨CVE-2018-12981£©¡¢ÎļþÉÏ´«·ì϶£¨CVE-2018-12980£©ÒÔ¼°Ä¬ÈÏȨÏÞÅäÖò»ÕýÈ·µÄ·ì϶£¨CVE-2018-12979£©¡£Í¨¹ý×éºÏÀûÓÃÕâЩ·ì϶£¬¹¥»÷Õ߿ɸ²¸Çindex.html²¢ÒÔwwwÓû§µÄȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£ÊÜÓ°ÏìµÄÐͺÅÔ̺¬762-3000~762-3003£¬WAGOÒÑÔڹ̼þ°æ±¾02Öн¨¸´ÁËÕâЩ·ì϶¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/hackers-can-chain-multiple-flaws-attack-wago-hmi-devices


¾©¹«Íø°²±¸11010802024551ºÅ