¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180718
°ä²¼¹¦·ò 2018-07-18¡¾·ÖÎö»ã±¨¡¿×êÑлú¹¹°ä²¼2018ÄêQ2ÍøÂç·¸×ïÇ÷ÏòµÄ·ÖÎö»ã±¨
Malwarebytes Labs°ä²¼2018ÄêµÚ¶þ¼¾¶ÈµÄÍøÂç·¸×ïÇ÷Ïò»ã±¨£¬»ã±¨µÄÖØÒª·¢ÏÖÔ̺¬£º¶ñÒâÍÚ¿óÈȶÈÒÀÈ»ºÜ¸ß£¬µ«ÒÑÆðÍ·½µÂ䣻GandCrab³ÉΪÀÕË÷Èí¼þµÄÍõÕߣ»¸æ°×Èí¼þÏà±ÈÉÏÒ»¼¾¶ÈÔö³¤19%£»VPNFilterµÄ¼ì²â´ÎÊý³¬¹ý50Íò´Î£»ExploitsÔÚÉÏÉý£»Ú¿ÆÕßÔ½À´Ô½¶àµØÕë¶ÔPII£¨Ó×ÎÒÉí·ÝÐÅÏ¢£©¡£
ÔÎÄÁ´½Ó£ºhttps://blog.malwarebytes.com/malwarebytes-news/ctnt-report/2018/07/cybercrime-tactics-techniques-q2-2018/
¡¾°²È«·ì϶¡¿Telefonica¹ÙÍø·ì϶¿Éµ¼ÖÂÊý°ÙÍòÓû§µÄÓ×ÎÒÐÅϢй¶
Î÷°àÑÀµçÐŹ«Ë¾TelefonicaµÄ¹Ì»°¡¢¿í´ø¼°¸¶·ÑµçÊÓÒµÎñMovistarµÄ¹ÙÍø´æÔÚ·ì϶£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§µÄÓ×ÎÒÐÅϢй¶¡£Movistar¹ÙÍøÉÏÓÃÓڲ鿴·¢Æ±µÄÒ³ÃæµÄURLÖÐÔ̺¬ÁË·¢Æ±µÄID£¬ÈκÎÓû§¶¼Äܹ»Í¨¹ýÅú¸Ä´ËIDÀ´²é¿´ÆäËüÕË»§µÄÊý¾Ý¡£Æ¾¾ÝеÄGDPR»®¶¨£¬¸Ã¹«Ë¾¿ÉÄÜÃæ¶Ô1000Íò~2000ÍòÅ·Ôª»òÏ൱ÓÚÆäÄê½»Ò×¶î2%~4%µÄ·£¿î¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/telefonica-spain-exposed-the-personal-details-of-millions-of-customers/
¡¾¹¥»÷ÊÂÎñ¡¿×êÑÐÈËÔ±·¢ÏÖÕë¶ÔÒâ´óÀûÈýÐÇ·þÎñÖÐÐĵĶñÒâÈí¼þ¹¥»÷»î¶¯
TG SoftµÄ°²È«×êÑÐÈËÔ±·¢ÏÖÕë¶ÔÒâ´óÀûÈýÐÇ·þÎñÖÐÐĵijÖÐø¶ñÒâÈí¼þ¹¥»÷»î¶¯¡£¹¥»÷Õßͨ¹ýÍøÂç´¹µöÓʼþ·Ö·¢¶ñÒâÈí¼þNetwireºÍnjRAT£¬ÆäÀûÓõķì϶ÊÇOffice¹«Ê½±à×ëÆ÷·ì϶£¨CVE-2017-11882£©¡£ÕâЩ¹¥»÷»î¶¯Óë֮ǰFortinet»ã±¨µÄÕë¶Ô¶íÂÞ˹·þÎñÖÐÐĵĹ¥»÷»î¶¯ÏÕЩһÑù¡£Ä¿Ç°»¹²»Ã÷ÏÔ¹¥»÷ÕßµÄ×îÖÕÖ÷ÕÅ¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/samsung-service-centers-in-italy-targeted-in-malware-campaign/
¡¾Íþвµý±¨¡¿×êÑÐÈËÔ±ÑÝʾÈôºÎͨ¹ýµÍ³É±¾É豸ºýŪGPSµ¼º½ÏµÍ³
×êÑÐÈËÔ±¿ª·¢³öÒ»ÖÖÄܹ»¼Ù×°³ÉGPSÎÀÐÇÀ´ºýŪ×ó½üµÄGPS½Ó¹ÜÆ÷µÄ¹¤¾ß£¬¸Ã¹¤¾ß¿ÉÓÃÓÚºýŪ³µÁ¾µÄµ¼º½ÏµÍ³¡£×êÑÐÈËÔ±»ùÓÚRaspberry Pi¹¹½¨ÁËÒ»¸öÎÞÏߵ緢Éä×°Ö㬹²ÆÆ·ÑÔ¼223ÃÀÔª£¬¸Ã×°ÖõÄÓÐЧÁìÓòÊÇ40~50Ã×£¬ÔÚ²âÊÔÖÐÄܹ»ÒÔ95%µÄÕýÈ·ÂʺýŪµ¼º½ÏµÍ³²¢Åú¸Ä¼Ýʻ·Ïß¡£¸Ã×°Öò»Ðݹ㲥ÐéαµÄ¶¨Î»ÐÅÏ¢£¬Ê¹µÃ³µÁ¾ÉÏµÄ½Ó¹ÜÆ÷ÏÕЩ²»³ÉÄÜ´ÓÎÀÐÇÉÏ»ñµÃÕæÊµµÄÊý¾Ý¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/74509/hacking/navigation-systems-hack.html
¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖÍøÂç¼äµý×éÖ¯BlackgearµÄй¥»÷»î¶¯
BlackgearÒ²±»³ÆÎªTopgear»òComnie£¬ÊÇÒ»¸ö¿É×·ÒäÖÁ2008ÄêµÄÍøÂç¼äµý»î¶¯£¬ÖØÒªÕë¶ÔÖйų́Íå¡¢º«¹úºÍÈÕ±¾¡£ÆäÖ¸±êÔ̺¬µçÐÅ¡¢¹ú·À¡¢µ±¾Ö¡¢º½¿Õº½ÌìÒÔ¼°¸ß¿Æ¼¼ÐÐÒµµÄ¹«Ë¾¡£Ç÷Ïò¿Æ¼¼×êÑÐÍŶӷ¢ÏÔìä×îÐµĹ¥»÷»î¶¯Ê¹ÓÃа汾µÄProtuxºóÃźÍMaradeÏÂÔØÆ÷£¬²¢Ê¹ÓÃFacebookµÈÉ罻ýÌå½øÐÐC&CͨѶ¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/blackgear-cyberespionage-campaign-resurfaces-abuses-social-media-for-cc-communication/
¡¾¶ñÒâÈí¼þ¡¿°²È«×êÑÐÍŶӰ䲼¹ØÓÚÀÕË÷Èí¼þCryaklµÄ·ÖÎö»ã±¨
¿¨°Í˹»ù³¢ÊÔÊÒ°ä²¼¹ØÓÚÀÕË÷Èí¼þCryaklµÄ·ÖÎö»ã±¨¡£2018Äê2Ô±ÈÀûʱ¾¯·½²é»ñÁËCryaklµÄC&C·þÎñÆ÷£¬×êÑÐÈËÔ±Òò¶øµÃÒÔ¿ª·¢Ãâ·ÑµÄ½âÃܹ¤¾ß¡£Cryakl×îÔç³öÏÖÓÚ2014Äê£¬ÖØÒªÍ¨¹ýÍøÂç´¹µöÓʼþ´«²¼£¬Æä¹²Ï°È¾Á˶íÂÞ˹µÄ5Íò¶àÈË£¬ÒÔ¼°ÈÕ±¾¡¢Òâ´óÀûºÍµÂ¹úµÄÊýǧÃûÓû§¡£CryaklÔ̺¬¶à¸ö°æ±¾£¬´ÓCL 1.0.0.0ÖÁCL 1.3.1.0£¬Êܺ¦Õß¿ÉʹÓÃÃâ·Ñ½âÃܹ¤¾ßRakhniDecryptor½âÃÜÆäÎļþ¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/the-return-of-fantomas-or-how-we-deciphered-cryakl/86511/


¾©¹«Íø°²±¸11010802024551ºÅ