¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180727
°ä²¼¹¦·ò 2018-07-27
ÖÐÔ¶º£Ô˵ÄÃÀ¹ú·Ö¹«Ë¾Ôâµ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬Æä¹«Ë¾ÍøÂçÒÑÏÝÈë̱»¾¡£¸ÃÊÂÎñ²úÉúÔÚ7ÔÂ24ÈÕÐÇÆÚ¶þ£¬µ«Ä¿Ç°¸Ã¹«Ë¾ÃÀ¹úµØÓòµÄIT»ù´¡ÉèÊ©ÈÔ´¦ÓڹعØÖ®ÖУ¬Ô̺¬µç×ÓÓʼþ·þÎñÆ÷ºÍµç»°ÍøÂçµÈ£¬Æä¹ÙÍøÒ²´¦ÓڹعØ×´Ì¬¡£Ï°È¾¸Ã¹«Ë¾ÍøÂçµÄÀÕË÷Èí¼þÀàÐÍÒÀȻδ֪£¬Ä¿Ç°¸Ã¹«Ë¾Ò²Î´×÷³ö¸ü¶à»ØÓ¦¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ransomware-infection-cripples-shipping-giant-coscos-american-network/
¡¾¹¥»÷ÊÂÎñ¡¿Î¢Èí×êÑÐÈËÔ±·¢ÏÖÕë¶ÔÒ»PDF±à×ëÆ÷µÄ¹©¸øÁ´¹¥»÷
΢Èí×êÑÐÈËÔ±·¢ÏÖÒ»¸öÕë¶ÔPDF±à×ëÆ÷µÄ¹©¸øÁ´¹¥»÷£¬¹¥»÷Õßͨ¹ýÅú¸Ä¸ÃPDF±à×ëÆ÷µÄ×ÖÌå°ü£¬ÔÚÓû§µÄÍÆËã»úÉÏ×°ÖöñÒâÍÚ¿óÈí¼þ¡£¾ßÌåÀ´Ëµ£¬¹¥»÷Õß·´±àÒë²¢Åú¸ÄÁËÒ»¸öMSIÎļþ£¨Ò»¸öÑÇÖÞ×ÖÌå°ü£©£¬²¢Ôö³¤Á˶ñÒâÍÚ¿ó´úÂë¡£ÏÂÔØ²¢ÔËÐиÃPDF±à×ëÆ÷µÄÓû§½«ÔÚ²»ÖªÇéµÄÇé¿öÏ´ӹ¥»÷ÕߵķþÎñÆ÷ÖÐ×°ÖöñÒâ×ÖÌå°ü¡£ÓÉÓÚ¸ÃPDF±à×ëÆ÷ÊÇÔÚSYSTEMȨÏÞÏÂ×°Öõģ¬Òò¶ø¶ñÒâ´úÂë¿ÉÄÜ»ñµÃ¶ÔÓû§ÏµÍ³µÄÆëÈ«½Ó¼ûȨÏÞ¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-discovers-supply-chain-attack-at-unnamed-maker-of-pdf-software/
¡¾°²È«²¥±¨¡¿Twitter´ÓÆäƽ̨ÉÑþ³Øý³¬¹ý14.3Íò¸öÎ¥¹æAPP
Twitter°µÊ¾ÔÚ4ÔÂÖÁ6ÔÂÆÚ¼ä´ÓÆäƽ̨ÉÑþ³ØýÁ˳¬¹ý14.3Íò¸öÎ¥¹æAPP¡£¸Ã¹«Ë¾³Æ²»»áÈÝÈÌͨ¹ýËüÃǵÄAPIÀ´·¢ËÍÀ¬»øÓʼþºÍ´¥·¸¹«ÃñÒþÖÔµÄÐÐΪ¡£³ýÁËɾ³ýÕâЩÀûÓÃÖ®±í£¬¸Ã¹«Ë¾»¹¶ÔÆäAPIµÄʹÓ÷½Ê½½øÐÐÁ˵÷Õû¡£ËùÓнӼûÆä³ß¶ÈAPIºÍ¸ß¼¶APIµÄÐÂÒªÇó¶¼±ØÐëͨ¹ýеĺË×¼Á÷³Ì¡£¿ª·¢ÈËÔ±²»µÃ´´½¨³¬¹ý10¸öAPP£¬³ý·ÇÆäÌá½»Á˳ä·ÖµÄÀíÓɲ¢»ñµÃÁ˳ö¸ñÐí¿É¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/twitter-removes-143-000-apps-that-violated-companys-policy/
¡¾Íþвµý±¨¡¿ÃÀDHS°ä²¼ÖҸ棺¾¯ÌèÕë¶ÔÆóÒµERPϵͳµÄÍøÂç¹¥»÷
ÃÀºÓɽ°²È«Êý£¨DHS£©·¢³öÖҸ棺¾¯Ìè¹ú¶È¼¶µÄºÚ¿ÍºÍ·¸×ïÍÅ»ïÕë¶ÔÆóÒµERPϵͳµÄ¹¥»÷»î¶¯¡£¸ÃÖÒ¸æÊÇ»ùÓÚÍþвµý±¨¹«Ë¾Digital ShadowsºÍOnapsis½áºÏ°ä²¼µÄ»ã±¨¡£»ã±¨ÖÐÖ¸³ö´ÓǰÈýÄêÄÚÕë¶ÔSAPºÍERPµÄ¹«¿ª·ì϶ÀûÓÃÔö³¤ÁË100%¡£2016ÄêÖÁ2017ÄêÕë¶ÔERP·ì϶µÄ¹¥»÷»î¶¯Ôö³¤ÁË160%¡£Õë¶ÔERPµÄ¹¥»÷ÁìÓòÔ̺¬´Ó¾ÉµÄ·ì϶µ½ÃÜÂë²Â²âµÈ¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/dhs-warns-of-impending-cyber-attacks-on-erp-systems/
¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖÒÁÀÊAPT×éÖ¯OilRigµÄй¥»÷º£³±
Palo Alto Networks×êÑÐÍŶӷ¢ÏÖÒÁÀÊAPT×éÖ¯OilRigµÄй¥»÷»î¶¯¡£ÔÚ2018Äê5ÔÂÖÁ6ÔÂÆÚ¼ä£¬OilRig¹²ÌáÒéÁËÈý´Î¹¥»÷º£³±£¬Ç°Á½´ÎÖØÒªÕë¶Ô¼¼Êõ·þÎñÌṩÉÌ£¬×îºóÒ»´ÎÖØÒªÕë¶ÔÖж«µØÓòÈ·µ±¾Ö»ú¹¹¡£ÕâЩ¹¥»÷»î¶¯¶¼ÊÇͨ¹ýÍøÂç´¹µöÓʼþ´«²¼PowerShellºóÃÅQUADAGENT£¬²¢ÊÔͼÇÔÈ¡Óû§µÄÍ´´¦¡£
ÔÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/07/unit42-oilrig-targets-technology-service-provider-government-agency-quadagent/
¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖ¶ñÒâÍÚ¿óÈí¼þPowerGhostʹÓÃÎÞÎļþ¼¼ÊõϰȾÓû§
¿¨°Í˹»ù³¢ÊÔÊÒ·¢ÏÖÒ»¸öеĶñÒâÍÚ¿óÈí¼þPowerGhost¡£PowerGhostÊÇÒ»¸ö¾¹ý»ìºÏµÄPowerShell¾ç±¾£¬ÆäÔ̺¬¶ñÒâ¿ó¹¤¡¢mimikatz¡¢Àà¿âmsvcp120.dllºÍmsvcr120.dll¡¢·´ÉäÐÍPE×¢ÈëºÍÓÀºãÖ®À¶·ì϶ÀûÓõÈÄ£¿é¡£PowerGhostͨ¹ýÎÞÎļþ¼¼ÊõÀ´Ï°È¾Óû§ºÍÌӱܼì²â£¬ÆäÖØÒªÕë¶ÔÓ¡¶È¡¢°ÍÎ÷¡¢¸çÂ×±ÈÑǺÍÍÁ¶úÆä¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/a-mining-multitool/86950/


¾©¹«Íø°²±¸11010802024551ºÅ