¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180803

°ä²¼¹¦·ò 2018-08-03

¡¾Íþвµý±¨¡¿×êÑÐÈËÔ±·¢ÏÖÕë¶ÔMikroTik·ÓÉÆ÷µÄ´ó¹æÄ£¶ñÒâÍÚ¿ó¹¥»÷


°²È«×êÑÐÈËÔ±Simon Kenin·¢ÏÖÒ»¸öÕë¶ÔMikroTik·ÓÉÆ÷µÄ´ó¹æÄ£¶ñÒâÍÚ¿ó¹¥»÷¡£¸Ã¹¥»÷»î¶¯×î³õÖØÒªÕë¶Ô°ÍÎ÷£¬Ï°È¾ÁËÔ¼7.2Íǫ̀MikroTik·ÓÉÆ÷£¬ËæºóÆðÍ·Õë¶ÔÈ«ÇòµÄMikroTik·ÓÉÆ÷£¬Ä¿Ç°ÊÜÓ°ÏìµÄ·ÓÉÆ÷Òѳ¬¹ý20Íǫ̀¡£Kenin°µÊ¾¹¥»÷ÕßÀûÓÃÁË4Ô·ݷ¢ÏÖµÄMikroTik·ÓÉÆ÷ÁãÈÕ·ì϶£¬½Ù³ÖÓû§µÄÁ÷Á¿²¢ÔÚͨ¹ý·ÓÉÆ÷µÄÍøÕ¾Ò³ÃæÖÐ×¢ÈëCoinhiveÍÚ¿ó¾ç±¾¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/massive-coinhive-cryptojacking-campaign-touches-over-200-000-mikrotik-routers/


¡¾Íþвµý±¨¡¿CCleanerÔö³¤Ç¿ÔìÐÔµÄÊý¾ÝÍøÂçÖ°ÄÜ£¬Òý·¢¶ÔÓû§ÒþÖÔ± £»¤µÄÓÇÓô


AvastÔÚCCleanerµÄа汾5.45ÖÐÔö³¤ÁËÇ¿ÔìÐÔµÄϵͳÊý¾ÝÍøÂçÖ°ÄÜ£¬²¢ÇÒÓû§ÎÞ·¨¹Ø¹Ø¸ÃÖ°ÄÜ¡£CCleanerÊÇÒ»¸öÔ®ÊÖÓû§ËãÕÊÉ豸À¬»øÎļþÒÔÓÅ»¯ºÍ¼ÓÇ¿»úÄܵÄÓ×¹¤¾ß£¬ÆäÏÂÔØÁ¿´ï20ÒÚ¡£CCleaner 5.45µÄ¼à¿ØÖ°ÄÜÔÊÐíÆä½«ÍøÂçµÄϵͳʹÓÃÊý¾Ý·¢»¹¹«Ë¾µÄ·þÎñÆ÷£¬²¢Ã¿12Ó×ʱ·¢ËÍÒ»´ÎÐÄÌø¡£´Ë±í£¬CCleanerµÄÒþÖÔÕþ²ß»¹°µÊ¾ËüÄܹ»ÓëµÚÈý·½¹«Ë¾¹²ÏíÍøÂçµÄÐÅÏ¢£¬ÕâÒý·¢Á˶ÔÓû§ÒþÖÔ± £»¤µÄÓÇÓô¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/ccleaner-software-download.html


¡¾Íþвµý±¨¡¿×êÑÐÍŶӰ䲼¹ØÓÚÍøÂç·¸×ïÍÅ»ïGorgonµÄ·ÖÎö»ã±¨


´Ó2018Äê2ÔÂÆðÍ·£¬Palo Alto NetworksµÄUnit 42×êÑÐÍŶӼì²âµ½ÍøÂç·¸×ïÍÅ»ïGorgonÕë¶ÔÓ¢¹ú¡¢Î÷°àÑÀ¡¢¶íÂÞ˹ºÍÃÀ¹úÈ·µ±¾Ö»ú¹¹µÄ¹¥»÷»î¶¯¡£´Ë±í£¬ÔÚ´ËÆÚ¼äGorgonµÄ³ÉÔ±»¹ÀûÓÃÕâЩ¹²ÏíµÄ»ù´¡ÉèÊ©ÔÚÈ«ÇòÁìÓòÄÚÌáÒéÓÐÕë¶ÔÐԵĹ¥»÷»î¶¯¡£³ýÁËÀûÓô«Í³µÄºÅÁîºÍ½ÚÔ죨C2£©·þÎñÆ÷Ö®±í£¬Gorgon»¹Ê¹Óó£¼ûµÄURL¶ÌÁ´½Ó·þÎñÀ´·Ö·¢ÓÐЧºÉÔØ£¬ÕâҲΪÎÒÃÇÌṩÁ˵ã»÷´ÎÊýºÍͳ¼ÆÊý¾ÝµÄÁбí¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/08/unit42-gorgon-group-slithering-nation-state-cybercrime/


¡¾Íþвµý±¨¡¿×êÑлú¹¹ÖÒ¸æ³ÆÒÁÀÊAPT×éÖ¯RASPITEÔÚ¶Ô×¼ÃÀ¹úµçÁ¦¹«Ë¾


ƾ¾ÝDragos¹«Ë¾µÄ×êÑУ¬ÒÁÀÊAPT×éÖ¯RASPITEÒ»ÏòÔÚÕë¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢Öж«ºÍ¶«ÑǵØÓòµÄÆóÒµ¡£¸Ã×éÖ¯ÖÁÉÙ´Ó2017ÄêÒÔÀ´Ò»Ïò»îÔ¾¡£Dragos¼ì²âµ½¸Ã×éÖ¯Õë¶ÔµçÁ¦¹«ÓÃÊÂÒµµÄй¥»÷»î¶¯£¬Õâ¸ö»î¶¯Ä¿Ç°ÖØÒªÕë¶ÔÃÀ¹ú¡£Dragos³ÆÄ¿Ç°Ã»Óм£ÏóÅú×¢¸Ã×éÖ¯ÓµÓÐÌáÒé·ÛËéÐÔµÄICS¹¥»÷µÄÄÜÁ¦£¨ÀýÈçÎÚ¿ËÀ¼ÄÇÑùµÄ´ó¹æÄ£Í£µç£©¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75006/apt/raspite-rgets-us-electric-utilities.html


¡¾Ë¾·¨Âɹ桿ÃÀ˾·¨²¿¶Ô·¸×ïÍÅ»ïFIN7µÄ3Ãû³ÉÔ±Ìá³ö26Ïî·¸×ïÖ¸¿Ø


±¾ÖÜÈýÃÀ¹ú˾·¨²¿°ä·¢¶ÔÍøÂç·¸×ïÍÅ»ïFIN7µÄÈýÃû³ÉÔ±Ìá³ö26Ïî·¸×ïÖ¸¿Ø£¬ÉæÏÓÚ¿Æ­¡¢µç×Óڲƭ¡¢ÈëÇÖÍÆËã»úϵͳºÍÉí·Ý͵ÇԵȡ£FIN7¼¯ÍÅÖØÒªÕë¶ÔPoS»úϵͳ£¬ÔøÈëÇÖ47¸öÖݵÄ3600¸öÁ¬ËøÃŵ꣬´Ó6500¶à¸öPoS»úÖÐÇÔÈ¡³¬¹ý1500ÍòÐÅÓþ¿¨ÐÅÏ¢¡£ÕâÈýÃûÏÓ·¸±ðÀëÊÇ44ËêµÄDmytro Fedorov¡¢33ËêµÄFedir HladyrºÍ30ËêµÄAndrii Kopakov£¬ËûÃÇÓÚÈ¥Äê1ÔÂÖÁ6ÔÂÆÚ¼äÔÚÅ·ÖÞ±»²¶¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/fin7-carbanak-cobalt-hackers.html


¡¾·ì϶²¹¶¡¡¿Î¢Èí½¨¸´Edgeä¯ÀÀÆ÷ÖеÄÒ»¸ö¿Éµ¼ÖÂÎļþÇÔÈ¡µÄ°²È«·ì϶


΢Èí½¨¸´Edgeä¯ÀÀÆ÷ÖеÄÒ»¸ö¿Éµ¼ÖÂÎļþÇÔÈ¡µÄ°²È«·ì϶£¬¸Ã·ì϶Óëä¯ÀÀÆ÷ÖеÄͬԴսÊõ£¨SOP£©Ö°ÄÜÓйØ¡£Netsparker°²È«×êÑÐÔ±Ziyahan Albeniz·¢ÏÖµ±Óû§ÏÂÔØ²¢ÔËÐжñÒâµÄHTMLÎļþʱ£¬¶ñÒâ´úÂ뽫ͨ¹ýfile://ºÍ̸¼ÓÔØ£¬²¢ÍøÂçºÍÇÔÈ¡¿É½Ó¼ûµÄ±¾µØÎļþ¡£×êÑÐÈËÔ±°ä²¼Á˸ù¥»÷µÄÑéÖ¤ÊÓÆµ£¬²¢ÖÒ¸æÓû§²»ÒªÔËÐÐδ֪ÆðÔ´µÄHTMLÎļþ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-edge-flaw-lets-hackers-steal-local-files/