Õë¶Ô»ªË¶Live Update¹©¸øÁ´¹¥»÷£º2019ÄêµçÐÅ·¸×ï»ã±¨ £»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨Ïµ

°ä²¼¹¦·ò 2019-03-26
1¡¢Õë¶Ô»ªË¶Live UpdateµÄ¹©¸øÁ´¹¥»÷£¬»òÓ°Ï쳬¹ý100ÍòÓû§


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


2019Äê1Ô¿¨°Í˹»ù³¢ÊÔÊÒ·¢ÏÖÒ»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄ¸´ÔÓ¹©¸øÁ´¹¥»÷£¬Õâ´Î¹¥»÷²úÉúÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä£¬¿ÉÄÜÓ°ÏìÁËÈ«Çò³¬¹ý100ÍòÓû§¡ £»ªË¶Live UpdateÊÇԤװÔÚ´óÎÞÊý»ªË¶µçÄÔÉϵÄʵÓ÷¨Ê½£¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯·¨Ê½µÈ×é¼þ¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÖ¸±êMACµØÖ·µÄÁÐ±í£¨ÊýÁ¿Îª600¸öÒÔÉÏ£©£¬µ«Ö¸±êȺÌåµÄÉí·ÝÉв»Ã÷È·¡£ÓÉÓÚÑù±¾ÊÇÓúϷ¨Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£©£¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üзþÎñÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ£¬µ¼Ö¸ù¥»÷³Ö¾Ãδ±»·¢ÏÖ¡£Ä¿Ç°µÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/operation-shadowhammer/89992/

2¡¢×êÑÐÍŶӰ䲼ÀÕË÷Èí¼þHackedµÄ½âÃÜÆ÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Emsisoft°ä²¼ÀÕË÷Èí¼þHackedµÄÃâ·Ñ½âÃÜÆ÷¡£¸ÃÀÕË÷Èí¼þÓÚ2017ÄêÆðÍ·ÔË×÷£¬ÖØÒªÕë¶ÔÓ¢Óï¡¢ÍÁ¶úÆäÓï¡¢Î÷°àÑÀÓïºÍÒâ´óÀûÓïÓû§¡£ÔÚϰȾϵͳºó£¬Hacked»áÏÔʾһ¸öÐéαµÄWindows¸üÐÂÆÁÄ»£¬²¢ÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.hackedÀ©´óÃû¡£Êܵ½Ï°È¾µÄÓû§Äܹ»´ÓÒÔÏÂÁ´½ÓÖÐÏÂÔØ¸Ã¹¤¾ß²¢ÒÔÖÎÀíԱȨÏÞÔËÐУ¬¸Ã¹¤¾ß½«×Ô¶¯½âÃÜËùÓÐ.hackedÀ©´óÃûµÄ¼ÓÃÜÎļþ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/ransomware/decryptor/emsisoft-has-released-a-decryptor-for-the-hacked-ransomware/

3¡¢Å·ÖÞÐ̾¯×éÖ¯¼°Ç÷Ïò¿Æ¼¼½áºÏ°ä²¼2019ÄêÍøÂçµçÐÅ·¸×ï»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ƾ¾ÝÅ·ÖÞÐ̾¯×éÖ¯ºÍÇ÷Ïò¿Æ¼¼½áºÏ°ä²¼µÄ2019ÄêÍøÂçµçÐÅ·¸×ï»ã±¨£¬Ã¿ÄêµçÐÅڲƭµÄ³É±¾¹À¼ÆÎª290ÒÚÅ·Ôª£¨ºÏ330ÒÚÃÀÔª£©¡£¸Ã»ã±¨Ç¿µ÷£¬µçÐÅڲƭÔÚ³ÉΪ´«Í³½ðÈÚ·¸×ïµÄµÍ·çÏÕ´úÌæ¹æ»®£¬³É±¾ÉϵĽµµÍºÍÈëÇÖÉ豸¿ÉÓÃÐÔµÄÔö³¤Ê¹µÃÕâÖÔìÛÕ©ÐÐΪ²»ÐÝÔö³¤¡£·¸×ï·Ö×ÓµÄÖØÒªÖ¸±êÊÇÓû§»òÔËÓªÉ̵ÄÕË»§£¬²¢´ÓÖз¸·¨»ñµÃ½ðÇ®¡£


Ô­ÎÄÁ´½Ó£º

https://www.europol.europa.eu/newsroom/news/hold-phone-threats-lurking-behind-missed-call-and-other-forms-of-telecom-fraud

4¡¢Á÷ýÌåÍøÕ¾Kanopyй¶½Ó¼ûÈÕÖ¾£¬¿ÉÓÃÓÚ¸ú×ÙÓû§Éí·Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÔ±Justin Paine·¢ÏÖÊÓÆµÁ÷ýÌåÍøÕ¾KanopyµÄElasticsearchÊý¾Ý¿âδ½øÐÐÉí·ÝÑéÖ¤£¬Ê¹µÃAPIÈÕÖ¾¼°ÍøÕ¾½Ó¼û¼Í¼¶³öÔÚÍøÉÏ¡£ÕâЩÐÅÏ¢¿ÉÓÃÓÚ¸ú×ÙÓû§µÄÅÔ¹Ûϰ¹ß¼°²éÕÒÓû§µÄÉí·Ý£¬ÀýÈç»ùÓÚ¿Í»§¶ËIP¡¢ËÑË÷/ÅÔ¹ÛµÄÊÓÆµÐÅÏ¢¡¢µØÀíÐÅÏ¢¡¢¹¦·ò´ÁºÍÉ豸ÀàÐÍ£¬ÓпÉÄܼø±ð³öÓû§µÄÉí·Ý¡£¸ÃÊý¾Ý¿âÖÁÉÙÓÚ3ÔÂ7ÈÕÆð¶³öÔÚÍøÉÏ£¬²¢ÓÚ3ÔÂ18Èյõ½± £»¤¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/video-streaming-site-kanopy-leaks-api-and-website-access-logs-77645814

5¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬°ä²¼30¶à¸öÐéα¾¯±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


3ÔÂ12ÈÕÁ賿2:30×óÓÒ£¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈøË¹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³£¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©°ä²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨£¬ÒýÆðÁ˱¾µØ¾ÓÃñµÄ·¢¼±¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancaster°ä²¼µÄ£¬ÆäÓàµÄÔòÊÇÔÚDeSoto¡£Ö®ºóÕâЩϵͳһÏò´¦ÓÚÍÑ»ú״̬£¬Ö±ÖÁ3ÔÂ17ÈղŸ´Ô­Õý³£·þÎñ¡£¾¯·½ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ½øÐе÷²é¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html

6¡¢Î¢ÈíЭÖúNorsk Hydro¸´Ô­ITϵͳ£¬ÎÞÐèÖ§¸¶Êê½ð


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Norsk HydroÊ×ϯ²ÆÕþ¹ÙEivind Kallevik°µÊ¾£¬¸Ã¹«Ë¾ÒѾ­ÆðÍ·ÀûÓñ¸·Ý¸´Ô­ÆäITϵͳ£¬²¢ÇÒ²»³ïËãÏò¹¥»÷ÕßÖ§¸¶Êê½ð¡£À´×Ô΢ÈíºÍÆäËü°²È«ºÏ×÷ͬ°éµÄר¼ÒÔÚÔ®ÊÖNorsk Hydro½«Æä¹Ø¼üITϵͳ¸´Ô­Õý³£ÔËÓª¡£ÉÏÖÜNorsk HydroÔâµ½ÍøÂç¹¥»÷£¬¸Ã¹«Ë¾È«Çò´ó²¿ÃÅÒµÎñÁìÓòµÄITϵͳ¼°ÔËÓª¶¼Êܵ½Ó°Ïì¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/microsoft-helping-norsk-hydro-restore-its-it-systems-without-paying-the-ransom-86a32a3c

ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù