µÂ¹ú¹ºÎïÍøÕ¾windeln.deÊý¾Ý¿â¶³ö£¬Ð¹Â¶60Òڱʼͼ£»µÂ¹úµÄÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬¼ä½Óµ¼Ö»¼ÕßéæÃü
°ä²¼¹¦·ò 2020-09-181.µÂ¹ú¹ºÎïÍøÕ¾windeln.deÊý¾Ý¿â¶³ö£¬Ð¹Â¶60Òڱʼͼ

Safety DetectivesµÄ×êÑÐÈËÔ±ÔÚÍøÂçÉÏ·¢ÏÖÁËÒ»¸ö¶³öµÄÊý¾Ý¿â£¬¾µ÷²é¸ÃÊý¾Ý¿âÊôÓڵ¹úÔÚÏß¹ºÎïÍøÕ¾windeln.de¡£Æä¶³öÁË6.4TBµÄÊý¾Ý£¬ÆäÖÐÔ̺¬60Òڱʼͼ£¬Ð¹Â¶Á˳¬¹ý700000Ãû¿Í»§µÄÓ×ÎÒÐÅÏ¢¡£Õâ´ÎÊÂÎñµÄй¶ÐÅÏ¢Ô̺¬Ó×ÎÒÉí·ÝÐÅÏ¢£¨PII£©ºÍÆäËûÊý¾Ý£¬ÀýÈ緢Ʊ¡¢È«Ãû¡¢IPµØÖ·¡¢ÄÚ²¿ÈÕÖ¾¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢¼ÒÍ¥µØÖ·¡¢É¢ÁÐÃÜÂë¡¢¸¶¿î·½Ê½ºÍÓû§µÄº¢×ÓÓ×ÎÒÐÅÏ¢µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/shopping-site-leaks-miners-data-database-mess-up/
2.ºÚ¿ÍÔÚ°µÍøÉϹ«¿ªAndroidľÂíCerberusµÄÔ´´úÂë

ºÚ¿ÍÔÚÅÄÂôʧ°Üºó£¬ÔÚ°µÍøÉϹ«¿ªAndroidľÂíCerberusµÄÔ´´úÂë¡£CerberusÊÇÕë¶ÔGoogle Android²Ù×÷ϵͳµÄÊÖ»úÒøÐÐľÂí£¬ÖÁÉÙ´Ó2019Äê7ÔÂÆðÍ·»îÔ¾£¬ÓµÓаÂÃØ¼à¶½¡¢À¹½ØÍ¨Ñ¶¡¢´Û¸ÄÉ豸ְÄÜ£¬²¢Í¨¹ýÔÚÏÖÓеÄÒøÐÓ×¢ÁãÊÛºÍÉç½»ÍøÂçÀûÓ÷¨Ê½ÉÏ´´½¨µþ¼Ó£¬ÇÔÈ¡Ô̺¬ÒøÐÐÖ¤ÊéÔÚÄÚµÄÊý¾Ý¡£¿¨°Í˹»ùÍøÂ簲ȫ×êÑÐÔ±Dmitry Galov°µÊ¾£¬ÕâÖÖÐÐΪ¶ÔÖÇÄÜÊÖ»úÓû§ºÍÕû¸öÒøÐÐÒµ×é³ÉÁ˾޴óµÄÍþв¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cerberus-banking-trojan-source-code-released-for-free-to-cyberattackers/
3.ÃÀ¹úÖ¸¿ØÁ½¶í¼®ºÚ¿Í´¹µö¹¥»÷Èý¼ÒÇ®±ÒÂòÂôËùµÄÓû§

ÃÀ¹úÖ¸¿ØÁ½Ãû¶íÂÞ˹ºÚ¿ÍÀûÓÃÍøÂç´¹µö¹¥»÷ÁËPoloniex¡¢BinanceºÍGeminiÈý¼Ò¼ÓÃÜÇ®±ÒÂòÂôËùµÄÊý°ÙÃûÓû§£¬×ܼÆÇÔÈ¡ÁË1680ÍòÃÀÔª¡£±»Ö¸¿ØµÄÁ½ÃûºÚ¿Í£¨ Danil PotekhinºÍDmitrii Karasavidi£©Ô¼ÄªÔÚ2017Äê6ÔÂÆðÍ·»î¶¯£¬Í¨¹ý¿Ë¡¼ÓÃÜÇ®±ÒÂòÂôËùµÄÍøÕ¾´´½¨´¹µöÍøÕ¾£¬ÀûÓÃÆäÒýÓÕÓû§ÒÔÍøÂçËûÃǵÄÕË»§Æ¾Ö¤¡£Õâ´Î¹¥»÷»î¶¯Éæ¼°µ½ÁË313¸öµÄPoloniexÓû§¡¢142¸öBinanceÓû§ºÍ42¸öGeminiÓû§£¬Ëðʧ¹À¼ÆÎª16876000ÃÀÔª¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-charges-two-russians-for-stealing-16-8m-via-cryptocurrency-phishing-sites/
4.CISAÅû¶ÒÁÀʺڿÍËùʹÓõÄWeb ShellµÄ¾ßÌåÐÅÏ¢

CISA»ã±¨£¬ÒÁÀʵÄAPT×éÖ¯Pioneer KittenÔÚÀûÓü¸¸öÒÑÖªµÄWeb Shell£¬Õë¶ÔÕû¸öÃÀ¹úµÄIT¡¢µ±¾Ö¡¢Ò½ÁÆ¡¢½ðÈںͱ£ÏÕ×éÖ¯½øÐй¥»÷¡£¸Ã×éÖ¯ÔÚ´ÓǰµÄ¼¸¸öÔÂÀïÒ»ÏòÔÚÊÔIJÀûÓÃÆóÒµVPNÖзì϶£¬Ô̺¬CVE-2019-11510¡¢CVE-2019-11539¡¢CVE-2019-19781ºÍCVE-2020-5902£¬²¢ÔÚÈ«ÇòÁìÓòÄÚÕë¶ÔPulse Secure¡¢Fortinet¡¢Palo Alto NetworksºÍCitrix VPNµÈ¹«Ë¾¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108357/malware/cisa-web-shells-iranian-hackers.html
5.NSA°ä²¼ÓйØUEFI°²È«Æô¶¯×Ô½ç˵µÄ°²È«Ö¸ÄÏ

ÃÀ¹ú¹ú¶È°²È«¾Ö£¨NSA£©°ä²¼ÁËÓйØÍ³Ò»¿ÉÀ©´ó¹Ì¼þ½Ó¿Ú£¨UEFI£©°²È«Æô¶¯×Ô½ç˵µÄÖ¸ÄÏ¡£½ü¼¸ÄêÀ´£¬×¨¼ÒÃǹ۲쵽һЩʹÓÃrootkitµÄ¹¥»÷£¬ÆäרÃÅÕë¶Ô¹Ì¼þ¿ª·¢ÒÔʵÏÖÓÆ¾ÃÐÔ²¢Èƹý°²È«½â¾ö¹æ»®¡£°²È«Æô¶¯»úÔìÖ»ÔÊÐíÖ´ÐÐÊÜÔʼÉ豸Ôì×÷ÉÌ(OEM)ÐÅÀµµÄÈí¼þ£¬ÖÎÀíԱͨ¹ý×Ô½ç˵°²È«Æô¶¯·ÀÓù¶ñÒâÈí¼þ¡¢»º½âÄÚ²¿ÍþвºÍ±£»¤Êý¾Ý¾²Ö¹¡£NSAÖ¸³ö£¬°²È«Æô¶¯Äܹ»ÅäÖÃΪÉó¼Æ¹Ì¼þÄ£¿é¡¢À©´óÉ豸ºÍ¿ÉÊèµ¼µÄOSÓ³Ïñ£¬¿ÉʹÓÿÉÐÅÆ½Ì¨Ä£¿é(TPM)ÑéÖ¤UEFI°²È«Êèµ¼µÄÆëÈ«ÐÔ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108367/security/nsa-uefi-secure-boot-customization.html
6.µÂ¹úµÄÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬¼ä½Óµ¼Ö»¼ÕßéæÃü

µÂ¹ú¶ÅÈû¶û¶à·ò´óѧҽԺÔâ·êÀÕË÷Èí¼þ¹¥»÷£¬¼ä½Óµ¼Ö»¼ÕßéæÃü¡£¸ÃÒ½ÔºÓÚ9ÔÂ10ÈÕÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬30¶ą̀ÄÚ²¿·þÎñÆ÷±»Ï°È¾£¬µ¼Ö¸ÃҽԺδÄÜÕý³£½Ó¹Ü±ØÒª´¹Î£Ò½ÖεÄÅ®ÐÔ£¬ÒÔÖÁ¸ÃÃû»¼ÕßÔÚ×ªÒÆµ½30¹«Àï±íµÄÎéçêËþ¶ûÊÐÒ»¼ÒÒ½ÔººóéæÃü¡£Ä¿Ç°£¬µÂ¹úµ±¾ÖÔÚµ÷²é¸ÃÊÂÎñ£¬²¢°µÊ¾ÈôÊÇ·¢ÏÖÀÕË÷Èí¼þ¹¥»÷ºÍҽԺͣ»úÖ±½ÓÔì³É¸ÃŮʿµÄéæÃü£¬Äǽ«Æäµ÷²éתΪһ·Ëûɱ°¸¡£ÀÕË÷Èí¼þÍÅ»ïÒ²Ôڵ¹ú¾¯·½È¾Ö¸ºó³·»ØÁËÀÕË÷ÒªÇ󣬲¢·¢ËͽâÃÜÆ÷¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/first-death-reported-following-a-ransomware-attack-on-a-german-hospital/


¾©¹«Íø°²±¸11010802024551ºÅ