¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180706

Ðû²¼Ê±¼ä 2018-07-06

¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚ¶ñÒâÈí¼þTrojan-Ransom.Win32.RakhniµÄÆÊÎö±¨¸æ


¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚ¶ñÒâÈí¼þTrojan-Ransom.Win32.RakhniµÄÆÊÎö±¨¸æ ¡£¸Ã¶ñÒâÈí¼þ×îÔç·ºÆðÓÚ2013Äê £¬Ñо¿Ö°Ô±·¢Ã÷¸Ã¶ñÒâÈí¼þµÄÐÂÑù±¾Ö÷ÒªÕë¶Ô¶íÂÞ˹£¨95.57%£© £¬±ðµÄ¹þÈø¿Ë˹̹¡¢ÎÚ¿ËÀ¼¡¢µÂ¹úºÍÓ¡¶ÈµÄ²¿·ÖÓû§Ò²ÊÜÓ°Ïì ¡£À¬»øÓʼþÔ˶¯ÈÔÈ»ÊǸöñÒâÈí¼þµÄÖ÷Òª·Ö·¢·½·¨ ¡£¸Ã¶ñÒâÈí¼þ»áƾ֤Óû§ÏµÍ³ÉÏÊÇ·ñ±£´æ£¥AppData£¥\BitcoinÎļþ¼ÐÀ´¾öÒéÊÇÏÂÔØ¼ÓÃÜÀàÀÕË÷Èí¼þÕÕ¾ÉÏÂÔØ¶ñÒâÍÚ¿óÈí¼þ ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/to-crypt-or-to-mine-that-is-the-question/86307/


¡¾Îó²î²¹¶¡¡¿GoogleÐû²¼2018Äê7ÔµÄAndroidÇå¾²¸üР£¬¹²ÐÞ¸´70¸öÎó²î


2018Äê7ÔµÄAndroidÇå¾²¸üй²°üÀ¨2¸ö²¹¶¡°ü£¨2018-07-01ºÍ2018-07-05£© £¬¹²ÐÞ¸´¶à¸ö×é¼þÖеÄ44¸öÇå¾²Îó²î £¬ÊÜÓ°ÏìµÄ×é¼þ°üÀ¨Framework¡¢Media Framework¡¢Kernel¡¢¸ßͨ×é¼þÒÔ¼°¸ßͨ±ÕÔ´×é¼þ ¡£ÆäÖÐ×îΪÑÏÖØµÄÎó²îÊÇMedia FrameworkÖеĸßΣԶ³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-9411£© ¡£±ðµÄ £¬Google»¹ÐÞ¸´ÁËPixelºÍNexus×°±¸ÖеÄ26¸öÇå¾²Îó²î ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://news.softpedia.com/news/google-releases-june-2018-s-android-security-patch-to-fix-70-vulnerabilities-521829.shtml


¡¾Îó²î²¹¶¡¡¿»ªÎªÐÞ¸´Æä¶à¸ö²úÆ·ÖеÄÈõ¼ÓÃÜËã·¨Îó²î£¨CVE-2017-17174£©


»ªÎªÐû²¼¶à¸ö²úÆ·µÄÇå¾²¸üР£¬ÐÞ¸´2017Äêβ·¢Ã÷µÄÈõ¼ÓÃÜËã·¨Îó²î£¨CVE-2017-17174£© ¡£¸ÃÎó²îÓë²»Çå¾²µÄ¼ÓÃÜË㷨ʵÑéÓйØ £¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓøÃÎó²îÀ´½âÃÜ·þÎñÆ÷ºÍ¿Í»§¶ËÖ®¼äµÄ»á»°ÃÜÔ¿ £¬´Ó¶øµ¼ÖÂÐÅϢй¶»òÖÐÐÄÈ˹¥»÷ ¡£ÊÜÓ°ÏìµÄ²úÆ·°üÀ¨RSE6500¡¢SoftCo¡¢VP9660ºÍeSpace U1981 ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/74152/hacking/hawei-encryption-bug.html


¡¾ÍþвÇ鱨¡¿Gentoo LinuxÍŶӳƹ¥»÷Õßͨ¹ýÃÜÂëÍÆ²â»ñµÃÆäGitHubÕË»§µÄÃÜÂë

Gentoo Linux¿ª·¢ÍŶÓÐû²¼¹ØÓÚGitHubÕË»§ÔâºÚ¿ÍÈëÇÖÊÂÎñµÄÊӲ챨¸æ ¡£¸ÃÍŶӳƹ¥»÷Õßͨ¹ýÃÜÂëÍÆ²â»ñµÃÆäGitHubÕË»§µÄÃÜÂë¼°ÖÎÀíȨÏÞ £¬ÊӲ췢Ã÷µÄÎÊÌ⻹°üÀ¨Î´½ÓÄÉË«ÒòËØÈÏÖ¤¡¢Î´ÉúÑÄGitHub OrganizationÏêϸÐÅÏ¢µÄ±¸·ÝÒÔ¼°systemd repoÖ±½Ó´æ´¢ÔÚGitHubÉÏ ¡£ÐÒÔ˵ÄÊÇ £¬GentooºÍGithub¶Ô¸ÃÊÂÎñµÄÏìÓ¦½Ïʵʱ £¬Ê¹µÃ¹¥»÷Ö»Ò»Á¬ÁËÔ¼70·ÖÖÓ ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/07/github-hacking-gentoo-linux.html


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÑÝʾͨ¹ý¼üÅÌÈȲÐÁôÀ´ÇÔÈ¡ÃÜÂëµÄThermanator¹¥»÷ÊÖÒÕ


ƾ֤¼ÓÖÝ´óѧŷÎÄ·ÖУ£¨UCI£©µÄÈýλ¿ÆÑ§¼ÒµÄÑо¿ £¬Óû§ÔÚ¼üÅÌÉÏÊäÈëÎı¾Ê±±£´æÈȲÐÁô £¬¶ñÒâ¹¥»÷Õß¿ÉʹÓÃÈȳÉÏñÉãÏñ»ú¼Í¼ÕâЩÈȲÐÁô²¢ÇÔÈ¡Óû§µÄÃÜÂë ¡£ÕâÖÖ¹¥»÷ÊÖÒÕ±»³ÆÎªThermanator £¬ÊµÑéÅú×¢ÔÚÓû§ÊäÈëÃÜÂëºóµÄ30ÃëÄڼͼµÄÈÈÊý¾Ý×ãÒÔÓÃÀ´»Ö¸´Óû§µÄÊäÈëÄÚÈÝ £¬ÕâЩÄÚÈÝ¿ÉÄÜÊÇËæ±Ê±¾µÄÑéÖ¤Âë¡¢ÒøÐÐÃÜÂë»òµÇ¼ÃÜÂë ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/thermanator-attack-steals-passwords-by-reading-thermal-residue-on-keyboards/


¡¾¹¥»÷ÊÂÎñ¡¿ÒÔÉ«ÁÐÖ¸¿Ø¹þÂí˹¿Ö²À×é֯ͨ¹ýÌØ¹¤Èí¼þ¹¥»÷ÒÔÉ«ÁÐÊ¿±ø

ÒÔÉ«ÁÐÇå¾²»ú¹¹Ö¸¿Ø¹þÂí˹¿Ö²ÀÖ÷Òå×é֯ͨ¹ýÌØ¹¤Èí¼þѬȾÒÔÉ«ÁÐÊ¿±øµÄÊÖ»ú £¬ÒÔÍøÂçÏà¹ØÐÅÏ¢ ¡£ÕâÐ©ÌØ¹¤Èí¼þÒÔÌìϱ­appºÍÔÚÏßÔ¼»áappµÄÐÎʽÉÏ´«ÖÁGoogle PlayÊÐËÁ £¬Ô¼100È˳ÉΪÊܺ¦Õß ¡£ÕâÐ©ÌØ¹¤Èí¼þµÄ¹¦Ð§°üÀ¨¼ÍÈÎÃü»§µÄµç»°¡¢ÕÕÏà¡¢ÇÔÈ¡ÁªÏµÈ˺ͶÌÐÅ¡¢ÇÔÈ¡Éè±¹ØÁ¬ÄͼƬºÍÊÓÆµÒÔ¼°¼ÍÈÎÃü»§µÄGPSλÖõÈ ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2018/07/05/an-invasive-spyware-attack-on-military-mobile-devices/