¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180803

Ðû²¼Ê±¼ä 2018-08-03

¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔMikroTik·ÓÉÆ÷µÄ´ó¹æÄ£¶ñÒâÍÚ¿ó¹¥»÷


Çå¾²Ñо¿Ö°Ô±Simon Kenin·¢Ã÷Ò»¸öÕë¶ÔMikroTik·ÓÉÆ÷µÄ´ó¹æÄ£¶ñÒâÍÚ¿ó¹¥»÷¡£¸Ã¹¥»÷Ô˶¯×î³õÖ÷ÒªÕë¶Ô°ÍÎ÷£¬Ñ¬È¾ÁËÔ¼7.2Íǫ̀MikroTik·ÓÉÆ÷£¬Ëæºó×îÏÈÕë¶ÔÈ«ÇòµÄMikroTik·ÓÉÆ÷£¬ÏÖÔÚÊÜÓ°ÏìµÄ·ÓÉÆ÷ÒÑÁè¼Ý20Íǫ̀¡£KeninÌåÏÖ¹¥»÷ÕßʹÓÃÁË4Ô·ݷ¢Ã÷µÄMikroTik·ÓÉÆ÷ÁãÈÕÎó²î£¬Ð®ÖÆÓû§µÄÁ÷Á¿²¢ÔÚͨ¹ý·ÓÉÆ÷µÄÍøÕ¾Ò³ÃæÖÐ×¢ÈëCoinhiveÍÚ¿ó¾ç±¾¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/massive-coinhive-cryptojacking-campaign-touches-over-200-000-mikrotik-routers/


¡¾ÍþвÇ鱨¡¿CCleanerÌíÔöÇ¿ÖÆÐÔµÄÊý¾ÝÍøÂ繦Ч£¬Òý·¢¶ÔÓû§Òþ˽± £»¤µÄµ£ÐÄ


AvastÔÚCCleanerµÄа汾5.45ÖÐÌí¼ÓÁËÇ¿ÖÆÐÔµÄϵͳÊý¾ÝÍøÂ繦Ч£¬²¢ÇÒÓû§ÎÞ·¨¹Ø±Õ¸Ã¹¦Ð§¡£CCleanerÊÇÒ»¸ö×ÊÖúÓû§ÕûÀí×°±¸À¬»øÎļþÒÔÓÅ»¯ºÍÔöÇ¿ÐÔÄܵÄС¹¤¾ß£¬ÆäÏÂÔØÁ¿´ï20ÒÚ¡£CCleaner 5.45µÄ¼à¿Ø¹¦Ð§ÔÊÐíÆä½«ÍøÂçµÄϵͳʹÓÃÊý¾Ý·¢»Ø¹«Ë¾µÄ·þÎñÆ÷£¬²¢Ã¿12Сʱ·¢ËÍÒ»´ÎÐÄÌø¡£±ðµÄ£¬CCleanerµÄÒþ˽Õþ²ß»¹ÌåÏÖËü¿ÉÒÔÓëµÚÈý·½¹«Ë¾¹²ÏíÍøÂçµÄÐÅÏ¢£¬ÕâÒý·¢Á˶ÔÓû§Òþ˽± £»¤µÄµ£ÐÄ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/ccleaner-software-download.html


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚÍøÂç·¸·¨ÍÅ»ïGorgonµÄÆÊÎö±¨¸æ


´Ó2018Äê2ÔÂ×îÏÈ£¬Palo Alto NetworksµÄUnit 42Ñо¿ÍŶӼì²âµ½ÍøÂç·¸·¨ÍÅ»ïGorgonÕë¶ÔÓ¢¹ú¡¢Î÷°àÑÀ¡¢¶íÂÞ˹ºÍÃÀ¹úµÄÕþ¸®»ú¹¹µÄ¹¥»÷Ô˶¯¡£±ðµÄ£¬ÔÚ´Ëʱ´úGorgonµÄ³ÉÔ±»¹Ê¹ÓÃÕâЩ¹²ÏíµÄ»ù´¡ÉèÊ©ÔÚÈ«Çò¹æÄ£ÄÚÌᳫÓÐÕë¶ÔÐԵĹ¥»÷Ô˶¯¡£³ýÁËʹÓùŰåµÄÏÂÁîºÍ¿ØÖÆ£¨C2£©·þÎñÆ÷Ö®Í⣬Gorgon»¹Ê¹Óó£¼ûµÄURL¶ÌÁ´½Ó·þÎñÀ´·Ö·¢ÓÐÓúÉÔØ£¬ÕâҲΪÎÒÃÇÌṩÁ˵ã»÷´ÎÊýºÍͳ¼ÆÊý¾ÝµÄÁбí¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/08/unit42-gorgon-group-slithering-nation-state-cybercrime/


¡¾ÍþвÇ鱨¡¿Ñо¿»ú¹¹ÖÒÑÔ³ÆÒÁÀÊAPT×éÖ¯RASPITEÕýÔÚÃé×¼ÃÀ¹úµçÁ¦¹«Ë¾


ƾ֤Dragos¹«Ë¾µÄÑо¿£¬ÒÁÀÊAPT×éÖ¯RASPITEÒ»Ö±ÔÚÕë¶ÔÃÀ¹ú¡¢Å·ÖÞ¡¢Öж«ºÍ¶«ÑǵØÇøµÄÆóÒµ¡£¸Ã×éÖ¯ÖÁÉÙ´Ó2017ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£Dragos¼ì²âµ½¸Ã×éÖ¯Õë¶ÔµçÁ¦¹«ÓÃÊÂÒµµÄй¥»÷Ô˶¯£¬Õâ¸öÔ˶¯ÏÖÔÚÖ÷ÒªÕë¶ÔÃÀ¹ú¡£Dragos³ÆÏÖÔÚûÓм£ÏóÅú×¢¸Ã×éÖ¯¾ßÓÐÌá³«ÆÆËðÐÔµÄICS¹¥»÷µÄÄÜÁ¦£¨ÀýÈçÎÚ¿ËÀ¼ÄÇÑùµÄ´ó¹æÄ£Í£µç£©¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75006/apt/raspite-rgets-us-electric-utilities.html


¡¾Ö´ÂÉÀýÔò¡¿ÃÀ˾·¨²¿¶Ô·¸·¨ÍÅ»ïFIN7µÄ3Ãû³ÉÔ±Ìá³ö26Ïî·¸·¨Ö¸¿Ø


±¾ÖÜÈýÃÀ¹ú˾·¨²¿Ðû²¼¶ÔÍøÂç·¸·¨ÍÅ»ïFIN7µÄÈýÃû³ÉÔ±Ìá³ö26Ïî·¸·¨Ö¸¿Ø£¬ÉæÏÓÕ©Æ­¡¢µç×Óڲƭ¡¢ÈëÇÖÅÌËã»úϵͳºÍÉí·Ý͵ÇԵȡ£FIN7¼¯ÍÅÖ÷ÒªÕë¶ÔPoS»úϵͳ£¬ÔøÈëÇÖ47¸öÖݵÄ3600¸öÁ¬ËøÃŵ꣬´Ó6500¶à¸öPoS»úÖÐÇÔÈ¡Áè¼Ý1500ÍòÐÅÓÿ¨ÐÅÏ¢¡£ÕâÈýÃûÏÓ·¸»®·ÖÊÇ44ËêµÄDmytro Fedorov¡¢33ËêµÄFedir HladyrºÍ30ËêµÄAndrii Kopakov£¬ËûÃÇÓÚÈ¥Äê1ÔÂÖÁ6ÔÂʱ´úÔÚÅ·ÖÞ±»²¶¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/fin7-carbanak-cobalt-hackers.html


¡¾Îó²î²¹¶¡¡¿Î¢ÈíÐÞ¸´Edgeä¯ÀÀÆ÷ÖеÄÒ»¸ö¿Éµ¼ÖÂÎļþÇÔÈ¡µÄÇå¾²Îó²î


΢ÈíÐÞ¸´Edgeä¯ÀÀÆ÷ÖеÄÒ»¸ö¿Éµ¼ÖÂÎļþÇÔÈ¡µÄÇå¾²Îó²î£¬¸ÃÎó²îÓëä¯ÀÀÆ÷ÖеÄͬԴսÂÔ£¨SOP£©¹¦Ð§ÓйØ¡£NetsparkerÇå¾²Ñо¿Ô±Ziyahan Albeniz·¢Ã÷µ±Óû§ÏÂÔØ²¢ÔËÐжñÒâµÄHTMLÎļþʱ£¬¶ñÒâ´úÂ뽫ͨ¹ýfile://ЭÒé¼ÓÔØ£¬²¢ÍøÂçºÍÇÔÈ¡¿É»á¼ûµÄÍâµØÎļþ¡£Ñо¿Ö°Ô±Ðû²¼Á˸ù¥»÷µÄÑéÖ¤ÊÓÆµ£¬²¢ÖÒÑÔÓû§²»ÒªÔËÐÐδ֪ȪԴµÄHTMLÎļþ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-edge-flaw-lets-hackers-steal-local-files/