Õë¶Ô»ªË¶Live Update¹©Ó¦Á´¹¥»÷£º2019ÄêµçÐÅ·¸·¨±¨¸æ£»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨Ïµ
Ðû²¼Ê±¼ä 2019-03-26
2019Äê1Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄÖØ´ó¹©Ó¦Á´¹¥»÷£¬´Ë´Î¹¥»÷±¬·¢ÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä£¬¿ÉÄÜÓ°ÏìÁËÈ«ÇòÁè¼Ý100ÍòÓû§¡£»ªË¶Live UpdateÊÇԤװÔÚ´ó´ó¶¼»ªË¶µçÄÔÉϵÄÊÊÓóÌÐò£¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯³ÌÐòµÈ×é¼þ¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÄ¿µÄMACµØµãµÄÁÐ±í£¨ÊýĿΪ600¸öÒÔÉÏ£©£¬µ«Ä¿µÄȺÌåµÄÉí·ÝÉв»Ã÷È·¡£ÓÉÓÚÑù±¾ÊÇÓÃÕýµ±Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£©£¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üзþÎñÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ£¬µ¼Ö¸ù¥»÷ºã¾Ãδ±»·¢Ã÷¡£ÏÖÔÚµÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйء£
ÔÎÄÁ´½Ó£º
https://securelist.com/operation-shadowhammer/89992/2¡¢Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þHackedµÄ½âÃÜÆ÷
EmsisoftÐû²¼ÀÕË÷Èí¼þHackedµÄÃ⺬»ìÃÜÆ÷¡£¸ÃÀÕË÷Èí¼þÓÚ2017Äê×îÏÈÔË×÷£¬Ö÷ÒªÕë¶ÔÓ¢Óï¡¢ÍÁ¶úÆäÓï¡¢Î÷°àÑÀÓïºÍÒâ´óÀûÓïÓû§¡£ÔÚѬȾϵͳºó£¬Hacked»áÏÔʾһ¸öÐéαµÄWindows¸üÐÂÆÁÄ»£¬²¢ÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.hackedÀ©Õ¹Ãû¡£Êܵ½Ñ¬È¾µÄÓû§¿ÉÒÔ´ÓÒÔÏÂÁ´½ÓÖÐÏÂÔØ¸Ã¹¤¾ß²¢ÒÔÖÎÀíԱȨÏÞÔËÐУ¬¸Ã¹¤¾ß½«×Ô¶¯½âÃÜËùÓÐ.hackedÀ©Õ¹ÃûµÄ¼ÓÃÜÎļþ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/ransomware/decryptor/emsisoft-has-released-a-decryptor-for-the-hacked-ransomware/3¡¢Å·ÖÞÐ̾¯×éÖ¯¼°Ç÷ÊÆ¿Æ¼¼ÍŽáÐû²¼2019ÄêÍøÂçµçÐÅ·¸·¨±¨¸æ

ƾ֤ŷÖÞÐ̾¯×éÖ¯ºÍÇ÷ÊÆ¿Æ¼¼ÍŽáÐû²¼µÄ2019ÄêÍøÂçµçÐÅ·¸·¨±¨¸æ£¬Ã¿ÄêµçÐÅڲƵı¾Ç®Ô¤¼ÆÎª290ÒÚÅ·Ôª£¨ºÏ330ÒÚÃÀÔª£©¡£¸Ã±¨¸æÇ¿µ÷£¬µçÐÅÚ²ÆÕýÔÚ³ÉΪ¹Å°å½ðÈÚ·¸·¨µÄµÍΣº¦Ìæ»»¼Æ»®£¬±¾Ç®ÉϵĽµµÍºÍÈëÇÖ×°±¸¿ÉÓÃÐÔµÄÔöÌíʹµÃÕâÖÖÚ²ÆÐÐΪһֱÔöÌí¡£·¸·¨·Ö×ÓµÄÖ÷ҪĿµÄÊÇÓû§»òÔËÓªÉ̵ÄÕË»§£¬²¢´ÓÖв»·¨»ñµÃ¿î×Ó¡£
ÔÎÄÁ´½Ó£º
https://www.europol.europa.eu/newsroom/news/hold-phone-threats-lurking-behind-missed-call-and-other-forms-of-telecom-fraud4¡¢Á÷ýÌåÍøÕ¾Kanopyй¶»á¼ûÈÕÖ¾£¬¿ÉÓÃÓÚ¸ú×ÙÓû§Éí·Ý
Çå¾²Ñо¿Ô±Justin Paine·¢Ã÷ÊÓÆµÁ÷ýÌåÍøÕ¾KanopyµÄElasticsearchÊý¾Ý¿âδ¾ÙÐÐÉí·ÝÑéÖ¤£¬Ê¹µÃAPIÈÕÖ¾¼°ÍøÕ¾»á¼û¼Í¼̻¶ÔÚÍøÉÏ¡£ÕâЩÐÅÏ¢¿ÉÓÃÓÚ¸ú×ÙÓû§µÄԢĿϰ¹ß¼°²éÕÒÓû§µÄÉí·Ý£¬ÀýÈç»ùÓÚ¿Í»§¶ËIP¡¢ËÑË÷/ԢĿµÄÊÓÆµÐÅÏ¢¡¢µØÀíÐÅÏ¢¡¢Ê±¼ä´ÁºÍ×°±¸ÀàÐÍ£¬ÓпÉÄÜʶ±ð³öÓû§µÄÉí·Ý¡£¸ÃÊý¾Ý¿âÖÁÉÙÓÚ3ÔÂ7ÈÕÆð̻¶ÔÚÍøÉÏ£¬²¢ÓÚ3ÔÂ18ÈÕ»ñµÃ±£»¤¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/video-streaming-site-kanopy-leaks-api-and-website-access-logs-776458145¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬Ðû²¼30¶à¸öÐéα¾¯±¨
3ÔÂ12ÈÕÆÆÏþ2:30×óÓÒ£¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈøË¹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³£¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©Ðû²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨£¬ÒýÆðÁËÍâµØ×¡ÃñµÄ¿Ö»Å¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancasterÐû²¼µÄ£¬ÆäÓàµÄÔòÊÇÔÚDeSoto¡£Ö®ºóÕâЩϵͳһֱ´¦ÓÚÍÑ»ú״̬£¬Ö±ÖÁ3ÔÂ17ÈղŻָ´Õý³£·þÎñ¡£¾¯ÆÓÖ±ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ¾ÙÐÐÊӲ졣
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html6¡¢Î¢ÈíÐÖúNorsk Hydro»Ö¸´ITϵͳ£¬ÎÞÐèÖ§¸¶Êê½ð
Norsk HydroÊ×ϯ²ÆÎñ¹ÙEivind KallevikÌåÏÖ£¬¸Ã¹«Ë¾ÒѾ×îÏÈʹÓñ¸·Ý»Ö¸´ÆäITϵͳ£¬²¢ÇÒ²»ÍýÏëÏò¹¥»÷ÕßÖ§¸¶Êê½ð¡£À´×Ô΢ÈíºÍÆäËüÇå¾²ÏàÖúͬ°éµÄר¼ÒÕýÔÚ×ÊÖúNorsk Hydro½«ÆäÒªº¦ITϵͳ»Ö¸´Õý³£ÔËÓª¡£ÉÏÖÜNorsk HydroÔâµ½ÍøÂç¹¥»÷£¬¸Ã¹«Ë¾È«Çò´ó²¿·ÖÓªÒµÁìÓòµÄITϵͳ¼°ÔËÓª¶¼Êܵ½Ó°Ïì¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/microsoft-helping-norsk-hydro-restore-its-it-systems-without-paying-the-ransom-86a32a3cÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿Ê±Î¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ