Õë¶Ô»ªË¶Live Update¹©Ó¦Á´¹¥»÷£º2019ÄêµçÐÅ·¸·¨±¨¸æ£»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨Ïµ

Ðû²¼Ê±¼ä 2019-03-26
1¡¢Õë¶Ô»ªË¶Live UpdateµÄ¹©Ó¦Á´¹¥»÷ £¬»òÓ°ÏìÁè¼Ý100ÍòÓû§


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


2019Äê1Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄÖØ´ó¹©Ó¦Á´¹¥»÷ £¬´Ë´Î¹¥»÷±¬·¢ÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä £¬¿ÉÄÜÓ°ÏìÁËÈ«ÇòÁè¼Ý100ÍòÓû§¡£»ªË¶Live UpdateÊÇԤװÔÚ´ó´ó¶¼»ªË¶µçÄÔÉϵÄÊÊÓóÌÐò £¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯³ÌÐòµÈ×é¼þ¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÄ¿µÄMACµØµãµÄÁÐ±í£¨ÊýĿΪ600¸öÒÔÉÏ£© £¬µ«Ä¿µÄȺÌåµÄÉí·ÝÉв»Ã÷È·¡£ÓÉÓÚÑù±¾ÊÇÓÃÕýµ±Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£© £¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üзþÎñÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ £¬µ¼Ö¸ù¥»÷ºã¾Ãδ±»·¢Ã÷¡£ÏÖÔÚµÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/operation-shadowhammer/89992/

2¡¢Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þHackedµÄ½âÃÜÆ÷


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


EmsisoftÐû²¼ÀÕË÷Èí¼þHackedµÄÃ⺬»ìÃÜÆ÷¡£¸ÃÀÕË÷Èí¼þÓÚ2017Äê×îÏÈÔË×÷ £¬Ö÷ÒªÕë¶ÔÓ¢Óï¡¢ÍÁ¶úÆäÓï¡¢Î÷°àÑÀÓïºÍÒâ´óÀûÓïÓû§¡£ÔÚѬȾϵͳºó £¬Hacked»áÏÔʾһ¸öÐéαµÄWindows¸üÐÂÆÁÄ» £¬²¢ÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.hackedÀ©Õ¹Ãû¡£Êܵ½Ñ¬È¾µÄÓû§¿ÉÒÔ´ÓÒÔÏÂÁ´½ÓÖÐÏÂÔØ¸Ã¹¤¾ß²¢ÒÔÖÎÀíԱȨÏÞÔËÐÐ £¬¸Ã¹¤¾ß½«×Ô¶¯½âÃÜËùÓÐ.hackedÀ©Õ¹ÃûµÄ¼ÓÃÜÎļþ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/ransomware/decryptor/emsisoft-has-released-a-decryptor-for-the-hacked-ransomware/

3¡¢Å·ÖÞÐ̾¯×éÖ¯¼°Ç÷ÊÆ¿Æ¼¼ÍŽáÐû²¼2019ÄêÍøÂçµçÐÅ·¸·¨±¨¸æ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

ƾ֤ŷÖÞÐ̾¯×éÖ¯ºÍÇ÷ÊÆ¿Æ¼¼ÍŽáÐû²¼µÄ2019ÄêÍøÂçµçÐÅ·¸·¨±¨¸æ £¬Ã¿ÄêµçÐÅڲƭµÄ±¾Ç®Ô¤¼ÆÎª290ÒÚÅ·Ôª£¨ºÏ330ÒÚÃÀÔª£©¡£¸Ã±¨¸æÇ¿µ÷ £¬µçÐÅڲƭÕýÔÚ³ÉΪ¹Å°å½ðÈÚ·¸·¨µÄµÍΣº¦Ìæ»»¼Æ»® £¬±¾Ç®ÉϵĽµµÍºÍÈëÇÖ×°±¸¿ÉÓÃÐÔµÄÔöÌíʹµÃÕâÖÖڲƭÐÐΪһֱÔöÌí¡£·¸·¨·Ö×ÓµÄÖ÷ҪĿµÄÊÇÓû§»òÔËÓªÉ̵ÄÕË»§ £¬²¢´ÓÖв»·¨»ñµÃ¿î×Ó¡£


Ô­ÎÄÁ´½Ó£º

https://www.europol.europa.eu/newsroom/news/hold-phone-threats-lurking-behind-missed-call-and-other-forms-of-telecom-fraud

4¡¢Á÷ýÌåÍøÕ¾Kanopyй¶»á¼ûÈÕÖ¾ £¬¿ÉÓÃÓÚ¸ú×ÙÓû§Éí·Ý


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Çå¾²Ñо¿Ô±Justin Paine·¢Ã÷ÊÓÆµÁ÷ýÌåÍøÕ¾KanopyµÄElasticsearchÊý¾Ý¿âδ¾ÙÐÐÉí·ÝÑéÖ¤ £¬Ê¹µÃAPIÈÕÖ¾¼°ÍøÕ¾»á¼û¼Í¼̻¶ÔÚÍøÉÏ¡£ÕâЩÐÅÏ¢¿ÉÓÃÓÚ¸ú×ÙÓû§µÄԢĿϰ¹ß¼°²éÕÒÓû§µÄÉí·Ý £¬ÀýÈç»ùÓÚ¿Í»§¶ËIP¡¢ËÑË÷/ԢĿµÄÊÓÆµÐÅÏ¢¡¢µØÀíÐÅÏ¢¡¢Ê±¼ä´ÁºÍ×°±¸ÀàÐÍ £¬ÓпÉÄÜʶ±ð³öÓû§µÄÉí·Ý¡£¸ÃÊý¾Ý¿âÖÁÉÙÓÚ3ÔÂ7ÈÕÆð̻¶ÔÚÍøÉÏ £¬²¢ÓÚ3ÔÂ18ÈÕ»ñµÃ±£»¤¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/video-streaming-site-kanopy-leaks-api-and-website-access-logs-77645814

5¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³ £¬Ðû²¼30¶à¸öÐéα¾¯±¨


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


3ÔÂ12ÈÕÆÆÏþ2:30×óÓÒ £¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈøË¹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³ £¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©Ðû²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨ £¬ÒýÆðÁËÍâµØ×¡ÃñµÄ¿Ö»Å¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancasterÐû²¼µÄ £¬ÆäÓàµÄÔòÊÇÔÚDeSoto¡£Ö®ºóÕâЩϵͳһֱ´¦ÓÚÍÑ»ú״̬ £¬Ö±ÖÁ3ÔÂ17ÈղŻָ´Õý³£·þÎñ¡£¾¯ÆÓÖ±ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ¾ÙÐÐÊӲ졣


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html

6¡¢Î¢ÈíЭÖúNorsk Hydro»Ö¸´ITϵͳ £¬ÎÞÐèÖ§¸¶Êê½ð


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Norsk HydroÊ×ϯ²ÆÎñ¹ÙEivind KallevikÌåÏÖ £¬¸Ã¹«Ë¾ÒѾ­×îÏÈʹÓñ¸·Ý»Ö¸´ÆäITϵͳ £¬²¢ÇÒ²»ÍýÏëÏò¹¥»÷ÕßÖ§¸¶Êê½ð¡£À´×Ô΢ÈíºÍÆäËüÇå¾²ÏàÖúͬ°éµÄר¼ÒÕýÔÚ×ÊÖúNorsk Hydro½«ÆäÒªº¦ITϵͳ»Ö¸´Õý³£ÔËÓª¡£ÉÏÖÜNorsk HydroÔâµ½ÍøÂç¹¥»÷ £¬¸Ã¹«Ë¾È«Çò´ó²¿·ÖÓªÒµÁìÓòµÄITϵͳ¼°ÔËÓª¶¼Êܵ½Ó°Ïì¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/microsoft-helping-norsk-hydro-restore-its-it-systems-without-paying-the-ransom-86a32a3c

ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿­Ê±Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí