AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂ룻Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0

Ðû²¼Ê±¼ä 2019-10-22
1¡¢AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂë

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

AvastÅû¶ÆäÄÚ²¿ÍøÂçÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßµÄÄ¿µÄËÆºõÔÚÓÚÏòCCleanerÖÐ×¢Èë¶ñÒâ´úÂ루ÀàËÆÓÚ2017ÄêµÄ¹¥»÷£©¡£Avastר¼ÒÓÚ9ÔÂ23ÈÕ·¢Ã÷ÁËÕâÒ»¹¥»÷ÊÂÎñ£¬ºÚ¿Íͨ¹ýÈëÇÖÒ»¸öÔÝʱVPNÕË»§»á¼ûÁ˹«Ë¾µÄÄÚ²¿ÍøÂ磬¸ÃÕË»§Ã»ÓÐÓòÖÎÀíԱȨÏÞ£¬µ«ºÚ¿ÍÀֳɾÙÐÐÁËÌáȨ¡£¶Ô¹¥»÷ÕßʹÓõÄÍⲿIPµÄÆÊÎöÏÔʾ£¬¹¥»÷ÕßÔçÔÚ5ÔÂ14ÈÕ¾ÍÒ»Ö±ÊÔͼͨ¹ýVPNÀ´»á¼ûÄÚÍø¡£Avast¶Ô¹¥»÷Ô˶¯¾ÙÐÐÁË¼à¿Ø£¬Ö±µ½10ÔÂ15ÈղŹرոÃÔÝʱVPNÕË»§¡£ÏÖÔÚÉÐÎÞ·¨È·Èϸù¥»÷ÊÇ·ñÓë2017Ä걬·¢µÄ¹¥»÷±£´æ¹ØÁª¡£AvastÔÚ¶ÔCCleaner¾ÙÐÐÉó²éÖ®ºóÖØÐÂÐû²¼Á˸üС£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/

2¡¢AutoclerkÊý¾Ý¿âÒâÍâÔÚÍøÉÏ̻¶179GBÓοÍÊý¾Ý

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÂùÝÔ¤¶©ÖÎÀíϵͳAutoclerkµÄÒ»¸öElasticsearchÊý¾Ý¿âÔÚÍøÉÏ̻¶ÁË179GBÓοÍÊý¾Ý£¬ÆäÖаüÀ¨²¿·ÖÃÀ¹úÕþ¸®ºÍ¾üÊÂÖ°Ô±µÄÃô¸ÐÐÅÏ¢¡£vpnMentorµÄÑо¿Ö°Ô±Noam RotemºÍRan Locar·¢Ã÷ÁËÕâÒ»ÊÂÎñ£¬Æ¾Ö¤ËûÃǵı¨¸æ£¬Ì»Â¶µÄÊý¾Ý¿âÓÉAmazon Web ServersÍйÜ£¬Æä´æ´¢µÄÐÅÏ¢°üÀ¨Î´¼ÓÃܵĵǼƾ֤¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢ÂÃÐÐÈÕÆÚºÍÓöÈÒÔ¼°²¿·ÖÐÅÓÿ¨ÐÅÏ¢µÈ£¬¹ØÓÚijЩÓοÍ£¬»¹°üÀ¨ËûÃǵÄÈëסʱ¼äºÍ·¿¼äºÅ¡£Ñо¿Ö°Ô±ÌåÏÖÊý¾Ý¿âÖÐ̻¶µÄƽ̨֮һÊÇÃÀ¹úÕþ¸®¡¢¾ü·½ºÍÁìÍÁÇå¾²²¿£¨DHS£©µÄ³Ð°üÉÌ£¬¸Ã³Ð°üÉÌÈÏÕæÖÎÀíÃÀ¹úÕþ¸®ºÍ¾üÊÂÖ°Ô±µÄÂÃÐа²ÅÅ¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/government-military-personnel-data-leaked/149386/

3¡¢¶íÂÞ˹Turla APTʹÓÃÒÁÀÊ»ù´¡ÉèÊ©Ãé×¼35¸ö¹ú¼Ò

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

¶íÂÞ˹APT×éÖ¯Turla±»·¢Ã÷ÈëÇÖÒÁÀÊAPT34µÄ»ù´¡ÉèÊ©£¬Ê¹ÓÃÆäNeuronºÍNautilus¹¤¾ßÃé×¼Öж«µØÇøµÄÄ¿µÄ¡£Æ¾Ö¤ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©ºÍÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©µÄÊý¾Ý£¬ÖÁÉÙÓÐ35¸ö¹ú¼ÒÒѳÉΪ¸Ã×éÖ¯µÄ¹¥»÷Ä¿µÄ£¬ÆäÖдó´ó¶¼Î»ÓÚÖж«£¬ÔÚÒÑÍù18¸öÔÂÖÐÖÁÉÙÓÐ20¸ö¹ú¼ÒÊܵ½¹¥»÷¡£ÔÚ2017ÄêºÍ2018Ä꣬Turla±»·¢Ã÷ÔÚʹÓÃ×Ô¼ºµÄ¹¤¾ßSnake rootkitµÄͬʱ»¹Ê¹ÓÃÁËNeuronºÍNautilus¡£¸Ã×éÖ¯×Ô2008ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬²¢ÇÒÖ÷ÒªÕë¶Ô¾üÊ»ú¹¹¡¢Õþ¸®²¿·Ö¡¢¿ÆÑ§×éÖ¯ºÍ´óѧµÈÄ¿µÄ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russian-apt-turla-targets-35-countries-on-the-back-of-iranian-infrastructure/

4¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓÃAlexaºÍGoogle HomeÇÔÌýÓû§µÄÐÂÒªÁì

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ñо¿Ö°Ô±·¢Ã÷¹¥»÷Õß¿ÉÒÔʹÓÃAlexaºÍGoogle HomeÖÇÄÜÒôÏäÀ´¼àÊÓÓû§µÄÐÂÒªÁ죬¹¥»÷Õß²»µ«¿ÉÒÔÇÔÌýÓû§£¬ÉõÖÁ»¹¿ÉÒÔͨ¹ýÓïÒô´¹ÂÚÇÔÈ¡Óû§µÄÃÜÂ롣ƾ֤SRLabsµÄ±¨¸æ£¬¸ÃÎÊÌâ±£´æÓÚ¿ª·¢Ö°Ô±Îª×°±¸½¨ÉèµÄÀ©Õ¹¹¦Ð§APPÖУ¬°üÀ¨Skills for AlexaºÍActions on Google Home¡£Í¨¹ýÕâЩAPPÌṩӦµÚÈý·½µÄ±ê×¼¿ª·¢½Ó¿Ú£¬SRLabsÑо¿Ö°Ô±·¢Ã÷ÁËÁ½ÖÖ¿ÉÒÔÆÆËðÓû§Òþ˽µÄÒªÁ죬һÖÖÊÇÇëÇó²¢ÍøÂçСÎÒ˽¼ÒÊý¾Ý£¨°üÀ¨ÃÜÂ룩£¬ÁíÒ»ÖÖÊÇÔÚÓû§ÒÔΪÖÇÄÜÒôÏäûÓÐÊÕÌýÖ®ºó¾ÙÐÐÇÔÌý¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/new-way-found-to-use-alexa-google-to-voice-phish-and-eavesdrop-on-users/149352/

5¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ESETÑо¿ÍŶӷ¢Ã÷Õë¶ÔMSSQL v11ºÍv12µÄкóÃÅskip-2.0¡£ESETÌåÏÖskip-2.0ÐÞ¸ÄÁËÓÃÓÚ´¦Öóͷ£Éí·ÝÑéÖ¤µÄMSSQLº¯Êý£¬ÆäÏë·¨Êǽ¨ÉèÒ»¸ö¡°Ä§ÊõÃÜÂ롱£¬ÈôÊÇÔÚÈκÎÉí·ÝÑéÖ¤»á»°ÖÐÊäÈ롰ħÊõÃÜÂ롱£¬Ôò½«×Ô¶¯ÊÚÓè¸ÃÓû§»á¼ûȨÏÞ£¬Í¬Ê±×èÖ¹Ö´ÐÐÕý³£µÄÈÕÖ¾¼Í¼ºÍÉóºË¹¦Ð§£¬´Ó¶øÓÐÓõØÔÚ·þÎñÆ÷ÄÚ²¿½¨ÉèÐéα»á»°¡£Æ¾Ö¤ESET£¬skip-2.0½öÊÊÓÃÓÚMSSQL v12ºÍv11·þÎñÆ÷¡£Ö»¹ÜMSSQL Server 12£¨2014ÄêÐû²¼£©²»ÊÇ×îа汾£¬ËüÒ²ÊÇ×î³£Óõİ汾¡£ESET½«¸ÃºóÃÅÓëAPT×éÖ¯Winnti Group¾ÙÐйØÁª¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-find-stealthy-mssql-server-backdoor-developed-by-chinese-cyberspies/

6¡¢McAfeeÐû²¼Sodinokibi¹¥»÷ÊÖÒÕ¼°Õ½ÂÔµÄÆÊÎö±¨¸æ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


McAfeeÑо¿Ö°Ô±Í¨¹ýÃÛ¹Þ¸ú×ÙÁËÀÕË÷Èí¼þSodinokibiµÄÏà¹ØTTP¼°Ô˶¯¡£Ñо¿Ö°Ô±Ö¸³öÈý¸ö×ÓÍŻGroup 1¡¢×ÓÍÅ»ï#34ºÍ#19£©¾ùʹÓôó×Ú¶Ë¿ÚɨÃ蹤¾ßÀ´²éÕÒ¿É»á¼ûµÄRDP·þÎñÆ÷£¬È»ºóʹÓôøÓÐ×Ô½ç˵ÃÜÂëÁбíµÄNLBrute RDP±©Á¦ÆÆ½â¹¤¾ßÀ´»ñµÃ·þÎñÆ÷µÄ»á¼ûȨÏÞ£¬²¢ÔÚÍøÂçÖкáÏòÈö²¥¡£#34ºÍ#19µÄÕ½ÂÔÔ½·¢³ÉÊ죬°üÀ¨Ê¹Óö¨ÖƵÄMimikatzÅú´¦Öóͷ£ÎļþÇÔÈ¡ÍøÂçÆ¾Ö¤¡¢×Ô½ç˵¾ç±¾É¾³ýWindowsÊÂÎñÉó²éÆ÷ÈÕÖ¾ÒÔ¼°½¨ÉèÒþ²ØÓû§µÈ¡£#34»¹»áÊÍ·ÅMinerGateºÍXMRigµÈÍÚ¿óľÂí¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/tools-and-tactics-of-the-sodinokibi-ransomware-distributors/