AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂ룻Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0
Ðû²¼Ê±¼ä 2019-10-22
AvastÅû¶ÆäÄÚ²¿ÍøÂçÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßµÄÄ¿µÄËÆºõÔÚÓÚÏòCCleanerÖÐ×¢Èë¶ñÒâ´úÂ루ÀàËÆÓÚ2017ÄêµÄ¹¥»÷£©¡£Avastר¼ÒÓÚ9ÔÂ23ÈÕ·¢Ã÷ÁËÕâÒ»¹¥»÷ÊÂÎñ£¬ºÚ¿Íͨ¹ýÈëÇÖÒ»¸öÔÝʱVPNÕË»§»á¼ûÁ˹«Ë¾µÄÄÚ²¿ÍøÂ磬¸ÃÕË»§Ã»ÓÐÓòÖÎÀíԱȨÏÞ£¬µ«ºÚ¿ÍÀֳɾÙÐÐÁËÌáȨ¡£¶Ô¹¥»÷ÕßʹÓõÄÍⲿIPµÄÆÊÎöÏÔʾ£¬¹¥»÷ÕßÔçÔÚ5ÔÂ14ÈÕ¾ÍÒ»Ö±ÊÔͼͨ¹ýVPNÀ´»á¼ûÄÚÍø¡£Avast¶Ô¹¥»÷Ô˶¯¾ÙÐÐÁË¼à¿Ø£¬Ö±µ½10ÔÂ15ÈղŹرոÃÔÝʱVPNÕË»§¡£ÏÖÔÚÉÐÎÞ·¨È·Èϸù¥»÷ÊÇ·ñÓë2017Ä걬·¢µÄ¹¥»÷±£´æ¹ØÁª¡£AvastÔÚ¶ÔCCleaner¾ÙÐÐÉó²éÖ®ºóÖØÐÂÐû²¼Á˸üС£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/2¡¢AutoclerkÊý¾Ý¿âÒâÍâÔÚÍøÉÏ̻¶179GBÓοÍÊý¾Ý
ÔÎÄÁ´½Ó£º
https://threatpost.com/government-military-personnel-data-leaked/149386/3¡¢¶íÂÞ˹Turla APTʹÓÃÒÁÀÊ»ù´¡ÉèÊ©Ãé×¼35¸ö¹ú¼Ò
¶íÂÞ˹APT×éÖ¯Turla±»·¢Ã÷ÈëÇÖÒÁÀÊAPT34µÄ»ù´¡ÉèÊ©£¬Ê¹ÓÃÆäNeuronºÍNautilus¹¤¾ßÃé×¼Öж«µØÇøµÄÄ¿µÄ¡£Æ¾Ö¤ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©ºÍÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©µÄÊý¾Ý£¬ÖÁÉÙÓÐ35¸ö¹ú¼ÒÒѳÉΪ¸Ã×éÖ¯µÄ¹¥»÷Ä¿µÄ£¬ÆäÖдó´ó¶¼Î»ÓÚÖж«£¬ÔÚÒÑÍù18¸öÔÂÖÐÖÁÉÙÓÐ20¸ö¹ú¼ÒÊܵ½¹¥»÷¡£ÔÚ2017ÄêºÍ2018Ä꣬Turla±»·¢Ã÷ÔÚʹÓÃ×Ô¼ºµÄ¹¤¾ßSnake rootkitµÄͬʱ»¹Ê¹ÓÃÁËNeuronºÍNautilus¡£¸Ã×éÖ¯×Ô2008ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬²¢ÇÒÖ÷ÒªÕë¶Ô¾üÊ»ú¹¹¡¢Õþ¸®²¿·Ö¡¢¿ÆÑ§×éÖ¯ºÍ´óѧµÈÄ¿µÄ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/russian-apt-turla-targets-35-countries-on-the-back-of-iranian-infrastructure/4¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓÃAlexaºÍGoogle HomeÇÔÌýÓû§µÄÐÂÒªÁì
ÔÎÄÁ´½Ó£º
https://threatpost.com/new-way-found-to-use-alexa-google-to-voice-phish-and-eavesdrop-on-users/149352/
5¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0
ESETÑо¿ÍŶӷ¢Ã÷Õë¶ÔMSSQL v11ºÍv12µÄкóÃÅskip-2.0¡£ESETÌåÏÖskip-2.0ÐÞ¸ÄÁËÓÃÓÚ´¦Öóͷ£Éí·ÝÑéÖ¤µÄMSSQLº¯Êý£¬ÆäÏë·¨Êǽ¨ÉèÒ»¸ö¡°Ä§ÊõÃÜÂ롱£¬ÈôÊÇÔÚÈκÎÉí·ÝÑéÖ¤»á»°ÖÐÊäÈ롰ħÊõÃÜÂ롱£¬Ôò½«×Ô¶¯ÊÚÓè¸ÃÓû§»á¼ûȨÏÞ£¬Í¬Ê±×èÖ¹Ö´ÐÐÕý³£µÄÈÕÖ¾¼Í¼ºÍÉóºË¹¦Ð§£¬´Ó¶øÓÐÓõØÔÚ·þÎñÆ÷ÄÚ²¿½¨ÉèÐéα»á»°¡£Æ¾Ö¤ESET£¬skip-2.0½öÊÊÓÃÓÚMSSQL v12ºÍv11·þÎñÆ÷¡£Ö»¹ÜMSSQL Server 12£¨2014ÄêÐû²¼£©²»ÊÇ×îа汾£¬ËüÒ²ÊÇ×î³£Óõİ汾¡£ESET½«¸ÃºóÃÅÓëAPT×éÖ¯Winnti Group¾ÙÐйØÁª¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-find-stealthy-mssql-server-backdoor-developed-by-chinese-cyberspies/
6¡¢McAfeeÐû²¼Sodinokibi¹¥»÷ÊÖÒÕ¼°Õ½ÂÔµÄÆÊÎö±¨¸æ
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/tools-and-tactics-of-the-sodinokibi-ransomware-distributors/


¾©¹«Íø°²±¸11010802024551ºÅ