2019Äê¼ÓÃÜÇ®±Ò·¸·¨Ô˶¯ÒÑÔì³É44ÒÚÃÀÔªËðʧ£»AndroidÎó²îStrandHogg¿Éαװ³Éí§ÒâÓ¦ÓÃ
Ðû²¼Ê±¼ä 2019-12-031.2019Äê¼ÓÃÜÇ®±Ò·¸·¨Ô˶¯ÒÑÔì³É44ÒÚÃÀÔªËðʧ
ƾ֤CipherTraceµÄ±¨¸æ£¬ÔÚÂÄÀú¹ýÁ½ÄêµÄá¯ÁëÆÚºó£¬Óë¼ÓÃÜÇ®±ÒÓйصÄÍøÂç·¸·¨Ô˶¯£¨ÀýÈçÉúÒâËù±»ºÚ¿ÍÈëÇÖ¡¢Í˳öȦÌ׵ȣ©·ºÆðÁË´ó·ùϽµ£¬È»¶øÔì³ÉµÄËðʧȴ·ºÆðÁËÔöÌí¡£ÔÚ2019Äêǰ9¸öÔ£¬ÒÔ¼ÓÃÜÇ®±ÒΪÖ÷µÄÊý×Ö·¸·¨Ôì³ÉÁׯߴï44ÒÚÃÀÔªµÄËðʧ£¬ÓëÖ®Ïà±È2018 ÄêÕûÄêÓë¼ÓÃÜÇ®±ÒÏà¹ØµÄ·¸·¨Ëðʧ×ܶîΪ17ÒÚÃÀÔª£¬ÕâÒâζ׎ñÄêǰ¾Å¸öÔµÄÊý¾Ý±ÈÈ¥ÄêÕûÄêÔöÌíÁË150%¡£¾ÝÆÊÎö£¬PlusTokenºÍQuadrigaCXÁ½Æð¼ÓÃÜÇ®±Òڲư¸Êǵ¼Ö½ñÄêËðʧ¼±¾çÉÏÉýµÄÖ÷ÒªÔµ¹ÊÔÓÉ¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2019/12/02/crypto-crimes/
2.Å·ÖÞÐ̾¯×éÖ¯¹Ø±ÕÁè¼Ý30500¸öµÁ°æÍøÕ¾
Å·ÖÞÐ̾¯×éÖ¯Ðû²¼ÒÑÔÚÒ»ÏîºÍÃÀ¹úÖ´·¨»ú¹¹ÏàÖúµÄÈ«ÇòÍŽáÐж¯ÖйرÕÁË30506¸öµÁ°æÍøÕ¾¡£ÕâЩÓòÃû±»ÓÃÓÚÏúÊÛÖÖÖÖµÁ°æ²úÆ·ºÍ·þÎñ£¬°üÀ¨µ«²»ÏÞÓÚµÁ°æµÄÓ°Ï·¡¢µçÊÓ½ÚÄ¿¡¢ÒôÀÖ¡¢Èí¼þºÍ¼ÙÒ©¡¢Ã°³äµÄµç×Ó²úÆ·µÈ¡£Å·ÖÞÐ̾¯×éÖ¯»¹ÌåÏÖ£¬ÔÚÕâÏîÐж¯Öл¹¾Ð²¶ÁË3Ãû·¸·¨ÏÓÒÉÈË£¬²¢½É»ñÁË26000¼þÉÝ³ÞÆ·£¨ÏãË®¡¢Ò·þµÈ£©¡¢363Éý¾Æ¾«ÒûÁϺʹó×ÚÓ²¼þ×°±¸¡£ËûÃÇ»¹ÔÚ¶à¸öÒøÐÐÕË»§ºÍÔÚÏßÖ§¸¶Æ½Ì¨ÖÐʶ±ð²¢¶³½áÁËÁè¼Ý15ÍòÅ·Ôª¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/over-30-500-online-piracy-sites-shut-down-in-global-operation/
3.ÐÂÎ÷À¼Ç¹Ö§»Ø¹ºÍýÏë¹ÙÍøÐ¹Â¶3.7Íò³ÖǹÕßÒþ˽ÐÅÏ¢
ÐÂÎ÷À¼Õþ¸®µÄǹ֧»Ø¹ºÍýÏë¹ÙÍøÒâÍâй¶ÁË37000¶àÃû³ÖǹÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬°üÀ¨ËûÃǵÄÍêÕûÁªÏµ·½·¨¡¢Ç¹Ö§ÔÊÐíÖ¤±àºÅÒÔ¼°ÒøÐÐÕË»§ÐÅÏ¢µÈ¡£³Ö֤ǹ֧ËùÓÐÕßÀíÊ»ᣨCOLFO£©Åû¶ÁËÕâÒ»ÊÂÎñ£¬¾¯·½Ëæºó½ÒÏþÉùÃ÷³ÆÒѾ֪Ïþ¸ÃÎÊÌâ²¢¹Ø±ÕÁËÍøÕ¾¡£COLFOÌåÏÖÔÚ¾¯·½¹Ø±Õ֮ǰÓû§×î¶à¿ÉÒԵǼ¸Ãϵͳ3¸öСʱ£¬ÏÖÔÚÉв»ÇåÎúÕâЩÐÅϢ̻¶Á˶೤ʱ¼ä¡£
ÔÎÄÁ´½Ó£º
https://www.computerworld.com/article/3482005/buyback-website-reveals-details-of-37-000-gun-owners.html
4.´¹ÂÚÍøÕ¾Ê¹ÓÃÐéαSteamÔùÆ·ÇÔÈ¡Óû§Æ¾Ö¤
Çå¾²Ñо¿Ö°Ô±nullcookies·¢Ã÷Ò»¸öʹÓÃÐéαSteamÔùÆ·ÇÔÈ¡Óû§Æ¾Ö¤µÄ´¹ÂÚÍøÕ¾£¬²¢ÔÚTwitterÉÏÐû²¼ÁËÖÒÑÔ¡£¸ÃÍøÕ¾Ö÷ÒªÐû´«Ò»¸öÐéαµÄ¡°3ÍòÃÀÔªÔùÆ·¡±µÄ´ÙÏúÔ˶¯£¬ÆäÖл¹°üÀ¨Ãâ·ÑµÄCSGOƤ·ôÔùÆ·¡£¸Ã´¹ÂÚÒ³ÃæµÄ×ó²àÉÐÓÐÒ»¸öαÔìµÄʵʱ̸ÌìÆÁÄ»£¬µ«ÏÖʵÉÏÏÔʾµÄ̸ÌìÐÅÏ¢Ò²ÊÇͨ¹ýJavaScript¾ç±¾Î±ÔìµÄ¡£µ±Óû§µã»÷¡°Í¨¹ýSteamµÇ¼¡±°´Å¥ºó£¬½«±»ÒªÇóÔÚÐéαµÄµÇÂ¼Ò³ÃæÉÏÊäÈëÆ¾Ö¤¡£ºÃÐÂÎÅÊÇÓÉÓÚ¸ÃÍøÕ¾±»ÍйÜÔÚCloudflareÉÏ£¬Òò´ËʵÑé»á¼û¸ÃÒ³ÃæµÄÓû§½«»áÏÔʾ¿ÉÒÉÕ¾µãµÄÖÒÑÔ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fake-steam-skin-giveaway-site-steals-your-login-credentials/
5.ÌØ¹¤Èí¼þCallerSpyÕë¶ÔÐÔ¹¥»÷µÄÆÊÎö±¨¸æ

Ç÷ÊÆ¿Æ¼¼Ðû²¼ÓйØÒƶ¯Ìع¤Èí¼þCallerSpyµÄÆÊÎö±¨¸æ¡£¸ÃÌØ¹¤Èí¼þÖ÷Ҫαװ³É̸ÌìÓ¦Ó㬵«²¢²»¾ß±¸Ì¸Ì칦Ч£¬¶øÊǾ߱¸¶àÖÖÌØ¹¤ÐÐΪ£¬°üÀ¨ÉèÖöà¸öÍýÏëʹÃü£¬ÍøÂçÉè±¹ØÁ¬Äͨ»°¼Í¼¡¢¶ÌÐÅ¡¢ÁªÏµÈ˺ÍÎļþÐÅÏ¢£»´ÓC£¦C·þÎñÆ÷ÎüÊÕÏÂÁ½ØÆÁ²¢·¢Ë͵½·þÎñÆ÷µÈ¡£Ñо¿Ö°Ô±»®·ÖÔÚ5ÔºÍ10ÔÂÊӲ쵽¸Ã¶ñÒâÈí¼þ¼Ò×åµÄÕë¶ÔÐÔ¹¥»÷£¬µ«Æä¹¥»÷Ä¿µÄÉÐδÃ÷È·¡£±¨¸æÖÐÁгöÁËÏêϸµÄIoCÖ¸±ê¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-distributed-through-callerspy-mounts-initial-phase-of-a-targeted-attack/
6.AndroidÎó²îStrandHogg¿Éαװ³Éí§ÒâÓ¦ÓÃ

PromonÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¸öеÄAndroidÎó²îStrandHogg£¬¸ÃÎó²îÔÊÐí¶ñÒâÓ¦ÓÃαװ³Éí§ÒâÕýµ±Ó¦Ó᣸ÃÎó²îʹÓÃÁËAndroidµÄ¶àʹÃü´¦Öóͷ£¹¦Ð§£¬µ±Óû§µã»÷Ò»¸öÕý³£Ó¦ÓõÄͼ±êʱ£¬¶ñÒâÓ¦ÓÿÉÒÔʹÓøÃÎó²î×èµ²Ö¸Áî²¢ÏòÓû§ÏÔʾһ¸öÐéαµÄ½çÃæ£¬´Ó¶øÓÕµ¼Óû§ÊÚÓèÖÖÖÖȨÏÞ¡£Ñо¿Ö°Ô±ÒѾ·¢Ã÷ÁË36¸öÕýÔÚÆð¾¢Ê¹ÓôËÎó²îµÄ¶ñÒâÓ¦Ó㬰üÀ¨ÒøÐÐľÂíBankBot¡£Ñо¿Ö°Ô±³Æ¸ÃÎó²îµÄÓ°Ïì¹æÄ£ºÜÊÇ´ó£¬ÓÉÓÚĬÈÏÇéÐÎÏ´ó´ó¶¼Ó¦Óö¼Ò×Êܹ¥»÷£¬²¢ÇÒÏÖÔÚûÓпɿ¿µÄÒªÁìÀ´Ì½²â»ò×èÖ¹ÕâÖÖ¹¥»÷¡£¹È¸èÉÐδÔÚÈκΰ汾µÄAndroidÉÏÐÞ¸´´ËÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/actively-exploited-strandhogg-vulnerability-affects-android-os/


¾©¹«Íø°²±¸11010802024551ºÅ