¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180713
Ðû²¼Ê±¼ä 2018-07-13¡¾¶ñÒâÈí¼þ¡¿ÒøÐÐľÂíHancitor¾íÍÁÖØÀ´£¬£¬£¬£¬£¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþÈö²¥
ÒøÐÐľÂíHancitor×îÔçÓÚ2014Äê±»·¢Ã÷£¬£¬£¬£¬£¬ÓÃÓÚÏÂÔØÆäËü¶ñÒâÈí¼þ²¢ÇÔÈ¡Óû§µÄƾ֤¡£¡£¡£¡£SentinelOneÊӲ쵽Hancitorͨ¹ýÍøÂç´¹ÂÚÓʼþ¾ÙÐÐÈö²¥µÄ¶ñÒâ»î¶¯¡£¡£¡£¡£Ò»Ð©´¹ÂÚÓʼþÒÔÍ£³µ·£¿£¿£¿£¿îµ¥ÎªÖ÷Ì⣬£¬£¬£¬£¬ÓÕÆÓû§µã»÷Æä¶ñÒâÁ´½Ó²¢ÏÂÔØ¶ñÒâwordÎĵµ¡£¡£¡£¡£»£»£ÉÐÓÐһЩÀ¬»øÓʼþÀ´×ÔÓÚIntuit»òHalloFax£¬£¬£¬£¬£¬ÓÕÆÓû§ÏÂÔØ¶ñÒâ´«ÕæÎļþ¡£¡£¡£¡£Ñо¿Ö°Ô±Åû¶Á˸öñÒâ»î¶¯µÄ¶ñÒâ·Ö·¢ÍøÖ·¼°C2ЧÀÍÆ÷¡¢ÓÐÓúÉÔØµÈÈëÇÖÖ¸±ê£¨IoC£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.sentinelone.com/blog/hancitor-banking-trojan-is-back-%7C-using-malicious-word-attachment/
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚHawkeye KeyloggerµÄбäÌåµÄÆÊÎö±¨¸æ
΢ÈíOFFICE 365Ñо¿ÍŶÓÐû²¼¹ØÓÚ¶ñÒâÈí¼þHawkeye KeyloggerµÄбäÌåµÄÆÊÎö±¨¸æ¡£¡£¡£¡£Hawkeye KeyloggerÓÖ±»³ÆÎªiSpy Keylogger£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄÐÅÏ¢£¬£¬£¬£¬£¬Æä×îºóÒ»´Î·ºÆðÔÚ2016Äê¡£¡£¡£¡£µ«Ñо¿Ö°Ô±ÔÚ2018Äê4Ô·¢Ã÷¸Ã¶ñÒâÈí¼þÔٴηºÆð£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÈí¼þºÍÊÖÒÕÐÐÒµ£¨52%£©£¬£¬£¬£¬£¬ÒÔ¼°ÒøÐУ¨11%£©¡¢ÄÜÔ´£¨8%£©¡¢»¯¹¤£¨5%£©ºÍÆû³µ£¨5%£©ÐÐÒµ¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¹ú¼Ò/µØÇø°üÀ¨°¢ÁªÇõ£¨19%£©¡¢ºÉÀ¼£¨15%£©¡¢ÃÀ¹ú£¨11%£©¡¢ÄÏ·Ç£¨6%£©ÒÔ¼°Ó¢¹ú£¨5%£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cloudblogs.microsoft.com/microsoftsecure/2018/07/11/hawkeye-keylogger-reborn-v8-an-in-depth-campaign-analysis/
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÔÚGoogle PlayÖз¢Ã÷ÐÂÌØ¹¤Èí¼þGolden Cup
McAfee LabsÑо¿ÍŶÓÔÚGoogle PlayÉÏ·¢Ã÷ÓëÌìϱÖ÷ÌâÏà¹ØµÄÐÂÌØ¹¤Èí¼þGolden Cup¡£¡£¡£¡£ÔÚδ¾Óû§Ô޳ɵÄÇéÐÎÏ£¬£¬£¬£¬£¬Golden Cup»áÔÚºǫ́¾²Ä¬ÍøÂçÓû§µÄÐÅÏ¢²¢·¢ËÍÖÁЧÀÍÆ÷£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢°üÀ¨Óû§µÄµç»°ºÅÂë¡¢ÒÑ×°ÖÃÓ¦ÓÃÁÐ±í¡¢×°±¸ID¡¢Android°æ±¾¡¢IMEI¡¢IMSI¡¢¿ÉÓô洢ÈÝÁ¿ÒÔ¼°×°±¸µÄÐͺ𢳧É̺ÍÐòÁкš£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËͳһÍþвµÄÁíÍâÁ½¸ö±äÌ壬£¬£¬£¬£¬Google PlayÒѾɾ³ýÁËÕâЩ¶ñÒâÓ¦Óᣡ£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securingtomorrow.mcafee.com/mcafee-labs/google-play-users-risk-a-yellow-card-with-android-foulgoal-a/
¡¾¹¥»÷ÊÂÎñ¡¿VSDC¹ÙÍø1¸öÔÂÄÚÈý´ÎÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬ÆäÈí¼þÏÂÔØÁ´½Ó±»Ð®ÖÆ
VSDCÊÇÒ»¼ÒÌṩÃâ·ÑÊÓÆµ±à¼Èí¼þµÄ¹«Ë¾£¬£¬£¬£¬£¬Æä¹ÙÍøÔÚ1¸öÔÂÄÚÈý´ÎÔâµ½ºÚ¿ÍÈëÇÖ£¨6ÔÂ18ÈÕ¡¢7ÔÂ2ÈÕºÍ7ÔÂ6ÈÕ£©£¬£¬£¬£¬£¬¹¥»÷Õß½«ÆäVSDCÈí¼þµÄÏÂÔØÁ´½ÓÌæ»»Îª¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬»®·Ö½«Óû§Öض¨ÏòÖÁÈý¸ö¶ñÒâÈí¼þ£¨Ò»¸öÓÃÓÚÇÔÈ¡Óû§ÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Ò»¸ö¼üÅ̼ͼÆ÷ºÍÒ»¸öÔ¶¿ØÄ¾ÂíRAT£©¡£¡£¡£¡£VSDCÈ·ÈÏÁËÕâЩÊÂÎñ£¬£¬£¬£¬£¬²¢³ÆÆäÒѾÐÞ¸´ÁËÍøÕ¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/popular-software-site-hacked-to-redirect-users-to-keylogger-infostealer-more/
¡¾¹¥»÷ÊÂÎñ¡¿ÃÀ¹ú¿¨Ë¹µØÇøµÄÒ½ÁÆÖÐÐÄÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷
ÃÀ¹úÃÜËÕÀïÖÝ¿¨Ë¹µØÇøµÄÒ½ÁÆÖÐÐÄ³ÆÆäÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬£¬£¬£¬ÆäÄÚ²¿Í¨Ñ¶ÏµÍ³ºÍµç×Ó¿µ½¡µµ°¸ÏµÍ³£¨EHR£©ÊÜÓ°Ïì¡£¡£¡£¡£¸ÃÒ½ÁÆÖÐÐijÆÃ»ÓÐÖ¤¾ÝÅú×¢»¼ÕßµÄÊý¾Ý±»»á¼û¡£¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎúÆäÅÌËã»ú/ЧÀÍÆ÷ÔõÑù±»Ñ¬È¾£¬£¬£¬£¬£¬µ«Ïà¹ØÖ´·¨²¿·ÖÒѾ½éÈë¾ÙÐÐÊӲ졣¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/cass-regional-medical-center-hit-with-unidentified-ransomware/
¡¾Îó²î²¹¶¡¡¿µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGOÐÞ¸´ÆäHMI²úÆ·ÖеĶà¸öÎó²î
µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGOÐÞ¸´Æäe!DISPLAY 7300TÈË»ú½çÃæ£¨HMI£©²úÆ·ÖеĶà¸öÇå¾²Îó²î£¬£¬£¬£¬£¬°üÀ¨XSSÎó²î£¨CVE-2018-12981£©¡¢ÎļþÉÏ´«Îó²î£¨CVE-2018-12980£©ÒÔ¼°Ä¬ÈÏȨÏÞÉèÖò»×¼È·µÄÎó²î£¨CVE-2018-12979£©¡£¡£¡£¡£Í¨¹ý×éºÏʹÓÃÕâЩÎó²î£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÁýÕÖindex.html²¢ÒÔwwwÓû§µÄȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£ÊÜÓ°ÏìµÄÐͺŰüÀ¨762-3000~762-3003£¬£¬£¬£¬£¬WAGOÒÑÔڹ̼þ°æ±¾02ÖÐÐÞ¸´ÁËÕâЩÎó²î¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/hackers-can-chain-multiple-flaws-attack-wago-hmi-devices