¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180718

Ðû²¼Ê±¼ä 2018-07-18

¡¾ÆÊÎö±¨¸æ¡¿Ñо¿»ú¹¹Ðû²¼2018ÄêQ2ÍøÂç·¸·¨Ç÷ÊÆµÄÆÊÎö±¨¸æ


Malwarebytes LabsÐû²¼2018ÄêµÚ¶þ¼¾¶ÈµÄÍøÂç·¸·¨Ç÷ÊÆ±¨¸æ£¬£¬£¬£¬±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£º¶ñÒâÍÚ¿óÈȶÈÈÔÈ»ºÜ¸ß£¬£¬£¬£¬µ«ÒÑ×îÏÈϽµ£»£»£»£»£»£»GandCrab³ÉΪÀÕË÷Èí¼þµÄÍõÕߣ»£»£»£»£»£»¹ã¸æÈí¼þÏà±ÈÉÏÒ»¼¾¶ÈÔöÌí19%£»£»£»£»£»£»VPNFilterµÄ¼ì²â´ÎÊýÁè¼Ý50Íò´Î£»£»£»£»£»£»ExploitsÕýÔÚÉÏÉý£»£»£»£»£»£»Õ©Æ­ÕßÔ½À´Ô½¶àµØÕë¶ÔPII£¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£©¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://blog.malwarebytes.com/malwarebytes-news/ctnt-report/2018/07/cybercrime-tactics-techniques-q2-2018/


¡¾Çå¾²Îó²î¡¿Telefonica¹ÙÍøÎó²î¿Éµ¼ÖÂÊý°ÙÍòÓû§µÄСÎÒ˽¼ÒÐÅϢй¶

Î÷°àÑÀµçÐŹ«Ë¾TelefonicaµÄ¹Ì»°¡¢¿í´ø¼°¸¶·ÑµçÊÓÓªÒµMovistarµÄ¹ÙÍø±£´æÎó²î£¬£¬£¬£¬¿Éµ¼ÖÂÊý°ÙÍòÓû§µÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£Movistar¹ÙÍøÉÏÓÃÓÚÉó²é·¢Æ±µÄÒ³ÃæµÄURLÖаüÀ¨ÁË·¢Æ±µÄID£¬£¬£¬£¬ÈκÎÓû§¶¼¿ÉÒÔͨ¹ýÐ޸ĴËIDÀ´Éó²éÆäËüÕË»§µÄÊý¾Ý¡£¡£¡£¡£¡£Æ¾Ö¤ÐµÄGDPR»®¶¨£¬£¬£¬£¬¸Ã¹«Ë¾¿ÉÄÜÃæÁÙ1000Íò~2000ÍòÅ·Ôª»òÏ൱ÓÚÆäÄêÓªÒµ¶î2%~4%µÄ·£¿£¿£¿ £¿ £¿£¿î¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/telefonica-spain-exposed-the-personal-details-of-millions-of-customers/


¡¾¹¥»÷ÊÂÎñ¡¿Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÒâ´óÀûÈýÐÇЧÀÍÖÐÐĵĶñÒâÈí¼þ¹¥»÷»î¶¯


TG SoftµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÒâ´óÀûÈýÐÇЧÀÍÖÐÐĵÄÒ»Á¬¶ñÒâÈí¼þ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÍøÂç´¹ÂÚÓʼþ·Ö·¢¶ñÒâÈí¼þNetwireºÍnjRAT£¬£¬£¬£¬ÆäʹÓõÄÎó²îÊÇOffice¹«Ê½±à¼­Æ÷Îó²î£¨CVE-2017-11882£©¡£¡£¡£¡£¡£ÕâЩ¹¥»÷»î¶¯Óë֮ǰFortinet±¨¸æµÄÕë¶Ô¶íÂÞ˹ЧÀÍÖÐÐĵĹ¥»÷»î¶¯ÏÕЩÏàͬ¡£¡£¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎú¹¥»÷ÕßµÄ×îÖÕÄ¿µÄ¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/samsung-service-centers-in-italy-targeted-in-malware-campaign/


¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±ÑÝʾÔõÑùͨ¹ýµÍ±¾Ç®×°±¸ÓÕÆ­GPSµ¼º½ÏµÍ³


Ñо¿Ö°Ô±¿ª·¢³öÒ»ÖÖ¿ÉÒÔαװ³ÉGPSÎÀÐÇÀ´ÓÕÆ­ÖÜΧµÄGPSÎüÊÕÆ÷µÄ¹¤¾ß£¬£¬£¬£¬¸Ã¹¤¾ß¿ÉÓÃÓÚÓÕÆ­³µÁ¾µÄµ¼º½ÏµÍ³¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»ùÓÚRaspberry Pi¹¹½¨ÁËÒ»¸öÎÞÏߵ緢Éä×°Ö㬣¬£¬£¬¹²ÆÆ·ÑÔ¼223ÃÀÔª£¬£¬£¬£¬¸Ã×°ÖõÄÓÐÓùæÄ£ÊÇ40~50Ã×£¬£¬£¬£¬ÔÚ²âÊÔÖпÉÒÔÒÔ95%µÄ׼ȷÂÊÓÕÆ­µ¼º½ÏµÍ³²¢Ð޸ļÝÊ»õè¾¶¡£¡£¡£¡£¡£¸Ã×°ÖÃÒ»Ö±¹ã²¥ÐéαµÄ¶¨Î»ÐÅÏ¢£¬£¬£¬£¬Ê¹µÃ³µÁ¾ÉϵÄÎüÊÕÆ÷ÏÕЩ²»¿ÉÄÜ´ÓÎÀÐÇÉÏ»ñµÃÕæÊµµÄÊý¾Ý¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/74509/hacking/navigation-systems-hack.html


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷ÍøÂçÌØ¹¤×éÖ¯BlackgearµÄй¥»÷»î¶¯


BlackgearÒ²±»³ÆÎªTopgear»òComnie£¬£¬£¬£¬ÊÇÒ»¸ö¿É×·ËÝÖÁ2008ÄêµÄÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖйų́Íå¡¢º«¹úºÍÈÕ±¾¡£¡£¡£¡£¡£ÆäÄ¿µÄ°üÀ¨µçÐÅ¡¢¹ú·À¡¢Õþ¸®¡¢º½¿Õº½ÌìÒÔ¼°¸ß¿Æ¼¼ÐÐÒµµÄ¹«Ë¾¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Æä×îÐµĹ¥»÷»î¶¯Ê¹ÓÃа汾µÄProtuxºóÃźÍMaradeÏÂÔØÆ÷£¬£¬£¬£¬²¢Ê¹ÓÃFacebookµÈÉ罻ýÌå¾ÙÐÐC&CͨѶ¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/blackgear-cyberespionage-campaign-resurfaces-abuses-social-media-for-cc-communication/


¡¾¶ñÒâÈí¼þ¡¿Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚÀÕË÷Èí¼þCryaklµÄÆÊÎö±¨¸æ


¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚÀÕË÷Èí¼þCryaklµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£2018Äê2Ô±ÈÀûʱ¾¯·½²é»ñÁËCryaklµÄC&CЧÀÍÆ÷£¬£¬£¬£¬Ñо¿Ö°Ô±Òò´ËµÃÒÔ¿ª·¢Ãâ·ÑµÄ½âÃܹ¤¾ß¡£¡£¡£¡£¡£Cryakl×îÔç·ºÆðÓÚ2014Ä꣬£¬£¬£¬Ö÷Ҫͨ¹ýÍøÂç´¹ÂÚÓʼþÈö²¥£¬£¬£¬£¬Æä¹²Ñ¬È¾Á˶íÂÞ˹µÄ5Íò¶àÈË£¬£¬£¬£¬ÒÔ¼°ÈÕ±¾¡¢Òâ´óÀûºÍµÂ¹úµÄÊýǧÃûÓû§¡£¡£¡£¡£¡£Cryakl°üÀ¨¶à¸ö°æ±¾£¬£¬£¬£¬´ÓCL 1.0.0.0ÖÁCL 1.3.1.0£¬£¬£¬£¬Êܺ¦Õß¿ÉʹÓÃÃ⺬»ìÃܹ¤¾ßRakhniDecryptor½âÃÜÆäÎļþ¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/the-return-of-fantomas-or-how-we-deciphered-cryakl/86511/