¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180801

Ðû²¼Ê±¼ä 2018-08-01

¡¾ÆÊÎö±¨¸æ¡¿ICS-CERTÐû²¼ÁªÍøÊÓÆµ¼à¿ØÏµÍ³ÍøÂçÇå¾²Ì¬ÊÆ±¨¸æ


¹ú¼Ò¹¤Òµ»¥ÁªÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄ£¨ICS-CERT£©Ðû²¼ÁªÍøÊÓÆµ¼à¿ØÏµÍ³ÍøÂçÇå¾²Ì¬ÊÆ±¨¸æ£¬£¬£¬£¬ £¬£¬±¨¸æ´ÓµØÇøÂþÑÜ¡¢Æ·ÅÆÂþÑÜ¡¢ÍþвÂþÑܵȶà¸ö½Ç¶ÈÐðÊöº£ÄÚÍøÂçÊÓÆµ¼à¿ØÏµÍ³µÄÇå¾²Ì¬ÊÆÇéÐΣ¬£¬£¬£¬ £¬£¬²¢Õë¶Ô½üÄêÀ´±¬·¢µÄÍøÂçÊÓÆµ¼à¿ØÏµÍ³Çå¾²ÊÂÎñÒòÓÉÌá³öÁËÏìÓ¦µÄΣº¦Ìá·ÀºÍÇå¾²Ó¦¶Ô¼Æ»®£¬£¬£¬£¬ £¬£¬¸øÏà¹ØÕþ¸®²¿·Ö¡¢×éÖ¯ºÍÑо¿»ú¹¹Ìṩ²Î¿¼ºÍ½è¼ø¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.ics-cert.org.cn/portal/page/121/be9def54499644afb6ce4b119e5e7d42.html


¡¾ÆÊÎö±¨¸æ¡¿°Ä´óÀûÑÇOAICÐû²¼2018ÄêQ2Êý¾Ý×ß©ÊÂÎñµÄͳ¼Æ±¨¸æ


°Ä´óÀûÑÇÐÅϢרԱ°ì¹«ÊÒ£¨OAIC£©Ðû²¼2018ÄêµÚ¶þ¼¾¶ÈµÄÊý¾Ýй¶ÊÂÎñͳ¼Æ±¨¸æ£¬£¬£¬£¬ £¬£¬±¨¸æº­¸ÇÁË2018Äê4ÔÂ1ÈÕÖÁ6ÔÂ30ÈÕʱ´úµÄ242ÆðÊý¾Ýй¶ÊÂÎñ¡£¡£¡£ÆÊÎöÅú×¢59£¥µÄÊý¾Ýй¶ÊÇ·¸·¨·Ö×ÓÔì³ÉµÄ£¬£¬£¬£¬ £¬£¬36£¥ÊÇÈËΪ¹ýʧµ¼ÖµÄ£¬£¬£¬£¬ £¬£¬ÉÐÓÐ5£¥ÊÇϵͳ¹ÊÕÏÔì³ÉµÄ¡£¡£¡£´ó´ó¶¼Êý¾ÝÐ¹Â¶Éæ¼°ÁªÏµ·½·¨µÄй¶£¬£¬£¬£¬ £¬£¬ÈçСÎÒ˽¼Ò¼ÒÍ¥µØµã¡¢µç»°ºÅÂë»òµç×ÓÓʼþµØµã¡£¡£¡£42%µÄÊý¾ÝÐ¹Â¶Éæ¼°²ÆÎñÊý¾ÝµÄй¶£¬£¬£¬£¬ £¬£¬ÈçÒøÐÐÕË»§»òÐÅÓÿ¨ºÅÂë¡£¡£¡£Ò½ÁÆÐ§ÀÍÊDZ¬·¢Ð¹Â¶ÊÂÎñ×î¶à£¨49´Î£©µÄÐÐÒµ£¬£¬£¬£¬ £¬£¬Æä´ÎÊǽðÈÚÐÐÒµ£¨36´Î£©¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.oaic.gov.au/privacy-law/privacy-act/notifiable-data-breaches-scheme/quarterly-statistics-reports/notifiable-data-breaches-quarterly-statistics-report-1-april-30-june-2018#executive-summary


¡¾ÍþвÇ鱨¡¿Æ¾Ö¤×îеı¨¸æÀÕË÷Èí¼þSamSam¹²»ñµÃÁè¼Ý590ÍòÃÀÔªµÄÊê½ð


ƾ֤Ӣ¹úÍøÂçÇå¾²¹«Ë¾Sophos±àдµÄ¹ØÓÚÀÕË÷Èí¼þSamSamµÄ×îб¨¸æ£¬£¬£¬£¬ £¬£¬×Ô2015Äêµ×ÒÔÀ´SamSamÒѾ­ÎªÆä×÷Õß´øÀ´ÁËÁè¼Ý590ÍòÃÀÔªµÄÊê½ðÊÕÒæ¡£¡£¡£Ñо¿Ö°Ô±×·×ÙÁËÊÕµ½Êê½ðµÄ157¸ö±ÈÌØ±ÒµØµãÒÔ¼°Î´ÊÕµ½Êê½ðµÄ88¸ö±ÈÌØ±ÒµØµã£¬£¬£¬£¬ £¬£¬·¢Ã÷Æä×ʽðÁ¿ÎªÔ¼590ÍòÃÀÔª£¬£¬£¬£¬ £¬£¬Õâ±È֮ǰԤ¼ÆµÄ85ÍòÃÀÔªÒª¸ß¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪSamSamËÆºõÊǵ¥¸ö¹¥»÷ÕßµÄÊÂÇ飬£¬£¬£¬ £¬£¬¶ø²»ÊÇÒ»¸ö·¸·¨ÍŻ¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/samsam-ransomware-crew-made-nearly-6-million-from-ransom-payments/


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷еĴó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯Master134


Check PointÑо¿ÍŶӷ¢Ã÷Ò»¸öеĴó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯Master134¡£¡£¡£¹¥»÷ÕßʹÓÃWordPress°æ±¾4.7.1ÖеÄÒÑÖªRCEÎó²î£¬£¬£¬£¬ £¬£¬ÉøÍ¸ÁËÁè¼Ý1Íò¸öWordPressÍøÕ¾¡£¡£¡£¹¥»÷ÕßÔÚÕâÐ©ÍøÕ¾ÉÏ×¢Èë¹ã¸æ£¬£¬£¬£¬ £¬£¬ÓÃÓÚÐ®ÖÆÆäÓû§²¢½«Óû§Öض¨Ïòµ½Master134µÄÖ÷ҪЧÀÍ¡£¡£¡£È»ºóMaster134½«ÕâÐ©Ð®ÖÆµÄÁ÷Á¿³öÊÛ¸øÖ÷ÒªµÄ·¸·¨¼¯ÍÅ£¬£¬£¬£¬ £¬£¬ÈçRIG¡¢Magnitude¡¢FobosºÍHookAdsµÈ¡£¡£¡£Check PointÌåÏָöñÒâ¹ã¸æ»î¶¯ÏÖÔÚÈÔÔÚ¼ÌÐø¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://research.checkpoint.com/malvertising-campaign-based-secrets-lies/


¡¾Êý¾Ýй¶¡¿Dixons CarphoneÈ·ÈÏ2017ÄêµÄÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔ¼1000ÍòÓû§


±¾ÖÜһŷÖÞµç×ÓÁãÊÛÉÌDixons CarphoneÐû²¼Í¨¸æ³Æ2017Ä걬·¢µÄÊý¾Ýй¶ÊÂÎñ±È×î³õµÄÔ¤¼Æ¸üΪÔã¸â£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾È·ÈϸÃÊÂÎñÓ°ÏìÁËÔ¼1000ÍòÓû§£¬£¬£¬£¬ £¬£¬¸ßÓÚÆäÔÚ6Ô·Ý×î³õÔ¤¼ÆµÄ120Íò¡£¡£¡£¹¥»÷ÕßÔøÓÚÈ¥Äê»á¼ûÁËÕâЩÓû§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ £¬£¬°üÀ¨ÐÕÃû¡¢µØµãºÍµç×ÓÓʼþµØµã¡£¡£¡£Dixons CarphoneÏòÓû§°ü¹Ü³Æ£¬£¬£¬£¬ £¬£¬Ã»ÓÐÈκÎÒøÐп¨ÐÅϢй¶£¬£¬£¬£¬ £¬£¬ÈçPINÂë¡¢CVVÂëºÍÑéÖ¤ÂëµÈÊý¾Ý£¬£¬£¬£¬ £¬£¬²¢ÇÒûÓÐÖ¤¾ÝÅú×¢¸ÃÊý¾Ýй¶ÊÂÎñµ¼ÖÂÁËÈκÎڲƭÊÂÎñµÄ±¬·¢¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/07/dixons-carphone-data-breach.html


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶Ô¶íÂÞ˹ºÍº«¹úµÄ¶ñÒâÈí¼þBisonal


5Ô³õPalo Alto NetworksµÄUnit 42Ñо¿ÍŶӷ¢Ã÷Õë¶Ô¶íÂÞ˹һ¼Ò¹ú·À¹«Ë¾ºÍº«¹úÒ»¼Ò²»Ã÷¹«Ë¾µÄ¹¥»÷»î¶¯£¬£¬£¬£¬ £¬£¬¸Ã¹¥»÷»î¶¯Ê¹ÓÃÁ˶ñÒâÈí¼þBisonalµÄбäÌå¡£¡£¡£¸Ã±äÌåÓë¾É°æBisonalµÄÇø±ðÖ÷ÒªÓÐÈý¸ö£¬£¬£¬£¬ £¬£¬°üÀ¨¼ÓÃÜÆ÷µÄ²î±ð¡¢C2ͨѶ¼ÓÃÜÒªÁìµÄ²î±ðÒÔ¼°¶ÔÍøÂçͨѶºÍ³¤ÆÚÐÔ´úÂëµÄ´ó×ÚÖØÐ´¡£¡£¡£¹¥»÷Õß½«¸Ã¶ñÒâÈí¼þαװ³ÉPDFÎļþ£¨Ê¹ÓüٵÄPDFͼ±ê£©£¬£¬£¬£¬ £¬£¬²¢Í¨¹ýÍøÂç´¹ÂÚÓʼþ·¢Ë͸øÄ¿µÄ¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/07/unit42-bisonal-malware-used-attacks-russia-south-korea/