Õë¶Ô»ªË¶Live Update¹©Ó¦Á´¹¥»÷£º2019ÄêµçÐÅ·¸·¨±¨¸æ £»£»£»£»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨Ïµ

Ðû²¼Ê±¼ä 2019-03-26
1¡¢Õë¶Ô»ªË¶Live UpdateµÄ¹©Ó¦Á´¹¥»÷£¬£¬ £¬£¬£¬£¬£¬»òÓ°ÏìÁè¼Ý100ÍòÓû§


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


2019Äê1Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄÖØ´ó¹©Ó¦Á´¹¥»÷£¬£¬ £¬£¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä£¬£¬ £¬£¬£¬£¬£¬¿ÉÄÜÓ°ÏìÁËÈ«ÇòÁè¼Ý100ÍòÓû§¡£¡£¡£¡£¡£¡£¡ £»£»£»£»ªË¶Live UpdateÊÇԤװÔÚ´ó´ó¶¼»ªË¶µçÄÔÉϵÄÊÊÓóÌÐò£¬£¬ £¬£¬£¬£¬£¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯³ÌÐòµÈ×é¼þ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÄ¿µÄMACµØµãµÄÁÐ±í£¨ÊýĿΪ600¸öÒÔÉÏ£©£¬£¬ £¬£¬£¬£¬£¬µ«Ä¿µÄȺÌåµÄÉí·ÝÉв»Ã÷È·¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÑù±¾ÊÇÓÃÕýµ±Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£©£¬£¬ £¬£¬£¬£¬£¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üÐÂЧÀÍÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ£¬£¬ £¬£¬£¬£¬£¬µ¼Ö¸ù¥»÷ºã¾Ãδ±»·¢Ã÷¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚµÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйØ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/operation-shadowhammer/89992/

2¡¢Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þHackedµÄ½âÃÜÆ÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


EmsisoftÐû²¼ÀÕË÷Èí¼þHackedµÄÃ⺬»ìÃÜÆ÷¡£¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÓÚ2017Äê×îÏÈÔË×÷£¬£¬ £¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÓ¢Óï¡¢ÍÁ¶úÆäÓï¡¢Î÷°àÑÀÓïºÍÒâ´óÀûÓïÓû§¡£¡£¡£¡£¡£¡£¡£ÔÚѬȾϵͳºó£¬£¬ £¬£¬£¬£¬£¬Hacked»áÏÔʾһ¸öÐéαµÄWindows¸üÐÂÆÁÄ»£¬£¬ £¬£¬£¬£¬£¬²¢ÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.hackedÀ©Õ¹Ãû¡£¡£¡£¡£¡£¡£¡£Êܵ½Ñ¬È¾µÄÓû§¿ÉÒÔ´ÓÒÔÏÂÁ´½ÓÖÐÏÂÔØ¸Ã¹¤¾ß²¢ÒÔÖÎÀíԱȨÏÞÔËÐУ¬£¬ £¬£¬£¬£¬£¬¸Ã¹¤¾ß½«×Ô¶¯½âÃÜËùÓÐ.hackedÀ©Õ¹ÃûµÄ¼ÓÃÜÎļþ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/ransomware/decryptor/emsisoft-has-released-a-decryptor-for-the-hacked-ransomware/

3¡¢Å·ÖÞÐ̾¯×éÖ¯¼°Ç÷ÊÆ¿Æ¼¼ÁªºÏÐû²¼2019ÄêÍøÂçµçÐÅ·¸·¨±¨¸æ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ƾ֤ŷÖÞÐ̾¯×éÖ¯ºÍÇ÷ÊÆ¿Æ¼¼ÁªºÏÐû²¼µÄ2019ÄêÍøÂçµçÐÅ·¸·¨±¨¸æ£¬£¬ £¬£¬£¬£¬£¬Ã¿ÄêµçÐÅڲƭµÄ±¾Ç®Ô¤¼ÆÎª290ÒÚÅ·Ôª£¨ºÏ330ÒÚÃÀÔª£©¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÇ¿µ÷£¬£¬ £¬£¬£¬£¬£¬µçÐÅڲƭÕýÔÚ³ÉΪ¹Å°å½ðÈÚ·¸·¨µÄµÍΣº¦Ìæ»»¼Æ»®£¬£¬ £¬£¬£¬£¬£¬±¾Ç®ÉϵĽµµÍºÍÈëÇÖ×°±¸¿ÉÓÃÐÔµÄÔöÌíʹµÃÕâÖÖڲƭÐÐΪһֱÔöÌí¡£¡£¡£¡£¡£¡£¡£·¸·¨·Ö×ÓµÄÖ÷ҪĿµÄÊÇÓû§»òÔËÓªÉ̵ÄÕË»§£¬£¬ £¬£¬£¬£¬£¬²¢´ÓÖв»·¨»ñµÃ¿î×Ó¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.europol.europa.eu/newsroom/news/hold-phone-threats-lurking-behind-missed-call-and-other-forms-of-telecom-fraud

4¡¢Á÷ýÌåÍøÕ¾Kanopyй¶»á¼ûÈÕÖ¾£¬£¬ £¬£¬£¬£¬£¬¿ÉÓÃÓÚ¸ú×ÙÓû§Éí·Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Çå¾²Ñо¿Ô±Justin Paine·¢Ã÷ÊÓÆµÁ÷ýÌåÍøÕ¾KanopyµÄElasticsearchÊý¾Ý¿âδ¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬ £¬£¬£¬£¬£¬Ê¹µÃAPIÈÕÖ¾¼°ÍøÕ¾»á¼û¼Í¼̻¶ÔÚÍøÉÏ¡£¡£¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÓÃÓÚ¸ú×ÙÓû§µÄԢĿϰ¹ß¼°²éÕÒÓû§µÄÉí·Ý£¬£¬ £¬£¬£¬£¬£¬ÀýÈç»ùÓÚ¿Í»§¶ËIP¡¢ËÑË÷/ԢĿµÄÊÓÆµÐÅÏ¢¡¢µØÀíÐÅÏ¢¡¢Ê±¼ä´ÁºÍ×°±¸ÀàÐÍ£¬£¬ £¬£¬£¬£¬£¬ÓпÉÄÜʶ±ð³öÓû§µÄÉí·Ý¡£¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÖÁÉÙÓÚ3ÔÂ7ÈÕÆð̻¶ÔÚÍøÉÏ£¬£¬ £¬£¬£¬£¬£¬²¢ÓÚ3ÔÂ18ÈÕ»ñµÃ± £»£»£»£»¤¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/video-streaming-site-kanopy-leaks-api-and-website-access-logs-77645814

5¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬£¬ £¬£¬£¬£¬£¬Ðû²¼30¶à¸öÐéα¾¯±¨


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


3ÔÂ12ÈÕÆÆÏþ2:30×óÓÒ£¬£¬ £¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈøË¹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³£¬£¬ £¬£¬£¬£¬£¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©Ðû²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨£¬£¬ £¬£¬£¬£¬£¬ÒýÆðÁËÍâµØ×¡ÃñµÄ¿Ö»Å¡£¡£¡£¡£¡£¡£¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancasterÐû²¼µÄ£¬£¬ £¬£¬£¬£¬£¬ÆäÓàµÄÔòÊÇÔÚDeSoto¡£¡£¡£¡£¡£¡£¡£Ö®ºóÕâЩϵͳһֱ´¦ÓÚÍÑ»ú״̬£¬£¬ £¬£¬£¬£¬£¬Ö±ÖÁ3ÔÂ17ÈղŻָ´Õý³£Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¾¯ÆÓÖ±ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ¾ÙÐÐÊӲ졣¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html

6¡¢Î¢ÈíЭÖúNorsk Hydro»Ö¸´ITϵͳ£¬£¬ £¬£¬£¬£¬£¬ÎÞÐèÖ§¸¶Êê½ð


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Norsk HydroÊ×ϯ²ÆÎñ¹ÙEivind KallevikÌåÏÖ£¬£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒѾ­×îÏÈʹÓñ¸·Ý»Ö¸´ÆäITϵͳ£¬£¬ £¬£¬£¬£¬£¬²¢ÇÒ²»ÍýÏëÏò¹¥»÷ÕßÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£À´×Ô΢ÈíºÍÆäËüÇå¾²ÏàÖúͬ°éµÄר¼ÒÕýÔÚ×ÊÖúNorsk Hydro½«ÆäÒªº¦ITϵͳ»Ö¸´Õý³£ÔËÓª¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜNorsk HydroÔâµ½ÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾È«Çò´ó²¿·ÖÓªÒµÁìÓòµÄITϵͳ¼°ÔËÓª¶¼Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/microsoft-helping-norsk-hydro-restore-its-it-systems-without-paying-the-ransom-86a32a3c

ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí