Õë¶Ô»ªË¶Live Update¹©Ó¦Á´¹¥»÷£º2019ÄêµçÐÅ·¸·¨±¨¸æ£»£»£»£»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨Ïµ
Ðû²¼Ê±¼ä 2019-03-26
2019Äê1Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄÖØ´ó¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÓ°ÏìÁËÈ«ÇòÁè¼Ý100ÍòÓû§¡£¡£¡£¡£¡£¡£¡£»£»£»£»ªË¶Live UpdateÊÇԤװÔÚ´ó´ó¶¼»ªË¶µçÄÔÉϵÄÊÊÓóÌÐò£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯³ÌÐòµÈ×é¼þ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÄ¿µÄMACµØµãµÄÁÐ±í£¨ÊýĿΪ600¸öÒÔÉÏ£©£¬£¬£¬£¬£¬£¬£¬µ«Ä¿µÄȺÌåµÄÉí·ÝÉв»Ã÷È·¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÑù±¾ÊÇÓÃÕýµ±Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£©£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üÐÂЧÀÍÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ£¬£¬£¬£¬£¬£¬£¬µ¼Ö¸ù¥»÷ºã¾Ãδ±»·¢Ã÷¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚµÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйء£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/operation-shadowhammer/89992/2¡¢Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þHackedµÄ½âÃÜÆ÷
EmsisoftÐû²¼ÀÕË÷Èí¼þHackedµÄÃ⺬»ìÃÜÆ÷¡£¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þÓÚ2017Äê×îÏÈÔË×÷£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÓ¢Óï¡¢ÍÁ¶úÆäÓï¡¢Î÷°àÑÀÓïºÍÒâ´óÀûÓïÓû§¡£¡£¡£¡£¡£¡£¡£ÔÚѬȾϵͳºó£¬£¬£¬£¬£¬£¬£¬Hacked»áÏÔʾһ¸öÐéαµÄWindows¸üÐÂÆÁÄ»£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.hackedÀ©Õ¹Ãû¡£¡£¡£¡£¡£¡£¡£Êܵ½Ñ¬È¾µÄÓû§¿ÉÒÔ´ÓÒÔÏÂÁ´½ÓÖÐÏÂÔØ¸Ã¹¤¾ß²¢ÒÔÖÎÀíԱȨÏÞÔËÐУ¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß½«×Ô¶¯½âÃÜËùÓÐ.hackedÀ©Õ¹ÃûµÄ¼ÓÃÜÎļþ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/ransomware/decryptor/emsisoft-has-released-a-decryptor-for-the-hacked-ransomware/3¡¢Å·ÖÞÐ̾¯×éÖ¯¼°Ç÷ÊÆ¿Æ¼¼ÁªºÏÐû²¼2019ÄêÍøÂçµçÐÅ·¸·¨±¨¸æ

ƾ֤ŷÖÞÐ̾¯×éÖ¯ºÍÇ÷ÊÆ¿Æ¼¼ÁªºÏÐû²¼µÄ2019ÄêÍøÂçµçÐÅ·¸·¨±¨¸æ£¬£¬£¬£¬£¬£¬£¬Ã¿ÄêµçÐÅڲƵı¾Ç®Ô¤¼ÆÎª290ÒÚÅ·Ôª£¨ºÏ330ÒÚÃÀÔª£©¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬µçÐÅÚ²ÆÕýÔÚ³ÉΪ¹Å°å½ðÈÚ·¸·¨µÄµÍΣº¦Ìæ»»¼Æ»®£¬£¬£¬£¬£¬£¬£¬±¾Ç®ÉϵĽµµÍºÍÈëÇÖ×°±¸¿ÉÓÃÐÔµÄÔöÌíʹµÃÕâÖÖÚ²ÆÐÐΪһֱÔöÌí¡£¡£¡£¡£¡£¡£¡£·¸·¨·Ö×ÓµÄÖ÷ҪĿµÄÊÇÓû§»òÔËÓªÉ̵ÄÕË»§£¬£¬£¬£¬£¬£¬£¬²¢´ÓÖв»·¨»ñµÃ¿î×Ó¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.europol.europa.eu/newsroom/news/hold-phone-threats-lurking-behind-missed-call-and-other-forms-of-telecom-fraud4¡¢Á÷ýÌåÍøÕ¾Kanopyй¶»á¼ûÈÕÖ¾£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ¸ú×ÙÓû§Éí·Ý
Çå¾²Ñо¿Ô±Justin Paine·¢Ã÷ÊÓÆµÁ÷ýÌåÍøÕ¾KanopyµÄElasticsearchÊý¾Ý¿âδ¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬Ê¹µÃAPIÈÕÖ¾¼°ÍøÕ¾»á¼û¼Í¼̻¶ÔÚÍøÉÏ¡£¡£¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÓÃÓÚ¸ú×ÙÓû§µÄԢĿϰ¹ß¼°²éÕÒÓû§µÄÉí·Ý£¬£¬£¬£¬£¬£¬£¬ÀýÈç»ùÓÚ¿Í»§¶ËIP¡¢ËÑË÷/ԢĿµÄÊÓÆµÐÅÏ¢¡¢µØÀíÐÅÏ¢¡¢Ê±¼ä´ÁºÍ×°±¸ÀàÐÍ£¬£¬£¬£¬£¬£¬£¬ÓпÉÄÜʶ±ð³öÓû§µÄÉí·Ý¡£¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÖÁÉÙÓÚ3ÔÂ7ÈÕÆð̻¶ÔÚÍøÉÏ£¬£¬£¬£¬£¬£¬£¬²¢ÓÚ3ÔÂ18ÈÕ»ñµÃ±£»£»£»£»¤¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/video-streaming-site-kanopy-leaks-api-and-website-access-logs-776458145¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬£¬£¬£¬£¬£¬£¬Ðû²¼30¶à¸öÐéα¾¯±¨
3ÔÂ12ÈÕÆÆÏþ2:30×óÓÒ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈøË¹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³£¬£¬£¬£¬£¬£¬£¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©Ðû²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨£¬£¬£¬£¬£¬£¬£¬ÒýÆðÁËÍâµØ×¡ÃñµÄ¿Ö»Å¡£¡£¡£¡£¡£¡£¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancasterÐû²¼µÄ£¬£¬£¬£¬£¬£¬£¬ÆäÓàµÄÔòÊÇÔÚDeSoto¡£¡£¡£¡£¡£¡£¡£Ö®ºóÕâЩϵͳһֱ´¦ÓÚÍÑ»ú״̬£¬£¬£¬£¬£¬£¬£¬Ö±ÖÁ3ÔÂ17ÈղŻָ´Õý³£Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£¾¯ÆÓÖ±ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ¾ÙÐÐÊӲ졣¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html6¡¢Î¢ÈíÐÖúNorsk Hydro»Ö¸´ITϵͳ£¬£¬£¬£¬£¬£¬£¬ÎÞÐèÖ§¸¶Êê½ð
Norsk HydroÊ×ϯ²ÆÎñ¹ÙEivind KallevikÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒѾ×îÏÈʹÓñ¸·Ý»Ö¸´ÆäITϵͳ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ²»ÍýÏëÏò¹¥»÷ÕßÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£À´×Ô΢ÈíºÍÆäËüÇå¾²ÏàÖúͬ°éµÄר¼ÒÕýÔÚ×ÊÖúNorsk Hydro½«ÆäÒªº¦ITϵͳ»Ö¸´Õý³£ÔËÓª¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜNorsk HydroÔâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾È«Çò´ó²¿·ÖÓªÒµÁìÓòµÄITϵͳ¼°ÔËÓª¶¼Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/microsoft-helping-norsk-hydro-restore-its-it-systems-without-paying-the-ransom-86a32a3cÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí