2019Ä깤¿ØÍþв±¨¸æ£»£»£»£»£»£»£»2019ÄêQ2 APT¹¥»÷Ç÷ÊÆ±¨¸æ£»£»£»£»£»£»£»ÃÀ¾ü¹ºÖõĵç×Ó²úÆ·±£´æÇ徲Σº¦

Ðû²¼Ê±¼ä 2019-08-05
1¡¢Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬ £¬£¬£¬£¬£¬£¬¾Å´ó·¸·¨ÍÅ»ïרעÓÚICS

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¹¤¿ØÇå¾²³§ÉÌDragosÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬ £¬£¬£¬£¬£¬£¬±¨¸æÖÐÆÊÎöÁËרÃÅÕë¶ÔICSÍøÂçµÄ9¸ö·¸·¨ÍŻ¡£¡£¡£¡£¡£¡£ÆäÖÐ5¸ö·¸·¨ÍÅ»ïÖ÷ÒªÕë¶ÔʯÓͺÍ×ÔÈ»Æø¹«Ë¾£¬ £¬£¬£¬£¬£¬£¬°üÀ¨HEXANE¡¢MAGNALLIUM¡¢CHRYSENE¡¢XENOTIMEºÍDYMALLOY£¬ £¬£¬£¬£¬£¬£¬ÆäÓà4¸ö·¸·¨ÍÅ»ïÖ÷ÒªÕë¶ÔÄÜÔ´²¿·Ö£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ELECTRUM¡¢RASPITE¡¢ALLANITEºÍCOVELLITE¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³öÓÉÓÚ¿ÉÔì³É¸ß¶ÈÕðµ´µÄÕþÖκ;­¼ÃÓ°Ï죬 £¬£¬£¬£¬£¬£¬Ê¯ÓͺÍ×ÔÈ»Æø²¿·ÖÈÔÈ»ÃæÁÙÆÆËðÐÔÍøÂç¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf


2¡¢¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ç÷ÊÆ±¨¸æ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¿¨°Í˹»ùÑо¿ÍŶÓGReATÐû²¼2019ÄêµÚ¶þ¼¾¶ÈµÄAPTÍþв±¨¸æ¡£¡£¡£¡£¡£¡£¡£4Ô·ÝÑо¿ÍŶÓÅû¶ÁËÒ»¸öǰËùδ֪µÄAPT¿ò¼ÜTajMahal£¬ £¬£¬£¬£¬£¬£¬TajMahalÔÚÒÑÍùÎåÄêÖÐÒ»Ö±»îÔ¾£¬ £¬£¬£¬£¬£¬£¬Æä¼ÓÃܵÄÐéÄâÎļþϵͳÖд洢Á˶à´ï80¸ö¶ñÒâÄ £¿£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£¡£¶«ÄÏÑÇÏòÀ´ÊÇAPT¹¥»÷×îΪ»îÔ¾µÄµØÇø£¬ £¬£¬£¬£¬£¬£¬µ«±¾¼¾¶ÈµÄ¹¥»÷»î¶¯Ö÷ÒªÓ뺫¹úÓйأ¬ £¬£¬£¬£¬£¬£¬¸ÃµØÇøµÄÆäËü¹ú¼Ò½ÏΪÇå¾²¡£¡£¡£¡£¡£¡£¡£ÔÚÈ«ÇòËùÓеĵØÇø£¬ £¬£¬£¬£¬£¬£¬µØÔµÕþÖÎÈÔÈ»ÊÇAPT¹¥»÷µÄÖ÷ÒªÍÆ¶¯Á¦¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/apt-trends-report-q2-2019/91897/


3¡¢±±ÃÀPoshmarkÔâºÚ¿ÍÈëÇÖ£¬ £¬£¬£¬£¬£¬£¬¿Í»§ÐÅϢй¶

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

PoshmarkÊDZ±ÃÀµØÇøµÄÒ»¸ö´ò°ç¡¢Ð¬×ÓºÍÅäÊεÄÉúÒâÊг¡£¡£¡£¡£¡£¡£¡£¬ £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÓÚ8ÔÂ1ÈÕÅû¶ÁËÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÆäЧÀÍÆ÷ÔâµÚÈý·½Î´ÊÚȨ»á¼û£¬ £¬£¬£¬£¬£¬£¬¿Í»§µÄÓû§Ãû¡¢¼ÓÑιþÏ£ÃÜÂë¡¢ÐÕÃû¡¢ÐÔ±ðºÍÆÜÉí¶¼»áµÈÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹ÇÔÈ¡ÁËÓû§µÄµç×ÓÓʼþ¡¢É罻ýÌå×ÊÁÏÒÔ¼°´ò°ç³ß´çÆ«ºÃµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£PoshmarkûÓÐ͸¶ÊÂÎñ±¬·¢µÄʱ¼äÒÔ¼°ÊÜÓ°ÏìµÄÈËÊý£¬ £¬£¬£¬£¬£¬£¬²¢ÌåÏÖÖ»ÓÐÃÀ¹úµÄÓû§ÊÜÓ°Ï죬 £¬£¬£¬£¬£¬£¬¼ÓÄôóÓû§²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/poshmark-clothing-marketplace-says-hacker-stole-customer-details/


4¡¢Ð¶ñÒâÈí¼þSystemBC£¬ £¬£¬£¬£¬£¬£¬Í¨¹ýFalloutºÍRIG EK¾ÙÐзַ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ProofpointÑо¿Ö°Ô±·¢Ã÷Ò»¸öеĶñÒâÊðÀíÈí¼þSystemBC£¬ £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÖ÷Ҫͨ¹ýFalloutºÍRIG EK¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£¡£SystemBCͨ¹ýSOCKS5ÊðÀíÀ´Òþ²ØÆä¶ñÒâÁ÷Á¿£¬ £¬£¬£¬£¬£¬£¬ÓëC2ЧÀÍÆ÷ͨ¹ýHTTPs¾ÙÐÐÅþÁ¬¡£¡£¡£¡£¡£¡£¡£ÓÉÓڸöñÒâÈí¼þ±»ÓÃÓÚ¶à¸ö²î±ðµÄ¹¥»÷»î¶¯£¬ £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪ¸Ã¶ñÒâÈí¼þºÜ¿ÉÄÜÔÚ°µÍøÊг¡ÉϾÙÐгöÊÛ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ±¨¸æÖÐÅû¶ÁËÏêϸIoCºÍ¸Ã¶ñÒâÈí¼þµÄ¸ü¶àϸ½Ú¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/89336/malware/systembc-proxy-malware.html


5¡¢PewDiePieºÚ¿Í¹éÀ´£¬ £¬£¬£¬£¬£¬£¬Ê¹ÓÃSMSÍø¹ØÎó²î·¢ËÍ´ó×ÚÀ¬»ø¶ÌÐÅ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔøÐ®ÖÆÉÏÍǫ̀´òÓ¡»úÒÔÍÆ¹ãYouTubeƵµÀPewDiePieµÄºÚ¿ÍÔٴιéÀ´£¬ £¬£¬£¬£¬£¬£¬ËûÃÇÊÔͼͨ¹ýSMSÍø¹ØÏµÍ³ÏòÃÀ¹úµÄÿһ²¿ÊÖ»ú·¢ËÍÀ¬»ø¶ÌÐÅ¡£¡£¡£¡£¡£¡£¡£SMSÍø¹ØÍ¨³£ÓÃÓÚ¸¶·Ñ·¢ËͶÌÐÅ£¬ £¬£¬£¬£¬£¬£¬²¢ÇÒÌṩһϵÁÐAPI£¬ £¬£¬£¬£¬£¬£¬Ö§³Ö¾ç±¾»¯½»»¥¡£¡£¡£¡£¡£¡£¡£ÕâÐ©Íø¹ØµÄÿÌõÐÂÎżÛÇ®½ÏµÍ£¬ £¬£¬£¬£¬£¬£¬Òâζ×Å´ó¹æÄ£·¢ËÍÀ¬»ø¶ÌÐŵı¾Ç®Ò²½ÏµÍ¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷ÀàËÆÓÚDDoS¹¥»÷£¬ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÉù³ÆÒѾ­Ê¹Óòî±ðµÄÊÖ»úºÍÔËÓªÉ̾ÙÐÐÁ˲âÊÔ£¬ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÕâÖÖÎÞÏÞÖÆ·¢ËÍ´ó×ÚÎı¾ÐÂÎŵķ½·¨Ê¹µÃÄ¿µÄAndroidºÍiPhoneËÀ»ú¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.wired.co.uk/article/sms-hack-text-twitter-j3ws3r


6¡¢2018ÄêÃÀ¾ü¹ºÖÃÁ˼ÛÖµ3280ÍòÃÀÔªµç×Ó²úÆ·±£´æÇ徲Σº¦

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤ÃÀ¹ú¹ú·À²¿¼à²ì³¤£¨DODIG£©±¨¸æ£¬ £¬£¬£¬£¬£¬£¬2018²ÆÄêÃÀ¹ú½¾üºÍ¿Õ¾üÔ±¹¤¹ºÖÃÁ˼ÛÖµÁè¼Ý3280ÍòÃÀÔªµÄ±£´æÒÑÖªÇå¾²Îó²îµÄµç×Ó²úÆ·¡£¡£¡£¡£¡£¡£¡£ÕâЩ²úÆ·°üÀ¨Lexmark´òÓ¡»ú¡¢GoProÏà»úºÍåÚÏëÅÌËã»úµÈ¡£¡£¡£¡£¡£¡£¡£ÆäÖÐÁè¼Ý8000̨Lexmark´òÓ¡»ú±»ÓÃÓÚ½¾üºÍ¿Õ¾üÍøÂ磬 £¬£¬£¬£¬£¬£¬×ܼÛÖµÁè¼Ý3000ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£DODIGÖ¸³öLexmark´òÓ¡»úÔøÊܵ½20¶à¸öÎó²îµÄÓ°Ï죬 £¬£¬£¬£¬£¬£¬°üÀ¨Ã÷ÎÄ´æ´¢ºÍ´«Ê䯾֤ÒÔ¼°ÔÊÐí¶ñÒâ´úÂëÖ´ÐеÈ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/us-military-purchased-32-8m-worth-of-electronics-with-known-security-risks/