ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öÕþ¸®»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷£»£»£»£»£»£»¹È¸èÏ£Íû½«HTTPSÖ¤ÊéµÄÉúÃüÖÜÆÚËõ¶Ìµ½Ò»Äê
Ðû²¼Ê±¼ä 2019-08-20
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/coordinated-ransomware-attack-hits-23-texas-government-agencies/147457/
2¡¢¹È¸èÏ£Íû½«HTTPSÖ¤ÊéµÄÉúÃüÖÜÆÚËõ¶Ìµ½Ò»Äê
¹È¸èÏ£Íû½«SSLÖ¤Ê飨ÓÃÓÚ±£»£»£»£»£»£»¤HTTPS¼ÓÃÜÁ÷Á¿£©µÄÉúÃüÖÜÆÚ´ÓÏÖÔÚµÄÁ½ÄêËõ¶Ìµ½Ò»Äê¶à¡£¡£¡£¡£¡£¡£¡£¸ÃÌá°¸Óɹȸè´ú±íRyan Sleevi ÓÚ6ÔÂÔÚÏ£À°ÈûÈøÂåÄá»ù¾ÙÐеÄCA/BÂÛ̳F2F¾Û»áÉÏÌá³ö¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Per SleeviµÄÌáÒ飬£¬£¬£¬£¬£¬£¬´Ó2020Äê3ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬ËùÓÐнÒÏþµÄSSLÖ¤ÊéµÄÉúÃüÖÜÆÚ½«±äΪ397Ì죨ԼĪһÄêÁãÒ»¸öÔ£©£¬£¬£¬£¬£¬£¬£¬¶ø²»ÊÇÄ¿½ñµÄ825Ì죨ԼĪÁ½ÄêÁãÈý¸öÔ£©¡£¡£¡£¡£¡£¡£¡£¸Ã¾Û»áÉÏûÓжԸÃÌá°¸¾ÙÐÐͶƱ£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇ´ó´ó¶¼ä¯ÀÀÆ÷¹©Ó¦É̶¼ÌåÏÖÖ§³ÖеÄSSLÖ¤ÊéÉúÃüÖÜÆÚ¡£¡£¡£¡£¡£¡£¡£ÔÚÒÑÍùµÄÊ®ÎåÄêÖУ¬£¬£¬£¬£¬£¬£¬ä¯ÀÀÆ÷ÖÆÔìÉÌÒѾһֱÏû¼õSSLÖ¤ÊéµÄÉúÃüÖÜÆÚ£¬£¬£¬£¬£¬£¬£¬´Ó8ÄêïÔ̵½5Ä꣬£¬£¬£¬£¬£¬£¬È»ºóïÔ̵½3Ä꣬£¬£¬£¬£¬£¬£¬È»ºóïÔ̵½Á½Ä꣬£¬£¬£¬£¬£¬£¬×îºóÒ»´Î¸ü¸Ä±¬·¢ÔÚ2018Äê3Ô£¬£¬£¬£¬£¬£¬£¬Æäʱä¯ÀÀÆ÷ÖÆÔìÉÌÊÔͼ½«SSLÖ¤ÊéÊÙÃü´Ó3ÄêïÔ̵½1Ä꣬£¬£¬£¬£¬£¬£¬µ«ÔÚÖ¤Êé½ÒÏþ»ú¹¹¿¹ÒéºóÍ×ÐÖÁÁ½Äê¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/
3¡¢ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÒªÇó¹ú»áÖØÐÂÓÀÊÀÊÚÈ¨ÌØ¹¤ÍýÏë
ÃÀ¹ú¹ú¼ÒÇ鱨¾Ö¾Ö³¤ÒªÇó¹ú»á¶ÔÒ»¸öÌØ¹¤ÏîÄ¿ÖØÐ²¢ÇÒÓÀÊÀÊÚȨ£¬£¬£¬£¬£¬£¬£¬¸ÃÏîÄ¿ÊÇÖ¸¹ú¼ÒÇå¾²¾Ö£¨NSA£©²»·¨ÍøÂçÊý°ÙÍòÃÀ¹ú¹«ÃñµÄͨ»°¼Í¼£¬£¬£¬£¬£¬£¬£¬ÕâÒ»ÏîĿһÔÙ±»ÒÔΪÊÇÎ¥ÏÜÐÐΪ£¬£¬£¬£¬£¬£¬£¬NSAÆÈÓÚѹÁ¦²»µÃ²»¹Ø±Õ¸ÃÏîÄ¿¡£¡£¡£¡£¡£¡£¡£NSAÁ½´Î±»ÆÈÈÏ¿ÉËüÍøÂçÁËÊý°ÙÍò²»Ó¦¸ÃÓµÓеĵ绰¼Í¼£¬£¬£¬£¬£¬£¬£¬Ò»´ÎÊÇÔÚ2018Äê6Ô£¬£¬£¬£¬£¬£¬£¬NSAɾ³ýÁËǰһÄêÍøÂçµÄ5.34ÒÚ¸öͨ»°¼Í¼£¬£¬£¬£¬£¬£¬£¬µ«ÔÚ2018Äê10ÔÂͬÑùµÄÊÂÇéÔٴα¬·¢£¬£¬£¬£¬£¬£¬£¬Ö±µ½2019Äê6Ô²ű»ÆØ¹â¡£¡£¡£¡£¡£¡£¡£Ç鱨¾Ö¾Ö³¤Dan CoatsÔÚÆäÔÚÈεÄ×îºóÒ»ÌìÏòÁ½¸öÒªº¦²ÎÒéԺίԱ»áÈÏÕæÈË·¢³öÁËÕâ·â½¨ÒéÐÅ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.theregister.co.uk/2019/08/16/spying_reauthorization_coats/
4¡¢Ñо¿Ö°Ô±½öʹÓÃÖÇÄÜÊÖ»ú¿É¼ì²â³ö¼üÈëµÄÄÚÈÝ
ÄÏ·½ÎÀÀí¹«»á´óѧ£¨SMU£©µÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ½öʹÓÃÖÇÄÜÊÖ»ú×èµ²´ò×ÖµÄÉùÒô£¬£¬£¬£¬£¬£¬£¬²¢ÆÆÒë¼üÈëµÄÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Äܹ»½âÂëʹÓÃͨË×¼üÅ̺ÍÖÇÄÜÊÖ»úÊäÈëµÄ´ó²¿·ÖÄÚÈÝ-×ÝÈ»ÔÚ³äÂúÁËÆäËûÈË´ò×ÖºÍÅÊ̸ÉùÒôµÄàÐÔÓ¾Û»áÊÒÖÐÒ²ÊÇÔÆÔÆ¡£¡£¡£¡£¡£¡£¡£Eric C. LarsonÌåÏÖ¡°ÎÒÃÇÄܹ»ÒÔ41£¥µÄµ¥´Ê׼ȷÂÊÀ´»ñÈ¡ÈËÃÇËùÊäÈëµÄÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£¡±ÒªÊµÑéÕâÖÖ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐèÒªÖªµÀ×À×ÓµÄÖÊÁÏÀàÐÍ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ²î±ðµÄ×À×ÓÔÚ´ò×Öʱ»á±¬·¢²î±ðµÄÉù²¨¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹ÐèÒªÖªµÀ×ÀÃæÉÏÓжಿÊÖ»úÒÔ¼°ÔõÑù´ÓÖвÉÑù¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.helpnetsecurity.com/2019/08/19/smartphone-intercept-typing/
5¡¢Ñо¿ÍŶÓÐû²¼½©Ê¬ÍøÂçMyKings±äÖֵįÊÎö±¨¸æ
2019Äê5Ô·ÝÇ÷ÊÆ¿Æ¼¼ÔÚÑÇÌ«µØÇøÒ»¼Òµç×Ó¹«Ë¾·¢Ã÷Á˽©Ê¬ÍøÂçMyKingsµÄ±äÖÖ¡£¡£¡£¡£¡£¡£¡£¸Ã±äÖÖ¸ü¸ÄÁË»úеµÄϵͳע²á±í×÷Ϊ³¤ÆÚÐÔ»úÖÆ£¬£¬£¬£¬£¬£¬£¬ÕâЩע²á±íÏîÈÏÕæ¶Ô¶ñÒâURLµÄC£¦C»Øµ÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÕâЩÌõÄ¿ÊÇÔÚ2017ÄêÌí¼ÓµÄ£¬£¬£¬£¬£¬£¬£¬Åú×¢¶ñÒâÈí¼þ±äÖÖÔÚ·¢Ã÷֮ǰÒѾÔÚ¹«Ë¾µÄϵͳÖÐÒþ²ØÁËԼĪÁ½Äê¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ç÷ÊÆ¿Æ¼¼µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬×èÖ¹2018ÄêÍ·MyKingsÒѾѬȾÁËÁè¼Ý50Íǫ̀װ±¸£¬£¬£¬£¬£¬£¬£¬²¢ÍÚ¾òÁËÔ¼230ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-a-mykings-variant-with-bootloader-persistence-via-managed-detection-and-response/
6¡¢¹¥»÷ÕßʹÓÃÔ¶¿ØÄ¾ÂíAdwind¹¥»÷¹«ÓÃÊÂÒµ²¿·Ö
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/adwind-remote-access-trojan-hits-utilities-sector/


¾©¹«Íø°²±¸11010802024551ºÅ