ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öÕþ¸®»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷£»£» £»£»£»£»¹È¸èÏ£Íû½«HTTPSÖ¤ÊéµÄÉúÃüÖÜÆÚËõ¶Ìµ½Ò»Äê

Ðû²¼Ê±¼ä 2019-08-20
1¡¢ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öÕþ¸®»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÉÏÖÜÎåµÂ¿ËÈøË¹Öݶà´ï23¼ÒʵÌå»ú¹¹-ÆäÖдó´ó¶¼Êǵط½Õþ¸®-Ôâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µÂ¿ËÈøË¹ÖݹÙÔ±³ÆÕâÊÇÒ»¸ö¼òµ¥¹¥»÷ÕßÌᳫµÄÕë¶ÔÐÔ¹¥»÷µÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÖÜÁùÍí£¬£¬£¬£¬£¬£¬£¬µÂ¿ËÈøË¹ÖÝÐÅÏ¢×ÊÔ´²¿£¨DIR£©ÌåÏÖÓ¦¼±ÏìÓ¦ÍŶÓÕýÆð¾¢ÓëËùÓÐ23¸öʵÌåÏàÖú£¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÏµÍ³ÖØÐÂÉÏÏߣ¬£¬£¬£¬£¬£¬£¬²¢Çҵ¿ËÈøË¹ÖݵÄϵͳºÍÍøÂç²»»áÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÏêϸ¹¥»÷ϸ½ÚÈÔȻȱ·¦£¬£¬£¬£¬£¬£¬£¬DIRҲûÓÐ̸ÂÛÄÄЩϵͳ·ºÆð¹ÊÕÏ¡¢ÏµÍ³ÔõÑù±»Ñ¬È¾ÒÔ¼°ÏêϸµÄÊê½ðÊý¶î¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/coordinated-ransomware-attack-hits-23-texas-government-agencies/147457/


2¡¢¹È¸èÏ£Íû½«HTTPSÖ¤ÊéµÄÉúÃüÖÜÆÚËõ¶Ìµ½Ò»Äê


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¹È¸èÏ£Íû½«SSLÖ¤Ê飨ÓÃÓÚ±£»£» £»£»£»£»¤HTTPS¼ÓÃÜÁ÷Á¿£©µÄÉúÃüÖÜÆÚ´ÓÏÖÔÚµÄÁ½ÄêËõ¶Ìµ½Ò»Äê¶à¡£¡£¡£¡£¡£¡£¡£¸ÃÌá°¸Óɹȸè´ú±íRyan Sleevi ÓÚ6ÔÂÔÚÏ£À°ÈûÈøÂåÄá»ù¾ÙÐеÄCA/BÂÛ̳F2F¾Û»áÉÏÌá³ö¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Per SleeviµÄÌáÒ飬£¬£¬£¬£¬£¬£¬´Ó2020Äê3ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬ËùÓÐнÒÏþµÄSSLÖ¤ÊéµÄÉúÃüÖÜÆÚ½«±äΪ397Ì죨ԼĪһÄêÁãÒ»¸öÔ£©£¬£¬£¬£¬£¬£¬£¬¶ø²»ÊÇÄ¿½ñµÄ825Ì죨ԼĪÁ½ÄêÁãÈý¸öÔ£©¡£¡£¡£¡£¡£¡£¡£¸Ã¾Û»áÉÏûÓжԸÃÌá°¸¾ÙÐÐͶƱ£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇ´ó´ó¶¼ä¯ÀÀÆ÷¹©Ó¦É̶¼ÌåÏÖÖ§³ÖеÄSSLÖ¤ÊéÉúÃüÖÜÆÚ¡£¡£¡£¡£¡£¡£¡£ÔÚÒÑÍùµÄÊ®ÎåÄêÖУ¬£¬£¬£¬£¬£¬£¬ä¯ÀÀÆ÷ÖÆÔìÉÌÒѾ­Ò»Ö±Ïû¼õSSLÖ¤ÊéµÄÉúÃüÖÜÆÚ£¬£¬£¬£¬£¬£¬£¬´Ó8ÄêïÔÌ­µ½5Ä꣬£¬£¬£¬£¬£¬£¬È»ºóïÔÌ­µ½3Ä꣬£¬£¬£¬£¬£¬£¬È»ºóïÔÌ­µ½Á½Ä꣬£¬£¬£¬£¬£¬£¬×îºóÒ»´Î¸ü¸Ä±¬·¢ÔÚ2018Äê3Ô£¬£¬£¬£¬£¬£¬£¬Æäʱä¯ÀÀÆ÷ÖÆÔìÉÌÊÔͼ½«SSLÖ¤ÊéÊÙÃü´Ó3ÄêïÔÌ­µ½1Ä꣬£¬£¬£¬£¬£¬£¬µ«ÔÚÖ¤Êé½ÒÏþ»ú¹¹¿¹ÒéºóÍ×ЭÖÁÁ½Äê¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/


3¡¢ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÒªÇó¹ú»áÖØÐÂÓÀÊÀÊÚÈ¨ÌØ¹¤ÍýÏë

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ÃÀ¹ú¹ú¼ÒÇ鱨¾Ö¾Ö³¤ÒªÇó¹ú»á¶ÔÒ»¸öÌØ¹¤ÏîÄ¿ÖØÐ²¢ÇÒÓÀÊÀÊÚȨ£¬£¬£¬£¬£¬£¬£¬¸ÃÏîÄ¿ÊÇÖ¸¹ú¼ÒÇå¾²¾Ö£¨NSA£©²»·¨ÍøÂçÊý°ÙÍòÃÀ¹ú¹«ÃñµÄͨ»°¼Í¼£¬£¬£¬£¬£¬£¬£¬ÕâÒ»ÏîĿһÔÙ±»ÒÔΪÊÇÎ¥ÏÜÐÐΪ£¬£¬£¬£¬£¬£¬£¬NSAÆÈÓÚѹÁ¦²»µÃ²»¹Ø±Õ¸ÃÏîÄ¿¡£¡£¡£¡£¡£¡£¡£NSAÁ½´Î±»ÆÈÈÏ¿ÉËüÍøÂçÁËÊý°ÙÍò²»Ó¦¸ÃÓµÓеĵ绰¼Í¼£¬£¬£¬£¬£¬£¬£¬Ò»´ÎÊÇÔÚ2018Äê6Ô£¬£¬£¬£¬£¬£¬£¬NSAɾ³ýÁËǰһÄêÍøÂçµÄ5.34ÒÚ¸öͨ»°¼Í¼£¬£¬£¬£¬£¬£¬£¬µ«ÔÚ2018Äê10ÔÂͬÑùµÄÊÂÇéÔٴα¬·¢£¬£¬£¬£¬£¬£¬£¬Ö±µ½2019Äê6Ô²ű»ÆØ¹â¡£¡£¡£¡£¡£¡£¡£Ç鱨¾Ö¾Ö³¤Dan CoatsÔÚÆäÔÚÈεÄ×îºóÒ»ÌìÏòÁ½¸öÒªº¦²ÎÒéԺίԱ»áÈÏÕæÈË·¢³öÁËÕâ·â½¨ÒéÐÅ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.theregister.co.uk/2019/08/16/spying_reauthorization_coats/


4¡¢Ñо¿Ö°Ô±½öʹÓÃÖÇÄÜÊÖ»ú¿É¼ì²â³ö¼üÈëµÄÄÚÈÝ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÄÏ·½ÎÀÀí¹«»á´óѧ£¨SMU£©µÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ½öʹÓÃÖÇÄÜÊÖ»ú×èµ²´ò×ÖµÄÉùÒô£¬£¬£¬£¬£¬£¬£¬²¢ÆÆÒë¼üÈëµÄÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Äܹ»½âÂëʹÓÃͨË×¼üÅ̺ÍÖÇÄÜÊÖ»úÊäÈëµÄ´ó²¿·ÖÄÚÈÝ-×ÝÈ»ÔÚ³äÂúÁËÆäËûÈË´ò×ÖºÍÅÊ̸ÉùÒôµÄàÐÔÓ¾Û»áÊÒÖÐÒ²ÊÇÔÆÔÆ¡£¡£¡£¡£¡£¡£¡£Eric C. LarsonÌåÏÖ¡°ÎÒÃÇÄܹ»ÒÔ41£¥µÄµ¥´Ê׼ȷÂÊÀ´»ñÈ¡ÈËÃÇËùÊäÈëµÄÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£¡±ÒªÊµÑéÕâÖÖ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐèÒªÖªµÀ×À×ÓµÄÖÊÁÏÀàÐÍ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ²î±ðµÄ×À×ÓÔÚ´ò×Öʱ»á±¬·¢²î±ðµÄÉù²¨¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹ÐèÒªÖªµÀ×ÀÃæÉÏÓжಿÊÖ»úÒÔ¼°ÔõÑù´ÓÖвÉÑù¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.helpnetsecurity.com/2019/08/19/smartphone-intercept-typing/

5¡¢Ñо¿ÍŶÓÐû²¼½©Ê¬ÍøÂçMyKings±äÖֵįÊÎö±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


2019Äê5Ô·ÝÇ÷ÊÆ¿Æ¼¼ÔÚÑÇÌ«µØÇøÒ»¼Òµç×Ó¹«Ë¾·¢Ã÷Á˽©Ê¬ÍøÂçMyKingsµÄ±äÖÖ¡£¡£¡£¡£¡£¡£¡£¸Ã±äÖÖ¸ü¸ÄÁË»úеµÄϵͳע²á±í×÷Ϊ³¤ÆÚÐÔ»úÖÆ£¬£¬£¬£¬£¬£¬£¬ÕâЩע²á±íÏîÈÏÕæ¶Ô¶ñÒâURLµÄC£¦C»Øµ÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÕâЩÌõÄ¿ÊÇÔÚ2017ÄêÌí¼ÓµÄ£¬£¬£¬£¬£¬£¬£¬Åú×¢¶ñÒâÈí¼þ±äÖÖÔÚ·¢Ã÷֮ǰÒѾ­ÔÚ¹«Ë¾µÄϵͳÖÐÒþ²ØÁËԼĪÁ½Äê¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ç÷ÊÆ¿Æ¼¼µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬×èÖ¹2018ÄêÍ·MyKingsÒѾ­Ñ¬È¾ÁËÁè¼Ý50Íǫ̀װ±¸£¬£¬£¬£¬£¬£¬£¬²¢ÍÚ¾òÁËÔ¼230ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-a-mykings-variant-with-bootloader-persistence-via-managed-detection-and-response/

6¡¢¹¥»÷ÕßʹÓÃÔ¶¿ØÄ¾ÂíAdwind¹¥»÷¹«ÓÃÊÂÒµ²¿·Ö

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¹¥»÷ÕßÔÚÀ¬»øÓʼþ»î¶¯ÖÐͨ¹ýURLÖØ¶¨Ïò·Ö·¢¶ñÒâpayload£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÔ¶¿ØÄ¾ÂíAdwind¹¥»÷¹«ÓÃÊÂÒµ²¿·Ö¡£¡£¡£¡£¡£¡£¡£AdwindÓÉÆä¿ª·¢Ö°Ô±ÒÔ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©µÄģʽ·Ö·¢¸ø¹¥»÷Õߣ¬£¬£¬£¬£¬£¬£¬²¢ÇÒÄܹ»Ìӱܴó´ó¶¼Ö÷Ҫɱ¶¾Èí¼þµÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯Ö÷ÒªÕë¶Ô¼ÒÍ¥ºÍÆóÒµÓû§£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÍÈÎÃü»§µÄ»÷¼ü¼Í¼£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡Chrome¡¢IEºÍEdgeƾ֤ÒÔ¼°VPNÖ¤ÊéµÈÃô¸ÐÐÅÏ¢ºÍÖ´ÐÐÖÖÖÖ¶ñÒâʹÃü¡£¡£¡£¡£¡£¡£¡£Adwind RAT»¹¿ÉÒÔÂ¼ÖÆÊÓÆµºÍÉùÒô£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÍøÂçÉãÏñÍ·ÅÄÉãÕÕÆ¬ÒÔ¼°ÇÔÈ¡¼ÓÃÜÇ®±ÒµÈ¡£¡£¡£¡£¡£¡£¡£×Ô2013ÄêÒÔÀ´AdwindÒ»Ö±´¦ÓÚ»îԾ״̬£¬£¬£¬£¬£¬£¬£¬ÒÑÓÐÊýÊ®ÍòСÎÒ˽¼ÒºÍ»ú¹¹Êܵ½¹¥»÷¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/adwind-remote-access-trojan-hits-utilities-sector/