AvastÔâºÚ¿ÍÈëÇÖ £¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂë £»Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0

Ðû²¼Ê±¼ä 2019-10-22
1¡¢AvastÔâºÚ¿ÍÈëÇÖ £¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂë

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!

AvastÅû¶ÆäÄÚ²¿ÍøÂçÔâºÚ¿ÍÈëÇÖ £¬¹¥»÷ÕßµÄÄ¿µÄËÆºõÔÚÓÚÏòCCleanerÖÐ×¢Èë¶ñÒâ´úÂ루ÀàËÆÓÚ2017ÄêµÄ¹¥»÷£© ¡£Avastר¼ÒÓÚ9ÔÂ23ÈÕ·¢Ã÷ÁËÕâÒ»¹¥»÷ÊÂÎñ £¬ºÚ¿Íͨ¹ýÈëÇÖÒ»¸öÔÝʱVPNÕË»§»á¼ûÁ˹«Ë¾µÄÄÚ²¿ÍøÂç £¬¸ÃÕË»§Ã»ÓÐÓò¹ÜÀíԱȨÏÞ £¬µ«ºÚ¿ÍÀֳɾÙÐÐÁËÌáȨ ¡£¶Ô¹¥»÷ÕßʹÓõÄÍⲿIPµÄÆÊÎöÏÔʾ £¬¹¥»÷ÕßÔçÔÚ5ÔÂ14ÈÕ¾ÍÒ»Ö±ÊÔͼͨ¹ýVPNÀ´»á¼ûÄÚÍø ¡£Avast¶Ô¹¥»÷Ô˶¯¾ÙÐÐÁË¼à¿Ø £¬Ö±µ½10ÔÂ15ÈղŹرոÃÔÝʱVPNÕË»§ ¡£ÏÖÔÚÉÐÎÞ·¨È·Èϸù¥»÷ÊÇ·ñÓë2017Ä걬·¢µÄ¹¥»÷±£´æ¹ØÁª ¡£AvastÔÚ¶ÔCCleaner¾ÙÐÐÉó²éÖ®ºóÖØÐÂÐû²¼Á˸üР¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/

2¡¢AutoclerkÊý¾Ý¿âÒâÍâÔÚÍøÉÏ̻¶179GBÓοÍÊý¾Ý

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


ÂùÝÔ¤¶©¹ÜÀíϵͳAutoclerkµÄÒ»¸öElasticsearchÊý¾Ý¿âÔÚÍøÉÏ̻¶ÁË179GBÓοÍÊý¾Ý £¬ÆäÖаüÀ¨²¿·ÖÃÀ¹úÕþ¸®ºÍ¾üÊÂÖ°Ô±µÄÃô¸ÐÐÅÏ¢ ¡£vpnMentorµÄÑо¿Ö°Ô±Noam RotemºÍRan Locar·¢Ã÷ÁËÕâÒ»ÊÂÎñ £¬Æ¾Ö¤ËûÃǵı¨¸æ £¬Ì»Â¶µÄÊý¾Ý¿âÓÉAmazon Web ServersÍйÜ £¬Æä´æ´¢µÄÐÅÏ¢°üÀ¨Î´¼ÓÃܵĵǼƾ֤¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢ÂÃÐÐÈÕÆÚºÍÓöÈÒÔ¼°²¿·ÖÐÅÓÿ¨ÐÅÏ¢µÈ £¬¹ØÓÚijЩÓοÍ £¬»¹°üÀ¨ËûÃǵÄÈëסʱ¼äºÍ·¿¼äºÅ ¡£Ñо¿Ö°Ô±ÌåÏÖÊý¾Ý¿âÖÐ̻¶µÄƽ̨֮һÊÇÃÀ¹úÕþ¸®¡¢¾ü·½ºÍÁìÍÁÇå¾²²¿£¨DHS£©µÄ³Ð°üÉÌ £¬¸Ã³Ð°üÉÌÈÏÕæ¹ÜÀíÃÀ¹úÕþ¸®ºÍ¾üÊÂÖ°Ô±µÄÂÃÐа²ÅÅ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/government-military-personnel-data-leaked/149386/

3¡¢¶íÂÞ˹Turla APTʹÓÃÒÁÀÊ»ù´¡ÉèÊ©Ãé×¼35¸ö¹ú¼Ò

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!

¶íÂÞ˹APT×éÖ¯Turla±»·¢Ã÷ÈëÇÖÒÁÀÊAPT34µÄ»ù´¡ÉèÊ© £¬Ê¹ÓÃÆäNeuronºÍNautilus¹¤¾ßÃé×¼Öж«µØÇøµÄÄ¿µÄ ¡£Æ¾Ö¤ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©ºÍÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©µÄÊý¾Ý £¬ÖÁÉÙÓÐ35¸ö¹ú¼ÒÒѳÉΪ¸Ã×éÖ¯µÄ¹¥»÷Ä¿µÄ £¬ÆäÖдó´ó¶¼Î»ÓÚÖж« £¬ÔÚÒÑÍù18¸öÔÂÖÐÖÁÉÙÓÐ20¸ö¹ú¼ÒÊܵ½¹¥»÷ ¡£ÔÚ2017ÄêºÍ2018Äê £¬Turla±»·¢Ã÷ÔÚʹÓÃ×Ô¼ºµÄ¹¤¾ßSnake rootkitµÄͬʱ»¹Ê¹ÓÃÁËNeuronºÍNautilus ¡£¸Ã×éÖ¯×Ô2008ÄêÒÔÀ´Ò»Ö±»îÔ¾ £¬²¢ÇÒÖ÷ÒªÕë¶Ô¾üÊ»ú¹¹¡¢Õþ¸®²¿·Ö¡¢¿ÆÑ§×éÖ¯ºÍ´óѧµÈÄ¿µÄ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russian-apt-turla-targets-35-countries-on-the-back-of-iranian-infrastructure/

4¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓÃAlexaºÍGoogle HomeÇÔÌýÓû§µÄÐÂÒªÁì

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


Ñо¿Ö°Ô±·¢Ã÷¹¥»÷Õß¿ÉÒÔʹÓÃAlexaºÍGoogle HomeÖÇÄÜÒôÏäÀ´¼àÊÓÓû§µÄÐÂÒªÁì £¬¹¥»÷Õß²»µ«¿ÉÒÔÇÔÌýÓû§ £¬ÉõÖÁ»¹¿ÉÒÔͨ¹ýÓïÒô´¹ÂÚÇÔÈ¡Óû§µÄÃÜÂë ¡£Æ¾Ö¤SRLabsµÄ±¨¸æ £¬¸ÃÎÊÌâ±£´æÓÚ¿ª·¢Ö°Ô±Îª×°±¸½¨ÉèµÄÀ©Õ¹¹¦Ð§APPÖÐ £¬°üÀ¨Skills for AlexaºÍActions on Google Home ¡£Í¨¹ýÕâЩAPPÌṩӦµÚÈý·½µÄ±ê×¼¿ª·¢½Ó¿Ú £¬SRLabsÑо¿Ö°Ô±·¢Ã÷ÁËÁ½ÖÖ¿ÉÒÔÆÆËðÓû§Òþ˽µÄÒªÁì £¬Ò»ÖÖÊÇÇëÇó²¢ÍøÂçСÎÒ˽¼ÒÊý¾Ý£¨°üÀ¨ÃÜÂ룩 £¬ÁíÒ»ÖÖÊÇÔÚÓû§ÒÔΪÖÇÄÜÒôÏäûÓÐÊÕÌýÖ®ºó¾ÙÐÐÇÔÌý ¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/new-way-found-to-use-alexa-google-to-voice-phish-and-eavesdrop-on-users/149352/

5¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


ESETÑо¿ÍŶӷ¢Ã÷Õë¶ÔMSSQL v11ºÍv12µÄкóÃÅskip-2.0 ¡£ESETÌåÏÖskip-2.0ÐÞ¸ÄÁËÓÃÓÚ´¦Öóͷ£Éí·ÝÑéÖ¤µÄMSSQLº¯Êý £¬ÆäÏë·¨Êǽ¨ÉèÒ»¸ö¡°Ä§ÊõÃÜÂ롱 £¬ÈôÊÇÔÚÈκÎÉí·ÝÑéÖ¤»á»°ÖÐÊäÈ롰ħÊõÃÜÂ롱 £¬Ôò½«×Ô¶¯ÊÚÓè¸ÃÓû§»á¼ûȨÏÞ £¬Í¬Ê±×èÖ¹Ö´ÐÐÕý³£µÄÈÕÖ¾¼Í¼ºÍÉóºË¹¦Ð§ £¬´Ó¶øÓÐÓõØÔÚ·þÎñÆ÷ÄÚ²¿½¨ÉèÐéα»á»° ¡£Æ¾Ö¤ESET £¬skip-2.0½öÊÊÓÃÓÚMSSQL v12ºÍv11·þÎñÆ÷ ¡£Ö»¹ÜMSSQL Server 12£¨2014ÄêÐû²¼£©²»ÊÇ×îа汾 £¬ËüÒ²ÊÇ×î³£Óõİ汾 ¡£ESET½«¸ÃºóÃÅÓëAPT×éÖ¯Winnti Group¾ÙÐйØÁª ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-find-stealthy-mssql-server-backdoor-developed-by-chinese-cyberspies/

6¡¢McAfeeÐû²¼Sodinokibi¹¥»÷ÊÖÒÕ¼°Õ½ÂÔµÄÆÊÎö±¨¸æ

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


McAfeeÑо¿Ö°Ô±Í¨¹ýÃÛ¹Þ¸ú×ÙÁËÀÕË÷Èí¼þSodinokibiµÄÏà¹ØTTP¼°Ô˶¯ ¡£Ñо¿Ö°Ô±Ö¸³öÈý¸ö×ÓÍŻGroup 1¡¢×ÓÍÅ»ï#34ºÍ#19£©¾ùʹÓôó×Ú¶Ë¿ÚɨÃ蹤¾ßÀ´²éÕÒ¿É»á¼ûµÄRDP·þÎñÆ÷ £¬È»ºóʹÓôøÓÐ×Ô½ç˵ÃÜÂëÁбíµÄNLBrute RDP±©Á¦ÆÆ½â¹¤¾ßÀ´»ñµÃ·þÎñÆ÷µÄ»á¼ûȨÏÞ £¬²¢ÔÚÍøÂçÖкáÏòÈö²¥ ¡£#34ºÍ#19µÄÕ½ÂÔÔ½·¢³ÉÊì £¬°üÀ¨Ê¹Óö¨ÖƵÄMimikatzÅú´¦Öóͷ£ÎļþÇÔÈ¡ÍøÂçÆ¾Ö¤¡¢×Ô½ç˵¾ç±¾É¾³ýWindowsÊÂÎñÉó²éÆ÷ÈÕÖ¾ÒÔ¼°½¨ÉèÒþ²ØÓû§µÈ ¡£#34»¹»áÊÍ·ÅMinerGateºÍXMRigµÈÍÚ¿óľÂí ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/tools-and-tactics-of-the-sodinokibi-ransomware-distributors/