¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180620
Ðû²¼Ê±¼ä 2018-06-20


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷APT×éÖ¯Olympic DestroyerÕë¶ÔÅ·ÖÞµÄÐÂÄ¿µÄÌᳫ¹¥»÷
2018Äê5ÔÂÖÁ6Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷ÊôÓÚAPT×éÖ¯Olympic DestroyerµÄд¹ÂÚÎļþÑù±¾£¬¸Ã×éÖ¯ÏÖÔÚÕýÔÚÕë¶Ô¶íÂÞ˹µÄ½ðÈÚ»ú¹¹ºÍÅ·ÖÞµÄÉúÎïºÍ»¯Ñ§ÊµÑéÊÒ¡£Olympic DestroyerÔøÔÚ2018Äê3ÔÂÕë¶Ôº«¹úƽ²ý¶¬°Â»áµÄ×éÖ¯Õß¡¢¹©Ó¦É̺ÍÏàÖúͬ°éÌᳫ¹¥»÷¡£Ñо¿ÍŶÓÅû¶Á˸Ã×éÖ¯µÄй¥»÷Ô˶¯µÄÏà¹ØIoC¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/olympic-destroyer-is-still-alive/86169/


¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±³ÆmacOSµÄQuickLook¹¦Ð§¿Éµ¼ÖÈÎÃüÜ´ÅÅ̵ÄÊý¾Ýй¶
Digita SecurityµÄÑо¿Ö°Ô±Patrick WardleÖÒÑÔ³ÆmacOSÓû§´æ´¢ÔÚ¼ÓÃÜ´ÅÅÌÉϵÄÊý¾Ý²¢Ã»ÓлñµÃºÜºÃµÄ±£»¤£¬ÓÉÓÚmacOSµÄQuickLook¹¦Ð§¿ÉÒÔÉúÑÄͼƬµÈÎļþµÄÔ¤ÀÀ¡£µ±Í¨¹ýUIÉó²éĿ¼ʱ£¬QuickLook½«×Ô¶¯½¨É軺ºÍ´æÎļþµÄËõÂÔͼ£¬ÕâЩËõÂÔͼÉúÑÄÔÚSQLiteÊý¾Ý¿âÖУ¬¿Éͨ¹ýÏà¹ØÏÂÁî¾ÙÐÐÌáÈ¡¡£×ÝÈ»ÔʼÎļþ±»É¾³ý£¬ÕâЩ»º´æÒÀ¾É±£´æ¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/macos-quicklook-feature-leaks-data-despite-encrypted-drive/132905/


¡¾ÀÕË÷Èí¼þ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚÀÕË÷Èí¼þSamSamµÄбäÌåµÄÆÊÎö±¨¸æ
Malwarebytes LabsÑо¿ÍŶÓÐû²¼¹ØÓÚSamSamµÄбäÌåµÄÆÊÎö±¨¸æ£¬ÀÕË÷Èí¼þSamSamµÄÓÐÓúÉÔØ£¨ÏÖʵִÐдÅÅ̼ÓÃܵĴúÂ룩ÊÇÔËÐÐʱ½âÃܵģ¬ÐèÒª¹¥»÷ÕßÊÖ¶¯ÊäÈëÃÜÂëÀ´Ö´Ðй¥»÷£¬ÕâÊÇSamSamµÄÌØÕ÷¡£¸ÃÌØÕ÷ʹµÃSamSam²»»á×ÔÐÐÈö²¥£¬ÒâÍâÏÂÔØºÍÖ´ÐиöñÒâÈí¼þµÄÓû§²»»áÊܵ½Î£ÏÕ£¬ÕâÒ²ÒâζÕßSamSamÖ÷ÒªÓÃÓÚÓÐÕë¶ÔÐԵĹ¥»÷¡£
ÔÎÄÁ´½Ó£ºhttps://blog.malwarebytes.com/threat-analysis/2018/06/samsam-ransomware-controlled-distribution/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔAndroidµÄжñÒâÈí¼þHeroRat
ESETÑо¿ÍŶӷ¢Ã÷Ò»¸öеÄAndroid Rat¼Ò×åHeroRat£¬¸ÃRat¼Ò×åÖÁÉÙ´Ó2017Äê8ÔÂ×îÏÈ»îÔ¾£¬Ö÷ҪʹÓÃTelegramÐÒé¾ÙÐÐÏÂÁîºÍ¿ØÖÆÒÔ¼°Êý¾Ýй¶¡£HeroRatͨ¹ý¶àÖÖ·½·¨Èö²¥£¬°üÀ¨µÚÈý·½Ó¦ÓÃÊÐËÁ¡¢É罻ýÌåºÍ̸ÌìÓ¦Óá£HeroRatÖ÷ÒªÕë¶ÔÒÁÀÊ£¬ÆäÌØ¹¤¹¦Ð§°üÀ¨×èµ²Îı¾ÐÂÎźÍÁªÏµÈËÐÅÏ¢¡¢·¢ËͶÌÐÅ¡¢²¦´òµç»°¡¢Â¼ÖÆÉùÒôºÍÆÁÄ»¡¢»ñȡװ±¸Î»ÖÃÒÔ¼°ÐÞ¸ÄϵͳÉèÖá£
ÔÎÄÁ´½Ó£ºhttps://www.welivesecurity.com/2018/06/18/new-telegram-abusing-android-rat/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷ÕýÔÚ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius
Check PointµÄÑо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÕýÔÚ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius£¬¸ÃľÂíͨ¹ýRIG Exploit Kit¾ÙÐзַ¢£¬Ö¼ÔÚÖ´ÐÐweb×¢Èë¹¥»÷½«ÌØÁíÍâ×Ö¶ÎÌí¼Óµ½ÒøÐеÄÕýµ±µÇÂ¼Ò³Ãæ£¬²¢½«Óû§ÊäÈëµÄÐÅÏ¢·¢Ë͸ø¹¥»÷Õß¡£KariusÓÉÈý¸öÎļþ×é³É£¬°üÀ¨injector32\64.exe¡¢proxy32\64.dllºÍmod32\64.dll£¬ÕâÈý¸öÎļþÅäÊÊÓÃÓÚ×èµ²Óû§µÄͨѶ£¬µ«¸Ã¶ñÒâÈí¼þËÆºõÈÔ´¦ÓÚ¿ª·¢»ò²âÊÔ״̬£¬ÕâÒ²ÊÇΪʲôÆäÉÐδÕë¶ÔÈκÎÏêϸµÄ½ðÈÚ»ú¹¹¡£
ÔÎÄÁ´½Ó£ºhttps://research.checkpoint.com/banking-trojans-development/


¡¾Çå¾²²¥±¨¡¿Ç°CIA¹ÍÔ±±»Ö¸¿ØÏòWikiLeaksй¶Vault 7ϵÁеÄCIAºÚ¿Í¹¤¾ß
ÃÀ¹ú˾·¨²¿Ðû²¼¶ÔǰCIAÈí¼þ¹¤³ÌʦJoshua SchulteÌá³öеÄÖ¸¿Ø£¬³ÆÆäÉæÏÓÏòWikiLeaksй¶CIAÉñÃØÎļþ¡¢Èí¼þÏîÄ¿ºÍºÚ¿Í¹¤¾ß¡£ÕâЩйÃÜÄÚÈݱ»³ÆÎªVault 7ϵÁУ¬ËüÏÔʾÁËCIAÔõÑùʹÓúڿ͹¤¾ßÀ´¼à¿ØÅÌËã»ú¡¢ÊÖ»ú¡¢µçÊÓ¡¢ÍøÂçÉãÏñÍ·ºÍSSLÅþÁ¬µÈ¡£Âü¹þ¶ÙÉó²é¹ÙGeoffrey S. Berman³Æ£¬ÕâÖÖ²»·¨Ð¹ÃÜ¿ÉÄܶԹú¼ÒÇå¾²Ôì³ÉÑÏÖØµÄÍþв£¬Ç±ÔÚµØÎ£¼°ÃÀ¹úÈËÃñµÄÇå¾²¡£


¾©¹«Íø°²±¸11010802024551ºÅ