¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180713

Ðû²¼Ê±¼ä 2018-07-13

¡¾¶ñÒâÈí¼þ¡¿ÒøÐÐľÂíHancitor¾íÍÁÖØÀ´£¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþÈö²¥


ÒøÐÐľÂíHancitor×îÔçÓÚ2014Äê±»·¢Ã÷£¬ÓÃÓÚÏÂÔØÆäËü¶ñÒâÈí¼þ²¢ÇÔÈ¡Óû§µÄƾ֤¡£SentinelOneÊӲ쵽Hancitorͨ¹ýÍøÂç´¹ÂÚÓʼþ¾ÙÐÐÈö²¥µÄ¶ñÒâÔ˶¯¡£Ò»Ð©´¹ÂÚÓʼþÒÔÍ£³µ·£¿îµ¥ÎªÖ÷Ì⣬ÓÕÆ­Óû§µã»÷Æä¶ñÒâÁ´½Ó²¢ÏÂÔØ¶ñÒâwordÎĵµ¡£ÉÐÓÐһЩÀ¬»øÓʼþÀ´×ÔÓÚIntuit»òHalloFax£¬ÓÕÆ­Óû§ÏÂÔØ¶ñÒâ´«ÕæÎļþ¡£Ñо¿Ö°Ô±Åû¶Á˸öñÒâÔ˶¯µÄ¶ñÒâ·Ö·¢ÍøÖ·¼°C2·þÎñÆ÷¡¢ÓÐÓúÉÔØµÈÈëÇÖÖ¸±ê£¨IoC£©¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.sentinelone.com/blog/hancitor-banking-trojan-is-back-%7C-using-malicious-word-attachment/

¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚHawkeye KeyloggerµÄбäÌåµÄÆÊÎö±¨¸æ


΢ÈíOFFICE 365Ñо¿ÍŶÓÐû²¼¹ØÓÚ¶ñÒâÈí¼þHawkeye KeyloggerµÄбäÌåµÄÆÊÎö±¨¸æ¡£Hawkeye KeyloggerÓÖ±»³ÆÎªiSpy Keylogger£¬Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄÐÅÏ¢£¬Æä×îºóÒ»´Î·ºÆðÔÚ2016Äê¡£µ«Ñо¿Ö°Ô±ÔÚ2018Äê4Ô·¢Ã÷¸Ã¶ñÒâÈí¼þÔٴηºÆð£¬Ö÷ÒªÕë¶ÔÈí¼þºÍÊÖÒÕÐÐÒµ£¨52%£©£¬ÒÔ¼°ÒøÐУ¨11%£©¡¢ÄÜÔ´£¨8%£©¡¢»¯¹¤£¨5%£©ºÍÆû³µ£¨5%£©ÐÐÒµ¡£ÊÜÓ°ÏìµÄ¹ú¼Ò/µØÇø°üÀ¨°¢ÁªÇõ£¨19%£©¡¢ºÉÀ¼£¨15%£©¡¢ÃÀ¹ú£¨11%£©¡¢ÄÏ·Ç£¨6%£©ÒÔ¼°Ó¢¹ú£¨5%£©¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://cloudblogs.microsoft.com/microsoftsecure/2018/07/11/hawkeye-keylogger-reborn-v8-an-in-depth-campaign-analysis/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÔÚGoogle PlayÖз¢Ã÷ÐÂÌØ¹¤Èí¼þGolden Cup


McAfee LabsÑо¿ÍŶÓÔÚGoogle PlayÉÏ·¢Ã÷ÓëÌìϱ­Ö÷ÌâÏà¹ØµÄÐÂÌØ¹¤Èí¼þGolden Cup¡£ÔÚδ¾­Óû§Ô޳ɵÄÇéÐÎÏ£¬Golden Cup»áÔÚºǫ́¾²Ä¬ÍøÂçÓû§µÄÐÅÏ¢²¢·¢ËÍÖÁ·þÎñÆ÷£¬ÕâЩÐÅÏ¢°üÀ¨Óû§µÄµç»°ºÅÂë¡¢ÒÑ×°ÖÃÓ¦ÓÃÁÐ±í¡¢×°±¸ID¡¢Android°æ±¾¡¢IMEI¡¢IMSI¡¢¿ÉÓô洢ÈÝÁ¿ÒÔ¼°×°±¸µÄÐͺ𢳧É̺ÍÐòÁкÅ¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËͳһÍþвµÄÁíÍâÁ½¸ö±äÌ壬Google PlayÒѾ­É¾³ýÁËÕâЩ¶ñÒâÓ¦Óá£

 

Ô­ÎÄÁ´½Ó£ºhttps://securingtomorrow.mcafee.com/mcafee-labs/google-play-users-risk-a-yellow-card-with-android-foulgoal-a/


¡¾¹¥»÷ÊÂÎñ¡¿VSDC¹ÙÍø1¸öÔÂÄÚÈý´ÎÔâºÚ¿ÍÈëÇÖ£¬ÆäÈí¼þÏÂÔØÁ´½Ó±»Ð®ÖÆ


VSDCÊÇÒ»¼ÒÌṩÃâ·ÑÊÓÆµ±à¼­Èí¼þµÄ¹«Ë¾£¬Æä¹ÙÍøÔÚ1¸öÔÂÄÚÈý´ÎÔâµ½ºÚ¿ÍÈëÇÖ£¨6ÔÂ18ÈÕ¡¢7ÔÂ2ÈÕºÍ7ÔÂ6ÈÕ£©£¬¹¥»÷Õß½«ÆäVSDCÈí¼þµÄÏÂÔØÁ´½ÓÌæ»»Îª¶ñÒâÁ´½Ó£¬»®·Ö½«Óû§Öض¨ÏòÖÁÈý¸ö¶ñÒâÈí¼þ£¨Ò»¸öÓÃÓÚÇÔÈ¡Óû§ÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬Ò»¸ö¼üÅ̼ͼÆ÷ºÍÒ»¸öÔ¶¿ØÄ¾ÂíRAT£©¡£VSDCÈ·ÈÏÁËÕâЩÊÂÎñ£¬²¢³ÆÆäÒѾ­ÐÞ¸´ÁËÍøÕ¾¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/popular-software-site-hacked-to-redirect-users-to-keylogger-infostealer-more/


¡¾¹¥»÷ÊÂÎñ¡¿ÃÀ¹ú¿¨Ë¹µØÇøµÄÒ½ÁÆÖÐÐÄÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷


ÃÀ¹úÃÜËÕÀïÖÝ¿¨Ë¹µØÇøµÄÒ½ÁÆÖÐÐÄ³ÆÆäÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷£¬ÆäÄÚ²¿Í¨Ñ¶ÏµÍ³ºÍµç×Ó¿µ½¡µµ°¸ÏµÍ³£¨EHR£©ÊÜÓ°Ïì¡£¸ÃÒ½ÁÆÖÐÐijÆÃ»ÓÐÖ¤¾ÝÅú×¢»¼ÕßµÄÊý¾Ý±»»á¼û¡£ÏÖÔÚ»¹²»ÇåÎúÆäÅÌËã»ú/·þÎñÆ÷ÔõÑù±»Ñ¬È¾£¬µ«Ïà¹ØÖ´·¨²¿·ÖÒѾ­½éÈë¾ÙÐÐÊӲ졣

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/cass-regional-medical-center-hit-with-unidentified-ransomware/


¡¾Îó²î²¹¶¡¡¿µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGOÐÞ¸´ÆäHMI²úÆ·ÖеĶà¸öÎó²î


µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGOÐÞ¸´Æäe!DISPLAY 7300TÈË»ú½çÃæ£¨HMI£©²úÆ·ÖеĶà¸öÇå¾²Îó²î£¬°üÀ¨XSSÎó²î£¨CVE-2018-12981£©¡¢ÎļþÉÏ´«Îó²î£¨CVE-2018-12980£©ÒÔ¼°Ä¬ÈÏȨÏÞÉèÖò»×¼È·µÄÎó²î£¨CVE-2018-12979£©¡£Í¨¹ý×éºÏʹÓÃÕâЩÎó²î£¬¹¥»÷Õß¿ÉÁýÕÖindex.html²¢ÒÔwwwÓû§µÄȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£ÊÜÓ°ÏìµÄÐͺŰüÀ¨762-3000~762-3003£¬WAGOÒÑÔڹ̼þ°æ±¾02ÖÐÐÞ¸´ÁËÕâЩÎó²î¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/hackers-can-chain-multiple-flaws-attack-wago-hmi-devices