¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181012
Ðû²¼Ê±¼ä 2018-10-12
¿¨°Í˹»ùʵÑéÊÒÓÚ2018Äê8ÔÂ17ÈÕÏò΢Èí±¨¸æÁËWindows 0day£¨CVE-2018-8453£©£¬¸ÃÎó²îÒÑÔÚ΢ÈíµÄ10ÔÂÇå¾²¸üÐÂÖлñµÃÐÞ¸´¡£¸ÃÎó²îÖ÷Òª±»APT×éÖ¯FruityArmorËùʹÓã¬ÓÃÀ´¹¥»÷Öж«µØÇøµÄÄ¿µÄ¡£Æä¹¥»÷Ô˶¯ÊǸ߶ÈÕë¶ÔÐԵģ¬Êܺ¦ÕßµÄÊýÄ¿²»Áè¼Ý12¸ö¡£Ñо¿ÍŶÓÄæÏòÁ˲¶»ñµ½µÄÎó²îʹÓÃÑù±¾£¬²¢½«ÆäÖØÐ´ÎªÍêÕûµÄPoC¡£
https://securelist.com/cve-2018-8453-used-in-targeted-attacks/88151/
2¡¢Ñо¿ÍŶӷ¢Ã÷NotPetyaºÍIndustroyerÓë·¸·¨ÍÅ»ïTeleBots±£´æ¹ØÁª
ESETÑо¿ÍŶӷ¢Ã÷¶ñÒâÈí¼þNotPetyaºÍºóÃÅIndustroyerÓë·¸·¨ÍÅ»ïTeleBots±£´æ¹ØÁª¡£ÕâÁ½¸ö¶ñÒâÈí¼þ¶¼±»ÓÃÓÚ¹¥»÷ÎÚ¿ËÀ¼µÄÄ¿µÄ¡£Ñо¿ÍŶÓ̫ͨ¹ýÎöTeleBotsʹÓõÄкóÃÅWin32/ExaramelÈ·ÈÏÁËÕâЩÁªÏµ£¬ÔÚÕâ֮ǰÑо¿ÍŶÓÖ»ÄÜÍÆ²âËüÃǵĹØÁª¡£ÐµÄÖ¤¾ÝÅú×¢£¬ExaramelºÍIndustroyerÖ®¼ä¾ßÓкÜÇ¿µÄ´úÂëÏàËÆÐÔºÍÐÐΪ£¬ÕâÒâζ×ÅËüÃÇÀ´×ÔÓÚͳһ¿ª·¢Õß¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-backdoor-ties-notpetya-and-industroyer-to-telebots-group/3¡¢Ñо¿ÍŶÓ×ܽáÒÑÍùËÄÄêÄÚÔÚºÉÀ¼»îÔ¾µÄAPT×éÖ¯
¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚºÉÀ¼µÄ»îÔ¾APT×éÖ¯µÄ×ÛÊö£¬¸Ã×ÛÊöͨ¹ý×ܽáÒÑÍùËÄÄêÄÚ£¨2014Äê9ÔÂÖÁ2018Äê9Ô£©ºÉÀ¼µÄ¸ß¼¶ÍøÂçÍþвÔ˶¯£¬¸ÅÊöÁ˺ÉÀ¼µÄAPT×éÖ¯¼°Æä»îԾʱ¼ä¡¢Ö÷ÒªÕë¶ÔµÄÄ¿µÄµÈÐÅÏ¢¡£ÕâЩAPT×éÖ¯°üÀ¨BlackOasis¡¢Sofacy¡¢Hades¡¢Buhtrap¡¢The Lamberts¡¢Turla¡¢Gatak¡¢Putter PandaºÍAnimal Farm¡£
https://securelist.com/threats-in-the-netherlands/88185/
4¡¢McAfeeÐû²¼¹ØÓÚÀÕË÷Èí¼þGandCrab v5.0.2µÄÆÊÎö±¨¸æ
McAfee LabsÐû²¼¹ØÓÚÀÕË÷Èí¼þGandCrab v5µÄÆÊÎö±¨¸æ£¬±¾Ô³õGandCrabÒѾ¸üÐÂÖÁ°æ±¾5.0.2¡£´Ó°æ±¾4×îÏÈ£¬GandCrab×îÏÈͨ¹ýFallout EK¾ÙÐзַ¢£»ÔÚ°æ±¾5ÖУ¬GandCrabÓÖÓë¶ñÒâÈí¼þ¼ÓÃÜ·þÎñNTCrypt¾ÙÐÐÏàÖú¡£NTCrypt¿ÉÒÔΪ¶ñÒâÈí¼þÌṩ»ìÏýÒÔÌӱܼì²â¡£ÕâÖÖÓëÆäËü¶ñÒâÈí¼þ¾ÙÐнáÃ˵ÄÐÐΪʹµÃÆä¹¥»÷Ô˶¯µÄÔËÓªÔ½·¢±ãµ±£¬²¢ÇÒ¿É¿¿µÄͬÃË¿ÉÒÔ×èÖ¹²»ÊÜÐÅÍеũӦÉ̺ͷÖÏúÉÌ£¬´Ó¶ø×î´óÏ޶ȵؽµµÍΣº¦¡£
ÔÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/mcafee-labs/rapidly-evolving-ransomware-gandcrab-version-5-partners-with-crypter-service-for-obfuscation/5¡¢TalosÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔAndroidµÄÐÂľÂíGPlayed
˼¿ÆTalos·¢Ã÷Ö÷ÒªÕë¶ÔAndroidƽ̨µÄÐÂÌØÂåÒÁľÂíGPlayed¡£GPlayed¾ßÓÐÐí¶àÄÚÖù¦Ð§£¬²¢ÇÒºÜÊÇÎÞа£¬¹¥»÷Õß¿ÉÒÔÔ¶³Ì¼ÓÔØ²å¼þ¡¢×¢Èë¾ç±¾ÉõÖÁ±àÒëеÄ.NET´úÂë¡£Ñо¿ÍŶӷ¢Ã÷µÄ¶ñÒâÑù±¾Ê¹ÓÃÁËÀàËÆÓÚGoogle AppsµÄͼ±ê£¬Î±×°³ÉGoogle Play MarketplaceÒÔÓÕÆÓû§¡£¸Ã¶ñÒâÈí¼þÊÇÔÚXamarinÇéÐÎÏÂÓÃ.NET±àдµÄ£¬ÆäÖ÷DLLÊÇReznov.DLL£¬¸ÃDLLÖаüÀ¨Ä¾ÂíµÄ½¹µã¸ùÀàeClient¡£¸ÃÑù±¾Ö÷ÒªÕë¶Ô¶íÓïÓû§£¬ÆÊÎöÅú×¢¸ÃľÂí»¹´¦ÓÚ²âÊԽ׶Ρ£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2018/10/gplayedtrojan.html6¡¢ÄÏ·ÇÍйܷþÎñÉÌHetznerÒ»ÄêÄÚµÚ¶þ´ÎÔâºÚ¿ÍÈëÇÖ
ÄÏ·ÇÍøÂçÍйܷþÎñÉÌHetznerÔÚÒÑÍù12¸öÔÂÄÚµÚ¶þ´ÎÔâµ½ºÚ¿ÍÈëÇÖ¡£ÈëÇÖ±¬·¢ÔÚ10ÔÂ5ÈÕÐÇÆÚÎ壬¹¥»÷ÕßÏë·¨»á¼ûÁ˲¿·ÖÓû§µÄÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢µØµã¡¢Éí·ÝºÅÂë¡¢Ôöֵ˰ºÅÂëÒÔ¼°ÒøÐÐÕ˺ŵȣ¬µ«Ã»ÓÐÈκÎÖ§¸¶ÐÅÏ¢ºÍÃÜÂëÐÅϢй¶¡£ÉÏÒ»´ÎºÚ¿ÍÈëÇÖ±¬·¢ÔÚ2017Äê11Ô£¬Ô¼4ÍòÃûÓû§µÄÐÅÏ¢±»ÇÔ£¬µ«¸Ã¹«Ë¾Ã»ÓÐ͸¶µÚ¶þ´Î¹¥»÷µÄÓ°Ïì¹æÄ£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hackers-breach-web-hosting-provider-for-the-second-time-in-the-past-year/ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿Ê±Î¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ