ÎÚ¿ËÀ¼Óë¶à¹úÕþ¸®ÍŽᵷ»ÙÀÕË÷Èí¼þClopµÄ»ù´¡ÉèÊ©£»Ñо¿ÍŶÓÅû¶2G¼ÓÃܱê×¼Ëã·¨±£´æ¿ÉÇÔÌýÁ÷Á¿µÄÎó²î
Ðû²¼Ê±¼ä 2021-06-181.ÎÚ¿ËÀ¼Óë¶à¹úÕþ¸®ÍŽᵷ»ÙÀÕË÷Èí¼þClopµÄ»ù´¡ÉèÊ©

ÎÚ¿ËÀ¼¾¯·½Óë¹ú¼ÊÐ̾¯×éÖ¯¡¢º«¹úºÍÃÀ¹úÕþ¸®ÍŽᣬÔÚ±¾ÖÜÈýÀֳɵ·»ÙÁËÀÕË÷Èí¼þClopµÄ»ù´¡ÉèÊ©¡£ClopÀÕË÷Èí¼þÍÅ»ï×Ô2019ÄêÒÔÀ´×îÏÈ»îÔ¾£¬×ܼÆÔì³ÉÁËԼĪ5ÒÚÃÀÔªµÄËðʧ¡£ÎÚ¿ËÀ¼Õþ¸®³ÆÒѹرշַ¢¶ñÒâÈí¼þµÄ»ù´¡ÉèÊ©ºÍ»ñµÃ¼ÓÃÜÇ®±ÒµÄÇþµÀ£¬µ«ÏÖÔÚClopÓÃÀ´¹ûÕæ±»µÁÊý¾ÝµÄÍøÕ¾£¨CL0P^-LEAKS£©ÈÔÔÚÔËÐС£Çå¾²¹«Ë¾Intel 471ÌåÏÖ£¬ÎÚ¿ËÀ¼Õþ¸®Ö»¾Ð²¶ÁËΪClopÍÅ»ïÏ´Ç®µÄÈË£¬Æä½¹µã³ÉÔ±¿ÉÄÜסÔÚ¶íÂÞ˹¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/06/ukraine-police-arrest-cyber-criminals.html
2.¼ÎÄ껪ÓÊÂÖ¹«Ë¾³ÆÆäÔâµ½ÍøÂç¹¥»÷µ¼ÖÂСÎÒ˽¼ÒÐÅϢй¶

È«Çò×î´óµÄÓÎÂÖ¼ÎÄ껪£¨Carnival Corporation£©³ÆÆäÔâµ½¹¥»÷µ¼ÖÂÊý¾Ýй¶¡£¸Ã¹«Ë¾ÌåÏÖÆäÔÚ2021Äê3ÔÂ19ÈÕ¼ì²âµ½Î´¾ÊÚȨµÄµÚÈý·½»á¼ûÁ˲¿·Öµç×ÓÓʼþÕÊ»§£¬Ð¹Â¶ÁËÔ±¹¤ºÍ¿ÍÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢»¤ÕÕºÅÂë¡¢³öÉúÈÕÆÚ¡¢¿µ½¡ÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë»òÉí·ÝÖ¤ºÅÂëµÈ¡£¸Ã¹«Ë¾ÔÚÒ»·Ýµç×ÓÓʼþÉùÃ÷ÖÐÌåÏÖ£¬Æä¹É¼ÛϵøÁËÁè¼Ý2%¡£ÔçÔÚÈ¥ÄêµÄ8ÔºÍ12Ô£¬¸Ã¹«Ë¾»¹Ôâµ½ÁËÁ½´ÎÀÕË÷Èí¼þ¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.oann.com/cruise-operator-carnival-discloses-breach-of-crew-guests-personal-data-bloomberg-news/
3.²¨À¼Õþ¸®³ÆÆä¹«ÃñºÍ×éÖ¯»ú¹¹Ô⵽ب¹ÅδÓеÄÍøÂç¹¥»÷

²¨À¼Õþ¸®ÔÚ±¾Öܶþ³Æ£¬Æä¹«ÃñºÍ×éÖ¯»ú¹¹Ôâµ½ÁËØ¨¹ÅδÓеÄÍøÂç¹¥»÷¡£ÉÏÖÜ£¬ºÚ¿ÍÈëÇÖÁË×ÜÀí°ì¹«ÊÒÈÏÕæÈËMichal DworczykµÄ˽ÈËÓʼþÕÊ»§£¬²¢½«ÓʼþÔÚTelegram¹ûÕæ¡£Õþ¸®½²»°ÈËPiotr MullerÌåÏִ˴ι¥»÷µÄ¹æÄ£ºÜÆÕ±é£¬²»µ«Éæ¼°Dworczyk£¬»¹Éæ¼°Õþ¸®³ÉÔ±¡¢PiSµ³ºÍÆä¹«Ãñ¡£Ð¹Â¶ÎļþµÄÔªÊý¾ÝÏÔʾ£¬ÕâЩÎļþÊÇÓɽ²¶íÓïµÄÈ˱༵쬵«Õâȱ·¦ÒÔ½«´Ë´Î¹¥»÷¹é×ïÓÚ¶íÂÞ˹ºÚ¿Í¡£ÏÖÔÚ£¬²¨À¼µÄµØ·½Õþ¸®ºÍÇå¾²¾ÖÈÔÔÚÊÓ²ì´Ë´Î¹¥»÷ÊÂÎñ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/119043/hacking/poland-hit-cyber-attacks.html
4.KasperskyÅû¶³¯ÏÊÍÅ»ïAndarielÕë¶Ôº«¹úµÄ¹¥»÷Ô˶¯

KasperskyÅû¶Á˳¯ÏʺڿÍÍÅ»ïAndarielÕë¶Ôº«¹úµÄ¹¥»÷Ô˶¯¡£Ñо¿Ö°Ô±ÓÚ2021Äê4ÔÂÔÚVirusTotalÉÏ·¢Ã÷ÁËÒ»¸ö¿ÉÒɵÄWordÎĵµ£¬ÆÊÎö·¢Ã÷´Ë´Î¹¥»÷Ô˶¯ÖÐʹÓõÄWindowsÏÂÁîºÍÑ¡ÏîÓë֮ǰµÄAndarielÔ˶¯ÏÕЩÏàͬ¡£Andariel×÷ΪLazarusµÄ×Ó¼¯ÍÅ£¬×Ô2016Äê5ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬Ö¼ÔÚÈëÇÖº«¹úºÍÌìϸ÷µØ½ðÈÚ»ú¹¹µÄÅÌËã»ú¡£ÖµµÃ×¢ÖØµÄÊÇ£¬Õâ´Î¹¥»÷³ýÁË×°ÖúóÃÅÍ⣬»¹×°ÖÃÁ˼ÓÃÜÀÕË÷Èí¼þ£¬Ö÷ÒªÕë¶ÔÖÆÔìÒµ¡¢Ã½ÌåºÍÐÞ½¨ÒµµÈÐÐÒµ¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/andariel-evolves-to-target-south-korea-with-ransomware/102811/
5.Ñо¿ÍŶÓÅû¶2G¼ÓÃܱê×¼Ëã·¨±£´æ¿ÉÇÔÌýÁ÷Á¿µÄÎó²î

ÔÚÖÜÈý½ÒÏþµÄһƪÂÛÎÄÖУ¬À´×Ե¹ú¡¢·¨¹úºÍŲÍþµÄÑо¿Ö°Ô±Åû¶ÁË2G£¨GPRS£©Òƶ¯Êý¾Ý¼ÓÃܱê×¼ÖеÄÎó²î¡£¸ÃÎó²î±£´æÓÚ¼ÓÃÜËã·¨GEA-1ÖУ¬Õâ¿ÉÄÜʹ¹¥»÷ÕßÄܹ»ÇÔÌýһЩÊý¾ÝÁ÷Á¿³¤´ï20¶àÄê¡£GEA-1Ëã·¨±¾Ó¦ÔÚ2013ÄêïÔÌ£¬µ«ÔÚÏÖÔÚµÄAndroidºÍiOSÖÇÄÜÊÖ»úÖÐÈÔÄÜ·¢Ã÷Ëü¡£ËäÈ»´ó´ó¶¼ÊÖ»ú¶¼Ê¹ÓÃ4GÉõÖÁ5G£¬µ«ÔÚijЩ¹ú¼Ò/µØÇø£¬GPRSÈÔÈ»ÊÇÊý¾ÝÅþÁ¬µÄºó±¸Ñ¡Ôñ¡£ÏÖÔÚ£¬Ñо¿Ö°Ô±ÒÑ֪ͨÊÖ»úÖÆÔìÉ̺ͱê×¼×éÖ¯ÐÞ¸´¸ÃÎó²î¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/security-flaw-found-2g-mobile-data-encryption-standard
6.Enable SecurityÅû¶VoIP GUIÖеĿçÕ¾¾ç±¾Îó²î

Enable SecurityÅû¶ÁËVoIP GUIÖеĿçÕ¾¾ç±¾Îó²î¡£¸ÃÎó²î±£´æÓÚÖÎÀíVoIPºô½ÐµÄ»á»°ÌᳫÐÒé (Session Initiation Protocol£¬SIP)ÖУ¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚδ¾Éí·ÝÑéÖ¤µÄÇéÐÎÏÂÔÚÄ¿µÄϵͳÉÏÖ´ÐдúÂë¡£Ñо¿Ö°Ô±ÔÚÉóºËVoIPmonitor GUIʱ·¢Ã÷Á˸ÃÎó²î£¬³Æ¿ÉÒÔͨ¹ý·¢ËͶñÒâSIPÐÂÎÅÀ´ÍêÈ«¿ØÖÆÏµÍ³¡£Enable SecurityÓÚ2021Äê2ÔÂÁªÏµÁËVoIPmonitorµÄ¿ª·¢Ö°Ô±£¬¸ÃÎó²îÏÖÒÑÐÞ¸´¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2021/06/16/xss-vulnerability-in-sip-protocol-risks-rce-attacks-on-voip-software/


¾©¹«Íø°²±¸11010802024551ºÅ