¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180801
°ä²¼¹¦·ò 2018-08-01¡¾·ÖÎö»ã±¨¡¿ICS-CERT°ä²¼ÁªÍøÊÓÆµ¼à¿ØÏµÍ³ÍøÂç°²È«Ì¬ÊÆ»ã±¨
¹ú¶È¹¤Òµ»¥ÁªÍø°²È«Ó¦¼±ÏìÓ¦ÖÐÐÄ£¨ICS-CERT£©°ä²¼ÁªÍøÊÓÆµ¼à¿ØÏµÍ³ÍøÂç°²È«Ì¬ÊÆ»ã±¨£¬»ã±¨´ÓµØÓòÉ¢²¼¡¢Æ·ÅÆÉ¢²¼¡¢Íþвɢ²¼µÈ¶à¸ö½Ç¶ÈÂÛÊö¹úÄÚÍøÂçÊÓÆµ¼à¿ØÏµÍ³µÄ°²È«Ì¬ÊÆÇé¿ö£¬²¢Õë¶Ô½üÄêÀ´²úÉúµÄÍøÂçÊÓÆµ¼à¿ØÏµÍ³°²È«ÊÂÎñÆðÒòÌá³öÁËÏàÓ¦µÄ·çÏÕ·À±¸ºÍ°²È«Ó¦¶Ô¹æ»®£¬¸øÓйص±²¿ÃÅÃÅ¡¢×éÖ¯ºÍ×êÑлú¹¹Ìṩ²Î¿¼ºÍ½è¼ø¡£
ÔÎÄÁ´½Ó£ºhttps://www.ics-cert.org.cn/portal/page/121/be9def54499644afb6ce4b119e5e7d42.html
¡¾·ÖÎö»ã±¨¡¿°Ä´óÀûÑÇOAIC°ä²¼2018ÄêQ2Êý¾Ýй©ÊÂÎñµÄͳ¼Æ»ã±¨
°Ä´óÀûÑÇÐÅϢרԱ°ì¹«ÊÒ£¨OAIC£©°ä²¼2018ÄêµÚ¶þ¼¾¶ÈµÄÊý¾Ýй¶ÊÂÎñͳ¼Æ»ã±¨£¬»ã±¨º¸ÇÁË2018Äê4ÔÂ1ÈÕÖÁ6ÔÂ30ÈÕÆÚ¼äµÄ242ÆðÊý¾Ýй¶ÊÂÎñ¡£·ÖÎöÅú×¢59£¥µÄÊý¾Ýй¶ÊÇ·¸×ï·Ö×ÓÔì³ÉµÄ£¬36£¥ÊDZ¨´ðÃýÎóµ¼Öµģ¬»¹ÓÐ5£¥ÊÇϵͳ¹ÊÕÏÔì³ÉµÄ¡£´óÎÞÊýÊý¾ÝÐ¹Â¶Éæ¼°ÁªÏµ·½Ê½µÄй¶£¬ÈçÓ×ÎÒ¼ÒÍ¥µØÖ·¡¢µç»°ºÅÂë»òµç×ÓÓʼþµØÖ·¡£42%µÄÊý¾ÝÐ¹Â¶Éæ¼°²ÆÕþÊý¾ÝµÄй¶£¬ÈçÒøÐÐÕË»§»òÐÅÓþ¿¨ºÅÂë¡£Ò½ÁÆ·þÎñÊDzúÉúй¶ÊÂÎñ×î¶à£¨49´Î£©µÄÐÐÒµ£¬Æä´ÎÊǽðÈÚÐÐÒµ£¨36´Î£©¡£
ÔÎÄÁ´½Ó£ºhttps://www.oaic.gov.au/privacy-law/privacy-act/notifiable-data-breaches-scheme/quarterly-statistics-reports/notifiable-data-breaches-quarterly-statistics-report-1-april-30-june-2018#executive-summary
¡¾Íþвµý±¨¡¿Æ¾¾Ý×îеĻ㱨ÀÕË÷Èí¼þSamSam¹²»ñµÃ³¬¹ý590ÍòÃÀÔªµÄÊê½ð
ƾ¾ÝÓ¢¹úÍøÂ簲ȫ¹«Ë¾Sophos±àдµÄ¹ØÓÚÀÕË÷Èí¼þSamSamµÄ×îл㱨£¬×Ô2015Äêµ×ÒÔÀ´SamSamÒѾΪÆä×÷Õß´øÀ´Á˳¬¹ý590ÍòÃÀÔªµÄÊê½ðÊÕÒæ¡£×êÑÐÈËÔ±×·×ÙÁËÊÕµ½Êê½ðµÄ157¸ö±ÈÌØ±ÒµØÖ·ÒÔ¼°Î´ÊÕµ½Êê½ðµÄ88¸ö±ÈÌØ±ÒµØÖ·£¬·¢ÏÔìä×ʽðÁ¿ÎªÔ¼590ÍòÃÀÔª£¬Õâ±È֮ǰ¹À¼ÆµÄ85ÍòÃÀÔªÒª¸ß¡£×êÑÐÈËÔ±ÒÔΪSamSamËÆºõÊǵ¥¸ö¹¥»÷ÕߵŤ×÷£¬¶ø²»ÊÇÒ»¸ö·¸×ïÍŻ
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/samsam-ransomware-crew-made-nearly-6-million-from-ransom-payments/
¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖеĴó¹æÄ£¶ñÒâ¸æ°×»î¶¯Master134
Check Point×êÑÐÍŶӷ¢ÏÖÒ»¸öеĴó¹æÄ£¶ñÒâ¸æ°×»î¶¯Master134¡£¹¥»÷ÕßÀûÓÃWordPress°æ±¾4.7.1ÖеÄÒÑÖªRCE·ì϶£¬ÉøÈëÁ˳¬¹ý1Íò¸öWordPressÍøÕ¾¡£¹¥»÷ÕßÔÚÕâÐ©ÍøÕ¾ÉÏ×¢Èë¸æ°×£¬ÓÃÓÚ½Ù³ÔìäÓû§²¢½«Óû§³Á¶¨Ïòµ½Master134µÄÖØÒª·þÎñ¡£¶øºóMaster134½«ÕâЩ½Ù³ÖµÄÁ÷Á¿ÏúÊÛ¸øÖØÒªµÄ·¸×OÍÅ£¬ÈçRIG¡¢Magnitude¡¢FobosºÍHookAdsµÈ¡£Check Point°µÊ¾¸Ã¶ñÒâ¸æ°×»î¶¯Ä¿Ç°ÈÔÔÚ³ÖÐø¡£
ÔÎÄÁ´½Ó£ºhttps://research.checkpoint.com/malvertising-campaign-based-secrets-lies/
¡¾Êý¾Ýй¶¡¿Dixons CarphoneÈ·ÈÏ2017ÄêµÄÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔ¼1000ÍòÓû§
±¾ÖÜһŷÖÞµç×ÓÁãÊÛÉÌDixons Carphone°ä²¼²¼¸æ³Æ2017Äê²úÉúµÄÊý¾Ýй¶ÊÂÎñ±È×î³õµÄÔ¤¼Æ¸üΪÔã¸â£¬¸Ã¹«Ë¾È·ÈϸÃÊÂÎñÓ°ÏìÁËÔ¼1000ÍòÓû§£¬¸ßÓÚÆäÔÚ6Ô·Ý×î³õ¹À¼ÆµÄ120Íò¡£¹¥»÷ÕßÔøÓÚÈ¥Äê½Ó¼ûÁËÕâЩÓû§µÄÓ×ÎÒÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µØÖ·ºÍµç×ÓÓʼþµØÖ·¡£Dixons CarphoneÏòÓû§±£Õϳƣ¬Ã»ÓÐÈκÎÒøÐп¨ÐÅϢй¶£¬ÈçPINÂë¡¢CVVÂëºÍÑéÖ¤ÂëµÈÊý¾Ý£¬²¢ÇÒûÓÐÖ¤¾ÝÅú×¢¸ÃÊý¾Ýй¶ÊÂÎñµ¼ÖÂÁËÈκÎÚ²ÆÊÂÎñµÄ²úÉú¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/07/dixons-carphone-data-breach.html
¡¾¶ñÒâÈí¼þ¡¿×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶Ô¶íÂÞ˹ºÍº«¹úµÄ¶ñÒâÈí¼þBisonal
5Ô³õPalo Alto NetworksµÄUnit 42×êÑÐÍŶӷ¢ÏÖÕë¶Ô¶íÂÞ˹һ¼Ò¹ú·À¹«Ë¾ºÍº«¹úÒ»¼Ò²»Ã÷¹«Ë¾µÄ¹¥»÷»î¶¯£¬¸Ã¹¥»÷»î¶¯ÀûÓÃÁ˶ñÒâÈí¼þBisonalµÄбäÌå¡£¸Ã±äÌåÓë¾É°æBisonalµÄÇø±ðÖØÒªÓÐÈý¸ö£¬Ô̺¬¼ÓÃÜÆ÷µÄ·ÖÆç¡¢C2ͨѶ¼ÓÃܲ½ÖèµÄ·ÖÆçÒÔ¼°¶ÔÍøÂçͨѶºÍÓÆ¾ÃÐÔ´úÂëµÄ´óÁ¿³Áд¡£¹¥»÷Õß½«¸Ã¶ñÒâÈí¼þ¼Ù×°³ÉPDFÎļþ£¨Ê¹ÓüٵÄPDFͼ±ê£©£¬²¢Í¨¹ýÍøÂç´¹µöÓʼþ·¢Ë͸øÖ¸±ê¡£
ÔÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/07/unit42-bisonal-malware-used-attacks-russia-south-korea/


¾©¹«Íø°²±¸11010802024551ºÅ