¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180822
°ä²¼¹¦·ò 2018-08-22¡¾Íþвµý±¨¡¿Î¢Èí·¢ÏÖ²¢×èÖ¹ÁËÕë¶ÔÃÀ¹úÕþÖμ¯ÌåµÄÐÂÒ»ÂÖ¶íÂÞ˹ºÚ¿Í¹¥»÷
±¾ÖÜÒ»Íí¼ä΢Èí°ä²¼»ã±¨³ÆÆä·¢ÏÖ²¢×èÖ¹Á˶íÂÞ˹ºÚ¿Í×éÖ¯APT28µÄÐÂÒ»ÂÖÕë¶ÔÃÀ¹úÕþÖμ¯ÌåµÄ¹¥»÷»î¶¯¡£Î¢Èí×ܲÃBrad Smith°µÊ¾Î¢ÈíµÄÊý×Ö·¸×ﲿÃÅ£¨DCU£©ÊÕÊÜÁËAPT28µÄÁù¸öÓÃÓÚÌáÒé´¹µö¹¥»÷µÄÓòÃû£¬ÕâÁù¸öÓòÃû±ðÀëÊÇmy-iri.org¡¢hudsonorg-my-sharepoint.com¡¢senate.group¡¢adfs-senate.services¡¢adfs-senate.emailºÍoffice365-onedrive.com£¬ÆäÖÐÈý¸öÓòÃû¼Ùð³ÉÃÀ¹ú²ÎÒéÔºµÄÍøÕ¾¡£Smith°µÊ¾Î¢ÈíÒÑÔÚ´ÓǰÁ½ÄêÄÚÊÕÊÜÁËAPT×éÖ¯µÄ84¸öÓòÃû¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/russia-election-hacking.html
¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖÕë¶Ôº«¹úÆóÒµµÄй©¸øÁ´¹¥»÷»î¶¯Operation Red Signature
Ç÷Ïò¿Æ¼¼×êÑÐÍŶÓÔÚ7Ôµ׷¢ÏÖÖØÒªÕë¶Ôº«¹úÆóÒµµÄй©¸øÁ´¹¥»÷»î¶¯Operation Red Signature¡£¸Ã¹¥»÷»î¶¯µÄÖ÷ÕÅÊÇÇÔÊØÐÅÏ¢¡£¹¥»÷ÕßÇÔÈ¡ÁËÒ»¸öÔ¶³ÌÖ§³Ö½â¾ö¹æ»®ÌṩÉ̵ÄÖ¤Ê飬²¢Ê¹ÓÃËüÀ´¶Ô¶ñÒâÈí¼þ½øÐÐÊðÃû¡£¶øºó¹¥»÷ÕßÈëÇÖÁ˸ù«Ë¾µÄ¸üзþÎñÆ÷£¬µ±±ØÒª¸üеÄÓû§µÄIPÊÇÆäÖ¸±ê×éÖ¯µÄIPÁìÓòÄÚʱ£¬¸üзþÎñÆ÷½«ÏòÓû§·¢ËÍÔ¶¿ØÄ¾Âí9002 RAT¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/
¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖÕë¶ÔÄ«Î÷¸çµÄ¶ñÒâ¹¥»÷»î¶¯Dark Tequila
¿¨°Í˹»ù×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶ÔÄ«Î÷¸çµÄ¶ñÒâ¹¥»÷»î¶¯Dark Tequila¡£Dark TequilaµÄÖØÒªÖ÷ÕÅÊÇÇÔÈ¡²ÆÕþÐÅÏ¢£¬µ«Ò²Õë¶ÔһЩʢÐÐÍøÕ¾µÄµÇ¼ʹ´¦£¬ÆäÖ¸±êÁбíÖØÒªÔ̺¬¼¸¼ÒÄ«Î÷¸çÒøÐС£¸Ã¹¥»÷»î¶¯µÄϰȾ·½Ê½ÓÐÁ½ÖÖ£¬ÍøÂç´¹µö¹¥»÷ºÍUSBÉ豸ϰȾ¡£ÈôÊÇÊÜϰȾÕß²»ÔÚÄ«Î÷¸ç»ò²»ÊǸÐÐËÖµÄÖ¸±ê£¬Ôò»á´ÓÊܺ¦ÕߵĻúеԶ³ÌÐ¶ÔØ¸Ã¶ñÒâÈí¼þ¡£Dark TequilaÊÇÒ»ÖÖ¸´ÔӵĶñÒâÈí¼þ£¬Ô̺¬¶à¸öÖ°ÄÜÄ£¿é£¬ËùÓÐÇÔÈ¡µÄÊý¾Ý¶¼Í¨¹ý¼ÓÃܵķ½Ê½ÉÏ´«ÖÁ·þÎñÆ÷¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/dark-tequila-anejo/87528/
¡¾Êý¾Ýй¶¡¿ÃÀAugustaÒ½ÁÆÖÐÐÄÈ·ÈÏ2017Äê9ÔÂÔ¼41.7Íò»¼ÕßµÄÐÅϢй¶
ÃÀ¹úAugustaÒ½ÁÆÖÐÐÄ7ÔÂ31Èյĵ÷²éÁ˾ÖÏÔʾ£¬2017Äê9ÔÂÕë¶ÔÆäÒ½Áƹ¤×÷ÈËÔ±µÄÍøÂç´¹µö¹¥»÷µ¼ÖÂÔ¼41.7Íò»¼ÕßµÄÊý¾Ý±»ÇÔ¡£Ð¹Â¶µÄÊý¾ÝÔ̺¬µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢Ò½ÁƼͼ±àºÅ¡¢Ò½ÖκÍÊÖÊõÐÅÏ¢¡¢Õï¶ÏÁ˾֡¢Ò©ÎïÒÔ¼°±£ÏÕÐÅÏ¢µÈ£¬ÉõÖÁÔ̺¬²¿ÃÅ»¼ÕßµÄÉç±£ºÅÂëºÍ¼ÝÕÕºÅÂë¡£ÕâЩÐÅÏ¢¿ÉÄܻᱻºóÐøµÄÍøÂç´¹µö¹¥»÷¡¢Éí·ÝڲƻÉõÖÁÀÕË÷»î¶¯ËùÀûÓá£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/augusta-health-center-reveals/
¡¾·ÖÎö»ã±¨¡¿×êÑлú¹¹°ä²¼2018ÄêQ2ÍøÂçÍþвÇ÷ÏòµÄ·ÖÎö»ã±¨
ƾ¾ÝRapid7µÄ×îÐÂÍþв·ÖÎö»ã±¨£¬Ôì×÷ÒµÕýÔâµ½Ô½À´Ô½¶àµÄ¶ñÒâ¹¥»÷»î¶¯¡£Õë¶ÔËùÓÐÐÐÒµµÄÍ´´¦ÍµÇÔ¹¥»÷ºÍÕË»§Ð¹Â¶ÒÔ¼°Ô¶³Ì½Ó¼û¹¥»÷ÔÚÔö³¤¡£Õë¶ÔÓ×ÐÍÆóÒµµÄ¹¥»÷»î¶¯µÄÒ»°ëÊÇÔ¶³ÌÈëÇÖ¡£¶ø6Ô·ÝÍþвÊÂÎñµÄµÚÒ»ÃûÊÇÕë¶Ô±¾µØÕË»§µÄ±©Á¦ÆÆ½â¹¥»÷¡£Í¬Ê¹Øë¶Ô·ÓÉÆ÷¡¢web·þÎñÆ÷µÄ¶ñÒâÍÚ¿óÈí¼þµÄ×¢Èë¹¥»÷ÔÚ¹ÄÆð¡£
ÔÎÄÁ´½Ó£ºhttps://www.rapid7.com/globalassets/_pdfs/research/rapid7-threat-report-2018-q2.pdf
¡¾·ì϶²¹¶¡¡¿×êÑÐÈËÔ±Åû¶°¬Ä¬ÉúDeltaV DCS¹¤×÷Õ¾ÖеĶà¸ö°²È«·ì϶
°²È«×êÑÐÈËÔ±·¢ÏÖ°¬Ä¬ÉúDeltaV DCS¹¤×÷Õ¾´æÔÚ¶à¸ö°²È«·ì϶¡£°¬Ä¬ÉúDeltaV¹¤×÷Õ¾ÊÇרΪÔËÐÐDeltaVÀûÓöøÉè¼ÆµÄרÓÃÍÆËã»ú£¬ÆäÔÚÈ«ÇòÁìÓòÄÚÖØÒªÓÃÓÚ»¯Ñ§ºÍÄÜÔ´ÁìÓò¡£½ÏÑϳÁµÄ·ì϶Ô̺¬Õ»»º³åÇøÒç¶Âí½Å£¨CVE-2018-14793£©£¬¸Ã·ì϶¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐУ»²»ÕýÈ·µÄõè¾¶ÑéÖ¤·ì϶£¨CVE-2018-14795£©£¬¸Ã·ì϶¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ»DLL½Ù³Ö·ì϶£¨CVE-2018-14797£©£¬¿Éµ¼ÖÂËÁÒâ´úÂëÖ´Ðеȡ£¸Ã¹«Ë¾ÒѾ°ä²¼ÁËÓйؽ¨¸´²¹¶¡¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/flaws-emerson-workstations-allow-lateral-movement


¾©¹«Íø°²±¸11010802024551ºÅ