¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180827

°ä²¼¹¦·ò 2018-08-27

¡¾Êý¾Ýй¶¡¿°®¶ûÀ¼µçÐŹ«Ë¾EirµÄһ̨±Ê¼Ç±¾±»µÁ £¬µ¼ÖÂÔ¼3.7ÍòÓû§µÄÐÅϢй¶


ƾ¾Ý°®¶ûÀ¼µçÐŹ«Ë¾Eir¹ÙÍøÉϵÄ֪ͨ £¬¸Ã¹«Ë¾µÄһ̨Ô̺¬Óû§Êý¾ÝµÄδ¼ÓÃܵıʼDZ¾µçÄÔÔâÇÔ £¬µ¼ÖÂÔ¼3.7ÍòÓû§µÄÓ×ÎÒÐÅϢй¶¡£Ð¹Â¶µÄÊý¾ÝÔ̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëºÍeirÕ˺Å¡£¸Ã¹«Ë¾³ÆÐ¹Â¶µÄÊý¾Ý²»Ô̺¬ÈκÎÓû§µÄ²ÆÕþÊý¾Ý¡£Ä¿Ç°¸Ã¹«Ë¾ÒÑÏòÊý¾Ý± £»¤×¨Ô±ºÍ°®¶ûÀ¼¾¯Ô±´«µÝÁËÕâ´ÎÊÂÎñ¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75655/data-breach/eir-data-breach.html


¡¾Íþвµý±¨¡¿×êÑÐÍŶӳÆÈýÐÇ¡¢»ªÎªµÈ11¼Ò³§É̵ÄAndroidÊÖ»úÒ×ÊÜATºÅÁî¹¥»÷


°²È«×êÑÐÍŶӷ¢ÏÖ11¸öÊÖ»ú³§É̵ÄAndroidÖÇÄÜÊÖ»úÒ×ÊÜATºÅÁîµÄ¹¥»÷ £¬Ô̺¬»ªË¶¡¢Google¡¢HTC¡¢»ªÎª¡¢åÚÏë¡¢LG¡¢Ä¦ÍÐÂÞÀ­¡¢ÈýÐÇ¡¢Ë÷Äá¡¢ÖÐÐ˺ÍLineageOS¡£¸Ã×êÑÐÍŶӷÖÎöÁËÕâ11¼Ò³§É̵Ä2000¶à¸öAndroid¹Ì¼þ¾µÏñ £¬·¢ÏÖÕâЩÉ豸֧³Ö³¬¹ý3500ÖÖ·ÖÆçÀàÐ͵ÄATºÅÁî £¬ÆäÖÐһЩºÅÁîÄܹ»½Ó¼û¼«¶ÈΣÏÕµÄÖ°ÄÜ¡£ÕâЩºÅÁîÄܹ»Í¨¹ýUSB¶Ë¿Ú½Ó¼û¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/smartphones-from-11-oems-vulnerable-to-attacks-via-hidden-at-commands/


¡¾Íþвµý±¨¡¿Google×êÑÐÈËÔ±³Æµï±¤Ö®Ò¹µÄAndroid appÒ×ÊÜMitD¹¥»÷


Google°²È«×êÑÐÈËÔ±·¢ÏÖ¼«¶ÈÊÜÓ­½ÓµÄÓÎÏ·µï±¤Ö®Ò¹µÄAndroid°æÒ×ÊÜMitD¹¥»÷¡£¹¥»÷ÕßÄܹ»Í¨¹ýÒÑ×°ÖÃÔÚÓû§ÊÖ»úÉϵĵÍȨÏÞ¶ñÒâapp½Ù³Öµï±¤Ö®Ò¹appµÄ×°Öùý³Ì²¢×°ÖÃÓµÓиü¸ßȨÏÞ¼¶´ËÍâÆäËü¶ñÒâÀûÓá£×êÑÐÈËÔ±»¹·ÖÏíÁËÒ»¸ö¹¥»÷¹ý³ÌµÄÑÝʾÊÓÆµ¡£µï±¤Ö®Ò¹µÄ¿ª·¢ÉÌEpic Games°ä²¼ÁËа汾2.1.0ÒÔ½¨¸´´ËÎÊÌâ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/fortnite-android-app-vulnerable-to-man-in-the-disk-attacks/


¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶ÔÈÕ±¾µÄ´ó¹æÄ£À¬»øÓʼþ»î¶¯


Ç÷Ïò¿Æ¼¼×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶ÔÈÕ±¾µÄ´ó¹æÄ£À¬»øÓʼþ»î¶¯¡£¸ÃÀ¬»øÓʼþ»î¶¯Óɽ©Ê¬ÍøÂçCutwail·Ö·¢ £¬ÀûÓû¥ÁªÍø²éÎÊÎļþIQY´«²¼¶ñÒâÈí¼þBEBLOHºÍURSNIF¡£×êÑÐÍŶÓÔÚ2018Äê8ÔÂ6ÈÕ¼ì²âµ½¸Ã»î¶¯ £¬¸Ã»î¶¯ÊµÏÖÓÚ8ÔÂ9ÈÕ £¬¹²·Ö·¢ÁËÔ¼50Íò·âÀ¬»øÓʼþ¡£ÈôÊǼì²âµ½·ÇÈÕ±¾µÄIPµØÖ· £¬Ôò²»»áÏÂÔØ¶ñÒâµÄÓÐЧºÉÔØ¡£ÆäÓÐЧºÉÔØBEBLOHÊÇÒ»¸öÒøÐÐľÂí £¬¶øURSNIFÔòÊÇÒ»¸ö³ÛÃûµÄÓÃÓÚÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ¡£


Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/iqy-and-powershell-abused-by-spam-campaign-to-infect-users-in-japan-with-bebloh-and-ursnif/


¡¾Íþвµý±¨¡¿×êÑÐÍŶÓÑÝʾͨ¹ýUSB³äµçÏßÈëÇÖÍÆËã»úµÄUSBHarpoon¹¥»÷


°²È«×êÑÐÍŶÓÑÝʾÈôºÎÀûÓÃUSB³äµçÏßÈëÇÖÍÆËã»úµÄUSBHarpoon¹¥»÷¡£USBHarpoonÀûÓóäµçÏß¶ø²»ÊÇUSBÇý¶¯Æ÷À´ÊµÏÖÈëÇÖ £¬ÕâʹÆäÔ½·¢ÒþÄä¡£¸Ã³äµçÏß´øÓиĽøµÄÏÎ½ÓÆ÷ £¬ÔÊÐíµçÁ÷ºÍÊý¾Ýͨ¹ý £¬´ËÖ°ÄÜʹÆäÄܹ»¹²Í¬ÈκÎUSBÉ豸¶ø²»»áÒýÆðÒÉ»ó¡£USBHarpoon¹¥»÷Äܹ»Æô¶¯ÏÂÔØºÍÖ´ÐÐÓÐЧºÉÔØµÄºÅÁî¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75644/hacking/usbharpoon-attack.html


¡¾Íþвµý±¨¡¿FireEyeÅû¶ÒÉËÆÒÁÀÊÌáÒéµÄÕë¶ÔÃÀ¹ú¡¢Ó¢¹úºÍÖж«µÄÐéαÐÂÎÅÍøÂç

FireEye½üÈÕ·¢ÏÖÁËÒ»ÏîËÆºõÀ´×ÔÒÁÀʵĿÉÒɻ £¬¸Ã¶ñÒâ»î¶¯ÀûÓöà¸öÉ罻ýÌåÆ½Ì¨ÉϵÄÐéαÐÂÎÅÍøÕ¾ºÍÓйØÕË»§µÄ¼¯ÈºÍøÂç £¬°ä²¼ÇкÏÒÁÀÊÀûÒæµÄÕþÖÎÐÂÎÅ¡£ÆäÕë¶ÔµÄµØÓòÔ̺¬ÃÀ¹ú¡¢Ó¢¹ú¡¢À­¶¡ÃÀÖÞºÍÖж«µØÓò £¬Ðû´«µÄÄÚÈÝÔ̺¬·´É³Ìذ¢À­²®¡¢·´ÒÔÉ«ÁкÍÇ×°ÍÀÕ˹̹ÒÔ¼°Ö§³ÖÃÀ¹úÓÐÀûÓÚÒÁÀʵľßÌåÕþ²ß £¬ÈçÃÀÒÁºËºÍ̸£¨JCPOA£©µÈ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.fireeye.com/blog/threat-research/2018/08/suspected-iranian-influence-operation.html