¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181017

°ä²¼¹¦·ò 2018-10-17
1¡¢×êÑÐÅú×¢9Ô·ÝÕë¶ÔiPhoneµÄ¶ñÒâÍÚ¿ó¹¥»÷Ôö³¤½ü400%


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Check PointµÄ9ÔÂÈ«ÇòÍþвָÊýÏÔʾ£¬Õë¶ÔiPhoneµÄ¶ñÒâÍÚ¿ó¹¥»÷Ôö³¤Á˽ü400%¡£ÕâÒ»¼¤Ôö²úÉúÔÚ9ÔµÄ×îºóÁ½¸öÐÇÆÚ£¬Í³Ò»Ê±ÆÚÕë¶ÔSafariÓû§µÄÍÚ¿ó¹¥»÷Ò²´ó·ùÔö³¤¡£CoinhiveÍÚ¿ó¾ç±¾´Ë¿ÌÓ°ÏìÁËÈ«Çò19%µÄ×éÖ¯£¬ÅÅÔÚÍþвָÊýµÄµÚһ룬µÚ¶þÃûÊÇÓÃÓÚÇÔÈ¡Ãô¸ÐÐÅÏ¢ºÍÌáÒéDoS¹¥»÷µÄľÂíDorkbot£¨7%£©¡£9Ô·Ý×îÊÜÓ­½ÓµÄÒÆ¶¯¶ñÒâÈí¼þÊÇLokibot¡¢LotoorºÍTriada¡£


Ô­ÎÄÁ´½Ó£º
https://blog.checkpoint.com/2018/10/15/september-2018s-most-wanted-malware-cryptomining-attacks-against-apple-devices-on-the-rise/


2¡¢×êÑÐÍŶӷ¢ÏÖÓÃÓÚ·Ö·¢Agent TeslaºÍLokiµÄ¶ñÒâ¹¥»÷»î¶¯

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Cisco Talos×êÑÐÍŶӷ¢ÏÖÒ»¸öеĶñÒâÈí¼þ·Ö·¢»î¶¯£¬¸Ã»î¶¯Öз¸×ï·Ö×ÓÅú¸ÄÁËÒ»¸öÒÑÖªµÄ·ì϶ÀûÓÃÁ´£¬Ê¹µÃ¹¥»÷¸üÄÑÒÔ±»¼ì²âµ½¡£¸Ã¹¥»÷»î¶¯Ö¼ÔÚ´«²¼ÖÁÉÙÈý¸öÓÐЧºÉÔØ£ºAgent Tesla¡¢LokiºÍGamarue¡£ËüÃǶ¼¿ÉÓÃÓÚÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬¶øÖ»ÓÐLokiûÓÐÔ¶³Ì½Ó¼ûÖ°ÄÜ¡£¸Ã¹¥»÷ÓÉÔ̺¬¶ñÒâDOCXÎĵµµÄµç×ÓÓʼþÆðÍ·£¬¸ÃWordÎĵµÄܹ»ÏÂÔØºÍ´ò¿ªÓÃÓÚ·Ö·¢ÓÐЧºÉÔØµÄRTFÎļþ¡£×êÑÐÈËÔ±·¢ÏÖ58¸ö·À²¡¶¾·¨Ê½ÖÐÖ»ÓÐ2¸ö½«¸ÃRTFÎļþ¼ø±ðΪ¶ñÒâÎļþ¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2018/10/old-dog-new-tricks-analysing-new-rtf_15.html


3¡¢Ponemon Institute°ä²¼2018ÄêÖն˰²È«·çÏյĵ÷²é»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Ponemon InstituteµÄ2018ÄêÖն˰²È«·çÏÕµ÷²é»ã±¨Ö¸³ö£¬ÆóÒµÃæ¶ÔµÄÍþвÔÚѸ¿ì²úÉú±ä¶¯£¬¶ø´«Í³µÄ°²È«½â¾ö¹æ»®×èÖ¹µÄ¹¥»÷µÚÒ»´ÎÉÙÓÚËüÃÇ©µôµÄ¹¥»÷¡£»ã±¨µÄÖØÒª·¢ÏÖÔ̺¬£ºÍøÂç¹¥»÷µÄ³É±¾Ñ¸¿ìÔö³¤£¬´Ó2017ÄêÖÁ2018Äêì­Éý42% £»ÁãÈÕ¹¥»÷ÊÇÆóÒµÃæ¶ÔµÄ×î´óÍþв £»ÏÖÓеķÀÓù´ëʩʹÆóҵ¶³öÔÚÍþв֮Ï£¬·À²¡¶¾Èí¼þ©µôµÄ¹¥»÷Õ¼57% £»¾ùÔÈÿ¸öÖÕ¶ËÊܵ½µÄËðʧΪ440ÃÀÔª £»ÁãÈÕ¹¥»÷ÈÆ¹ýÏÖÓзÀÓùµÄ¸ÅÂÊÊÇ´«Í³²½ÖèµÄ4±¶ £»ÖÕ¶Ë×°ÖÃв¹¶¡µÄ¾ùÔÈÑÓ³¤ÌìÊýΪ102Ìì¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.barkly.com/ponemon-2018-endpoint-security-risk


4¡¢×êÑÐÈËÔ±Åû¶iOS 12ÖеÄÁíÒ»¸öÃÜÂëÈÆ¹ý·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Î÷°àÑÀ×êÑÐÈËÔ±Jose RodriguezÔÚ9Ôµ׷¢ÏÖiOS 12´æÔÚÒ»¸öÃÜÂëÈÆ¹ý·ì϶£¬¸Ã·ì϶ÒÑÔÚiOS 12.0.1Öн¨¸´£¬µ«RodriguezÔÚiOS 12.0.1ÖÐÓÖ·¢ÏÖÁËÒ»¸öеÄÃÜÂëÈÆ¹ý·ì϶£¬¸Ã·ì϶ÔÊÐí¿ÉÎïÀí½Ó¼ûÉ豸µÄ¹¥»÷ÕßÈÆ¹ýËø¶¨ÆÁÄ»½Ó¼ûÏà²á²¢½«ÕÕÆ¬·¢Ë͸øÈκÎApple MessagesÓû§¡£ÔÚAppleÍÆ³öеĽ¨¸´²¹¶¡Ö®Ç°£¬ÄúÄܹ»Í¨¹ý½ûÓá°ÔÚËø°´Ê±ÔÊÐí½Ó¼ûSiri¡±À´ÁÙʱ½â¾ö¸ÃÎÊÌâ¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/10/iphone-lock-passcode-bypass.html


5¡¢±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳÔâÀÕË÷Èí¼þ¹¥»÷£¬FBIÒÑȾָµ÷²é

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

±¾ÖÜÒ»ONWASA£¨°ºË¹Â幩ˮºÍÎÛË®ÖÎÀí¾Ö£©°ä²¼ÐÂÎųÆ£¬±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳµÄÄÚ²¿ÍÆËã»úϵͳ£¨Ô̺¬·þÎñÆ÷ºÍÓ×ÎÒµçÄÔ£©Ôâµ½ÀÕË÷Èí¼þEmotet¹¥»÷¡£ONWASAûÓÐÅû¶¾ßÌåµÄÊê½ð½ð¶î¡£¸Ã¹¥»÷²úÉúÔÚ10ÔÂ4ÈÕ£¬Çé¿öËæºóÒѵõ½½ÚÔì¡£¹ÌȻûÓпͻ§ÐÅÏ¢ÔÚÕâ´Î¹¥»÷ÖÐÊܵ½Ó°Ï죬µ«ÐíÎÞÊý¾Ý¿â±ØÒª³Á½¨¡£Ä¿Ç°FBI¡¢ºÓɽ°²È«ÊýºÍ±±¿¨ÂÞÀ´ÄÉÖݵ±¾ÖÒÑȾָµ÷²é¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/feds-investigate-after-hackers-attack-water-utility


6¡¢AndroidŤתÔÚÅ·Ã˵ÄÕþ²ß£¬²¿ÃÅԤװGoogle app½«ÊÕ·Ñ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ƾ¾ÝCNBC±¨Â·£¬2018Äê7ÔÂÅ·ÃËÒòAndroidµÄ¢¶ÏÎÊÌâ¶ÔGoogle·£¿î50ÒÚÃÀÔª£¬ÎªÁË»ØÓ¦Ôì²Ã£¬Google°ä·¢½«Å¤×ªÆäÔÚÅ·Ã˵ØÓòµÄÕþ²ß£¬ÏòԤװGmail¡¢µØÍ¼ºÍYouTubeµÈGoogle appµÄÅ·ÃËÉ豸Ôì×÷ÉÌÊÕÈ¡Ðí¿É·Ñ¡£ÕâÏîеÄÐí¿ÉºÍ̸½«ÓÚ2018Äê10ÔÂ29ÈÕÔÚÅ·Ã˵ØÓòÉúЧ¡£Ä¿Ç°»¹Ã»ÓÐÒ»¼ÒÊÖ»ú³§ÉÌ×ö³ö¹«¿ª»ØÓ¦¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/google/google-s-android-apps-are-no-longer-free-for-european-smartphone-makers/


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù