Õë¶Ô»ªË¶Live Update¹©¸øÁ´¹¥»÷£º2019ÄêµçÐÅ·¸×ï»ã±¨£»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨Ïµ
°ä²¼¹¦·ò 2019-03-26
2019Äê1Ô¿¨°Í˹»ù³¢ÊÔÊÒ·¢ÏÖÒ»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄ¸´ÔÓ¹©¸øÁ´¹¥»÷£¬Õâ´Î¹¥»÷²úÉúÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä£¬¿ÉÄÜÓ°ÏìÁËÈ«Çò³¬¹ý100ÍòÓû§¡£»ªË¶Live UpdateÊÇԤװÔÚ´óÎÞÊý»ªË¶µçÄÔÉϵÄʵÓ÷¨Ê½£¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯·¨Ê½µÈ×é¼þ¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÖ¸±êMACµØÖ·µÄÁÐ±í£¨ÊýÁ¿Îª600¸öÒÔÉÏ£©£¬µ«Ö¸±êȺÌåµÄÉí·ÝÉв»Ã÷È·¡£ÓÉÓÚÑù±¾ÊÇÓúϷ¨Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£©£¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üзþÎñÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ£¬µ¼Ö¸ù¥»÷³Ö¾Ãδ±»·¢ÏÖ¡£Ä¿Ç°µÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйء£
ÔÎÄÁ´½Ó£º
https://securelist.com/operation-shadowhammer/89992/2¡¢×êÑÐÍŶӰ䲼ÀÕË÷Èí¼þHackedµÄ½âÃÜÆ÷
Emsisoft°ä²¼ÀÕË÷Èí¼þHackedµÄÃâ·Ñ½âÃÜÆ÷¡£¸ÃÀÕË÷Èí¼þÓÚ2017ÄêÆðÍ·ÔË×÷£¬ÖØÒªÕë¶ÔÓ¢Óï¡¢ÍÁ¶úÆäÓï¡¢Î÷°àÑÀÓïºÍÒâ´óÀûÓïÓû§¡£ÔÚϰȾϵͳºó£¬Hacked»áÏÔʾһ¸öÐéαµÄWindows¸üÐÂÆÁÄ»£¬²¢ÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.hackedÀ©´óÃû¡£Êܵ½Ï°È¾µÄÓû§Äܹ»´ÓÒÔÏÂÁ´½ÓÖÐÏÂÔØ¸Ã¹¤¾ß²¢ÒÔÖÎÀíԱȨÏÞÔËÐУ¬¸Ã¹¤¾ß½«×Ô¶¯½âÃÜËùÓÐ.hackedÀ©´óÃûµÄ¼ÓÃÜÎļþ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/ransomware/decryptor/emsisoft-has-released-a-decryptor-for-the-hacked-ransomware/3¡¢Å·ÖÞÐ̾¯×éÖ¯¼°Ç÷Ïò¿Æ¼¼½áºÏ°ä²¼2019ÄêÍøÂçµçÐÅ·¸×ï»ã±¨

ƾ¾ÝÅ·ÖÞÐ̾¯×éÖ¯ºÍÇ÷Ïò¿Æ¼¼½áºÏ°ä²¼µÄ2019ÄêÍøÂçµçÐÅ·¸×ï»ã±¨£¬Ã¿ÄêµçÐÅڲƵijɱ¾¹À¼ÆÎª290ÒÚÅ·Ôª£¨ºÏ330ÒÚÃÀÔª£©¡£¸Ã»ã±¨Ç¿µ÷£¬µçÐÅÚ²ÆÔÚ³ÉΪ´«Í³½ðÈÚ·¸×ïµÄµÍ·çÏÕ´úÌæ¹æ»®£¬³É±¾ÉϵĽµµÍºÍÈëÇÖÉ豸¿ÉÓÃÐÔµÄÔö³¤Ê¹µÃÕâÖÔìÛÕ©ÐÐΪ²»ÐÝÔö³¤¡£·¸×ï·Ö×ÓµÄÖØÒªÖ¸±êÊÇÓû§»òÔËÓªÉ̵ÄÕË»§£¬²¢´ÓÖз¸·¨»ñµÃ½ðÇ®¡£
ÔÎÄÁ´½Ó£º
https://www.europol.europa.eu/newsroom/news/hold-phone-threats-lurking-behind-missed-call-and-other-forms-of-telecom-fraud4¡¢Á÷ýÌåÍøÕ¾Kanopyй¶½Ó¼ûÈÕÖ¾£¬¿ÉÓÃÓÚ¸ú×ÙÓû§Éí·Ý
°²È«×êÑÐÔ±Justin Paine·¢ÏÖÊÓÆµÁ÷ýÌåÍøÕ¾KanopyµÄElasticsearchÊý¾Ý¿âδ½øÐÐÉí·ÝÑéÖ¤£¬Ê¹µÃAPIÈÕÖ¾¼°ÍøÕ¾½Ó¼û¼Í¼¶³öÔÚÍøÉÏ¡£ÕâЩÐÅÏ¢¿ÉÓÃÓÚ¸ú×ÙÓû§µÄÅÔ¹Ûϰ¹ß¼°²éÕÒÓû§µÄÉí·Ý£¬ÀýÈç»ùÓÚ¿Í»§¶ËIP¡¢ËÑË÷/ÅÔ¹ÛµÄÊÓÆµÐÅÏ¢¡¢µØÀíÐÅÏ¢¡¢¹¦·ò´ÁºÍÉ豸ÀàÐÍ£¬ÓпÉÄܼø±ð³öÓû§µÄÉí·Ý¡£¸ÃÊý¾Ý¿âÖÁÉÙÓÚ3ÔÂ7ÈÕÆð¶³öÔÚÍøÉÏ£¬²¢ÓÚ3ÔÂ18Èյõ½±£»¤¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/video-streaming-site-kanopy-leaks-api-and-website-access-logs-776458145¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬°ä²¼30¶à¸öÐéα¾¯±¨
3ÔÂ12ÈÕÁ賿2:30×óÓÒ£¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈøË¹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³£¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©°ä²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨£¬ÒýÆðÁ˱¾µØ¾ÓÃñµÄ·¢¼±¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancaster°ä²¼µÄ£¬ÆäÓàµÄÔòÊÇÔÚDeSoto¡£Ö®ºóÕâЩϵͳһÏò´¦ÓÚÍÑ»ú״̬£¬Ö±ÖÁ3ÔÂ17ÈղŸ´ÔÕý³£·þÎñ¡£¾¯·½ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ½øÐе÷²é¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html6¡¢Î¢ÈíÐÖúNorsk Hydro¸´ÔITϵͳ£¬ÎÞÐèÖ§¸¶Êê½ð
Norsk HydroÊ×ϯ²ÆÕþ¹ÙEivind Kallevik°µÊ¾£¬¸Ã¹«Ë¾ÒѾÆðÍ·ÀûÓñ¸·Ý¸´ÔÆäITϵͳ£¬²¢ÇÒ²»³ïËãÏò¹¥»÷ÕßÖ§¸¶Êê½ð¡£À´×Ô΢ÈíºÍÆäËü°²È«ºÏ×÷ͬ°éµÄר¼ÒÔÚÔ®ÊÖNorsk Hydro½«Æä¹Ø¼üITϵͳ¸´ÔÕý³£ÔËÓª¡£ÉÏÖÜNorsk HydroÔâµ½ÍøÂç¹¥»÷£¬¸Ã¹«Ë¾È«Çò´ó²¿ÃÅÒµÎñÁìÓòµÄITϵͳ¼°ÔËÓª¶¼Êܵ½Ó°Ïì¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/microsoft-helping-norsk-hydro-restore-its-it-systems-without-paying-the-ransom-86a32a3cÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ