¶ò¹Ï¶à¶ûÒÑÔⳬ¹ý4000Íò´ÎºÚ¿Í¹¥»÷£»Ð¹¥»÷»î¶¯Scranos Operation£»ÀÕË÷Èí¼þBitPaymerбäÌå
°ä²¼¹¦·ò 2019-04-17
4ÔÂ16ÈÕOracle°ä²¼³ÁÒª²¹¶¡¸üУ¬¹²½¨¸´297¸ö·ì϶£¬ÆäÖÐÔ̺¬Database ServerÖеÄ6¸ö·ì϶¡¢Communication ApplicationsÖеÄ26¸ö·ì϶¡¢E-Business SuiteÖеÄ35¸ö·ì϶¡¢Fusion MiddlewareÖеÄ53¸ö·ì϶¡¢MySQLÖеÄ45¸ö·ì϶ºÍRetail ApplicationsÖеÄ24¸ö·ì϶¡£¾ßÌå·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£Æ¾¾ÝOracleµÄ³ÁÒª²¹¶¡°ä²¼´òË㣬ÏÂÒ»´Î³ÁÒª²¹¶¡¸üн«ÓÚ2019Äê7ÔÂ16ÈÕ°ä²¼¡£
ÔÎÄÁ´½Ó£ºhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
2¡¢GnosticplayersÏúÊÛµÚÎåÅúÓû§Êý¾Ý£¬Ô̺¬6500¶àÍò¸öÕ˺Å
ºÚ¿ÍGnosticplayersÔÚ°µÍøÂÛ̳DreamMarketÉÏÏúÊÛµÚÎåÅú±»µÁµÄÓû§Êý¾Ý£¬ÕâÅúÊý¾ÝÔ̺¬³¬¹ý6500Íò¸öÓû§ÕË»§£¬ÊÛ¼ÛΪ0.8463±ÈÌØ±Ò£¨4350ÃÀÔª£©¡£ÕâÅú±»µÁµÄÓû§¼Í¼ÊôÓÚÁù¼Òй«Ë¾£¬Ô̺¬ÓÎϷƽ̨Mindjolt£¨2800Íò£©¡¢ÔÚÏß¹ºÎïÉçÇøWanelo£¨2300Íò£©¡¢Æ»¹ûά½¨ÖÐÐÄiCracked£¨150Íò£©¡¢ÓÎÀÀ¹«Ë¾Yanolja£¨150Íò£©¡¢µç×ÓÔ¼Çë·þÎñEvite£¨1000Íò£©ºÍÅ®×ÓʱװµêModa Operandi£¨150Íò£©¡£Ä¿Ç°ÎªÖ¹GnosticplayersÏúÊ۵ı»µÁÓû§¼Í¼×ÜÊýÒÑ´ï9.32ÒÚÌõ¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/gnosticplayers-hacker-returns-with-fifth-dataset-containing-over-65-million-user-accounts-for-sale-95450e99
3¡¢·¸×ïÍÅ»ïÀûÓÃRATVERMINºóÃŹ¥»÷ÎÚ¿ËÀ¼¶à¸ö¾üʲ¿ÃÅ
FireEye×êÑÐÍŶӷ¢ÏÖÒ»¸öÕë¶ÔÎÚ¿ËÀ¼¶à¸ö¾üʲ¿ÃŵÄÓã²æÊ½´¹µö¹¥»÷»î¶¯£¬¸Ã¹¥»÷»î¶¯ÊÇ2018ÄêÕë¶ÔÎÚ¿ËÀ¼µ±¾ÖµÄ¹¥»÷»î¶¯µÄÒ»Á¬£¬¹¥»÷ÕßÓëLPRÓйء£Æ¾¾Ý¶Ô¶ñÒâÈí¼þ±àÒ빦·òµÄ·ÖÎö£¬¸Ã¹¥»÷×éÖ¯ËÆºõÖÁÉÙÓÚ2014ÄêÒÔÀ´Ò»Ïò´¦ÓÚ»îԾ״̬£¬ÆäÖ¸±êÖØÒªÊÇÎÚ¿ËÀ¼¡£ÔÚ×î½üµÄ¹¥»÷»î¶¯ÖУ¬¸Ã×é֯ʹÓÃÁ˶ñÒâÈí¼þQUASARRATºÍRATVERMIN¡£RATVERMINÊÇÒ»¸ö.NETºóÃÅ£¬¿ÉÍøÂçÊܺ¦ÕßµÄÐÅÏ¢²¢ÔËÐи÷ÀàºÅÁî¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hacker-group-uses-ratvermin-backdoor-to-target-ukrainian-military/
4¡¢°¢É£Ææ±»²¶ºó£¬¶ò¹Ï¶à¶ûÒÑÔâ·ê³¬¹ý4000Íò´ÎºÚ¿Í¹¥»÷
×Ôά»ù½âÃÜÊ×´´ÈËÖìÀû°²?°¢É£Ææ±»²¶ÒÔÀ´£¬¶ò¹Ï¶à¶û¹«¹²»ú¹¹µÄÍøÕ¾Ôâ·êÁË4000Íò´ÎÍøÂç¹¥»÷¡£ÉÏÖܶò¹Ï¶à¶û³·»ØÁ˶԰¢É£ÆæµÄÕþÖΰü±Ó£¬Õâµ¼ÖºóÕß±»²¶¡£¶ò¹Ï¶à¶ûÐÅÏ¢ºÍͨѶ¼¼Êõ²¿¸±²¿³¤Patricio Realй©³Æ£¬¹¥»÷ÖØÒªÀ´×ÔÓÚÃÀ¹ú¡¢°ÍÎ÷¡¢ºÉÀ¼¡¢µÂ¹ú¡¢ÂÞÂíÄáÑÇ¡¢·¨¹ú¡¢°ÂµØÀû¡¢Ó¢¹úºÍ¶ò¹Ï¶à¶û×ÔÉí¡£´ó²¿ÃŹ¥»÷¶¼Õë¶Ô±í½»²¿¡¢ÖÐÑëÒøÐÓ×¢×Üͳ°ì¹«ÊÒ¡¢¹ú˰¾ÖµÈ²¿Ãźͼ¸¸ö´óѧµÄÍøÕ¾¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83940/hacktivism/julian-assange-arrest-ddoss.html
5¡¢Ð¹¥»÷»î¶¯Scranos Operation£¬ÀûÓÃÓÐЧÊðÃûµÄRootkitÇÔÈ¡Óû§ÐÅÏ¢
Ò»¸öÓµÓÐÓÐЧÊðÃûµÄrootkit£¨±»³ÆÎªScranos£©ÔÚ¶à¸ö¹ú¶È´«²¼£¬ÖØÒªÓÃÓÚÇÔÈ¡Óû§µÄµÇ¼ʹ´¦¡¢Ö§¸¶ÐÅÏ¢ºÍä¯ÀÀÆ÷º¹Çà¼Í¼£¬»¹¿ÉÓÃÓÚÔÚÉç½»ÍøÂçÉÏ´«²¼À¬»øÐÅÏ¢ºÍ¸æ°×¡£Scranos¼Ù×°³ÉÊÓÆµÇý¶¯·¨Ê½£¬ÆäʹÓõÄÖ¤ÊéÊÇDigiCertÏòÉϺ£Ò»¼Ò½¡È«ÖÎÀíÕ÷ѯ¹«Ë¾Ðû¸æµÄÖ¤Ê飬Ŀǰ֤ÊéÒÀÈ»ÓÐЧ£¬¹¥»÷Õß¿ÉÄÜÊǵÁÓÃÁ˸ÃÖ¤Êé¡£Bitdefender³ÆScranos Operation²»ÐÝ·¢Õ¹£¬ÒѾϰȾÁËÓ¡¶È¡¢ÂÞÂíÄáÑÇ¡¢°ÍÎ÷¡¢·¨¹ú¡¢Òâ´óÀûºÍÓ¡ÄáµÈ¹ú¶ÈµÄÓû§¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/scranos-operation-uses-signed-rootkit-to-steal-login-and-payment-info/
6¡¢ÀÕË÷Èí¼þBitPaymerбäÌ壬ÀûÓÃPsExecϰȾÃÀ¹úÔì×÷¹«Ë¾
Ç÷Ïò¿Æ¼¼×êÑÐÈËÔ±·¢ÏÖÃÀ¹úÒ»¼ÒÔì×÷¹«Ë¾Ôâµ½ÀÕË÷Èí¼þBitPaymerбäÌåµÄ¹¥»÷¡£¸Ã±äÌ壨Ransom.Win32.BITPAYMER.TGACAJ£©ÀûÓÃPsExec½øÐзַ¢£¬²¢ÔÚÊê½ðµ¥¾ÝºÍ¼ÓÃÜÎļþµÄÀ©´óÃûÖÐʹÓÃÁËÊܺ¦¹«Ë¾µÄÃû³Æ¡£¹¥»÷ÊÂÎñ²úÉúÔÚ2ÔÂ18ÈÕÍíÉÏ9µã40·ÖÖÁÍíÉÏ11:03Ö®¼ä£¬ÓÉÓÚ¹¥»÷ÕßÖÁÉÙ±ØÒªÒ»¸öÓµÓÐÖÎÀíԱȨÏÞµÄÕÊ»§ÄÜÁ¦Í¨¹ýPsExecÔËÐкÅÁÕâÒâζ×ÅÔÚÀÕË÷Èí¼þ×°ÖÃ֮ǰ¹¥»÷ÕßÒѾͨ¹ýijÖÖ¼¿Á©»ñµÃÁËÖÎÀíԱȨÏÞ¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/new-bitpaymer-ransomware-variant-infected-us-manufacturing-company-via-psexec-3450ef8c


¾©¹«Íø°²±¸11010802024551ºÅ