ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öµ±¾Ö»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷£»¹È¸èµ«Ô¸½«HTTPSÖ¤ÊéµÄÐÔÃüÖÜÆÚËõ¶Ìµ½Ò»Äê
°ä²¼¹¦·ò 2019-08-20
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/coordinated-ransomware-attack-hits-23-texas-government-agencies/147457/
2¡¢¹È¸èµ«Ô¸½«HTTPSÖ¤ÊéµÄÐÔÃüÖÜÆÚËõ¶Ìµ½Ò»Äê
¹È¸èµ«Ô¸½«SSLÖ¤Ê飨ÓÃÓÚ±£»¤HTTPS¼ÓÃÜÁ÷Á¿£©µÄÐÔÃüÖÜÆÚ´ÓĿǰµÄÁ½ÄêËõ¶Ìµ½Ò»Äê¶à¡£¸ÃÌá°¸Óɹȸè´ú±íRyan Sleevi ÓÚ6ÔÂÔÚÏ£À°ÈûÈøÂåÄá»ù½øÐеÄCA/BÂÛ̳F2F»áÒéÉÏÌá³ö¡£Æ¾¾ÝPer SleeviµÄÌáÒ飬´Ó2020Äê3ÔÂÆðÍ·£¬ËùÓÐÐÂÐû¸æµÄSSLÖ¤ÊéµÄÐÔÃüÖÜÆÚ½«±äΪ397Ì죨ԼĪһÄêÁãÒ»¸öÔ£©£¬¶ø²»Êǵ±Ç°µÄ825Ì죨ԼĪÁ½ÄêÁãÈý¸öÔ£©¡£¸Ã»áÒéÉÏûÓжԸÃÌá°¸½øÐÐͶƱ£¬µ«ÊÇ´óÎÞÊýä¯ÀÀÆ÷¹©¸øÉ̶¼°µÊ¾Ö§³ÖеÄSSLÖ¤ÊéÐÔÃüÖÜÆÚ¡£ÔÚ´ÓǰµÄÊ®ÎåÄêÖУ¬ä¯ÀÀÆ÷Ôì×÷ÉÌÒѾ²»ÐÝÏû¼õSSLÖ¤ÊéµÄÐÔÃüÖÜÆÚ£¬´Ó8ÄêÏ÷¼õµ½5Ä꣬¶øºóÏ÷¼õµ½3Ä꣬¶øºóÏ÷¼õµ½Á½Ä꣬×îºóÒ»´Î¸ü¸Ä²úÉúÔÚ2018Äê3Ô£¬Æäʱä¯ÀÀÆ÷Ôì×÷ÉÌÊÔͼ½«SSLÖ¤ÊéÊÙÃü´Ó3ÄêÏ÷¼õµ½1Ä꣬µ«ÔÚÖ¤ÊéÐû¸æ»ú¹¹¿¹ÒéºóÍ×ÐÖÁÁ½Äê¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/
3¡¢ÃÀ¹ú¹ú¶È°²È«¾ÖÒªÇó¹ú»á³ÁÐÂÓÀÔ¶ÊÚȨ¼äµý´òËã
ÃÀ¹ú¹ú¶Èµý±¨¾Ö¾Ö³¤ÒªÇó¹ú»á¶ÔÒ»¸ö¼äµýÏîÄ¿³Áв¢ÇÒÓÀÔ¶ÊÚȨ£¬¸ÃÏîÄ¿ÊÇÖ¸¹ú¶È°²È«¾Ö£¨NSA£©·¸·¨ÍøÂçÊý°ÙÍòÃÀ¹ú¹«ÃñµÄͨ»°¼Í¼£¬ÕâÒ»ÏîĿһÔÙ±»ÒÔΪÊÇÎ¥ÏÜÐÐΪ£¬NSAÆÅ×ÚѹÁ¦²»µÃ²»¹Ø¹Ø¸ÃÏîÄ¿¡£NSAÁ½´Î±»ÆÈÈÏ¿ÉËüÍøÂçÁËÊý°ÙÍò²»Ó¦¸ÃÕ¼Óеĵ绰¼Í¼£¬Ò»´ÎÊÇÔÚ2018Äê6Ô£¬NSAɾ³ýÁËǰһÄêÍøÂçµÄ5.34ÒÚ¸öͨ»°¼Í¼£¬µ«ÔÚ2018Äê10ÔÂͬÑùµÄʼþÔٴβúÉú£¬Ö±µ½2019Äê6Ô²ű»ÆØ¹â¡£µý±¨¾Ö¾Ö³¤Dan CoatsÔÚÆäÔÚÖ°µÄ×îºóÒ»ÌìÏòÁ½¸ö¹Ø¼ü²ÎÒéԺίԱ»áÕÆ¹ÜÈË·¢³öÁËÕâ·â½¨ÒéÐÅ¡£
ÔÎÄÁ´½Ó£ºhttps://www.theregister.co.uk/2019/08/16/spying_reauthorization_coats/
4¡¢×êÑÐÈËÔ±½öʹÓÃÖÇÄÜÊÖ»ú¿É¼ì²â³ö¼üÈëµÄÄÚÈÝ
ÄÏ·½ÎÀÀí¹«»á´óѧ£¨SMU£©µÄÒ»ÏîÐÂ×êÑÐÅú×¢£¬Äܹ»½öÀûÓÃÖÇÄÜÊÖ»úÀ¹½Ø´ò×ÖµÄÉùÒô£¬²¢ÆÆÒë¼üÈëµÄÄÚÈÝ¡£×êÑÐÈËÔ±¿ÉÄܽâÂëʹÓÃͨ³£¼üÅ̺ÍÖÇÄÜÊÖ»úÊäÈëµÄ´ó²¿ÃÅÄÚÈÝ-¼´±ãÔÚ³ä³âÁËÆäËûÈË´ò×ֺͽ»Ì¸ÉùÒôµÄàÐÔÓ»áÒéÊÒÖÐÒ²ÊÇÈç´Ë¡£Eric C. Larson°µÊ¾¡°ÎÒÃÇ¿ÉÄÜÒÔ41£¥µÄµ¥´ÊÕýÈ·ÂÊÀ´»ñÈ¡ÈËÃÇËùÊäÈëµÄÄÚÈÝ¡£¡±ÒªÖ´ÐÐÕâÖÖ¹¥»÷£¬¹¥»÷Õß±ØÒªÖªÂ·×À×ÓµÄ×ÊÁÏÀàÐÍ£¬ÓÉÓÚ·ÖÆçµÄ×À×ÓÔÚ´ò×Öʱ»á²úÉú·ÖÆçµÄÉù²¨¡£¹¥»÷Õß»¹±ØÒªÖªÂ·×ÀÃæÉÏÓжಿÊÖ»úÒÔ¼°ÈôºÎ´ÓÖвÉÑù¡£
ÔÎÄÁ´½Ó£ºhttps://www.helpnetsecurity.com/2019/08/19/smartphone-intercept-typing/
5¡¢×êÑÐÍŶӰ䲼½©Ê¬ÍøÂçMyKings±äÖֵķÖÎö»ã±¨
2019Äê5Ô·ÝÇ÷Ïò¿Æ¼¼ÔÚÑÇÌ«µØÓòÒ»¼Òµç×Ó¹«Ë¾·¢ÏÖÁ˽©Ê¬ÍøÂçMyKingsµÄ±äÖÖ¡£¸Ã±äÖÖ¸ü¸ÄÁË»úеµÄϵͳע²á±í×÷ÎªÓÆ¾ÃÐÔ»úÔ죬ÕâЩע²á±íÏîÕÆ¹Ü¶Ô¶ñÒâURLµÄC£¦C»Øµ÷¡£×êÑÐÈËÔ±·¢ÏÖÕâЩÌõ¿îÊÇÔÚ2017ÄêÔö³¤µÄ£¬Åú×¢¶ñÒâÈí¼þ±äÖÖÔÚ·¢ÏÖ֮ǰÒѾÔÚ¹«Ë¾µÄϵͳÖаµ²ØÁËԼĪÁ½Äꡣƾ¾ÝÇ÷Ïò¿Æ¼¼µÄÊý¾Ý£¬½ØÖÁ2018ËêÊ×MyKingsÒѾϰȾÁ˳¬¹ý50Íǫ̀É豸£¬²¢ÍÚ¾òÁËÔ¼230ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-a-mykings-variant-with-bootloader-persistence-via-managed-detection-and-response/
6¡¢¹¥»÷ÕßÀûÓÃÔ¶¿ØÄ¾ÂíAdwind¹¥»÷¹«ÓÃÊÂÒµ²¿ÃÅ
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/adwind-remote-access-trojan-hits-utilities-sector/


¾©¹«Íø°²±¸11010802024551ºÅ