ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öµ±¾Ö»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷ £»¹È¸èµ«Ô¸½«HTTPSÖ¤ÊéµÄÐÔÃüÖÜÆÚËõ¶Ìµ½Ò»Äê

°ä²¼¹¦·ò 2019-08-20
1¡¢ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öµ±¾Ö»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÉÏÖÜÎåµÂ¿ËÈøË¹Öݶà´ï23¼ÒʵÌå»ú¹¹-ÆäÖдóÎÞÊýÊÇ´¦Ëùµ±¾Ö-Ôâµ½ÀÕË÷Èí¼þ¹¥»÷ £¬µÂ¿ËÈøË¹ÖݹÙÔ±³ÆÕâÊÇÒ»¸öµ¥Ò»¹¥»÷ÕßÌáÒéµÄÕë¶ÔÐÔ¹¥»÷µÄÒ»²¿ÃÅ¡£½ØÖÁÖÜÁùÍí £¬µÂ¿ËÈøË¹ÖÝÐÅÏ¢×ÊÔ´²¿£¨DIR£©°µÊ¾Ó¦¼±ÏìÓ¦ÍŶÓÕý»ý¼«ÓëËùÓÐ23¸öʵÌåºÏ×÷ £¬Ê¹Æäϵͳ³ÁÐÂÉÏÏß £¬²¢Çҵ¿ËÈøË¹ÖݵÄϵͳºÍÍøÂç²»»áÊܵ½Ó°Ï졣Ŀǰ¾ßÌå¹¥»÷ϸ½ÚÒÀÈ»²»¼° £¬DIRҲûÓÐÆÀÂÛÄÄЩϵͳ³öÏÖ¹ÊÕÏ¡¢ÏµÍ³ÈôºÎ±»Ï°È¾ÒÔ¼°¾ßÌåµÄÊê½ðÊý¶î¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/coordinated-ransomware-attack-hits-23-texas-government-agencies/147457/


2¡¢¹È¸èµ«Ô¸½«HTTPSÖ¤ÊéµÄÐÔÃüÖÜÆÚËõ¶Ìµ½Ò»Äê


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¹È¸èµ«Ô¸½«SSLÖ¤Ê飨ÓÃÓÚ± £»¤HTTPS¼ÓÃÜÁ÷Á¿£©µÄÐÔÃüÖÜÆÚ´ÓĿǰµÄÁ½ÄêËõ¶Ìµ½Ò»Äê¶à¡£¸ÃÌá°¸Óɹȸè´ú±íRyan Sleevi ÓÚ6ÔÂÔÚÏ£À°ÈûÈøÂåÄá»ù½øÐеÄCA/BÂÛ̳F2F»áÒéÉÏÌá³ö¡£Æ¾¾ÝPer SleeviµÄÌáÒé £¬´Ó2020Äê3ÔÂÆðÍ· £¬ËùÓÐÐÂÐû¸æµÄSSLÖ¤ÊéµÄÐÔÃüÖÜÆÚ½«±äΪ397Ì죨ԼĪһÄêÁãÒ»¸öÔ£© £¬¶ø²»Êǵ±Ç°µÄ825Ì죨ԼĪÁ½ÄêÁãÈý¸öÔ£©¡£¸Ã»áÒéÉÏûÓжԸÃÌá°¸½øÐÐͶƱ £¬µ«ÊÇ´óÎÞÊýä¯ÀÀÆ÷¹©¸øÉ̶¼°µÊ¾Ö§³ÖеÄSSLÖ¤ÊéÐÔÃüÖÜÆÚ¡£ÔÚ´ÓǰµÄÊ®ÎåÄêÖÐ £¬ä¯ÀÀÆ÷Ôì×÷ÉÌÒѾ­²»ÐÝÏû¼õSSLÖ¤ÊéµÄÐÔÃüÖÜÆÚ £¬´Ó8ÄêÏ÷¼õµ½5Äê £¬¶øºóÏ÷¼õµ½3Äê £¬¶øºóÏ÷¼õµ½Á½Äê £¬×îºóÒ»´Î¸ü¸Ä²úÉúÔÚ2018Äê3Ô £¬Æäʱä¯ÀÀÆ÷Ôì×÷ÉÌÊÔͼ½«SSLÖ¤ÊéÊÙÃü´Ó3ÄêÏ÷¼õµ½1Äê £¬µ«ÔÚÖ¤ÊéÐû¸æ»ú¹¹¿¹ÒéºóÍ×ЭÖÁÁ½Äê¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/


3¡¢ÃÀ¹ú¹ú¶È°²È«¾ÖÒªÇó¹ú»á³ÁÐÂÓÀÔ¶ÊÚȨ¼äµý´òËã

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ÃÀ¹ú¹ú¶Èµý±¨¾Ö¾Ö³¤ÒªÇó¹ú»á¶ÔÒ»¸ö¼äµýÏîÄ¿³Áв¢ÇÒÓÀÔ¶ÊÚȨ £¬¸ÃÏîÄ¿ÊÇÖ¸¹ú¶È°²È«¾Ö£¨NSA£©·¸·¨ÍøÂçÊý°ÙÍòÃÀ¹ú¹«ÃñµÄͨ»°¼Í¼ £¬ÕâÒ»ÏîĿһÔÙ±»ÒÔΪÊÇÎ¥ÏÜÐÐΪ £¬NSAÆÅ×ÚѹÁ¦²»µÃ²»¹Ø¹Ø¸ÃÏîÄ¿¡£NSAÁ½´Î±»ÆÈÈÏ¿ÉËüÍøÂçÁËÊý°ÙÍò²»Ó¦¸ÃÕ¼Óеĵ绰¼Í¼ £¬Ò»´ÎÊÇÔÚ2018Äê6Ô £¬NSAɾ³ýÁËǰһÄêÍøÂçµÄ5.34ÒÚ¸öͨ»°¼Í¼ £¬µ«ÔÚ2018Äê10ÔÂͬÑùµÄʼþÔٴβúÉú £¬Ö±µ½2019Äê6Ô²ű»ÆØ¹â¡£µý±¨¾Ö¾Ö³¤Dan CoatsÔÚÆäÔÚÖ°µÄ×îºóÒ»ÌìÏòÁ½¸ö¹Ø¼ü²ÎÒéԺίԱ»áÕÆ¹ÜÈË·¢³öÁËÕâ·â½¨ÒéÐÅ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.theregister.co.uk/2019/08/16/spying_reauthorization_coats/


4¡¢×êÑÐÈËÔ±½öʹÓÃÖÇÄÜÊÖ»ú¿É¼ì²â³ö¼üÈëµÄÄÚÈÝ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÄÏ·½ÎÀÀí¹«»á´óѧ£¨SMU£©µÄÒ»ÏîÐÂ×êÑÐÅú×¢ £¬Äܹ»½öÀûÓÃÖÇÄÜÊÖ»úÀ¹½Ø´ò×ÖµÄÉùÒô £¬²¢ÆÆÒë¼üÈëµÄÄÚÈÝ¡£×êÑÐÈËÔ±¿ÉÄܽâÂëʹÓÃͨ³£¼üÅ̺ÍÖÇÄÜÊÖ»úÊäÈëµÄ´ó²¿ÃÅÄÚÈÝ-¼´±ãÔÚ³ä³âÁËÆäËûÈË´ò×ֺͽ»Ì¸ÉùÒôµÄàÐÔÓ»áÒéÊÒÖÐÒ²ÊÇÈç´Ë¡£Eric C. Larson°µÊ¾¡°ÎÒÃÇ¿ÉÄÜÒÔ41£¥µÄµ¥´ÊÕýÈ·ÂÊÀ´»ñÈ¡ÈËÃÇËùÊäÈëµÄÄÚÈÝ¡£¡±ÒªÖ´ÐÐÕâÖÖ¹¥»÷ £¬¹¥»÷Õß±ØÒªÖªÂ·×À×ÓµÄ×ÊÁÏÀàÐÍ £¬ÓÉÓÚ·ÖÆçµÄ×À×ÓÔÚ´ò×Öʱ»á²úÉú·ÖÆçµÄÉù²¨¡£¹¥»÷Õß»¹±ØÒªÖªÂ·×ÀÃæÉÏÓжಿÊÖ»úÒÔ¼°ÈôºÎ´ÓÖвÉÑù¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.helpnetsecurity.com/2019/08/19/smartphone-intercept-typing/

5¡¢×êÑÐÍŶӰ䲼½©Ê¬ÍøÂçMyKings±äÖֵķÖÎö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


2019Äê5Ô·ÝÇ÷Ïò¿Æ¼¼ÔÚÑÇÌ«µØÓòÒ»¼Òµç×Ó¹«Ë¾·¢ÏÖÁ˽©Ê¬ÍøÂçMyKingsµÄ±äÖÖ¡£¸Ã±äÖÖ¸ü¸ÄÁË»úеµÄϵͳע²á±í×÷ÎªÓÆ¾ÃÐÔ»úÔì £¬ÕâЩע²á±íÏîÕÆ¹Ü¶Ô¶ñÒâURLµÄC£¦C»Øµ÷¡£×êÑÐÈËÔ±·¢ÏÖÕâЩÌõ¿îÊÇÔÚ2017ÄêÔö³¤µÄ £¬Åú×¢¶ñÒâÈí¼þ±äÖÖÔÚ·¢ÏÖ֮ǰÒѾ­ÔÚ¹«Ë¾µÄϵͳÖаµ²ØÁËԼĪÁ½Äꡣƾ¾ÝÇ÷Ïò¿Æ¼¼µÄÊý¾Ý £¬½ØÖÁ2018ËêÊ×MyKingsÒѾ­Ï°È¾Á˳¬¹ý50Íǫ̀É豸 £¬²¢ÍÚ¾òÁËÔ¼230ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-a-mykings-variant-with-bootloader-persistence-via-managed-detection-and-response/

6¡¢¹¥»÷ÕßÀûÓÃÔ¶¿ØÄ¾ÂíAdwind¹¥»÷¹«ÓÃÊÂÒµ²¿ÃÅ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¹¥»÷ÕßÔÚÀ¬»øÓʼþ»î¶¯ÖÐͨ¹ýURL³Á¶¨Ïò·Ö·¢¶ñÒâpayload £¬Ê¹ÓÃÔ¶¿ØÄ¾ÂíAdwind¹¥»÷¹«ÓÃÊÂÒµ²¿ÃÅ¡£AdwindÓÉÆä¿ª·¢ÈËÔ±ÒÔ¶ñÒâÈí¼þ¼´·þÎñ£¨MaaS£©µÄģʽ·Ö·¢¸ø¹¥»÷Õß £¬²¢ÇÒ¿ÉÄÜÌӱܴóÎÞÊýÖØÒªÉ±¶¾Èí¼þµÄ¼ì²â¡£¸Ã¹¥»÷»î¶¯ÖØÒªÕë¶Ô¼ÒÍ¥ºÍÆóÒµÓû§ £¬¹¥»÷ÕßÄܹ»¼Í¼Óû§µÄ»÷¼ü¼Í¼ £¬²¢ÇÔÈ¡Chrome¡¢IEºÍEdgeÍ´´¦ÒÔ¼°VPNÖ¤ÊéµÈÃô¸ÐÐÅÏ¢ºÍÖ´Ðи÷Àà¶ñÒ⹤×÷¡£Adwind RAT»¹Äܹ»Â¼ÔìÊÓÆµºÍÉùÒô £¬ÀûÓÃÍøÂçÉãÏñÍ·ÅÄÉãÕÕÆ¬ÒÔ¼°ÇÔÈ¡¼ÓÃÜÇ®±ÒµÈ¡£×Ô2013ÄêÒÔÀ´AdwindÒ»Ïò´¦ÓÚ»îԾ״̬ £¬ÒѺ±¼ûÊ®ÍòÓ×ÎҺͻú¹¹Êܵ½¹¥»÷¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/adwind-remote-access-trojan-hits-utilities-sector/