iOS·ì϶Checkm8¿Éµ¼ÖÂiPhone4µ½XÓÀÔ¶Ô½Óü£»ÃÀ²ÎÒéԺͨ¹ý¡¶DHSÍøÂçËÑË÷¼°ÊÂÎñÏìÓ¦Ó××é·¨°¸¡·
°ä²¼¹¦·ò 2019-09-29
°²È«×êÑÐÔ±axi0mXÅû¶iOSÖеݲȫ·ì϶checkm8£¬¸Ã·ì϶Äܹ»Ê¹iPhone4S£¨A5оƬ£©µ½iPhone8¡¢iPhoneX£¨A11оƬ£©µÄËùÓÐÆ»¹ûÊÖ»ú¼°Í¬¿îAϵÁд¦ÖÃÆ÷µÄiPad¡¢iPod touchµÈiOSÉ豸ÓÀÔ¶Ô½Óü¡£Ã»ÓÐÌáµ½×îеÄA12ºÍA13ÊÇ·ñÊܵ½Ó°Ïì¡£¸Ã¹¥»÷ÀûÓÃÁËbootrom·ì϶£¬¼´´æ´¢ÁËiPhoneÆô¶¯Ö¸ÁîµÄÖ»¶Á´æ´¢Æ÷£¨ROM£©·ì϶£¬ÓÉÓڸò¿ÃÅÄÚ´æÊÇÖ»¶ÁµÄ£¬Òò¶øÎÞ·¨Í¨¹ý°²È«¸üÐÂÀ´½¨¸´·ì϶¡£×êÑÐÈËÔ±ÔÚGithubÉϰ䲼ÁËÓйطì϶ÀûÓ㬵«ÉÐÎÞ¹«¿ª¿ÉÓõÄÔ½Óü·¨Ê½¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/ios-exploit-checkm8-could-allow-permanent-iphone-jailbreaks/148762/2.ÃÀ²ÎÒéԺͨ¹ý¡¶DHSÍøÂçËÑË÷¼°ÊÂÎñÏìÓ¦Ó××é·¨°¸¡·
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/us-senate-passes-bill-in-response-to-rampant-ransomware-cyberattacks/3.ÃÀHSCCÍÆ³öÒ½ÁƱ£½¡ÐÐÒµÍøÂ簲ȫ¾ØÕó
ÃÀ¹úÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú²¿ÃÅе÷ίԱ»á£¨HSCC£©Æô¶¯ÁËÒ»ÏîÖ¼ÔÚ¸ÄÉÆÒ½ÁƱ£½¡²¿ÃÅÍøÂ簲ȫÐÔµÄÐÅÏ¢×ÊÔ´¹²Ïí´òË㡣еġ¶Ò½ÁƱ£½¡ÐÐÒµÐÅÏ¢¹²Ïí×éÖ¯ÍøÂ簲ȫ¾ØÕó¡·£¨HIC-MISO£©Í¨¹ýΪÓû§ÌṩÃÀ¹ú¸÷µØµÄÍøÂ簲ȫÐÅÏ¢¹²Ïí×éÖ¯±ã½ÝÁÐ±í£¬Ô®ÊÖÓû§¸ú×Ù×îÐµİ²È«Íþв¡£Ð¾ØÕóÖÐÔ̺¬25¸öÒÔÉϵÄÍøÂ簲ȫÐÅÏ¢¹²Ïí×éÖ¯¼°Æä·þÎñµÄ¾ßÌåÐÅÏ¢£¬ÆäÖÐÔ̺¬9¸öרÃÅÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµºÍÒ½ÁÆÉ豸°²È«ÐÔµÄ×ÊÔ´¡£¸Ã¾ØÕóµÄÖØÒªÖ¸±êÊÇʹ¹æÄ£½ÏÓ×µÄÒ½ÁƱ£½¡×éÖ¯£¨²»×ãÖ´ÐÐ×îеÄÍøÂç°²ÕûϵͳµÄ×ÊÔ´£©ÄܸüÈÝÒ×µØÓë¹²ÏíµÄÍøÂ簲ȫÐÅÏ¢ºÍ·ÀÓù×ÊÔ´½øÐл¥¶¯¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/health-industry-cybersecurity/4.Proofpoint°ä²¼2019ÄêµÚ¶þ¼¾¶ÈÍøÂçÍþв»ã±¨
ProofpointµÄ2019ÄêµÚ¶þ¼¾¶ÈÍøÂçÍþв»ã±¨·¢ÏÖ£¬¶ñÒâURLռȫÇòÀ¬»øÓʼþ£¨Ô̺¬¶ñÒâURL¼°¶ñÒ⸽¼þ£©µÄ85%£¬±È5ÔÂÂÔÓÐÔö³¤£¬µ«×ÜÌåÓë2019ÄêµÄÇ÷Ïòά³ÖÒ»Ö¡£Óë5Ô·ÝÏà±È£¬È«ÇòÀ¬»øÓʼþµÄ×ÜÊýÁ¿½µÂäÁ˽ü10%£¬µ«ÓÉÓÚTA542ºÍTA511ÔÚÕû¸ö6ÔµIJ»»îÔ¾£¬¸Ã½µÂä·ù¶ÈÓ×ÓÚÔ¤ÆÚ¡£Óë5ÔÂÏà±È£¬6Ô·ݵÄÀÕË÷Èí¼þÀ¬»øÓʼþÊýÁ¿ºÍ»î¶¯ÏÔÖøÏ÷¼õ£¬SodinokibiÀÕË÷Èí¼þ³ÉΪÒÑÍ˳öµÄGandCrabµÄÖØÒª¼ÌÈÎÕß¡£´ÓµÚ¶þ¼¾¶ÈÆðÍ·£¬´óÁ¿ÀûÓüÙ×°¼¼ÊõºÍÉí·ÝºýŪÐÅÏ¢µÄÀ¬»øÓʼþÆðÍ·³öÏÖ£¬ÒÔǰÕâЩÀ¬»øÓʼþ¶àÓëBECÓйأ¬µ«´Ë¿Ì¹¥»÷ÕßËÆºõÕý½«ÕâÖÖ¼¼ÊõÓÃÓÚÆäËüÖ÷ÕÅ£¬²¢ÇÒʹÓÃÁ¿¸ü´ó¡£ÓòÃûÚ²ÆÔ¾ÉýÁË47¸ö°Ù·Öµã£¬¸ßÓÚµÚÒ»¼¾¶ÈµÄ²»¼°10%¡£
ÔÎÄÁ´½Ó£º
https://www.proofpoint.com/us/threat-insight/post/proofpoint-q2-2019-threat-report-emotets-hiatus-mainstream-impostor-techniques
5.Emsisoft°ä²¼ÀÕË÷Èí¼þAvestµÄÃâ·Ñ½âÃܹ¤¾ß
ÔÚ°ä²¼WannaCryFakeµÄ½âÃܹ¤¾ß¼¸Ììºó£¬Emsisoft°ä²¼ÁËÀÕË÷Èí¼þAvestµÄÃâ·Ñ½âÃܹ¤¾ß¡£AvestÔÚ¼ÓÃÜÓû§µÄÎļþºó»á¸½¼Ó.ckey().email().pack14À©´óÃû£¬²¢¿ªÊÍÃûΪ¡°!!!Readme!!!Help!!!.txt¡±ÀÕË÷µ¥¾Ý¡£Æ¾¾ÝEmsisoft°ä²¼µÄÓû§Ö¸ÄÏ£¬Êܺ¦ÕßÓ¦¸Ã´ÓϵͳÖÐɾ³ýÀÕË÷Èí¼þºóÔÙʹÓýâÃܹ¤¾ß£¬ÒÔÃâÔì³ÉÔÙ´ÎϰȾ¡£Ê¹ÓøýâÃܹ¤¾ß±ØÒªÒ»¸öÎļþµÄÔʼ°æ±¾ºÍ¼ÓÃܰ汾£¬ÒÔÆÆ½âÆä¼ÓÃÜÃÜÔ¿¡£¸Ã½âÃܹ¤¾ß¿É´ÓEmsisoftÍøÕ¾¸ßµÍÔØµÃµ½¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91775/malware/avest-ransomware-decryptor.html
6.мäµýÈí¼þMasad StealerÀûÓÃTelegramÇÔÈ¡Óû§ÐÅÏ¢
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-masad-stealer-malware-exfiltrates-crypto-wallets-via-telegram/


¾©¹«Íø°²±¸11010802024551ºÅ