iOS·ì϶Checkm8¿Éµ¼ÖÂiPhone4µ½XÓÀÔ¶Ô½Óü£»ÃÀ²ÎÒéԺͨ¹ý¡¶DHSÍøÂçËÑË÷¼°ÊÂÎñÏìÓ¦Ó××é·¨°¸¡·

°ä²¼¹¦·ò 2019-09-29
1.iOS·ì϶Checkm8¿Éµ¼ÖÂiPhone4µ½XÓÀÔ¶Ô½Óü

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

°²È«×êÑÐÔ±axi0mXÅû¶iOSÖеݲȫ·ì϶checkm8 £¬¸Ã·ì϶Äܹ»Ê¹iPhone4S£¨A5оƬ£©µ½iPhone8¡¢iPhoneX£¨A11оƬ£©µÄËùÓÐÆ»¹ûÊÖ»ú¼°Í¬¿îAϵÁд¦ÖÃÆ÷µÄiPad¡¢iPod touchµÈiOSÉ豸ÓÀÔ¶Ô½Óü¡£Ã»ÓÐÌáµ½×îеÄA12ºÍA13ÊÇ·ñÊܵ½Ó°Ïì¡£¸Ã¹¥»÷ÀûÓÃÁËbootrom·ì϶ £¬¼´´æ´¢ÁËiPhoneÆô¶¯Ö¸ÁîµÄÖ»¶Á´æ´¢Æ÷£¨ROM£©·ì϶ £¬ÓÉÓڸò¿ÃÅÄÚ´æÊÇÖ»¶ÁµÄ £¬Òò¶øÎÞ·¨Í¨¹ý°²È«¸üÐÂÀ´½¨¸´·ì϶¡£×êÑÐÈËÔ±ÔÚGithubÉϰ䲼ÁËÓйطì϶ÀûÓà £¬µ«ÉÐÎÞ¹«¿ª¿ÉÓõÄÔ½Óü·¨Ê½¡£

   

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/ios-exploit-checkm8-could-allow-permanent-iphone-jailbreaks/148762/

2.ÃÀ²ÎÒéԺͨ¹ý¡¶DHSÍøÂçËÑË÷¼°ÊÂÎñÏìÓ¦Ó××é·¨°¸¡·

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹ú²ÎÒéԺͨ¹ýÁË¡¶DHSÍøÂçËÑË÷¼°ÊÂÎñÏìÓ¦Ó××é·¨°¸¡·£¨S.315£© £¬ÊÚȨºÓɽ°²È«Êý£¨DHS£©Í¨¹ýÍøÂçËÑË÷¼°ÊÂÎñÏìÓ¦Ó××éÔ®ÊÖ¸öÈ˺͹«¹²²¿ÃÅÕмÜÍøÂç¹¥»÷¡£²ÎÒéÔ±SchumerÔÚ9ÔÂ27ÈÕ°ä²¼µÄÐÂΟåÖаµÊ¾ £¬ÕâÒ»Ðж¯ÊÇΪÁË·ÀÓùÄÇЩÇÖº¦Ñ§Éú¡¢Ñ§ÌùÍÔ±¼°´¦Ëùµ±¾ÖÔ±¹¤µÄÓ×ÎÒÐÅÏ¢¼°³ÁÒªÊý¾ÝµÄÀÕË÷Èí¼þ¹¥»÷¡£Ò»¸öÀàËÆµÄ·¨°¸£¨HR1158£©ÒÑÓÚ9ÔÂ24ÈÕÔÚÃÀ¹ú¶àÒéԺͨ¹ý £¬Ä¿Ç°ÕâÁ½Ïî·¨°¸ÔÚËͽ»×Üͳ¾ßÃûÒÔ³ÉΪ˾·¨¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-senate-passes-bill-in-response-to-rampant-ransomware-cyberattacks/

3.ÃÀHSCCÍÆ³öÒ½ÁƱ£½¡ÐÐÒµÍøÂ簲ȫ¾ØÕó

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ÃÀ¹úÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú²¿ÃÅЭµ÷ίԱ»á£¨HSCC£©Æô¶¯ÁËÒ»ÏîÖ¼ÔÚ¸ÄÉÆÒ½ÁƱ£½¡²¿ÃÅÍøÂ簲ȫÐÔµÄÐÅÏ¢×ÊÔ´¹²Ïí´òË㡣еġ¶Ò½ÁƱ£½¡ÐÐÒµÐÅÏ¢¹²Ïí×éÖ¯ÍøÂ簲ȫ¾ØÕó¡·£¨HIC-MISO£©Í¨¹ýΪÓû§ÌṩÃÀ¹ú¸÷µØµÄÍøÂ簲ȫÐÅÏ¢¹²Ïí×éÖ¯±ã½ÝÁбí £¬Ô®ÊÖÓû§¸ú×Ù×îÐµİ²È«Íþв¡£Ð¾ØÕóÖÐÔ̺¬25¸öÒÔÉϵÄÍøÂ簲ȫÐÅÏ¢¹²Ïí×éÖ¯¼°Æä·þÎñµÄ¾ßÌåÐÅÏ¢ £¬ÆäÖÐÔ̺¬9¸öרÃÅÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµºÍÒ½ÁÆÉ豸°²È«ÐÔµÄ×ÊÔ´¡£¸Ã¾ØÕóµÄÖØÒªÖ¸±êÊÇʹ¹æÄ£½ÏÓ×µÄÒ½ÁƱ£½¡×éÖ¯£¨²»×ãÖ´ÐÐ×îеÄÍøÂç°²ÕûϵͳµÄ×ÊÔ´£©ÄܸüÈÝÒ×µØÓë¹²ÏíµÄÍøÂ簲ȫÐÅÏ¢ºÍ·ÀÓù×ÊÔ´½øÐл¥¶¯¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/health-industry-cybersecurity/

4.Proofpoint°ä²¼2019ÄêµÚ¶þ¼¾¶ÈÍøÂçÍþв»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ProofpointµÄ2019ÄêµÚ¶þ¼¾¶ÈÍøÂçÍþв»ã±¨·¢ÏÖ £¬¶ñÒâURLռȫÇòÀ¬»øÓʼþ£¨Ô̺¬¶ñÒâURL¼°¶ñÒ⸽¼þ£©µÄ85% £¬±È5ÔÂÂÔÓÐÔö³¤ £¬µ«×ÜÌåÓë2019ÄêµÄÇ÷Ïòά³ÖÒ»Ö¡£Óë5Ô·ÝÏà±È £¬È«ÇòÀ¬»øÓʼþµÄ×ÜÊýÁ¿½µÂäÁ˽ü10% £¬µ«ÓÉÓÚTA542ºÍTA511ÔÚÕû¸ö6ÔµIJ»»îÔ¾ £¬¸Ã½µÂä·ù¶ÈÓ×ÓÚÔ¤ÆÚ¡£Óë5ÔÂÏà±È £¬6Ô·ݵÄÀÕË÷Èí¼þÀ¬»øÓʼþÊýÁ¿ºÍ»î¶¯ÏÔÖøÏ÷¼õ £¬SodinokibiÀÕË÷Èí¼þ³ÉΪÒÑÍ˳öµÄGandCrabµÄÖØÒª¼ÌÈÎÕß¡£´ÓµÚ¶þ¼¾¶ÈÆðÍ· £¬´óÁ¿ÀûÓüÙ×°¼¼ÊõºÍÉí·ÝºýŪÐÅÏ¢µÄÀ¬»øÓʼþÆðÍ·³öÏÖ £¬ÒÔǰÕâЩÀ¬»øÓʼþ¶àÓëBECÓйØ £¬µ«´Ë¿Ì¹¥»÷ÕßËÆºõÕý½«ÕâÖÖ¼¼ÊõÓÃÓÚÆäËüÖ÷ÕÅ £¬²¢ÇÒʹÓÃÁ¿¸ü´ó¡£ÓòÃûڲƭԾÉýÁË47¸ö°Ù·Öµã £¬¸ßÓÚµÚÒ»¼¾¶ÈµÄ²»¼°10%¡£

Ô­ÎÄÁ´½Ó£º
https://www.proofpoint.com/us/threat-insight/post/proofpoint-q2-2019-threat-report-emotets-hiatus-mainstream-impostor-techniques

5.Emsisoft°ä²¼ÀÕË÷Èí¼þAvestµÄÃâ·Ñ½âÃܹ¤¾ß


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÚ°ä²¼WannaCryFakeµÄ½âÃܹ¤¾ß¼¸Ììºó £¬Emsisoft°ä²¼ÁËÀÕË÷Èí¼þAvestµÄÃâ·Ñ½âÃܹ¤¾ß¡£AvestÔÚ¼ÓÃÜÓû§µÄÎļþºó»á¸½¼Ó.ckey().email().pack14À©´óÃû £¬²¢¿ªÊÍÃûΪ¡°!!!Readme!!!Help!!!.txt¡±ÀÕË÷µ¥¾Ý¡£Æ¾¾ÝEmsisoft°ä²¼µÄÓû§Ö¸ÄÏ £¬Êܺ¦ÕßÓ¦¸Ã´ÓϵͳÖÐɾ³ýÀÕË÷Èí¼þºóÔÙʹÓýâÃܹ¤¾ß £¬ÒÔÃâÔì³ÉÔÙ´ÎϰȾ¡£Ê¹ÓøýâÃܹ¤¾ß±ØÒªÒ»¸öÎļþµÄԭʼ°æ±¾ºÍ¼ÓÃܰ汾 £¬ÒÔÆÆ½âÆä¼ÓÃÜÃÜÔ¿¡£¸Ã½âÃܹ¤¾ß¿É´ÓEmsisoftÍøÕ¾¸ßµÍÔØµÃµ½¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91775/malware/avest-ransomware-decryptor.html

6.мäµýÈí¼þMasad StealerÀûÓÃTelegramÇÔÈ¡Óû§ÐÅÏ¢

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖмäµýÈí¼þMasad StealerÀûÓÃTelegram×÷ΪͨѶÇþ·½«Óû§µÄÎļþ¡¢ä¯ÀÀÆ÷ÐÅÏ¢ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý·¢Ëͻع¥»÷Õß¡£Æ¾¾ÝJuniper Threat Labs×êÑÐÍŶӵĻ㱨 £¬¸Ã¶ñÒâÈí¼þÔÚijÖÖˮƽÉÏÓëQulab StealerÓйØ £¬²¢ÇÒʹÓÃAutoit¾ç±¾½øÐпª·¢¶øºó±àÒëΪWindows¿ÉÖ´ÐÐÎļþ¡£¸Ã¶ñÒâÈí¼þĿǰÔÚ°µÍøÂÛ̳ÉÏ»ý¼«·Ö·¢ £¬ÆäÏúÊÛÕ½ÊõΪ·Ö¼¶ÏúÊÛ £¬ÀýÈçÔ̺¬Ãâ·Ñ°æ±¾ºÍ85ÃÀÔªµÄȫְÄܰ汾¡£Æ¾¾ÝTelegram»úеÈËIDºÍÓû§ÃûµÄÊýÁ¿ £¬×êÑÐÍŶӷ¢ÏÖÖÁÉÙÓÐ18¸ö¹¥»÷Õß»ò¹¥»÷»î¶¯ÔÚʹÓÃMasad Stealer¶Ô׼DZÔÚÊܺ¦Õß¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-masad-stealer-malware-exfiltrates-crypto-wallets-via-telegram/