΢Èí½«ÓëÃÀ¹úNIST½áºÏ´´½¨ÆóÒµ²¹¶¡½¨¸´Ö¸ÄÏ£»¼ÓÄôóLeaflyÒâ±íй¶Óû§ÐÅÏ¢ £¬µ«²»Ô̺¬ÐÅÓþ¿¨Êý¾Ý

°ä²¼¹¦·ò 2019-10-14

1¡¢Proofpoint³Æ2019ÄêÕë¶ÔÒ½ÁÆÐÐÒµµÄÓʼþÚ¿Æ­¹¥»÷¼¤Ôö


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ProofpointÔÚÆä×îеġ¶Ò½ÁƱ£½¡ÐÐÒµÍþв»ã±¨¡·ÖаµÊ¾ £¬Õë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄµç×ÓÓʼþÚ¿Æ­¹¥»÷ÔÚ2019Ä꼤Ôö £¬ÓëÈ¥ÄêͬÆÚÏà±ÈÔö³¤ÁË300%¡£ÔÚÊܹ¥»÷µÄÒ½ÁÆÆóÒµÖÐ £¬ÏÕЩËùÓУ¨95%£©µÄ¹«Ë¾¶¼°µÊ¾¿´µ½Á˼Ù×°³É×Ô¼ºµÄ¿ÉÐÅÓòÃûµÄµç×ÓÓʼþ £¬ÕâЩÓʼþͬʹØë¶Ô»¼ÕßºÍÆóÒµµÄºÏ×÷ͬ°é¡£´óÎÞÊýÓʼþ¹¥»÷µÄÖ÷ÌâÖж¼Ô̺¬¡°´¹Î£¡±»ò¡°ÒªÇ󡱵ȴÊÓï £¬ÒÔÔö³¤Êܺ¦Õߵķ¢¼±¸ÐÇé¡£¾ùÔȶøÑÔ £¬´ËÀàµç×ÓÓʼþºýŪÁËÒ½ÁƱ£½¡ÐÐÒµÖжà´ï15ÃûÔ±¹¤¡£¹¥»÷Õß»áѡȡ¶àÖÖÉí·ÝÀ´Ôö³¤³É¹¦µÄ»úÓö¡£


Ô­ÎÄÁ´½Ó£º

https://www.itproportal.com/news/email-scam-attacks-against-healthcare-targets-see-huge-rise/


2¡¢¹¥»÷ÕßÀûÓÃÐéα¼ÓÃÜÇ®±ÒÂòÂôƽ̨JMT Trader·Ö·¢ºóÃÅ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÍŶÓMalwareHunterTeam·¢ÏÖÒ»¸öеÄÚ¿Æ­¹¥»÷ £¬¹¥»÷Õß´´½¨ÁËÒ»¸öÐéα¹«Ë¾ £¬Í¨¹ý¶È·¢¼ÓÃÜÇ®±ÒÂòÂôƽ̨JMT TraderÀ´ÏòMac»òWindowsÓû§×°ÖúóÃÅ¡£ÎªÁËÍÆ¹ã¸ÃÀûÓà £¬¹¥»÷Õß»¹´´½¨ÁËÏàÓ¦µÄTwitterÕÊ»§¡£¸ÃJMT TradeÏÖʵÉÏÊǺϷ¨QT Bitcoin Trader·¨Ê½µÄ¿Ë¡°æ±¾ £¬µ«Æ¾¾ÝÄæÏò¹¤³ÌʦVitali KremezµÄ˵·¨ £¬µ±×°ÖÃJMT TraderʱװÖ÷¨Ê½»¹½«Ìáȡһ¸öÃûΪCrashReporter.exeµÄ¸¨Öú·¨Ê½ £¬¸Ã·¨Ê½ÊǺóÃÅ·¨Ê½ £¬Ëü½«Ïνӵ½C&CÓòbeastgoc[.]com²¢½Ó¹ÜºÅÁĿǰÉв»ÖªÂ·¸Ã¶ñÒâÈí¼þÊÇ·ñÅׯúÁËÆäËûpayload £¬»òÖ»ÊÇÓÃ×÷ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°üµÄºóÃÅ¡£¸Ã¶ñÒâÈí¼þÔÚVirusTotalµÄ¼ì³öÂʽöΪ5/69¡£¿¨°Í˹»ù°²È«×êÑÐÔ±Seongsu ParkÒÔΪJMT TraderÓ볯ÏÊLazarus APTºÜ¿ÉÄÜ´æÔÚ¹ØÁª¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/attackers-create-elaborate-crypto-trading-scheme-to-install-malware/


3¡¢ÐÂÓʼþÚ¿Æ­»î¶¯ÖØÒªÕë¶Ô°Ä´óÀûÑÇÓ¢Áª¹úÒøÐÐ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


MailGuardÖÒ¸æÒ»¸öÕë¶Ô°Ä´óÀûÑÇÓ¢Áª¹úÒøÐÐÓû§µÄд¹µöÓʼþÚ¿Æ­¹¥»÷¡£¸ÃÓʼþÐû³ÆÓû§µÄÕË»§Öмì²âµ½²»Õý³£»î¶¯ £¬ÆäÕË»§Òѱ»Ï޶ȽӼû £¬ÒªÇóÓû§µã»÷ÓʼþÖеġ°¸´Ô­½Ó¼ûȨÏÞ¡±Á´½Ó¡£µ«¸ÃÁ´½ÓÖÒ¸æ³ÆÎÞ·¨¸´Ô­ÕË»§½Ó¼û £¬´Ó¶ø½«Óû§Êèµ¼ÖÁÁíÒ»¸öÁª¹úÒøÐÐÆ·ÅƵÄÒ³Ãæ £¬ÒªÇóÓû§ÌîÈëÍ´´¦¡¢¿¨ºÅ¡¢ÓÐЧÈÕÆÚ¼°°²È«ÂëµÈÑéÖ¤ÆäÉí·Ý¡£Ó¢Áª¹úÒøÐÐÕ¼ÓÐ1590Íò¿Í»§ £¬½¨ÒéÓû§ÉóÉ÷¶Ô´ýÀ´×Ô¸ÃÒøÐеÄÈκεç×ÓÓʼþ¡£


Ô­ÎÄÁ´½Ó£º

https://au.finance.yahoo.com/news/159-million-aussies-told-to-beware-of-commonwealth-bank-scam-222719508.html


4¡¢Î¢Èí½«ÓëÃÀ¹úNIST½áºÏ´´½¨ÆóÒµ²¹¶¡½¨¸´Ö¸ÄÏ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


΢Èí½«ÓëÃÀ¹ú¹ú¶È³ß¶È¼¼Êõ×êÑÐÔº£¨NIST£©ºÏ×÷´´½¨ÆóÒµ²¹¶¡½¨¸´Ö¸ÄÏ £¬ÕâÏ×÷µÄ³É¾Í½«ÊÇÒ»·ÝNIST³ö¸ñ³ö°æÎï1800ʵ¼ÊÖ¸ÄÏ £¬ÓÃÓÚÁ쵼ϵͳÖÎÀíÔ±ÖÎÀí»òÓÅ»¯¹«Ë¾µÄÄÚ²¿²¹¶¡½¨¸´·¨Ê½¡£ÔÚ¸ÃÏîÄ¿ÖÐ £¬Î¢ÈíºÍNIST°µÊ¾ËûÃÇ´òËã×êÑÓ×°ÈôºÎʹÓÃóÒ׺ͿªÔ´¹¤¾ßÀ´Ð­Öú½¨²¹ÆóÒµITϵͳÖеÄÌôÕ½ £¬Ô̺¬ÏµÍ³¸öÐÔºÍÓÅÏȼ¶»®·Ö¡¢²¹¶¡²âÊÔºÍÖ´Ðиú×ÙÓëÑéÖ¤¡£¡±Î¢ÈíÓëNISTÔÚÔ¼ÇëÆäËû¸ÐÐËÖµĸ÷·½£¨¹©¸øÉÌ¡¢¹«Ë¾»òÓ×ÎÒ£©Îª¸ÃÐÂÖ¸ÄÏÌṩ¶¨¼û¡£¸ÃÖ¸ÄÏÔÚNIST£¨ÃÀ¹úµ±¾ÖÕÆ¹ÜÔì¶©ÐÐÒµÖ¸ÄϵÄ×éÖ¯£©µÄÖ§³ÖÏ £¬ÓÐÍû²úÉú¾Þ´óµÄÓ°Ïì¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-and-nist-partner-to-create-enterprise-patching-guide/


5¡¢Nemty 1.6ͨ¹ýRIG EK»ý¼«·Ö·¢ £¬½âÃÜÆ÷ÒÀÈ»¿ÉÓÃ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


RIG EKÔÚ·Ö·¢Ò»ÏµÁжñÒâÈí¼þ £¬ÆäÖÐÔ̺¬ÀÕË÷Èí¼þNemtyµÄбäÖÖ¡£¸Ã»î¶¯Óɰ²È«×êÑÐÈËÔ±mol69·¢ÏÖ £¬¹¥»÷ÕßÖØÒª¶Ô×¼ÈÔÔÚʹÓÃInternet ExplorerºÍFlash PlayerµÄÆóÒµÓû§¡£NemtyбäÌåÖÐ×îÏÔÖøµÄ±ä¶¯ÊÇÊê½ðµ¥¾ÝÖÐÏÔʾµÄ°æ±¾ºÅΪ1.6¡£Æ¾¾Ý°²È«³§ÉÌTesorionµÄ˵·¨ £¬Nemty 1.6»¹Åú¸ÄÁ˼ÓÃÜËã·¨ £¬Ê¹ÓÃWindows¼ÓÃÜ¿â´úÌæÁË×Ô¼ºÊµÏÖµÄAESËã·¨¡£ÕâºÜÓпÉÄÜÊÇΪÁË·ÛËéTesorion°ä²¼µÄ½âÃÜ·¨Ê½ £¬µ«´òË㲢δ³É¹¦ £¬ÓÉÓÚTesorionµÄ½âÃÜ·¨Ê½ÈÔÄܹ»Õý³£¹¤×÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/nemty-16-ransomware-released-and-pushed-via-rig-exploit-kit/


6¡¢¼ÓÄôóLeaflyÒâ±íй¶Óû§ÐÅÏ¢ £¬µ«²»Ô̺¬ÐÅÓþ¿¨Êý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¼ÓÄôóLeaflyÔÚ9ÔÂ30ÈÕ·¢ÏÖ £¬¸ÃÍøÕ¾µÄÒ»¸ö¸¨ÖúÊý¾Ý¿âÒⱩ¶³öÁËÓû§µÄÐÅÏ¢¡£¸ÃÊý¾Ý¿âÖд洢µÄÓû§¼Í¼¿É×·ÒäÖÁ2016Äê7ÔÂ2ÈÕ £¬Ô̺¬Óû§µÄµç×ÓÓʼþµØÖ·¡¢Óû§ÃûºÍ¼ÓÃܵÄÃÜÂë¡¢ÐÕÃû¡¢´ºÇï¡¢ÐԱ𡢵ØÎ»ÒÔ¼°ÊÖ»úºÅÂëµÈÐÅÏ¢¡£Leafly°µÊ¾¸Ã¹«Ë¾Ã»ÓÐÍøÂç»ò´æ´¢Óû§µÄ¹ú¶È¼ø±ðÂë¼°ÐÅÓþ¿¨ÐÅÏ¢ £¬Ò²Ã»ÓÐÖ¤¾ÝÅú×¢Æä³ö²úÍøÕ¾ÔâδÊÚȨ½Ó¼û¡£¸Ã¹«Ë¾Í¨ÖªÁËÊÜÓ°ÏìµÄÓû§ £¬²¢ÔÚ¶ÔÊÂÎñ½øÐе÷²éºÍÆÀ¹À¡£¸Ã¹«Ë¾Ã»ÓÐй©ÊÜÓ°ÏìÓû§µÄ¾ßÌåÈËÊý¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/leafly-cannabis-website-leaked-user-info-via-exposed-database/