AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂ룻Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0

°ä²¼¹¦·ò 2019-10-22
1¡¢AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂë

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

AvastÅû¶ÆäÄÚ²¿ÍøÂçÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßµÄÖ÷ÕÅËÆºõÔÚÓÚÏòCCleanerÖÐ×¢Èë¶ñÒâ´úÂ루ÀàËÆÓÚ2017ÄêµÄ¹¥»÷£©¡£Avastר¼ÒÓÚ9ÔÂ23ÈÕ·¢ÏÖÁËÕâÒ»¹¥»÷ÊÂÎñ£¬ºÚ¿Íͨ¹ýÈëÇÖÒ»¸öһʱVPNÕË»§½Ó¼ûÁ˹«Ë¾µÄÄÚ²¿ÍøÂ磬¸ÃÕË»§Ã»ÓÐÓòÖÎÀíԱȨÏÞ£¬µ«ºÚ¿Í³É¹¦½øÐÐÁËÌáȨ¡£¶Ô¹¥»÷ÕßʹÓÃµÄ±í²¿IPµÄ·ÖÎöÏÔʾ£¬¹¥»÷ÕßÔçÔÚ5ÔÂ14ÈÕ¾ÍÒ»ÏòÊÔͼͨ¹ýVPNÀ´½Ó¼ûÄÚÍø¡£Avast¶Ô¹¥»÷»î¶¯½øÐÐÁË¼à¿Ø£¬Ö±µ½10ÔÂ15ÈղŹعظÃһʱVPNÕË»§¡£Ä¿Ç°ÉÐÎÞ·¨È·Èϸù¥»÷ÊÇ·ñÓë2017Äê²úÉúµÄ¹¥»÷´æÔÚ¹ØÁª¡£AvastÔÚ¶ÔCCleaner½øÐÐÉó²éÖ®ºó³Áа䲼Á˸üС£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/

2¡¢AutoclerkÊý¾Ý¿âÒâ±íÔÚÍøÉ϶³ö179GB´î¿ÍÊý¾Ý

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾ÆµêÔ¤Ô¼ÖÎÀíϵͳAutoclerkµÄÒ»¸öElasticsearchÊý¾Ý¿âÔÚÍøÉ϶³öÁË179GB´î¿ÍÊý¾Ý£¬ÆäÖÐÔ̺¬²¿ÃÅÃÀ¹úµ±¾ÖºÍ¾üÊÂÈËÔ±µÄÃô¸ÐÐÅÏ¢¡£vpnMentorµÄ×êÑÐÈËÔ±Noam RotemºÍRan Locar·¢ÏÖÁËÕâÒ»ÊÂÎñ£¬Æ¾¾ÝËûÃǵĻ㱨£¬Â¶³öµÄÊý¾Ý¿âÓÉAmazon Web ServersÍйÜ£¬Æä´æ´¢µÄÐÅÏ¢Ô̺¬Î´¼ÓÃܵĵǼʹ´¦¡¢ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢¹Û¹âÈÕÆÚºÍÓöÈÒÔ¼°²¿ÃÅÐÅÓþ¿¨ÐÅÏ¢µÈ£¬¶ÔÓÚijЩ´î¿Í£¬»¹Ô̺¬ËûÃǵÄÈëס¹¦·òºÍ·¿¼äºÅ¡£×êÑÐÈËÔ±°µÊ¾Êý¾Ý¿âÖж³öµÄƽ̨֮һÊÇÃÀ¹úµ±¾Ö¡¢¾ü·½ºÍºÓɽ°²È«Êý£¨DHS£©µÄ³Ð°üÉÌ£¬¸Ã³Ð°üÉÌÕÆ¹ÜÖÎÀíÃÀ¹úµ±¾ÖºÍ¾üÊÂÈËÔ±µÄ¹Û¹âÆÌÅÅ¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/government-military-personnel-data-leaked/149386/

3¡¢¶íÂÞ˹Turla APTÀûÓÃÒÁÀÊ»ù´¡ÉèÊ©¶Ô×¼35¸ö¹ú¶È

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¶íÂÞ˹APT×éÖ¯Turla±»·¢ÏÖÈëÇÖÒÁÀÊAPT34µÄ»ù´¡ÉèÊ©£¬ÀûÓÃÆäNeuronºÍNautilus¹¤¾ß¶Ô×¼Öж«µØÓòµÄÖ¸±ê¡£Æ¾¾ÝÃÀ¹ú¹ú¶È°²È«¾Ö£¨NSA£©ºÍÓ¢¹ú¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£©µÄÊý¾Ý£¬ÖÁÉÙÓÐ35¸ö¹ú¶ÈÒѳÉΪ¸Ã×éÖ¯µÄ¹¥»÷Ö¸±ê£¬ÆäÖдóÎÞÊýλÓÚÖж«£¬ÔÚ´Óǰ18¸öÔÂÖÐÖÁÉÙÓÐ20¸ö¹ú¶ÈÊܵ½¹¥»÷¡£ÔÚ2017ÄêºÍ2018Ä꣬Turla±»·¢´Ë¿ÌʹÓÃ×Ô¼ºµÄ¹¤¾ßSnake rootkitµÄͬʱ»¹Ê¹ÓÃÁËNeuronºÍNautilus¡£¸Ã×éÖ¯×Ô2008ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬²¢ÇÒÖØÒªÕë¶Ô¾üÊ»ú¹¹¡¢µ±²¿ÃÅÃÅ¡¢¿ÆÑ§×éÖ¯ºÍ´óѧµÈÖ¸±ê¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russian-apt-turla-targets-35-countries-on-the-back-of-iranian-infrastructure/

4¡¢×êÑÐÈËÔ±·¢ÏÖÀûÓÃAlexaºÍGoogle HomeÇÔÌýÓû§µÄв½Öè

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖ¹¥»÷ÕßÄܹ»ÀûÓÃAlexaºÍGoogle HomeÖÇÄÜÒôÏäÀ´¼à¶½Óû§µÄв½Ö裬¹¥»÷Õß²»½öÄܹ»ÇÔÌýÓû§£¬ÉõÖÁ»¹Äܹ»Í¨¹ýÓïÒô´¹µöÇÔÈ¡Óû§µÄÃÜÂ롣ƾ¾ÝSRLabsµÄ»ã±¨£¬¸ÃÎÊÌâ´æÔÚÓÚ¿ª·¢ÈËԱΪÉ豸´´½¨µÄÀ©´óÖ°ÄÜAPPÖУ¬Ô̺¬Skills for AlexaºÍActions on Google Home¡£Í¨¹ýÕâЩAPPÌṩ¸øµÚÈý·½µÄ³ß¶È¿ª·¢½Ó¿Ú£¬SRLabs×êÑÐÈËÔ±·¢ÏÖÁËÁ½ÖÖÄܹ»·ÛËéÓû§ÒþÖԵIJ½Ö裬һÖÖÊÇÒªÇó²¢ÍøÂçÓ×ÎÒÊý¾Ý£¨Ô̺¬ÃÜÂ룩£¬ÁíÒ»ÖÖÊÇÔÚÓû§ÒÔΪÖÇÄÜÒôÏäûÓÐÊÕÌýÖ®ºó½øÐÐÇÔÌý¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/new-way-found-to-use-alexa-google-to-voice-phish-and-eavesdrop-on-users/149352/

5¡¢×êÑÐÍŶӷ¢ÏÖÕë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ESET×êÑÐÍŶӷ¢ÏÖÕë¶ÔMSSQL v11ºÍv12µÄкóÃÅskip-2.0¡£ESET°µÊ¾skip-2.0Åú¸ÄÁËÓÃÓÚ´¦ÖÃÉí·ÝÑéÖ¤µÄMSSQLº¯Êý£¬ÆäÉè·¨ÊÇ´´½¨Ò»¸ö¡°Ä§ÊõÃÜÂ롱£¬ÈôÊÇÔÚÖ°ºÎÉí·ÝÑéÖ¤»á»°ÖÐÊäÈ롰ħÊõÃÜÂ롱£¬Ôò½«×Ô¶¯ÊÚÓè¸ÃÓû§½Ó¼ûȨÏÞ£¬Í¬Ê±×èÖ¹Ö´ÐÐÕý³£µÄÈÕÖ¾¼Í¼ºÍÉóºËÖ°ÄÜ£¬´Ó¶øÓÐЧµØÔÚ·þÎñÆ÷ÄÚ²¿´´½¨Ðéα»á»°¡£Æ¾¾ÝESET£¬skip-2.0½öºÏÓÃÓÚMSSQL v12ºÍv11·þÎñÆ÷¡£Ö»¹ÜMSSQL Server 12£¨2014Äê°ä²¼£©²»ÊÇ×îа汾£¬ËüÒ²ÊÇ×î³£Óõİ汾¡£ESET½«¸ÃºóÃÅÓëAPT×éÖ¯Winnti Group½øÐйØÁª¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-find-stealthy-mssql-server-backdoor-developed-by-chinese-cyberspies/

6¡¢McAfee°ä²¼Sodinokibi¹¥»÷¼¼Êõ¼°Õ½ÊõµÄ·ÖÎö»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


McAfee×êÑÐÈËԱͨ¹ýÃÛ¹Þ¸ú×ÙÁËÀÕË÷Èí¼þSodinokibiµÄÓйØTTP¼°»î¶¯¡£×êÑÐÈËÔ±Ö¸³öÈý¸ö×ÓÍŻGroup 1¡¢×ÓÍÅ»ï#34ºÍ#19£©¾ùʹÓôóÁ¿¶Ë¿ÚɨÃ蹤¾ßÀ´²éÕҿɽӼûµÄRDP·þÎñÆ÷£¬¶øºóʹÓôøÓÐ×Ô½ç˵ÃÜÂëÁбíµÄNLBrute RDP±©Á¦ÆÆ½â¹¤¾ßÀ´»ñµÃ·þÎñÆ÷µÄ½Ó¼ûȨÏÞ£¬²¢ÔÚÍøÂçÖкáÏò´«²¼¡£#34ºÍ#19µÄÕ½ÊõÔ½·¢³ÉÊ죬Ô̺¬Ê¹Óö¨ÔìµÄMimikatzÅú´¦ÖÃÎļþÇÔÈ¡ÍøÂçÍ´´¦¡¢×Ô½ç˵¾ç±¾É¾³ýWindowsÊÂÎñ²é¿´Æ÷ÈÕÖ¾ÒÔ¼°´´½¨°µ²ØÓû§µÈ¡£#34»¹»á¿ªÊÍMinerGateºÍXMRigµÈÍÚ¿óľÂí¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/tools-and-tactics-of-the-sodinokibi-ransomware-distributors/