AvastÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂ룻Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0
°ä²¼¹¦·ò 2019-10-22
AvastÅû¶ÆäÄÚ²¿ÍøÂçÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßµÄÖ÷ÕÅËÆºõÔÚÓÚÏòCCleanerÖÐ×¢Èë¶ñÒâ´úÂ루ÀàËÆÓÚ2017ÄêµÄ¹¥»÷£©¡£Avastר¼ÒÓÚ9ÔÂ23ÈÕ·¢ÏÖÁËÕâÒ»¹¥»÷ÊÂÎñ£¬ºÚ¿Íͨ¹ýÈëÇÖÒ»¸öһʱVPNÕË»§½Ó¼ûÁ˹«Ë¾µÄÄÚ²¿ÍøÂ磬¸ÃÕË»§Ã»ÓÐÓòÖÎÀíԱȨÏÞ£¬µ«ºÚ¿Í³É¹¦½øÐÐÁËÌáȨ¡£¶Ô¹¥»÷ÕßʹÓÃµÄ±í²¿IPµÄ·ÖÎöÏÔʾ£¬¹¥»÷ÕßÔçÔÚ5ÔÂ14ÈÕ¾ÍÒ»ÏòÊÔͼͨ¹ýVPNÀ´½Ó¼ûÄÚÍø¡£Avast¶Ô¹¥»÷»î¶¯½øÐÐÁË¼à¿Ø£¬Ö±µ½10ÔÂ15ÈղŹعظÃһʱVPNÕË»§¡£Ä¿Ç°ÉÐÎÞ·¨È·Èϸù¥»÷ÊÇ·ñÓë2017Äê²úÉúµÄ¹¥»÷´æÔÚ¹ØÁª¡£AvastÔÚ¶ÔCCleaner½øÐÐÉó²éÖ®ºó³Áа䲼Á˸üС£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/2¡¢AutoclerkÊý¾Ý¿âÒâ±íÔÚÍøÉ϶³ö179GB´î¿ÍÊý¾Ý
ÔÎÄÁ´½Ó£º
https://threatpost.com/government-military-personnel-data-leaked/149386/3¡¢¶íÂÞ˹Turla APTÀûÓÃÒÁÀÊ»ù´¡ÉèÊ©¶Ô×¼35¸ö¹ú¶È
¶íÂÞ˹APT×éÖ¯Turla±»·¢ÏÖÈëÇÖÒÁÀÊAPT34µÄ»ù´¡ÉèÊ©£¬ÀûÓÃÆäNeuronºÍNautilus¹¤¾ß¶Ô×¼Öж«µØÓòµÄÖ¸±ê¡£Æ¾¾ÝÃÀ¹ú¹ú¶È°²È«¾Ö£¨NSA£©ºÍÓ¢¹ú¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£©µÄÊý¾Ý£¬ÖÁÉÙÓÐ35¸ö¹ú¶ÈÒѳÉΪ¸Ã×éÖ¯µÄ¹¥»÷Ö¸±ê£¬ÆäÖдóÎÞÊýλÓÚÖж«£¬ÔÚ´Óǰ18¸öÔÂÖÐÖÁÉÙÓÐ20¸ö¹ú¶ÈÊܵ½¹¥»÷¡£ÔÚ2017ÄêºÍ2018Ä꣬Turla±»·¢´Ë¿ÌʹÓÃ×Ô¼ºµÄ¹¤¾ßSnake rootkitµÄͬʱ»¹Ê¹ÓÃÁËNeuronºÍNautilus¡£¸Ã×éÖ¯×Ô2008ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬²¢ÇÒÖØÒªÕë¶Ô¾üÊ»ú¹¹¡¢µ±²¿ÃÅÃÅ¡¢¿ÆÑ§×éÖ¯ºÍ´óѧµÈÖ¸±ê¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/russian-apt-turla-targets-35-countries-on-the-back-of-iranian-infrastructure/4¡¢×êÑÐÈËÔ±·¢ÏÖÀûÓÃAlexaºÍGoogle HomeÇÔÌýÓû§µÄв½Öè
ÔÎÄÁ´½Ó£º
https://threatpost.com/new-way-found-to-use-alexa-google-to-voice-phish-and-eavesdrop-on-users/149352/
5¡¢×êÑÐÍŶӷ¢ÏÖÕë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0
ESET×êÑÐÍŶӷ¢ÏÖÕë¶ÔMSSQL v11ºÍv12µÄкóÃÅskip-2.0¡£ESET°µÊ¾skip-2.0Åú¸ÄÁËÓÃÓÚ´¦ÖÃÉí·ÝÑéÖ¤µÄMSSQLº¯Êý£¬ÆäÉè·¨ÊÇ´´½¨Ò»¸ö¡°Ä§ÊõÃÜÂ롱£¬ÈôÊÇÔÚÖ°ºÎÉí·ÝÑéÖ¤»á»°ÖÐÊäÈ롰ħÊõÃÜÂ롱£¬Ôò½«×Ô¶¯ÊÚÓè¸ÃÓû§½Ó¼ûȨÏÞ£¬Í¬Ê±×èÖ¹Ö´ÐÐÕý³£µÄÈÕÖ¾¼Í¼ºÍÉóºËÖ°ÄÜ£¬´Ó¶øÓÐЧµØÔÚ·þÎñÆ÷ÄÚ²¿´´½¨Ðéα»á»°¡£Æ¾¾ÝESET£¬skip-2.0½öºÏÓÃÓÚMSSQL v12ºÍv11·þÎñÆ÷¡£Ö»¹ÜMSSQL Server 12£¨2014Äê°ä²¼£©²»ÊÇ×îа汾£¬ËüÒ²ÊÇ×î³£Óõİ汾¡£ESET½«¸ÃºóÃÅÓëAPT×éÖ¯Winnti Group½øÐйØÁª¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-find-stealthy-mssql-server-backdoor-developed-by-chinese-cyberspies/
6¡¢McAfee°ä²¼Sodinokibi¹¥»÷¼¼Êõ¼°Õ½ÊõµÄ·ÖÎö»ã±¨
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/tools-and-tactics-of-the-sodinokibi-ransomware-distributors/


¾©¹«Íø°²±¸11010802024551ºÅ