°¢ÁªÇõ±»Ö¸¿Ø¼à¶½ToTokÊý°ÙÍòÓû§£¬¹È¸èÆ»¹û´¹Î£Ï¼Ü £»RyukбäÖÖ²»ÔÙÕë¶ÔLinuxϵͳµÄÎļþ

°ä²¼¹¦·ò 2019-12-27


1.°¢ÁªÇõ±»Ö¸¿Ø¼à¶½ToTokÊý°ÙÍòÓû§£¬¹È¸èÆ»¹û´¹Î£Ï¼Ü


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý¡¶Å¦Ô¼Ê±±¨¡·±¨Â·£¬°¢ÁªÇõµÐÔÖʹÓÃÊ¢ÐеÄͨѶÀûÓÃToTok×÷Ϊ¼à¶½¹¤¾ß£¬¸ú×ÙÓû§µÄ¶Ô»°ºÍ»î¶¯  ¡£¸ÃAPPĿǰÒѱ»AppleºÍGoogleÔÚÏßÉ̵êÏÂ¼Ü  ¡£ToTokµÄÓû§Ô̺¬°¢ÁªÇõºÍÖж«ÆäËû¹ú¶ÈµÄÊý°ÙÍòÃñ¶à  ¡£¸Ã»ã±¨³Æ£¬ÃÀ¹úµý±¨¹ÙÔ±ºÍ°²È«×êÑÐÈËԱȷ¶¨°¢ÁªÇõµ±¾ÖÔÚʹÓøÃAPP½øÐмල»î¶¯  ¡£ToTok·ñ¶¨ÁËÓëµ±¾ÐÄà¿Ø´òËãÓйØ£¬²¢°µÊ¾¸ÃÀûÓñ»Ï¼ÜÊÇÓÉÓÚ¡°¼¼ÊõÎÊÌ⡱  ¡£


  Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95586/intelligence/totok-app-surveillance.html


2.ºÚ¿Í¹¥»÷Çø¿éÁ´¿ª·¢ÍŶÓNULSÇÔÈ¡¼ÛÖµ48ÍòÃÀÔª´ú±Ò


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÚ¿ÍÈëÇÖÁËÇø¿éÁ´¿ª·¢ÍŶÓNULSµÄÕË»§£¬ÇÔÈ¡Á˼ÛÖµ48ÍòÃÀÔªµÄ´ú±Ò£¨NULS£©  ¡£NULSÍŶÓÔÚÍÆÎÄÖÐ֤ʵÁËÕâ´Î¹¥»÷£¬²¢°µÊ¾×ܹ²ÓÐ200Íò¸öNULS±»µÁ  ¡£ÆäÖг¬¹ýÒ»°ëµÄ´ú±ÒÒÑͨ¹ý¼ÓÃÜÇ®±ÒÂòÂôËùËãÕÊ£¬¼ÛֵԼΪ13ÍòÃÀÔª  ¡£¸ÃÍŶӴòËã¶ÔÆäÇø¿éÁ´½øÐÐÓ²·Ö²æ£¬ÒÔÊÔͼÓÀÔ¶¶³½áÔü×ÒµÄNULS´ú±Ò  ¡£Ôڴ˹¦·òÄÚ£¬NULSµÄ¼ÛÖµ²¢Ã»ÓÐÊܵ½¸ÃÊÂÎñµÄÓ°Ïì  ¡£¾Ý³Æ¸Ã¹¥»÷Óë°æ±¾2.2ÖеÄÒ»¸ö°²È«·ì϶ÓÐ¹Ø  ¡£


 Ô­ÎÄÁ´½Ó£º

https://thenextweb.com/hardfork/2019/12/23/cryptocurrency-hackers-nuls-blockchain-hard-fork-smart-contract-ethereum/


3.Ô¼»áAPP Plenty of Fishй¶Óû§ÐÕÃûºÍÓÊÕþ±àÂë


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝThe App AnalystµÄ˵·¨£¬Ô¼»áÀûÓ÷¨Ê½Plenty of FishÒ»ÏòÔÚй¶Óû§µÄÐÕÃûºÍÓÊÕþ±àÂ룬¹ÌÈ»ÎÞ·¨Ö±½Ó¿´µ½Ð¹Â¶µÄÊý¾Ý£¬²¢ÇÒÊý¾Ý±»´òÂÒʹÆäÄÑÒÔ¶ÁÈ¡£¬µ«Í¨¹ýÍøÂçÁ÷Á¿·ÖÎö¹¤¾ß×êÑÐÈËÔ±Äܹ»»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢  ¡£Æ¾¾ÝPlenty of Fishĸ¹«Ë¾IACµÄ˵·¨£¬¸ÃÔ¼»áÀûÓÃÕ¼Óг¬¹ý1.5ÒÚ×¢²áÓû§  ¡£¾Ý³Æ¿ª·¢ÍŶÓÒÑÓÚ±¾Ô³õÍÆ³öÁËÕë¶ÔÐÅϢй©·ì϶µÄ½¨¸´²¹¶¡£¬µ«¸Ã¹«Ë¾½²»°È˲¢Î´¶Ô´Ë½øÐÐÆÀÂÛ  ¡£


 Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2019/12/23/plenty-of-fish-app-data-leak/


4.Ó¡µÚ°²ÄÉÖÝÃÅÂÞÏØË°ÎñÍøÕ¾ÔâºÚ¿Í¹¥»÷£¬Óû§ÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¡µÚ°²ÄÉÖÝÃÅÂÞÏØµÄ²ÆÕþ²¿³¤½ÜÎ÷¿¨¡¤Âó¿ËÀ³Â×£¨Jessica McClellan£©°µÊ¾£¬Æä²Æ¸»Ë°Õ˵¥µÄÔÚÏßÃÅ»§ÍøÕ¾Ôâµ½ºÚ¿Í¹¥»÷£¬¹¥»÷Õß¿ÉÄܽӼûÁËÓû§µÄÓ×ÎÒÐÅÏ¢  ¡£Ã»ÓÐÈκÎÒøÐлòÐÅÓþ¿¨ÐÅÏ¢Êܵ½ÇÖº¦£¬ÓÉÓÚÕâЩÐÅÏ¢±»¶ÀÁ¢µÄ¹«Ë¾´¦Öà  ¡£¸ÃÍøÕ¾£¨eNoticesOnline.com£©ÔÊÐíÄÉ˰È˲鿴Æä²Æ¸»Ë°±¨±íºÍÆÀ¹À£¬ÓÉMaster's Touch¹«Ë¾Ìṩ֧³Ö£¬¸Ã¹«Ë¾ÔÚ10ÔÂ23ÈÕÔâµ½¹¥»÷  ¡£¿ÉÄÜй¶µÄÐÅÏ¢Ô̺¬ÄÉ˰È˵ÄÓû§ÃûºÍÓÃÓÚ½Ó¼ûÃÅ»§ÍøÕ¾µÄÃÜÂë  ¡£ÊÜÓ°ÏìµÄÓû§Ô¼Îª1930ÈË  ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.chron.com/news/article/Indiana-county-urges-password-changes-after-14921585.php


5.°²È«³§Ḛ́䲼Õë¶ÔȼÓͱÃPoSµÄ¶ñÒâÈí¼þ·ÖÎö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


VISA Security°ä²¼¹ØÓÚÕë¶ÔȼÓͱÃPoSµÄ¶ñÒâÈí¼þ»î¶¯µÄ·ÖÎö»ã±¨  ¡£¸Ã¶ñÒâÈí¼þÓÐ4¸öỊ̈߳¬Äܹ»´ÓÄÚ´æÖÐץȡÊÜϰȾ¹¤×÷Õ¾µÄ±¾µØÊý¾Ý£¬²¢Ð´ÈëÔËÐÐʱָ¶¨µÄÎļþõè¾¶  ¡£µÚ4¸öÏß³ÌÊôÓÚÒ»¸öÐÂỊ̈߳¬ËüÔÊÐí¹¥»÷ÕßÖÕÖ¹¶ñÒâÈí¼þµÄÔËÐУ¬Ä¿Ç°Éв»Ã÷ÏÔÕâÒ»ÐÐΪµÄÖ÷ÕÅ£¬Ò»ÖÖ¿ÉÄÜÐÔÊÇÕâÖÖ²½ÖèÔÊÐí¹¥»÷ÕßÔÚÎÞÐèʵÏÖºÅÁîºÍ½ÚÔìµÄÇé¿öÏÂÖÕÖ¹¶ñÒâÈí¼þ  ¡£Ä¿Ç°ÉÐδÀí½â¹¥»÷ÕßץȡÄÚ´æÊý¾ÝµÄÂß¼­£¬µ«µÄÈ·³öÏÖÁËÐÅÓþ¿¨¸ú×ÙÊý¾ÝµÄ¼¸¸ö×Ö·û£¬Ô̺¬³£¼ûµÄ=ºÍ^·Ö¸ô·û  ¡£ÓëÒÔǰ¼Í¼µÄÑù±¾·ÖÆç£¬¸Ã¶ñÒâÈí¼þûÓа×Ãûµ¥£¬²¢ÇÒÔÚÔËÐÐÆÚ¼ä·¨Ê½¿ÉËÁÒâËÑË÷Êý¾Ý  ¡£


 Ô­ÎÄÁ´½Ó£º

https://norfolkinfosec.com/pos-malware-used-at-fuel-pumps/


6.ÀÕË÷Èí¼þRyukбäÖÖ²»ÔÙÕë¶ÔLinuxϵͳµÄÎļþ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖÀÕË÷Èí¼þRyukµÄбäÖÖ²»ÔÙ¼ÓÃÜÓë*NIX²Ù×÷ϵͳÓйصÄÎļþ¼Ð£¬Ô̺¬bin¡¢boot¡¢Boot¡¢dev¡¢etc¡¢lib¡¢initrd¡¢sbin¡¢sys¡¢vmlinuz¡¢runºÍvar  ¡£RyukÊÇÒ»¸öרÃÅÕë¶ÔWindowsϵͳµÄÀÕË÷Èí¼þ£¬²¢²»´æÔÚLinux/Unix±äÌ壬µ«Win10µÄÈ·Ô̺¬Ò»¸ö±»³ÆÎªWindows×Óϵͳ£¨WSL£©µÄÖ°ÄÜ£¬¸ÃÖ°ÄÜʹÓû§Äܹ»Ö±½ÓÔÚWindowsÖÐ×°Öø÷ÀàLinux¿¯Ðаæ  ¡£°²È«×êÑÐÔ±Vitali Kremez°µÊ¾Ryuk¹¥»÷Õß¿ÉÄÜÔÚijЩʱ³½·¢ÏÖÀÕË÷Èí¼þ¶ÔWSLʹÓõÄ*NIXϵͳÎļþ¼ÐÔì³ÉÁËÓ°Ï죬µ¼ÖÂÕâЩWSL×°Öò»ÕñÐË×÷Óã¬Òò¶ø½«ÕâЩÎļþ¼Ð²ÎÓëºÚÃûµ¥  ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ryuk-ransomware-stops-encrypting-linux-folders/