¶ò¹Ï¶à¶ûÒÑÔâÁè¼Ý4000Íò´ÎºÚ¿Í¹¥»÷£»£»£»£»£»£»Ð¹¥»÷»î¶¯Scranos Operation£»£»£»£»£»£»ÀÕË÷Èí¼þBitPaymerбäÌå

Ðû²¼Ê±¼ä 2019-04-17
1¡¢OracleÐû²¼4ÔÂÖ÷Òª²¹¶¡¸üУ¬£¬ÐÞ¸´297¸öÎó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
4ÔÂ16ÈÕOracleÐû²¼Ö÷Òª²¹¶¡¸üУ¬£¬¹²ÐÞ¸´297¸öÎó²î£¬£¬ÆäÖаüÀ¨Database ServerÖеÄ6¸öÎó²î¡¢Communication ApplicationsÖеÄ26¸öÎó²î¡¢E-Business SuiteÖеÄ35¸öÎó²î¡¢Fusion MiddlewareÖеÄ53¸öÎó²î¡¢MySQLÖеÄ45¸öÎó²îºÍRetail ApplicationsÖеÄ24¸öÎó²î¡£¡£¡£¡£¡£¡£ÏêϸÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£¡£¡£Æ¾Ö¤OracleµÄÖ÷Òª²¹¶¡Ðû²¼ÍýÏ룬£¬ÏÂÒ»´ÎÖ÷Òª²¹¶¡¸üн«ÓÚ2019Äê7ÔÂ16ÈÕÐû²¼¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

2¡¢Gnosticplayers³öÊÛµÚÎåÅúÓû§Êý¾Ý£¬£¬°üÀ¨6500¶àÍò¸öÕ˺Å

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
ºÚ¿ÍGnosticplayersÔÚ°µÍøÂÛ̳DreamMarketÉϳöÊÛµÚÎåÅú±»µÁµÄÓû§Êý¾Ý£¬£¬ÕâÅúÊý¾Ý°üÀ¨Áè¼Ý6500Íò¸öÓû§ÕË»§£¬£¬ÊÛ¼ÛΪ0.8463±ÈÌØ±Ò£¨4350ÃÀÔª£©¡£¡£¡£¡£¡£¡£ÕâÅú±»µÁµÄÓû§¼Í¼ÊôÓÚÁù¼Òй«Ë¾£¬£¬°üÀ¨ÓÎϷƽ̨Mindjolt£¨2800Íò£©¡¢ÔÚÏß¹ºÎïÉçÇøWanelo£¨2300Íò£©¡¢Æ»¹ûάÐÞÖÐÐÄiCracked£¨150Íò£©¡¢ÂÃÓι«Ë¾Yanolja£¨150Íò£©¡¢µç×ÓÔ¼ÇëЧÀÍEvite£¨1000Íò£©ºÍÅ®×ÓʱװµêModa Operandi£¨150Íò£©¡£¡£¡£¡£¡£¡£ÏÖÔÚΪֹGnosticplayers³öÊ۵ı»µÁÓû§¼Í¼×ÜÊýÒÑ´ï9.32ÒÚÌõ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/gnosticplayers-hacker-returns-with-fifth-dataset-containing-over-65-million-user-accounts-for-sale-95450e99

3¡¢·¸·¨ÍÅ»ïʹÓÃRATVERMINºóÃŹ¥»÷ÎÚ¿ËÀ¼¶à¸ö¾üʲ¿·Ö

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
FireEyeÑо¿ÍŶӷ¢Ã÷Ò»¸öÕë¶ÔÎÚ¿ËÀ¼¶à¸ö¾üʲ¿·ÖµÄÓã²æÊ½´¹ÂÚ¹¥»÷»î¶¯£¬£¬¸Ã¹¥»÷»î¶¯ÊÇ2018ÄêÕë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹¥»÷»î¶¯µÄÑÓÐø£¬£¬¹¥»÷ÕßÓëLPRÓйØ¡£¡£¡£¡£¡£¡£Æ¾Ö¤¶Ô¶ñÒâÈí¼þ±àÒëʱ¼äµÄÆÊÎö£¬£¬¸Ã¹¥»÷×éÖ¯ËÆºõÖÁÉÙÓÚ2014ÄêÒÔÀ´Ò»Ö±´¦ÓÚ»îԾ״̬£¬£¬ÆäÄ¿µÄÖ÷ÒªÊÇÎÚ¿ËÀ¼¡£¡£¡£¡£¡£¡£ÔÚ×î½üµÄ¹¥»÷»î¶¯ÖУ¬£¬¸Ã×é֯ʹÓÃÁ˶ñÒâÈí¼þQUASARRATºÍRATVERMIN¡£¡£¡£¡£¡£¡£RATVERMINÊÇÒ»¸ö.NETºóÃÅ£¬£¬¿ÉÍøÂçÊܺ¦ÕßµÄÐÅÏ¢²¢ÔËÐÐÖÖÖÖÏÂÁî¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hacker-group-uses-ratvermin-backdoor-to-target-ukrainian-military/

4¡¢°¢É£Ææ±»²¶ºó£¬£¬¶ò¹Ï¶à¶ûÒÑÔâÊÜÁè¼Ý4000Íò´ÎºÚ¿Í¹¥»÷

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
×Ôά»ù½âÃÜÊ×´´ÈËÖìÀû°²?°¢É£Ææ±»²¶ÒÔÀ´£¬£¬¶ò¹Ï¶à¶û¹«¹²»ú¹¹µÄÍøÕ¾ÔâÊÜÁË4000Íò´ÎÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£ÉÏÖܶò¹Ï¶à¶û³·»ØÁ˶԰¢É£ÆæµÄÕþÖκǻ¤£¬£¬Õâµ¼ÖºóÕß±»²¶¡£¡£¡£¡£¡£¡£¶ò¹Ï¶à¶ûÐÅÏ¢ºÍͨѶÊÖÒÕ²¿¸±²¿³¤Patricio Real͸¶³Æ£¬£¬¹¥»÷Ö÷ÒªÀ´×ÔÓÚÃÀ¹ú¡¢°ÍÎ÷¡¢ºÉÀ¼¡¢µÂ¹ú¡¢ÂÞÂíÄáÑÇ¡¢·¨¹ú¡¢°ÂµØÀû¡¢Ó¢¹úºÍ¶ò¹Ï¶à¶û×ÔÉí¡£¡£¡£¡£¡£¡£´ó²¿·Ö¹¥»÷¶¼Õë¶ÔÍâ½»²¿¡¢ÖÐÑëÒøÐС¢×Üͳ°ì¹«ÊÒ¡¢¹ú˰¾ÖµÈ²¿·ÖºÍ¼¸¸ö´óѧµÄÍøÕ¾¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83940/hacktivism/julian-assange-arrest-ddoss.html

5¡¢Ð¹¥»÷»î¶¯Scranos Operation£¬£¬Ê¹ÓÃÓÐÓÃÊðÃûµÄRootkitÇÔÈ¡Óû§ÐÅÏ¢

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Ò»¸ö¾ßÓÐÓÐÓÃÊðÃûµÄrootkit£¨±»³ÆÎªScranos£©ÕýÔÚ¶à¸ö¹ú¼ÒÈö²¥£¬£¬Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡¢Ö§¸¶ÐÅÏ¢ºÍä¯ÀÀÆ÷ÀúÊ·¼Í¼£¬£¬»¹¿ÉÓÃÓÚÔÚÉç½»ÍøÂçÉÏÈö²¥À¬»øÐÅÏ¢ºÍ¹ã¸æ¡£¡£¡£¡£¡£¡£Scranosαװ³ÉÊÓÆµÇý¶¯³ÌÐò£¬£¬ÆäʹÓõÄÖ¤ÊéÊÇDigiCertÏòÉϺ£Ò»¼Ò¿µ½¡ÖÎÀí×Éѯ¹«Ë¾½ÒÏþµÄÖ¤Ê飬£¬ÏÖÔÚÖ¤ÊéÈÔÈ»ÓÐÓ㬣¬¹¥»÷Õß¿ÉÄÜÊǵÁÓÃÁ˸ÃÖ¤Êé¡£¡£¡£¡£¡£¡£Bitdefender³ÆScranos OperationÒ»Ö±Éú³¤£¬£¬ÒѾ­Ñ¬È¾ÁËÓ¡¶È¡¢ÂÞÂíÄáÑÇ¡¢°ÍÎ÷¡¢·¨¹ú¡¢Òâ´óÀûºÍÓ¡ÄáµÈ¹ú¼ÒµÄÓû§¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/scranos-operation-uses-signed-rootkit-to-steal-login-and-payment-info/

6¡¢ÀÕË÷Èí¼þBitPaymerбäÌ壬£¬Ê¹ÓÃPsExecѬȾÃÀ¹úÖÆÔ칫˾

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷ÃÀ¹úÒ»¼ÒÖÆÔ칫˾Ôâµ½ÀÕË÷Èí¼þBitPaymerбäÌåµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã±äÌ壨Ransom.Win32.BITPAYMER.TGACAJ£©Ê¹ÓÃPsExec¾ÙÐзַ¢£¬£¬²¢ÔÚÊê½ðƱ¾ÝºÍ¼ÓÃÜÎļþµÄÀ©Õ¹ÃûÖÐʹÓÃÁËÊܺ¦¹«Ë¾µÄÃû³Æ¡£¡£¡£¡£¡£¡£¹¥»÷ÊÂÎñ±¬·¢ÔÚ2ÔÂ18ÈÕÍíÉÏ9µã40·ÖÖÁÍíÉÏ11:03Ö®¼ä£¬£¬ÓÉÓÚ¹¥»÷ÕßÖÁÉÙÐèÒªÒ»¸ö¾ßÓÐÖÎÀíԱȨÏÞµÄÕÊ»§²Å»ªÍ¨¹ýPsExecÔËÐÐÏÂÁ£¬ÕâÒâζ×ÅÔÚÀÕË÷Èí¼þ×°ÖÃ֮ǰ¹¥»÷ÕßÒѾ­Í¨¹ýijÖÖÊֶλñµÃÁËÖÎÀíԱȨÏÞ¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/new-bitpaymer-ransomware-variant-infected-us-manufacturing-company-via-psexec-3450ef8c