°¢ÁªÇõ±»Ö¸¿Ø¼àÊÓToTokÊý°ÙÍòÓû§£¬£¬¹È¸èÆ»¹û½ôÆÈϼÜ£»£»£»£»RyukбäÖÖ²»ÔÙÕë¶ÔLinuxϵͳµÄÎļþ

Ðû²¼Ê±¼ä 2019-12-27


1.°¢ÁªÇõ±»Ö¸¿Ø¼àÊÓToTokÊý°ÙÍòÓû§£¬£¬¹È¸èÆ»¹û½ôÆÈϼÜ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤¡¶Å¦Ô¼Ê±±¨¡·±¨µÀ£¬£¬°¢ÁªÇõÕþ¸®Ê¹ÓÃÊ¢ÐеÄͨѶӦÓÃToTok×÷Ϊ¼àÊÓ¹¤¾ß£¬£¬¸ú×ÙÓû§µÄ¶Ô»°ºÍ»î¶¯¡£¡£¸ÃAPPÏÖÔÚÒѱ»AppleºÍGoogleÔÚÏßÊÐËÁϼܡ£¡£ToTokµÄÓû§°üÀ¨°¢ÁªÇõºÍÖж«ÆäËû¹ú¼ÒµÄÊý°ÙÍòÃñÖÚ¡£¡£¸Ã±¨¸æ³Æ£¬£¬ÃÀ¹úÇ鱨¹ÙÔ±ºÍÇå¾²Ñо¿Ö°Ô±È·¶¨°¢ÁªÇõÕþ¸®ÕýÔÚʹÓøÃAPP¾ÙÐмàÊӻ¡£¡£ToTok·ñ¶¨ÁËÓëÕþ¸®¼à¿ØÍýÏëÓйØ£¬£¬²¢ÌåÏÖ¸ÃÓ¦Óñ»Ï¼ÜÊÇÓÉÓÚ¡°ÊÖÒÕÎÊÌ⡱¡£¡£


  Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95586/intelligence/totok-app-surveillance.html


2.ºÚ¿Í¹¥»÷Çø¿éÁ´¿ª·¢ÍŶÓNULSÇÔÈ¡¼ÛÖµ48ÍòÃÀÔª´ú±Ò


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ºÚ¿ÍÈëÇÖÁËÇø¿éÁ´¿ª·¢ÍŶÓNULSµÄÕË»§£¬£¬ÇÔÈ¡Á˼ÛÖµ48ÍòÃÀÔªµÄ´ú±Ò£¨NULS£©¡£¡£NULSÍŶÓÔÚÍÆÎÄÖÐ֤ʵÁËÕâ´Î¹¥»÷£¬£¬²¢ÌåÏÖ×ܹ²ÓÐ200Íò¸öNULS±»µÁ¡£¡£ÆäÖÐÁè¼ÝÒ»°ëµÄ´ú±ÒÒÑͨ¹ý¼ÓÃÜÇ®±ÒÉúÒâËùÕûÀí£¬£¬¼ÛֵԼΪ13ÍòÃÀÔª¡£¡£¸ÃÍŶÓÍýÏë¶ÔÆäÇø¿éÁ´¾ÙÐÐÓ²·Ö²æ£¬£¬ÒÔÊÔͼÓÀÊÀ¶³½áÊ£ÓàµÄNULS´ú±Ò¡£¡£ÔÚ´Ëʱ¼äÄÚ£¬£¬NULSµÄ¼ÛÇ®²¢Ã»ÓÐÊܵ½¸ÃÊÂÎñµÄÓ°Ïì¡£¡£¾Ý³Æ¸Ã¹¥»÷Óë°æ±¾2.2ÖеÄÒ»¸öÇå¾²Îó²îÓйء£¡£


 Ô­ÎÄÁ´½Ó£º

https://thenextweb.com/hardfork/2019/12/23/cryptocurrency-hackers-nuls-blockchain-hard-fork-smart-contract-ethereum/


3.Ô¼»áAPP Plenty of Fishй¶Óû§ÐÕÃûºÍÓÊÕþ±àÂë


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤The App AnalystµÄ˵·¨£¬£¬Ô¼»áÓ¦ÓóÌÐòPlenty of FishÒ»Ö±ÔÚй¶Óû§µÄÐÕÃûºÍÓÊÕþ±àÂ룬£¬ËäÈ»ÎÞ·¨Ö±½Ó¿´µ½Ð¹Â¶µÄÊý¾Ý£¬£¬²¢ÇÒÊý¾Ý±»´òÂÒʹÆäÄÑÒÔ¶ÁÈ¡£¬£¬µ«Í¨¹ýÍøÂçÁ÷Á¿ÆÊÎö¹¤¾ßÑо¿Ö°Ô±¿ÉÒÔ»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢¡£¡£Æ¾Ö¤Plenty of Fishĸ¹«Ë¾IACµÄ˵·¨£¬£¬¸ÃÔ¼»áÓ¦ÓÃÓµÓÐÁè¼Ý1.5ÒÚ×¢²áÓû§¡£¡£¾Ý³Æ¿ª·¢ÍŶÓÒÑÓÚ±¾Ô³õÍÆ³öÁËÕë¶ÔÐÅÏ¢×ß©Îó²îµÄÐÞ¸´²¹¶¡£¬£¬µ«¸Ã¹«Ë¾½²»°È˲¢Î´¶Ô´Ë¾ÙÐÐ̸ÂÛ¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2019/12/23/plenty-of-fish-app-data-leak/


4.Ó¡µÚ°²ÄÉÖÝÃÅÂÞÏØË°ÎñÍøÕ¾ÔâºÚ¿Í¹¥»÷£¬£¬Óû§ÐÅϢй¶


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ó¡µÚ°²ÄÉÖÝÃÅÂÞÏØµÄ²ÆÎñ²¿³¤½ÜÎ÷¿¨¡¤Âó¿ËÀ³Â×£¨Jessica McClellan£©ÌåÏÖ£¬£¬Æä¹¤ÒµË°Õ˵¥µÄÔÚÏßÃÅ»§ÍøÕ¾Ôâµ½ºÚ¿Í¹¥»÷£¬£¬¹¥»÷Õß¿ÉÄÜ»á¼ûÁËÓû§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£Ã»ÓÐÈκÎÒøÐлòÐÅÓÿ¨ÐÅÏ¢Êܵ½Ë𺦣¬£¬ÓÉÓÚÕâЩÐÅÏ¢±»×ÔÁ¦µÄ¹«Ë¾´¦Öóͷ£¡£¡£¸ÃÍøÕ¾£¨eNoticesOnline.com£©ÔÊÐíÄÉ˰ÈËÉó²éÆä¹¤ÒµË°±¨±íºÍÆÀ¹À£¬£¬ÓÉMaster's Touch¹«Ë¾Ìṩ֧³Ö£¬£¬¸Ã¹«Ë¾ÔÚ10ÔÂ23ÈÕÔâµ½¹¥»÷¡£¡£¿£¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨ÄÉ˰È˵ÄÓû§ÃûºÍÓÃÓÚ»á¼ûÃÅ»§ÍøÕ¾µÄÃÜÂë¡£¡£ÊÜÓ°ÏìµÄÓû§Ô¼Îª1930ÈË¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.chron.com/news/article/Indiana-county-urges-password-changes-after-14921585.php


5.Çå¾²³§ÉÌÐû²¼Õë¶ÔȼÓͱÃPoSµÄ¶ñÒâÈí¼þÆÊÎö±¨¸æ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


VISA SecurityÐû²¼¹ØÓÚÕë¶ÔȼÓͱÃPoSµÄ¶ñÒâÈí¼þ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¸Ã¶ñÒâÈí¼þÓÐ4¸öỊ̈߳¬£¬¿ÉÒÔ´ÓÄÚ´æÖÐץȡÊÜѬȾÊÂÇéÕ¾µÄÍâµØÊý¾Ý£¬£¬²¢Ð´ÈëÔËÐÐʱָ¶¨µÄÎļþ·¾¶¡£¡£µÚ4¸öÏß³ÌÊôÓÚÒ»¸öÐÂỊ̈߳¬£¬ËüÔÊÐí¹¥»÷ÕßÖÕÖ¹¶ñÒâÈí¼þµÄÔËÐУ¬£¬ÏÖÔÚÉв»ÇåÎúÕâÒ»ÐÐΪµÄÄ¿µÄ£¬£¬Ò»ÖÖ¿ÉÄÜÐÔÊÇÕâÖÖÒªÁìÔÊÐí¹¥»÷ÕßÔÚÎÞÐèʵÏÖÏÂÁîºÍ¿ØÖƵÄÇéÐÎÏÂÖÕÖ¹¶ñÒâÈí¼þ¡£¡£ÏÖÔÚÉÐδÃ÷È·¹¥»÷ÕßץȡÄÚ´æÊý¾ÝµÄÂß¼­£¬£¬µ«È·Êµ·ºÆðÁËÐÅÓÿ¨¸ú×ÙÊý¾ÝµÄ¼¸¸ö×Ö·û£¬£¬°üÀ¨³£¼ûµÄ=ºÍ^ÍÑÀë·û¡£¡£ÓëÒÔǰ¼Í¼µÄÑù±¾²î±ð£¬£¬¸Ã¶ñÒâÈí¼þûÓа×Ãûµ¥£¬£¬²¢ÇÒÔÚÔËÐÐʱ´ú³ÌÐò¿Éí§ÒâËÑË÷Êý¾Ý¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://norfolkinfosec.com/pos-malware-used-at-fuel-pumps/


6.ÀÕË÷Èí¼þRyukбäÖÖ²»ÔÙÕë¶ÔLinuxϵͳµÄÎļþ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ñо¿Ö°Ô±·¢Ã÷ÀÕË÷Èí¼þRyukµÄбäÖÖ²»ÔÙ¼ÓÃÜÓë*NIX²Ù×÷ϵͳÓйصÄÎļþ¼Ð£¬£¬°üÀ¨bin¡¢boot¡¢Boot¡¢dev¡¢etc¡¢lib¡¢initrd¡¢sbin¡¢sys¡¢vmlinuz¡¢runºÍvar¡£¡£RyukÊÇÒ»¸öרÃÅÕë¶ÔWindowsϵͳµÄÀÕË÷Èí¼þ£¬£¬²¢²»±£´æLinux/Unix±äÌ壬£¬µ«Win10ȷʵ°üÀ¨Ò»¸ö±»³ÆÎªWindows×Óϵͳ£¨WSL£©µÄ¹¦Ð§£¬£¬¸Ã¹¦Ð§Ê¹Óû§¿ÉÒÔÖ±½ÓÔÚWindowsÖÐ×°ÖÃÖÖÖÖLinux¿¯Ðа档¡£Çå¾²Ñо¿Ô±Vitali KremezÌåÏÖRyuk¹¥»÷Õß¿ÉÄÜÔÚijЩʱ¼ä·¢Ã÷ÀÕË÷Èí¼þ¶ÔWSLʹÓõÄ*NIXϵͳÎļþ¼ÐÔì³ÉÁËÓ°Ï죬£¬µ¼ÖÂÕâЩWSL×°Öò»ÔÙÆð×÷Ó㬣¬Òò´Ë½«ÕâЩÎļþ¼Ð¼ÓÈëºÚÃûµ¥¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ryuk-ransomware-stops-encrypting-linux-folders/