µÂ¹ú¹ºÎïÍøÕ¾windeln.deÊý¾Ý¿â̻¶£¬£¬£¬£¬£¬Ð¹Â¶60ÒÚÌõ¼Í¼£»£»£»£»£»µÂ¹úµÄÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬¼ä½Óµ¼Ö»¼ÕßéæÃü
Ðû²¼Ê±¼ä 2020-09-181.µÂ¹ú¹ºÎïÍøÕ¾windeln.deÊý¾Ý¿â̻¶£¬£¬£¬£¬£¬Ð¹Â¶60ÒÚÌõ¼Í¼

Safety DetectivesµÄÑо¿Ö°Ô±ÔÚÍøÂçÉÏ·¢Ã÷ÁËÒ»¸ö̻¶µÄÊý¾Ý¿â£¬£¬£¬£¬£¬¾ÊÓ²ì¸ÃÊý¾Ý¿âÊôÓڵ¹úÔÚÏß¹ºÎïÍøÕ¾windeln.de¡£¡£Æä̻¶ÁË6.4TBµÄÊý¾Ý£¬£¬£¬£¬£¬ÆäÖаüÀ¨60ÒÚÌõ¼Í¼£¬£¬£¬£¬£¬Ð¹Â¶ÁËÁè¼Ý700000Ãû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£´Ë´ÎÊÂÎñµÄй¶ÐÅÏ¢°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©ºÍÆäËûÊý¾Ý£¬£¬£¬£¬£¬ÀýÈ緢Ʊ¡¢È«Ãû¡¢IPµØµã¡¢ÄÚ²¿ÈÕÖ¾¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢¼ÒÍ¥µØµã¡¢É¢ÁÐÃÜÂë¡¢¸¶¿î·½·¨ºÍÓû§µÄº¢×ÓСÎÒ˽¼ÒÐÅÏ¢µÈ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/shopping-site-leaks-miners-data-database-mess-up/
2.ºÚ¿ÍÔÚ°µÍøÉϹûÕæAndroidľÂíCerberusµÄÔ´´úÂë

ºÚ¿ÍÔÚÅÄÂôʧ°Üºó£¬£¬£¬£¬£¬ÔÚ°µÍøÉϹûÕæAndroidľÂíCerberusµÄÔ´´úÂë¡£¡£CerberusÊÇÕë¶ÔGoogle Android²Ù×÷ϵͳµÄÊÖ»úÒøÐÐľÂí£¬£¬£¬£¬£¬ÖÁÉÙ´Ó2019Äê7ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬¾ßÓÐÉñÃØ¼àÊÓ¡¢×赲ͨѶ¡¢¸Ä¶¯×°±¸¹¦Ð§£¬£¬£¬£¬£¬²¢Í¨¹ýÔÚÏÖÓеÄÒøÐС¢ÁãÊÛºÍÉç½»ÍøÂçÓ¦ÓóÌÐòÉϽ¨Éèµþ¼Ó£¬£¬£¬£¬£¬ÇÔÈ¡°üÀ¨ÒøÐÐÖ¤ÊéÔÚÄÚµÄÊý¾Ý¡£¡£¿£¿¨°Í˹»ùÍøÂçÇå¾²Ñо¿Ô±Dmitry GalovÌåÏÖ£¬£¬£¬£¬£¬ÕâÖÖÐÐΪ¶ÔÖÇÄÜÊÖ»úÓû§ºÍÕû¸öÒøÐÐÒµ×é³ÉÁËÖØ´óµÄÍþв¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cerberus-banking-trojan-source-code-released-for-free-to-cyberattackers/
3.ÃÀ¹úÖ¸¿ØÁ½¶í¼®ºÚ¿Í´¹ÂÚ¹¥»÷Èý¼ÒÇ®±ÒÉúÒâËùµÄÓû§

ÃÀ¹úÖ¸¿ØÁ½Ãû¶íÂÞ˹ºÚ¿ÍʹÓÃÍøÂç´¹ÂÚ¹¥»÷ÁËPoloniex¡¢BinanceºÍGeminiÈý¼Ò¼ÓÃÜÇ®±ÒÉúÒâËùµÄÊý°ÙÃûÓû§£¬£¬£¬£¬£¬×ܼÆÇÔÈ¡ÁË1680ÍòÃÀÔª¡£¡£±»Ö¸¿ØµÄÁ½ÃûºÚ¿Í£¨ Danil PotekhinºÍDmitrii Karasavidi£©Ô¼ÄªÔÚ2017Äê6ÔÂ×îÏȻ£¬£¬£¬£¬£¬Í¨¹ý¿Ë¡¼ÓÃÜÇ®±ÒÉúÒâËùµÄÍøÕ¾½¨Éè´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬Ê¹ÓÃÆäÒýÓÕÓû§ÒÔÍøÂçËûÃǵÄÕË»§Æ¾Ö¤¡£¡£´Ë´Î¹¥»÷»î¶¯Éæ¼°µ½ÁË313¸öµÄPoloniexÓû§¡¢142¸öBinanceÓû§ºÍ42¸öGeminiÓû§£¬£¬£¬£¬£¬ËðʧԤ¼ÆÎª16876000ÃÀÔª¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-charges-two-russians-for-stealing-16-8m-via-cryptocurrency-phishing-sites/
4.CISAÅû¶ÒÁÀʺڿÍËùʹÓõÄWeb ShellµÄÏêϸÐÅÏ¢

CISA±¨¸æ£¬£¬£¬£¬£¬ÒÁÀʵÄAPT×éÖ¯Pioneer KittenÕýÔÚʹÓü¸¸öÒÑÖªµÄWeb Shell£¬£¬£¬£¬£¬Õë¶ÔÕû¸öÃÀ¹úµÄIT¡¢Õþ¸®¡¢Ò½ÁÆ¡¢½ðÈںͰü¹Ü×éÖ¯¾ÙÐй¥»÷¡£¡£¸Ã×éÖ¯ÔÚÒÑÍùµÄ¼¸¸öÔÂÀïÒ»Ö±ÔÚÊÔͼʹÓÃÆóÒµVPNÖÐÎó²î£¬£¬£¬£¬£¬°üÀ¨CVE-2019-11510¡¢CVE-2019-11539¡¢CVE-2019-19781ºÍCVE-2020-5902£¬£¬£¬£¬£¬²¢ÔÚÈ«Çò¹æÄ£ÄÚÕë¶ÔPulse Secure¡¢Fortinet¡¢Palo Alto NetworksºÍCitrix VPNµÈ¹«Ë¾¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108357/malware/cisa-web-shells-iranian-hackers.html
5.NSAÐû²¼ÓйØUEFIÇå¾²Æô¶¯×Ô½ç˵µÄÇå¾²Ö¸ÄÏ

ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©Ðû²¼ÁËÓйØÍ³Ò»¿ÉÀ©Õ¹¹Ì¼þ½Ó¿Ú£¨UEFI£©Çå¾²Æô¶¯×Ô½ç˵µÄÖ¸ÄÏ¡£¡£½ü¼¸ÄêÀ´£¬£¬£¬£¬£¬×¨¼ÒÃÇÊӲ쵽һЩʹÓÃrootkitµÄ¹¥»÷£¬£¬£¬£¬£¬ÆäרÃÅÕë¶Ô¹Ì¼þ¿ª·¢ÒÔʵÏÖ³¤ÆÚÐÔ²¢ÈƹýÇå¾²½â¾ö¼Æ»®¡£¡£Çå¾²ÆôÄîÍ·ÖÆÖ»ÔÊÐíÖ´ÐÐÊÜÔʼװ±¸ÖÆÔìÉÌ(OEM)ÐÅÈεÄÈí¼þ£¬£¬£¬£¬£¬ÖÎÀíԱͨ¹ý×Ô½ç˵Çå¾²Æô¶¯·ÀÓù¶ñÒâÈí¼þ¡¢»º½âÄÚ²¿ÍþвºÍ±£»£»£»£»£»¤Êý¾Ý¾²Ö¹¡£¡£NSAÖ¸³ö£¬£¬£¬£¬£¬Çå¾²Æô¶¯¿ÉÒÔÉèÖÃΪÉó¼Æ¹Ì¼þÄ£¿£¿é¡¢À©Õ¹×°±¸ºÍ¿ÉÖ¸µ¼µÄOSÓ³Ïñ£¬£¬£¬£¬£¬¿ÉʹÓÿÉÐÅÆ½Ì¨Ä£¿£¿é(TPM)ÑéÖ¤UEFIÇå¾²Ö¸µ¼µÄÍêÕûÐÔ¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108367/security/nsa-uefi-secure-boot-customization.html
6.µÂ¹úµÄÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬¼ä½Óµ¼Ö»¼ÕßéæÃü

µÂ¹ú¶ÅÈû¶û¶à·ò´óѧҽԺÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬¼ä½Óµ¼Ö»¼ÕßéæÃü¡£¡£¸ÃÒ½ÔºÓÚ9ÔÂ10ÈÕÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬30¶ą̀ÄÚ²¿Ð§ÀÍÆ÷±»Ñ¬È¾£¬£¬£¬£¬£¬µ¼Ö¸ÃҽԺδÄÜÕý³£ÎüÊÕÐèÒª½ôÆÈÖÎÁƵÄÅ®ÐÔ£¬£¬£¬£¬£¬ÖÂʹ¸ÃÃû»¼ÕßÔÚ×ªÒÆµ½30¹«ÀïÍâµÄÎéçêËþ¶ûÊÐÒ»¼ÒÒ½ÔººóéæÃü¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬µÂ¹úÕþ¸®ÕýÔÚÊÓ²ì¸ÃÊÂÎñ£¬£¬£¬£¬£¬²¢ÌåÏÖÈôÊÇ·¢Ã÷ÀÕË÷Èí¼þ¹¥»÷ºÍҽԺͣ»£»£»£»£»úÖ±½ÓÔì³É¸ÃŮʿµÄéæÃü£¬£¬£¬£¬£¬Äǽ«ÆäÊÓ²ìתΪһÆðÐд̰¸¡£¡£ÀÕË÷Èí¼þÍÅ»ïÒ²Ôڵ¹ú¾¯·½½éÈëºó³·»ØÁËÀÕË÷ÒªÇ󣬣¬£¬£¬£¬²¢·¢ËͽâÃÜÆ÷¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/first-death-reported-following-a-ransomware-attack-on-a-german-hospital/


¾©¹«Íø°²±¸11010802024551ºÅ