¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180620

Ðû²¼Ê±¼ä 2018-06-20

¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷APT×éÖ¯Olympic DestroyerÕë¶ÔÅ·ÖÞµÄÐÂÄ¿µÄÌᳫ¹¥»÷


2018Äê5ÔÂÖÁ6Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷ÊôÓÚAPT×éÖ¯Olympic DestroyerµÄд¹ÂÚÎļþÑù±¾£¬£¬£¬£¬¸Ã×éÖ¯ÏÖÔÚÕýÔÚÕë¶Ô¶íÂÞ˹µÄ½ðÈÚ»ú¹¹ºÍÅ·ÖÞµÄÉúÎïºÍ»¯Ñ§ÊµÑéÊÒ¡£¡£¡£¡£¡£Olympic DestroyerÔøÔÚ2018Äê3ÔÂÕë¶Ôº«¹úƽ²ý¶¬°Â»áµÄ×éÖ¯Õß¡¢¹©Ó¦É̺ÍÏàÖúͬ°éÌᳫ¹¥»÷¡£¡£¡£¡£¡£Ñо¿ÍŶÓÅû¶Á˸Ã×éÖ¯µÄй¥»÷»î¶¯µÄÏà¹ØIoC¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/olympic-destroyer-is-still-alive/86169/


¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±³ÆmacOSµÄQuickLook¹¦Ð§¿Éµ¼ÖÈÎÃüÜ´ÅÅ̵ÄÊý¾Ýй¶


Digita SecurityµÄÑо¿Ö°Ô±Patrick WardleÖÒÑÔ³ÆmacOSÓû§´æ´¢ÔÚ¼ÓÃÜ´ÅÅÌÉϵÄÊý¾Ý²¢Ã»ÓлñµÃºÜºÃµÄ±£»£»£»¤£¬£¬£¬£¬ÓÉÓÚmacOSµÄQuickLook¹¦Ð§¿ÉÒÔÉúÑÄͼƬµÈÎļþµÄÔ¤ÀÀ¡£¡£¡£¡£¡£µ±Í¨¹ýUIÉó²éĿ¼ʱ£¬£¬£¬£¬QuickLook½«×Ô¶¯½¨É軺ºÍ´æÎļþµÄËõÂÔͼ£¬£¬£¬£¬ÕâЩËõÂÔͼÉúÑÄÔÚSQLiteÊý¾Ý¿âÖУ¬£¬£¬£¬¿Éͨ¹ýÏà¹ØÏÂÁî¾ÙÐÐÌáÈ¡¡£¡£¡£¡£¡£×ÝȻԭʼÎļþ±»É¾³ý£¬£¬£¬£¬ÕâЩ»º´æÒÀ¾É±£´æ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/macos-quicklook-feature-leaks-data-despite-encrypted-drive/132905/


¡¾ÀÕË÷Èí¼þ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚÀÕË÷Èí¼þSamSamµÄбäÌåµÄÆÊÎö±¨¸æ


Malwarebytes LabsÑо¿ÍŶÓÐû²¼¹ØÓÚSamSamµÄбäÌåµÄÆÊÎö±¨¸æ£¬£¬£¬£¬ÀÕË÷Èí¼þSamSamµÄÓÐÓúÉÔØ£¨ÏÖʵִÐдÅÅ̼ÓÃܵĴúÂ룩ÊÇÔËÐÐʱ½âÃܵÄ£¬£¬£¬£¬ÐèÒª¹¥»÷ÕßÊÖ¶¯ÊäÈëÃÜÂëÀ´Ö´Ðй¥»÷£¬£¬£¬£¬ÕâÊÇSamSamµÄÌØÕ÷¡£¡£¡£¡£¡£¸ÃÌØÕ÷ʹµÃSamSam²»»á×ÔÐÐÈö²¥£¬£¬£¬£¬ÒâÍâÏÂÔØºÍÖ´ÐиöñÒâÈí¼þµÄÓû§²»»áÊܵ½Î£ÏÕ£¬£¬£¬£¬ÕâÒ²ÒâζÕßSamSamÖ÷ÒªÓÃÓÚÓÐÕë¶ÔÐԵĹ¥»÷¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://blog.malwarebytes.com/threat-analysis/2018/06/samsam-ransomware-controlled-distribution/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔAndroidµÄжñÒâÈí¼þHeroRat


ESETÑо¿ÍŶӷ¢Ã÷Ò»¸öеÄAndroid Rat¼Ò×åHeroRat£¬£¬£¬£¬¸ÃRat¼Ò×åÖÁÉÙ´Ó2017Äê8ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬Ö÷ҪʹÓÃTelegramЭÒé¾ÙÐÐÏÂÁîºÍ¿ØÖÆÒÔ¼°Êý¾Ýй¶¡£¡£¡£¡£¡£HeroRatͨ¹ý¶àÖÖ·½·¨Èö²¥£¬£¬£¬£¬°üÀ¨µÚÈý·½Ó¦ÓÃÊÐËÁ¡¢É罻ýÌåºÍ̸ÌìÓ¦Óᣡ£¡£¡£¡£HeroRatÖ÷ÒªÕë¶ÔÒÁÀÊ£¬£¬£¬£¬ÆäÌØ¹¤¹¦Ð§°üÀ¨×èµ²Îı¾ÐÂÎźÍÁªÏµÈËÐÅÏ¢¡¢·¢ËͶÌÐÅ¡¢²¦´òµç»°¡¢Â¼ÖÆÉùÒôºÍÆÁÄ»¡¢»ñȡװ±¸Î»ÖÃÒÔ¼°ÐÞ¸ÄϵͳÉèÖᣡ£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.welivesecurity.com/2018/06/18/new-telegram-abusing-android-rat/


¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶӷ¢Ã÷ÕýÔÚ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius


Check PointµÄÑо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÕýÔÚ¿ª·¢ÖеÄÐÂÒøÐÐľÂíKarius£¬£¬£¬£¬¸ÃľÂíͨ¹ýRIG Exploit Kit¾ÙÐзַ¢£¬£¬£¬£¬Ö¼ÔÚÖ´ÐÐweb×¢Èë¹¥»÷½«ÌØÁíÍâ×Ö¶ÎÌí¼Óµ½ÒøÐеÄÕýµ±µÇÂ¼Ò³Ãæ£¬£¬£¬£¬²¢½«Óû§ÊäÈëµÄÐÅÏ¢·¢Ë͸ø¹¥»÷Õß¡£¡£¡£¡£¡£KariusÓÉÈý¸öÎļþ×é³É£¬£¬£¬£¬°üÀ¨injector32\64.exe¡¢proxy32\64.dllºÍmod32\64.dll£¬£¬£¬£¬ÕâÈý¸öÎļþÅäÊÊÓÃÓÚ×èµ²Óû§µÄͨѶ£¬£¬£¬£¬µ«¸Ã¶ñÒâÈí¼þËÆºõÈÔ´¦ÓÚ¿ª·¢»ò²âÊÔ״̬£¬£¬£¬£¬ÕâÒ²ÊÇΪʲôÆäÉÐδÕë¶ÔÈκÎÏêϸµÄ½ðÈÚ»ú¹¹¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://research.checkpoint.com/banking-trojans-development/


¡¾Çå¾²²¥±¨¡¿Ç°CIA¹ÍÔ±±»Ö¸¿ØÏòWikiLeaksй¶Vault 7ϵÁеÄCIAºÚ¿Í¹¤¾ß


ÃÀ¹ú˾·¨²¿Ðû²¼¶ÔǰCIAÈí¼þ¹¤³ÌʦJoshua SchulteÌá³öеÄÖ¸¿Ø£¬£¬£¬£¬³ÆÆäÉæÏÓÏòWikiLeaksй¶CIAÉñÃØÎļþ¡¢Èí¼þÏîÄ¿ºÍºÚ¿Í¹¤¾ß¡£¡£¡£¡£¡£ÕâЩйÃÜÄÚÈݱ»³ÆÎªVault 7ϵÁУ¬£¬£¬£¬ËüÏÔʾÁËCIAÔõÑùʹÓúڿ͹¤¾ßÀ´¼à¿ØÅÌËã»ú¡¢ÊÖ»ú¡¢µçÊÓ¡¢ÍøÂçÉãÏñÍ·ºÍSSLÅþÁ¬µÈ¡£¡£¡£¡£¡£Âü¹þ¶ÙÉó²é¹ÙGeoffrey S. Berman³Æ£¬£¬£¬£¬ÕâÖÖ²»·¨Ð¹ÃÜ¿ÉÄܶԹú¼ÒÇå¾²Ôì³ÉÑÏÖØµÄÍþв£¬£¬£¬£¬Ç±ÔÚµØÎ£¼°ÃÀ¹úÈËÃñµÄÇå¾²¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/government/ex-cia-employee-charged-with-leak-of-classified-cia-vault-7-hacking-tools/