¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180713
Ðû²¼Ê±¼ä 2018-07-13¡¾¶ñÒâÈí¼þ¡¿ÒøÐÐľÂíHancitor¾íÍÁÖØÀ´£¬£¬£¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþÈö²¥
ÒøÐÐľÂíHancitor×îÔçÓÚ2014Äê±»·¢Ã÷£¬£¬£¬ÓÃÓÚÏÂÔØÆäËü¶ñÒâÈí¼þ²¢ÇÔÈ¡Óû§µÄƾ֤¡£¡£¡£¡£¡£¡£SentinelOneÊӲ쵽Hancitorͨ¹ýÍøÂç´¹ÂÚÓʼþ¾ÙÐÐÈö²¥µÄ¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£Ò»Ð©´¹ÂÚÓʼþÒÔÍ£³µ·£¿£¿£¿£¿îµ¥ÎªÖ÷Ì⣬£¬£¬ÓÕÆÓû§µã»÷Æä¶ñÒâÁ´½Ó²¢ÏÂÔØ¶ñÒâwordÎĵµ¡£¡£¡£¡£¡£¡£»£»£»£»£»£»£ÉÐÓÐһЩÀ¬»øÓʼþÀ´×ÔÓÚIntuit»òHalloFax£¬£¬£¬ÓÕÆÓû§ÏÂÔØ¶ñÒâ´«ÕæÎļþ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Åû¶Á˸öñÒâ»î¶¯µÄ¶ñÒâ·Ö·¢ÍøÖ·¼°C2ЧÀÍÆ÷¡¢ÓÐÓúÉÔØµÈÈëÇÖÖ¸±ê£¨IoC£©¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.sentinelone.com/blog/hancitor-banking-trojan-is-back-%7C-using-malicious-word-attachment/
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚHawkeye KeyloggerµÄбäÌåµÄÆÊÎö±¨¸æ
΢ÈíOFFICE 365Ñо¿ÍŶÓÐû²¼¹ØÓÚ¶ñÒâÈí¼þHawkeye KeyloggerµÄбäÌåµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Hawkeye KeyloggerÓÖ±»³ÆÎªiSpy Keylogger£¬£¬£¬Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄÐÅÏ¢£¬£¬£¬Æä×îºóÒ»´Î·ºÆðÔÚ2016Äê¡£¡£¡£¡£¡£¡£µ«Ñо¿Ö°Ô±ÔÚ2018Äê4Ô·¢Ã÷¸Ã¶ñÒâÈí¼þÔٴηºÆð£¬£¬£¬Ö÷ÒªÕë¶ÔÈí¼þºÍÊÖÒÕÐÐÒµ£¨52%£©£¬£¬£¬ÒÔ¼°ÒøÐУ¨11%£©¡¢ÄÜÔ´£¨8%£©¡¢»¯¹¤£¨5%£©ºÍÆû³µ£¨5%£©ÐÐÒµ¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¹ú¼Ò/µØÇø°üÀ¨°¢ÁªÇõ£¨19%£©¡¢ºÉÀ¼£¨15%£©¡¢ÃÀ¹ú£¨11%£©¡¢ÄÏ·Ç£¨6%£©ÒÔ¼°Ó¢¹ú£¨5%£©¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cloudblogs.microsoft.com/microsoftsecure/2018/07/11/hawkeye-keylogger-reborn-v8-an-in-depth-campaign-analysis/
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÔÚGoogle PlayÖз¢Ã÷ÐÂÌØ¹¤Èí¼þGolden Cup
McAfee LabsÑо¿ÍŶÓÔÚGoogle PlayÉÏ·¢Ã÷ÓëÌìϱÖ÷ÌâÏà¹ØµÄÐÂÌØ¹¤Èí¼þGolden Cup¡£¡£¡£¡£¡£¡£ÔÚδ¾Óû§Ô޳ɵÄÇéÐÎÏ£¬£¬£¬Golden Cup»áÔÚºǫ́¾²Ä¬ÍøÂçÓû§µÄÐÅÏ¢²¢·¢ËÍÖÁЧÀÍÆ÷£¬£¬£¬ÕâЩÐÅÏ¢°üÀ¨Óû§µÄµç»°ºÅÂë¡¢ÒÑ×°ÖÃÓ¦ÓÃÁÐ±í¡¢×°±¸ID¡¢Android°æ±¾¡¢IMEI¡¢IMSI¡¢¿ÉÓô洢ÈÝÁ¿ÒÔ¼°×°±¸µÄÐͺ𢳧É̺ÍÐòÁкš£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËͳһÍþвµÄÁíÍâÁ½¸ö±äÌ壬£¬£¬Google PlayÒѾɾ³ýÁËÕâЩ¶ñÒâÓ¦Óᣡ£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securingtomorrow.mcafee.com/mcafee-labs/google-play-users-risk-a-yellow-card-with-android-foulgoal-a/
¡¾¹¥»÷ÊÂÎñ¡¿VSDC¹ÙÍø1¸öÔÂÄÚÈý´ÎÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ÆäÈí¼þÏÂÔØÁ´½Ó±»Ð®ÖÆ
VSDCÊÇÒ»¼ÒÌṩÃâ·ÑÊÓÆµ±à¼Èí¼þµÄ¹«Ë¾£¬£¬£¬Æä¹ÙÍøÔÚ1¸öÔÂÄÚÈý´ÎÔâµ½ºÚ¿ÍÈëÇÖ£¨6ÔÂ18ÈÕ¡¢7ÔÂ2ÈÕºÍ7ÔÂ6ÈÕ£©£¬£¬£¬¹¥»÷Õß½«ÆäVSDCÈí¼þµÄÏÂÔØÁ´½ÓÌæ»»Îª¶ñÒâÁ´½Ó£¬£¬£¬»®·Ö½«Óû§Öض¨ÏòÖÁÈý¸ö¶ñÒâÈí¼þ£¨Ò»¸öÓÃÓÚÇÔÈ¡Óû§ÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬£¬£¬Ò»¸ö¼üÅ̼ͼÆ÷ºÍÒ»¸öÔ¶¿ØÄ¾ÂíRAT£©¡£¡£¡£¡£¡£¡£VSDCÈ·ÈÏÁËÕâЩÊÂÎñ£¬£¬£¬²¢³ÆÆäÒѾÐÞ¸´ÁËÍøÕ¾¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/popular-software-site-hacked-to-redirect-users-to-keylogger-infostealer-more/
¡¾¹¥»÷ÊÂÎñ¡¿ÃÀ¹ú¿¨Ë¹µØÇøµÄÒ½ÁÆÖÐÐÄÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷
ÃÀ¹úÃÜËÕÀïÖÝ¿¨Ë¹µØÇøµÄÒ½ÁÆÖÐÐÄ³ÆÆäÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬£¬ÆäÄÚ²¿Í¨Ñ¶ÏµÍ³ºÍµç×Ó¿µ½¡µµ°¸ÏµÍ³£¨EHR£©ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¸ÃÒ½ÁÆÖÐÐijÆÃ»ÓÐÖ¤¾ÝÅú×¢»¼ÕßµÄÊý¾Ý±»»á¼û¡£¡£¡£¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎúÆäÅÌËã»ú/ЧÀÍÆ÷ÔõÑù±»Ñ¬È¾£¬£¬£¬µ«Ïà¹ØÖ´·¨²¿·ÖÒѾ½éÈë¾ÙÐÐÊӲ졣¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/cass-regional-medical-center-hit-with-unidentified-ransomware/
¡¾Îó²î²¹¶¡¡¿µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGOÐÞ¸´ÆäHMI²úÆ·ÖеĶà¸öÎó²î
µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGOÐÞ¸´Æäe!DISPLAY 7300TÈË»ú½çÃæ£¨HMI£©²úÆ·ÖеĶà¸öÇå¾²Îó²î£¬£¬£¬°üÀ¨XSSÎó²î£¨CVE-2018-12981£©¡¢ÎļþÉÏ´«Îó²î£¨CVE-2018-12980£©ÒÔ¼°Ä¬ÈÏȨÏÞÉèÖò»×¼È·µÄÎó²î£¨CVE-2018-12979£©¡£¡£¡£¡£¡£¡£Í¨¹ý×éºÏʹÓÃÕâЩÎó²î£¬£¬£¬¹¥»÷Õß¿ÉÁýÕÖindex.html²¢ÒÔwwwÓû§µÄȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÐͺŰüÀ¨762-3000~762-3003£¬£¬£¬WAGOÒÑÔڹ̼þ°æ±¾02ÖÐÐÞ¸´ÁËÕâЩÎó²î¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/hackers-can-chain-multiple-flaws-attack-wago-hmi-devices