¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180822
Ðû²¼Ê±¼ä 2018-08-22¡¾ÍþвÇ鱨¡¿Î¢Èí·¢Ã÷²¢×èÖ¹ÁËÕë¶ÔÃÀ¹úÕþÖÎÕûÌåµÄÐÂÒ»ÂÖ¶íÂÞ˹ºÚ¿Í¹¥»÷
±¾ÖÜÒ»Íí¼ä΢ÈíÐû²¼±¨¸æ³ÆÆä·¢Ã÷²¢×èÖ¹Á˶íÂÞ˹ºÚ¿Í×éÖ¯APT28µÄÐÂÒ»ÂÖÕë¶ÔÃÀ¹úÕþÖÎÕûÌåµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£Î¢Èí×ܲÃBrad SmithÌåÏÖ΢ÈíµÄÊý×Ö·¸·¨²¿·Ö£¨DCU£©½ÓÊÜÁËAPT28µÄÁù¸öÓÃÓÚÌᳫ´¹ÂÚ¹¥»÷µÄÓòÃû£¬£¬£¬£¬ÕâÁù¸öÓòÃû»®·ÖÊÇmy-iri.org¡¢hudsonorg-my-sharepoint.com¡¢senate.group¡¢adfs-senate.services¡¢adfs-senate.emailºÍoffice365-onedrive.com£¬£¬£¬£¬ÆäÖÐÈý¸öÓòÃûð³ä³ÉÃÀ¹ú²ÎÒéÔºµÄÍøÕ¾¡£¡£¡£¡£¡£SmithÌåÏÖ΢ÈíÒÑÔÚÒÑÍùÁ½ÄêÄÚ½ÓÊÜÁËAPT×éÖ¯µÄ84¸öÓòÃû¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/russia-election-hacking.html
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷Õë¶Ôº«¹úÆóÒµµÄй©Ó¦Á´¹¥»÷»î¶¯Operation Red Signature
Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶÓÔÚ7ÔÂβ·¢Ã÷Ö÷ÒªÕë¶Ôº«¹úÆóÒµµÄй©Ó¦Á´¹¥»÷»î¶¯Operation Red Signature¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯µÄÄ¿µÄÊÇÇÔÊØÐÅÏ¢¡£¡£¡£¡£¡£¹¥»÷ÕßÇÔÈ¡ÁËÒ»¸öÔ¶³ÌÖ§³Ö½â¾ö¼Æ»®ÌṩÉ̵ÄÖ¤Ê飬£¬£¬£¬²¢Ê¹ÓÃËüÀ´¶Ô¶ñÒâÈí¼þ¾ÙÐÐÊðÃû¡£¡£¡£¡£¡£È»ºó¹¥»÷ÕßÈëÇÖÁ˸ù«Ë¾µÄ¸üÐÂЧÀÍÆ÷£¬£¬£¬£¬µ±ÐèÒª¸üеÄÓû§µÄIPÊÇÆäÄ¿µÄ×éÖ¯µÄIP¹æÄ£ÄÚʱ£¬£¬£¬£¬¸üÐÂЧÀÍÆ÷½«ÏòÓû§·¢ËÍÔ¶¿ØÄ¾Âí9002 RAT¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷Õë¶ÔÄ«Î÷¸çµÄ¶ñÒâ¹¥»÷»î¶¯Dark Tequila
¿¨°Í˹»ùÑо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÄ«Î÷¸çµÄ¶ñÒâ¹¥»÷»î¶¯Dark Tequila¡£¡£¡£¡£¡£Dark TequilaµÄÖ÷ҪĿµÄÊÇÇÔÈ¡²ÆÎñÐÅÏ¢£¬£¬£¬£¬µ«Ò²Õë¶ÔһЩʢÐÐÍøÕ¾µÄµÇ¼ƾ֤£¬£¬£¬£¬ÆäÄ¿µÄÁбíÖ÷Òª°üÀ¨¼¸¼ÒÄ«Î÷¸çÒøÐС£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯µÄѬȾ·½·¨ÓÐÁ½ÖÖ£¬£¬£¬£¬ÍøÂç´¹ÂÚ¹¥»÷ºÍUSB×°±¸Ñ¬È¾¡£¡£¡£¡£¡£ÈôÊÇÊÜѬȾÕß²»ÔÚÄ«Î÷¸ç»ò²»ÊǸÐÐËȤµÄÄ¿µÄ£¬£¬£¬£¬Ôò»á´ÓÊܺ¦ÕߵĻúеԶ³ÌÐ¶ÔØ¸Ã¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Dark TequilaÊÇÒ»ÖÖÖØ´óµÄ¶ñÒâÈí¼þ£¬£¬£¬£¬°üÀ¨¶à¸ö¹¦Ð§Ä£¿£¿£¿é£¬£¬£¬£¬ËùÓÐÇÔÈ¡µÄÊý¾Ý¶¼Í¨¹ý¼ÓÃܵķ½·¨ÉÏ´«ÖÁЧÀÍÆ÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/dark-tequila-anejo/87528/
¡¾Êý¾Ýй¶¡¿ÃÀAugustaÒ½ÁÆÖÐÐÄÈ·ÈÏ2017Äê9ÔÂÔ¼41.7Íò»¼ÕßµÄÐÅϢй¶
ÃÀ¹úAugustaÒ½ÁÆÖÐÐÄ7ÔÂ31ÈÕµÄÊÓ²ìЧ¹ûÏÔʾ£¬£¬£¬£¬2017Äê9ÔÂÕë¶ÔÆäÒ½ÁÆÊÂÇéÖ°Ô±µÄÍøÂç´¹ÂÚ¹¥»÷µ¼ÖÂÔ¼41.7Íò»¼ÕßµÄÊý¾Ý±»ÇÔ¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨µØµã¡¢³öÉúÈÕÆÚ¡¢Ò½ÁƼͼ±àºÅ¡¢ÖÎÁƺÍÊÖÊõÐÅÏ¢¡¢Õï¶ÏЧ¹û¡¢Ò©ÎïÒÔ¼°°ü¹ÜÐÅÏ¢µÈ£¬£¬£¬£¬ÉõÖÁ°üÀ¨²¿·Ö»¼ÕßµÄÉç±£ºÅÂëºÍ¼ÝÕÕºÅÂë¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÄܻᱻºóÐøµÄÍøÂç´¹ÂÚ¹¥»÷¡¢Éí·ÝڲƻÉõÖÁÀÕË÷»î¶¯ËùʹÓᣡ£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/augusta-health-center-reveals/
¡¾ÆÊÎö±¨¸æ¡¿Ñо¿»ú¹¹Ðû²¼2018ÄêQ2ÍøÂçÍþвÇ÷ÊÆµÄÆÊÎö±¨¸æ
ƾ֤Rapid7µÄ×îÐÂÍþвÆÊÎö±¨¸æ£¬£¬£¬£¬ÖÆÔìÒµÕýÔâµ½Ô½À´Ô½¶àµÄ¶ñÒâ¹¥»÷»î¶¯¡£¡£¡£¡£¡£Õë¶ÔËùÓÐÐÐÒµµÄƾ֤͵ÇÔ¹¥»÷ºÍÕË»§Ð¹Â¶ÒÔ¼°Ô¶³Ì»á¼û¹¥»÷ÕýÔÚÔöÌí¡£¡£¡£¡£¡£Õë¶ÔСÐÍÆóÒµµÄ¹¥»÷»î¶¯µÄÒ»°ëÊÇÔ¶³ÌÈëÇÖ¡£¡£¡£¡£¡£¶ø6Ô·ÝÍþвÊÂÎñµÄµÚÒ»ÃûÊÇÕë¶ÔÍâµØÕË»§µÄ±©Á¦ÆÆ½â¹¥»÷¡£¡£¡£¡£¡£Í¬Ê±Õë¶Ô·ÓÉÆ÷¡¢webЧÀÍÆ÷µÄ¶ñÒâÍÚ¿óÈí¼þµÄ×¢Èë¹¥»÷ÕýÔÚÐËÆð¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.rapid7.com/globalassets/_pdfs/research/rapid7-threat-report-2018-q2.pdf
¡¾Îó²î²¹¶¡¡¿Ñо¿Ö°Ô±Åû¶°¬Ä¬ÉúDeltaV DCSÊÂÇéÕ¾ÖеĶà¸öÇå¾²Îó²î
Çå¾²Ñо¿Ö°Ô±·¢Ã÷°¬Ä¬ÉúDeltaV DCSÊÂÇéÕ¾±£´æ¶à¸öÇå¾²Îó²î¡£¡£¡£¡£¡£°¬Ä¬ÉúDeltaVÊÂÇéÕ¾ÊÇרΪÔËÐÐDeltaVÓ¦ÓöøÉè¼ÆµÄרÓÃÅÌËã»ú£¬£¬£¬£¬ÆäÔÚÈ«Çò¹æÄ£ÄÚÖ÷ÒªÓÃÓÚ»¯Ñ§ºÍÄÜÔ´ÁìÓò¡£¡£¡£¡£¡£½ÏÑÏÖØµÄÎó²î°üÀ¨Õ»»º³åÇøÒç³öÎó²î£¨CVE-2018-14793£©£¬£¬£¬£¬¸ÃÎó²î¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐУ»£»£»£»£»£»£»²»×¼È·µÄ·¾¶ÑéÖ¤Îó²î£¨CVE-2018-14795£©£¬£¬£¬£¬¸ÃÎó²î¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ»£»£»£»£»£»£»DLLÐ®ÖÆÎó²î£¨CVE-2018-14797£©£¬£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´Ðеȡ£¡£¡£¡£¡£¸Ã¹«Ë¾ÒѾÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/flaws-emerson-workstations-allow-lateral-movement