¡¾Êý¾Ýй¶¡¿°®¶ûÀ¼µçÐŹ«Ë¾EirµÄһ̨Ìõ¼Ç±¾±»µÁ£¬£¬£¬µ¼ÖÂÔ¼3.7ÍòÓû§µÄÐÅϢй¶
ƾ֤°®¶ûÀ¼µçÐŹ«Ë¾Eir¹ÙÍøÉϵÄ֪ͨ£¬£¬£¬¸Ã¹«Ë¾µÄһ̨°üÀ¨Óû§Êý¾ÝµÄδ¼ÓÃܵÄÌõ¼Ç±¾µçÄÔÔâÇÔ£¬£¬£¬µ¼ÖÂÔ¼3.7ÍòÓû§µÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëºÍeirÕ˺𣡣¡£¡£¡£¡£¡£¸Ã¹«Ë¾³ÆÐ¹Â¶µÄÊý¾Ý²»°üÀ¨ÈκÎÓû§µÄ²ÆÎñÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÏÖÔڸù«Ë¾ÒÑÏòÊý¾Ý±£»£»£»£»£»£»£»¤×¨Ô±ºÍ°®¶ûÀ¼¾¯Ô±×ª´ïÁË´Ë´ÎÊÂÎñ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75655/data-breach/eir-data-breach.html
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӳÆÈýÐÇ¡¢»ªÎªµÈ11¼Ò³§É̵ÄAndroidÊÖ»úÒ×ÊÜATÏÂÁî¹¥»÷
Çå¾²Ñо¿ÍŶӷ¢Ã÷11¸öÊÖ»ú³§É̵ÄAndroidÖÇÄÜÊÖ»úÒ×ÊÜATÏÂÁîµÄ¹¥»÷£¬£¬£¬°üÀ¨»ªË¶¡¢Google¡¢HTC¡¢»ªÎª¡¢åÚÏë¡¢LG¡¢Ä¦ÍÐÂÞÀ¡¢ÈýÐÇ¡¢Ë÷Äá¡¢ÖÐÐ˺ÍLineageOS¡£¡£¡£¡£¡£¡£¡£¸ÃÑо¿ÍŶӯÊÎöÁËÕâ11¼Ò³§É̵Ä2000¶à¸öAndroid¹Ì¼þ¾µÏñ£¬£¬£¬·¢Ã÷ÕâЩװ±¸Ö§³ÖÁè¼Ý3500ÖÖ²î±ðÀàÐ͵ÄATÏÂÁ£¬£¬ÆäÖÐһЩÏÂÁî¿ÉÒÔ»á¼ûºÜÊÇΣÏյĹ¦Ð§¡£¡£¡£¡£¡£¡£¡£ÕâЩÏÂÁî¿ÉÒÔͨ¹ýUSB¶Ë¿Ú»á¼û¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/smartphones-from-11-oems-vulnerable-to-attacks-via-hidden-at-commands/
¡¾ÍþвÇ鱨¡¿GoogleÑо¿Ö°Ô±³Æ±¤ÀÝÖ®Ò¹µÄAndroid appÒ×ÊÜMitD¹¥»÷
GoogleÇå¾²Ñо¿Ö°Ô±·¢Ã÷ºÜÊÇÊܽӴýµÄÓÎÏ·±¤ÀÝÖ®Ò¹µÄAndroid°æÒ×ÊÜMitD¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÒÑ×°ÖÃÔÚÓû§ÊÖ»úÉϵĵÍȨÏÞ¶ñÒâappÐ®ÖÆ±¤ÀÝÖ®Ò¹appµÄ×°ÖÃÀú³Ì²¢×°ÖþßÓиü¸ßȨÏÞ¼¶±ðµÄÆäËü¶ñÒâÓ¦Óᣡ£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·ÖÏíÁËÒ»¸ö¹¥»÷Àú³ÌµÄÑÝʾÊÓÆµ¡£¡£¡£¡£¡£¡£¡£±¤ÀÝÖ®Ò¹µÄ¿ª·¢ÉÌEpic GamesÐû²¼ÁËа汾2.1.0ÒÔÐÞ¸´´ËÎÊÌâ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/fortnite-android-app-vulnerable-to-man-in-the-disk-attacks/
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÈÕ±¾µÄ´ó¹æÄ£À¬»øÓʼþ»î¶¯
Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÈÕ±¾µÄ´ó¹æÄ£À¬»øÓʼþ»î¶¯¡£¡£¡£¡£¡£¡£¡£¸ÃÀ¬»øÓʼþ»î¶¯Óɽ©Ê¬ÍøÂçCutwail·Ö·¢£¬£¬£¬Ê¹Óû¥ÁªÍøÅÌÎÊÎļþIQYÈö²¥¶ñÒâÈí¼þBEBLOHºÍURSNIF¡£¡£¡£¡£¡£¡£¡£Ñо¿ÍŶÓÔÚ2018Äê8ÔÂ6ÈÕ¼ì²âµ½¸Ã»î¶¯£¬£¬£¬¸Ã»î¶¯¿¢ÊÂÓÚ8ÔÂ9ÈÕ£¬£¬£¬¹²·Ö·¢ÁËÔ¼50Íò·âÀ¬»øÓʼþ¡£¡£¡£¡£¡£¡£¡£ÈôÊǼì²âµ½·ÇÈÕ±¾µÄIPµØµã£¬£¬£¬Ôò²»»áÏÂÔØ¶ñÒâµÄÓÐÓúÉÔØ¡£¡£¡£¡£¡£¡£¡£ÆäÓÐÓúÉÔØBEBLOHÊÇÒ»¸öÒøÐÐľÂí£¬£¬£¬¶øURSNIFÔòÊÇÒ»¸öÖøÃûµÄÓÃÓÚÇÔÊØÐÅÏ¢µÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/iqy-and-powershell-abused-by-spam-campaign-to-infect-users-in-japan-with-bebloh-and-ursnif/
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÑÝʾͨ¹ýUSB³äµçÏßÈëÇÖÅÌËã»úµÄUSBHarpoon¹¥»÷
Çå¾²Ñо¿ÍŶÓÑÝʾÔõÑùʹÓÃUSB³äµçÏßÈëÇÖÅÌËã»úµÄUSBHarpoon¹¥»÷¡£¡£¡£¡£¡£¡£¡£USBHarpoonʹÓóäµçÏß¶ø²»ÊÇUSBÇý¶¯Æ÷À´Íê³ÉÈëÇÖ£¬£¬£¬ÕâʹÆäÔ½·¢ÒþÄä¡£¡£¡£¡£¡£¡£¡£¸Ã³äµçÏß´øÓÐˢеÄÅþÁ¬Æ÷£¬£¬£¬ÔÊÐíµçÁ÷ºÍÊý¾Ýͨ¹ý£¬£¬£¬´Ë¹¦Ð§Ê¹Æä¿ÉÒÔÅäºÏÈκÎUSB×°±¸¶ø²»»áÒýÆðÏÓÒÉ¡£¡£¡£¡£¡£¡£¡£USBHarpoon¹¥»÷¿ÉÒÔÆô¶¯ÏÂÔØºÍÖ´ÐÐÓÐÓúÉÔØµÄÏÂÁî¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75644/hacking/usbharpoon-attack.html
¡¾ÍþвÇ鱨¡¿FireEyeÅû¶ÒÉËÆÒÁÀÊÌᳫµÄÕë¶ÔÃÀ¹ú¡¢Ó¢¹úºÍÖж«µÄÐéαÐÂÎÅÍøÂç
FireEye¿ËÈÕ·¢Ã÷ÁËÒ»ÏîËÆºõÀ´×ÔÒÁÀʵĿÉÒɻ£¬£¬£¬¸Ã¶ñÒâ»î¶¯Ê¹Óöà¸öÉ罻ýÌåÆ½Ì¨ÉϵÄÐéαÐÂÎÅÍøÕ¾ºÍÏà¹ØÕË»§µÄ¼¯ÈºÍøÂ磬£¬£¬Ðû²¼ÇкÏÒÁÀÊÀûÒæµÄÕþÖÎÐÂÎÅ¡£¡£¡£¡£¡£¡£¡£ÆäÕë¶ÔµÄµØÇø°üÀ¨ÃÀ¹ú¡¢Ó¢¹ú¡¢À¶¡ÃÀÖÞºÍÖж«µØÇø£¬£¬£¬Ðû´«µÄÄÚÈݰüÀ¨·´É³Ìذ¢À²®¡¢·´ÒÔÉ«ÁкÍÇ×°ÍÀÕ˹̹ÒÔ¼°Ö§³ÖÃÀ¹úÓÐÀûÓÚÒÁÀʵÄÏêϸÕþ²ß£¬£¬£¬ÈçÃÀÒÁºËÐÒ飨JCPOA£©µÈ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.fireeye.com/blog/threat-research/2018/08/suspected-iranian-influence-operation.html