¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181009
Ðû²¼Ê±¼ä 2018-10-09
¡¶Òâ¼û¡·Î§ÈƽøÒ»²½ÂäʵµçÁ¦ÆóÒµÍøÂçÇå¾²Ö÷ÌåÔðÈΣ¬£¬£¬£¬ÍêÉÆÍøÂçÇå¾²¼àÊÓÖÎÀíÌåÖÆ»úÖÆ£¬£¬£¬£¬Ôöǿȫ·½Î»ÍøÂçÇå¾²ÖÎÀí£¬£¬£¬£¬Ç¿»¯Òªº¦ÐÅÏ¢»ù´¡ÉèÊ©Çå¾²±£»£»£»¤£¬£¬£¬£¬ÔöÇ¿ÐÐÒµÍøÂçÇå¾²»ù´¡ÉèÊ©½¨É裬£¬£¬£¬ÔöÇ¿µçÁ¦ÆóÒµÊý¾ÝÇå¾²±£»£»£»¤£¬£¬£¬£¬Ìá¸ßÍøÂçÇå¾²Ì¬ÊÆ¸ÐÖª¡¢Ô¤¾¯¼°Ó¦¼±´¦Öóͷ£ÄÜÁ¦£¬£¬£¬£¬Ö§³ÖÍøÂçÇå¾²×ÔÖ÷Á¢ÒìÓëÇå¾²¿É¿Ø£»£»£»Æð¾¢Íƶ¯µçÁ¦ÐÐÒµÍøÂçÇå¾²¹¤Òµ¿µ½¡Éú³¤£¬£¬£¬£¬ÍƽøÍøÂçÇå¾²¾üÃñÈÚºÏÉî¶ÈÉú³¤£¬£¬£¬£¬ÔöÇ¿ÍøÂçÇå¾²È˲Ų½¶Ó½¨É裬£¬£¬£¬ÍØÕ¹ÍøÂçÇå¾²¹ú¼ÊÏàÖúµÈ12·½ÃæÌá³ö30ÌõÏêϸҪÇ󡣡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ics-cert.org.cn/portal/page/132/0460854682f84a51baf925e95162aabb.html2¡¢ÉæÏÓÕÚÑÚ50ÍòÓû§Êý¾Ýй¶£¬£¬£¬£¬¹È¸è½«¹Ø±ÕÉç½»ÍøÂçGoogle+

ƾ֤¹È¸èµÄ±¨¸æ£¬£¬£¬£¬Google+µÄPeople APIÖб£´æÒ»¸öÇå¾²Îó²î£¬£¬£¬£¬¿ÉÔÊÐíµÚÈý·½¿ª·¢Õß»á¼ûÁè¼Ý50ÍòÓû§µÄÊý¾Ý£¬£¬£¬£¬°üÀ¨Óû§Ãû¡¢µç×ÓÓʼþµØµã¡¢Ö°Òµ¡¢³öÉúÈÕÆÚ¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏÕÕÆ¬ÒÔ¼°ÐÔ±ðµÈÐÅÏ¢¡£¡£¡£¡£¹È¸èÔÚ2018Äê3Ô·¢Ã÷²¢ÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬µ«¸Ã¹«Ë¾Ñ¡Ôñ²»Ïò¹«ÖÚÅû¶´ËÊÂÎñ¡£¡£¡£¡£³ýÁËÈϿɴËÊý¾Ýй¶ÊÂÎñÖ®Í⣬£¬£¬£¬¹È¸è»¹Ðû²¼½«¹Ø±ÕGoogle+¡£¡£¡£¡£
https://thehackernews.com/2018/10/google-plus-shutdown.html
3¡¢Ñо¿ÍŶÓÔÚMikroTik·ÓÉÆ÷µÄRouterOSÖз¢Ã÷¶à¸öÇå¾²Îó²î

Tenable ResearchÅû¶MikroTik·ÓÉÆ÷µÄRouterOSÖеÄ4¸öÇå¾²Îó²î£¬£¬£¬£¬°üÀ¨¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÎó²î£¨CVE-2018-1156£©¡¢ÎļþÉÏ´«Îó²î£¨CVE-2018-1157£©¡¢ÄÚ´æËð»µÎó²î£¨CVE-2018-1159£©ÒÔ¼°¿ÍÕ»ºÄ¾¡Îó²î£¨CVE-2018-1158£©¡£¡£¡£¡£ÆäÖÐÑÏÖØÐÔ×î¸ßµÄÎó²îÊÇRCEÎó²î£¨CVE-2018-1156£©£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²î»ñµÃÍêÕûµÄϵͳ»á¼ûȨÏÞ¡£¡£¡£¡£MikroTikÔÚRouterOS 6.40.9¡¢6.42.7ºÍ6.43ÖÐÐÞ¸´ÁËÕâЩÎó²î¡£¡£¡£¡£
https://www.tenable.com/blog/tenable-research-advisory-multiple-vulnerabilities-discovered-in-mikrotiks-routeros
4¡¢ÈüÃÅÌú¿ËÐû²¼¹ØÓÚAPT28µÄÐÂÌØ¹¤»î¶¯µÄÆÊÎö±¨¸æ

ÈüÃÅÌú¿ËÐû²¼¹ØÓÚAPT28µÄÆÊÎö±¨¸æ¡£¡£¡£¡£APT28×Ô2007Äê1ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬²¢ÔÚ2017ÄêºÍ2018Äê¼ÌÐøÆäÇé±¨ÍøÂç»î¶¯¡£¡£¡£¡£ÆäÔÚ2017ÄêºÍ2018ÄêµÄ¹¥»÷Ä¿µÄ°üÀ¨Ò»¸ö×ÅÃûµÄ¹ú¼Ê×éÖ¯¡¢Å·Ö޵ľüÊÂÄ¿µÄ¡¢Å·ÖÞµÄÕþ¸®»ú¹¹¡¢Ò»¸öÄÏÃÀ¹ú¼ÒµÄÕþ¸®»ú¹¹ÒÔ¼°Ò»¸ö¶«Å·¹ú¼ÒµÄ´óʹ¹Ý¡£¡£¡£¡£ÆäʹÓõŤ¾ß°üÀ¨¶ñÒâÈí¼þSofacy¡¢Trojan.ShunnaelÒÔ¼°Trojan.Lojax¡£¡£¡£¡£Ñо¿ÍŶӻ¹·¢Ã÷¸Ã×éÖ¯ÓëÁíÒ»¸ö·¸·¨×éÖ¯Earworm±£´æ¹ØÁª¡£¡£¡£¡£
https://www.symantec.com/blogs/election-security/apt28-espionage-military-government
5¡¢ÒÔÉ«Áйú¼ÒÇå¾²¾ÖÖÒÑÔʹÓÃÓïÒôÐÅÏäÐ®ÖÆWhatsAppÕË»§µÄй¥»÷

ÒÔÉ«Áйú¼ÒÍøÂçÇå¾²¾Ö£¨INCSA£©Ðû²¼¹ØÓÚͨ¹ýÓïÒôÐÅÏäÐ®ÖÆWhatsAppÕË»§¹¥»÷µÄ¾¯±¨¡£¡£¡£¡£¾ÝÒÔÉ«ÁÐÕþ¸®³Æ£¬£¬£¬£¬×î½ü¼¸ÖÜÄÚ±£´æ´ó×ÚʹÓøÃÊÖÒÕµ¼ÖÂWhatsAppÕË»§±»Ð®ÖƵı¨¸æ¡£¡£¡£¡£Í¨¹ýÓïÒôÐÅÏäÀ´Ð®ÖÆWhatsAppÕË»§ÊÇÒ»ÖÖÏà¶Ô½ÏÐµĹ¥»÷ÒªÁ죬£¬£¬£¬¸ÃÒªÁì²»ÐèÒªÈκθ߼¶ÊÖÒÕ»ò×°±¸¡£¡£¡£¡£ÒÔÉ«ÁÐÕþ¸®½¨ÒéÓû§ÔÚÓïÒôÐÅÏäÖÐʹÓÃÇ¿ÃÜÂë¾ÙÐб£»£»£»¤£¬£¬£¬£¬»òÕ߯ôÓÃWhatsAppÕÊ»§µÄÁ½²½ÑéÖ¤Õ½ÂÔ¡£¡£¡£¡£
https://www.zdnet.com/article/recent-wave-of-hijacked-whatsapp-accounts-traced-back-to-voicemail-hacking/
6¡¢¼ÓÖݽ«´Ó2020Äê×îÏȽûÓÃadminºÍpasswordµÈÈõÃÜÂë

´Ó2020Äê×îÏÈ£¬£¬£¬£¬³§ÉÌÔÚ¼ÓÀû¸£ÄáÑÇÖÝʹÓÃadminºÍpasswordµÈÈõĬÈÏÃÜÂ뽫ÊÇÎ¥·¨µÄ¡£¡£¡£¡£¸ÃÖÝÒÑͨ¹ýÒ»ÏîÖ´·¨£¨ÎïÁªÍøÒþ˽±£»£»£»¤·¨°¸£©£¬£¬£¬£¬Ö¼ÔÚΪ¸ÃµØÇøÖÆÔì»òÏúÊÛµÄÎïÁªÍø×°±¸É趨¸ü¸ßµÄÇå¾²±ê×¼¡£¡£¡£¡£¸Ã·¨°¸ÒªÇóÔÚÖÆÔìʱΪÿһ̨װ±¸ÌṩΨһµÄÃÜÂë¡£¡£¡£¡£¸Ã·¨°¸»¹ÔÊÐíÔâÊÜËðʧµÄÊܺ¦Õ߯ðËßÎÞÊӸ÷¨°¸µÄ¹«Ë¾ÒÔ»ñµÃÅâ³¥¡£¡£¡£¡£
https://www.bbc.co.uk/news/amp/technology-45757528
ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí