¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181107
Ðû²¼Ê±¼ä 2018-11-07
¿¨°Í˹»ùʵÑéÊÒÐû²¼2018ÄêµÚÈý¼¾¶ÈÀ¬»øÓʼþºÍÍøÂç´¹ÂڻµÄÇ÷ÊÆÆÊÎö±¨¸æ¡£¡£¡£¡£¡£ÔÚ2018ÄêQ3£¬£¬£¬£¬À¬»øÓʼþռȫÇòÓʼþ×ÜÁ¿ÖеıÈÀýÔöÌíÁË2.88¸ö°Ù·Öµã£¬£¬£¬£¬´ï52.54%¡£¡£¡£¡£¡£·´´¹ÂÚϵ×ܹ²×èÖ¹ÁËÁè¼Ý1.37ÒÚ¸öÌø×ªÖÁ´¹ÂÚÍøÕ¾µÄÖØ¶¨Ïò£¬£¬£¬£¬±ÈÉÏÒ»¼¾¶ÈÔöÌíÁË3000Íò¡£¡£¡£¡£¡£À¬»øÓʼþºÍ´¹Âڻ¼ÌÐøÊ¹Óñ¾¼¾¶ÈµÄÖØ´óÐÂÎű¨µÀÀ´Èö²¥£¬£¬£¬£¬ÀýÈçÐÂiPhoneµÄÐû²¼¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/spam-and-phishing-in-q3-2018/88686/2¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃÐéαTelegram¼àÊÓÒÁÀÊÓû§µÄ¶ñÒâ»î¶¯

˼¿ÆTalosÅû¶ÁËÒÁÀʵÄһЩÓɹú¼Ò×ÊÖúµÄ¶ñÒâ»î¶¯£¬£¬£¬£¬ÕâЩ»î¶¯×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬Ö÷ÒªÓÃÓÚ¼àÊÓÒÁÀʵÄÔ¼4000ÍòTelegramÓû§£¨ËäÈ»¸ÃÓ¦ÓÃÏÖʵÉÏÔڸùú±»Õ¥È¡Ê¹Óã©¡£¡£¡£¡£¡£Talos³ÆÕâЩ»î¶¯µÄÖØ´óÐÔ¡¢×ÊÔ´ÐèÇóºÍÒªÁì¸÷²»Ïàͬ£¬£¬£¬£¬µ«Ö÷ҪʹÓÃÁËÈý¸öÔØÌ壺ÐéαӦÓᢴ¹ÂÚµÇÂ¼Ò³ÃæºÍBGPÐ®ÖÆ¡£¡£¡£¡£¡£ÕâЩÐéαTelegram¡°¿Ë¡Ì塱Ӧ¸Ã±»¹éÀàΪ»ÒÉ«Èí¼þ»òDZÔÚÓꦵÄÈí¼þ£¨PUP£©¡£¡£¡£¡£¡£ËäÈ»ÕâЩ¶ñÒâ»î¶¯¶¼Õë¶ÔÒÁÀÊ£¬£¬£¬£¬µ«Ñо¿Ö°Ô±²¢Î´·¢Ã÷ËüÃÇÖ®¼ä±£´æÁªÏµ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2018/11/persian-stalker.html3¡¢·¸·¨ÍÅ»ïInceptionʹÓÃÐÂPowerShellºóÃÅÃé׼ŷÖÞ

Palo Alto NetworksµÄUnit42Ðû²¼¹ØÓÚ·¸·¨ÍÅ»ïInceptionµÄй¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£InceptionÖÁÉÙ×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬¸Ã×éÖ¯ÔøÔÚ2017ÄêÕë¶ÔÅ·ÖÞ¡¢¶íÂÞ˹ºÍÖÐÑǵØÇøµÄÕþ¸®»ú¹¹Ìᳫ¹¥»÷¡£¡£¡£¡£¡£Unit42ÊӲ쵽¸Ã×éÖ¯ÔÚ2018Äê10ÔÂʹÓÃOfficeÎó²îCVE-2017-11882ºÍÒ»¸öеÄPowerShellºóÃÅÕë¶ÔÅ·ÖÞµÄÄ¿µÄÌᳫ¹¥»÷¡£¡£¡£¡£¡£¸ÃºóÃű»³ÆÎªPOWERSHOWER£¬£¬£¬£¬¿ÉÓÃÓÚÍøÂçϵͳÐÅÏ¢²¢ÉÏ´«ÖÁC2ЧÀÍÆ÷ÒÔ¼°É¨³ýÖ¤¾Ý£¬£¬£¬£¬»¹¿ÉÓÃÓÚÖ´ÐÐÆäËüpayload¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://researchcenter.paloaltonetworks.com/2018/11/unit42-inception-attackers-target-europe-year-old-office-vulnerability/4¡¢Ñо¿Ö°Ô±·¢Ã÷¶à¿î×Ô¼ÓÃÜSSD±£´æÎó²î£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß½âÃÜÓû§Êý¾Ý
ºÉÀ¼Radboud´óѧµÄÑо¿Ö°Ô±Carlo MeijerºÍBernard van Gastel·¢Ã÷¶à¿îÊ¢ÐеÄ×Ô¼ÓÃÜSSD±£´æÇå¾²Îó²î£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß½âÃÜ´ÅÅ̺ͻñÈ¡Óû§Êý¾Ý¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ²úÆ·°üÀ¨CrucialµÄCruces MX100ºÍÈýÐǵÄ850 EVOµÈ¡£¡£¡£¡£¡£CrucialÒѾΪÆäËùÓÐÊÜÓ°ÏìµÄSSDÐû²¼Á˹̼þ²¹¶¡£¡£¡£¡£¡£¬£¬£¬£¬µ«ÈýÐÇֻΪT3ºÍT5±ãЯʽSSDÐû²¼ÁËÐÞ¸´²¹¶¡£¡£¡£¡£¡£¬£¬£¬£¬²¢½¨ÒéEVOÓû§Ê¹ÓÃÓëϵͳ¼æÈݵļÓÃÜÈí¼þ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/self-encrypting-ssd-hacking.html5¡¢GoogleÐû²¼11ÔÂAndroidÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î

GoogleÔÚ11Ô·ݵÄAndroidÇå¾²¸üÐÂÖÐÐÞ¸´ÁË36¸öÇå¾²Îó²î£¬£¬£¬£¬±ðµÄÉÐÓÐ17¸öÎó²îÓëQualcomm×é¼þÓйء£¡£¡£¡£¡£½ÏÑÏÖØµÄÎó²î°üÀ¨Ó°ÏìAndroid 7.0+µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-9527£©ºÍÓ°Ïì9.0µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-9531ºÍCVE-2018-9521£©¡£¡£¡£¡£¡£ÓÉÓÚÔÚLibxaac¿âÖз¢Ã÷´ó×ÚÇå¾²Îó²î£¬£¬£¬£¬Òò´ËGoogleÒѽ«¸Ã¿â±ê¼ÇΪʵÑéÐÔ²¢ÇÒ²»»á½«¸Ã¿â°üÀ¨ÔÚÈκÎAndroidÉú²ú°æ±¾ÖС£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬11ÔµÄÇå¾²¸üнöÊÊÓÃÓÚAndroid7.0+µÄ°æ±¾£¬£¬£¬£¬»»¾ä»°Ëµ£¬£¬£¬£¬Android 6.x½«²»ÔÙ»ñµÃGoogleµÄÖ§³Ö¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://source.android.com/security/bulletin/2018-11-01.html6¡¢Akado TelecomÒâÍâй¶ÊýǧÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢

¾Ý·͸É籨µÀ£¬£¬£¬£¬¶íÂÞ˹ISP Akado TelecomÒâÍâµØ½«ÊýǧÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢ÉÏ´«ÖÁRIPE NCCµÄЧÀÍÆ÷£¬£¬£¬£¬ÕâЩй¶µÄСÎÒ˽¼ÒÐÅÏ¢£¨PII£©Öл¹°üÀ¨Ò»Ð©¶íÂÞ˹Õþ¸®¹ÙÔ±ºÍ¶íÂÞ˹ÃûÈË¡¢ÒøÐÐÊÂÇéÖ°Ô±µÄµØµãºÍµç»°ºÅÂëµÈ¡£¡£¡£¡£¡£RIPE NCCÊÇÅ·ÖÞ¡¢Öж«ºÍÖÐÑDz¿·ÖµØÇøµÄ·ÇÓªÀûÐÔÇøÓò»¥ÁªÍø×¢²á»ú¹¹£¬£¬£¬£¬ÆäÊý¾Ý¿âÊǿɹûÕæ»á¼ûµÄ¡£¡£¡£¡£¡£Akado TelecomÌåÏÖÒѾÆô¶¯ÁËÒ»Ïî¹ØÓÚ´ËÊÂÎñµÄÄÚ²¿ÊӲ졣¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/akado-telecom-accidentally-leaks-customers-names-phone-numbers-and-addresses-523617.shtmlÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí