¶ò¹Ï¶à¶ûÒÑÔâÁè¼Ý4000Íò´ÎºÚ¿Í¹¥»÷£»£»£»£»£»£»Ð¹¥»÷»î¶¯Scranos Operation£»£»£»£»£»£»ÀÕË÷Èí¼þBitPaymerбäÌå
Ðû²¼Ê±¼ä 2019-04-17
4ÔÂ16ÈÕOracleÐû²¼Ö÷Òª²¹¶¡¸üУ¬£¬£¬£¬£¬£¬¹²ÐÞ¸´297¸öÎó²î£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Database ServerÖеÄ6¸öÎó²î¡¢Communication ApplicationsÖеÄ26¸öÎó²î¡¢E-Business SuiteÖеÄ35¸öÎó²î¡¢Fusion MiddlewareÖеÄ53¸öÎó²î¡¢MySQLÖеÄ45¸öÎó²îºÍRetail ApplicationsÖеÄ24¸öÎó²î¡£¡£¡£¡£¡£¡£ÏêϸÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£¡£¡£Æ¾Ö¤OracleµÄÖ÷Òª²¹¶¡Ðû²¼ÍýÏ룬£¬£¬£¬£¬£¬ÏÂÒ»´ÎÖ÷Òª²¹¶¡¸üн«ÓÚ2019Äê7ÔÂ16ÈÕÐû²¼¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
2¡¢Gnosticplayers³öÊÛµÚÎåÅúÓû§Êý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨6500¶àÍò¸öÕ˺Å

ºÚ¿ÍGnosticplayersÔÚ°µÍøÂÛ̳DreamMarketÉϳöÊÛµÚÎåÅú±»µÁµÄÓû§Êý¾Ý£¬£¬£¬£¬£¬£¬ÕâÅúÊý¾Ý°üÀ¨Áè¼Ý6500Íò¸öÓû§ÕË»§£¬£¬£¬£¬£¬£¬ÊÛ¼ÛΪ0.8463±ÈÌØ±Ò£¨4350ÃÀÔª£©¡£¡£¡£¡£¡£¡£ÕâÅú±»µÁµÄÓû§¼Í¼ÊôÓÚÁù¼Òй«Ë¾£¬£¬£¬£¬£¬£¬°üÀ¨ÓÎϷƽ̨Mindjolt£¨2800Íò£©¡¢ÔÚÏß¹ºÎïÉçÇøWanelo£¨2300Íò£©¡¢Æ»¹ûάÐÞÖÐÐÄiCracked£¨150Íò£©¡¢ÂÃÓι«Ë¾Yanolja£¨150Íò£©¡¢µç×ÓÔ¼ÇëЧÀÍEvite£¨1000Íò£©ºÍÅ®×ÓʱװµêModa Operandi£¨150Íò£©¡£¡£¡£¡£¡£¡£ÏÖÔÚΪֹGnosticplayers³öÊ۵ı»µÁÓû§¼Í¼×ÜÊýÒÑ´ï9.32ÒÚÌõ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/gnosticplayers-hacker-returns-with-fifth-dataset-containing-over-65-million-user-accounts-for-sale-95450e99
3¡¢·¸·¨ÍÅ»ïʹÓÃRATVERMINºóÃŹ¥»÷ÎÚ¿ËÀ¼¶à¸ö¾üʲ¿·Ö

FireEyeÑо¿ÍŶӷ¢Ã÷Ò»¸öÕë¶ÔÎÚ¿ËÀ¼¶à¸ö¾üʲ¿·ÖµÄÓã²æÊ½´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷»î¶¯ÊÇ2018ÄêÕë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹¥»÷»î¶¯µÄÑÓÐø£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÓëLPRÓйء£¡£¡£¡£¡£¡£Æ¾Ö¤¶Ô¶ñÒâÈí¼þ±àÒëʱ¼äµÄÆÊÎö£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷×éÖ¯ËÆºõÖÁÉÙÓÚ2014ÄêÒÔÀ´Ò»Ö±´¦ÓÚ»îԾ״̬£¬£¬£¬£¬£¬£¬ÆäÄ¿µÄÖ÷ÒªÊÇÎÚ¿ËÀ¼¡£¡£¡£¡£¡£¡£ÔÚ×î½üµÄ¹¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬¸Ã×é֯ʹÓÃÁ˶ñÒâÈí¼þQUASARRATºÍRATVERMIN¡£¡£¡£¡£¡£¡£RATVERMINÊÇÒ»¸ö.NETºóÃÅ£¬£¬£¬£¬£¬£¬¿ÉÍøÂçÊܺ¦ÕßµÄÐÅÏ¢²¢ÔËÐÐÖÖÖÖÏÂÁî¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hacker-group-uses-ratvermin-backdoor-to-target-ukrainian-military/
4¡¢°¢É£Ææ±»²¶ºó£¬£¬£¬£¬£¬£¬¶ò¹Ï¶à¶ûÒÑÔâÊÜÁè¼Ý4000Íò´ÎºÚ¿Í¹¥»÷

×Ôά»ù½âÃÜÊ×´´ÈËÖìÀû°²?°¢É£Ææ±»²¶ÒÔÀ´£¬£¬£¬£¬£¬£¬¶ò¹Ï¶à¶û¹«¹²»ú¹¹µÄÍøÕ¾ÔâÊÜÁË4000Íò´ÎÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£ÉÏÖܶò¹Ï¶à¶û³·»ØÁ˶԰¢É£ÆæµÄÕþÖκǻ¤£¬£¬£¬£¬£¬£¬Õâµ¼ÖºóÕß±»²¶¡£¡£¡£¡£¡£¡£¶ò¹Ï¶à¶ûÐÅÏ¢ºÍͨѶÊÖÒÕ²¿¸±²¿³¤Patricio Real͸¶³Æ£¬£¬£¬£¬£¬£¬¹¥»÷Ö÷ÒªÀ´×ÔÓÚÃÀ¹ú¡¢°ÍÎ÷¡¢ºÉÀ¼¡¢µÂ¹ú¡¢ÂÞÂíÄáÑÇ¡¢·¨¹ú¡¢°ÂµØÀû¡¢Ó¢¹úºÍ¶ò¹Ï¶à¶û×ÔÉí¡£¡£¡£¡£¡£¡£´ó²¿·Ö¹¥»÷¶¼Õë¶ÔÍâ½»²¿¡¢ÖÐÑëÒøÐС¢×Üͳ°ì¹«ÊÒ¡¢¹ú˰¾ÖµÈ²¿·ÖºÍ¼¸¸ö´óѧµÄÍøÕ¾¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83940/hacktivism/julian-assange-arrest-ddoss.html
5¡¢Ð¹¥»÷»î¶¯Scranos Operation£¬£¬£¬£¬£¬£¬Ê¹ÓÃÓÐÓÃÊðÃûµÄRootkitÇÔÈ¡Óû§ÐÅÏ¢

Ò»¸ö¾ßÓÐÓÐÓÃÊðÃûµÄrootkit£¨±»³ÆÎªScranos£©ÕýÔÚ¶à¸ö¹ú¼ÒÈö²¥£¬£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡¢Ö§¸¶ÐÅÏ¢ºÍä¯ÀÀÆ÷ÀúÊ·¼Í¼£¬£¬£¬£¬£¬£¬»¹¿ÉÓÃÓÚÔÚÉç½»ÍøÂçÉÏÈö²¥À¬»øÐÅÏ¢ºÍ¹ã¸æ¡£¡£¡£¡£¡£¡£Scranosαװ³ÉÊÓÆµÇý¶¯³ÌÐò£¬£¬£¬£¬£¬£¬ÆäʹÓõÄÖ¤ÊéÊÇDigiCertÏòÉϺ£Ò»¼Ò¿µ½¡ÖÎÀí×Éѯ¹«Ë¾½ÒÏþµÄÖ¤Ê飬£¬£¬£¬£¬£¬ÏÖÔÚÖ¤ÊéÈÔÈ»ÓÐÓ㬣¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜÊǵÁÓÃÁ˸ÃÖ¤Êé¡£¡£¡£¡£¡£¡£Bitdefender³ÆScranos OperationÒ»Ö±Éú³¤£¬£¬£¬£¬£¬£¬ÒѾѬȾÁËÓ¡¶È¡¢ÂÞÂíÄáÑÇ¡¢°ÍÎ÷¡¢·¨¹ú¡¢Òâ´óÀûºÍÓ¡ÄáµÈ¹ú¼ÒµÄÓû§¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/scranos-operation-uses-signed-rootkit-to-steal-login-and-payment-info/
6¡¢ÀÕË÷Èí¼þBitPaymerбäÌ壬£¬£¬£¬£¬£¬Ê¹ÓÃPsExecѬȾÃÀ¹úÖÆÔ칫˾

Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷ÃÀ¹úÒ»¼ÒÖÆÔ칫˾Ôâµ½ÀÕË÷Èí¼þBitPaymerбäÌåµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã±äÌ壨Ransom.Win32.BITPAYMER.TGACAJ£©Ê¹ÓÃPsExec¾ÙÐзַ¢£¬£¬£¬£¬£¬£¬²¢ÔÚÊê½ðƱ¾ÝºÍ¼ÓÃÜÎļþµÄÀ©Õ¹ÃûÖÐʹÓÃÁËÊܺ¦¹«Ë¾µÄÃû³Æ¡£¡£¡£¡£¡£¡£¹¥»÷ÊÂÎñ±¬·¢ÔÚ2ÔÂ18ÈÕÍíÉÏ9µã40·ÖÖÁÍíÉÏ11:03Ö®¼ä£¬£¬£¬£¬£¬£¬ÓÉÓÚ¹¥»÷ÕßÖÁÉÙÐèÒªÒ»¸ö¾ßÓÐÖÎÀíԱȨÏÞµÄÕÊ»§²Å»ªÍ¨¹ýPsExecÔËÐÐÏÂÁ£¬£¬£¬£¬£¬ÕâÒâζ×ÅÔÚÀÕË÷Èí¼þ×°ÖÃ֮ǰ¹¥»÷ÕßÒѾͨ¹ýijÖÖÊֶλñµÃÁËÖÎÀíԱȨÏÞ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/new-bitpaymer-ransomware-variant-infected-us-manufacturing-company-via-psexec-3450ef8c