ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öÕþ¸®»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷£»£»£»¹È¸èÏ£Íû½«HTTPSÖ¤ÊéµÄÉúÃüÖÜÆÚËõ¶Ìµ½Ò»Äê
Ðû²¼Ê±¼ä 2019-08-20
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/coordinated-ransomware-attack-hits-23-texas-government-agencies/147457/
2¡¢¹È¸èÏ£Íû½«HTTPSÖ¤ÊéµÄÉúÃüÖÜÆÚËõ¶Ìµ½Ò»Äê
¹È¸èÏ£Íû½«SSLÖ¤Ê飨ÓÃÓÚ±£»£»£»¤HTTPS¼ÓÃÜÁ÷Á¿£©µÄÉúÃüÖÜÆÚ´ÓÏÖÔÚµÄÁ½ÄêËõ¶Ìµ½Ò»Äê¶à¡£¡£¡£¡£¡£¸ÃÌá°¸Óɹȸè´ú±íRyan Sleevi ÓÚ6ÔÂÔÚÏ£À°ÈûÈøÂåÄá»ù¾ÙÐеÄCA/BÂÛ̳F2F¾Û»áÉÏÌá³ö¡£¡£¡£¡£¡£Æ¾Ö¤Per SleeviµÄÌáÒ飬£¬£¬£¬£¬£¬£¬´Ó2020Äê3ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬ËùÓÐнÒÏþµÄSSLÖ¤ÊéµÄÉúÃüÖÜÆÚ½«±äΪ397Ì죨ԼĪһÄêÁãÒ»¸öÔ£©£¬£¬£¬£¬£¬£¬£¬¶ø²»ÊÇÄ¿½ñµÄ825Ì죨ԼĪÁ½ÄêÁãÈý¸öÔ£©¡£¡£¡£¡£¡£¸Ã¾Û»áÉÏûÓжԸÃÌá°¸¾ÙÐÐͶƱ£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇ´ó´ó¶¼ä¯ÀÀÆ÷¹©Ó¦É̶¼ÌåÏÖÖ§³ÖеÄSSLÖ¤ÊéÉúÃüÖÜÆÚ¡£¡£¡£¡£¡£ÔÚÒÑÍùµÄÊ®ÎåÄêÖУ¬£¬£¬£¬£¬£¬£¬ä¯ÀÀÆ÷ÖÆÔìÉÌÒѾһֱÏû¼õSSLÖ¤ÊéµÄÉúÃüÖÜÆÚ£¬£¬£¬£¬£¬£¬£¬´Ó8ÄêïÔ̵½5Ä꣬£¬£¬£¬£¬£¬£¬È»ºóïÔ̵½3Ä꣬£¬£¬£¬£¬£¬£¬È»ºóïÔ̵½Á½Ä꣬£¬£¬£¬£¬£¬£¬×îºóÒ»´Î¸ü¸Ä±¬·¢ÔÚ2018Äê3Ô£¬£¬£¬£¬£¬£¬£¬Æäʱä¯ÀÀÆ÷ÖÆÔìÉÌÊÔͼ½«SSLÖ¤ÊéÊÙÃü´Ó3ÄêïÔ̵½1Ä꣬£¬£¬£¬£¬£¬£¬µ«ÔÚÖ¤Êé½ÒÏþ»ú¹¹¿¹ÒéºóÍ×ÐÖÁÁ½Äê¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/
3¡¢ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÒªÇó¹ú»áÖØÐÂÓÀÊÀÊÚÈ¨ÌØ¹¤ÍýÏë

ÃÀ¹ú¹ú¼ÒÇ鱨¾Ö¾Ö³¤ÒªÇó¹ú»á¶ÔÒ»¸öÌØ¹¤ÏîÄ¿ÖØÐ²¢ÇÒÓÀÊÀÊÚȨ£¬£¬£¬£¬£¬£¬£¬¸ÃÏîÄ¿ÊÇÖ¸¹ú¼ÒÇå¾²¾Ö£¨NSA£©²»·¨ÍøÂçÊý°ÙÍòÃÀ¹ú¹«ÃñµÄͨ»°¼Í¼£¬£¬£¬£¬£¬£¬£¬ÕâÒ»ÏîĿһÔÙ±»ÒÔΪÊÇÎ¥ÏÜÐÐΪ£¬£¬£¬£¬£¬£¬£¬NSAÆÈÓÚѹÁ¦²»µÃ²»¹Ø±Õ¸ÃÏîÄ¿¡£¡£¡£¡£¡£NSAÁ½´Î±»ÆÈÈÏ¿ÉËüÍøÂçÁËÊý°ÙÍò²»Ó¦¸ÃÓµÓеĵ绰¼Í¼£¬£¬£¬£¬£¬£¬£¬Ò»´ÎÊÇÔÚ2018Äê6Ô£¬£¬£¬£¬£¬£¬£¬NSAɾ³ýÁËǰһÄêÍøÂçµÄ5.34ÒÚ¸öͨ»°¼Í¼£¬£¬£¬£¬£¬£¬£¬µ«ÔÚ2018Äê10ÔÂͬÑùµÄÊÂÇéÔٴα¬·¢£¬£¬£¬£¬£¬£¬£¬Ö±µ½2019Äê6Ô²ű»ÆØ¹â¡£¡£¡£¡£¡£Ç鱨¾Ö¾Ö³¤Dan CoatsÔÚÆäÔÚÈεÄ×îºóÒ»ÌìÏòÁ½¸öÒªº¦²ÎÒéԺίԱ»áÈÏÕæÈË·¢³öÁËÕâ·â½¨ÒéÐÅ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.theregister.co.uk/2019/08/16/spying_reauthorization_coats/
4¡¢Ñо¿Ö°Ô±½öʹÓÃÖÇÄÜÊÖ»ú¿É¼ì²â³ö¼üÈëµÄÄÚÈÝ
ÄÏ·½ÎÀÀí¹«»á´óѧ£¨SMU£©µÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ½öʹÓÃÖÇÄÜÊÖ»ú×èµ²´ò×ÖµÄÉùÒô£¬£¬£¬£¬£¬£¬£¬²¢ÆÆÒë¼üÈëµÄÄÚÈÝ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Äܹ»½âÂëʹÓÃͨË×¼üÅ̺ÍÖÇÄÜÊÖ»úÊäÈëµÄ´ó²¿·ÖÄÚÈÝ-×ÝÈ»ÔÚ³äÂúÁËÆäËûÈË´ò×ÖºÍÅÊ̸ÉùÒôµÄàÐÔÓ¾Û»áÊÒÖÐÒ²ÊÇÔÆÔÆ¡£¡£¡£¡£¡£Eric C. LarsonÌåÏÖ¡°ÎÒÃÇÄܹ»ÒÔ41£¥µÄµ¥´Ê׼ȷÂÊÀ´»ñÈ¡ÈËÃÇËùÊäÈëµÄÄÚÈÝ¡£¡£¡£¡£¡£¡±ÒªÊµÑéÕâÖÖ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐèÒªÖªµÀ×À×ÓµÄÖÊÁÏÀàÐÍ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ²î±ðµÄ×À×ÓÔÚ´ò×Öʱ»á±¬·¢²î±ðµÄÉù²¨¡£¡£¡£¡£¡£¹¥»÷Õß»¹ÐèÒªÖªµÀ×ÀÃæÉÏÓжಿÊÖ»úÒÔ¼°ÔõÑù´ÓÖвÉÑù¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.helpnetsecurity.com/2019/08/19/smartphone-intercept-typing/
5¡¢Ñо¿ÍŶÓÐû²¼½©Ê¬ÍøÂçMyKings±äÖֵįÊÎö±¨¸æ
2019Äê5Ô·ÝÇ÷ÊÆ¿Æ¼¼ÔÚÑÇÌ«µØÇøÒ»¼Òµç×Ó¹«Ë¾·¢Ã÷Á˽©Ê¬ÍøÂçMyKingsµÄ±äÖÖ¡£¡£¡£¡£¡£¸Ã±äÖÖ¸ü¸ÄÁË»úеµÄϵͳע²á±í×÷Ϊ³¤ÆÚÐÔ»úÖÆ£¬£¬£¬£¬£¬£¬£¬ÕâЩע²á±íÏîÈÏÕæ¶Ô¶ñÒâURLµÄC£¦C»Øµ÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÕâЩÌõÄ¿ÊÇÔÚ2017ÄêÌí¼ÓµÄ£¬£¬£¬£¬£¬£¬£¬Åú×¢¶ñÒâÈí¼þ±äÖÖÔÚ·¢Ã÷֮ǰÒѾÔÚ¹«Ë¾µÄϵͳÖÐÒþ²ØÁËԼĪÁ½Äê¡£¡£¡£¡£¡£Æ¾Ö¤Ç÷ÊÆ¿Æ¼¼µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬×èÖ¹2018ÄêÍ·MyKingsÒѾѬȾÁËÁè¼Ý50Íǫ̀װ±¸£¬£¬£¬£¬£¬£¬£¬²¢ÍÚ¾òÁËÔ¼230ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-a-mykings-variant-with-bootloader-persistence-via-managed-detection-and-response/
6¡¢¹¥»÷ÕßʹÓÃÔ¶¿ØÄ¾ÂíAdwind¹¥»÷¹«ÓÃÊÂÒµ²¿·Ö
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/adwind-remote-access-trojan-hits-utilities-sector/