AvastÔâºÚ¿ÍÈëÇÖ£¬£¬£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂ룻£»£»£»£»£»£»Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0
Ðû²¼Ê±¼ä 2019-10-22
AvastÅû¶ÆäÄÚ²¿ÍøÂçÔâºÚ¿ÍÈëÇÖ£¬£¬£¬¹¥»÷ÕßµÄÄ¿µÄËÆºõÔÚÓÚÏòCCleanerÖÐ×¢Èë¶ñÒâ´úÂ루ÀàËÆÓÚ2017ÄêµÄ¹¥»÷£©¡£¡£¡£¡£¡£¡£¡£Avastר¼ÒÓÚ9ÔÂ23ÈÕ·¢Ã÷ÁËÕâÒ»¹¥»÷ÊÂÎñ£¬£¬£¬ºÚ¿Íͨ¹ýÈëÇÖÒ»¸öÔÝʱVPNÕË»§»á¼ûÁ˹«Ë¾µÄÄÚ²¿ÍøÂ磬£¬£¬¸ÃÕË»§Ã»ÓÐÓòÖÎÀíԱȨÏÞ£¬£¬£¬µ«ºÚ¿ÍÀֳɾÙÐÐÁËÌáȨ¡£¡£¡£¡£¡£¡£¡£¶Ô¹¥»÷ÕßʹÓõÄÍⲿIPµÄÆÊÎöÏÔʾ£¬£¬£¬¹¥»÷ÕßÔçÔÚ5ÔÂ14ÈÕ¾ÍÒ»Ö±ÊÔͼͨ¹ýVPNÀ´»á¼ûÄÚÍø¡£¡£¡£¡£¡£¡£¡£Avast¶Ô¹¥»÷»î¶¯¾ÙÐÐÁË¼à¿Ø£¬£¬£¬Ö±µ½10ÔÂ15ÈղŹرոÃÔÝʱVPNÕË»§¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞ·¨È·Èϸù¥»÷ÊÇ·ñÓë2017Ä걬·¢µÄ¹¥»÷±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£¡£AvastÔÚ¶ÔCCleaner¾ÙÐÐÉó²éÖ®ºóÖØÐÂÐû²¼Á˸üС£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/2¡¢AutoclerkÊý¾Ý¿âÒâÍâÔÚÍøÉÏ̻¶179GBÓοÍÊý¾Ý
ÔÎÄÁ´½Ó£º
https://threatpost.com/government-military-personnel-data-leaked/149386/3¡¢¶íÂÞ˹Turla APTʹÓÃÒÁÀÊ»ù´¡ÉèÊ©Ãé×¼35¸ö¹ú¼Ò

¶íÂÞ˹APT×éÖ¯Turla±»·¢Ã÷ÈëÇÖÒÁÀÊAPT34µÄ»ù´¡ÉèÊ©£¬£¬£¬Ê¹ÓÃÆäNeuronºÍNautilus¹¤¾ßÃé×¼Öж«µØÇøµÄÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©ºÍÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©µÄÊý¾Ý£¬£¬£¬ÖÁÉÙÓÐ35¸ö¹ú¼ÒÒѳÉΪ¸Ã×éÖ¯µÄ¹¥»÷Ä¿µÄ£¬£¬£¬ÆäÖдó´ó¶¼Î»ÓÚÖж«£¬£¬£¬ÔÚÒÑÍù18¸öÔÂÖÐÖÁÉÙÓÐ20¸ö¹ú¼ÒÊܵ½¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÔÚ2017ÄêºÍ2018Ä꣬£¬£¬Turla±»·¢Ã÷ÔÚʹÓÃ×Ô¼ºµÄ¹¤¾ßSnake rootkitµÄͬʱ»¹Ê¹ÓÃÁËNeuronºÍNautilus¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2008ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬²¢ÇÒÖ÷ÒªÕë¶Ô¾üÊ»ú¹¹¡¢Õþ¸®²¿·Ö¡¢¿ÆÑ§×éÖ¯ºÍ´óѧµÈÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/russian-apt-turla-targets-35-countries-on-the-back-of-iranian-infrastructure/4¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓÃAlexaºÍGoogle HomeÇÔÌýÓû§µÄÐÂÒªÁì
ÔÎÄÁ´½Ó£º
https://threatpost.com/new-way-found-to-use-alexa-google-to-voice-phish-and-eavesdrop-on-users/149352/
5¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0
ESETÑо¿ÍŶӷ¢Ã÷Õë¶ÔMSSQL v11ºÍv12µÄкóÃÅskip-2.0¡£¡£¡£¡£¡£¡£¡£ESETÌåÏÖskip-2.0ÐÞ¸ÄÁËÓÃÓÚ´¦Öóͷ£Éí·ÝÑéÖ¤µÄMSSQLº¯Êý£¬£¬£¬ÆäÏë·¨Êǽ¨ÉèÒ»¸ö¡°Ä§ÊõÃÜÂ롱£¬£¬£¬ÈôÊÇÔÚÈκÎÉí·ÝÑéÖ¤»á»°ÖÐÊäÈ롰ħÊõÃÜÂ롱£¬£¬£¬Ôò½«×Ô¶¯ÊÚÓè¸ÃÓû§»á¼ûȨÏÞ£¬£¬£¬Í¬Ê±×èÖ¹Ö´ÐÐÕý³£µÄÈÕÖ¾¼Í¼ºÍÉóºË¹¦Ð§£¬£¬£¬´Ó¶øÓÐÓõØÔÚЧÀÍÆ÷ÄÚ²¿½¨ÉèÐéα»á»°¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ESET£¬£¬£¬skip-2.0½öÊÊÓÃÓÚMSSQL v12ºÍv11ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜMSSQL Server 12£¨2014ÄêÐû²¼£©²»ÊÇ×îа汾£¬£¬£¬ËüÒ²ÊÇ×î³£Óõİ汾¡£¡£¡£¡£¡£¡£¡£ESET½«¸ÃºóÃÅÓëAPT×éÖ¯Winnti Group¾ÙÐйØÁª¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-find-stealthy-mssql-server-backdoor-developed-by-chinese-cyberspies/
6¡¢McAfeeÐû²¼Sodinokibi¹¥»÷ÊÖÒÕ¼°Õ½ÂÔµÄÆÊÎö±¨¸æ
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/tools-and-tactics-of-the-sodinokibi-ransomware-distributors/