AvastÔâºÚ¿ÍÈëÇÖ£¬£¬£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂ룻£»£»£»£»£»£»Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0

Ðû²¼Ê±¼ä 2019-10-22
1¡¢AvastÔâºÚ¿ÍÈëÇÖ£¬£¬£¬¹¥»÷ÕßÊÔͼÏòCCleaner×¢Èë¶ñÒâ´úÂë

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

AvastÅû¶ÆäÄÚ²¿ÍøÂçÔâºÚ¿ÍÈëÇÖ£¬£¬£¬¹¥»÷ÕßµÄÄ¿µÄËÆºõÔÚÓÚÏòCCleanerÖÐ×¢Èë¶ñÒâ´úÂ루ÀàËÆÓÚ2017ÄêµÄ¹¥»÷£©¡£¡£¡£¡£¡£¡£¡£Avastר¼ÒÓÚ9ÔÂ23ÈÕ·¢Ã÷ÁËÕâÒ»¹¥»÷ÊÂÎñ£¬£¬£¬ºÚ¿Íͨ¹ýÈëÇÖÒ»¸öÔÝʱVPNÕË»§»á¼ûÁ˹«Ë¾µÄÄÚ²¿ÍøÂ磬£¬£¬¸ÃÕË»§Ã»ÓÐÓòÖÎÀíԱȨÏÞ£¬£¬£¬µ«ºÚ¿ÍÀֳɾÙÐÐÁËÌáȨ¡£¡£¡£¡£¡£¡£¡£¶Ô¹¥»÷ÕßʹÓõÄÍⲿIPµÄÆÊÎöÏÔʾ£¬£¬£¬¹¥»÷ÕßÔçÔÚ5ÔÂ14ÈÕ¾ÍÒ»Ö±ÊÔͼͨ¹ýVPNÀ´»á¼ûÄÚÍø¡£¡£¡£¡£¡£¡£¡£Avast¶Ô¹¥»÷»î¶¯¾ÙÐÐÁË¼à¿Ø£¬£¬£¬Ö±µ½10ÔÂ15ÈղŹرոÃÔÝʱVPNÕË»§¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞ·¨È·Èϸù¥»÷ÊÇ·ñÓë2017Ä걬·¢µÄ¹¥»÷±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£¡£AvastÔÚ¶ÔCCleaner¾ÙÐÐÉó²éÖ®ºóÖØÐÂÐû²¼Á˸üС£¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-breach-avast-antivirus-network-through-insecure-vpn-profile/

2¡¢AutoclerkÊý¾Ý¿âÒâÍâÔÚÍøÉÏ̻¶179GBÓοÍÊý¾Ý

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÂùÝÔ¤¶©ÖÎÀíϵͳAutoclerkµÄÒ»¸öElasticsearchÊý¾Ý¿âÔÚÍøÉÏ̻¶ÁË179GBÓοÍÊý¾Ý£¬£¬£¬ÆäÖаüÀ¨²¿·ÖÃÀ¹úÕþ¸®ºÍ¾üÊÂÖ°Ô±µÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£vpnMentorµÄÑо¿Ö°Ô±Noam RotemºÍRan Locar·¢Ã÷ÁËÕâÒ»ÊÂÎñ£¬£¬£¬Æ¾Ö¤ËûÃǵı¨¸æ£¬£¬£¬Ì»Â¶µÄÊý¾Ý¿âÓÉAmazon Web ServersÍйÜ£¬£¬£¬Æä´æ´¢µÄÐÅÏ¢°üÀ¨Î´¼ÓÃܵĵǼƾ֤¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢ÂÃÐÐÈÕÆÚºÍÓöÈÒÔ¼°²¿·ÖÐÅÓÿ¨ÐÅÏ¢µÈ£¬£¬£¬¹ØÓÚijЩÓοÍ£¬£¬£¬»¹°üÀ¨ËûÃǵÄÈëסʱ¼äºÍ·¿¼äºÅ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖÊý¾Ý¿âÖÐ̻¶µÄƽ̨֮һÊÇÃÀ¹úÕþ¸®¡¢¾ü·½ºÍÁìÍÁÇå¾²²¿£¨DHS£©µÄ³Ð°üÉÌ£¬£¬£¬¸Ã³Ð°üÉÌÈÏÕæÖÎÀíÃÀ¹úÕþ¸®ºÍ¾üÊÂÖ°Ô±µÄÂÃÐа²ÅÅ¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/government-military-personnel-data-leaked/149386/

3¡¢¶íÂÞ˹Turla APTʹÓÃÒÁÀÊ»ù´¡ÉèÊ©Ãé×¼35¸ö¹ú¼Ò

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

¶íÂÞ˹APT×éÖ¯Turla±»·¢Ã÷ÈëÇÖÒÁÀÊAPT34µÄ»ù´¡ÉèÊ©£¬£¬£¬Ê¹ÓÃÆäNeuronºÍNautilus¹¤¾ßÃé×¼Öж«µØÇøµÄÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©ºÍÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©µÄÊý¾Ý£¬£¬£¬ÖÁÉÙÓÐ35¸ö¹ú¼ÒÒѳÉΪ¸Ã×éÖ¯µÄ¹¥»÷Ä¿µÄ£¬£¬£¬ÆäÖдó´ó¶¼Î»ÓÚÖж«£¬£¬£¬ÔÚÒÑÍù18¸öÔÂÖÐÖÁÉÙÓÐ20¸ö¹ú¼ÒÊܵ½¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÔÚ2017ÄêºÍ2018Ä꣬£¬£¬Turla±»·¢Ã÷ÔÚʹÓÃ×Ô¼ºµÄ¹¤¾ßSnake rootkitµÄͬʱ»¹Ê¹ÓÃÁËNeuronºÍNautilus¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2008ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬²¢ÇÒÖ÷ÒªÕë¶Ô¾üÊ»ú¹¹¡¢Õþ¸®²¿·Ö¡¢¿ÆÑ§×éÖ¯ºÍ´óѧµÈÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russian-apt-turla-targets-35-countries-on-the-back-of-iranian-infrastructure/

4¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓÃAlexaºÍGoogle HomeÇÔÌýÓû§µÄÐÂÒªÁì

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±·¢Ã÷¹¥»÷Õß¿ÉÒÔʹÓÃAlexaºÍGoogle HomeÖÇÄÜÒôÏäÀ´¼àÊÓÓû§µÄÐÂÒªÁ죬£¬£¬¹¥»÷Õß²»µ«¿ÉÒÔÇÔÌýÓû§£¬£¬£¬ÉõÖÁ»¹¿ÉÒÔͨ¹ýÓïÒô´¹ÂÚÇÔÈ¡Óû§µÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤SRLabsµÄ±¨¸æ£¬£¬£¬¸ÃÎÊÌâ±£´æÓÚ¿ª·¢Ö°Ô±Îª×°±¸½¨ÉèµÄÀ©Õ¹¹¦Ð§APPÖУ¬£¬£¬°üÀ¨Skills for AlexaºÍActions on Google Home¡£¡£¡£¡£¡£¡£¡£Í¨¹ýÕâЩAPPÌṩӦµÚÈý·½µÄ±ê×¼¿ª·¢½Ó¿Ú£¬£¬£¬SRLabsÑо¿Ö°Ô±·¢Ã÷ÁËÁ½ÖÖ¿ÉÒÔÆÆËðÓû§Òþ˽µÄÒªÁ죬£¬£¬Ò»ÖÖÊÇÇëÇó²¢ÍøÂçСÎÒ˽¼ÒÊý¾Ý£¨°üÀ¨ÃÜÂ룩£¬£¬£¬ÁíÒ»ÖÖÊÇÔÚÓû§ÒÔΪÖÇÄÜÒôÏäûÓÐÊÕÌýÖ®ºó¾ÙÐÐÇÔÌý¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://threatpost.com/new-way-found-to-use-alexa-google-to-voice-phish-and-eavesdrop-on-users/149352/

5¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔMSSQL v11ºÍv12µÄºóÃÅskip-2.0


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ESETÑо¿ÍŶӷ¢Ã÷Õë¶ÔMSSQL v11ºÍv12µÄкóÃÅskip-2.0¡£¡£¡£¡£¡£¡£¡£ESETÌåÏÖskip-2.0ÐÞ¸ÄÁËÓÃÓÚ´¦Öóͷ£Éí·ÝÑéÖ¤µÄMSSQLº¯Êý£¬£¬£¬ÆäÏë·¨Êǽ¨ÉèÒ»¸ö¡°Ä§ÊõÃÜÂ롱£¬£¬£¬ÈôÊÇÔÚÈκÎÉí·ÝÑéÖ¤»á»°ÖÐÊäÈ롰ħÊõÃÜÂ롱£¬£¬£¬Ôò½«×Ô¶¯ÊÚÓè¸ÃÓû§»á¼ûȨÏÞ£¬£¬£¬Í¬Ê±×èÖ¹Ö´ÐÐÕý³£µÄÈÕÖ¾¼Í¼ºÍÉóºË¹¦Ð§£¬£¬£¬´Ó¶øÓÐÓõØÔÚЧÀÍÆ÷ÄÚ²¿½¨ÉèÐéα»á»°¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ESET£¬£¬£¬skip-2.0½öÊÊÓÃÓÚMSSQL v12ºÍv11ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜMSSQL Server 12£¨2014ÄêÐû²¼£©²»ÊÇ×îа汾£¬£¬£¬ËüÒ²ÊÇ×î³£Óõİ汾¡£¡£¡£¡£¡£¡£¡£ESET½«¸ÃºóÃÅÓëAPT×éÖ¯Winnti Group¾ÙÐйØÁª¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-find-stealthy-mssql-server-backdoor-developed-by-chinese-cyberspies/

6¡¢McAfeeÐû²¼Sodinokibi¹¥»÷ÊÖÒÕ¼°Õ½ÂÔµÄÆÊÎö±¨¸æ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


McAfeeÑо¿Ö°Ô±Í¨¹ýÃÛ¹Þ¸ú×ÙÁËÀÕË÷Èí¼þSodinokibiµÄÏà¹ØTTP¼°»î¶¯¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³öÈý¸ö×ÓÍŻGroup 1¡¢×ÓÍÅ»ï#34ºÍ#19£©¾ùʹÓôó×Ú¶Ë¿ÚɨÃ蹤¾ßÀ´²éÕÒ¿É»á¼ûµÄRDPЧÀÍÆ÷£¬£¬£¬È»ºóʹÓôøÓÐ×Ô½ç˵ÃÜÂëÁбíµÄNLBrute RDP±©Á¦ÆÆ½â¹¤¾ßÀ´»ñµÃЧÀÍÆ÷µÄ»á¼ûȨÏÞ£¬£¬£¬²¢ÔÚÍøÂçÖкáÏòÈö²¥¡£¡£¡£¡£¡£¡£¡£#34ºÍ#19µÄÕ½ÂÔÔ½·¢³ÉÊ죬£¬£¬°üÀ¨Ê¹Óö¨ÖƵÄMimikatzÅú´¦Öóͷ£ÎļþÇÔÈ¡ÍøÂçÆ¾Ö¤¡¢×Ô½ç˵¾ç±¾É¾³ýWindowsÊÂÎñÉó²éÆ÷ÈÕÖ¾ÒÔ¼°½¨ÉèÒþ²ØÓû§µÈ¡£¡£¡£¡£¡£¡£¡£#34»¹»áÊÍ·ÅMinerGateºÍXMRigµÈÍÚ¿óľÂí¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/tools-and-tactics-of-the-sodinokibi-ransomware-distributors/