Ç÷ÊÆ¿Æ¼¼ATTK¹¤¾ß°ü±£´æí§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»¶à¼ÒVPN¹©Ó¦ÉÌÔâºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬Ð§ÀÍÆ÷˽Կ±»µÁ

Ðû²¼Ê±¼ä 2019-10-23
1¡¢Ç÷ÊÆ¿Æ¼¼ATTK¹¤¾ß°ü±£´æí§Òâ´úÂëÖ´ÐÐÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Ñо¿Ö°Ô±·¢Ã÷Ç÷ÊÆ¿Æ¼¼·ÀÍþв¹¤¾ß°ü£¨ATTK£©±£´æÒ»¸öí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2019-9491£© £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚÄ¿µÄWindowsϵͳÉÏÔËÐжñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ç÷ÊÆ¿Æ¼¼Ðû²¼µÄÇ徲ͨ¸æ £¬£¬£¬£¬£¬ÈôÊǶñÒâÈí¼þ×÷Õß´ÕÇɽ«¶ñÒâÈí¼þÃüÃûΪcmd.exe»òregedit.exe £¬£¬£¬£¬£¬ÄÇôATTK½«»á¼ÓÔØ²¢ÔËÐиÃexeÎļþ¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚATTKÊÇÓɾ­ÓÉÑéÖ¤µÄ¿¯Ðз½ÊðÃûµÄ £¬£¬£¬£¬£¬Òò´Ë¿ÉÈÆ¹ýÈκÎMOTWÇå¾²ÖÒÑÔ £¬£¬£¬£¬£¬¹¥»÷ÕßÉõÖÁ¿ÉÒÔ½«ATTK×÷ΪһÖÖ³¤ÆÚÐÔ»úÖÆ¡£¡£¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼ÏÖÒѽ«ËùÓÐATTK ¸üÐÂÖÁ1.62.0.1223°æ±¾ £¬£¬£¬£¬£¬µ«ÉÐδÐû²¼ÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¡£¡£ 

   

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/92818/hacking/trend-micro-anti-threat-toolkit-flaw.html

2¡¢¶à¼ÒVPN¹©Ó¦ÉÌÔâºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬Ð§ÀÍÆ÷˽Կ±»µÁ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


°üÀ¨NordVPN¡¢TorGuard VPNºÍVikingVPNÔÚÄڵĶà¼ÒVPN¹©Ó¦ÉÌÔâºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬ÓÃÓÚ±£»£»£»£»£»£»¤ÆäWebЧÀÍÆ÷ºÍVPNÉèÖÃÎļþµÄÖ¤Êé¼°Ïà¹ØË½Ô¿±»µÁ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓøÃÖ¤Ê齨Éè´¹ÂÚÕ¾µã»òÌᳫÖÐÐÄÈ˹¥»÷¡£¡£¡£¡£¡£¡£¡£³ýÁËVikingVPNÖ®Íâ £¬£¬£¬£¬£¬NordVPNºÍTorGuard¾ùÒÑÐû²¼ÉùÃ÷¡£¡£¡£¡£¡£¡£¡£NordVPNÈ·ÈÏй¶ÊÂÎñ±¬·¢ÔÚ2018Äê3Ô £¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄ¹¥»÷Õß»á¼ûÁËÆä·ÒÀ¼Êý¾ÝÖÐÐIJ¢ÇÔÈ¡ÁËTLSÃÜÔ¿ £¬£¬£¬£¬£¬ÓÉÓÚ¸ÃTLSÃÜÔ¿ÒѾ­ÓâÆÚ £¬£¬£¬£¬£¬Òò´ËÎÞ·¨½âÃÜÈκÎVPNÁ÷Á¿¡£¡£¡£¡£¡£¡£¡£TorGuardÔòÖ¸³öÓÉÓÚËûÃÇʹÓÃÁËÇå¾²µÄPKIÖÎÀí²¢ÇÒCAÃÜԿûÓб»µÁ £¬£¬£¬£¬£¬Òò´ËûÓÐVPNÓû§Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/92808/hacking/nordvpn-torguard-vikingvpn-hack.html

3¡¢µÂ¹úÖÆÔìÉÌPilzÔÚÔâµ½ÀÕË÷Èí¼þ¹¥»÷Ò»ÖܺóÈÔδ»Ö¸´

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

µÂ¹ú×Ô¶¯»¯¹¤¾ß³§ÉÌÆ¤¶û×È£¨Pilz£©ÔÚÔâÊÜÀÕË÷Èí¼þBitPaymerѬȾºóÒѾ­å´»úÁËÁè¼ÝÒ»ÖܵÄʱ¼ä¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã¹«Ë¾µÄÍøÕ¾ÐÂÎÅ £¬£¬£¬£¬£¬×Ô2019Äê10ÔÂ13ÈÕÒÔÀ´ £¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚÈ«Çò¹æÄ£ÄÚµÄËùÓÐЧÀÍÆ÷ºÍPCÊÂÇéÕ¾ £¬£¬£¬£¬£¬°üÀ¨Í¨Ñ¶ÉèÊ© £¬£¬£¬£¬£¬¶¼Êܵ½ÁËÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÎªÔ¤·ÀÆð¼û £¬£¬£¬£¬£¬¸Ã¹«Ë¾´ÓÍøÂçÖÐɾ³ýÁËËùÓÐÅÌËã»úϵͳ²¢×èÖ¹Á˶Թ«Ë¾ÍøÂçµÄ»á¼û¡£¡£¡£¡£¡£¡£¡£PilzÔ±¹¤»¨ÁËÈýÌìʱ¼ä²Å»Ö¸´µç×ÓÓʼþЧÀ͵Ļá¼û £¬£¬£¬£¬£¬ÓÖ»¨ÁËÈýÌì²Å»Ö¸´Æä¹ú¼Êµç×ÓÓʼþЧÀÍ £¬£¬£¬£¬£¬Ö±µ½21ÈղŻָ´¶Ô²úÆ·¶©µ¥ºÍ½»»õϵͳµÄ»á¼û¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾µÄÉú²úÄÜÁ¦Ã»ÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/major-german-manufacturer-still-down-a-week-after-getting-hit-by-ransomware/

4¡¢Ó¢¹úHome GroupÔâºÚ¿Í¹¥»÷ £¬£¬£¬£¬£¬½ü4000¿Í»§ÐÅϢй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ó¢¹ú×î´óµÄס·¿Ð­»áÖ®Ò»Home GroupÒÑÏòÔ¼4000Ãû¿Í»§Ðû²¼ÖÒÑÔ £¬£¬£¬£¬£¬ÆäСÎÒ˽¼ÒÐÅÏ¢Ôڸù«Ë¾ÔâÊÜÊý¾Ýй¶֮ºó¿ÉÄܱ»µÁ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤BBCµÄ±¨µÀ £¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÐÅÏ¢°üÀ¨¿Í»§µÄÐÕÃû¡¢µØµãºÍÁªÏµÐÅÏ¢ £¬£¬£¬£¬£¬µ«²»°üÀ¨²ÆÎñÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ú¹ÊÍ³Æ £¬£¬£¬£¬£¬ÊÂÎñÊÇÓɵÚÈý·½Ç徲ר¼Ò·¢Ã÷µÄ £¬£¬£¬£¬£¬Ó°ÏìÁËÓ¢¸ñÀ¼¶«±±¡¢Î÷±±¼°Ô¼¿Ë¿¤µÄ¿Í»§¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÊÂÎñ±¬·¢µÄÏêϸԵ¹ÊÔ­ÓÉ £¬£¬£¬£¬£¬µ«Home Group½²»°È˳ƸÃÎÊÌâÔÚ90·ÖÖÓÄÚ»ñµÃ½â¾ö¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/home-group-data-breach/

5¡¢ÐÂÀ¬»øÓʼþ»î¶¯Ê¹ÓÃÀÕË÷Èí¼þBuranÃé×¼µÂ¹ú

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±·¢Ã÷Ò»¸öÖ÷ÒªÕë¶ÔµÂ¹úµÄÀ¬»øÓʼþ¶ñÒâ»î¶¯ £¬£¬£¬£¬£¬¹¥»÷ÕßÖ÷Òª·Ö·¢ÀÕË÷Èí¼þBuran¡£¡£¡£¡£¡£¡£¡£10Ô³õ £¬£¬£¬£¬£¬BromiumÊӲ쵽ð³äÔÚÏß´«ÕæÐ§ÀÍeFaxµÄÀ¬»øÓʼþ»î¶¯ £¬£¬£¬£¬£¬ÓʼþÖаüÀ¨Ö¸ÏòÌṩ¶ñÒâWordÎĵµµÄPHPÒ³Ãæ³¬Á´½Ó £¬£¬£¬£¬£¬Õâ¿ÉÒÔÌÓ±ÜÓʼþÇå¾²Íø¹ØµÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£ÕâЩWordÎĵµ»áͨ¹ýVBAºêÏÂÔØ²¢Ö´ÐÐBuran¡£¡£¡£¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þ»¹»áÏòhxxp://geoiptool[.]com·¢ËÍHTTP GetÇëÇóÀ´¶ÔÊܺ¦ÕßµÄϵͳ¾ÙÐеØÀí¶¨Î»¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.tripwire.com/state-of-security/security-data-protection/malspam-campaign-targeted-german-organizations-with-buran-ransomware/

6¡¢ºÚ¿ÍÈëÇÖÃÀ¹ú¸ßµÈ·¨ÔºÏµÍ³²¢·¢ËÍÔ¼200Íò·âÀ¬»øÓʼþ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


µÃ¿ËÈøË¹ÖÝÒ»ÃûÄÐ×Ó£¨Oriyomi Sadiq Aloba£©ÒòÈëÇÖÂåÉ¼í¶¸ßµÈ·¨Ôº£¨LASC£©µÄÅÌËã»úϵͳ²¢Ê¹ÓÃÆäЧÀÍÆ÷·¢ËÍÔ¼200Íò·âÀ¬»øÓʼþ¶ø±»ÅÐÈëÓü145¸öÔºÍÅâ³¥4.7ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£AlobaÖ÷Ҫͨ¹ý´¹ÂÚ¹¥»÷ÔÚ2017Äê7Ô»ñÈ¡ÁËLASCÔ±¹¤µÄÓÊÏäÕË»§Æ¾Ö¤ £¬£¬£¬£¬£¬²¢Ê¹ÓÃÕâЩƾ֤µÇ¼µ½LASCЧÀÍÆ÷ºÍ·¢ËÍÁËÁè¼Ý200Íò·â´¹ÂÚÓʼþ¡£¡£¡£¡£¡£¡£¡£ÕâЩÓʼþð³ä³ÉÃÀ¹úÔËͨ£¨American Express£©ºÍ¸»¹úÒøÐУ¨Wells Fargo£©µÈ¹«Ë¾¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-superior-court-systems-hacked-to-spread-phishing-emails/