°¢ÁªÇõ±»Ö¸¿Ø¼àÊÓToTokÊý°ÙÍòÓû§£¬£¬£¬£¬¹È¸èÆ»¹û½ôÆÈϼܣ»£»£»£»£»RyukбäÖÖ²»ÔÙÕë¶ÔLinuxϵͳµÄÎļþ
Ðû²¼Ê±¼ä 2019-12-27
1.°¢ÁªÇõ±»Ö¸¿Ø¼àÊÓToTokÊý°ÙÍòÓû§£¬£¬£¬£¬¹È¸èÆ»¹û½ôÆÈϼÜ
ƾ֤¡¶Å¦Ô¼Ê±±¨¡·±¨µÀ£¬£¬£¬£¬°¢ÁªÇõÕþ¸®Ê¹ÓÃÊ¢ÐеÄͨѶӦÓÃToTok×÷Ϊ¼àÊÓ¹¤¾ß£¬£¬£¬£¬¸ú×ÙÓû§µÄ¶Ô»°ºÍ»î¶¯¡£¡£¡£¸ÃAPPÏÖÔÚÒѱ»AppleºÍGoogleÔÚÏßÊÐËÁϼܡ£¡£¡£ToTokµÄÓû§°üÀ¨°¢ÁªÇõºÍÖж«ÆäËû¹ú¼ÒµÄÊý°ÙÍòÃñÖÚ¡£¡£¡£¸Ã±¨¸æ³Æ£¬£¬£¬£¬ÃÀ¹úÇ鱨¹ÙÔ±ºÍÇå¾²Ñо¿Ö°Ô±È·¶¨°¢ÁªÇõÕþ¸®ÕýÔÚʹÓøÃAPP¾ÙÐмàÊӻ¡£¡£¡£ToTok·ñ¶¨ÁËÓëÕþ¸®¼à¿ØÍýÏëÓйأ¬£¬£¬£¬²¢ÌåÏÖ¸ÃÓ¦Óñ»Ï¼ÜÊÇÓÉÓÚ¡°ÊÖÒÕÎÊÌ⡱¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/95586/intelligence/totok-app-surveillance.html
2.ºÚ¿Í¹¥»÷Çø¿éÁ´¿ª·¢ÍŶÓNULSÇÔÈ¡¼ÛÖµ48ÍòÃÀÔª´ú±Ò
ºÚ¿ÍÈëÇÖÁËÇø¿éÁ´¿ª·¢ÍŶÓNULSµÄÕË»§£¬£¬£¬£¬ÇÔÈ¡Á˼ÛÖµ48ÍòÃÀÔªµÄ´ú±Ò£¨NULS£©¡£¡£¡£NULSÍŶÓÔÚÍÆÎÄÖÐ֤ʵÁËÕâ´Î¹¥»÷£¬£¬£¬£¬²¢ÌåÏÖ×ܹ²ÓÐ200Íò¸öNULS±»µÁ¡£¡£¡£ÆäÖÐÁè¼ÝÒ»°ëµÄ´ú±ÒÒÑͨ¹ý¼ÓÃÜÇ®±ÒÉúÒâËùÕûÀí£¬£¬£¬£¬¼ÛֵԼΪ13ÍòÃÀÔª¡£¡£¡£¸ÃÍŶÓÍýÏë¶ÔÆäÇø¿éÁ´¾ÙÐÐÓ²·Ö²æ£¬£¬£¬£¬ÒÔÊÔͼÓÀÊÀ¶³½áÊ£ÓàµÄNULS´ú±Ò¡£¡£¡£ÔÚ´Ëʱ¼äÄÚ£¬£¬£¬£¬NULSµÄ¼ÛÇ®²¢Ã»ÓÐÊܵ½¸ÃÊÂÎñµÄÓ°Ïì¡£¡£¡£¾Ý³Æ¸Ã¹¥»÷Óë°æ±¾2.2ÖеÄÒ»¸öÇå¾²Îó²îÓйء£¡£¡£
ÔÎÄÁ´½Ó£º
https://thenextweb.com/hardfork/2019/12/23/cryptocurrency-hackers-nuls-blockchain-hard-fork-smart-contract-ethereum/
3.Ô¼»áAPP Plenty of Fishй¶Óû§ÐÕÃûºÍÓÊÕþ±àÂë
ƾ֤The App AnalystµÄ˵·¨£¬£¬£¬£¬Ô¼»áÓ¦ÓóÌÐòPlenty of FishÒ»Ö±ÔÚй¶Óû§µÄÐÕÃûºÍÓÊÕþ±àÂ룬£¬£¬£¬ËäÈ»ÎÞ·¨Ö±½Ó¿´µ½Ð¹Â¶µÄÊý¾Ý£¬£¬£¬£¬²¢ÇÒÊý¾Ý±»´òÂÒʹÆäÄÑÒÔ¶ÁÈ¡£¬£¬£¬£¬µ«Í¨¹ýÍøÂçÁ÷Á¿ÆÊÎö¹¤¾ßÑо¿Ö°Ô±¿ÉÒÔ»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢¡£¡£¡£Æ¾Ö¤Plenty of Fishĸ¹«Ë¾IACµÄ˵·¨£¬£¬£¬£¬¸ÃÔ¼»áÓ¦ÓÃÓµÓÐÁè¼Ý1.5ÒÚ×¢²áÓû§¡£¡£¡£¾Ý³Æ¿ª·¢ÍŶÓÒÑÓÚ±¾Ô³õÍÆ³öÁËÕë¶ÔÐÅÏ¢×ß©Îó²îµÄÐÞ¸´²¹¶¡£¬£¬£¬£¬µ«¸Ã¹«Ë¾½²»°È˲¢Î´¶Ô´Ë¾ÙÐÐ̸ÂÛ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://techcrunch.com/2019/12/23/plenty-of-fish-app-data-leak/
4.Ó¡µÚ°²ÄÉÖÝÃÅÂÞÏØË°ÎñÍøÕ¾ÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬Óû§ÐÅϢй¶
Ó¡µÚ°²ÄÉÖÝÃÅÂÞÏØµÄ²ÆÎñ²¿³¤½ÜÎ÷¿¨¡¤Âó¿ËÀ³Â×£¨Jessica McClellan£©ÌåÏÖ£¬£¬£¬£¬Æä¹¤ÒµË°Õ˵¥µÄÔÚÏßÃÅ»§ÍøÕ¾Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜ»á¼ûÁËÓû§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£Ã»ÓÐÈκÎÒøÐлòÐÅÓÿ¨ÐÅÏ¢Êܵ½Ë𺦣¬£¬£¬£¬ÓÉÓÚÕâЩÐÅÏ¢±»×ÔÁ¦µÄ¹«Ë¾´¦Öóͷ£¡£¡£¡£¸ÃÍøÕ¾£¨eNoticesOnline.com£©ÔÊÐíÄÉ˰ÈËÉó²éÆä¹¤ÒµË°±¨±íºÍÆÀ¹À£¬£¬£¬£¬ÓÉMaster's Touch¹«Ë¾Ìṩ֧³Ö£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ10ÔÂ23ÈÕÔâµ½¹¥»÷¡£¡£¡£¿£¿£¿£¿£¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨ÄÉ˰È˵ÄÓû§ÃûºÍÓÃÓÚ»á¼ûÃÅ»§ÍøÕ¾µÄÃÜÂë¡£¡£¡£ÊÜÓ°ÏìµÄÓû§Ô¼Îª1930ÈË¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.chron.com/news/article/Indiana-county-urges-password-changes-after-14921585.php
5.Çå¾²³§ÉÌÐû²¼Õë¶ÔȼÓͱÃPoSµÄ¶ñÒâÈí¼þÆÊÎö±¨¸æ
VISA SecurityÐû²¼¹ØÓÚÕë¶ÔȼÓͱÃPoSµÄ¶ñÒâÈí¼þ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÐ4¸öỊ̈߳¬£¬£¬£¬¿ÉÒÔ´ÓÄÚ´æÖÐץȡÊÜѬȾÊÂÇéÕ¾µÄÍâµØÊý¾Ý£¬£¬£¬£¬²¢Ð´ÈëÔËÐÐʱָ¶¨µÄÎļþ·¾¶¡£¡£¡£µÚ4¸öÏß³ÌÊôÓÚÒ»¸öÐÂỊ̈߳¬£¬£¬£¬ËüÔÊÐí¹¥»÷ÕßÖÕÖ¹¶ñÒâÈí¼þµÄÔËÐУ¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎúÕâÒ»ÐÐΪµÄÄ¿µÄ£¬£¬£¬£¬Ò»ÖÖ¿ÉÄÜÐÔÊÇÕâÖÖÒªÁìÔÊÐí¹¥»÷ÕßÔÚÎÞÐèʵÏÖÏÂÁîºÍ¿ØÖƵÄÇéÐÎÏÂÖÕÖ¹¶ñÒâÈí¼þ¡£¡£¡£ÏÖÔÚÉÐδÃ÷È·¹¥»÷ÕßץȡÄÚ´æÊý¾ÝµÄÂß¼£¬£¬£¬£¬µ«È·Êµ·ºÆðÁËÐÅÓÿ¨¸ú×ÙÊý¾ÝµÄ¼¸¸ö×Ö·û£¬£¬£¬£¬°üÀ¨³£¼ûµÄ=ºÍ^ÍÑÀë·û¡£¡£¡£ÓëÒÔǰ¼Í¼µÄÑù±¾²î±ð£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þûÓа×Ãûµ¥£¬£¬£¬£¬²¢ÇÒÔÚÔËÐÐʱ´ú³ÌÐò¿Éí§ÒâËÑË÷Êý¾Ý¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://norfolkinfosec.com/pos-malware-used-at-fuel-pumps/
6.ÀÕË÷Èí¼þRyukбäÖÖ²»ÔÙÕë¶ÔLinuxϵͳµÄÎļþ
Ñо¿Ö°Ô±·¢Ã÷ÀÕË÷Èí¼þRyukµÄбäÖÖ²»ÔÙ¼ÓÃÜÓë*NIX²Ù×÷ϵͳÓйصÄÎļþ¼Ð£¬£¬£¬£¬°üÀ¨bin¡¢boot¡¢Boot¡¢dev¡¢etc¡¢lib¡¢initrd¡¢sbin¡¢sys¡¢vmlinuz¡¢runºÍvar¡£¡£¡£RyukÊÇÒ»¸öרÃÅÕë¶ÔWindowsϵͳµÄÀÕË÷Èí¼þ£¬£¬£¬£¬²¢²»±£´æLinux/Unix±äÌ壬£¬£¬£¬µ«Win10ȷʵ°üÀ¨Ò»¸ö±»³ÆÎªWindows×Óϵͳ£¨WSL£©µÄ¹¦Ð§£¬£¬£¬£¬¸Ã¹¦Ð§Ê¹Óû§¿ÉÒÔÖ±½ÓÔÚWindowsÖÐ×°ÖÃÖÖÖÖLinux¿¯Ðа档¡£¡£Çå¾²Ñо¿Ô±Vitali KremezÌåÏÖRyuk¹¥»÷Õß¿ÉÄÜÔÚijЩʱ¼ä·¢Ã÷ÀÕË÷Èí¼þ¶ÔWSLʹÓõÄ*NIXϵͳÎļþ¼ÐÔì³ÉÁËÓ°Ï죬£¬£¬£¬µ¼ÖÂÕâЩWSL×°Öò»ÔÙÆð×÷Ó㬣¬£¬£¬Òò´Ë½«ÕâЩÎļþ¼Ð¼ÓÈëºÚÃûµ¥¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/ryuk-ransomware-stops-encrypting-linux-folders/


¾©¹«Íø°²±¸11010802024551ºÅ