Çå¾²»ú¹¹³ÆÊ¯Ó͹«Ë¾BapcoѬȾ¶ñÒâÈí¼þDustamn:¹È¸è´ÓPlayÊÐËÁÖÐÒÆ³ýÁËÁè¼Ý1700¸öѬȾJokerµÄAPP

Ðû²¼Ê±¼ä 2020-01-10


1.Çå¾²»ú¹¹³ÆÊ¯Ó͹«Ë¾BapcoѬȾ¶ñÒâÈí¼þDustamn


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¾ÝÍâýZDNet±¨µÀ£¬£¬£¬°ÍÁÖ¹ú¼ÒʯÓ͹«Ë¾BapcoÔâµ½ÒÉËÆÒÁÀʺڿÍ×éÖ¯µÄÊý¾Ý²Á³ý¶ñÒâÈí¼þDustman¹¥»÷¡£ ¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ12ÔÂ29ÈÕ£¬£¬£¬Ö»ÓÐÒ»²¿·ÖBapcoÅÌËã»úÊܵ½Ó°Ï죬£¬£¬¸Ã¹«Ë¾µÄÓªÒµÔËÓª²¢Î´ÖÐÖ¹¡£ ¡£¡£¡£¡£¡£É³Ìذ¢À­²®¹ú¼ÒÍøÂçÇå¾²¾Ö£¨CNA£©ÔÚÉÏÖܵÄÒ»·ÝÇå¾²¾¯±¨ÖÐÏêϸÐÎòÁ˸öñÒâÈí¼þ¡£ ¡£¡£¡£¡£¡£Dustman±»ÒÔΪÊÇZeroCleare²Á³ýÆ÷µÄ±äÖÖ£¬£¬£¬²¢ÇÒ¶þÕßÓëShamoon²Á³ýÓþßÓÐÏàͬµÄµÚÈý·½Çý¶¯³ÌÐò¡°Eldos RawDisk¡±¡£ ¡£¡£¡£¡£¡£ËäÈ»DustmanÓëZeroCleareµÄ´ó´ó¶¼´úÂë¶¼ÊÇÏàͬµÄ£¬£¬£¬µ«É³ÌØCNAÌåÏÖ¶þÕß±£´æÁ½¸öÖ÷񻂿±ð£ºDustmanµÄÆÆËð¹¦Ð§¼°ËùÓÐÇý¶¯³ÌÐòºÍ×°ÔØ³ÌÐò¶¼ÔÚÒ»¸ö¿ÉÖ´ÐÐÎļþÖУ¬£¬£¬¶øZeroCleareÊÇÁ½¸ö£»£» £»£»£» £»DustmanÖ±½ÓÁýÕÖ¾í£¬£¬£¬¶øZeroCleareͨ¹ýÓÃÀ¬»øÊý¾Ý£¨0x55£©ÁýÕÖ¾íÀ´¾ÙÐвÁ³ý¡£ ¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-iranian-data-wiper-malware-hits-bapco-bahrains-national-oil-company/


2.À­Ë¹Î¬¼Ó˹ÊÐÅÌËã»úϵͳÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬²¿·ÖЧÀÍÈÔδ»Ö¸´


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


À­Ë¹Î¬¼Ó˹ÊÐÌåÏÖÀÖ³É×èÖ¹ÁËÕë¶Ô¸ÃÊеÄÍøÂç¹¥»÷¡£ ¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ1ÔÂ7ÈÕ£¬£¬£¬µ«¸ÃÊÐÌåÏÖITÖ°Ô±Á¬Ã¦¼ì²âµ½ÁËÈëÇÖ²¢½ÓÄɲ½·¥±£»£» £»£»£» £»¤ÊÜÓ°ÏìµÄϵͳ¡£ ¡£¡£¡£¡£¡£×÷ΪӦ¼±ÏìÓ¦£¬£¬£¬¸ÃÊжԲ¿·ÖЧÀ;ÙÐÐÁËÀëÏß - °üÀ¨¸ÃÊеĹ«¹²ÍøÕ¾£¬£¬£¬Ä¿½ñ¸ÃÍøÕ¾ÈÔ´¦ÓڹرÕ״̬¡£ ¡£¡£¡£¡£¡£ÖÜÈý¸ÃÊÐÔÚTwitterÉÏÐû²¼ÉùÃ÷֤ʵÆä¡°»Ö¸´ÁËËùÓÐÊý¾ÝϵͳµÄÕý³£ÔËÓª¡±£¬£¬£¬ÊÐÕþ¸®¹ÙÔ±ÉÐδ͸¶ÓйØÊÂÎñÐÔ×ÓµÄÈκÎϸ½Ú£¬£¬£¬µ«ÍâµØÃ½Ì屨µÀ³Æ¹¥»÷ǰÑÔ¿ÉÄÜÓëµç×ÓÓʼþÓйء£ ¡£¡£¡£¡£¡£¸ÃÊл¹ÌåÏÖ¡°ÎÒÃDz»ÒÔΪÓÐÈκÎÊý¾Ý´ÓϵͳÖÐɥʧ£¬£¬£¬Ò²²»ÒÔΪÓÐÈκÎСÎÒ˽¼ÒÊý¾Ý±»µÁ¡£ ¡£¡£¡£¡£¡£¡±


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/city-of-las-vegas-said-it-successfully-avoided-devastating-cyber-attack/


3.¹ú¼ÊÐ̾¯µÄ½ðÓã°¢¶û·¨Ðж¯µ¼Ö¶«ÄÏÑÇÍÚ¿ó¹¥»÷Ͻµ78£¥


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔÚ¹ú¼ÊÐ̾¯×é֯ΪÆÚ5¸öÔµĽðÓã°¢¶û·¨Ðж¯Ö®ºó£¬£¬£¬ÔÚ¶«ÃË£¨¶«ÄÏÑǹú¼ÒͬÃË£©µØÇøµÄ¹ú¼ÒÖб»¶ñÒâ¿ó¹¤Ñ¬È¾µÄ·ÓÉÆ÷ÊýĿϽµÁË78%¡£ ¡£¡£¡£¡£¡£½ðÓã°¢¶û·¨Ðж¯ÓÚ2019Äê6ÔÂÆô¶¯£¬£¬£¬¸ÃÐж¯×ÊÖú10¸ö¶«ÓѰî¼Ò£¨ÎÄÀ³¡¢¼íÆÒÕ¯¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÀÏÎΡ¢ÂíÀ´Î÷ÑÇ¡¢Ãåµé¡¢·ÆÂɱö¡¢ÐÂ¼ÓÆÂ¡¢Ì©¹úºÍÔ½ÄÏ£©µÄÍøÂç·¸·¨ÊÓ²ìÖ°Ô±ºÍר¼ÒÄܹ»¼ì²âµ½ÊÜѬȾµÄ·ÓÉÆ÷£¬£¬£¬²¢ÖÒÑÔÊܺ¦ÕßÐÞ¸´ÊÜѬȾµÄ×°±¸ºÍ×èÖ¹ÍøÂç×ï·¸µÄ»á¼û¡£ ¡£¡£¡£¡£¡£ÔÚÐж¯Ö®Ç°£¬£¬£¬¸ÃµØÇø±£´æÁè¼Ý2Íò¸ö±»ºÚ¿ÍÈëÇֵķÓÉÆ÷£¬£¬£¬Õ¼È«Çò¼ÓÃÜÐ®ÖÆÑ¬È¾µÄ18%¡£ ¡£¡£¡£¡£¡£µ±Ðж¯ÔÚ11ÔÂÏÂÑ®¿¢ÊÂʱ£¬£¬£¬±»Ñ¬È¾µÄ×°±¸ÊýÄ¿ïÔÌ­ÁË78£¥¡£ ¡£¡£¡£¡£¡£



 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cryptojacking-drops-by-78-percent-in-southeast-asia-after-interpol-action/


4.ÒøÐÐľÂíTrickBotÔٴθüУ¬£¬£¬ÔöÌíºóÃÅÄ£¿£¿£¿£¿éPowerTrick


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤SentinelLabsÖÜËÄÐû²¼µÄÑо¿±¨¸æ£¬£¬£¬ÒøÐÐľÂíTrickBot±³ºóµÄ¹¥»÷ÕßÒѾ­¿ª·¢³öÁËÒ»¸öеĺóÃÅPowerTrick£¬£¬£¬Ö¼ÔÚ×ÊÖúTrickBotÌӱܼì²â¡£ ¡£¡£¡£¡£¡£ÔÚTrickBot¾ÙÐгõʼµÄѬȾ֮ºó£¬£¬£¬Ëü½«°²ÅÅPowerTrickÄ£¿£¿£¿£¿é£¬£¬£¬PowerTrickÆÚ´ýºÍÖ´Ðй¥»÷ÕßµÄÏÂÒ»¸öÏÂÁî²¢ÒÔBase64ÃûÌ÷µ»ØÐ§¹û¡£ ¡£¡£¡£¡£¡£SentinelLabsÊӲ쵽PowerTrickÏÂÔØÁËletmein£¨Ò»¸ö»ùÓÚPowerShellµÄ¾ç±¾£¬£¬£¬ÓÃÓÚÅþÁ¬µ½¿ªÔ´¿ª·¢¿ò¼ÜMetasploit£©£¬£¬£¬ÒÔÖ´ÐÐÕì̽ʹÃüºÍ·¢Ã÷ÆäËüÄ¿µÄ¡£ ¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬PowerTrick»¹¿ÉÒÔ·Ö·¢ÆäËüºóÃÅ£¬£¬£¬°üÀ¨TrickBot×Ô½ç˵¿ª·¢µÄAnchor Project DNS±äÌåÒÔ¼°JScriptºóÃŶñÒâÈí¼þMore_eggsµÈ¡£ ¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://threatpost.com/trickbot-custom-stealthy-backdoor/151663/


5.Ñо¿Ö°Ô±·¢Ã÷Õë¶Ô¹«Ë¾Õû¸öÍøÂçµÄÐÂÀÕË÷Èí¼þSNAKE


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Çå¾²Ñо¿Ö°Ô±ÊӲ쵽Õë¶ÔÕû¸ö¹«Ë¾ÍøÂçµÄÐÂÀÕË÷Èí¼þSNAKE¡£ ¡£¡£¡£¡£¡£Æ¾Ö¤MalwareHunterTeamºÍVitali KremezµÄÆÊÎö£¬£¬£¬¸ÃÀÕË÷Èí¼þÊÇÓÉGolang±àдµÄ£¬£¬£¬²¢ÇÒ°üÀ¨¸ß¶ÈµÄ»ìÏý¡£ ¡£¡£¡£¡£¡£ÔÚÀÖ³ÉѬȾºó£¬£¬£¬SNAKE»áɾ³ýÅÌËã»úµÄ¾íÓ°¸±±¾£¬£¬£¬È»ºóɱËÀÓëSCADAϵͳ¡¢ÍøÂçÖÎÃ÷È·¾ö¼Æ»®¡¢ÐéÄâ»úµÈÏà¹ØµÄÖÖÖÖÀú³Ì¡£ ¡£¡£¡£¡£¡£ÔÚ¼ÓÃÜÎļþµÄÀú³ÌÖУ¬£¬£¬SNAKE»áÌø¹ýÖ÷ÒªµÄWindowsÎļþ¼ÐºÍϵͳÎļþ£¬£¬£¬²¢ÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó¡°EKANS¡±À©Õ¹Ãû£¬£¬£¬ÆäÀÕË÷ÐÅÏ¢ÒªÇóÊܺ¦ÕßÁªÏµ¡°bapcocrypt@ctemplar.com¡±¹ºÖýâÃܹ¤¾ß¡£ ¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.tripwire.com/state-of-security/security-data-protection/snake-ransomware-targeting-entire-corporate-networks/


6.¹È¸è´ÓPlayÊÐËÁÖÐÒÆ³ýÁËÁè¼Ý1700¸öѬȾJokerµÄAPP


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


×Ô2017ÄêÍ·ÒÔÀ´£¬£¬£¬Ô¼ÓÐ1700¸öѬȾAndroid¶ñÒâÈí¼þJoker£¨Ò²±»³ÆÎªBread£©µÄ¶ñÒâÓ¦ÓôÓPlayÊÐËÁÖб»ÒƳý¡£ ¡£¡£¡£¡£¡£CSISÇå¾²ÍŶÓÔÚ2019Äê9Ô¾ͷ¢Ã÷ÁË24¸ö´ËÀàÓ¦Ó㬣¬£¬ÏÂÔØ×Ü´ÎÊýÁè¼Ý47.2Íò´Î¡£ ¡£¡£¡£¡£¡£Joker×î³õ±»ÓÃÓÚÌᳫSMS¶ÌÐÅڲƭ£¬£¬£¬µ«½Ïа汾µÄ±äÌåÒÑ×ªÒÆµ½¸¶·Ñ¶©ÔÄ»ò¹ºÖÃÖÖÖÖÄÚÈݵÄÒÆ¶¯¼Æ·Ñڲƭ¡£ ¡£¡£¡£¡£¡£Ëæ×ŹȸèÒ»Ö±³ǫ̈ÐÂÕþ²ßºÍGoogle Play ProtectÀ©Õ¹·ÀÓù²½·¥£¬£¬£¬JokerÒ²Ò»Ö±¸Ä±äÕ½ÂÔѰÕÒPlayÊÐËÁ·ÀÓù²½·¥ÖеÄÎó²î¡£ ¡£¡£¡£¡£¡£¹È¸èÔÚÍêÕûµÄ±¨¸æÖÐÌṩÁËÓйØJokerµÄ¸ü¶àÏêϸÐÅÏ¢ºÍIoCÖ¸±ê¡£ ¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/google-removed-over-17k-joker-malware-infected-apps-from-play-store/