AvertX IPϵÁÐÉãÏñÍ·±£´æ3¸öÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÌᳫ±©Á¦¹¥»÷£»£»£»ÒÔÉ«ÁÐÁ½´¦Ë®Àû»ù´¡ÉèÊ©Ôâµ½ÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2020-07-21

1.AvertX IPϵÁÐÉãÏñÍ·±£´æ3¸öÎó²î£¬£¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓÃÌᳫ±©Á¦¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Palo Alto Networks Unit 42·¢Ã÷ÁË×îа汾µÄAvertX IPÉãÏñ»úÖб£´æµÄÈý¸öÎó²î£¬£¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓÃÌᳫ±©Á¦¹¥»÷¡£¡£¡£¡£¡£ ¡£ÕâЩÎó²î»®·ÖΪÓû§Ã¶¾ÙÎó²î£¨CVE-2020-11625£©£¬£¬£¬£¬£¬£¬£¬¹ýʧµÄwebÓû§½çÃæ(UI)µÇ¼²»±£´æµÄÕÊ»§Ê±»áµ¼Ö²î±ðµÄЧ¹û£¬£¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓÃÌᳫ±©Á¦¹¥»÷£»£»£»ÈõÃÜÂ루CVE-2020-11624£©£¬£¬£¬£¬£¬£¬£¬²»ÒªÇóÓû§¸ü¸ÄĬÈÏÃÜÂ룬£¬£¬£¬£¬£¬£¬µ±Óû§Ê¹ÓÃĬÈÏÃÜÂëµÇ¼ʱ»áÌáÐÑÃÜÂëÒѸü¸Ä£¬£¬£¬£¬£¬£¬£¬µ«ÈÔÔÊÐíÓû§µÇ¼£»£»£»ÐÅϢй¶£¨CVE-2020-11623£©£¬£¬£¬£¬£¬£¬£¬±£´æÒ»¸ö¹ûÕæµÄUART½Ó¿Ú£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃËü¶ÔUART¾ÙÐÐÎïÆÊÎö¼û²¢¸ü¸ÄÉèÖù¦Ð§¡£¡£¡£¡£¡£ ¡£¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²î¾ÙÐб©Á¦¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃĬÈÏÃÜÂë»á¼ûÉãÏñ»ú²¢ÅþÁ¬µ½IoT×°±¸£¬£¬£¬£¬£¬£¬£¬ÎïÆÊÎö¼ûUATRÀ´¸ü¸ÄÉèÖÃÉõÖÁ¹Ø±ÕÏà»ú¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/07/vulnerabilities-with-avertx-ip-security.html


2.ESET·¢Ã÷Welcome Chat¿É¼àÊÓºÍй¶Óû§Êý¾Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ESETÑо¿·¢Ã÷Öж«µÄAndroidÓ¦ÓÃWelcome Chat£¬£¬£¬£¬£¬£¬£¬¿É¼àÊÓºÍй¶Óû§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬»òÓë¼ÓɳºÚ¿Í×éÖ¯MoleratsÓйØ¡£¡£¡£¡£¡£ ¡£¶ñÒâÍøÕ¾Éù³Æ¸ÃÓ¦ÓÃÊÇGoogle PlayÊÐËÁÖÐÌṩµÄÇ徲̸ÌìÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏËü²¢²»ÔÚ¹Ù·½Ó¦ÓÃÊÐËÁ¡£¡£¡£¡£¡£ ¡£×°ÖøÃÈí¼þºó£¬£¬£¬£¬£¬£¬£¬Æä»áÇëÇóÊܺ¦ÕßÔÊÐíȨÏÞ£¬£¬£¬£¬£¬£¬£¬ÀýÈç·¢ËͺÍÉó²éSMSÐÂÎÅ¡¢»á¼ûÎļþ¡¢¼Í¼ÒôƵÒÔ¼°»á¼ûÁªÏµÈ˺Í×°±¸Î»Öᣡ£¡£¡£¡£ ¡£ÔÞ³ÉÕâЩÔÊÐíºó£¬£¬£¬£¬£¬£¬£¬¸ÃÈí¼þ»áÁ¬Ã¦½«ÓйØ×°±¸µÄÐÅÏ¢·¢Ë͵½ÆäÏÂÁîºÍ¿ØÖÆ£¨C£¦C£©Ð§ÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬²¢Ã¿Îå·ÖÖÓÓëC£¦CЧÀÍÆ÷ÁªÏµÒ»´Î¡£¡£¡£¡£¡£ ¡£ESETÒÔΪ£¬£¬£¬£¬£¬£¬£¬¸ÃÌØ¹¤³ÌÐòÓëAndroid¶ñÒâÈí¼þ¼Ò×åBadPatchÓйØ¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/07/14/welcome-chat-secure-messaging-app-nothing-further-truth/


3.ÒÔÉ«ÁÐË®Îñ¾ÖÈ·ÈÏÆäÁ½´¦Ë®Àû»ù´¡ÉèÊ©Ôâµ½ÍøÂç¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÒÔÉ«ÁÐË®Îñ¾Ö¹ÙÔ±ÉÏÖÜÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÆäÁ½´¦Ë®Àû»ù´¡ÉèÊ©ÓÚÁùÔÂÔâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬Êܺ¦ËùÔÚ»®·ÖΪÉϼÓÀûÀûµØÇøµÄũҵˮ±ÃºÍÖв¿Ê¡·ÝMateh YehudaµÄË®±Ã¡£¡£¡£¡£¡£ ¡£Ë®Îñ¾ÖÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÕâЩ¶¼ÊÇũҵ²¿·ÖרÓõÄСÐÍÅÅË®×°Ö㬣¬£¬£¬£¬£¬£¬ÓÉÍâµØÈË×ÔÁ¦Î¬ÐÞ£¬£¬£¬£¬£¬£¬£¬Òò´Ë²»»áÔì³ÉÑÏÖØµÄÓ°Ïì¡£¡£¡£¡£¡£ ¡£¾ÍÔÚ½ñÄê4Ô£¬£¬£¬£¬£¬£¬£¬ÒÔÉ«Áй©Ë®ÏµÍ³Ôâµ½ÁËÊ×´ÎÍøÂç¹¥»÷¡£¡£¡£¡£¡£ ¡£¶øÔÚ6Ô·ݣ¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤¡¶½ðÈÚʱ±¨¡·±¨µÀ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÒѾ­»ñµÃÁËÒÔÉ«ÁÐijЩˮ´¦Öóͷ£ÏµÍ³µÄ»á¼ûȨ£¬£¬£¬£¬£¬£¬£¬²¢ÊÔͼ¸Ä±äË®ÂȺ¬Á¿£¬£¬£¬£¬£¬£¬£¬ÈôÊǹ¥»÷ÀֳɿÉÄܻᵼÖÂÍâµØ×¡ÃñÇá¶ÈÖж¾¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/two-more-cyber-attacks-hit-israels-water-system/#ftag=RSSbaffb68


4.°¢¸ùÍ¢µçÐŹ«Ë¾1.8Íǫ̀ÅÌËã»úѬȾÀÕË÷Èí¼þREVil


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


7ÔÂ18ÈÕ£¨ÐÇÆÚÁù£©°¢¸ùÍ¢µçÐŹ«Ë¾Ôâµ½ÀÕË÷Èí¼þREVil¹¥»÷£¬£¬£¬£¬£¬£¬£¬1.8Íǫ̀ÅÌËã»ú±»Ñ¬È¾£¬£¬£¬£¬£¬£¬£¬²¢±»ÀÕË÷109345.35 Monero´ú±ÒÊê½ð£¨Ô¼753ÍòÃÀÔª£©¡£¡£¡£¡£¡£ ¡£¹¥»÷ÕßÊ×ÏÈ»ñµÃÁ˶Թ«Ë¾ÍøÂçµÄ»á¼ûȨ£¬£¬£¬£¬£¬£¬£¬È»ºóËûÃÇ¿ØÖÆÁËÄÚ²¿µÄDomain Admin£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óøûá¼ûȨÏÞѬȾÁËÉÏÍǫ̀ÅÌËã»ú£¬£¬£¬£¬£¬£¬£¬µ¼Ö°¢¸ùÍ¢µçÐÅÔËÓªµÄÐí¶àÍøÕ¾¶¼ÍÑ»ú¡£¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾µÄITÖ°Ô±¼ì²âµ½¹¥»÷ºó£¬£¬£¬£¬£¬£¬£¬±ãÁ¬Ã¦ÖÒÑÔÆäÔ±¹¤²»ÒªÅþÁ¬ÆäÄÚ²¿VPNÍøÂ磬£¬£¬£¬£¬£¬£¬²¢×èÖ¹·­¿ª´øÓпÉÒÉ´æµµ¸½¼þµÄµç×ÓÓʼþ¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/106147/cyber-crime/telecom-argentina-revil-ransomware.html?utm_source=rss&utm_medium=rss&utm_campaign=telecom-argentina-revil-ransomware


5.IDCÐû²¼2019ÄêÖйúÈ˹¤ÖÇÄܹ¤ÒµÑо¿±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


È«ÇòȨÍþ×Éѯ»ú¹¹IDCÐû²¼¡¶ÖйúÈ˹¤ÖÇÄÜÔÆÐ§ÀÍÊг¡Ñо¿±¨¸æ(2019)¡·¡£¡£¡£¡£¡£ ¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÔÚÖйúAI¹«ÓÐÔÆÐ§ÀÍÕûÌåÊг¡ÃûÌÃÖУ¬£¬£¬£¬£¬£¬£¬°Ù¶ÈÖÇÄÜÔÆÔÚÕûÌåŲÓÃÁ¿¡¢Êг¡·Ý¶î·½Ãæ¾ùÃûÁеÚÒ»£¬£¬£¬£¬£¬£¬£¬ÓµÓÐ×î¶àµÄAI²úÆ·ÊýÄ¿¡£¡£¡£¡£¡£ ¡£IDCÒÔΪ£¬£¬£¬£¬£¬£¬£¬AIÄÜÁ¦ÒѳÉΪÓû§Ñ¡ÔñÔÆÐ§Àͳ§ÉÌʱµÄÖ÷Òª¿¼Á¿ÒòËØ¡£¡£¡£¡£¡£ ¡£¾Ýͳ¼Æ£¬£¬£¬£¬£¬£¬£¬ÖйúAIÔÆÐ§ÀÍÊг¡2019ÄêÊг¡¹æÄ£´ï1.66ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬2018ÖÁ2024Ä긴ºÏÄê¾ùÔöÌíÂʽ«µÖ´ï93.6%¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

http://science.china.com.cn/2020-07/14/content_41219348.htm


6.FireeyeÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬£¬Õë¶Ô¹¤¿ØÐÐÒµµÄ7¿îÀÕË÷Èí¼þ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


FireeyeµÄMandiantÍþвÇ鱨²¿·ÖÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬£¬·¢Ã÷Õë¶Ô¹¤¿ØÐÐÒµµÄ7¿îÀÕË÷Èí¼þ¡£¡£¡£¡£¡£ ¡£MandiantÊ×ÏÈÈ·¶¨ÁËÁù¸öÀÕË÷Èí¼þϵÁеÄÑù±¾£¬£¬£¬£¬£¬£¬£¬»®·ÖΪDoppelPaymer¡¢LockerGoga¡¢Maze¡¢MegaCortex¡¢NefilimºÍSNAKEHOSE£¬£¬£¬£¬£¬£¬£¬ÕâЩÑù±¾ÔÚÒÑÍùÁ½ÄêÖж¼ÓëÓ°Ï칤ҵ×éÖ¯µÄÖØ´óÊÂÎñÓйØ¡£¡£¡£¡£¡£ ¡£MandiantÓÖÆÊÎöÁËCLOPϵÁеĵڶþ¸öÀÕË÷Èí¼þÑù±¾£¨MD5£º3b980d2af222ec909b948b6bbdd46319£©£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÓ²±àÂëÁбíÀ´Ã¶¾Ù°üÀ¨OT×Ö·û´®µÄÀú³Ì£¬£¬£¬£¬£¬£¬£¬¸ÃÁбí°üÀ¨1425¸öÀú³Ì£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÖÁÉÙÓÐ150¸öÊôÓÚOTÏà¹ØµÄÈí¼þÌ×¼þ¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2020/07/financially-motivated-actors-are-expanding-access-into-ot.html