¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180713
Ðû²¼Ê±¼ä 2018-07-13¡¾¶ñÒâÈí¼þ¡¿ÒøÐÐľÂíHancitor¾íÍÁÖØÀ´£¬£¬£¬£¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþÈö²¥
ÒøÐÐľÂíHancitor×îÔçÓÚ2014Äê±»·¢Ã÷£¬£¬£¬£¬ÓÃÓÚÏÂÔØÆäËü¶ñÒâÈí¼þ²¢ÇÔÈ¡Óû§µÄƾ֤¡£¡£¡£¡£¡£SentinelOneÊӲ쵽Hancitorͨ¹ýÍøÂç´¹ÂÚÓʼþ¾ÙÐÐÈö²¥µÄ¶ñÒâ»î¶¯¡£¡£¡£¡£¡£Ò»Ð©´¹ÂÚÓʼþÒÔÍ£³µ·£¿£¿£¿£¿£¿£¿îµ¥ÎªÖ÷Ì⣬£¬£¬£¬ÓÕÆÓû§µã»÷Æä¶ñÒâÁ´½Ó²¢ÏÂÔØ¶ñÒâwordÎĵµ¡£¡£¡£¡£¡£»£»£ÉÐÓÐһЩÀ¬»øÓʼþÀ´×ÔÓÚIntuit»òHalloFax£¬£¬£¬£¬ÓÕÆÓû§ÏÂÔØ¶ñÒâ´«ÕæÎļþ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Åû¶Á˸öñÒâ»î¶¯µÄ¶ñÒâ·Ö·¢ÍøÖ·¼°C2ЧÀÍÆ÷¡¢ÓÐÓúÉÔØµÈÈëÇÖÖ¸±ê£¨IoC£©¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.sentinelone.com/blog/hancitor-banking-trojan-is-back-%7C-using-malicious-word-attachment/
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚHawkeye KeyloggerµÄбäÌåµÄÆÊÎö±¨¸æ
΢ÈíOFFICE 365Ñо¿ÍŶÓÐû²¼¹ØÓÚ¶ñÒâÈí¼þHawkeye KeyloggerµÄбäÌåµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£Hawkeye KeyloggerÓÖ±»³ÆÎªiSpy Keylogger£¬£¬£¬£¬Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄÐÅÏ¢£¬£¬£¬£¬Æä×îºóÒ»´Î·ºÆðÔÚ2016Äê¡£¡£¡£¡£¡£µ«Ñо¿Ö°Ô±ÔÚ2018Äê4Ô·¢Ã÷¸Ã¶ñÒâÈí¼þÔٴηºÆð£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÈí¼þºÍÊÖÒÕÐÐÒµ£¨52%£©£¬£¬£¬£¬ÒÔ¼°ÒøÐУ¨11%£©¡¢ÄÜÔ´£¨8%£©¡¢»¯¹¤£¨5%£©ºÍÆû³µ£¨5%£©ÐÐÒµ¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ¹ú¼Ò/µØÇø°üÀ¨°¢ÁªÇõ£¨19%£©¡¢ºÉÀ¼£¨15%£©¡¢ÃÀ¹ú£¨11%£©¡¢ÄÏ·Ç£¨6%£©ÒÔ¼°Ó¢¹ú£¨5%£©¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cloudblogs.microsoft.com/microsoftsecure/2018/07/11/hawkeye-keylogger-reborn-v8-an-in-depth-campaign-analysis/
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÔÚGoogle PlayÖз¢Ã÷ÐÂÌØ¹¤Èí¼þGolden Cup
McAfee LabsÑо¿ÍŶÓÔÚGoogle PlayÉÏ·¢Ã÷ÓëÌìϱÖ÷ÌâÏà¹ØµÄÐÂÌØ¹¤Èí¼þGolden Cup¡£¡£¡£¡£¡£ÔÚδ¾Óû§Ô޳ɵÄÇéÐÎÏ£¬£¬£¬£¬Golden Cup»áÔÚºǫ́¾²Ä¬ÍøÂçÓû§µÄÐÅÏ¢²¢·¢ËÍÖÁЧÀÍÆ÷£¬£¬£¬£¬ÕâЩÐÅÏ¢°üÀ¨Óû§µÄµç»°ºÅÂë¡¢ÒÑ×°ÖÃÓ¦ÓÃÁÐ±í¡¢×°±¸ID¡¢Android°æ±¾¡¢IMEI¡¢IMSI¡¢¿ÉÓô洢ÈÝÁ¿ÒÔ¼°×°±¸µÄÐͺ𢳧É̺ÍÐòÁкš£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËͳһÍþвµÄÁíÍâÁ½¸ö±äÌ壬£¬£¬£¬Google PlayÒѾɾ³ýÁËÕâЩ¶ñÒâÓ¦Óᣡ£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securingtomorrow.mcafee.com/mcafee-labs/google-play-users-risk-a-yellow-card-with-android-foulgoal-a/
¡¾¹¥»÷ÊÂÎñ¡¿VSDC¹ÙÍø1¸öÔÂÄÚÈý´ÎÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬ÆäÈí¼þÏÂÔØÁ´½Ó±»Ð®ÖÆ
VSDCÊÇÒ»¼ÒÌṩÃâ·ÑÊÓÆµ±à¼Èí¼þµÄ¹«Ë¾£¬£¬£¬£¬Æä¹ÙÍøÔÚ1¸öÔÂÄÚÈý´ÎÔâµ½ºÚ¿ÍÈëÇÖ£¨6ÔÂ18ÈÕ¡¢7ÔÂ2ÈÕºÍ7ÔÂ6ÈÕ£©£¬£¬£¬£¬¹¥»÷Õß½«ÆäVSDCÈí¼þµÄÏÂÔØÁ´½ÓÌæ»»Îª¶ñÒâÁ´½Ó£¬£¬£¬£¬»®·Ö½«Óû§Öض¨ÏòÖÁÈý¸ö¶ñÒâÈí¼þ£¨Ò»¸öÓÃÓÚÇÔÈ¡Óû§ÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬Ò»¸ö¼üÅ̼ͼÆ÷ºÍÒ»¸öÔ¶¿ØÄ¾ÂíRAT£©¡£¡£¡£¡£¡£VSDCÈ·ÈÏÁËÕâЩÊÂÎñ£¬£¬£¬£¬²¢³ÆÆäÒѾÐÞ¸´ÁËÍøÕ¾¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/popular-software-site-hacked-to-redirect-users-to-keylogger-infostealer-more/
¡¾¹¥»÷ÊÂÎñ¡¿ÃÀ¹ú¿¨Ë¹µØÇøµÄÒ½ÁÆÖÐÐÄÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷
ÃÀ¹úÃÜËÕÀïÖÝ¿¨Ë¹µØÇøµÄÒ½ÁÆÖÐÐÄ³ÆÆäÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬£¬£¬ÆäÄÚ²¿Í¨Ñ¶ÏµÍ³ºÍµç×Ó¿µ½¡µµ°¸ÏµÍ³£¨EHR£©ÊÜÓ°Ïì¡£¡£¡£¡£¡£¸ÃÒ½ÁÆÖÐÐijÆÃ»ÓÐÖ¤¾ÝÅú×¢»¼ÕßµÄÊý¾Ý±»»á¼û¡£¡£¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎúÆäÅÌËã»ú/ЧÀÍÆ÷ÔõÑù±»Ñ¬È¾£¬£¬£¬£¬µ«Ïà¹ØÖ´·¨²¿·ÖÒѾ½éÈë¾ÙÐÐÊӲ졣¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/cass-regional-medical-center-hit-with-unidentified-ransomware/
¡¾Îó²î²¹¶¡¡¿µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGOÐÞ¸´ÆäHMI²úÆ·ÖеĶà¸öÎó²î
µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGOÐÞ¸´Æäe!DISPLAY 7300TÈË»ú½çÃæ£¨HMI£©²úÆ·ÖеĶà¸öÇå¾²Îó²î£¬£¬£¬£¬°üÀ¨XSSÎó²î£¨CVE-2018-12981£©¡¢ÎļþÉÏ´«Îó²î£¨CVE-2018-12980£©ÒÔ¼°Ä¬ÈÏȨÏÞÉèÖò»×¼È·µÄÎó²î£¨CVE-2018-12979£©¡£¡£¡£¡£¡£Í¨¹ý×éºÏʹÓÃÕâЩÎó²î£¬£¬£¬£¬¹¥»÷Õß¿ÉÁýÕÖindex.html²¢ÒÔwwwÓû§µÄȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄÐͺŰüÀ¨762-3000~762-3003£¬£¬£¬£¬WAGOÒÑÔڹ̼þ°æ±¾02ÖÐÐÞ¸´ÁËÕâЩÎó²î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/hackers-can-chain-multiple-flaws-attack-wago-hmi-devices


¾©¹«Íø°²±¸11010802024551ºÅ