¶ò¹Ï¶à¶ûÒÑÔâÁè¼Ý4000Íò´ÎºÚ¿Í¹¥»÷£»£»£»£»£»£»£»£»Ð¹¥»÷»î¶¯Scranos Operation£»£»£»£»£»£»£»£»ÀÕË÷Èí¼þBitPaymerбäÌå
Ðû²¼Ê±¼ä 2019-04-17
4ÔÂ16ÈÕOracleÐû²¼Ö÷Òª²¹¶¡¸üУ¬£¬£¬£¬¹²ÐÞ¸´297¸öÎó²î£¬£¬£¬£¬ÆäÖаüÀ¨Database ServerÖеÄ6¸öÎó²î¡¢Communication ApplicationsÖеÄ26¸öÎó²î¡¢E-Business SuiteÖеÄ35¸öÎó²î¡¢Fusion MiddlewareÖеÄ53¸öÎó²î¡¢MySQLÖеÄ45¸öÎó²îºÍRetail ApplicationsÖеÄ24¸öÎó²î¡£¡£¡£¡£ÏêϸÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£Æ¾Ö¤OracleµÄÖ÷Òª²¹¶¡Ðû²¼ÍýÏ룬£¬£¬£¬ÏÂÒ»´ÎÖ÷Òª²¹¶¡¸üн«ÓÚ2019Äê7ÔÂ16ÈÕÐû²¼¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
2¡¢Gnosticplayers³öÊÛµÚÎåÅúÓû§Êý¾Ý£¬£¬£¬£¬°üÀ¨6500¶àÍò¸öÕ˺Å
ºÚ¿ÍGnosticplayersÔÚ°µÍøÂÛ̳DreamMarketÉϳöÊÛµÚÎåÅú±»µÁµÄÓû§Êý¾Ý£¬£¬£¬£¬ÕâÅúÊý¾Ý°üÀ¨Áè¼Ý6500Íò¸öÓû§ÕË»§£¬£¬£¬£¬ÊÛ¼ÛΪ0.8463±ÈÌØ±Ò£¨4350ÃÀÔª£©¡£¡£¡£¡£ÕâÅú±»µÁµÄÓû§¼Í¼ÊôÓÚÁù¼Òй«Ë¾£¬£¬£¬£¬°üÀ¨ÓÎϷƽ̨Mindjolt£¨2800Íò£©¡¢ÔÚÏß¹ºÎïÉçÇøWanelo£¨2300Íò£©¡¢Æ»¹ûάÐÞÖÐÐÄiCracked£¨150Íò£©¡¢ÂÃÓι«Ë¾Yanolja£¨150Íò£©¡¢µç×ÓÔ¼ÇëЧÀÍEvite£¨1000Íò£©ºÍÅ®×ÓʱװµêModa Operandi£¨150Íò£©¡£¡£¡£¡£ÏÖÔÚΪֹGnosticplayers³öÊ۵ı»µÁÓû§¼Í¼×ÜÊýÒÑ´ï9.32ÒÚÌõ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/gnosticplayers-hacker-returns-with-fifth-dataset-containing-over-65-million-user-accounts-for-sale-95450e99
3¡¢·¸·¨ÍÅ»ïʹÓÃRATVERMINºóÃŹ¥»÷ÎÚ¿ËÀ¼¶à¸ö¾üʲ¿·Ö
FireEyeÑо¿ÍŶӷ¢Ã÷Ò»¸öÕë¶ÔÎÚ¿ËÀ¼¶à¸ö¾üʲ¿·ÖµÄÓã²æÊ½´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬¸Ã¹¥»÷»î¶¯ÊÇ2018ÄêÕë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹¥»÷»î¶¯µÄÑÓÐø£¬£¬£¬£¬¹¥»÷ÕßÓëLPRÓйء£¡£¡£¡£Æ¾Ö¤¶Ô¶ñÒâÈí¼þ±àÒëʱ¼äµÄÆÊÎö£¬£¬£¬£¬¸Ã¹¥»÷×éÖ¯ËÆºõÖÁÉÙÓÚ2014ÄêÒÔÀ´Ò»Ö±´¦ÓÚ»îԾ״̬£¬£¬£¬£¬ÆäÄ¿µÄÖ÷ÒªÊÇÎÚ¿ËÀ¼¡£¡£¡£¡£ÔÚ×î½üµÄ¹¥»÷»î¶¯ÖУ¬£¬£¬£¬¸Ã×é֯ʹÓÃÁ˶ñÒâÈí¼þQUASARRATºÍRATVERMIN¡£¡£¡£¡£RATVERMINÊÇÒ»¸ö.NETºóÃÅ£¬£¬£¬£¬¿ÉÍøÂçÊܺ¦ÕßµÄÐÅÏ¢²¢ÔËÐÐÖÖÖÖÏÂÁî¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hacker-group-uses-ratvermin-backdoor-to-target-ukrainian-military/
4¡¢°¢É£Ææ±»²¶ºó£¬£¬£¬£¬¶ò¹Ï¶à¶ûÒÑÔâÊÜÁè¼Ý4000Íò´ÎºÚ¿Í¹¥»÷
×Ôά»ù½âÃÜÊ×´´ÈËÖìÀû°²?°¢É£Ææ±»²¶ÒÔÀ´£¬£¬£¬£¬¶ò¹Ï¶à¶û¹«¹²»ú¹¹µÄÍøÕ¾ÔâÊÜÁË4000Íò´ÎÍøÂç¹¥»÷¡£¡£¡£¡£ÉÏÖܶò¹Ï¶à¶û³·»ØÁ˶԰¢É£ÆæµÄÕþÖκǻ¤£¬£¬£¬£¬Õâµ¼ÖºóÕß±»²¶¡£¡£¡£¡£¶ò¹Ï¶à¶ûÐÅÏ¢ºÍͨѶÊÖÒÕ²¿¸±²¿³¤Patricio Real͸¶³Æ£¬£¬£¬£¬¹¥»÷Ö÷ÒªÀ´×ÔÓÚÃÀ¹ú¡¢°ÍÎ÷¡¢ºÉÀ¼¡¢µÂ¹ú¡¢ÂÞÂíÄáÑÇ¡¢·¨¹ú¡¢°ÂµØÀû¡¢Ó¢¹úºÍ¶ò¹Ï¶à¶û×ÔÉí¡£¡£¡£¡£´ó²¿·Ö¹¥»÷¶¼Õë¶ÔÍâ½»²¿¡¢ÖÐÑëÒøÐС¢×Üͳ°ì¹«ÊÒ¡¢¹ú˰¾ÖµÈ²¿·ÖºÍ¼¸¸ö´óѧµÄÍøÕ¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83940/hacktivism/julian-assange-arrest-ddoss.html
5¡¢Ð¹¥»÷»î¶¯Scranos Operation£¬£¬£¬£¬Ê¹ÓÃÓÐÓÃÊðÃûµÄRootkitÇÔÈ¡Óû§ÐÅÏ¢
Ò»¸ö¾ßÓÐÓÐÓÃÊðÃûµÄrootkit£¨±»³ÆÎªScranos£©ÕýÔÚ¶à¸ö¹ú¼ÒÈö²¥£¬£¬£¬£¬Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡¢Ö§¸¶ÐÅÏ¢ºÍä¯ÀÀÆ÷ÀúÊ·¼Í¼£¬£¬£¬£¬»¹¿ÉÓÃÓÚÔÚÉç½»ÍøÂçÉÏÈö²¥À¬»øÐÅÏ¢ºÍ¹ã¸æ¡£¡£¡£¡£Scranosαװ³ÉÊÓÆµÇý¶¯³ÌÐò£¬£¬£¬£¬ÆäʹÓõÄÖ¤ÊéÊÇDigiCertÏòÉϺ£Ò»¼Ò¿µ½¡ÖÎÀí×Éѯ¹«Ë¾½ÒÏþµÄÖ¤Ê飬£¬£¬£¬ÏÖÔÚÖ¤ÊéÈÔÈ»ÓÐÓ㬣¬£¬£¬¹¥»÷Õß¿ÉÄÜÊǵÁÓÃÁ˸ÃÖ¤Êé¡£¡£¡£¡£Bitdefender³ÆScranos OperationÒ»Ö±Éú³¤£¬£¬£¬£¬ÒѾѬȾÁËÓ¡¶È¡¢ÂÞÂíÄáÑÇ¡¢°ÍÎ÷¡¢·¨¹ú¡¢Òâ´óÀûºÍÓ¡ÄáµÈ¹ú¼ÒµÄÓû§¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/scranos-operation-uses-signed-rootkit-to-steal-login-and-payment-info/
6¡¢ÀÕË÷Èí¼þBitPaymerбäÌ壬£¬£¬£¬Ê¹ÓÃPsExecѬȾÃÀ¹úÖÆÔ칫˾
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷ÃÀ¹úÒ»¼ÒÖÆÔ칫˾Ôâµ½ÀÕË÷Èí¼þBitPaymerбäÌåµÄ¹¥»÷¡£¡£¡£¡£¸Ã±äÌ壨Ransom.Win32.BITPAYMER.TGACAJ£©Ê¹ÓÃPsExec¾ÙÐзַ¢£¬£¬£¬£¬²¢ÔÚÊê½ðƱ¾ÝºÍ¼ÓÃÜÎļþµÄÀ©Õ¹ÃûÖÐʹÓÃÁËÊܺ¦¹«Ë¾µÄÃû³Æ¡£¡£¡£¡£¹¥»÷ÊÂÎñ±¬·¢ÔÚ2ÔÂ18ÈÕÍíÉÏ9µã40·ÖÖÁÍíÉÏ11:03Ö®¼ä£¬£¬£¬£¬ÓÉÓÚ¹¥»÷ÕßÖÁÉÙÐèÒªÒ»¸ö¾ßÓÐÖÎÀíԱȨÏÞµÄÕÊ»§²Å»ªÍ¨¹ýPsExecÔËÐÐÏÂÁ£¬£¬£¬ÕâÒâζ×ÅÔÚÀÕË÷Èí¼þ×°ÖÃ֮ǰ¹¥»÷ÕßÒѾͨ¹ýijÖÖÊֶλñµÃÁËÖÎÀíԱȨÏÞ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/new-bitpaymer-ransomware-variant-infected-us-manufacturing-company-via-psexec-3450ef8c


¾©¹«Íø°²±¸11010802024551ºÅ