2019Ä깤¿ØÍþв±¨¸æ £»£»£»2019ÄêQ2 APT¹¥»÷Ç÷ÊÆ±¨¸æ £»£»£»ÃÀ¾ü¹ºÖõĵç×Ó²úÆ·±£´æÇ徲Σº¦

Ðû²¼Ê±¼ä 2019-08-05
1¡¢Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬£¬£¬£¬£¬£¬¾Å´ó·¸·¨ÍÅ»ïרעÓÚICS

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¹¤¿ØÇå¾²³§ÉÌDragosÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬£¬£¬£¬£¬£¬±¨¸æÖÐÆÊÎöÁËרÃÅÕë¶ÔICSÍøÂçµÄ9¸ö·¸·¨ÍŻ¡£¡£¡£¡£ÆäÖÐ5¸ö·¸·¨ÍÅ»ïÖ÷ÒªÕë¶ÔʯÓͺÍ×ÔÈ»Æø¹«Ë¾£¬£¬£¬£¬£¬£¬£¬°üÀ¨HEXANE¡¢MAGNALLIUM¡¢CHRYSENE¡¢XENOTIMEºÍDYMALLOY£¬£¬£¬£¬£¬£¬£¬ÆäÓà4¸ö·¸·¨ÍÅ»ïÖ÷ÒªÕë¶ÔÄÜÔ´²¿·Ö£¬£¬£¬£¬£¬£¬£¬°üÀ¨ELECTRUM¡¢RASPITE¡¢ALLANITEºÍCOVELLITE¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³öÓÉÓÚ¿ÉÔì³É¸ß¶ÈÕðµ´µÄÕþÖκ;­¼ÃÓ°Ï죬£¬£¬£¬£¬£¬£¬Ê¯ÓͺÍ×ÔÈ»Æø²¿·ÖÈÔÈ»ÃæÁÙÆÆËðÐÔÍøÂç¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf


2¡¢¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ç÷ÊÆ±¨¸æ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¿¨°Í˹»ùÑо¿ÍŶÓGReATÐû²¼2019ÄêµÚ¶þ¼¾¶ÈµÄAPTÍþв±¨¸æ¡£¡£¡£¡£¡£4Ô·ÝÑо¿ÍŶÓÅû¶ÁËÒ»¸öǰËùδ֪µÄAPT¿ò¼ÜTajMahal£¬£¬£¬£¬£¬£¬£¬TajMahalÔÚÒÑÍùÎåÄêÖÐÒ»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬£¬Æä¼ÓÃܵÄÐéÄâÎļþϵͳÖд洢Á˶à´ï80¸ö¶ñÒâÄ £¿£¿£¿é¡£¡£¡£¡£¡£¶«ÄÏÑÇÏòÀ´ÊÇAPT¹¥»÷×îΪ»îÔ¾µÄµØÇø£¬£¬£¬£¬£¬£¬£¬µ«±¾¼¾¶ÈµÄ¹¥»÷»î¶¯Ö÷ÒªÓ뺫¹úÓйØ£¬£¬£¬£¬£¬£¬£¬¸ÃµØÇøµÄÆäËü¹ú¼Ò½ÏΪÇå¾²¡£¡£¡£¡£¡£ÔÚÈ«ÇòËùÓеĵØÇø£¬£¬£¬£¬£¬£¬£¬µØÔµÕþÖÎÈÔÈ»ÊÇAPT¹¥»÷µÄÖ÷ÒªÍÆ¶¯Á¦¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/apt-trends-report-q2-2019/91897/


3¡¢±±ÃÀPoshmarkÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¿Í»§ÐÅϢй¶

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

PoshmarkÊDZ±ÃÀµØÇøµÄÒ»¸ö´ò°ç¡¢Ð¬×ÓºÍÅäÊεÄÉúÒâÊг¡£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÓÚ8ÔÂ1ÈÕÅû¶ÁËÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÆäЧÀÍÆ÷ÔâµÚÈý·½Î´ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬£¬¿Í»§µÄÓû§Ãû¡¢¼ÓÑιþÏ£ÃÜÂë¡¢ÐÕÃû¡¢ÐÔ±ðºÍÆÜÉí¶¼»áµÈÐÅϢй¶¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹ÇÔÈ¡ÁËÓû§µÄµç×ÓÓʼþ¡¢É罻ýÌå×ÊÁÏÒÔ¼°´ò°ç³ß´çÆ«ºÃµÈÐÅÏ¢¡£¡£¡£¡£¡£PoshmarkûÓÐ͸¶ÊÂÎñ±¬·¢µÄʱ¼äÒÔ¼°ÊÜÓ°ÏìµÄÈËÊý£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÖ»ÓÐÃÀ¹úµÄÓû§ÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬¼ÓÄôóÓû§²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/poshmark-clothing-marketplace-says-hacker-stole-customer-details/


4¡¢Ð¶ñÒâÈí¼þSystemBC£¬£¬£¬£¬£¬£¬£¬Í¨¹ýFalloutºÍRIG EK¾ÙÐзַ¢


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ProofpointÑо¿Ö°Ô±·¢Ã÷Ò»¸öеĶñÒâÊðÀíÈí¼þSystemBC£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÖ÷Ҫͨ¹ýFalloutºÍRIG EK¾ÙÐзַ¢¡£¡£¡£¡£¡£SystemBCͨ¹ýSOCKS5ÊðÀíÀ´Òþ²ØÆä¶ñÒâÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬ÓëC2ЧÀÍÆ÷ͨ¹ýHTTPs¾ÙÐÐÅþÁ¬¡£¡£¡£¡£¡£ÓÉÓڸöñÒâÈí¼þ±»ÓÃÓÚ¶à¸ö²î±ðµÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪ¸Ã¶ñÒâÈí¼þºÜ¿ÉÄÜÔÚ°µÍøÊг¡ÉϾÙÐгöÊÛ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ±¨¸æÖÐÅû¶ÁËÏêϸIoCºÍ¸Ã¶ñÒâÈí¼þµÄ¸ü¶àϸ½Ú¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/89336/malware/systembc-proxy-malware.html


5¡¢PewDiePieºÚ¿Í¹éÀ´£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃSMSÍø¹ØÎó²î·¢ËÍ´ó×ÚÀ¬»ø¶ÌÐÅ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÔøÐ®ÖÆÉÏÍǫ̀´òÓ¡»úÒÔÍÆ¹ãYouTubeƵµÀPewDiePieµÄºÚ¿ÍÔٴιéÀ´£¬£¬£¬£¬£¬£¬£¬ËûÃÇÊÔͼͨ¹ýSMSÍø¹ØÏµÍ³ÏòÃÀ¹úµÄÿһ²¿ÊÖ»ú·¢ËÍÀ¬»ø¶ÌÐÅ¡£¡£¡£¡£¡£SMSÍø¹ØÍ¨³£ÓÃÓÚ¸¶·Ñ·¢ËͶÌÐÅ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÌṩһϵÁÐAPI£¬£¬£¬£¬£¬£¬£¬Ö§³Ö¾ç±¾»¯½»»¥¡£¡£¡£¡£¡£ÕâÐ©Íø¹ØµÄÿÌõÐÂÎżÛÇ®½ÏµÍ£¬£¬£¬£¬£¬£¬£¬Òâζ×Å´ó¹æÄ£·¢ËÍÀ¬»ø¶ÌÐŵı¾Ç®Ò²½ÏµÍ¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷ÀàËÆÓÚDDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÉù³ÆÒѾ­Ê¹Óòî±ðµÄÊÖ»úºÍÔËÓªÉ̾ÙÐÐÁ˲âÊÔ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÕâÖÖÎÞÏÞÖÆ·¢ËÍ´ó×ÚÎı¾ÐÂÎŵķ½·¨Ê¹µÃÄ¿µÄAndroidºÍiPhoneËÀ»ú¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.wired.co.uk/article/sms-hack-text-twitter-j3ws3r


6¡¢2018ÄêÃÀ¾ü¹ºÖÃÁ˼ÛÖµ3280ÍòÃÀÔªµç×Ó²úÆ·±£´æÇ徲Σº¦

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ƾ֤ÃÀ¹ú¹ú·À²¿¼à²ì³¤£¨DODIG£©±¨¸æ£¬£¬£¬£¬£¬£¬£¬2018²ÆÄêÃÀ¹ú½¾üºÍ¿Õ¾üÔ±¹¤¹ºÖÃÁ˼ÛÖµÁè¼Ý3280ÍòÃÀÔªµÄ±£´æÒÑÖªÇå¾²Îó²îµÄµç×Ó²úÆ·¡£¡£¡£¡£¡£ÕâЩ²úÆ·°üÀ¨Lexmark´òÓ¡»ú¡¢GoProÏà»úºÍåÚÏëÅÌËã»úµÈ¡£¡£¡£¡£¡£ÆäÖÐÁè¼Ý8000̨Lexmark´òÓ¡»ú±»ÓÃÓÚ½¾üºÍ¿Õ¾üÍøÂ磬£¬£¬£¬£¬£¬£¬×ܼÛÖµÁè¼Ý3000ÍòÃÀÔª¡£¡£¡£¡£¡£DODIGÖ¸³öLexmark´òÓ¡»úÔøÊܵ½20¶à¸öÎó²îµÄÓ°Ï죬£¬£¬£¬£¬£¬£¬°üÀ¨Ã÷ÎÄ´æ´¢ºÍ´«Ê䯾֤ÒÔ¼°ÔÊÐí¶ñÒâ´úÂëÖ´ÐеÈ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/us-military-purchased-32-8m-worth-of-electronics-with-known-security-risks/