ÃÀ¹úµÂ¿ËÈøË¹ÖÝ23¸öÕþ¸®»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷£»£»£»£»£»£»£»£»¹È¸èÏ£Íû½«HTTPSÖ¤ÊéµÄÉúÃüÖÜÆÚËõ¶Ìµ½Ò»Äê
Ðû²¼Ê±¼ä 2019-08-20
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/coordinated-ransomware-attack-hits-23-texas-government-agencies/147457/
2¡¢¹È¸èÏ£Íû½«HTTPSÖ¤ÊéµÄÉúÃüÖÜÆÚËõ¶Ìµ½Ò»Äê
¹È¸èÏ£Íû½«SSLÖ¤Ê飨ÓÃÓÚ±£»£»£»£»£»£»£»£»¤HTTPS¼ÓÃÜÁ÷Á¿£©µÄÉúÃüÖÜÆÚ´ÓÏÖÔÚµÄÁ½ÄêËõ¶Ìµ½Ò»Äê¶à¡£¡£¡£¡£¡£¸ÃÌá°¸Óɹȸè´ú±íRyan Sleevi ÓÚ6ÔÂÔÚÏ£À°ÈûÈøÂåÄá»ù¾ÙÐеÄCA/BÂÛ̳F2F¾Û»áÉÏÌá³ö¡£¡£¡£¡£¡£Æ¾Ö¤Per SleeviµÄÌáÒ飬£¬£¬´Ó2020Äê3ÔÂ×îÏÈ£¬£¬£¬ËùÓÐнÒÏþµÄSSLÖ¤ÊéµÄÉúÃüÖÜÆÚ½«±äΪ397Ì죨ԼĪһÄêÁãÒ»¸öÔ£©£¬£¬£¬¶ø²»ÊÇÄ¿½ñµÄ825Ì죨ԼĪÁ½ÄêÁãÈý¸öÔ£©¡£¡£¡£¡£¡£¸Ã¾Û»áÉÏûÓжԸÃÌá°¸¾ÙÐÐͶƱ£¬£¬£¬¿ÉÊÇ´ó´ó¶¼ä¯ÀÀÆ÷¹©Ó¦É̶¼ÌåÏÖÖ§³ÖеÄSSLÖ¤ÊéÉúÃüÖÜÆÚ¡£¡£¡£¡£¡£ÔÚÒÑÍùµÄÊ®ÎåÄêÖУ¬£¬£¬ä¯ÀÀÆ÷ÖÆÔìÉÌÒѾһֱÏû¼õSSLÖ¤ÊéµÄÉúÃüÖÜÆÚ£¬£¬£¬´Ó8ÄêïÔ̵½5Ä꣬£¬£¬È»ºóïÔ̵½3Ä꣬£¬£¬È»ºóïÔ̵½Á½Ä꣬£¬£¬×îºóÒ»´Î¸ü¸Ä±¬·¢ÔÚ2018Äê3Ô£¬£¬£¬Æäʱä¯ÀÀÆ÷ÖÆÔìÉÌÊÔͼ½«SSLÖ¤ÊéÊÙÃü´Ó3ÄêïÔ̵½1Ä꣬£¬£¬µ«ÔÚÖ¤Êé½ÒÏþ»ú¹¹¿¹ÒéºóÍ×ÐÖÁÁ½Äê¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/
3¡¢ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÒªÇó¹ú»áÖØÐÂÓÀÊÀÊÚÈ¨ÌØ¹¤ÍýÏë
ÃÀ¹ú¹ú¼ÒÇ鱨¾Ö¾Ö³¤ÒªÇó¹ú»á¶ÔÒ»¸öÌØ¹¤ÏîÄ¿ÖØÐ²¢ÇÒÓÀÊÀÊÚȨ£¬£¬£¬¸ÃÏîÄ¿ÊÇÖ¸¹ú¼ÒÇå¾²¾Ö£¨NSA£©²»·¨ÍøÂçÊý°ÙÍòÃÀ¹ú¹«ÃñµÄͨ»°¼Í¼£¬£¬£¬ÕâÒ»ÏîĿһÔÙ±»ÒÔΪÊÇÎ¥ÏÜÐÐΪ£¬£¬£¬NSAÆÈÓÚѹÁ¦²»µÃ²»¹Ø±Õ¸ÃÏîÄ¿¡£¡£¡£¡£¡£NSAÁ½´Î±»ÆÈÈÏ¿ÉËüÍøÂçÁËÊý°ÙÍò²»Ó¦¸ÃÓµÓеĵ绰¼Í¼£¬£¬£¬Ò»´ÎÊÇÔÚ2018Äê6Ô£¬£¬£¬NSAɾ³ýÁËǰһÄêÍøÂçµÄ5.34ÒÚ¸öͨ»°¼Í¼£¬£¬£¬µ«ÔÚ2018Äê10ÔÂͬÑùµÄÊÂÇéÔٴα¬·¢£¬£¬£¬Ö±µ½2019Äê6Ô²ű»ÆØ¹â¡£¡£¡£¡£¡£Ç鱨¾Ö¾Ö³¤Dan CoatsÔÚÆäÔÚÈεÄ×îºóÒ»ÌìÏòÁ½¸öÒªº¦²ÎÒéԺίԱ»áÈÏÕæÈË·¢³öÁËÕâ·â½¨ÒéÐÅ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.theregister.co.uk/2019/08/16/spying_reauthorization_coats/
4¡¢Ñо¿Ö°Ô±½öʹÓÃÖÇÄÜÊÖ»ú¿É¼ì²â³ö¼üÈëµÄÄÚÈÝ
ÄÏ·½ÎÀÀí¹«»á´óѧ£¨SMU£©µÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬¿ÉÒÔ½öʹÓÃÖÇÄÜÊÖ»ú×èµ²´ò×ÖµÄÉùÒô£¬£¬£¬²¢ÆÆÒë¼üÈëµÄÄÚÈÝ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Äܹ»½âÂëʹÓÃͨË×¼üÅ̺ÍÖÇÄÜÊÖ»úÊäÈëµÄ´ó²¿·ÖÄÚÈÝ-×ÝÈ»ÔÚ³äÂúÁËÆäËûÈË´ò×ÖºÍÅÊ̸ÉùÒôµÄàÐÔÓ¾Û»áÊÒÖÐÒ²ÊÇÔÆÔÆ¡£¡£¡£¡£¡£Eric C. LarsonÌåÏÖ¡°ÎÒÃÇÄܹ»ÒÔ41£¥µÄµ¥´Ê׼ȷÂÊÀ´»ñÈ¡ÈËÃÇËùÊäÈëµÄÄÚÈÝ¡£¡£¡£¡£¡£¡±ÒªÊµÑéÕâÖÖ¹¥»÷£¬£¬£¬¹¥»÷ÕßÐèÒªÖªµÀ×À×ÓµÄÖÊÁÏÀàÐÍ£¬£¬£¬ÓÉÓÚ²î±ðµÄ×À×ÓÔÚ´ò×Öʱ»á±¬·¢²î±ðµÄÉù²¨¡£¡£¡£¡£¡£¹¥»÷Õß»¹ÐèÒªÖªµÀ×ÀÃæÉÏÓжಿÊÖ»úÒÔ¼°ÔõÑù´ÓÖвÉÑù¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.helpnetsecurity.com/2019/08/19/smartphone-intercept-typing/
5¡¢Ñо¿ÍŶÓÐû²¼½©Ê¬ÍøÂçMyKings±äÖֵįÊÎö±¨¸æ
2019Äê5Ô·ÝÇ÷ÊÆ¿Æ¼¼ÔÚÑÇÌ«µØÇøÒ»¼Òµç×Ó¹«Ë¾·¢Ã÷Á˽©Ê¬ÍøÂçMyKingsµÄ±äÖÖ¡£¡£¡£¡£¡£¸Ã±äÖÖ¸ü¸ÄÁË»úеµÄϵͳע²á±í×÷Ϊ³¤ÆÚÐÔ»úÖÆ£¬£¬£¬ÕâЩע²á±íÏîÈÏÕæ¶Ô¶ñÒâURLµÄC£¦C»Øµ÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÕâЩÌõÄ¿ÊÇÔÚ2017ÄêÌí¼ÓµÄ£¬£¬£¬Åú×¢¶ñÒâÈí¼þ±äÖÖÔÚ·¢Ã÷֮ǰÒѾÔÚ¹«Ë¾µÄϵͳÖÐÒþ²ØÁËԼĪÁ½Äê¡£¡£¡£¡£¡£Æ¾Ö¤Ç÷ÊÆ¿Æ¼¼µÄÊý¾Ý£¬£¬£¬×èÖ¹2018ÄêÍ·MyKingsÒѾѬȾÁËÁè¼Ý50Íǫ̀װ±¸£¬£¬£¬²¢ÍÚ¾òÁËÔ¼230ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-a-mykings-variant-with-bootloader-persistence-via-managed-detection-and-response/
6¡¢¹¥»÷ÕßʹÓÃÔ¶¿ØÄ¾ÂíAdwind¹¥»÷¹«ÓÃÊÂÒµ²¿·Ö
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/adwind-remote-access-trojan-hits-utilities-sector/


¾©¹«Íø°²±¸11010802024551ºÅ