iOSÎó²îCheckm8¿Éµ¼ÖÂiPhone4µ½XÓÀÊÀÔ½Óü£»£»£»£»£»ÃÀ²ÎÒéԺͨ¹ý¡¶DHSÍøÂçÕ÷²É¼°ÊÂÎñÏìӦС×é·¨°¸¡·

Ðû²¼Ê±¼ä 2019-09-29
1.iOSÎó²îCheckm8¿Éµ¼ÖÂiPhone4µ½XÓÀÊÀÔ½Óü

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

Çå¾²Ñо¿Ô±axi0mXÅû¶iOSÖеÄÇå¾²Îó²îcheckm8£¬ £¬ £¬£¬¸ÃÎó²î¿ÉÒÔʹiPhone4S£¨A5оƬ£©µ½iPhone8¡¢iPhoneX£¨A11оƬ£©µÄËùÓÐÆ»¹ûÊÖ»ú¼°Í¬¿îAϵÁд¦Öóͷ£Æ÷µÄiPad¡¢iPod touchµÈiOS×°±¸ÓÀÊÀÔ½Óü¡£¡£¡£¡£¡£ ¡£¡£Ã»ÓÐÌáµ½×îеÄA12ºÍA13ÊÇ·ñÊܵ½Ó°Ïì¡£¡£¡£¡£¡£ ¡£¡£¸Ã¹¥»÷ʹÓÃÁËbootromÎó²î£¬ £¬ £¬£¬¼´´æ´¢ÁËiPhoneÆô¶¯Ö¸ÁîµÄÖ»¶Á´æ´¢Æ÷£¨ROM£©Îó²î£¬ £¬ £¬£¬ÓÉÓڸò¿·ÖÄÚ´æÊÇÖ»¶ÁµÄ£¬ £¬ £¬£¬Òò´ËÎÞ·¨Í¨¹ýÇå¾²¸üÐÂÀ´ÐÞ¸´Îó²î¡£¡£¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÔÚGithubÉÏÐû²¼ÁËÏà¹ØÎó²îʹÓ㬠£¬ £¬£¬µ«ÉÐÎÞ¹ûÕæ¿ÉÓõÄÔ½Óü³ÌÐò¡£¡£¡£¡£¡£ ¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/ios-exploit-checkm8-could-allow-permanent-iphone-jailbreaks/148762/

2.ÃÀ²ÎÒéԺͨ¹ý¡¶DHSÍøÂçÕ÷²É¼°ÊÂÎñÏìӦС×é·¨°¸¡·

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÃÀ¹ú²ÎÒéԺͨ¹ýÁË¡¶DHSÍøÂçÕ÷²É¼°ÊÂÎñÏìӦС×é·¨°¸¡·£¨S.315£©£¬ £¬ £¬£¬ÊÚȨÁìÍÁÇå¾²²¿£¨DHS£©Í¨¹ýÍøÂçÕ÷²É¼°ÊÂÎñÏìӦС×é×ÊÖú˽È˺͹«¹²²¿·ÖµÖÓùÍøÂç¹¥»÷¡£¡£¡£¡£¡£ ¡£¡£²ÎÒéÔ±SchumerÔÚ9ÔÂ27ÈÕÐû²¼µÄÐÂΟåÖÐÌåÏÖ£¬ £¬ £¬£¬ÕâÒ»Ðж¯ÊÇΪÁË·ÀÓùÄÇЩËðº¦Ñ§Éú¡¢Ñ§Ð£¹ÍÔ±¼°µØ·½Õþ¸®Ô±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢¼°Ö÷ÒªÊý¾ÝµÄÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£ ¡£¡£Ò»¸öÀàËÆµÄ·¨°¸£¨HR1158£©ÒÑÓÚ9ÔÂ24ÈÕÔÚÃÀ¹úÖÚÒéԺͨ¹ý£¬ £¬ £¬£¬ÏÖÔÚÕâÁ½Ïî·¨°¸ÕýÔÚËͽ»×Üͳǩ×ÖÒÔ³ÉΪִ·¨¡£¡£¡£¡£¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-senate-passes-bill-in-response-to-rampant-ransomware-cyberattacks/

3.ÃÀHSCCÍÆ³öÒ½ÁƱ£½¡ÐÐÒµÍøÂçÇå¾²¾ØÕó

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

ÃÀ¹úÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú²¿·ÖЭµ÷ίԱ»á£¨HSCC£©Æô¶¯ÁËÒ»ÏîÖ¼ÔÚ¸ÄÉÆÒ½ÁƱ£½¡²¿·ÖÍøÂçÇå¾²ÐÔµÄÐÅÏ¢×ÊÔ´¹²ÏíÍýÏë¡£¡£¡£¡£¡£ ¡£¡£Ðµġ¶Ò½ÁƱ£½¡ÐÐÒµÐÅÏ¢¹²Ïí×éÖ¯ÍøÂçÇå¾²¾ØÕó¡·£¨HIC-MISO£©Í¨¹ýΪÓû§ÌṩÃÀ¹ú¸÷µØµÄÍøÂçÇå¾²ÐÅÏ¢¹²Ïí×éÖ¯±ã½ÝÁбí£¬ £¬ £¬£¬×ÊÖúÓû§¸ú×Ù×îеÄÇå¾²Íþв¡£¡£¡£¡£¡£ ¡£¡£Ð¾ØÕóÖаüÀ¨25¸öÒÔÉϵÄÍøÂçÇå¾²ÐÅÏ¢¹²Ïí×éÖ¯¼°ÆäЧÀ͵ÄÏêϸÐÅÏ¢£¬ £¬ £¬£¬ÆäÖаüÀ¨9¸öרÃÅÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµºÍÒ½ÁÆ×°±¸Çå¾²ÐÔµÄ×ÊÔ´¡£¡£¡£¡£¡£ ¡£¡£¸Ã¾ØÕóµÄÖ÷ҪĿµÄÊÇʹ¹æÄ£½ÏСµÄÒ½ÁƱ£½¡×éÖ¯£¨È±·¦ÊµÑé×îеÄÍøÂçÇ徲ϵͳµÄ×ÊÔ´£©ÄܸüÈÝÒ×µØÓë¹²ÏíµÄÍøÂçÇå¾²ÐÅÏ¢ºÍ·ÀÓù×ÊÔ´¾ÙÐл¥¶¯¡£¡£¡£¡£¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/health-industry-cybersecurity/

4.ProofpointÐû²¼2019ÄêµÚ¶þ¼¾¶ÈÍøÂçÍþв±¨¸æ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ProofpointµÄ2019ÄêµÚ¶þ¼¾¶ÈÍøÂçÍþв±¨¸æ·¢Ã÷£¬ £¬ £¬£¬¶ñÒâURLռȫÇòÀ¬»øÓʼþ£¨°üÀ¨¶ñÒâURL¼°¶ñÒ⸽¼þ£©µÄ85%£¬ £¬ £¬£¬±È5ÔÂÂÔÓÐÔöÌí£¬ £¬ £¬£¬µ«×ÜÌåÓë2019ÄêµÄÇ÷ÊÆ¼á³ÖÒ»Ö¡£¡£¡£¡£¡£ ¡£¡£Óë5Ô·ÝÏà±È£¬ £¬ £¬£¬È«ÇòÀ¬»øÓʼþµÄ×ÜÊýĿϽµÁ˽ü10%£¬ £¬ £¬£¬µ«ÓÉÓÚTA542ºÍTA511ÔÚÕû¸ö6ÔµIJ»»îÔ¾£¬ £¬ £¬£¬¸ÃϽµ·ù¶ÈСÓÚÔ¤ÆÚ¡£¡£¡£¡£¡£ ¡£¡£Óë5ÔÂÏà±È£¬ £¬ £¬£¬6Ô·ݵÄÀÕË÷Èí¼þÀ¬»øÓʼþÊýÄ¿ºÍ»î¶¯ÏÔ×ÅïÔÌ­£¬ £¬ £¬£¬SodinokibiÀÕË÷Èí¼þ³ÉΪÒÑÍ˳öµÄGandCrabµÄÖ÷Òª¼ÌÈÎÕß¡£¡£¡£¡£¡£ ¡£¡£´ÓµÚ¶þ¼¾¶È×îÏÈ£¬ £¬ £¬£¬´ó×ÚʹÓÃαװÊÖÒÕºÍÉí·ÝÓÕÆ­ÐÅÏ¢µÄÀ¬»øÓʼþ×îÏÈ·ºÆð£¬ £¬ £¬£¬ÒÔǰÕâЩÀ¬»øÓʼþ¶àÓëBECÓйØ£¬ £¬ £¬£¬µ«ÏÖÔÚ¹¥»÷ÕßËÆºõÕý½«ÕâÖÖÊÖÒÕÓÃÓÚÆäËüÄ¿µÄ£¬ £¬ £¬£¬²¢ÇÒʹÓÃÁ¿¸ü´ó¡£¡£¡£¡£¡£ ¡£¡£ÓòÃûڲƭԾÉýÁË47¸ö°Ù·Öµã£¬ £¬ £¬£¬¸ßÓÚµÚÒ»¼¾¶ÈµÄȱ·¦10%¡£¡£¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.proofpoint.com/us/threat-insight/post/proofpoint-q2-2019-threat-report-emotets-hiatus-mainstream-impostor-techniques

5.EmsisoftÐû²¼ÀÕË÷Èí¼þAvestµÄÃ⺬»ìÃܹ¤¾ß


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÔÚÐû²¼WannaCryFakeµÄ½âÃܹ¤¾ß¼¸Ììºó£¬ £¬ £¬£¬EmsisoftÐû²¼ÁËÀÕË÷Èí¼þAvestµÄÃ⺬»ìÃܹ¤¾ß¡£¡£¡£¡£¡£ ¡£¡£AvestÔÚ¼ÓÃÜÓû§µÄÎļþºó»á¸½¼Ó.ckey().email().pack14À©Õ¹Ãû£¬ £¬ £¬£¬²¢ÊÍ·ÅÃûΪ¡°!!!Readme!!!Help!!!.txt¡±ÀÕË÷Ʊ¾Ý¡£¡£¡£¡£¡£ ¡£¡£Æ¾Ö¤EmsisoftÐû²¼µÄÓû§Ö¸ÄÏ£¬ £¬ £¬£¬Êܺ¦ÕßÓ¦¸Ã´ÓϵͳÖÐɾ³ýÀÕË÷Èí¼þºóÔÙʹÓýâÃܹ¤¾ß£¬ £¬ £¬£¬ÒÔÃâÔì³ÉÔÙ´ÎѬȾ¡£¡£¡£¡£¡£ ¡£¡£Ê¹ÓøýâÃܹ¤¾ßÐèÒªÒ»¸öÎļþµÄԭʼ°æ±¾ºÍ¼ÓÃܰ汾£¬ £¬ £¬£¬ÒÔÆÆ½âÆä¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£ ¡£¡£¸Ã½âÃܹ¤¾ß¿É´ÓEmsisoftÍøÕ¾ÉÏÏÂÔØ»ñµÃ¡£¡£¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91775/malware/avest-ransomware-decryptor.html

6.ÐÂÌØ¹¤Èí¼þMasad StealerʹÓÃTelegramÇÔÈ¡Óû§ÐÅÏ¢

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±·¢Ã÷ÐÂÌØ¹¤Èí¼þMasad StealerʹÓÃTelegram×÷ΪͨѶÇþµÀ½«Óû§µÄÎļþ¡¢ä¯ÀÀÆ÷ÐÅÏ¢ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý·¢Ëͻع¥»÷Õß¡£¡£¡£¡£¡£ ¡£¡£Æ¾Ö¤Juniper Threat LabsÑо¿ÍŶӵı¨¸æ£¬ £¬ £¬£¬¸Ã¶ñÒâÈí¼þÔÚijÖÖˮƽÉÏÓëQulab StealerÓйØ£¬ £¬ £¬£¬²¢ÇÒʹÓÃAutoit¾ç±¾¾ÙÐпª·¢È»ºó±àÒëΪWindows¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£ ¡£¡£¸Ã¶ñÒâÈí¼þÏÖÔÚÕýÔÚ°µÍøÂÛ̳ÉÏÆð¾¢·Ö·¢£¬ £¬ £¬£¬ÆäÏúÊÛÕ½ÂÔΪ·Ö¼¶ÏúÊÛ£¬ £¬ £¬£¬ÀýÈç°üÀ¨Ãâ·Ñ°æ±¾ºÍ85ÃÀÔªµÄÈ«¹¦Ð§°æ±¾¡£¡£¡£¡£¡£ ¡£¡£Æ¾Ö¤Telegram»úеÈËIDºÍÓû§ÃûµÄÊýÄ¿£¬ £¬ £¬£¬Ñо¿ÍŶӷ¢Ã÷ÖÁÉÙÓÐ18¸ö¹¥»÷Õß»ò¹¥»÷»î¶¯ÕýÔÚʹÓÃMasad StealerÃé׼DZÔÚÊܺ¦Õß¡£¡£¡£¡£¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-masad-stealer-malware-exfiltrates-crypto-wallets-via-telegram/