2019Äê¼ÓÃÜÇ®±Ò·¸·¨»î¶¯ÒÑÔì³É44ÒÚÃÀÔªËðʧ£»£»£»£»£»£»AndroidÎó²îStrandHogg¿Éαװ³Éí§ÒâÓ¦ÓÃ

Ðû²¼Ê±¼ä 2019-12-03

1.2019Äê¼ÓÃÜÇ®±Ò·¸·¨»î¶¯ÒÑÔì³É44ÒÚÃÀÔªËðʧ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ƾ֤CipherTraceµÄ±¨¸æ£¬£¬ £¬ £¬£¬ÔÚÂÄÀú¹ýÁ½ÄêµÄá¯ÁëÆÚºó£¬£¬ £¬ £¬£¬Óë¼ÓÃÜÇ®±ÒÓйصÄÍøÂç·¸·¨»î¶¯£¨ÀýÈçÉúÒâËù±»ºÚ¿ÍÈëÇÖ¡¢Í˳öȦÌ׵ȣ©·ºÆðÁË´ó·ùϽµ£¬£¬ £¬ £¬£¬È»¶øÔì³ÉµÄËðʧȴ·ºÆðÁËÔöÌí¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ2019Äêǰ9¸öÔ£¬£¬ £¬ £¬£¬ÒÔ¼ÓÃÜÇ®±ÒΪÖ÷µÄÊý×Ö·¸·¨Ôì³ÉÁׯߴï44ÒÚÃÀÔªµÄËðʧ£¬£¬ £¬ £¬£¬ÓëÖ®Ïà±È2018 ÄêÕûÄêÓë¼ÓÃÜÇ®±ÒÏà¹ØµÄ·¸·¨Ëðʧ×ܶîΪ17ÒÚÃÀÔª£¬£¬ £¬ £¬£¬ÕâÒâζ׎ñÄêǰ¾Å¸öÔµÄÊý¾Ý±ÈÈ¥ÄêÕûÄêÔöÌíÁË150%¡£¡£¡£¡£¡£¡£¡£¡£¾ÝÆÊÎö£¬£¬ £¬ £¬£¬PlusTokenºÍQuadrigaCXÁ½Æð¼ÓÃÜÇ®±Òڲƭ°¸Êǵ¼Ö½ñÄêËðʧ¼±¾çÉÏÉýµÄÖ÷ÒªÔµ¹ÊÔ­ÓÉ¡£¡£¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2019/12/02/crypto-crimes/


2.Å·ÖÞÐ̾¯×éÖ¯¹Ø±ÕÁè¼Ý30500¸öµÁ°æÍøÕ¾


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Å·ÖÞÐ̾¯×éÖ¯Ðû²¼ÒÑÔÚÒ»ÏîºÍÃÀ¹úÖ´·¨»ú¹¹ÏàÖúµÄÈ«ÇòÁªºÏÐж¯ÖйرÕÁË30506¸öµÁ°æÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩÓòÃû±»ÓÃÓÚÏúÊÛÖÖÖÖµÁ°æ²úÆ·ºÍЧÀÍ£¬£¬ £¬ £¬£¬°üÀ¨µ«²»ÏÞÓÚµÁ°æµÄÓ°Ï·¡¢µçÊÓ½ÚÄ¿¡¢ÒôÀÖ¡¢Èí¼þºÍ¼ÙÒ©¡¢Ã°³äµÄµç×Ó²úÆ·µÈ¡£¡£¡£¡£¡£¡£¡£¡£Å·ÖÞÐ̾¯×éÖ¯»¹ÌåÏÖ£¬£¬ £¬ £¬£¬ÔÚÕâÏîÐж¯Öл¹¾Ð²¶ÁË3Ãû·¸·¨ÏÓÒÉÈË£¬£¬ £¬ £¬£¬²¢½É»ñÁË26000¼þÉÝ³ÞÆ·£¨ÏãË®¡¢Ò·þµÈ£©¡¢363Éý¾Æ¾«ÒûÁϺʹó×ÚÓ²¼þ×°±¸¡£¡£¡£¡£¡£¡£¡£¡£ËûÃÇ»¹ÔÚ¶à¸öÒøÐÐÕË»§ºÍÔÚÏßÖ§¸¶Æ½Ì¨ÖÐʶ±ð²¢¶³½áÁËÁè¼Ý15ÍòÅ·Ôª¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/over-30-500-online-piracy-sites-shut-down-in-global-operation/


3.ÐÂÎ÷À¼Ç¹Ö§»Ø¹ºÍýÏë¹ÙÍøÐ¹Â¶3.7Íò³ÖǹÕßÒþ˽ÐÅÏ¢


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÐÂÎ÷À¼Õþ¸®µÄǹ֧»Ø¹ºÍýÏë¹ÙÍøÒâÍâй¶ÁË37000¶àÃû³ÖǹÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬ £¬ £¬£¬°üÀ¨ËûÃǵÄÍêÕûÁªÏµ·½·¨¡¢Ç¹Ö§ÔÊÐíÖ¤±àºÅÒÔ¼°ÒøÐÐÕË»§ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£¡£³Ö֤ǹ֧ËùÓÐÕßÀíÊ»ᣨCOLFO£©Åû¶ÁËÕâÒ»ÊÂÎñ£¬£¬ £¬ £¬£¬¾¯·½Ëæºó½ÒÏþÉùÃ÷³ÆÒѾ­ÖªÏþ¸ÃÎÊÌâ²¢¹Ø±ÕÁËÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¡£COLFOÌåÏÖÔÚ¾¯·½¹Ø±Õ֮ǰÓû§×î¶à¿ÉÒԵǼ¸Ãϵͳ3¸öСʱ£¬£¬ £¬ £¬£¬ÏÖÔÚÉв»ÇåÎúÕâЩÐÅϢ̻¶Á˶೤ʱ¼ä¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.computerworld.com/article/3482005/buyback-website-reveals-details-of-37-000-gun-owners.html


4.´¹ÂÚÍøÕ¾Ê¹ÓÃÐéαSteamÔùÆ·ÇÔÈ¡Óû§Æ¾Ö¤


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±nullcookies·¢Ã÷Ò»¸öʹÓÃÐéαSteamÔùÆ·ÇÔÈ¡Óû§Æ¾Ö¤µÄ´¹ÂÚÍøÕ¾£¬£¬ £¬ £¬£¬²¢ÔÚTwitterÉÏÐû²¼ÁËÖÒÑÔ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÍøÕ¾Ö÷ÒªÐû´«Ò»¸öÐéαµÄ¡°3ÍòÃÀÔªÔùÆ·¡±µÄ´ÙÏú»î¶¯£¬£¬ £¬ £¬£¬ÆäÖл¹°üÀ¨Ãâ·ÑµÄCSGOƤ·ôÔùÆ·¡£¡£¡£¡£¡£¡£¡£¡£¸Ã´¹ÂÚÒ³ÃæµÄ×ó²àÉÐÓÐÒ»¸öαÔìµÄʵʱ̸ÌìÆÁÄ»£¬£¬ £¬ £¬£¬µ«ÏÖʵÉÏÏÔʾµÄ̸ÌìÐÅÏ¢Ò²ÊÇͨ¹ýJavaScript¾ç±¾Î±ÔìµÄ¡£¡£¡£¡£¡£¡£¡£¡£µ±Óû§µã»÷¡°Í¨¹ýSteamµÇ¼¡±°´Å¥ºó£¬£¬ £¬ £¬£¬½«±»ÒªÇóÔÚÐéαµÄµÇÂ¼Ò³ÃæÉÏÊäÈëÆ¾Ö¤¡£¡£¡£¡£¡£¡£¡£¡£ºÃÐÂÎÅÊÇÓÉÓÚ¸ÃÍøÕ¾±»ÍйÜÔÚCloudflareÉÏ£¬£¬ £¬ £¬£¬Òò´ËʵÑé»á¼û¸ÃÒ³ÃæµÄÓû§½«»áÏÔʾ¿ÉÒÉÕ¾µãµÄÖÒÑÔ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-steam-skin-giveaway-site-steals-your-login-credentials/


5.ÌØ¹¤Èí¼þCallerSpyÕë¶ÔÐÔ¹¥»÷µÄÆÊÎö±¨¸æ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ç÷ÊÆ¿Æ¼¼Ðû²¼ÓйØÒƶ¯Ìع¤Èí¼þCallerSpyµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÌØ¹¤Èí¼þÖ÷Ҫαװ³É̸ÌìÓ¦Ó㬣¬ £¬ £¬£¬µ«²¢²»¾ß±¸Ì¸Ì칦Ч£¬£¬ £¬ £¬£¬¶øÊǾ߱¸¶àÖÖÌØ¹¤ÐÐΪ£¬£¬ £¬ £¬£¬°üÀ¨ÉèÖöà¸öÍýÏëʹÃü£¬£¬ £¬ £¬£¬ÍøÂçÉè±¹ØÁ¬Äͨ»°¼Í¼¡¢¶ÌÐÅ¡¢ÁªÏµÈ˺ÍÎļþÐÅÏ¢£»£»£»£»£»£»´ÓC£¦CЧÀÍÆ÷ÎüÊÕÏÂÁ£¬ £¬ £¬£¬½ØÆÁ²¢·¢Ë͵½Ð§ÀÍÆ÷µÈ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»®·ÖÔÚ5ÔºÍ10ÔÂÊӲ쵽¸Ã¶ñÒâÈí¼þ¼Ò×åµÄÕë¶ÔÐÔ¹¥»÷£¬£¬ £¬ £¬£¬µ«Æä¹¥»÷Ä¿µÄÉÐδÃ÷È·¡£¡£¡£¡£¡£¡£¡£¡£±¨¸æÖÐÁгöÁËÏêϸµÄIoCÖ¸±ê¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/mobile-cyberespionage-campaign-distributed-through-callerspy-mounts-initial-phase-of-a-targeted-attack/


6.AndroidÎó²îStrandHogg¿Éαװ³Éí§ÒâÓ¦ÓÃ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


PromonÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¸öеÄAndroidÎó²îStrandHogg£¬£¬ £¬ £¬£¬¸ÃÎó²îÔÊÐí¶ñÒâÓ¦ÓÃαװ³Éí§ÒâÕýµ±Ó¦Óᣡ£¡£¡£¡£¡£¡£¡£¸ÃÎó²îʹÓÃÁËAndroidµÄ¶àʹÃü´¦Öóͷ£¹¦Ð§£¬£¬ £¬ £¬£¬µ±Óû§µã»÷Ò»¸öÕý³£Ó¦ÓõÄͼ±êʱ£¬£¬ £¬ £¬£¬¶ñÒâÓ¦ÓÿÉÒÔʹÓøÃÎó²î×èµ²Ö¸Áî²¢ÏòÓû§ÏÔʾһ¸öÐéαµÄ½çÃæ£¬£¬ £¬ £¬£¬´Ó¶øÓÕµ¼Óû§ÊÚÓèÖÖÖÖȨÏÞ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒѾ­·¢Ã÷ÁË36¸öÕýÔÚÆð¾¢Ê¹ÓôËÎó²îµÄ¶ñÒâÓ¦Ó㬣¬ £¬ £¬£¬°üÀ¨ÒøÐÐľÂíBankBot¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ¸ÃÎó²îµÄÓ°Ïì¹æÄ£ºÜÊǴ󣬣¬ £¬ £¬£¬ÓÉÓÚĬÈÏÇéÐÎÏ´ó´ó¶¼Ó¦Óö¼Ò×Êܹ¥»÷£¬£¬ £¬ £¬£¬²¢ÇÒÏÖÔÚûÓпɿ¿µÄÒªÁìÀ´Ì½²â»ò×èÖ¹ÕâÖÖ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£¹È¸èÉÐδÔÚÈκΰ汾µÄAndroidÉÏÐÞ¸´´ËÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/actively-exploited-strandhogg-vulnerability-affects-android-os/