¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180713
Ðû²¼Ê±¼ä 2018-07-13¡¾¶ñÒâÈí¼þ¡¿ÒøÐÐľÂíHancitor¾íÍÁÖØÀ´£¬£¬£¬£¬£¬£¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþÈö²¥
ÒøÐÐľÂíHancitor×îÔçÓÚ2014Äê±»·¢Ã÷£¬£¬£¬£¬£¬£¬ÓÃÓÚÏÂÔØÆäËü¶ñÒâÈí¼þ²¢ÇÔÈ¡Óû§µÄƾ֤¡£¡£¡£SentinelOneÊӲ쵽Hancitorͨ¹ýÍøÂç´¹ÂÚÓʼþ¾ÙÐÐÈö²¥µÄ¶ñÒâ»î¶¯¡£¡£¡£Ò»Ð©´¹ÂÚÓʼþÒÔÍ£³µ·£¿£¿£¿£¿£¿îµ¥ÎªÖ÷Ì⣬£¬£¬£¬£¬£¬ÓÕÆÓû§µã»÷Æä¶ñÒâÁ´½Ó²¢ÏÂÔØ¶ñÒâwordÎĵµ¡£¡£¡£»£»£»£»£»£»£ÉÐÓÐһЩÀ¬»øÓʼþÀ´×ÔÓÚIntuit»òHalloFax£¬£¬£¬£¬£¬£¬ÓÕÆÓû§ÏÂÔØ¶ñÒâ´«ÕæÎļþ¡£¡£¡£Ñо¿Ö°Ô±Åû¶Á˸öñÒâ»î¶¯µÄ¶ñÒâ·Ö·¢ÍøÖ·¼°C2ЧÀÍÆ÷¡¢ÓÐÓúÉÔØµÈÈëÇÖÖ¸±ê£¨IoC£©¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.sentinelone.com/blog/hancitor-banking-trojan-is-back-%7C-using-malicious-word-attachment/
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚHawkeye KeyloggerµÄбäÌåµÄÆÊÎö±¨¸æ
΢ÈíOFFICE 365Ñо¿ÍŶÓÐû²¼¹ØÓÚ¶ñÒâÈí¼þHawkeye KeyloggerµÄбäÌåµÄÆÊÎö±¨¸æ¡£¡£¡£Hawkeye KeyloggerÓÖ±»³ÆÎªiSpy Keylogger£¬£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬Æä×îºóÒ»´Î·ºÆðÔÚ2016Äê¡£¡£¡£µ«Ñо¿Ö°Ô±ÔÚ2018Äê4Ô·¢Ã÷¸Ã¶ñÒâÈí¼þÔٴηºÆð£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÈí¼þºÍÊÖÒÕÐÐÒµ£¨52%£©£¬£¬£¬£¬£¬£¬ÒÔ¼°ÒøÐУ¨11%£©¡¢ÄÜÔ´£¨8%£©¡¢»¯¹¤£¨5%£©ºÍÆû³µ£¨5%£©ÐÐÒµ¡£¡£¡£ÊÜÓ°ÏìµÄ¹ú¼Ò/µØÇø°üÀ¨°¢ÁªÇõ£¨19%£©¡¢ºÉÀ¼£¨15%£©¡¢ÃÀ¹ú£¨11%£©¡¢ÄÏ·Ç£¨6%£©ÒÔ¼°Ó¢¹ú£¨5%£©¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cloudblogs.microsoft.com/microsoftsecure/2018/07/11/hawkeye-keylogger-reborn-v8-an-in-depth-campaign-analysis/
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÔÚGoogle PlayÖз¢Ã÷ÐÂÌØ¹¤Èí¼þGolden Cup
McAfee LabsÑо¿ÍŶÓÔÚGoogle PlayÉÏ·¢Ã÷ÓëÌìϱÖ÷ÌâÏà¹ØµÄÐÂÌØ¹¤Èí¼þGolden Cup¡£¡£¡£ÔÚδ¾Óû§Ô޳ɵÄÇéÐÎÏ£¬£¬£¬£¬£¬£¬Golden Cup»áÔÚºǫ́¾²Ä¬ÍøÂçÓû§µÄÐÅÏ¢²¢·¢ËÍÖÁЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢°üÀ¨Óû§µÄµç»°ºÅÂë¡¢ÒÑ×°ÖÃÓ¦ÓÃÁÐ±í¡¢×°±¸ID¡¢Android°æ±¾¡¢IMEI¡¢IMSI¡¢¿ÉÓô洢ÈÝÁ¿ÒÔ¼°×°±¸µÄÐͺ𢳧É̺ÍÐòÁкš£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËͳһÍþвµÄÁíÍâÁ½¸ö±äÌ壬£¬£¬£¬£¬£¬Google PlayÒѾɾ³ýÁËÕâЩ¶ñÒâÓ¦Óᣡ£¡£
ÔÎÄÁ´½Ó£ºhttps://securingtomorrow.mcafee.com/mcafee-labs/google-play-users-risk-a-yellow-card-with-android-foulgoal-a/
¡¾¹¥»÷ÊÂÎñ¡¿VSDC¹ÙÍø1¸öÔÂÄÚÈý´ÎÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬ÆäÈí¼þÏÂÔØÁ´½Ó±»Ð®ÖÆ
VSDCÊÇÒ»¼ÒÌṩÃâ·ÑÊÓÆµ±à¼Èí¼þµÄ¹«Ë¾£¬£¬£¬£¬£¬£¬Æä¹ÙÍøÔÚ1¸öÔÂÄÚÈý´ÎÔâµ½ºÚ¿ÍÈëÇÖ£¨6ÔÂ18ÈÕ¡¢7ÔÂ2ÈÕºÍ7ÔÂ6ÈÕ£©£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«ÆäVSDCÈí¼þµÄÏÂÔØÁ´½ÓÌæ»»Îª¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬£¬»®·Ö½«Óû§Öض¨ÏòÖÁÈý¸ö¶ñÒâÈí¼þ£¨Ò»¸öÓÃÓÚÇÔÈ¡Óû§ÐÅÏ¢µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Ò»¸ö¼üÅ̼ͼÆ÷ºÍÒ»¸öÔ¶¿ØÄ¾ÂíRAT£©¡£¡£¡£VSDCÈ·ÈÏÁËÕâЩÊÂÎñ£¬£¬£¬£¬£¬£¬²¢³ÆÆäÒѾÐÞ¸´ÁËÍøÕ¾¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/popular-software-site-hacked-to-redirect-users-to-keylogger-infostealer-more/
¡¾¹¥»÷ÊÂÎñ¡¿ÃÀ¹ú¿¨Ë¹µØÇøµÄÒ½ÁÆÖÐÐÄÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷
ÃÀ¹úÃÜËÕÀïÖÝ¿¨Ë¹µØÇøµÄÒ½ÁÆÖÐÐÄ³ÆÆäÔ⵽δ֪ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬£¬£¬£¬£¬ÆäÄÚ²¿Í¨Ñ¶ÏµÍ³ºÍµç×Ó¿µ½¡µµ°¸ÏµÍ³£¨EHR£©ÊÜÓ°Ïì¡£¡£¡£¸ÃÒ½ÁÆÖÐÐijÆÃ»ÓÐÖ¤¾ÝÅú×¢»¼ÕßµÄÊý¾Ý±»»á¼û¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎúÆäÅÌËã»ú/ЧÀÍÆ÷ÔõÑù±»Ñ¬È¾£¬£¬£¬£¬£¬£¬µ«Ïà¹ØÖ´·¨²¿·ÖÒѾ½éÈë¾ÙÐÐÊӲ졣¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/cass-regional-medical-center-hit-with-unidentified-ransomware/
¡¾Îó²î²¹¶¡¡¿µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGOÐÞ¸´ÆäHMI²úÆ·ÖеĶà¸öÎó²î
µÂ¹ú¹¤Òµ×Ô¶¯»¯¹«Ë¾WAGOÐÞ¸´Æäe!DISPLAY 7300TÈË»ú½çÃæ£¨HMI£©²úÆ·ÖеĶà¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬°üÀ¨XSSÎó²î£¨CVE-2018-12981£©¡¢ÎļþÉÏ´«Îó²î£¨CVE-2018-12980£©ÒÔ¼°Ä¬ÈÏȨÏÞÉèÖò»×¼È·µÄÎó²î£¨CVE-2018-12979£©¡£¡£¡£Í¨¹ý×éºÏʹÓÃÕâЩÎó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÁýÕÖindex.html²¢ÒÔwwwÓû§µÄȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£ÊÜÓ°ÏìµÄÐͺŰüÀ¨762-3000~762-3003£¬£¬£¬£¬£¬£¬WAGOÒÑÔڹ̼þ°æ±¾02ÖÐÐÞ¸´ÁËÕâЩÎó²î¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/hackers-can-chain-multiple-flaws-attack-wago-hmi-devices


¾©¹«Íø°²±¸11010802024551ºÅ