¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180801

°ä²¼¹¦·ò 2018-08-01

¡¾·ÖÎö»ã±¨¡¿ICS-CERT°ä²¼ÁªÍøÊÓÆµ¼à¿ØÏµÍ³ÍøÂç°²È«Ì¬ÊÆ»ã±¨


¹ú¶È¹¤Òµ»¥ÁªÍø°²È«Ó¦¼±ÏìÓ¦ÖÐÐÄ£¨ICS-CERT£©°ä²¼ÁªÍøÊÓÆµ¼à¿ØÏµÍ³ÍøÂç°²È«Ì¬ÊÆ»ã±¨ £¬»ã±¨´ÓµØÓòÉ¢²¼¡¢Æ·ÅÆÉ¢²¼¡¢Íþвɢ²¼µÈ¶à¸ö½Ç¶ÈÂÛÊö¹úÄÚÍøÂçÊÓÆµ¼à¿ØÏµÍ³µÄ°²È«Ì¬ÊÆÇé¿ö £¬²¢Õë¶Ô½üÄêÀ´²úÉúµÄÍøÂçÊÓÆµ¼à¿ØÏµÍ³°²È«ÊÂÎñÆðÒòÌá³öÁËÏàÓ¦µÄ·çÏÕ·À±¸ºÍ°²È«Ó¦¶Ô¹æ»® £¬¸øÓйص±²¿ÃÅÃÅ¡¢×éÖ¯ºÍ×êÑлú¹¹Ìṩ²Î¿¼ºÍ½è¼ø¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.ics-cert.org.cn/portal/page/121/be9def54499644afb6ce4b119e5e7d42.html


¡¾·ÖÎö»ã±¨¡¿°Ä´óÀûÑÇOAIC°ä²¼2018ÄêQ2Êý¾Ýй©ÊÂÎñµÄͳ¼Æ»ã±¨


°Ä´óÀûÑÇÐÅϢרԱ°ì¹«ÊÒ£¨OAIC£©°ä²¼2018ÄêµÚ¶þ¼¾¶ÈµÄÊý¾Ýй¶ÊÂÎñͳ¼Æ»ã±¨ £¬»ã±¨º­¸ÇÁË2018Äê4ÔÂ1ÈÕÖÁ6ÔÂ30ÈÕÆÚ¼äµÄ242ÆðÊý¾Ýй¶ÊÂÎñ¡£·ÖÎöÅú×¢59£¥µÄÊý¾Ýй¶ÊÇ·¸×ï·Ö×ÓÔì³ÉµÄ £¬36£¥ÊDZ¨´ðÃýÎóµ¼Ö嵀 £¬»¹ÓÐ5£¥ÊÇϵͳ¹ÊÕÏÔì³ÉµÄ¡£´óÎÞÊýÊý¾ÝÐ¹Â¶Éæ¼°ÁªÏµ·½Ê½µÄй¶ £¬ÈçÓ×ÎÒ¼ÒÍ¥µØÖ·¡¢µç»°ºÅÂë»òµç×ÓÓʼþµØÖ·¡£42%µÄÊý¾ÝÐ¹Â¶Éæ¼°²ÆÕþÊý¾ÝµÄй¶ £¬ÈçÒøÐÐÕË»§»òÐÅÓþ¿¨ºÅÂë¡£Ò½ÁÆ·þÎñÊDzúÉúй¶ÊÂÎñ×î¶à£¨49´Î£©µÄÐÐÒµ £¬Æä´ÎÊǽðÈÚÐÐÒµ£¨36´Î£©¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.oaic.gov.au/privacy-law/privacy-act/notifiable-data-breaches-scheme/quarterly-statistics-reports/notifiable-data-breaches-quarterly-statistics-report-1-april-30-june-2018#executive-summary


¡¾Íþвµý±¨¡¿Æ¾¾Ý×îеĻ㱨ÀÕË÷Èí¼þSamSam¹²»ñµÃ³¬¹ý590ÍòÃÀÔªµÄÊê½ð


ƾ¾ÝÓ¢¹úÍøÂ簲ȫ¹«Ë¾Sophos±àдµÄ¹ØÓÚÀÕË÷Èí¼þSamSamµÄ×îл㱨 £¬×Ô2015Äêµ×ÒÔÀ´SamSamÒѾ­ÎªÆä×÷Õß´øÀ´Á˳¬¹ý590ÍòÃÀÔªµÄÊê½ðÊÕÒæ¡£×êÑÐÈËÔ±×·×ÙÁËÊÕµ½Êê½ðµÄ157¸ö±ÈÌØ±ÒµØÖ·ÒÔ¼°Î´ÊÕµ½Êê½ðµÄ88¸ö±ÈÌØ±ÒµØÖ· £¬·¢ÏÔìä×ʽðÁ¿ÎªÔ¼590ÍòÃÀÔª £¬Õâ±È֮ǰ¹À¼ÆµÄ85ÍòÃÀÔªÒª¸ß¡£×êÑÐÈËÔ±ÒÔΪSamSamËÆºõÊǵ¥¸ö¹¥»÷ÕߵŤ×÷ £¬¶ø²»ÊÇÒ»¸ö·¸×ïÍŻ

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/samsam-ransomware-crew-made-nearly-6-million-from-ransom-payments/


¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖеĴó¹æÄ£¶ñÒâ¸æ°×»î¶¯Master134


Check Point×êÑÐÍŶӷ¢ÏÖÒ»¸öеĴó¹æÄ£¶ñÒâ¸æ°×»î¶¯Master134¡£¹¥»÷ÕßÀûÓÃWordPress°æ±¾4.7.1ÖеÄÒÑÖªRCE·ì϶ £¬ÉøÈëÁ˳¬¹ý1Íò¸öWordPressÍøÕ¾¡£¹¥»÷ÕßÔÚÕâÐ©ÍøÕ¾ÉÏ×¢Èë¸æ°× £¬ÓÃÓÚ½Ù³ÔìäÓû§²¢½«Óû§³Á¶¨Ïòµ½Master134µÄÖØÒª·þÎñ¡£¶øºóMaster134½«ÕâЩ½Ù³ÖµÄÁ÷Á¿ÏúÊÛ¸øÖØÒªµÄ·¸×OÍÅ £¬ÈçRIG¡¢Magnitude¡¢FobosºÍHookAdsµÈ¡£Check Point°µÊ¾¸Ã¶ñÒâ¸æ°×»î¶¯Ä¿Ç°ÈÔÔÚ³ÖÐø¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://research.checkpoint.com/malvertising-campaign-based-secrets-lies/


¡¾Êý¾Ýй¶¡¿Dixons CarphoneÈ·ÈÏ2017ÄêµÄÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔ¼1000ÍòÓû§


±¾ÖÜһŷÖÞµç×ÓÁãÊÛÉÌDixons Carphone°ä²¼²¼¸æ³Æ2017Äê²úÉúµÄÊý¾Ýй¶ÊÂÎñ±È×î³õµÄÔ¤¼Æ¸üΪÔã¸â £¬¸Ã¹«Ë¾È·ÈϸÃÊÂÎñÓ°ÏìÁËÔ¼1000ÍòÓû§ £¬¸ßÓÚÆäÔÚ6Ô·Ý×î³õ¹À¼ÆµÄ120Íò¡£¹¥»÷ÕßÔøÓÚÈ¥Äê½Ó¼ûÁËÕâЩÓû§µÄÓ×ÎÒÐÅÏ¢ £¬Ô̺¬ÐÕÃû¡¢µØÖ·ºÍµç×ÓÓʼþµØÖ·¡£Dixons CarphoneÏòÓû§±£ÕÏ³Æ £¬Ã»ÓÐÈκÎÒøÐп¨ÐÅϢй¶ £¬ÈçPINÂë¡¢CVVÂëºÍÑéÖ¤ÂëµÈÊý¾Ý £¬²¢ÇÒûÓÐÖ¤¾ÝÅú×¢¸ÃÊý¾Ýй¶ÊÂÎñµ¼ÖÂÁËÈκÎڲƭÊÂÎñµÄ²úÉú¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/07/dixons-carphone-data-breach.html


¡¾¶ñÒâÈí¼þ¡¿×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶Ô¶íÂÞ˹ºÍº«¹úµÄ¶ñÒâÈí¼þBisonal


5Ô³õPalo Alto NetworksµÄUnit 42×êÑÐÍŶӷ¢ÏÖÕë¶Ô¶íÂÞ˹һ¼Ò¹ú·À¹«Ë¾ºÍº«¹úÒ»¼Ò²»Ã÷¹«Ë¾µÄ¹¥»÷»î¶¯ £¬¸Ã¹¥»÷»î¶¯ÀûÓÃÁ˶ñÒâÈí¼þBisonalµÄбäÌå¡£¸Ã±äÌåÓë¾É°æBisonalµÄÇø±ðÖØÒªÓÐÈý¸ö £¬Ô̺¬¼ÓÃÜÆ÷µÄ·ÖÆç¡¢C2ͨѶ¼ÓÃܲ½ÖèµÄ·ÖÆçÒÔ¼°¶ÔÍøÂçͨѶºÍÓÆ¾ÃÐÔ´úÂëµÄ´óÁ¿³Áд¡£¹¥»÷Õß½«¸Ã¶ñÒâÈí¼þ¼Ù×°³ÉPDFÎļþ£¨Ê¹ÓüٵÄPDFͼ±ê£© £¬²¢Í¨¹ýÍøÂç´¹µöÓʼþ·¢Ë͸øÖ¸±ê¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/07/unit42-bisonal-malware-used-attacks-russia-south-korea/