Õë¶Ô»ªË¶Live Update¹©¸øÁ´¹¥»÷£º2019ÄêµçÐÅ·¸×ï»ã±¨£»ºÚ¿ÍÈëÇÖÐÂÏçÁú¾í·ç¾¯±¨Ïµ

°ä²¼¹¦·ò 2019-03-26
1¡¢Õë¶Ô»ªË¶Live UpdateµÄ¹©¸øÁ´¹¥»÷ £¬»òÓ°Ï쳬¹ý100ÍòÓû§


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


2019Äê1Ô¿¨°Í˹»ù³¢ÊÔÊÒ·¢ÏÖÒ»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄ¸´ÔÓ¹©¸øÁ´¹¥»÷ £¬Õâ´Î¹¥»÷²úÉúÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä £¬¿ÉÄÜÓ°ÏìÁËÈ«Çò³¬¹ý100ÍòÓû§ ¡£»ªË¶Live UpdateÊÇԤװÔÚ´óÎÞÊý»ªË¶µçÄÔÉϵÄʵÓ÷¨Ê½ £¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯·¨Ê½µÈ×é¼þ ¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÖ¸±êMACµØÖ·µÄÁÐ±í£¨ÊýÁ¿Îª600¸öÒÔÉÏ£© £¬µ«Ö¸±êȺÌåµÄÉí·ÝÉв»Ã÷È· ¡£ÓÉÓÚÑù±¾ÊÇÓúϷ¨Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£© £¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üзþÎñÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ £¬µ¼Ö¸ù¥»÷³Ö¾Ãδ±»·¢ÏÖ ¡£Ä¿Ç°µÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйØ ¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/operation-shadowhammer/89992/

2¡¢×êÑÐÍŶӰ䲼ÀÕË÷Èí¼þHackedµÄ½âÃÜÆ÷


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Emsisoft°ä²¼ÀÕË÷Èí¼þHackedµÄÃâ·Ñ½âÃÜÆ÷ ¡£¸ÃÀÕË÷Èí¼þÓÚ2017ÄêÆðÍ·ÔË×÷ £¬ÖØÒªÕë¶ÔÓ¢Óï¡¢ÍÁ¶úÆäÓï¡¢Î÷°àÑÀÓïºÍÒâ´óÀûÓïÓû§ ¡£ÔÚϰȾϵͳºó £¬Hacked»áÏÔʾһ¸öÐéαµÄWindows¸üÐÂÆÁÄ» £¬²¢ÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.hackedÀ©´óÃû ¡£Êܵ½Ï°È¾µÄÓû§Äܹ»´ÓÒÔÏÂÁ´½ÓÖÐÏÂÔØ¸Ã¹¤¾ß²¢ÒÔÖÎÀíԱȨÏÞÔËÐÐ £¬¸Ã¹¤¾ß½«×Ô¶¯½âÃÜËùÓÐ.hackedÀ©´óÃûµÄ¼ÓÃÜÎļþ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/ransomware/decryptor/emsisoft-has-released-a-decryptor-for-the-hacked-ransomware/

3¡¢Å·ÖÞÐ̾¯×éÖ¯¼°Ç÷Ïò¿Æ¼¼½áºÏ°ä²¼2019ÄêÍøÂçµçÐÅ·¸×ï»ã±¨

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

ƾ¾ÝÅ·ÖÞÐ̾¯×éÖ¯ºÍÇ÷Ïò¿Æ¼¼½áºÏ°ä²¼µÄ2019ÄêÍøÂçµçÐÅ·¸×ï»ã±¨ £¬Ã¿ÄêµçÐÅڲƭµÄ³É±¾¹À¼ÆÎª290ÒÚÅ·Ôª£¨ºÏ330ÒÚÃÀÔª£© ¡£¸Ã»ã±¨Ç¿µ÷ £¬µçÐÅڲƭÔÚ³ÉΪ´«Í³½ðÈÚ·¸×ïµÄµÍ·çÏÕ´úÌæ¹æ»® £¬³É±¾ÉϵĽµµÍºÍÈëÇÖÉ豸¿ÉÓÃÐÔµÄÔö³¤Ê¹µÃÕâÖÔìÛÕ©ÐÐΪ²»ÐÝÔö³¤ ¡£·¸×ï·Ö×ÓµÄÖØÒªÖ¸±êÊÇÓû§»òÔËÓªÉ̵ÄÕË»§ £¬²¢´ÓÖз¸·¨»ñµÃ½ðÇ® ¡£


Ô­ÎÄÁ´½Ó£º

https://www.europol.europa.eu/newsroom/news/hold-phone-threats-lurking-behind-missed-call-and-other-forms-of-telecom-fraud

4¡¢Á÷ýÌåÍøÕ¾Kanopyй¶½Ó¼ûÈÕÖ¾ £¬¿ÉÓÃÓÚ¸ú×ÙÓû§Éí·Ý


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


°²È«×êÑÐÔ±Justin Paine·¢ÏÖÊÓÆµÁ÷ýÌåÍøÕ¾KanopyµÄElasticsearchÊý¾Ý¿âδ½øÐÐÉí·ÝÑéÖ¤ £¬Ê¹µÃAPIÈÕÖ¾¼°ÍøÕ¾½Ó¼û¼Í¼¶³öÔÚÍøÉÏ ¡£ÕâЩÐÅÏ¢¿ÉÓÃÓÚ¸ú×ÙÓû§µÄÅÔ¹Ûϰ¹ß¼°²éÕÒÓû§µÄÉí·Ý £¬ÀýÈç»ùÓÚ¿Í»§¶ËIP¡¢ËÑË÷/ÅÔ¹ÛµÄÊÓÆµÐÅÏ¢¡¢µØÀíÐÅÏ¢¡¢¹¦·ò´ÁºÍÉ豸ÀàÐÍ £¬ÓпÉÄܼø±ð³öÓû§µÄÉí·Ý ¡£¸ÃÊý¾Ý¿âÖÁÉÙÓÚ3ÔÂ7ÈÕÆð¶³öÔÚÍøÉÏ £¬²¢ÓÚ3ÔÂ18Èյõ½±£»¤ ¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/video-streaming-site-kanopy-leaks-api-and-website-access-logs-77645814

5¡¢ºÚ¿ÍÈëÇÖÐÂÏçÁú¾í·ç¾¯±¨ÏµÍ³ £¬°ä²¼30¶à¸öÐéα¾¯±¨


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


3ÔÂ12ÈÕÁ賿2:30×óÓÒ £¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈøË¹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³ £¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©°ä²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨ £¬ÒýÆðÁ˱¾µØ¾ÓÃñµÄ·¢¼± ¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancaster°ä²¼µÄ £¬ÆäÓàµÄÔòÊÇÔÚDeSoto ¡£Ö®ºóÕâЩϵͳһÏò´¦ÓÚÍÑ»ú״̬ £¬Ö±ÖÁ3ÔÂ17ÈղŸ´Ô­Õý³£·þÎñ ¡£¾¯·½ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ½øÐе÷²é ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html

6¡¢Î¢ÈíЭÖúNorsk Hydro¸´Ô­ITϵͳ £¬ÎÞÐèÖ§¸¶Êê½ð


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Norsk HydroÊ×ϯ²ÆÕþ¹ÙEivind Kallevik°µÊ¾ £¬¸Ã¹«Ë¾ÒѾ­ÆðÍ·ÀûÓñ¸·Ý¸´Ô­ÆäITϵͳ £¬²¢ÇÒ²»³ïËãÏò¹¥»÷ÕßÖ§¸¶Êê½ð ¡£À´×Ô΢ÈíºÍÆäËü°²È«ºÏ×÷ͬ°éµÄר¼ÒÔÚÔ®ÊÖNorsk Hydro½«Æä¹Ø¼üITϵͳ¸´Ô­Õý³£ÔËÓª ¡£ÉÏÖÜNorsk HydroÔâµ½ÍøÂç¹¥»÷ £¬¸Ã¹«Ë¾È«Çò´ó²¿ÃÅÒµÎñÁìÓòµÄITϵͳ¼°ÔËÓª¶¼Êܵ½Ó°Ïì ¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/microsoft-helping-norsk-hydro-restore-its-it-systems-without-paying-the-ransom-86a32a3c

ÉêÃ÷£º±¾×ÊѶÓɱ¦ÔËÀ³¹Ù·½ÍøÕ¾Î¬ËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù