¹þÈø¿Ë˹̹µ±¾ÖÀ¹½Ø¾³ÄÚËùÓеÄHTTPSÁ÷Á¿£»³¬¹ý80.5Íò¸öϵͳÒÀÈ»Ò×ÊÜBlueKeep·ì϶¹¥»÷

°ä²¼¹¦·ò 2019-07-19
1¡¢ÃÀ¹úµ±¾ÖÕë¶ÔgovÓòÃûÍÆ³öеÄDNS°²È«´ëÊ©


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


´Ó7ÔÂ17ÈÕÆðÍ·£¬ÎªÁËÏ÷¼õDNS½Ù³Ö·çÏÕ£¬ÃÀ¹úµ±¾Ö½«ÎªËùÓеÄ.govÓòÃûÖ´ÐÐеÄDNS°²È«´ëÊ©¡£Æ¾¾ÝÃÀ¹ú×ÜÎñÖÎÀí¾Ö£¨GSA£©µÄ±íÊö£¬¸ÃDotGov´òËãÕÆ¹ÜÔËÓª¶¥¼¶ÓòÃû.gov£¬²¢½«ÆäÌṩ¸øÃÀ¹úµ±¾Ö×éÖ¯¡£ÎªÁËÏìÓ¦½üÆÚµÄDNS½Ù³ÖÊÂÎñ£¬µ±ÔÚDotGovÉϸü¸Ä.govÓòÃûµÄDNS¼Í¼ʱ£¬ÓòÃûÁªÏµÈ˽«»áÊÕµ½ÏµÍ³×Ô¶¯·¢Ë͵ÄÓʼþÖҸ棬ÓʼþÖл¹Ô̺¬¿ÉÓõĻº½â´ëÊ©¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/us-govt-rolls-out-new-dns-security-measures-for-gov-domains/


2¡¢¹þÈø¿Ë˹̹µ±¾ÖÀ¹½Ø¾³ÄÚËùÓеÄHTTPSÁ÷Á¿


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


¹þÈø¿Ë˹̹µ±¾ÖÒÑ´Ó7ÔÂ17ÈÕÆðÍ·À¹½ØÆä¾³ÄÚµÄËùÓÐHTTPSÁ÷Á¿¡£ÔÚ±¾µØµ±¾ÖµÄÅúʾÏ£¬±¾µØISPÇ¿ÔìÓû§ÔÚÿ¸öÉ豸ºÍä¯ÀÀÆ÷ÖÐ×°Öõ±¾ÖÐû¸æµÄÖ¤Êé¡£¸ÃÖ¤Ê齫ÔÊÐíµ±¾Ö»ú¹¹½âÃÜÓû§µÄHTTPSÁ÷Á¿²¢²é¿´ÆäÄÚÈÝ¡£ÔÚÓû§×°ÖøÃÖ¤Êé֮ǰ£¬ËûÃǽ«ÎÞ·¨½Ó¼û»¥ÁªÍø¡£µ±¾Ö¹ÙÔ±°µÊ¾´Ë¾ÙÖ¼ÔÚ¼ÓÇ¿¶Ô¹«Ãñ¡¢µ±¾Ö»ú¹¹ºÍ˽ӪÆóÒµµÄ±£»¤£¬Ê¹ÆäÃâÔâºÚ¿Í¹¥»÷¡¢»¥ÁªÍøÚ²Æ­µÈÍøÂçÍþв¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/kazakhstan-government-is-now-intercepting-all-https-traffic/


3¡¢Google PlayÉ̵êϼÜ7¸ö¶ñÒâAPP£¬×ÜÏÂÔØÁ¿³¬13Íò´Î


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Avast×êÑÐÈËÔ±ÔÚGoogle PlayÉ̵êÖз¢ÏÖ7¸ö¸ú×ÙÀà¶ñÒâÈí¼þ£¬ÕâÀà¶ñÒâÈí¼þ±»³ÆÎªstalkerware£¬ÔÊÐíÈËÃǸú×ÙÔ±¹¤¡¢ºÏ×÷ͬ°é»ò¶ùͯ¡£ÕâЩAPPºÜ¿ÉÄÜÊÇÓɶíÂÞ˹¿ª·¢ÈËÔ±¿ª·¢µÄ£¬×ÜÏÂÔØÁ¿³¬¹ý13Íò´Î¡£ÕâЩstalkerwareÄܹ»¼à¶½Ö¸±êµÄµØÎ»¡¢¶ÌÐÅ¡¢Í¨»°¼Í¼ÒÔ¼°ÍøÂçÁªÏµÈËÐÅÏ¢£¬»¹Äܹ»°µ²Ø×Ô¼º¡£Ä¿Ç°ËùÓÐ7¸öAPP¶¼Òѱ»Google PlayÉ̵êɾ³ý¡£


Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/google-removes-seven-stalkerware-apps-from-play-store-79f33359


4¡¢ÐÂEvilGnomeºóÃÅ£¬¼Ù×°³ÉGnome shellÀ©´óÇÔÈ¡Óû§ÐÅÏ¢


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


7Ô³õIntezer Labs×êÑÐÈËÔ±·¢ÏÖжñÒâÈí¼þEvilGnome£¬¸Ã¶ñÒâÈí¼þ¼Ù×°³ÉGnome shellÀ©´ó£¬Ö¼ÔÚÇÔÈ¡LinuxÓû§µÄÐÅÏ¢¡£EvilGnomeºóÃÅ´øÓÐ5¸öÄ£¿é£¬Ô̺¬ÒôƵ²¶»ñÄ£¿éShooterAudio¡¢ÆÁÄ»½ØÍ¼Ä£¿éShooterImage¡¢ÎļþɨÃèÄ£¿éShooterFile¡¢C2ͨѶÄ£¿éShooterPingÒÔ¼°ÉÐδʵÏֵļüÅ̼ͼÄ£¿éShooterKey¡£Æ¾¾ÝPalo Alto Networks Unit 42µÄ˵·¨£¬EvilGnomeËÆºõÓë¶íÂÞ˹·¸×ïÍÅ»ïGamaredon Group´æÔÚ¹ØÁª¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-evilgnome-backdoor-spies-on-linux-users-steals-their-files/


5¡¢³¬¹ý80.5Íò¸öϵͳÒÀÈ»Ò×ÊÜBlueKeep·ì϶¹¥»÷


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ƾ¾ÝBitSightµÄÒ»·Ýл㱨£¬½ØÖÁ2019Äê7ÔÂ2ÈÕÈÔÓÐÔ¼80.5Íò¸ö¶³öÔÚ¹«ÍøÉϵÄϵͳÒ×ÊÜBlueKeep·ì϶µÄ¹¥»÷£¬Óë5ÔÂ31ÈÕÏà±ÈÕâÒ»Êý×ÖÏ÷¼õÁË17.18£¥£¨¼´16.7Íò¸öϵͳ£¬ÆäÖÐ9.2Íò¸öϵͳÈÔÔÚ¹«ÍøÉ϶³ö£¬µ«ÒÑ×°Öý¨¸´²¹¶¡£©¡£BitSight»¹¶ÔÕâЩϵͳ½øÐÐÁË·ÖÎö£¬Êý¾ÝÏÔʾÖйúºÍÃÀ¹úµÄ¶³öϵͳÊýÁ¿×î¶à£¬¶øË¾·¨¡¢·ÇͶ»ú/·Çµ±¾Ö×éÖ¯ÒÔ¼°º½Ìì/¹ú·ÀÊÇ×°Öø÷ì϶µÄ½¨¸´²¹¶¡½ø¶È×î¿ìµÄÐÐÒµ¡£


Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/more-than-805000-systems-are-still-vulnerable-to-bluekeep-vulnerability-e0977139


6¡¢Ke3chang APTй¥»÷»î¶¯£¬ÖØÒª¶Ô׼ŷÖÞ±í½»¹Ù


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ESET×êÑÐÈËÔ±°ä²¼¹ØÓÚKe3chang APTµÄ·ÖÎö»ã±¨£¬¸Ã»ã±¨¼Í¼ÁË·¸×ïÍÅ»ïÔÚ2015ÄêÖÁ2019ÄêÆÚ¼äµÄ¹¥»÷»î¶¯¼°¶ñÒ⹤¾ß¡£¸ÃÍÅ»ï×Ô2010ÄêÆðÍ·»îÔ¾£¬ÖØÒªÕë¶ÔÅ·ÖÞµÄʯÓÍ¡¢¾üÊ¡¢µ±¾Ö³Ð°üÉÌÒÔ¼°±í½»¹Ù¡£OkrumºóÃÅÓÚ2016Äê12Ô³õ´Î³öÏÖ£¬ESETµÄÒ£²âÊý¾Ý½øÒ»²½¼Í¼Á˸úóÃű»ÓÃÓÚ2017ÄêÕë¶Ô˹Âå·¥¿Ë¡¢±ÈÀûʱ¡¢ÖÇÀû¡¢Î£µØÂíÀ­ºÍ°ÍÎ÷±í½»²¿ÃŵĹ¥»÷»î¶¯ÖС£OkrumºóÃÅÔ̺¬ÎļþÏÂÔØºÍÉÏ´«¡¢Ö´Ðжþ½øÔìÎļþÒÔ¼°ÔËÐÐshellºÅÁîµÈÖ°ÄÜ¡£¸Ã·¸×ïÍÅ»ïÔÚ2019Äê3Ô·ÝÒÀÈ»»îÔ¾£¬×êÑÐÈËÔ±ÌṩÁËÆä¹¥»÷»î¶¯µÄIOC¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-okrum-malware-used-by-ke3chang-group-to-target-diplomats/