¶ò¹Ï¶à¶ûÒÑÔâÁè¼Ý4000Íò´ÎºÚ¿Í¹¥»÷£»£»Ð¹¥»÷»î¶¯Scranos Operation£»£»ÀÕË÷Èí¼þBitPaymerбäÌå

Ðû²¼Ê±¼ä 2019-04-17
1¡¢OracleÐû²¼4ÔÂÖ÷Òª²¹¶¡¸üУ¬£¬ £¬£¬ÐÞ¸´297¸öÎó²î

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
4ÔÂ16ÈÕOracleÐû²¼Ö÷Òª²¹¶¡¸üУ¬£¬ £¬£¬¹²ÐÞ¸´297¸öÎó²î£¬£¬ £¬£¬ÆäÖаüÀ¨Database ServerÖеÄ6¸öÎó²î¡¢Communication ApplicationsÖеÄ26¸öÎó²î¡¢E-Business SuiteÖеÄ35¸öÎó²î¡¢Fusion MiddlewareÖеÄ53¸öÎó²î¡¢MySQLÖеÄ45¸öÎó²îºÍRetail ApplicationsÖеÄ24¸öÎó²î¡£¡£¡£ ¡£¡£ÏêϸÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£ ¡£¡£Æ¾Ö¤OracleµÄÖ÷Òª²¹¶¡Ðû²¼ÍýÏ룬£¬ £¬£¬ÏÂÒ»´ÎÖ÷Òª²¹¶¡¸üн«ÓÚ2019Äê7ÔÂ16ÈÕÐû²¼¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

2¡¢Gnosticplayers³öÊÛµÚÎåÅúÓû§Êý¾Ý£¬£¬ £¬£¬°üÀ¨6500¶àÍò¸öÕ˺Å

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
ºÚ¿ÍGnosticplayersÔÚ°µÍøÂÛ̳DreamMarketÉϳöÊÛµÚÎåÅú±»µÁµÄÓû§Êý¾Ý£¬£¬ £¬£¬ÕâÅúÊý¾Ý°üÀ¨Áè¼Ý6500Íò¸öÓû§ÕË»§£¬£¬ £¬£¬ÊÛ¼ÛΪ0.8463±ÈÌØ±Ò£¨4350ÃÀÔª£©¡£¡£¡£ ¡£¡£ÕâÅú±»µÁµÄÓû§¼Í¼ÊôÓÚÁù¼Òй«Ë¾£¬£¬ £¬£¬°üÀ¨ÓÎϷƽ̨Mindjolt£¨2800Íò£©¡¢ÔÚÏß¹ºÎïÉçÇøWanelo£¨2300Íò£©¡¢Æ»¹ûάÐÞÖÐÐÄiCracked£¨150Íò£©¡¢ÂÃÓι«Ë¾Yanolja£¨150Íò£©¡¢µç×ÓÔ¼ÇëЧÀÍEvite£¨1000Íò£©ºÍÅ®×ÓʱװµêModa Operandi£¨150Íò£©¡£¡£¡£ ¡£¡£ÏÖÔÚΪֹGnosticplayers³öÊ۵ı»µÁÓû§¼Í¼×ÜÊýÒÑ´ï9.32ÒÚÌõ¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/gnosticplayers-hacker-returns-with-fifth-dataset-containing-over-65-million-user-accounts-for-sale-95450e99

3¡¢·¸·¨ÍÅ»ïʹÓÃRATVERMINºóÃŹ¥»÷ÎÚ¿ËÀ¼¶à¸ö¾üʲ¿·Ö

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
FireEyeÑо¿ÍŶӷ¢Ã÷Ò»¸öÕë¶ÔÎÚ¿ËÀ¼¶à¸ö¾üʲ¿·ÖµÄÓã²æÊ½´¹ÂÚ¹¥»÷»î¶¯£¬£¬ £¬£¬¸Ã¹¥»÷»î¶¯ÊÇ2018ÄêÕë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹¥»÷»î¶¯µÄÑÓÐø£¬£¬ £¬£¬¹¥»÷ÕßÓëLPRÓйØ¡£¡£¡£ ¡£¡£Æ¾Ö¤¶Ô¶ñÒâÈí¼þ±àÒëʱ¼äµÄÆÊÎö£¬£¬ £¬£¬¸Ã¹¥»÷×éÖ¯ËÆºõÖÁÉÙÓÚ2014ÄêÒÔÀ´Ò»Ö±´¦ÓÚ»îԾ״̬£¬£¬ £¬£¬ÆäÄ¿µÄÖ÷ÒªÊÇÎÚ¿ËÀ¼¡£¡£¡£ ¡£¡£ÔÚ×î½üµÄ¹¥»÷»î¶¯ÖУ¬£¬ £¬£¬¸Ã×é֯ʹÓÃÁ˶ñÒâÈí¼þQUASARRATºÍRATVERMIN¡£¡£¡£ ¡£¡£RATVERMINÊÇÒ»¸ö.NETºóÃÅ£¬£¬ £¬£¬¿ÉÍøÂçÊܺ¦ÕßµÄÐÅÏ¢²¢ÔËÐÐÖÖÖÖÏÂÁî¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hacker-group-uses-ratvermin-backdoor-to-target-ukrainian-military/

4¡¢°¢É£Ææ±»²¶ºó£¬£¬ £¬£¬¶ò¹Ï¶à¶ûÒÑÔâÊÜÁè¼Ý4000Íò´ÎºÚ¿Í¹¥»÷

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
×Ôά»ù½âÃÜÊ×´´ÈËÖìÀû°²?°¢É£Ææ±»²¶ÒÔÀ´£¬£¬ £¬£¬¶ò¹Ï¶à¶û¹«¹²»ú¹¹µÄÍøÕ¾ÔâÊÜÁË4000Íò´ÎÍøÂç¹¥»÷¡£¡£¡£ ¡£¡£ÉÏÖܶò¹Ï¶à¶û³·»ØÁ˶԰¢É£ÆæµÄÕþÖκǻ¤£¬£¬ £¬£¬Õâµ¼ÖºóÕß±»²¶¡£¡£¡£ ¡£¡£¶ò¹Ï¶à¶ûÐÅÏ¢ºÍͨѶÊÖÒÕ²¿¸±²¿³¤Patricio Real͸¶³Æ£¬£¬ £¬£¬¹¥»÷Ö÷ÒªÀ´×ÔÓÚÃÀ¹ú¡¢°ÍÎ÷¡¢ºÉÀ¼¡¢µÂ¹ú¡¢ÂÞÂíÄáÑÇ¡¢·¨¹ú¡¢°ÂµØÀû¡¢Ó¢¹úºÍ¶ò¹Ï¶à¶û×ÔÉí¡£¡£¡£ ¡£¡£´ó²¿·Ö¹¥»÷¶¼Õë¶ÔÍâ½»²¿¡¢ÖÐÑëÒøÐС¢×Üͳ°ì¹«ÊÒ¡¢¹ú˰¾ÖµÈ²¿·ÖºÍ¼¸¸ö´óѧµÄÍøÕ¾¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83940/hacktivism/julian-assange-arrest-ddoss.html

5¡¢Ð¹¥»÷»î¶¯Scranos Operation£¬£¬ £¬£¬Ê¹ÓÃÓÐÓÃÊðÃûµÄRootkitÇÔÈ¡Óû§ÐÅÏ¢

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
Ò»¸ö¾ßÓÐÓÐÓÃÊðÃûµÄrootkit£¨±»³ÆÎªScranos£©ÕýÔÚ¶à¸ö¹ú¼ÒÈö²¥£¬£¬ £¬£¬Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡¢Ö§¸¶ÐÅÏ¢ºÍä¯ÀÀÆ÷ÀúÊ·¼Í¼£¬£¬ £¬£¬»¹¿ÉÓÃÓÚÔÚÉç½»ÍøÂçÉÏÈö²¥À¬»øÐÅÏ¢ºÍ¹ã¸æ¡£¡£¡£ ¡£¡£Scranosαװ³ÉÊÓÆµÇý¶¯³ÌÐò£¬£¬ £¬£¬ÆäʹÓõÄÖ¤ÊéÊÇDigiCertÏòÉϺ£Ò»¼Ò¿µ½¡ÖÎÀí×Éѯ¹«Ë¾½ÒÏþµÄÖ¤Ê飬£¬ £¬£¬ÏÖÔÚÖ¤ÊéÈÔÈ»ÓÐÓ㬣¬ £¬£¬¹¥»÷Õß¿ÉÄÜÊǵÁÓÃÁ˸ÃÖ¤Êé¡£¡£¡£ ¡£¡£Bitdefender³ÆScranos OperationÒ»Ö±Éú³¤£¬£¬ £¬£¬ÒѾ­Ñ¬È¾ÁËÓ¡¶È¡¢ÂÞÂíÄáÑÇ¡¢°ÍÎ÷¡¢·¨¹ú¡¢Òâ´óÀûºÍÓ¡ÄáµÈ¹ú¼ÒµÄÓû§¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/scranos-operation-uses-signed-rootkit-to-steal-login-and-payment-info/

6¡¢ÀÕË÷Èí¼þBitPaymerбäÌ壬£¬ £¬£¬Ê¹ÓÃPsExecѬȾÃÀ¹úÖÆÔ칫˾

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷ÃÀ¹úÒ»¼ÒÖÆÔ칫˾Ôâµ½ÀÕË÷Èí¼þBitPaymerбäÌåµÄ¹¥»÷¡£¡£¡£ ¡£¡£¸Ã±äÌ壨Ransom.Win32.BITPAYMER.TGACAJ£©Ê¹ÓÃPsExec¾ÙÐзַ¢£¬£¬ £¬£¬²¢ÔÚÊê½ðƱ¾ÝºÍ¼ÓÃÜÎļþµÄÀ©Õ¹ÃûÖÐʹÓÃÁËÊܺ¦¹«Ë¾µÄÃû³Æ¡£¡£¡£ ¡£¡£¹¥»÷ÊÂÎñ±¬·¢ÔÚ2ÔÂ18ÈÕÍíÉÏ9µã40·ÖÖÁÍíÉÏ11:03Ö®¼ä£¬£¬ £¬£¬ÓÉÓÚ¹¥»÷ÕßÖÁÉÙÐèÒªÒ»¸ö¾ßÓÐÖÎÀíԱȨÏÞµÄÕÊ»§²Å»ªÍ¨¹ýPsExecÔËÐÐÏÂÁ£¬ £¬£¬ÕâÒâζ×ÅÔÚÀÕË÷Èí¼þ×°ÖÃ֮ǰ¹¥»÷ÕßÒѾ­Í¨¹ýijÖÖÊֶλñµÃÁËÖÎÀíԱȨÏÞ¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/new-bitpaymer-ransomware-variant-infected-us-manufacturing-company-via-psexec-3450ef8c