΢Èí½«ÓëÃÀ¹úNISTÁªºÏ½¨ÉèÆóÒµ²¹¶¡ÐÞ¸´Ö¸ÄÏ£» £»£» £»¼ÓÄôóLeaflyÒâÍâй¶Óû§ÐÅÏ¢£¬£¬£¬£¬µ«²»°üÀ¨ÐÅÓÿ¨Êý¾Ý

Ðû²¼Ê±¼ä 2019-10-14

1¡¢Proofpoint³Æ2019ÄêÕë¶ÔÒ½ÁÆÐÐÒµµÄÓʼþÕ©Æ­¹¥»÷¼¤Ôö


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ProofpointÔÚÆä×îеġ¶Ò½ÁƱ£½¡ÐÐÒµÍþв±¨¸æ¡·ÖÐÌåÏÖ£¬£¬£¬£¬Õë¶ÔÒ½ÁƱ£½¡ÐÐÒµµÄµç×ÓÓʼþÕ©Æ­¹¥»÷ÔÚ2019Ä꼤Ôö£¬£¬£¬£¬ÓëÈ¥ÄêͬÆÚÏà±ÈÔöÌíÁË300%¡£¡£¡£ÔÚÊܹ¥»÷µÄÒ½ÁÆÆóÒµÖУ¬£¬£¬£¬ÏÕЩËùÓУ¨95%£©µÄ¹«Ë¾¶¼ÌåÏÖ¿´µ½ÁËαװ³É×Ô¼ºµÄ¿ÉÐÅÓòÃûµÄµç×ÓÓʼþ£¬£¬£¬£¬ÕâЩÓʼþͬʱÕë¶Ô»¼ÕßºÍÆóÒµµÄÏàÖúͬ°é¡£¡£¡£´ó´ó¶¼Óʼþ¹¥»÷µÄÖ÷ÌâÖж¼°üÀ¨¡°½ôÆÈ¡±»ò¡°ÇëÇ󡱵ȴÊÓ£¬£¬£¬ÒÔÔöÌíÊܺ¦ÕߵĿֻÅÇéÐ÷¡£¡£¡£Æ½¾ù¶øÑÔ£¬£¬£¬£¬´ËÀàµç×ÓÓʼþÓÕÆ­ÁËÒ½ÁƱ£½¡ÐÐÒµÖжà´ï15ÃûÔ±¹¤¡£¡£¡£¹¥»÷Õß»á½ÓÄɶàÖÖÉí·ÝÀ´ÔöÌíÀֳɵÄʱ»ú¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.itproportal.com/news/email-scam-attacks-against-healthcare-targets-see-huge-rise/


2¡¢¹¥»÷ÕßʹÓÃÐéα¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨JMT Trader·Ö·¢ºóÃÅ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿ÍŶÓMalwareHunterTeam·¢Ã÷Ò»¸öеÄÕ©Æ­¹¥»÷£¬£¬£¬£¬¹¥»÷Õß½¨ÉèÁËÒ»¸öÐéα¹«Ë¾£¬£¬£¬£¬Í¨Ì«¹ý·¢¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨JMT TraderÀ´ÏòMac»òWindowsÓû§×°ÖúóÃÅ¡£¡£¡£ÎªÁËÍÆ¹ã¸ÃÓ¦Ó㬣¬£¬£¬¹¥»÷Õß»¹½¨ÉèÁËÏìÓ¦µÄTwitterÕÊ»§¡£¡£¡£¸ÃJMT TradeÏÖʵÉÏÊÇÕýµ±QT Bitcoin Trader³ÌÐòµÄ¿Ë¡°æ±¾£¬£¬£¬£¬µ«Æ¾Ö¤ÄæÏò¹¤³ÌʦVitali KremezµÄ˵·¨£¬£¬£¬£¬µ±×°ÖÃJMT TraderʱװÖóÌÐò»¹½«Ìáȡһ¸öÃûΪCrashReporter.exeµÄ¸¨Öú³ÌÐò£¬£¬£¬£¬¸Ã³ÌÐòÊǺóÃųÌÐò£¬£¬£¬£¬Ëü½«ÅþÁ¬µ½C&CÓòbeastgoc[.]com²¢ÎüÊÕÏÂÁî¡£¡£¡£ÏÖÔÚÉв»ÖªµÀ¸Ã¶ñÒâÈí¼þÊÇ·ñÑïÆúÁËÆäËûpayload£¬£¬£¬£¬»òÖ»ÊÇÓÃ×÷ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°üµÄºóÃÅ¡£¡£¡£¸Ã¶ñÒâÈí¼þÔÚVirusTotalµÄ¼ì³öÂʽöΪ5/69¡£¡£¡£¿ £¿¨°Í˹»ùÇå¾²Ñо¿Ô±Seongsu ParkÒÔΪJMT TraderÓ볯ÏÊLazarus APTºÜ¿ÉÄܱ£´æ¹ØÁª¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/attackers-create-elaborate-crypto-trading-scheme-to-install-malware/


3¡¢ÐÂÓʼþÕ©Æ­»î¶¯Ö÷ÒªÕë¶Ô°Ä´óÀûÑÇÓ¢Áª°îÒøÐÐ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


MailGuardÖÒÑÔÒ»¸öÕë¶Ô°Ä´óÀûÑÇÓ¢Áª°îÒøÐÐÓû§µÄд¹ÂÚÓʼþÕ©Æ­¹¥»÷¡£¡£¡£¸ÃÓʼþÉù³ÆÓû§µÄÕË»§Öмì²âµ½²»Õý³£» £»£» £»î¶¯£¬£¬£¬£¬ÆäÕË»§Òѱ»ÏÞÖÆ»á¼û£¬£¬£¬£¬ÒªÇóÓû§µã»÷ÓʼþÖеġ°»Ö¸´»á¼ûȨÏÞ¡±Á´½Ó¡£¡£¡£µ«¸ÃÁ´½ÓÖÒÑÔ³ÆÎÞ·¨»Ö¸´ÕË»§»á¼û£¬£¬£¬£¬´Ó¶ø½«Óû§Ö¸µ¼ÖÁÁíÒ»¸öÁª°îÒøÐÐÆ·ÅƵÄÒ³Ãæ£¬£¬£¬£¬ÒªÇóÓû§ÌîÈëÆ¾Ö¤¡¢¿¨ºÅ¡¢ÓÐÓÃÈÕÆÚ¼°Çå¾²ÂëµÈÑéÖ¤ÆäÉí·Ý¡£¡£¡£Ó¢Áª°îÒøÐÐÓµÓÐ1590Íò¿Í»§£¬£¬£¬£¬½¨ÒéÓû§ÉóÉ÷¿´´ýÀ´×Ô¸ÃÒøÐеÄÈκεç×ÓÓʼþ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://au.finance.yahoo.com/news/159-million-aussies-told-to-beware-of-commonwealth-bank-scam-222719508.html


4¡¢Î¢Èí½«ÓëÃÀ¹úNISTÁªºÏ½¨ÉèÆóÒµ²¹¶¡ÐÞ¸´Ö¸ÄÏ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


΢Èí½«ÓëÃÀ¹ú¹ú¼Ò±ê×¼ÊÖÒÕÑо¿Ôº£¨NIST£©ÏàÖú½¨ÉèÆóÒµ²¹¶¡ÐÞ¸´Ö¸ÄÏ£¬£¬£¬£¬ÕâÏîÊÂÇéµÄЧ¹û½«ÊÇÒ»·ÝNISTÌØÊâ³öÊéÎï1800ʵ¼ùÖ¸ÄÏ£¬£¬£¬£¬ÓÃÓÚÖ¸µ¼ÏµÍ³ÖÎÀíÔ±ÖÎÀí»òÓÅ»¯¹«Ë¾µÄÄÚ²¿²¹¶¡ÐÞ¸´³ÌÐò¡£¡£¡£ÔÚ¸ÃÏîÄ¿ÖУ¬£¬£¬£¬Î¢ÈíºÍNISTÌåÏÖËûÃÇÍýÏëÑо¿¡°ÔõÑùʹÓÃÉÌÒµºÍ¿ªÔ´¹¤¾ßÀ´Ð­ÖúÐÞ²¹ÆóÒµITϵͳÖеÄÌôÕ½£¬£¬£¬£¬°üÀ¨ÏµÍ³ÌØÕ÷ºÍÓÅÏȼ¶»®·Ö¡¢²¹¶¡²âÊÔºÍʵÑé¸ú×ÙÓëÑéÖ¤¡£¡£¡£¡±Î¢ÈíÓëNISTÕýÔÚÔ¼ÇëÆäËû¸ÐÐËȤµÄ¸÷·½£¨¹©Ó¦ÉÌ¡¢¹«Ë¾»òСÎÒ˽¼Ò£©Îª¸ÃÐÂÖ¸ÄÏÌṩÒâ¼û¡£¡£¡£¸ÃÖ¸ÄÏÔÚNIST£¨ÃÀ¹úÕþ¸®ÈÏÕæÖÆ¶©ÐÐÒµÖ¸ÄϵÄ×éÖ¯£©µÄÖ§³ÖÏ£¬£¬£¬£¬ÓÐÍû±¬·¢ÖØ´óµÄÓ°Ïì¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-and-nist-partner-to-create-enterprise-patching-guide/


5¡¢Nemty 1.6ͨ¹ýRIG EKÆð¾¢·Ö·¢£¬£¬£¬£¬½âÃÜÆ÷ÈÔÈ»¿ÉÓÃ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


RIG EKÕýÔÚ·Ö·¢Ò»ÏµÁжñÒâÈí¼þ£¬£¬£¬£¬ÆäÖаüÀ¨ÀÕË÷Èí¼þNemtyµÄбäÖÖ¡£¡£¡£¸Ã»î¶¯ÓÉÇå¾²Ñо¿Ö°Ô±mol69·¢Ã÷£¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÃé×¼ÈÔÔÚʹÓÃInternet ExplorerºÍFlash PlayerµÄÆóÒµÓû§¡£¡£¡£NemtyбäÌåÖÐ×îÏÔ×ŵÄת±äÊÇÊê½ðƱ¾ÝÖÐÏÔʾµÄ°æ±¾ºÅΪ1.6¡£¡£¡£Æ¾Ö¤Çå¾²³§ÉÌTesorionµÄ˵·¨£¬£¬£¬£¬Nemty 1.6»¹ÐÞ¸ÄÁ˼ÓÃÜËã·¨£¬£¬£¬£¬Ê¹ÓÃWindows¼ÓÃÜ¿âÌæ»»ÁË×Ô¼ºÊµÏÖµÄAESËã·¨¡£¡£¡£ÕâºÜÓпÉÄÜÊÇΪÁËÆÆËðTesorionÐû²¼µÄ½âÃܳÌÐò£¬£¬£¬£¬µ«ÍýÏ벢δÀֳɣ¬£¬£¬£¬ÓÉÓÚTesorionµÄ½âÃܳÌÐòÈÔ¿ÉÒÔÕý³£ÊÂÇé¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/nemty-16-ransomware-released-and-pushed-via-rig-exploit-kit/


6¡¢¼ÓÄôóLeaflyÒâÍâй¶Óû§ÐÅÏ¢£¬£¬£¬£¬µ«²»°üÀ¨ÐÅÓÿ¨Êý¾Ý


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¼ÓÄôóLeaflyÔÚ9ÔÂ30ÈÕ·¢Ã÷£¬£¬£¬£¬¸ÃÍøÕ¾µÄÒ»¸ö¸¨ÖúÊý¾Ý¿âÒâÍâ̻¶ÁËÓû§µÄÐÅÏ¢¡£¡£¡£¸ÃÊý¾Ý¿âÖд洢µÄÓû§¼Í¼¿É×·ËÝÖÁ2016Äê7ÔÂ2ÈÕ£¬£¬£¬£¬°üÀ¨Óû§µÄµç×ÓÓʼþµØµã¡¢Óû§ÃûºÍ¼ÓÃܵÄÃÜÂë¡¢ÐÕÃû¡¢ÄêËê¡¢ÐÔ±ð¡¢Î»ÖÃÒÔ¼°ÊÖ»úºÅÂëµÈÐÅÏ¢¡£¡£¡£LeaflyÌåÏָù«Ë¾Ã»ÓÐÍøÂç»ò´æ´¢Óû§µÄ¹ú¼Òʶ±ðÂë¼°ÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬Ò²Ã»ÓÐÖ¤¾ÝÅú×¢ÆäÉú²úÍøÕ¾ÔâδÊÚȨ»á¼û¡£¡£¡£¸Ã¹«Ë¾Í¨ÖªÁËÊÜÓ°ÏìµÄÓû§£¬£¬£¬£¬²¢ÕýÔÚ¶ÔÊÂÎñ¾ÙÐÐÊÓ²ìºÍÆÀ¹À¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶ÊÜÓ°ÏìÓû§µÄÏêϸÈËÊý¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/leafly-cannabis-website-leaked-user-info-via-exposed-database/