Õë¶Ô»ªË¶Live Update¹©Ó¦Á´¹¥»÷£º2019ÄêµçÐÅ·¸·¨±¨¸æ£»£»£» £»£»£»ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨Ïµ

Ðû²¼Ê±¼ä 2019-03-26
1¡¢Õë¶Ô»ªË¶Live UpdateµÄ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬»òÓ°ÏìÁè¼Ý100ÍòÓû§


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


2019Äê1Ô¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»¸öÉæ¼°µ½»ªË¶Live Update UtilityÈí¼þµÄÖØ´ó¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷±¬·¢ÔÚ2018Äê6ÔÂÖÁ11ÔÂÖ®¼ä£¬£¬£¬£¬£¬£¬¿ÉÄÜÓ°ÏìÁËÈ«ÇòÁè¼Ý100ÍòÓû§¡£¡£ ¡£¡£»£»£» £»£»£»ªË¶Live UpdateÊÇԤװÔÚ´ó´ó¶¼»ªË¶µçÄÔÉϵÄÊÊÓóÌÐò£¬£¬£¬£¬£¬£¬ÓÃÓÚ×Ô¶¯¸üÐÂBIOS¡¢UEFI¡¢Çý¶¯³ÌÐòµÈ×é¼þ¡£¡£ ¡£¡£¹¥»÷ÕßÔÚľÂí»¯µÄÑù±¾ÖÐÓ²±àÂëÁËÒ»¸öÄ¿µÄMACµØµãµÄÁÐ±í£¨ÊýĿΪ600¸öÒÔÉÏ£©£¬£¬£¬£¬£¬£¬µ«Ä¿µÄȺÌåµÄÉí·ÝÉв»Ã÷È·¡£¡£ ¡£¡£ÓÉÓÚÑù±¾ÊÇÓÃÕýµ±Ö¤ÊéÇ©ÊðµÄ£¨ÀýÈç¡°ASUSTeK Computer Inc.¡±£©£¬£¬£¬£¬£¬£¬²¢ÇÒÍйÜÔÚ»ªË¶¹Ù·½¸üÐÂЧÀÍÆ÷liveupdate01s.asus[.]comºÍliveupdate01.asus[.]comÉÏ£¬£¬£¬£¬£¬£¬µ¼Ö¸ù¥»÷ºã¾Ãδ±»·¢Ã÷¡£¡£ ¡£¡£ÏÖÔÚµÄÖ¤¾ÝÅú×¢¹¥»÷Õß»òÓëAPT×éÖ¯BARIUMÓйء£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/operation-shadowhammer/89992/

2¡¢Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þHackedµÄ½âÃÜÆ÷


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


EmsisoftÐû²¼ÀÕË÷Èí¼þHackedµÄÃ⺬»ìÃÜÆ÷¡£¡£ ¡£¡£¸ÃÀÕË÷Èí¼þÓÚ2017Äê×îÏÈÔË×÷£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÓ¢Óï¡¢ÍÁ¶úÆäÓï¡¢Î÷°àÑÀÓïºÍÒâ´óÀûÓïÓû§¡£¡£ ¡£¡£ÔÚѬȾϵͳºó£¬£¬£¬£¬£¬£¬Hacked»áÏÔʾһ¸öÐéαµÄWindows¸üÐÂÆÁÄ»£¬£¬£¬£¬£¬£¬²¢ÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.hackedÀ©Õ¹Ãû¡£¡£ ¡£¡£Êܵ½Ñ¬È¾µÄÓû§¿ÉÒÔ´ÓÒÔÏÂÁ´½ÓÖÐÏÂÔØ¸Ã¹¤¾ß²¢ÒÔÖÎÀíԱȨÏÞÔËÐУ¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß½«×Ô¶¯½âÃÜËùÓÐ.hackedÀ©Õ¹ÃûµÄ¼ÓÃÜÎļþ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/ransomware/decryptor/emsisoft-has-released-a-decryptor-for-the-hacked-ransomware/

3¡¢Å·ÖÞÐ̾¯×éÖ¯¼°Ç÷ÊÆ¿Æ¼¼ÁªºÏÐû²¼2019ÄêÍøÂçµçÐÅ·¸·¨±¨¸æ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

ƾ֤ŷÖÞÐ̾¯×éÖ¯ºÍÇ÷ÊÆ¿Æ¼¼ÁªºÏÐû²¼µÄ2019ÄêÍøÂçµçÐÅ·¸·¨±¨¸æ£¬£¬£¬£¬£¬£¬Ã¿ÄêµçÐÅڲƭµÄ±¾Ç®Ô¤¼ÆÎª290ÒÚÅ·Ôª£¨ºÏ330ÒÚÃÀÔª£©¡£¡£ ¡£¡£¸Ã±¨¸æÇ¿µ÷£¬£¬£¬£¬£¬£¬µçÐÅڲƭÕýÔÚ³ÉΪ¹Å°å½ðÈÚ·¸·¨µÄµÍΣº¦Ìæ»»¼Æ»®£¬£¬£¬£¬£¬£¬±¾Ç®ÉϵĽµµÍºÍÈëÇÖ×°±¸¿ÉÓÃÐÔµÄÔöÌíʹµÃÕâÖÖڲƭÐÐΪһֱÔöÌí¡£¡£ ¡£¡£·¸·¨·Ö×ÓµÄÖ÷ҪĿµÄÊÇÓû§»òÔËÓªÉ̵ÄÕË»§£¬£¬£¬£¬£¬£¬²¢´ÓÖв»·¨»ñµÃ¿î×Ó¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.europol.europa.eu/newsroom/news/hold-phone-threats-lurking-behind-missed-call-and-other-forms-of-telecom-fraud

4¡¢Á÷ýÌåÍøÕ¾Kanopyй¶»á¼ûÈÕÖ¾£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ¸ú×ÙÓû§Éí·Ý


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ô±Justin Paine·¢Ã÷ÊÓÆµÁ÷ýÌåÍøÕ¾KanopyµÄElasticsearchÊý¾Ý¿âδ¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬Ê¹µÃAPIÈÕÖ¾¼°ÍøÕ¾»á¼û¼Í¼̻¶ÔÚÍøÉÏ¡£¡£ ¡£¡£ÕâЩÐÅÏ¢¿ÉÓÃÓÚ¸ú×ÙÓû§µÄԢĿϰ¹ß¼°²éÕÒÓû§µÄÉí·Ý£¬£¬£¬£¬£¬£¬ÀýÈç»ùÓÚ¿Í»§¶ËIP¡¢ËÑË÷/ԢĿµÄÊÓÆµÐÅÏ¢¡¢µØÀíÐÅÏ¢¡¢Ê±¼ä´ÁºÍ×°±¸ÀàÐÍ£¬£¬£¬£¬£¬£¬ÓпÉÄÜʶ±ð³öÓû§µÄÉí·Ý¡£¡£ ¡£¡£¸ÃÊý¾Ý¿âÖÁÉÙÓÚ3ÔÂ7ÈÕÆð̻¶ÔÚÍøÉÏ£¬£¬£¬£¬£¬£¬²¢ÓÚ3ÔÂ18ÈÕ»ñµÃ±£»£»£» £»£»£»¤¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/video-streaming-site-kanopy-leaks-api-and-website-access-logs-77645814

5¡¢ºÚ¿ÍÈëÇÖµÂÖÝÁú¾í·ç¾¯±¨ÏµÍ³£¬£¬£¬£¬£¬£¬Ðû²¼30¶à¸öÐéα¾¯±¨


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


3ÔÂ12ÈÕÆÆÏþ2:30×óÓÒ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁ˵¿ËÈøË¹ÖݵÄÁú¾í·ç¾¯±¨ÏµÍ³£¬£¬£¬£¬£¬£¬²¢ÏòÁ½¸ö³ÇÕò£¨DeSotoºÍLancaster£©Ðû²¼ÁËÖÁÉÙ30¸öÐéαÁú¾í·ç¾¯±¨£¬£¬£¬£¬£¬£¬ÒýÆðÁËÍâµØ×¡ÃñµÄ¿Ö»Å¡£¡£ ¡£¡£ÆäÖÐ20¸öÐéα¾¯±¨ÊÇÔÚLancasterÐû²¼µÄ£¬£¬£¬£¬£¬£¬ÆäÓàµÄÔòÊÇÔÚDeSoto¡£¡£ ¡£¡£Ö®ºóÕâЩϵͳһֱ´¦ÓÚÍÑ»ú״̬£¬£¬£¬£¬£¬£¬Ö±ÖÁ3ÔÂ17ÈղŻָ´Õý³£Ð§ÀÍ¡£¡£ ¡£¡£¾¯ÆÓÖ±ÔÚ¶ÔÕâЩÈëÇÖÐÐΪ¾ÙÐÐÊӲ졣¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82854/cyber-crime/emergency-tornado-alarms-hack.html

6¡¢Î¢ÈíЭÖúNorsk Hydro»Ö¸´ITϵͳ£¬£¬£¬£¬£¬£¬ÎÞÐèÖ§¸¶Êê½ð


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Norsk HydroÊ×ϯ²ÆÎñ¹ÙEivind KallevikÌåÏÖ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒѾ­×îÏÈʹÓñ¸·Ý»Ö¸´ÆäITϵͳ£¬£¬£¬£¬£¬£¬²¢ÇÒ²»ÍýÏëÏò¹¥»÷ÕßÖ§¸¶Êê½ð¡£¡£ ¡£¡£À´×Ô΢ÈíºÍÆäËüÇå¾²ÏàÖúͬ°éµÄר¼ÒÕýÔÚ×ÊÖúNorsk Hydro½«ÆäÒªº¦ITϵͳ»Ö¸´Õý³£ÔËÓª¡£¡£ ¡£¡£ÉÏÖÜNorsk HydroÔâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾È«Çò´ó²¿·ÖÓªÒµÁìÓòµÄITϵͳ¼°ÔËÓª¶¼Êܵ½Ó°Ïì¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/microsoft-helping-norsk-hydro-restore-its-it-systems-without-paying-the-ransom-86a32a3c

ÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·­ÒëºÍÕûÀí