¹þÈø¿Ë˹̹Õþ¸®×èµ²¾³ÄÚËùÓеÄHTTPSÁ÷Á¿£»Áè¼Ý80.5Íò¸öϵͳÈÔÈ»Ò×ÊÜBlueKeepÎó²î¹¥»÷

Ðû²¼Ê±¼ä 2019-07-19
1¡¢ÃÀ¹úÕþ¸®Õë¶ÔgovÓòÃûÍÆ³öеÄDNSÇå¾²²½·¥


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


´Ó7ÔÂ17ÈÕ×îÏÈ£¬ÎªÁËïÔÌ­DNSÐ®ÖÆÎ£º¦£¬ÃÀ¹úÕþ¸®½«ÎªËùÓеÄ.govÓòÃûʵÑéеÄDNSÇå¾²²½·¥¡£Æ¾Ö¤ÃÀ¹ú×ÜÎñ¹ÜÀí¾Ö£¨GSA£©µÄ±íÊö£¬¸ÃDotGovÍýÏëÈÏÕæÔËÓª¶¥¼¶ÓòÃû.gov£¬²¢½«ÆäÌṩӦÃÀ¹úÕþ¸®×éÖ¯¡£ÎªÁËÏìÓ¦½üÆÚµÄDNSÐ®ÖÆÊÂÎñ£¬µ±ÔÚDotGovÉϸü¸Ä.govÓòÃûµÄDNS¼Í¼ʱ£¬ÓòÃûÁªÏµÈ˽«»áÊÕµ½ÏµÍ³×Ô¶¯·¢Ë͵ÄÓʼþÖÒÑÔ£¬ÓʼþÖл¹°üÀ¨¿ÉÓõĻº½â²½·¥¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/us-govt-rolls-out-new-dns-security-measures-for-gov-domains/


2¡¢¹þÈø¿Ë˹̹Õþ¸®×èµ²¾³ÄÚËùÓеÄHTTPSÁ÷Á¿


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


¹þÈø¿Ë˹̹Õþ¸®ÒÑ´Ó7ÔÂ17ÈÕ×îÏÈ×èµ²Æä¾³ÄÚµÄËùÓÐHTTPSÁ÷Á¿¡£ÔÚÍâµØÕþ¸®µÄָʾÏ£¬ÍâµØISPÇ¿ÖÆÓû§ÔÚÿ¸ö×°±¸ºÍä¯ÀÀÆ÷ÖÐ×°ÖÃÕþ¸®½ÒÏþµÄÖ¤Êé¡£¸ÃÖ¤Ê齫ÔÊÐíÕþ¸®»ú¹¹½âÃÜÓû§µÄHTTPSÁ÷Á¿²¢Éó²éÆäÄÚÈÝ¡£ÔÚÓû§×°ÖøÃÖ¤Êé֮ǰ£¬ËûÃǽ«ÎÞ·¨»á¼û»¥ÁªÍø¡£Õþ¸®¹ÙÔ±ÌåÏִ˾ÙÖ¼ÔÚÔöÇ¿¶Ô¹«Ãñ¡¢Õþ¸®»ú¹¹ºÍ˽ӪÆóÒµµÄÑÚ»¤£¬Ê¹ÆäÃâÔâºÚ¿Í¹¥»÷¡¢»¥ÁªÍøÚ²Æ­µÈÍøÂçÍþв¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/kazakhstan-government-is-now-intercepting-all-https-traffic/


3¡¢Google PlayÊÐËÁϼÜ7¸ö¶ñÒâAPP£¬×ÜÏÂÔØÁ¿³¬13Íò´Î


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


AvastÑо¿Ö°Ô±ÔÚGoogle PlayÊÐËÁÖз¢Ã÷7¸ö¸ú×ÙÀà¶ñÒâÈí¼þ£¬ÕâÀà¶ñÒâÈí¼þ±»³ÆÎªstalkerware£¬ÔÊÐíÈËÃǸú×ÙÔ±¹¤¡¢ºÏ×÷»ï°é»ò¶ùͯ¡£ÕâЩAPPºÜ¿ÉÄÜÊÇÓɶíÂÞ˹¿ª·¢Ö°Ô±¿ª·¢µÄ£¬×ÜÏÂÔØÁ¿Áè¼Ý13Íò´Î¡£ÕâЩstalkerware¿ÉÒÔ¼àÊÓÄ¿µÄµÄλÖᢶÌÐÅ¡¢Í¨»°¼Í¼ÒÔ¼°ÍøÂçÁªÏµÈËÐÅÏ¢£¬»¹¿ÉÒÔÒþ²Ø×Ô¼º¡£ÏÖÔÚËùÓÐ7¸öAPP¶¼Òѱ»Google PlayÊÐËÁɾ³ý¡£


Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/google-removes-seven-stalkerware-apps-from-play-store-79f33359


4¡¢ÐÂEvilGnomeºóÃÅ£¬Î±×°³ÉGnome shellÀ©Õ¹ÇÔÈ¡Óû§ÐÅÏ¢


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


7Ô³õIntezer LabsÑо¿Ö°Ô±·¢Ã÷жñÒâÈí¼þEvilGnome£¬¸Ã¶ñÒâÈí¼þαװ³ÉGnome shellÀ©Õ¹£¬Ö¼ÔÚÇÔÈ¡LinuxÓû§µÄÐÅÏ¢¡£EvilGnomeºóÃÅ´øÓÐ5¸öÄ£¿é£¬°üÀ¨ÒôƵ²¶»ñÄ£¿éShooterAudio¡¢ÆÁÄ»½ØÍ¼Ä£¿éShooterImage¡¢ÎļþɨÃèÄ£¿éShooterFile¡¢C2ͨѶÄ£¿éShooterPingÒÔ¼°ÉÐδÍê³ÉµÄ¼üÅ̼ͼÄ£¿éShooterKey¡£Æ¾Ö¤Palo Alto Networks Unit 42µÄ˵·¨£¬EvilGnomeËÆºõÓë¶íÂÞ˹·¸·¨ÍÅ»ïGamaredon Group±£´æ¹ØÁª¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-evilgnome-backdoor-spies-on-linux-users-steals-their-files/


5¡¢Áè¼Ý80.5Íò¸öϵͳÈÔÈ»Ò×ÊÜBlueKeepÎó²î¹¥»÷


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


ƾ֤BitSightµÄÒ»·Ýб¨¸æ£¬×èÖ¹2019Äê7ÔÂ2ÈÕÈÔÓÐÔ¼80.5Íò¸ö̻¶ÔÚ¹«ÍøÉϵÄϵͳÒ×ÊÜBlueKeepÎó²îµÄ¹¥»÷£¬Óë5ÔÂ31ÈÕÏà±ÈÕâÒ»Êý×ÖïÔÌ­ÁË17.18£¥£¨¼´16.7Íò¸öϵͳ£¬ÆäÖÐ9.2Íò¸öϵͳÈÔÔÚ¹«ÍøÉÏ̻¶£¬µ«ÒÑ×°ÖÃÐÞ¸´²¹¶¡£©¡£BitSight»¹¶ÔÕâЩϵͳ¾ÙÐÐÁËÆÊÎö£¬Êý¾ÝÏÔʾÖйúºÍÃÀ¹úµÄ̻¶ϵͳÊýÄ¿×î¶à£¬¶øÖ´·¨¡¢·ÇÓªÀû/·ÇÕþ¸®×éÖ¯ÒÔ¼°º½Ìì/¹ú·ÀÊÇ×°ÖøÃÎó²îµÄÐÞ¸´²¹¶¡½ø¶È×î¿ìµÄÐÐÒµ¡£


Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/more-than-805000-systems-are-still-vulnerable-to-bluekeep-vulnerability-e0977139


6¡¢Ke3chang APTй¥»÷Ô˶¯£¬Ö÷ÒªÃé׼ŷÖÞÍâ½»¹Ù


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


ESETÑо¿Ö°Ô±Ðû²¼¹ØÓÚKe3chang APTµÄÆÊÎö±¨¸æ£¬¸Ã±¨¸æ¼Í¼ÁË·¸·¨ÍÅ»ïÔÚ2015ÄêÖÁ2019Äêʱ´úµÄ¹¥»÷Ô˶¯¼°¶ñÒ⹤¾ß¡£¸ÃÍÅ»ï×Ô2010Äê×îÏÈ»îÔ¾£¬Ö÷ÒªÕë¶ÔÅ·ÖÞµÄʯÓÍ¡¢¾üÊ¡¢Õþ¸®³Ð°üÉÌÒÔ¼°Íâ½»¹Ù¡£OkrumºóÃÅÓÚ2016Äê12ÔÂÊ״ηºÆð£¬ESETµÄÒ£²âÊý¾Ý½øÒ»²½¼Í¼Á˸úóÃű»ÓÃÓÚ2017ÄêÕë¶Ô˹Âå·¥¿Ë¡¢±ÈÀûʱ¡¢ÖÇÀû¡¢Î£µØÂíÀ­ºÍ°ÍÎ÷Íâ½»²¿·ÖµÄ¹¥»÷Ô˶¯ÖС£OkrumºóÃŰüÀ¨ÎļþÏÂÔØºÍÉÏ´«¡¢Ö´Ðжþ½øÖÆÎļþÒÔ¼°ÔËÐÐshellÏÂÁîµÈ¹¦Ð§¡£¸Ã·¸·¨ÍÅ»ïÔÚ2019Äê3Ô·ÝÈÔÈ»»îÔ¾£¬Ñо¿Ö°Ô±ÌṩÁËÆä¹¥»÷Ô˶¯µÄIOC¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-okrum-malware-used-by-ke3chang-group-to-target-diplomats/