iOS·ì϶Checkm8¿Éµ¼ÖÂiPhone4µ½XÓÀÔ¶Ô½Óü£»ÃÀ²ÎÒéԺͨ¹ý¡¶DHSÍøÂçËÑË÷¼°ÊÂÎñÏìÓ¦Ó××é·¨°¸¡·

°ä²¼¹¦·ò 2019-09-29
1.iOS·ì϶Checkm8¿Éµ¼ÖÂiPhone4µ½XÓÀÔ¶Ô½Óü

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

°²È«×êÑÐÔ±axi0mXÅû¶iOSÖеݲȫ·ì϶checkm8£¬¸Ã·ì϶Äܹ»Ê¹iPhone4S£¨A5оƬ£©µ½iPhone8¡¢iPhoneX£¨A11оƬ£©µÄËùÓÐÆ»¹ûÊÖ»ú¼°Í¬¿îAϵÁд¦ÖÃÆ÷µÄiPad¡¢iPod touchµÈiOSÉ豸ÓÀÔ¶Ô½Óü¡£Ã»ÓÐÌáµ½×îеÄA12ºÍA13ÊÇ·ñÊܵ½Ó°Ïì¡£¸Ã¹¥»÷ÀûÓÃÁËbootrom·ì϶£¬¼´´æ´¢ÁËiPhoneÆô¶¯Ö¸ÁîµÄÖ»¶Á´æ´¢Æ÷£¨ROM£©·ì϶£¬ÓÉÓڸò¿ÃÅÄÚ´æÊÇÖ»¶ÁµÄ£¬Òò¶øÎÞ·¨Í¨¹ý°²È«¸üÐÂÀ´½¨¸´·ì϶¡£×êÑÐÈËÔ±ÔÚGithubÉϰ䲼ÁËÓйطì϶ÀûÓ㬵«ÉÐÎÞ¹«¿ª¿ÉÓõÄÔ½Óü·¨Ê½¡£

   

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/ios-exploit-checkm8-could-allow-permanent-iphone-jailbreaks/148762/

2.ÃÀ²ÎÒéԺͨ¹ý¡¶DHSÍøÂçËÑË÷¼°ÊÂÎñÏìÓ¦Ó××é·¨°¸¡·

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ÃÀ¹ú²ÎÒéԺͨ¹ýÁË¡¶DHSÍøÂçËÑË÷¼°ÊÂÎñÏìÓ¦Ó××é·¨°¸¡·£¨S.315£©£¬ÊÚȨºÓɽ°²È«Êý£¨DHS£©Í¨¹ýÍøÂçËÑË÷¼°ÊÂÎñÏìÓ¦Ó××éÔ®ÊÖ¸öÈ˺͹«¹²²¿ÃÅÕмÜÍøÂç¹¥»÷¡£²ÎÒéÔ±SchumerÔÚ9ÔÂ27ÈÕ°ä²¼µÄÐÂΟåÖаµÊ¾£¬ÕâÒ»Ðж¯ÊÇΪÁË·ÀÓùÄÇЩÇÖº¦Ñ§Éú¡¢Ñ§ÌùÍÔ±¼°´¦Ëùµ±¾ÖÔ±¹¤µÄÓ×ÎÒÐÅÏ¢¼°³ÁÒªÊý¾ÝµÄÀÕË÷Èí¼þ¹¥»÷¡£Ò»¸öÀàËÆµÄ·¨°¸£¨HR1158£©ÒÑÓÚ9ÔÂ24ÈÕÔÚÃÀ¹ú¶àÒéԺͨ¹ý£¬Ä¿Ç°ÕâÁ½Ïî·¨°¸ÔÚËͽ»×Üͳ¾ßÃûÒÔ³ÉΪ˾·¨¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-senate-passes-bill-in-response-to-rampant-ransomware-cyberattacks/

3.ÃÀHSCCÍÆ³öÒ½ÁƱ£½¡ÐÐÒµÍøÂ簲ȫ¾ØÕó

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

ÃÀ¹úÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú²¿ÃÅЭµ÷ίԱ»á£¨HSCC£©Æô¶¯ÁËÒ»ÏîÖ¼ÔÚ¸ÄÉÆÒ½ÁƱ£½¡²¿ÃÅÍøÂ簲ȫÐÔµÄÐÅÏ¢×ÊÔ´¹²Ïí´òË㡣еġ¶Ò½ÁƱ£½¡ÐÐÒµÐÅÏ¢¹²Ïí×éÖ¯ÍøÂ簲ȫ¾ØÕó¡·£¨HIC-MISO£©Í¨¹ýΪÓû§ÌṩÃÀ¹ú¸÷µØµÄÍøÂ簲ȫÐÅÏ¢¹²Ïí×éÖ¯±ã½ÝÁбí£¬Ô®ÊÖÓû§¸ú×Ù×îÐµİ²È«Íþв¡£Ð¾ØÕóÖÐÔ̺¬25¸öÒÔÉϵÄÍøÂ簲ȫÐÅÏ¢¹²Ïí×éÖ¯¼°Æä·þÎñµÄ¾ßÌåÐÅÏ¢£¬ÆäÖÐÔ̺¬9¸öרÃÅÕë¶ÔÒ½ÁƱ£½¡ÐÐÒµºÍÒ½ÁÆÉ豸°²È«ÐÔµÄ×ÊÔ´¡£¸Ã¾ØÕóµÄÖØÒªÖ¸±êÊÇʹ¹æÄ£½ÏÓ×µÄÒ½ÁƱ£½¡×éÖ¯£¨²»×ãÖ´ÐÐ×îеÄÍøÂç°²ÕûϵͳµÄ×ÊÔ´£©ÄܸüÈÝÒ×µØÓë¹²ÏíµÄÍøÂ簲ȫÐÅÏ¢ºÍ·ÀÓù×ÊÔ´½øÐл¥¶¯¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/health-industry-cybersecurity/

4.Proofpoint°ä²¼2019ÄêµÚ¶þ¼¾¶ÈÍøÂçÍþв»ã±¨


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ProofpointµÄ2019ÄêµÚ¶þ¼¾¶ÈÍøÂçÍþв»ã±¨·¢ÏÖ£¬¶ñÒâURLռȫÇòÀ¬»øÓʼþ£¨Ô̺¬¶ñÒâURL¼°¶ñÒ⸽¼þ£©µÄ85%£¬±È5ÔÂÂÔÓÐÔö³¤£¬µ«×ÜÌåÓë2019ÄêµÄÇ÷Ïòά³ÖÒ»Ö¡£Óë5Ô·ÝÏà±È£¬È«ÇòÀ¬»øÓʼþµÄ×ÜÊýÁ¿½µÂäÁ˽ü10%£¬µ«ÓÉÓÚTA542ºÍTA511ÔÚÕû¸ö6ÔµIJ»»îÔ¾£¬¸Ã½µÂä·ù¶ÈÓ×ÓÚÔ¤ÆÚ¡£Óë5ÔÂÏà±È£¬6Ô·ݵÄÀÕË÷Èí¼þÀ¬»øÓʼþÊýÁ¿ºÍ»î¶¯ÏÔÖøÏ÷¼õ£¬SodinokibiÀÕË÷Èí¼þ³ÉΪÒÑÍ˳öµÄGandCrabµÄÖØÒª¼ÌÈÎÕß¡£´ÓµÚ¶þ¼¾¶ÈÆðÍ·£¬´óÁ¿ÀûÓüÙ×°¼¼ÊõºÍÉí·ÝºýŪÐÅÏ¢µÄÀ¬»øÓʼþÆðÍ·³öÏÖ£¬ÒÔǰÕâЩÀ¬»øÓʼþ¶àÓëBECÓйØ£¬µ«´Ë¿Ì¹¥»÷ÕßËÆºõÕý½«ÕâÖÖ¼¼ÊõÓÃÓÚÆäËüÖ÷ÕÅ£¬²¢ÇÒʹÓÃÁ¿¸ü´ó¡£ÓòÃûڲƭԾÉýÁË47¸ö°Ù·Öµã£¬¸ßÓÚµÚÒ»¼¾¶ÈµÄ²»¼°10%¡£

Ô­ÎÄÁ´½Ó£º
https://www.proofpoint.com/us/threat-insight/post/proofpoint-q2-2019-threat-report-emotets-hiatus-mainstream-impostor-techniques

5.Emsisoft°ä²¼ÀÕË÷Èí¼þAvestµÄÃâ·Ñ½âÃܹ¤¾ß


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ÔÚ°ä²¼WannaCryFakeµÄ½âÃܹ¤¾ß¼¸Ììºó£¬Emsisoft°ä²¼ÁËÀÕË÷Èí¼þAvestµÄÃâ·Ñ½âÃܹ¤¾ß¡£AvestÔÚ¼ÓÃÜÓû§µÄÎļþºó»á¸½¼Ó.ckey().email().pack14À©´óÃû£¬²¢¿ªÊÍÃûΪ¡°!!!Readme!!!Help!!!.txt¡±ÀÕË÷µ¥¾Ý¡£Æ¾¾ÝEmsisoft°ä²¼µÄÓû§Ö¸ÄÏ£¬Êܺ¦ÕßÓ¦¸Ã´ÓϵͳÖÐɾ³ýÀÕË÷Èí¼þºóÔÙʹÓýâÃܹ¤¾ß£¬ÒÔÃâÔì³ÉÔÙ´ÎϰȾ¡£Ê¹ÓøýâÃܹ¤¾ß±ØÒªÒ»¸öÎļþµÄԭʼ°æ±¾ºÍ¼ÓÃܰ汾£¬ÒÔÆÆ½âÆä¼ÓÃÜÃÜÔ¿¡£¸Ã½âÃܹ¤¾ß¿É´ÓEmsisoftÍøÕ¾¸ßµÍÔØµÃµ½¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91775/malware/avest-ransomware-decryptor.html

6.мäµýÈí¼þMasad StealerÀûÓÃTelegramÇÔÈ¡Óû§ÐÅÏ¢

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖмäµýÈí¼þMasad StealerÀûÓÃTelegram×÷ΪͨѶÇþ·½«Óû§µÄÎļþ¡¢ä¯ÀÀÆ÷ÐÅÏ¢ºÍ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý·¢Ëͻع¥»÷Õß¡£Æ¾¾ÝJuniper Threat Labs×êÑÐÍŶӵĻ㱨£¬¸Ã¶ñÒâÈí¼þÔÚijÖÖˮƽÉÏÓëQulab StealerÓйØ£¬²¢ÇÒʹÓÃAutoit¾ç±¾½øÐпª·¢¶øºó±àÒëΪWindows¿ÉÖ´ÐÐÎļþ¡£¸Ã¶ñÒâÈí¼þĿǰÔÚ°µÍøÂÛ̳ÉÏ»ý¼«·Ö·¢£¬ÆäÏúÊÛÕ½ÊõΪ·Ö¼¶ÏúÊÛ£¬ÀýÈçÔ̺¬Ãâ·Ñ°æ±¾ºÍ85ÃÀÔªµÄȫְÄܰ汾¡£Æ¾¾ÝTelegram»úеÈËIDºÍÓû§ÃûµÄÊýÁ¿£¬×êÑÐÍŶӷ¢ÏÖÖÁÉÙÓÐ18¸ö¹¥»÷Õß»ò¹¥»÷»î¶¯ÔÚʹÓÃMasad Stealer¶Ô׼DZÔÚÊܺ¦Õß¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-masad-stealer-malware-exfiltrates-crypto-wallets-via-telegram/