ÎÚ¿ËÀ¼Óë¶à¹úÕþ¸®ÁªºÏµ·»ÙÀÕË÷Èí¼þClopµÄ»ù´¡ÉèÊ©£» £»£»£»£»Ñо¿ÍŶÓÅû¶2G¼ÓÃܱê×¼Ëã·¨±£´æ¿ÉÇÔÌýÁ÷Á¿µÄÎó²î

Ðû²¼Ê±¼ä 2021-06-18

1.ÎÚ¿ËÀ¼Óë¶à¹úÕþ¸®ÁªºÏµ·»ÙÀÕË÷Èí¼þClopµÄ»ù´¡ÉèÊ©


1.jpg


ÎÚ¿ËÀ¼¾¯·½Óë¹ú¼ÊÐ̾¯×éÖ¯¡¢º«¹úºÍÃÀ¹úÕþ¸®ÁªºÏ£¬£¬£¬£¬£¬£¬ÔÚ±¾ÖÜÈýÀֳɵ·»ÙÁËÀÕË÷Èí¼þClopµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£ClopÀÕË÷Èí¼þÍÅ»ï×Ô2019ÄêÒÔÀ´×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬×ܼÆÔì³ÉÁËԼĪ5ÒÚÃÀÔªµÄËðʧ¡£¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼Õþ¸®³ÆÒѹرշַ¢¶ñÒâÈí¼þµÄ»ù´¡ÉèÊ©ºÍ»ñµÃ¼ÓÃÜÇ®±ÒµÄÇþµÀ£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚClopÓÃÀ´¹ûÕæ±»µÁÊý¾ÝµÄÍøÕ¾£¨CL0P^-LEAKS£©ÈÔÔÚÔËÐС£¡£¡£¡£¡£¡£¡£Çå¾²¹«Ë¾Intel 471ÌåÏÖ£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼Õþ¸®Ö»¾Ð²¶ÁËΪClopÍÅ»ïÏ´Ç®µÄÈË£¬£¬£¬£¬£¬£¬Æä½¹µã³ÉÔ±¿ÉÄÜסÔÚ¶íÂÞ˹¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/06/ukraine-police-arrest-cyber-criminals.html


2.¼ÎÄ껪ÓÊÂÖ¹«Ë¾³ÆÆäÔâµ½ÍøÂç¹¥»÷µ¼ÖÂСÎÒ˽¼ÒÐÅϢй¶


2.jpg


È«Çò×î´óµÄÓÎÂÖ¼ÎÄ껪£¨Carnival Corporation£©³ÆÆäÔâµ½¹¥»÷µ¼ÖÂÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÆäÔÚ2021Äê3ÔÂ19ÈÕ¼ì²âµ½Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁ˲¿·Öµç×ÓÓʼþÕÊ»§£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËÔ±¹¤ºÍ¿ÍÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢»¤ÕÕºÅÂë¡¢³öÉúÈÕÆÚ¡¢¿µ½¡ÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë»òÉí·ÝÖ¤ºÅÂëµÈ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÒ»·Ýµç×ÓÓʼþÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬Æä¹É¼ÛϵøÁËÁè¼Ý2%¡£¡£¡£¡£¡£¡£¡£ÔçÔÚÈ¥ÄêµÄ8ÔºÍ12Ô£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾»¹Ôâµ½ÁËÁ½´ÎÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.oann.com/cruise-operator-carnival-discloses-breach-of-crew-guests-personal-data-bloomberg-news/


3.²¨À¼Õþ¸®³ÆÆä¹«ÃñºÍ×éÖ¯»ú¹¹Ô⵽ب¹ÅδÓеÄÍøÂç¹¥»÷


3.jpg


²¨À¼Õþ¸®ÔÚ±¾Öܶþ³Æ£¬£¬£¬£¬£¬£¬Æä¹«ÃñºÍ×éÖ¯»ú¹¹Ôâµ½ÁËØ¨¹ÅδÓеÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁË×ÜÀí°ì¹«ÊÒÈÏÕæÈËMichal DworczykµÄ˽ÈËÓʼþÕÊ»§£¬£¬£¬£¬£¬£¬²¢½«ÓʼþÔÚTelegram¹ûÕæ¡£¡£¡£¡£¡£¡£¡£Õþ¸®½²»°ÈËPiotr MullerÌåÏִ˴ι¥»÷µÄ¹æÄ£ºÜÆÕ±é£¬£¬£¬£¬£¬£¬²»µ«Éæ¼°Dworczyk£¬£¬£¬£¬£¬£¬»¹Éæ¼°Õþ¸®³ÉÔ±¡¢PiSµ³ºÍÆä¹«Ãñ¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶ÎļþµÄÔªÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬ÕâЩÎļþÊÇÓɽ²¶íÓïµÄÈ˱༭µÄ£¬£¬£¬£¬£¬£¬µ«Õâȱ·¦ÒÔ½«´Ë´Î¹¥»÷¹é×ïÓÚ¶íÂÞ˹ºÚ¿Í¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬²¨À¼µÄµØ·½Õþ¸®ºÍÇå¾²¾ÖÈÔÔÚÊÓ²ì´Ë´Î¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£ 


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/119043/hacking/poland-hit-cyber-attacks.html


4.KasperskyÅû¶³¯ÏÊÍÅ»ïAndarielÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯


4.jpg


KasperskyÅû¶Á˳¯ÏʺڿÍÍÅ»ïAndarielÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2021Äê4ÔÂÔÚVirusTotalÉÏ·¢Ã÷ÁËÒ»¸ö¿ÉÒɵÄWordÎĵµ£¬£¬£¬£¬£¬£¬ÆÊÎö·¢Ã÷´Ë´Î¹¥»÷»î¶¯ÖÐʹÓõÄWindowsÏÂÁîºÍÑ¡ÏîÓë֮ǰµÄAndariel»î¶¯ÏÕЩÏàͬ¡£¡£¡£¡£¡£¡£¡£Andariel×÷ΪLazarusµÄ×Ó¼¯ÍÅ£¬£¬£¬£¬£¬£¬×Ô2016Äê5ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬Ö¼ÔÚÈëÇÖº«¹úºÍÌìϸ÷µØ½ðÈÚ»ú¹¹µÄÅÌËã»ú¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Õâ´Î¹¥»÷³ýÁË×°ÖúóÃÅÍ⣬£¬£¬£¬£¬£¬»¹×°ÖÃÁ˼ÓÃÜÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖÆÔìÒµ¡¢Ã½ÌåºÍÐÞ½¨ÒµµÈÐÐÒµ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/andariel-evolves-to-target-south-korea-with-ransomware/102811/    


5.Ñо¿ÍŶÓÅû¶2G¼ÓÃܱê×¼Ëã·¨±£´æ¿ÉÇÔÌýÁ÷Á¿µÄÎó²î


5.jpg


ÔÚÖÜÈý½ÒÏþµÄһƪÂÛÎÄÖУ¬£¬£¬£¬£¬£¬À´×Ե¹ú¡¢·¨¹úºÍŲÍþµÄÑо¿Ö°Ô±Åû¶ÁË2G£¨GPRS£©Òƶ¯Êý¾Ý¼ÓÃܱê×¼ÖеÄÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚ¼ÓÃÜËã·¨GEA-1ÖУ¬£¬£¬£¬£¬£¬Õâ¿ÉÄÜʹ¹¥»÷ÕßÄܹ»ÇÔÌýһЩÊý¾ÝÁ÷Á¿³¤´ï20¶àÄê¡£¡£¡£¡£¡£¡£¡£GEA-1Ëã·¨±¾Ó¦ÔÚ2013ÄêïÔÌ­£¬£¬£¬£¬£¬£¬µ«ÔÚÏÖÔÚµÄAndroidºÍiOSÖÇÄÜÊÖ»úÖÐÈÔÄÜ·¢Ã÷Ëü¡£¡£¡£¡£¡£¡£¡£ËäÈ»´ó´ó¶¼ÊÖ»ú¶¼Ê¹ÓÃ4GÉõÖÁ5G£¬£¬£¬£¬£¬£¬µ«ÔÚijЩ¹ú¼Ò/µØÇø£¬£¬£¬£¬£¬£¬GPRSÈÔÈ»ÊÇÊý¾ÝÅþÁ¬µÄºó±¸Ñ¡Ôñ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÑ֪ͨÊÖ»úÖÆÔìÉ̺ͱê×¼×éÖ¯ÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/security-flaw-found-2g-mobile-data-encryption-standard


6.Enable SecurityÅû¶VoIP GUIÖеĿçÕ¾¾ç±¾Îó²î


6.jpg


Enable SecurityÅû¶ÁËVoIP GUIÖеĿçÕ¾¾ç±¾Îó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚÖÎÀíVoIPºô½ÐµÄ»á»°ÌᳫЭÒé (Session Initiation Protocol£¬£¬£¬£¬£¬£¬SIP)ÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚδ¾­Éí·ÝÑéÖ¤µÄÇéÐÎÏÂÔÚÄ¿µÄϵͳÉÏÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚÉóºËVoIPmonitor GUIʱ·¢Ã÷Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬³Æ¿ÉÒÔͨ¹ý·¢ËͶñÒâSIPÐÂÎÅÀ´ÍêÈ«¿ØÖÆÏµÍ³¡£¡£¡£¡£¡£¡£¡£Enable SecurityÓÚ2021Äê2ÔÂÁªÏµÁËVoIPmonitorµÄ¿ª·¢Ö°Ô±£¬£¬£¬£¬£¬£¬¸ÃÎó²îÏÖÒÑÐÞ¸´¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2021/06/16/xss-vulnerability-in-sip-protocol-risks-rce-attacks-on-voip-software/