¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181105
°ä²¼¹¦·ò 2018-11-05
ƾ¾ÝProofpointµÄ2018ÄêµÚÈý¼¾¶ÈÍþвÇ÷Ïò»ã±¨£¬µç×ÓÓʼþÒÀÈ»ÊÇÍøÂç·¸×ï·Ö×Ó´«²¼¶ñÒâÈí¼þºÍ½øÐд¹µö»î¶¯µÄÊ×Ñ¡¹¥»÷¼¿Á©¡£´Ó2018ÄêµÄQ2µ½Q3£¬Ì°Í¼ÇÔÈ¡Æóҵʹ´¦µÄµç×ÓÓʼþÔö³¤Á˳¬¹ý300%¡£ÀûÓÃÉ罻ýÌåÉϵÄÐéα¿Í»§·þÎñºýŪÓû§Ó×ÎÒÊý¾ÝµÄ´¹µö»î¶¯ÔÚ9Ô´ﵽÁË×î¸ßˮƽ£¬ÓëÈ¥ÄêͬÆÚÏà±ÈÔö³¤ÁË486%¡£ÒøÐÐľÂíÕ¼ËùÓжñÒâÓÐЧºÉÔØµÄ46£¥£¬¶øEmotetºÍZeus PandaÕ¼ÒøÐÐľÂíµÄ90%¡£
ÔÎÄÁ´½Ó£º
https://www.proofpoint.com/sites/default/files/pfpt-us-tr-q318-quarterly-threat-report.pdf2¡¢ÃÀÖ¥¼Ó¸çCPSÔ¼8ÍòÔ±¹¤µÄÓ×ÎÒÐÅÏ¢±»ÇÔ
ƾ¾ÝÖ¥¼Ó¸çÌ«Ñô±¨µÄ±¨Â·£¬Ö¥¼Ó¸ç¹«Á¢Ñ§ÌõÄÒ»Ãûǰ¹ÍÔ±Kristi SimsÇÔÈ¡ÁËÔ¼8ÍòÃûÔ±¹¤¡¢×ÔÔ¸Õߺ͹©¸øÉ̵ÄÓ×ÎÒÐÅÏ¢£¬ÕâЩÐÅÏ¢Ô̺¬ÐÕÃû¡¢Ô±¹¤ID¡¢µç»°ºÅÂë¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢·¸×ﺹÇàºÍDCFSµ÷²éÁ˾ֵȣ¬²»Ô̺¬ÈκÎÉç±£ºÅÂë¡£KrimsĿǰÒѱ»Ö¥¼Ó¸ç¾¯·½¿ÛÁôºÍ¿ÛÁô£¬²¢½«Ãæ¶Ô¶àÏî×ïÃûµÄÖ¸¿Ø¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/80-000-individuals-had-their-personal-info-stolen-by-former-cps-employee-523592.shtml3¡¢×êÑÐÈËÔ±·¢ÏÖÀûÓý©Ê¬ÍøÂçNecursµÄ´¹µöڿƻ
˼¿ÆTalos×êÑÐÈËÔ±·¢ÏÖÀûÓý©Ê¬ÍøÂçNecursµÄ´¹µöڿƻ¡£¹¥»÷Õß´Ó³ÉÈËÍøÕ¾Ð¹Â¶µÄÊý¾Ý¿âµ±Ñ¡ÔñÖ¸±ê£¬¼Ù×°Õ¼ÓÐÆäÅÔ¹ÛÉ«ÇéÊÓÆµµÄÖ¤¾Ý£¬ÒԴ˽øÐÐÍþвºÍڲơ£×êÑÐÈËÔ±¹²·¢ÏÖÁ½¸öÀàËÆµÄ»î¶¯£¬Ò»¸öÊÇ8ÔÂ30ºÅÆðÍ·µÄFrom£ºheader»î¶¯£¬ÁíÒ»¸öÊÇ10ÔÂ5ºÅµÄAaron Smith»î¶¯¡£Aaron SmithÖÁÉÙ´Ó137606¸ö·ÖÆçµÄIPµØÖ·£¨Ô¼1000¸öIPÓëNecursÓйأ©·¢ËÍÁË233236·â´¹µöÓʼþ£¬ÊÕ¼þÈ˵ÄÊýÁ¿Îª15826£¬¾ùÔÈÿ¸öÊÕ¼þÈËÊÕµ½15·âÓʼþ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/necurs-botnet-distributing-sextortion-email-scams/
4¡¢ÈðÊ¿Sauter¹«Ë¾°ä²¼Â¥Óî×Ô¶¯»¯²úÆ·µÄ°²È«¸üУ¬½¨¸´Ò»¸öXXE·ì϶
°²È«³§ÉÌApplied RiskµÄ×êÑÐÈËÔ±Gjoko Krstic·¢ÏÖÈðʿ¥Óî×Ô¶¯»¯¹«Ë¾SauterµÄCASE Suite²úÆ·´æÔÚÒ»¸öXXE·ì϶¡£¸Ã·ì϶£¨CVE-2018-17912£©ÔÊÐí¹¥»÷Õßͨ¹ýOOB¹¥»÷½Ó¼ûºÍ¼ìË÷ËÁÒâÊý¾Ý£¬ÉõÖÁµ¼ÖÂDoS£¬CASE Suite 3.10¼°Ö®Ç°µÄ°æ±¾Êܵ½Ó°Ïì¡£ÔÚ10ÔÂ15ÈÕICS-CERTÏòÆä´«µÝÁ˸÷ì϶ºó£¬Sauter½öÆÆ·ÑÁË10Ìì¾Í°ä²¼ÁËÓйؽ¨¸´²¹¶¡¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/sauter-quickly-patches-flaw-building-automation-software5¡¢×êÑÐÍŶÓÅû¶Ó×ÒϼÒÓÃÉãÏñÍ·ÖеĶà¸ö°²È«·ì϶
˼¿ÆTalosÍŶÓÅû¶Ó×ÒϼÒÓÃÉãÏñÍ·ÖеĶà¸ö°²È«·ì϶¡£¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩ·ì϶½ûÓÃÉãÏñÍ·¡¢É¾³ýÉãÏñÍ·ÉÏ´æ´¢µÄÊÓÆµ¡¢²é¿´ÊÓÆµ¡¢ÕëµÐÊÖ»úappÌáÒéDZÔڵĹ¥»÷ºÍÈëÇÖ¼ÒÍ¥ÍøÂç¹¥»÷ÆäËüÉ豸µÈ¡£·ì϶ÁìÓòÔ̺¬Ô¶³Ì´úÂëÖ´ÐÓ×¢ºÅÁî×¢Èë¡¢Éí·ÝÑéÖ¤ÈÆ¹ýÒÔ¼°»Ø¾ø·þÎñµÈ¡£¾ßÌå·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó£¬½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ×îеĹ̼þ°æ±¾¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2018/10/vulnerability-spotlight-Yi-Technology.html6¡¢Twitterɾ³ý³¬¹ý1Íò¸öÊÔͼӰÏìÃÀ¹úÖÐÆÚÑ¡¾ÙµÄ»úеÈËÕË»§
TwitterÐû³ÆÔÚ9Ôµ׺Í10Ô³õÒѾɾ³ýÁ˳¬¹ý1Íò¸ö»úеÈËÕË»§£¬ÕâЩÕË»§ÊÔͼ°ä²¼ÐÅÏ¢ÒÔÓ°ÏìÃÀ¹úµÄÖÐÆÚÑ¡¾Ù¡£ÃÀ¹úÃñÖ÷µ³¹ú»á¾ºÑ¡Î¯Ô±»á£¨DCCC£©¿ª·¢ÁËÒ»¸öÓÃÓÚ¼ø±ðºÍ»ã±¨ÓÉ»úеÈ˽ÚÔìµÄÉ罻ýÌåÕË»§µÄϵͳ£¬²¢ÒªÇóTwitterɾ³ýÕâЩÕË»§¡£¸ÃϵͳÀûÓÃÁËһЩ¹«¿ªµÄ¹¤¾ß£¬ÀýÈçHoaxleyºÍBotometerµÈ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/77642/social-networks/twitter.htmlÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ