¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181130
°ä²¼¹¦·ò 2018-11-30
ÎªÍÆ½ø¸÷App¾ÓªÕ߸üºÃµØ×ñÊØ¡¶ÖлªÈËÃñ¹²ºÍ¹úÍøÂ簲ȫ·¨¡·¡¢¡¶Ó×ÎÒÐÅÏ¢°²È«¹æ·¶¡·µÈÓйØË¾·¨ºÍ³ß¶È¹æ·¶£¬ÊØ»¤¿í´óÏû·ÑÕßµÄÓ×ÎÒÐÅÏ¢°²È«£¬ÖÐÏûÐÓÚ2018Äê8-10Ô·¢Õ¹ÁËAppÓ×ÎÒÐÅÏ¢ÍøÂçÓëÒþÖÔÕþ²ß²âÆÀ»î¶¯¡£±¾´Î²âÆÀµÄApp¹²ÓÐ10ÀࣺͨѶÉç½»¡¢Ó°Òô²¥·Å¡¢ÍøÉϹºÎï¡¢ÂòÂôÖ§¸¶¡¢³öÐе¼º½¡¢½ðÈÚÀí²Æ¡¢ÓÎÀÀסËÞ¡¢ÐÂÎÅÔĶÁ¡¢ÓÊÏäÔÆÅ̺ÍÅÄÉãÃÀ»¯¡£¡¶²âÆÀ»ã±¨¡·ÏÔʾ£¬½ðÈÚÀí²Æ¡¢ÓÊÏäÔÆÅÌÀàAppÆÀ·ÖÏà¶Ô½ÏµÍ£»ÔÚÍøÂçÓ×ÎÒÐÅÏ¢·½Ã棬10ÀàAppÆÕ±é´æÔÚÉæÏÓ¹ý¶ÈÍøÂçÓ×ÎÒÐÅÏ¢µÄÇé¿ö£»ÔÚÒþÖÔÕþ²ß·½Ã棬47¿îAppÒþÖÔÌõ¿îÄÚÈݲ»´ï±ê£¬ÆäÖÐ34¿îAppûÓÐÒþÖÔÌõ¿î¡£
ÔÎÄÁ´½Ó£º
http://www.cca.org.cn/zxsd/detail/28309.html2¡¢¹¤ÐŲ¿°ä²¼2018ÄêµÚÈý¼¾¶ÈÐÅϢͨѶÐÐÒµÍøÂ簲ȫ¼à¹ÜÇé¿ö´«µÝ
¹¤ÐŲ¿ÍøÂ簲ȫÖÎÀí¾Ö°ä²¼2018ÄêµÚÈý¼¾¶ÈÐÅϢͨѶÐÐÒµÍøÂ簲ȫ¼à¹ÜÇé¿ö´«µÝ£¬µÚÈý¼¾¶ÈµÄÍøÂ簲ȫ×ÜÌåÌ¬ÊÆÔ̺¬£º£¨Ò»£©ÍøÂçÔËÐа²È«ÎÊÌâ͹Æð¡£Èý¼¾¶È£¬¼à²â´ëÖöñÒâÍøÂç×ÊÔ´¡¢¶ñÒⷨʽ¡¢°²È«·ì϶µÈÍøÂ簲ȫÍþвԼ3397Íò¸ö£¬ÆäÖÐWannaCryÀÕË÷²¡¶¾Ï°È¾µÄÉ豸ÿÌìÈԸߴï6000ÖÁ14000̨¡££¨¶þ£©¹¤Òµ»¥ÁªÍø°²È«·çÏÕÐèÒýÆðÆ÷³Á¡£³ÖÐø¼à²âµÄ³Áµã¹¤Òµ»¥ÁªÍøÆ½Ì¨ÖУ¬·¢ÏÖÒÉËÆ·çÏÕ2600Óà¸ö¡££¨Èý£©Í¨Ñ¶ÐÅÏ¢Ú¿ÆÖÎÀíÌ¬ÊÆ×ÜÌå°²ÎÈ¡£Èý¼¾¶È£¬ÊÜÀíÉæÏÓͨѶÐÅÏ¢Ú¿ÆÓû§¾Ù±¨1.4ÍòÓà¼þ´Î£¬»·±È½µÂä4.9%¡£¡°»úƱ¸ÄÇ©¡±¡¢¡°ÒøÐп¨¶³½á¡±¡¢¡°¹ºÎïÍøÕ¾¿Í·þ¡±µÈ³ÉÎªÖØÒªÚ¿ÆÊÖ·¨¡££¨ËÄ£©Òƶ¯Í¨Ñ¶×ªÊÛÆóÒµµç»°Óû§ÊµÃûµÇ¼ÇÕýÈ·ÂÊÎȲ½ÌáÉý¡£
ÔÎÄÁ´½Ó£º
http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057724/n3057728/c6514815/content.html3¡¢´÷¶û±¾Ô³õÔâºÚ¿ÍÈëÇÖ£¬³õ´ëÊ©²é³ÆÎÞÊý¾Ýй¶
´÷¶ûÐû³Æ±¾Ô³õÔâµ½ºÚ¿ÍÈëÇÖ£¬µ«Ã»ÓÐЧ»§Êý¾Ýй¶¡£¸ÃÈëÇÖÊÂÎñ²úÉúÔÚ11ÔÂ9ÈÕ£¬Æ¾¾Ý´÷¶ûµÄ´«µÝ£¬Î´¾ÊÚȨµÄ¹¥»÷ÕßÊÔͼ´ÓÆäϵͳÖÐÇÔÈ¡Dell.comµÄÓû§ÕË»§ÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·ºÍ¹þÏ£ÃÜÂë¡£Ö»¹Ü¹¥»÷ÕßÓпÉÄÜ´Ó´÷¶ûµÄϵͳÖÐɾ³ýÁ˲¿ÃÅ´ËÀàÐÅÏ¢£¬µ«³õ´ëÊ©²éÅúעûÓÐÈκÎÓû§ÐÅÏ¢±»µÁ¡£´÷¶û»Ø¾øÐ¹Â©ÊÜÓ°ÏìµÄÓû§ÊýÁ¿£¬µ«¾ö¶¨¶ÔËùÓеÄDell.comÓû§ÕË»§Ç¿Ôì½øÐÐÃÜÂë³ÁÖá£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/dell-announces-security-breach/4¡¢ÌðÌðȦÁ¬ËøµêDunkin¡¯ DonutsÔâײ¿â£¬²¿ÃÅÓû§ÐÅÏ¢ÒÉй¶
ƾ¾ÝÌðÌðȦÁ¬ËøµêDunkin¡¯ Donuts°ä²¼µÄ֪ͨ£¬10ÔÂ31Èոù«Ë¾Ô⵽ײ¿â¹¥»÷£¬¹ÌÈ»Æä°²È«´ëÊ©×èÖ¹ÁË´ó²¿ÃŹ¥»÷³¢ÊÔ£¬µ«¹¥»÷ÕßÒÀÈ»¿ÉÄܳɹ¦µÇ¼Á˲¿ÃÅÓû§µÄÕË»§¡£¿ÉÄÜй¶µÄÐÅÏ¢Ô̺¬Óû§µÄÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢16λDD PerksÕʺÅÒÔ¼°DD Perks QRÂë¡£¸Ã¹«Ë¾ÒÑÇ¿ÔìËùÓпÉÄÜÊܵ½Ó°ÏìµÄÓû§³ÁÖÃÆäÃÜÂë¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/hackers-breach-dunkin-donuts-accounts-in-credential-stuffing-attack/139472/5¡¢»ùÓÚAutoCADµÄ¼äµý»î¶¯±»·¢ÏÖ£¬ÖØÒªÕë¶ÔÄÜÔ´ÐÐÒµ
°²È«³§ÉÌForcepoint·¢ÏÖÒ»¸öÀûÓûùÓÚAutoCADµÄ¶ñÒâÈí¼þµÄй¤Òµ¼äµý»î¶¯£¬¸Ã»î¶¯×Ô2014ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬Æä2018Äê»î¶¯µÄнüÊܺ¦ÕßÖØÒªÎ»ÓÚÖйú¡¢Ó¡¶È¡¢ÍÁ¶úÆäºÍ°¢ÁªÇõ¡£Forcepoint°µÊ¾¸Ã»î¶¯±³ºóµÄÍŶӿÉÄܼ«¶È¸´ÔÓ£¬¹¥»÷Õ߳ɹ¦µØ¹¥»÷ÁËλÓÚ·ÖÆç¹ú¶È/µØÓòµÄ¶à¸ö¹«Ë¾£¬ÆäÖÐÖÁÉÙÒ»¸ö¹¥»÷»î¶¯ÖØÒªÕë¶ÔÄÜÔ´Òµ£¬ÁíÒ»¸ö¹¥»÷»î¶¯×¨Ò»ÓÚÆû³µÔì×÷Òµ¡£¹¥»÷ÕßÖØÒªÊ¹ÓÃÔ̺¬¶ñÒâAutoCADÎļþ»òÏÂÔØÁ´½ÓµÄÓã²æÊ½´¹µöÓʼþÖ´Ðй¥»÷£¬ÕâЩAutoCADÎļþÖÐÔ̺¬°µ²ØµÄ.fasÄ£¿é£¨ÀàËÆÓÚwordÖеĺ꣩£¬ÓÃÓÚÏνÓÔ¶³ÌC&C²¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-industrial-espionage-campaign-leverages-autocad-based-malware/6¡¢EternalSilence£¬ºÚ¿ÍÀûÓÃUPnProxyÈëÇÖÔ¼4.5Íò·ÓÉÆ÷
°²È«³§ÉÌAkamai·¢ÏÖÒ»¸öÕë¶Ô·ÓÉÆ÷µÄ¶ñÒâ¹¥»÷»î¶¯£¬¸Ã»î¶¯±»³ÆÎªEternalSilence£¨ÓÀºã¹ÑÑÔ£©£¬¹¥»÷ÕßÀûÓöñÒâ´úÀíϵͳUPnProxyϰȾÁËÔ¼4.5Íò¸ö·ÓÉÆ÷£¬²¢Ëæºóͨ¹ýÕâЩ·ÓÉÆ÷µÄ¶Ë¿ÚÈëÇÖÏνӵÄÉ豸£¬AkamaiÒÔΪÒÑÓÐ170ÍòÉ豸Êܵ½Ó°Ïì¡£AkamaiÎÞ·¨Ì½Öª×îÖÕµÄÓÐЧºÉÔØ£¬µ«ºÜ×¢¶¨¹¥»÷ÕßÀûÓÃÁËEternalBlueºÍEternalRed·ì϶¡£´Ë±í£¬Í¨¹ýɨÃèÒ×Êܹ¥»÷µÄUPnP·þÎñ£¬Akamai·¢ÏÖ¹²ÓÐ27.7Íò¸ö·ÓÉÆ÷ÔÚÏß¶³ö¡£ºÃÐÂÎÅÊÇ£¬Õâ²¢²»ÊÇÕë¶ÔÐԵĹ¥»÷£¬¶øÊÇ»úÓöÖ÷Òå¹¥»÷¡£AkamaiÔڻ㱨ÖÐÑÝʾÁËÈôºÎ´ÓÊÜϰȾµÄ·ÓÉÆ÷ÉÑþ³Øý¶ñÒâµÄNATÌõ¿î¡£
ÔÎÄÁ´½Ó£º
https://blogs.akamai.com/sitr/2018/11/upnproxy-eternalsilence.html
ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ