ά»ù°Ù¿ÆÔâDDoS¹¥»÷£¬ÊýÓ×ʱºó¸´Ô£»ºÚ¿ÍÀûÓÃDoS·ì϶µ¼ÖÂÃÀ¹úµçÍø·À»ðǽ·´¸´³ÁÆô
°ä²¼¹¦·ò 2019-09-101.ά»ù°Ù¿ÆÔâDDoS¹¥»÷£¬ÊýÓ×ʱºó¸´Ô
ά»ù°Ù¿ÆÔâ·ê¶ñÒâÍøÂç¹¥»÷µ¼Ö¶à¸ö¹ú¶ÈµÄÍøÕ¾å´»úÏÂÏߣ¬±¾´Î¹¥»÷²úÉúÔÚ9ÔÂ8ÈÕÁ賿2µã×óÓÒ£¬ÖØÒªÊܵ½Ó°ÏìµÄÊÇÅ·ÖÞºÍÖж«Óû§¡£Î¬»ù°Ù¿Æ»ù½ð»á֤ʵÁËÕâ´Î¹¥»÷²¢Í¨ÖªÓû§Æäר¼ÒÒѾÔÚÖÂÁ¦¸´ÔÕý³£ÔËÓª¡£Î¬»ù°Ù¿ÆÃ»Óн«¹¥»÷¹éÒòÓÚÌØ¶¨µÄ¹¥»÷Õߣ¬²¢°µÊ¾²»ÄÜÅųýËü¿ÉÄÜÊDzâÊԿɹ©³ö×âµÄDDoS½©Ê¬ÍøÂç¹¥»÷Á¦µÄʾ·¶ÐÔ¹¥»÷¡£Æ¾¾ÝÀ´×Ô·ÖÆç¹ú¶ÈµÄÓû§µÄ˵·¨£¬ÊýÓ×ʱºóÒѸù»ù¸´ÔÁËÕý³£·þÎñ£¬µ«Î¬»ù°Ù¿ÆÉÐδÕýʽȷÈÏÆëÈ«½â³ý¸ÃÎÊÌ⣬ÊÂÎñËÆºõÈÔÔÚµ÷²éÖС£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/90998/hacking/wikipedia-suffers-ddos-attack.html
2.ºÚ¿ÍÀûÓÃDoS·ì϶µ¼ÖÂÃÀ¹úµçÍø·À»ðǽ·´¸´³ÁÆô
±±ÃÀµçÁ¦¿¿µÃסÐÔ¹«Ë¾£¨NERC£©ÉÏÖܰµÊ¾½ñÄêÔçЩʱ³½Ó°ÏìÃÀ¹úµçÍøÊµÌåµÄÍøÂ簲ȫÊÂÎñ²¢Ã»ÓÐ×î³õÉèÏëµÄÄÇÑùΣÏÕ¡£NERCÔÚÒ»·Ý»ã±¨ÖÐÖ¸³ö£¬ºÚ¿ÍÔÚ2019Äê3ÔÂ5ÈÕÀûÓÃDoS·ì϶µ¼ÖµçÍø·À»ðǽÔÚ10Ó×ʱÄÚ·´¸´³ÁÆô£¬¸ÃÊÂÎñÖ»Ó°ÏìÁËһЩµÍÓ°Ïì¼¶·¢µçÕ¾µãµÄÍøÂç±íΧ·À»ðǽ£¬²¢Ã»ÓÐÔì³ÉµçÁ¦¹©¸øµÄÈκÎÖжϡ£ËæºóµÄ·ÖÎöÈ·¶¨³ÁÆôÊÇÓÉÀûÓÃÒÑÖª·À»ðǽ·ì϶µÄ±í²¿ÊµÌåÌáÒéµÄ£¬ÔËÓªÉÌ×îÖÕ·¢ÏÖËûÃÇδÄÜΪÊܵ½¹¥»÷µÄ·À»ðǽÀûÓù̼þ¸üУ¬ÔÚ²Ù×÷Ô±²¿ÊðÊʵ±µÄ²¹¶¡ºó£¬·À»ðǽ²»ÔÙ³ÁÆô¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cyber-security-incident-at-us-power-grid-entity-linked-to-unpatched-firewalls/
3.Telestar±»ÆØTelnetºóÃÅ·ì϶ӰÏì100¶àÍòIoTÉ豸
±¾ÖÜÒ»Vulnerability-Lab×êÑÐÔ±Benjamin KunzÅû¶Telestar Digital GmbHÎÞÏßµçIoTÉ豸ÖеÄÁ½¸öÑϳÁ·ì϶£¨CVE-2019-13473ºÍCVE-2019-13474£©£¬¿ÉÔÊÐí¹¥»÷ÕßÔ¶³Ì½Ù³Öϵͳ¡£ÊÜÓ°ÏìµÄÉ豸Ô̺¬¸Ã¹«Ë¾µÄImperial£¦DabmanϵÁвúÆ·£¬ÆäÖÐÔ̺¬±ãЯʽÊÕÒô»úºÍDABÁ¢ÌåÉùϵͳ¡£ÕâЩ²úÆ·ÖØÒªÔÚÅ·ÖÞÏúÊÛ£¬»ùÓÚBusyBox Linux Debian²¢ÀûÓÃÀ¶ÑÀºÍ»¥ÁªÍøÏνӡ£Kunz·¢ÏÖÕâЩÉ豸ÔÚ23¶Ë¿ÚÉÏÆôÓÃÁËTelnet·þÎñ£¬µ«Ã»ÓÐÎĵµ¼Í¼£¬ÓÉÓÚѡȡÁËÈõÃÜÂ룬×êÑÐÍŶÓÄܹ»ÔÚ10·ÖÖÓÄÚ»ñÈ¡root½Ó¼ûȨÏÞ¡£×êÑÐÈËÔ±³Æ¿ÉÄÜÓг¬¹ý100Íǫ̀Éè±¸Ãæ¶Ô·çÏÕ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/critical-vulnerabilities-impact-over-a-million-iot-radio-devices/
4.Facebook½¨¸´HHVM·þÎñÆ÷ÖеÄÐÅϢй¶/DoS·ì϶
Facebook½¨¸´Æä·þÎñÆ÷ÀûÓ÷¨Ê½ÖеÄÁ½¸ö¸ßΣ·ì϶£¬ÕâЩ·ì϶¿ÉÄÜÔÊÐíÔ¶³Ì¹¥»÷Õß½öͨ¹ýÉÏ´«¶ñÒâ»ú¹ØµÄJPEGͼÏñÎļþÀ´Î´ÊÚȨ»ñÈ¡Ãô¸ÐÐÅÏ¢»òµ¼Ö»ؾø·þÎñ¡£·ì϶´æÔÚÓÚHHVM£¨HipHopÐé¹¹»ú£©ÖУ¬ÓÉÓÚ¸ÃÀûÓ÷¨Ê½ÊÇ¿ªÔ´ÇÒÃâ·ÑµÄ£¬Òò¶øÆäËüʹÓÃHHVMµÄÍøÕ¾¿ÉÄÜÒ²ÊÜÓ°Ï죬Ô̺¬Wikipedia¡¢BoxµÈ£¬ÓÈÆäÊÇÄÇЩÔÊÐíÓû§ÔÚ·þÎñÆ÷ÉÏÉÏ´«Í¼ÏñµÄÍøÕ¾¡£ÕâÁ½¸ö·ì϶Ô̺¬£ºCVE-2019-11925£¬HHVMµÄGDÀ©´óÖд¦ÖÃJPEG APP12¿éÏóÕ÷ʱÌìǵ²é³²»¼°£¬¿Éµ¼Ö½ӼûÔ½½çÄڴ棻CVE-2019-11926£¬ÔÚGDÀ©´óÖд¦ÖÃÀ´×ÔJPEG±êÍ·µÄM_SOFxÏóÕ÷ʱÌìǵ²é³²»¼°£¬¿Éµ¼Ö½ӼûÔ½½çÄÚ´æ¡£½¨ÒéÓû§¾¡¿ì¸üе½×îа汾¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/09/facebook-hhvm-vulnerability.html
5.ÃÀ¹úÍøÂç˾ÁÏòVirusTotalÉÏ´«11¸ö¶ñÒâÈí¼þÑù±¾
ÃÀ¹úÍøÂç˾Á£¨USCYBERCOM£©ÏòVirusTotalÉÏ´«ÁË11¸ö¶ñÒâÈí¼þÑù±¾£¬ËùÓÐÕâЩÑù±¾¶¼Ó볯ÏÊAPT×éÖ¯LazarusÓйء£½«¶ñÒâÑù±¾¹²Ïí¸øÐÅÏ¢°²È«ÉçÇøÊÇUSCYBERCOMÍøÂç¹ú¶ÈʹÃü¶ÓÁУ¨CNMF£©·¢Õ¹µÄÏîÖ÷ÕÅÒ»²¿ÃÅ£¬¸ÃÏîÄ¿ÓÚ2018Äê11ÔÂÆô¶¯¡£Õâ11¸öÑù±¾ÖдóÎÞÊý¶¼ÒÔ32λϵͳ×÷Ϊָ±ê£¬Ñù±¾²¢²»ÊÇ×îÐµģ¬ÆäÖÐ10¸öÊÇ2017Äê´´½¨µÄ£¬µÚ11¸öÊÇÔÚ2018Äê2Ô´´½¨µÄ¡£´óÎÞÊýÑù±¾Ò²Óë¶ñÒâ»î¶¯Operation GhostSecretÓйأ¬ÕâÊÇÒ»¸öÐÅÏ¢ÇÔÈ¡¹¥»÷»î¶¯£¬McAfeeÓÚ2018Äê4Ô½«Æä¹é×ïÓÚLazarus¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/cyber-command-virus-total-north-korean-malware/
6.¶ñÒâ¸æ°×ÀûÓÃ4¸öEKÏòWindowsÓû§·Ö·¢ÀÕË÷Èí¼þ
°²È«×êÑÐÔ±nao_secÔÚÖÜÄ©ÖÁÖÜÒ»ÆÚ¼ä·¢ÏÖ4¸ö·ÖÆçµÄ¶ñÒâ¸æ°×»î¶¯ÀûÓÃEKÏòÓû§·Ö·¢ÀÕË÷Èí¼þ¡¢Ä¾Âí¡¢¼ôÌù°å½Ù³Ôì÷µÈ¡£ÖÜÁùnao_sec¹Û²ìµ½GrandSoft EKÔÚ·Ö·¢ÒøÐÐľÂíRamnit£¬ÖÜÈÕRig EKÀûÓÃCVE-2018-15982£¨Flash Player£©¡¢CVE-2018-8174£¨Microsoft IE VBScriptÒýÇæ£©µÈ·ì϶·Ö·¢¼ôÌù°å½Ù³Ôì÷¼°AmadeyľÂí¡£´Ë±í£¬ÖÜÒ»Fallout EKÀûÓÃÒ»ÑùµÄ·ì϶·Ö·¢¼ôÌù°å½Ù³Ôì÷£¬¶øRadio EKÔòÔÚÍÆ¶¯×°ÖÃÀÕË÷Èí¼þNemty¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/exploit-kits-target-windows-users-with-ransomware-and-trojans/


¾©¹«Íø°²±¸11010802024551ºÅ