¹¤ÐŲ¿¾Í¡¶¹¤Òµ»¥ÁªÍøÆóÒµÍøÂ簲ȫ·ÖÀà·Ö¼¶Ö¸ÄÏ£¨ÊÔÐУ©¡·Õ÷Ç󶨼û£»MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷Ïò

°ä²¼¹¦·ò 2019-12-19


1.¹¤ÐŲ¿¾Í¡¶¹¤Òµ»¥ÁªÍøÆóÒµÍøÂ簲ȫ·ÖÀà·Ö¼¶Ö¸ÄÏ£¨ÊÔÐУ©¡·Õ÷Ç󶨼û


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾Ý¹¤ÐŲ¿¹ÙÍø£¬Îª¹á³¹Âäʵ¡¶¼ÓÇ¿¹¤Òµ»¥ÁªÍø°²È«¹¤×÷µÄÁìµ¼¶¨¼û¡·£¬Íƶ¯¹¤Òµ»¥ÁªÍø°²È«ÔðÈÎÂäʵ£¬¶Ô¹¤Òµ»¥ÁªÍøÆóÒµÍøÂ簲ȫִÐзÖÀà·Ö¼¶ÖÎÀí£¬ÌáÉý¹¤Òµ»¥ÁªÍø°²È«±£ÏÕÄÜÁ¦ºÍˮƽ£¬¹¤ÐŲ¿×êÑвÝÄâÁË¡¶¹¤Òµ»¥ÁªÍøÆóÒµÍøÂ簲ȫ·ÖÀà·Ö¼¶Ö¸ÄÏ£¨ÊÔÐУ©¡·£¨Õ÷Ç󶨼û¸å£©¡£ÏÖÏòÉç»á¹«¿ªÕ÷Ç󶨼û¡£¹¤ÐŲ¿°µÊ¾£¬ÓÐÈýÀàÆóÒµºÏÓÃÓÚ±¾Ö¸ÄÏ£º1. ÀûÓù¤Òµ»¥ÁªÍøµÄ¹¤ÒµÆóÒµ£»2. ¹¤Òµ»¥ÁªÍøÆ½Ì¨ÆóÒµ£¨ÖØÒªÖ¸¶Ô±íÌṩ¹¤Òµ»¥ÁªÍøÆ½Ì¨µÈ»¥ÁªÍøÐÅÏ¢·þÎñµÄÆóÒµ£©£»3. ¹¤Òµ»¥ÁªÍø»ù´¡ÉèÊ©ÔËÓªÆóÒµ£¬ÖØÒªÔ̺¬»ù´¡µçÐÅÔËÓªÆóÒµºÍ±êʶ½âÎöϵͳ½¨ÉèÔËÓª»ú¹¹¡£´Ë±í£¬¹¤ÐŲ¿°µÊ¾£¬±¾´ÎÖ¸Äϵĸù»ù×¼ÔòÔ̺¬£ºÆóÒµ·Ö¼¶ÓëÐÐÒµÍøÂ簲ȫӰÏìˮƽÓйØÁª¡¢ÐÐÒµÁìµ¼Óë´¦Ëù¼à¹ÜÏà½áºÏ¡¢ÆóÒµ×ÔÆÀÓëÊôµØºË²éÏà½áºÏµÈ¡£


  Ô­ÎÄÁ´½Ó£º

http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057724/n3057728/c7571643/content.html


2.IMGEÒâ±íй¶6000¶àÃû²¨Òô¹«Ë¾Ô±¹¤ÐÅÏ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾ÝThe Daily Beast±¨Â·£¬×ܲ¿Î»ÓÚ»ªÊ¢¶ÙÌØÇøµÄÊý×ÖÕ÷ѯ¹«Ë¾IMGEÒâ±íй¶ÁË6000¶àÃû²¨ÒôÔ±¹¤µÄÐÕÃû¡¢µç»°ºÅÂë¡¢¼ÒͥסËùºÍµç×ÓÓʼþµØÖ·µÈÐÅÏ¢¡£ÊÜÓ°ÏìµÄÈËÔ±Ô̺¬µ±¾ÖÓйØÈËÔ±ºÍ¸ß¼¶ÖÎÀíÈËÔ±£¬ÉõÖÁÔ̺¬ÔÚ¹ú·À³Ð°üÉ̵ĸ߼¶Ô­ÐÍÉè¼Æ²¿Ãʤ×÷µÄ¸ßÃô¸ÐÐÔ¼¼ÊõÈËÔ±¡£²¨Òô½²»°È˰µÊ¾ÕâЩÐÅÏ¢ÊÇÓÉÍøÕ¾¹©¸øÉ̵ı¨´ðÃýÎóµ¼ÖµÄ£¬²¨Òô¹«Ë¾µ±Õæ¶Ô´ýÍøÂ簲ȫºÍÓû§ÒþÖÔ£¬ÒªÇ󹩸øÉ̱£»¤Î¯ÍиøËûÃǵÄÊý¾Ý£¬²¨ÒôÔÚÇ×êǼලÇé¿öÒÔÈ·±£ÎÊÌⱻѸ¿ì½â¾ö¡£


 Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cloud-data-leak-thousands/


3.±¾Ìïй¶Լ2.6Íò±±ÃÀ¿Í»§µÄÓ×ÎÒÐÅÏ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÚ10ÔÂ21ÈÕÃýÎóÅäÖÃÆäElasticsearch¼¯Èººó£¬Æû³µ¾ÞÍ·±¾Ìïй¶ÁËԼĪ2.6Íò±±ÃÀ³µÖ÷µÄÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡£Êý¾Ý¿âÖеļͼÔ̺¬¿Í»§µÄÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢ÓʼĵØÖ·¡¢³µÁ¾Ðͺš¢VIN¡¢ºÍ̸IDÒÔ¼°¸÷Àà±¾Ìï³µÁ¾µÄ·þÎñÐÅÏ¢µÈ¡£±¾ÌïÔÚÒ»·ÝÉêÃ÷ÖаµÊ¾£¬ÓÐÎÊÌâµÄÊý¾Ý¿âÊÇÓÃÓÚ´¦ÖÃпͻ§×¢²áºÍÄÚ²¿ÈÕÖ¾µÄ±±ÃÀÔ¶³ÌÐÅÏ¢´¦Ö÷þÎñµÄÊý¾Ý¼Í¼ºÍ¼à¿Ø·þÎñÆ÷¡£ÊÂÎñÖÐûÓÐÓ°Ïì¿Í»§µÄ²ÆÕþÐÅÏ¢¡¢ÐÅÓþ¿¨Êý¾Ý»òÍ´´¦¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/honda-exposes-26-000-records-of-north-american-customers/


4.Gangnam Industrial Style¶Ô×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


CyberXÍþв×êÑÐÓ××éSection 52ÅûÂ¶ÖØÒªÕë¶Ô¹¤Òµ¡¢¹¤³ÌºÍÔì×÷ÆóÒµµÄAPT¹¥»÷»î¶¯£¬¸Ã¹¥»÷ÍŻﱻ³ÆÎªGangnam Industrial Style£¬Ä¿Ç°ÒÑÓÐÖÁÉÙ200¼Ò¹«Ë¾³ÉΪÊܺ¦Õß¡£Ö»¹Ü´óÎÞÊýÊܺ¦ÕßλÓÚº«¹ú£¬µ«Ô̺¬ÈÕ±¾¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢¶ò¹Ï¶à¶ûºÍÓ¢¹úÔÚÄڵĺܶà¹ú¶ÈµÄ¹«Ë¾¶¼Êܵ½Ó°Ïì¡£¹¥»÷ÕßÖØÒªÍ¨¹ý´¹µöÓʼþÌáÒé¹¥»÷£¬ÕâЩÓʼþµÄÖ÷Ìâ/¸½¼þÓ빤ҵÓйØ£¬Ô̺¬°×ƤÊé¡¢µç³§Ê¾ÒâͼÒÔ¼°¶ÔÉè¼ÆÉèÊ©£¨ÈçÌìÈ»Æø´¦Öúͳö²ú×°Ö㩵ı¨¼ÛÒªÇóµÈ¡£¹¥»÷ÕßʹÓõĶñÒâÈí¼þÖØÒªÎªSeparµÄ±äÖÖ£¬Separ¿ÉÇÔÈ¡Firefox¡¢ChromeºÍSafari´æ´¢µÄÃÜÂëÒÔ¼°´ÓGmail¡¢Yahoo¡¢Windows LiveºÍHotmailÖÐÇÔÈ¡ÓʼþÕË»§µÄÍ´´¦¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/south-korean-industrial-giants-slammed-in-new-info-stealing-hacker-campaign/


5.LazarusÀûÓÃDacls RAT·¢Õ¹Ð¹¥»÷»î¶¯


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖÒ»¸öÃûΪDaclsµÄжñÒâÈí¼þ£¬¸Ã¶ñÒâÈí¼þ¿ÉÕë¶ÔWindowsºÍLinuxÉ豸£¬²¢ÇÒÓëAPT×éÖ¯Lazarus GroupÓйØ¡£ÕâÊÇLazarus³õ´ÎÕë¶ÔLinuxƽ̨£¬×êÑÐÈËÔ±°µÊ¾Ä¿Ç°Òµ½ç´Óδ¹«¿ª¹ýLazarus GroupÕë¶ÔLinuxƽ̨µÄ¹¥»÷Ñù±¾ºÍ°¸Àý¡£DaclsÊÇÄ£¿é»¯µÄ¶ñÒâÈí¼þ£¬Ê¹ÓÃTLSºÍRC4Ë«²ã¼ÓÃÜÀ´±£»¤ÆäºÅÁîºÍ½ÚÔ죨C2£©Í¨Ñ¶Í¨Â·£¬²¢Ê¹ÓÃAES¼ÓÃÜÆäÅäÖÃÎļþ£¬²¢ÇÒ»¹ÓµÓÐC2Ö¸Á̬¸üÐÂÖ°ÄÜ¡£¸ÃRAT»¹ÓµÓз´ÏòP2P²å¼þ£¬ÓÃÓÚ³äÈÎC2ÏνӵĴúÀíÒÔÔ¤·ÀÖ±½ÓÏνӵ½Æä»ù´¡ÉèÊ©¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-linux-windows-with-new-dacls-malware/


6.MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷Ïò


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝMalwarebytesµÄ×îл㱨£¬MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷Ïò¡£Ö»¹Ü´«Í³¸ÅÏëÒÔΪMacÊܵ½µÄϰȾҪ±ÈWindows PCÉٵö࣬µ«2019ÄêMalwarebytesµÄÒ£²âÊý¾ÝÅú×¢MacÍþв¼ì²âÊýÁ¿³öÏÖÁ˾ªÈ˵ÄÉÏÉýÇ÷Ïò¡£ÔÚËùÓÐÆ½Ì¨£¨Windows PC¡¢MacºÍAndroid£©ÉϵÄÍþв¼ì²âÅÅÐаñ£¨Top25£©ÖУ¬ÓÐ6¸öÊÇMacÍþв£¬×ÜÌå¶øÑÔ£¬MacÍþвռ×ܼìÕÉÁ¿µÄ16£¥ÒÔÉÏ¡£Ë¼¿¼µ½MalwarebytesµÄMacÓû§ÈºÔ¼ÄªÊÇWindowsÓû§ÈºµÄ1/12£¬ÕâÒ»Êý×ÖÔ½·¢ÏÔÖø¡£ÔÚ2019Äêµ¥¸öÍÆËã»úÉϵÄÍþв¼ì²âÊýÁ¿ÖУ¬Windows PCΪ¾ùÔÈ4.2´Î£¬¶øMacÓû§Îª¾ùÔÈ9.8´Î£¬ÊÇWindowsÓû§µÄÁ½±¶¡£


 Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/mac/2019/12/mac-threat-detections-on-the-rise-in-2019/