ÒÁÀʺڿÍÀûÓÃVPNÈí¼þ·ì϶¹¥»÷È«ÇòµÄÆóÒµºÍµ±¾Ö»ú¹¹£»¼ÓÄôó²¿Ãŵ±²¿ÃÅÃÅ´ÓǰÁ½Äê²úÉúÊý¾Ýй¶ÊÂÎñ7992Æð
°ä²¼¹¦·ò 2020-02-181.ÒÁÀʺڿÍÀûÓÃVPNÈí¼þ·ì϶¹¥»÷È«ÇòµÄÆóÒµºÍµ±¾Ö»ú¹¹
ƾ¾Ý°²È«³§ÉÌClearSkyµÄÒ»·Ý»ã±¨£¬ÒÁÀʺڿÍÒ»ÏòÔÚÀûÓÃVPNÈí¼þÖеķì϶ÔÚÊÀ½ç¸÷µØµÄ¹«Ë¾ÖÐÖ²ÈëºóÃÅ£¬ÆäÖ¸±êº¸ÇIT¡¢µçÐÅ¡¢Ê¯ÓͺÍÌìÈ»Æø¡¢º½¿Õ¡¢°²È«ÁìÓòµÄ¹«Ë¾ºÍµ±¾Ö»ú¹¹¡£ÒÁÀʺڿÍÒѽ«Pulse Secure¡¢Fortinet¡¢Palo Alto NetworksºÍCitrixµÄVPN¶¨Î»ÎªÈëÇÖ´óÐ͹«Ë¾µÄ¹¤¾ß£¬ÆäÀûÓõķì϶Ô̺¬Pulse Secure VPN(CVE-2019-11510)¡¢Fortinet FortiOS VPN(CVE-2018-13379)¡¢Palo Alto Networks VPN(CVE-2019-1579)ÒÔ¼°Citrix VPN(CVE-2019-19781)µÈ¡£¶ÔÕâЩϵͳµÄ¹¥»÷ʼÓÚÈ¥ÄêÏÄÌ죬µ«µ½2020ÄêÕâÖÖ¹¥»÷ÈÔÔÚ³ÖÐø¡£ClearSky»ã±¨Ç¿µ÷£¬¶ÔÈ«ÇòVPN·þÎñÆ÷µÄ¹¥»÷ËÆºõÊÇÖÁÉÙÈý¸öÒÁÀʺڿÍ×éÖ¯µÄ¹¤×÷£¬Ô̺¬APT33¡¢APT34ºÍAPT39¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/iranian-hackers-have-been-hacking-vpn-servers-to-plant-backdoors-in-companies-around-the-world/
2.¼ÓÄôó²¿Ãŵ±²¿ÃÅÃÅ´ÓǰÁ½Äê²úÉúÊý¾Ýй¶ÊÂÎñ7992Æð
ƾ¾Ý¼ÓÄôó¹ã²¥¹«Ë¾£¨CBC£©µÄ±¨Â·£¬¼ÓÄôóµÄһЩµ±²¿ÃÅÃźͻú¹¹ÔÚ´ÓǰÁ½ÄêÖоÀúÁË7992ÆðÊý¾Ýй¶ÊÂÎñ£¬·çÏÕÁË14.4Íò¹«ÃñµÄÒþÖÔÐÅÏ¢¡£¼ÓÄôó˰Îñ¾Ö£¨CRA£©ÊDzúÉúÊý¾Ýй¶ÊÂÎñ×î¶àµÄ»ú¹¹£¬Éæ¼°3020ÆðÊÂÎñ£¬²¨¼°5.9Íò¹«Ãñ¡£CRA½«ÊÂÎñ²úÉúµÄÔÒò¹é×ïΪ´¹µöÓʼþ¡¢°²È«ÊÂÎñÒÔ¼°Ô±¹¤ÐÐΪ²»µ±¡£Æä´ÎÊǼÓÄôóÎÀÉú²¿£¬ËüÓë122ÆðÊÂÎñÓйأ¬Ó°ÏìÁË23894ÈË¡£CBC×ÔÉíÅÅÃûµÚÈý£¬¹²ÓÐ17ÆðÊÂÎñ£¬Ó°ÏìÁË20129ÃûÔ±¹¤¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/report-shows-personal-info-on-144k-canadians-breached-by-federal-entities/
3.°ÂµØÀû±í½»²¿Ðû³ÆÕë¶ÔÆäϵͳµÄÍøÂç¹¥»÷ÒÑʵÏÖ
°ÂµØÀû±í½»²¿°ä·¢£¬¾Ý³ÆÓɹú¶ÈÐÐΪÕßÌáÒéµÄÕë¶ÔÆäϵͳµÄÍøÂç¹¥»÷ÒѾʵÏÖ¡£Ò»Ô³õ°ÂµØÀû±í½»²¿°ä·¢Ôâµ½¡°ÑϳÁµÄÍøÂç¹¥»÷¡±£¬²¢Çҳơ°ÓÉÓÚ¹¥»÷µÄÑϳÁÐÔºÍÐÔÖÊ£¬²»ÄÜÅųýÕâÊǹú¶ÈÐÐΪÕßµÄÕë¶ÔÐÔ¹¥»÷¡£Ö»¹Ü²ÉÈ¡ÁËËùÓÐÑϸñµÄ°²È«´ëÊ©£¬µ«ÈÔûÓÐ100£¥µÄ·À»¤´ëÊ©À´·À±¸ÍøÂç¹¥»÷¡£¡±¹¥»÷²úÉúÔÚ1ÔÂ4ÈÕÐÇÆÚÁùÍíÉÏ£¬²¢Ñ¸¿ì±»·¢ÏÖ¡£±¾µØ±¨Â·ÏÔʾ¹¥»÷Õë¶ÔµÄÊǸò¿ÃŵÄIT»ù´¡¼Ü¹¹¡£°ÂµØÀû±í½»²¿ÉÏÖܰ䷢£¬¶ÔÆäϵͳµÄÍøÂç¹¥»÷ÒѾʵÏÖ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/97879/intelligence/austrias-foreign-ministry-attack.html
4.Ó¢¸ñÀ¼´¦Ëùµ±¾ÖRedcar CouncilÒÉÔâÀÕË÷Èí¼þ¹¥»÷
Ó¢¸ñÀ¼¶«±±²¿µÄµÂ¿¨ºÍ¿ËÀû·òÀ¼×ÔÖÎÊÐÕò£¨Redcar£¦Cleveland Borough Council£©ÒÉÔâÀÕË÷Èí¼þ¹¥»÷£¬Ê¹µÃ13.5Íò±¾µØ¾ÓÃñÔÚÒ»ÖܶàµÄ¹¦·òÄÚÎÞ·¨Ê¹ÓÃÔÚÏß¹«¹²·þÎñ£¬Ô̺¬ÍøÉÏÔ¤Ô¼¡¢Éç»á¹ØÇÐϵͳ¡¢×¡·¿Í¶Ëߵȣ¬µ«Ë°¿îÖ§¸¶ÏµÍ³Î´ÊÜÓ°Ïì¡£Ö»¹Ü¸ÃÕò»Ø¾øÈ·ÈϺڿ͹¥»÷µÄÐÔÖÊ£¬µ«Õâ´Î¹¥»÷ÓµÓÐÀÕË÷Èí¼þ¹¥»÷µÄËùÓÐÌØµã¡£NCSCµÄר¼ÒÔÚÏòÆäÌṩ֧³Ö¡£¸ÃÕò»¹³ÆÄ¿Ç°ÉÐÎÞÖ¤¾ÝÅú×¢ÓÐÈκÎÊý¾ÝÃÔʧ¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/cyber-attack-takes-down-redcar/
5.Ó¢¹ú·´Ð˷ܼÁ»ú¹¹ÔÚ2019ÄêQ4ÊÕµ½³¬¹ý1.1Íò·âÀ¬»øÓʼþ
ƾ¾Ý×îеÄÐÅÏ¢×ÔÓÉ£¨FOI£©Êý¾Ý£¬Ó¢¹úµÄ·´Ð˷ܼÁ»ú¹¹£¨UKAD£©ÔÚ2019ÄêµÄ×îºóÈý¸öÔÂÖÐÊÕµ½1.1Íò·âÀ¬»øÓʼþ£¬ÆäÖг¬¹ýÎå·ÖÖ®Ò»£¨21£¥£©µÄÓʼþΪ´¹µöÓʼþ£¬¶øÔ̺¬¶ñÒâÈí¼þµÄÓʼþÊýÁ¿Ôò´Ó10ÔµÄ4¸öÔö³¤µ½12ÔµÄ41¸ö£¬Õû¸ö¼¾¶È×ܼÆ52¸ö¡£ÐÒÔ˵ÄÊÇ£¬UKADÒÔΪËùÓй¥»÷³¢ÊÔ¶¼Ã»Óгɹ¦£¬µ«Ëü×¢¶¨»á³ÉΪ¹ú¶ÈÔÞÖúµÄ¹¥»÷ÕßµÄÖ¸±ê¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/uk-antidoping-agency-11000
6.LokiBotľÂí¼Ù×°³ÉEpic GamesÓÎÏ·×°Ö÷¨Ê½´«²¼
Ç÷Ïò¿Æ¼¼½üÈÕ¼ì²âµ½LokiBotľÂíµÄÒ»¸öбäÌ壬¸Ã±äÌå¼Ù×°³ÉEpic GamesÉ̵êµÄÓÎÏ·×°Ö÷¨Ê½À´´«²¼¡£¸ÃαÔìµÄ×°Ö÷¨Ê½ÊÇʹÓÃNSIS£¨Nullsoft¾ç±¾×°ÖÃϵͳ£©¹¤¾ß¹¹½¨µÄ£¬ÆäʹÓÃÁËEpic GamesµÄlogoÀ´ÓÕÆÓû§ÔËÐС£Ö´Ðк󣬸÷¨Ê½»áÔÚÊÜÓ°ÏìÍÆËã»úµÄ¡°£¥AppData£¥Ä¿Â¼¡±ÖпªÊÍÁ½¸öÎļþ£ºC#Ô´´úÂëÎļþºÍ.NET¿ÉÖ´ÐÐÎļþ¡£¶øºó£¬.NET¿ÉÖ´ÐÐÎļþ½«¶ÁÈ¡²¢±àÒëC#´úÂëÎļþ£¬Å²ÓÃÆäÖеĺ¯Êý¼ÓÔØÇ¶ÈëÆäÖеļÓÃÜ»ã±à´úÂ룬×îÖÕÖ´ÐÐLokiBot¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/lokibot-impersonates-popular-game-launcher-and-drops-compiled-c-code-file/


¾©¹«Íø°²±¸11010802024551ºÅ