ÒÁÀʺڿÍÀûÓÃVPNÈí¼þ·ì϶¹¥»÷È«ÇòµÄÆóÒµºÍµ±¾Ö»ú¹¹£»¼ÓÄôó²¿Ãŵ±²¿ÃÅÃÅ´ÓǰÁ½Äê²úÉúÊý¾Ýй¶ÊÂÎñ7992Æð

°ä²¼¹¦·ò 2020-02-18

1.ÒÁÀʺڿÍÀûÓÃVPNÈí¼þ·ì϶¹¥»÷È«ÇòµÄÆóÒµºÍµ±¾Ö»ú¹¹


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý°²È«³§ÉÌClearSkyµÄÒ»·Ý»ã±¨ £¬ÒÁÀʺڿÍÒ»ÏòÔÚÀûÓÃVPNÈí¼þÖеķì϶ÔÚÊÀ½ç¸÷µØµÄ¹«Ë¾ÖÐÖ²ÈëºóÃÅ £¬ÆäÖ¸±êº­¸ÇIT¡¢µçÐÅ¡¢Ê¯ÓͺÍÌìÈ»Æø¡¢º½¿Õ¡¢°²È«ÁìÓòµÄ¹«Ë¾ºÍµ±¾Ö»ú¹¹¡£ÒÁÀʺڿÍÒѽ«Pulse Secure¡¢Fortinet¡¢Palo Alto NetworksºÍCitrixµÄVPN¶¨Î»ÎªÈëÇÖ´óÐ͹«Ë¾µÄ¹¤¾ß £¬ÆäÀûÓõķì϶Ô̺¬Pulse Secure VPN(CVE-2019-11510)¡¢Fortinet FortiOS VPN(CVE-2018-13379)¡¢Palo Alto Networks VPN(CVE-2019-1579)ÒÔ¼°Citrix VPN(CVE-2019-19781)µÈ¡£¶ÔÕâЩϵͳµÄ¹¥»÷ʼÓÚÈ¥ÄêÏÄÌì £¬µ«µ½2020ÄêÕâÖÖ¹¥»÷ÈÔÔÚ³ÖÐø¡£ClearSky»ã±¨Ç¿µ÷ £¬¶ÔÈ«ÇòVPN·þÎñÆ÷µÄ¹¥»÷ËÆºõÊÇÖÁÉÙÈý¸öÒÁÀʺڿÍ×éÖ¯µÄ¹¤×÷ £¬Ô̺¬APT33¡¢APT34ºÍAPT39¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/iranian-hackers-have-been-hacking-vpn-servers-to-plant-backdoors-in-companies-around-the-world/


2.¼ÓÄôó²¿Ãŵ±²¿ÃÅÃÅ´ÓǰÁ½Äê²úÉúÊý¾Ýй¶ÊÂÎñ7992Æð


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý¼ÓÄôó¹ã²¥¹«Ë¾£¨CBC£©µÄ±¨Â· £¬¼ÓÄôóµÄһЩµ±²¿ÃÅÃźͻú¹¹ÔÚ´ÓǰÁ½ÄêÖо­ÀúÁË7992ÆðÊý¾Ýй¶ÊÂÎñ £¬·çÏÕÁË14.4Íò¹«ÃñµÄÒþÖÔÐÅÏ¢¡£¼ÓÄôó˰Îñ¾Ö£¨CRA£©ÊDzúÉúÊý¾Ýй¶ÊÂÎñ×î¶àµÄ»ú¹¹ £¬Éæ¼°3020ÆðÊÂÎñ £¬²¨¼°5.9Íò¹«Ãñ¡£CRA½«ÊÂÎñ²úÉúµÄÔ­Òò¹é×ïΪ´¹µöÓʼþ¡¢°²È«ÊÂÎñÒÔ¼°Ô±¹¤ÐÐΪ²»µ±¡£Æä´ÎÊǼÓÄôóÎÀÉú²¿ £¬ËüÓë122ÆðÊÂÎñÓйØ £¬Ó°ÏìÁË23894ÈË¡£CBC×ÔÉíÅÅÃûµÚÈý £¬¹²ÓÐ17ÆðÊÂÎñ £¬Ó°ÏìÁË20129ÃûÔ±¹¤¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/report-shows-personal-info-on-144k-canadians-breached-by-federal-entities/


3.°ÂµØÀû±í½»²¿Ðû³ÆÕë¶ÔÆäϵͳµÄÍøÂç¹¥»÷ÒÑʵÏÖ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°ÂµØÀû±í½»²¿°ä·¢ £¬¾Ý³ÆÓɹú¶ÈÐÐΪÕßÌáÒéµÄÕë¶ÔÆäϵͳµÄÍøÂç¹¥»÷ÒѾ­ÊµÏÖ¡£Ò»Ô³õ°ÂµØÀû±í½»²¿°ä·¢Ôâµ½¡°ÑϳÁµÄÍøÂç¹¥»÷¡± £¬²¢Çҳơ°ÓÉÓÚ¹¥»÷µÄÑϳÁÐÔºÍÐÔÖÊ £¬²»ÄÜÅųýÕâÊǹú¶ÈÐÐΪÕßµÄÕë¶ÔÐÔ¹¥»÷¡£Ö»¹Ü²ÉÈ¡ÁËËùÓÐÑϸñµÄ°²È«´ëÊ© £¬µ«ÈÔûÓÐ100£¥µÄ·À»¤´ëÊ©À´·À±¸ÍøÂç¹¥»÷¡£¡±¹¥»÷²úÉúÔÚ1ÔÂ4ÈÕÐÇÆÚÁùÍíÉÏ £¬²¢Ñ¸¿ì±»·¢ÏÖ¡£±¾µØ±¨Â·ÏÔʾ¹¥»÷Õë¶ÔµÄÊǸò¿ÃŵÄIT»ù´¡¼Ü¹¹¡£°ÂµØÀû±í½»²¿ÉÏÖܰ䷢ £¬¶ÔÆäϵͳµÄÍøÂç¹¥»÷ÒѾ­ÊµÏÖ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/97879/intelligence/austrias-foreign-ministry-attack.html


4.Ó¢¸ñÀ¼´¦Ëùµ±¾ÖRedcar CouncilÒÉÔâÀÕË÷Èí¼þ¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¢¸ñÀ¼¶«±±²¿µÄµÂ¿¨ºÍ¿ËÀû·òÀ¼×ÔÖÎÊÐÕò£¨Redcar£¦Cleveland Borough Council£©ÒÉÔâÀÕË÷Èí¼þ¹¥»÷ £¬Ê¹µÃ13.5Íò±¾µØ¾ÓÃñÔÚÒ»ÖܶàµÄ¹¦·òÄÚÎÞ·¨Ê¹ÓÃÔÚÏß¹«¹²·þÎñ £¬Ô̺¬ÍøÉÏÔ¤Ô¼¡¢Éç»á¹ØÇÐϵͳ¡¢×¡·¿Í¶ËßµÈ £¬µ«Ë°¿îÖ§¸¶ÏµÍ³Î´ÊÜÓ°Ïì¡£Ö»¹Ü¸ÃÕò»Ø¾øÈ·ÈϺڿ͹¥»÷µÄÐÔÖÊ £¬µ«Õâ´Î¹¥»÷ÓµÓÐÀÕË÷Èí¼þ¹¥»÷µÄËùÓÐÌØµã¡£NCSCµÄר¼ÒÔÚÏòÆäÌṩ֧³Ö¡£¸ÃÕò»¹³ÆÄ¿Ç°ÉÐÎÞÖ¤¾ÝÅú×¢ÓÐÈκÎÊý¾ÝÃÔʧ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cyber-attack-takes-down-redcar/


5.Ó¢¹ú·´Ð˷ܼÁ»ú¹¹ÔÚ2019ÄêQ4ÊÕµ½³¬¹ý1.1Íò·âÀ¬»øÓʼþ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý×îеÄÐÅÏ¢×ÔÓÉ£¨FOI£©Êý¾Ý £¬Ó¢¹úµÄ·´Ð˷ܼÁ»ú¹¹£¨UKAD£©ÔÚ2019ÄêµÄ×îºóÈý¸öÔÂÖÐÊÕµ½1.1Íò·âÀ¬»øÓʼþ £¬ÆäÖг¬¹ýÎå·ÖÖ®Ò»£¨21£¥£©µÄÓʼþΪ´¹µöÓʼþ £¬¶øÔ̺¬¶ñÒâÈí¼þµÄÓʼþÊýÁ¿Ôò´Ó10ÔµÄ4¸öÔö³¤µ½12ÔµÄ41¸ö £¬Õû¸ö¼¾¶È×ܼÆ52¸ö¡£ÐÒÔ˵ÄÊÇ £¬UKADÒÔΪËùÓй¥»÷³¢ÊÔ¶¼Ã»Óгɹ¦ £¬µ«Ëü×¢¶¨»á³ÉΪ¹ú¶ÈÔÞÖúµÄ¹¥»÷ÕßµÄÖ¸±ê¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/uk-antidoping-agency-11000


6.LokiBotľÂí¼Ù×°³ÉEpic GamesÓÎÏ·×°Ö÷¨Ê½´«²¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



Ç÷Ïò¿Æ¼¼½üÈÕ¼ì²âµ½LokiBotľÂíµÄÒ»¸öбäÌå £¬¸Ã±äÌå¼Ù×°³ÉEpic GamesÉ̵êµÄÓÎÏ·×°Ö÷¨Ê½À´´«²¼¡£¸ÃαÔìµÄ×°Ö÷¨Ê½ÊÇʹÓÃNSIS£¨Nullsoft¾ç±¾×°ÖÃϵͳ£©¹¤¾ß¹¹½¨µÄ £¬ÆäʹÓÃÁËEpic GamesµÄlogoÀ´ÓÕÆ­Óû§ÔËÐС£Ö´Ðкó £¬¸Ã·¨Ê½»áÔÚÊÜÓ°ÏìÍÆËã»úµÄ¡°£¥AppData£¥Ä¿Â¼¡±ÖпªÊÍÁ½¸öÎļþ£ºC#Ô´´úÂëÎļþºÍ.NET¿ÉÖ´ÐÐÎļþ¡£¶øºó £¬.NET¿ÉÖ´ÐÐÎļþ½«¶ÁÈ¡²¢±àÒëC#´úÂëÎļþ £¬Å²ÓÃÆäÖеĺ¯Êý¼ÓÔØÇ¶ÈëÆäÖеļÓÃÜ»ã±à´úÂë £¬×îÖÕÖ´ÐÐLokiBot¡£


Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/lokibot-impersonates-popular-game-launcher-and-drops-compiled-c-code-file/