µÂ¹ú±íÂôƽ̨Lieferando.deÔâDDoS¹¥»÷£»¼ÓÄôóISPÂÞ½Ü˹ͨѶ¹«Ë¾Ð¹Â¶¿Í»§ÐÅÏ¢
°ä²¼¹¦·ò 2020-03-201.Cyentia 2020ÄêÐÅÏ¢·çÏÕ¶´²ì»ã±¨£¬ÆóÒµÍøÂçÊØ»¤³É±¾ÉÏÉý
ƾ¾ÝCyentia×êÑÐËùµÄ×îÐÂ×êÑл㱨£¬Ô¤¼ÆÔÚ12¸öԵŦ·òÄÚÓÐËÄ·ÖÖ®Ò»µÄ²Æ¸»1000Ç¿ÆóÒµ½«Ôâ·êÍøÂçÊÂÎñÔì³ÉµÄËðʧ£¬²¢ÇҲƸ»1000Ç¿ÆóÒµÒòÍøÂçÊÂÎñËðʧ1ÒÚÃÀÔªÒÔÉϵļ¸ÂÊΪ6%¡£¸Ã×êÑÐËùµÄ2020Äê¡¶ÐÅÏ¢·çÏÕ¶´²ì×êÑл㱨¡·³Æ£¬ÔÚÍøÂ簲ȫÊÂÎñÔì³ÉµÄËðʧÖУ¬10%µÄÊÂÎñ½«³¬¹ý2000ÍòÃÀÔª£¬ÆäÖÐÐÅÏ¢·þÎñºÍÁãÊÛÐÐÒµÊÜÓ°Ïì×î´ó£¬¶þÕßµÄËðʧҪ±ÈÆäËüÐÐÒµ¸ß10¸öµã¡£¸Ã»ã±¨¸ú×ÙÁË´ÓǰʮÄêµÄÊÂÎñ»ã±¨£¬³Æ´óÐÍÆóÒµ¸ü¿ÉÄܲúÉú¹«¿ª»ã±¨µÄÊÂÎñ£¬²Æ¸»1000Ç¿ÆóÒµÊǸü´óµÄÖ¸±ê£¬Ò²ÓµÓиü´óµÄÖ¸±êÁìÓò£¬ËûÃǵÄÊÂÎñ¸ü¿ÉÄܳÉΪͷÌõÐÂÎÅ¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/cyber-event-costs-worse/
2.·¸×ïÍÅ»ïMoleRATsÀûÓÃαÔìµÄÐÂÎÅÍøÕ¾Á÷Á¿°µ²ØÆäC2ͨѶ
×êÑÐÈËÔ±·¢ÏÖ·¸×ïÍÅ»ïMoleRATsÔÚ×î½üµÄ´¹µö¹¥»÷»î¶¯Öзַ¢Spark£¨EnigmaSpark£©ºóÃÅ£¬²¢ÇÒÀûÓÃαÔìµÄÐÂÎÅÍøÕ¾Á÷Á¿À´Èƹý¼ì²â¡£ÓÐÖ¤¾ÝÅú×¢¸Ã×éÖ¯×Ô2017Äê3ÔÂÒÔÀ´Ò»ÏòʹÓöûºóÃÅ£¬²¢ÇÒ²¿ÊðÁËÊýÊ®ÖÖ±äÌ壬ÕâЩ±äÌåÖÁÉÙÓë15¸öC&CÓòͨѶ¡£Æ¾¾ÝÆä¹¥»÷Ö¸±êºÍµö¶üÎļþ£¬¸Ã¹¥»÷»î¶¯¿´ÆðÀ´ÏñÊdzöÓÚÕþÖζ¯»ú£¬ÖØÒªÕë¶Ô°ÍÀÕ˹̹¡£¹¥»÷ÕßÔÚHTTP? POSTÒªÇóÖÐʹÓÃαÔìµÄÖ÷»ú±êÍ·£¬¸ÃÒªÇó½«Ö¸±êµÄϵͳÐÅÏ¢´«µÝµ½C2·þÎñÆ÷£¨nysura].[com£©£¬µ«±êÍ·È´ÏÔʾÖ÷ÕŵØÖ·Îªcnet].[com¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-hide-malware-c2-communication-by-faking-news-site-traffic/
3.½©Ê¬ÍøÂçStantinkoÍÚ¿óÄ£¿éÒýÈë¶àÖÖеĻìºÏ¼¼Êõ
ESET×êÑÐÈËÔ±·¢ÏÖ½©Ê¬ÍøÂçStantinko·Ö·¢µÄÐÂÍÚ¿óÄ£¿éÒýÈë¶àÖÖ»ìºÏ¼¼Êõ£¬ÆäÖÐһЩÉÐδ±»¹«¿ªÃèÊö¡£×êÑÐÈËÔ±·Ö½âÁËÕâЩ¼¼Êõ£¬²¢ÃèÊöÁËÕë¶ÔijЩ¼¼ÊõµÄ¿ÉÄܶԲߡ£StantinkoÒýÈëµÄ»ìºÏ¼¼ÊõÔ̺¬£º×Ö·û´®»ìºÏ-»ú¹ØÓÐÒâ˼µÄ×Ö·û´®£¬²¢ÇÒ½öÔÚʹÓÃËüÃÇʱ³Ê´Ë¿ÌÄÚ´æÖУ»½ÚÔìÁ÷»ìºÏ¨C½«½ÚÔìÁ÷ת»»×÷ÄÑÒÔÔĶÁµÄ´ó¾Ö£¬²¢ÇÒÈôÊDz»½øÐдóÁ¿·ÖÎö£¬ÔòÎÞ·¨Ô¤²â¸ù»ù¿éµÄÖ´Ðа¤´Î£»ËÀ´úÂë¨CÔö³¤´ÓδִÐеĴúÂ룬ÒÔ¼°»¹Ô̺¬´ÓδŲÓõĵ¼³ö±í£¬ÆäÖ÷ÕÅÊÇʹÎļþ¿´ÆðÀ´¸üºÏ·¨ÒÔÔ¤·À¼ì²â£»ÎÞЧ´úÂë¨CÒÑÖ´ÐеĴúÂëµÄÔö³¤£¬µ«¶ÔÕûÌåÖ°ÄÜûÓÐÄÚÈÝÓ°Ï죬ÆäÖ÷ÕÅÖ¼ÔÚÈÆ¹ýÐÐΪ¼ì²â£»´Ë×Ö·û´®ºÍ×ÊÔ´¨CÔö³¤×ÊÔ´ºÍ×Ö·û´®¶ø²»Ó°ÏìÖ°ÄÜ¡£
ÔÎÄÁ´½Ó£º
https://www.welivesecurity.com/2020/03/19/stantinko-new-cryptominer-unique-obfuscation-techniques/
4.NISTºÍDHS°ä²¼ÓйØÍøÂç»áÒé¼°VPNµÄ±£»¤Ö¸ÄÏ
ÓÉÓÚ¹Ú×´²¡¶¾µÄÊ¢ÐУ¬ÈËÃDZ»ÆÈÔڼҰ칫£¬ÃÀ¹úNISTºÍDHS°ä²¼ÁËһϵÁÐÓйØÈôºÎ±£»¤ÍøÂç»áÒéºÍÆóÒµVPNÏνӵݲȫָÄÏ¡£´óÎÞÊýÍøÂç»áÒé·þÎñÓµÓÐÄÚÖõݲȫÐÔÖ°ÄÜ£¬µ«×ñÑÆóÒµµÄÍøÂç»áÒ鰲ȫÐÔÕ½ÊõÓ¦¸ÃÈ·±£¸üÇ¿Á¦µÄ±£»¤£¬ÆóÒµÓ¦¸Ã˼¿¼Ï޶ȽӼû´úÂëµÄ³Á¸´Ê¹Óã¬Ê¹ÓÃÒ»´ÎÐÔPINÂë»ò»áÒé±êʶ·û´úÂëÒÔ¼°Ñ¡È¡¶à³É·ÖÉí·ÝÑéÖ¤¡£´Ë±í£¬»¹Ó¦¸ÃÔÚÓë»áÕß²ÎÓëʱÆôÓÃ֪ͨ£¬Ê¹ÓÃÒDZí°å¼à¶½Óë»áÕߣ¬½öÔÚ±ØÒªÊ±¼Í¼»áÒ飬½ûÓò»±ØÒªµÄÖ°ÄÜ£¬ÀýÈç̸Ìì»òÎļþ¹²ÏíµÈ¡£ÆóÒµVPNÃæ¶ÔµÄ·çÏÕÔ̺¬Õë¶ÔµÇ¼ʹ´¦µÄ´¹µö¹¥»÷¡¢¶Ìȱ¶à³É·ÖÉí·ÝÑéÖ¤ºÍ²»×ã×ã¹»µÄVPNÏνÓÀ´È·±£ËùÓÐÔ±¹¤¶¼Äܹ»Ô¶³Ì°ì¹«µÈ£¬½¨ÒéÆóҵʼÖÕ¸üÐÂÆäVPN£¬²¢È·±£ÍøÂç»ù´¡½á¹¹ºÍÓÃÓÚÔ¶³ÌÏνӵ½¹¤×÷»·¾³µÄÉ豸ӵÓÐ×îеÄÈí¼þ²¹¶¡ºÍ°²È«ÅäÖá£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/nist-dhs-publish-guidance-securing-virtual-meetings-vpns
5.µÂ¹ú±íÂôƽ̨Lieferando.deÔâDDoS¹¥»÷µ¼Ö·þÎṉ̃»¾
µÂ¹ú±íÂôƽ̨Lieferando.deÔâDDoS¹¥»÷µ¼Ö·þÎṉ̃»¾¡£¸Ãƽ̨¹ØÁªÁË1.5Íò¶à¼ÒµÂ¹ú²Í¹Ý£¬ÓÉÓÚCOVID-19ÆÚ¼äµÂ¹ú¶Ô²ÍÌü½øÐÐÁËÑϸñµÄÏÞ¶È£¬ÀýÈçÏÞ¶È¿ÍÈ˵ÄÈËÊý¡¢Ôö´ó×À×ÓÖ®¼äµÄ¾àÀë¡¢±ÉÈËÎç6µãÖÁÔçÉÏ6µãÖ®¼ä±ØÐë¹ØÃŵȣ¬Òò¶øÕâ´ÎDDoS¹¥»÷Ó°ÏìÁË´óÁ¿Ñ¡ÔñʹÓñíÂô¶©²ÍµÄÓû§¡£Ò»Ð©¿Í»§±§Ô¹³ÆÖ»¹Ü¸Ãƽ̨µÄϵͳÒò¹¥»÷¶øÌ±»¾£¬µ«¸Ã·þÎñÈÔ½ÓÊÜж©µ¥£¬Ö»ÊÇûÓÐ¶ÔÆä½øÐд¦Ö᣸Ãƽ̨³Æ½«ÍË»¹ÒÑÖ§¸¶ÇÒδ½»¸¶µÄ¶©µ¥£¬µ«¿Í»§±ØÐëͨ¹ýµç×ÓÓʼþÓëËûÃÇÁªÏµ¡£¾Ý³Æ¹¥»÷ÕßÒªÇó2±ÈÌØ±Ò£¨Ô¼ºÏ1.1ÍòÃÀÔª£©µÄÊê½ðÀ´ÖÕ³¡¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/food-delivery-service-in-germany-under-ddos-attack/
6.¼ÓÄôóISPÂÞ½Ü˹ͨѶ¹«Ë¾Ð¹Â¶¿Í»§ÒþÖÔÐÅÏ¢
¼ÓÄôóISPÂÞ½Ü˹ͨѶ¹«Ë¾Í¨Öª¿Í»§³ÆÓÉÓÚÊý¾Ý¿â¿É¹«¿ª½Ó¼û£¬µ¼Ö¿ͻ§µÄÓ×ÎÒÐÅÏ¢ÔÚÍøÉ϶³ö¡£¸Ã¹«Ë¾°µÊ¾ËüÔÚ2ÔÂ26ÈÕµÃÖªÔ̺¬¿Í»§ÐÅÏ¢µÄ¹©¸øÉÌÊý¾Ý¿âÔÚÍøÉ϶³ö£¬µ¼Ö¿ͻ§µÄµØÖ·¡¢Õ˺š¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëµÈÐÅϢй¶£¬µ«Êý¾Ý¿âÖв»Ô̺¬ÐÅÓþ¿¨¡¢ÒøÐÐÕË»§»òÃÜÂëÐÅÏ¢¡£¾ßÌåÊÜÓ°ÏìµÄ¿Í»§ÊýÁ¿Éв»Ã÷ÏÔ£¬µ«ÂÞ½Ü˹½«ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÃâ·ÑµÄTransunionÐÅÓþ¼à¿Ø·þÎñ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/rogers-data-breach-exposed-customer-info-in-unsecured-database/


¾©¹«Íø°²±¸11010802024551ºÅ