×êÑÐÈËÔ±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoS·ì϶£»ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳ÏúÊÛ

°ä²¼¹¦·ò 2020-03-30

1.×êÑÐÈËÔ±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoS·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Positive TechnologiesµÄÒ»ÏîÐÂ×êÑÐÅú×¢£¬ËùÓеÄ4GºÍ²¿ÃÅ5GµçÐÅÍøÂç¶¼Ò×Êܵ½ÀûÓÃDiameterÐÅÁîºÍ̸·ì϶µÄDoS¹¥»÷¡£DiameterÐÅÁîºÍ̸ÓÃÓÚÔÚ4GÍøÂçÖÐÈÏÖ¤ºÍÊÚȨÐÂÎÅ·Ö·¢£¬ËüÊÇLTEÖеĹؼü×é³É²¿ÃÅ£¬ÓÐÖúÓÚ»¥ÁªÍøºÍÌ¸ÍøÂçÔªËØÖ®¼äµÄת»»ºÍͨѶ¡£¸ÃºÍ̸Öеķì϶ÔÊÐí¹¥»÷Õ߸ú×ÙÓû§µÄµØÎ»²¢»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢£¬ËæºóÀûÓÃÕâЩÐÅÏ¢À¹½ØÓïÒôºô½ÐºÍÈÆ¹ý¶ÔÒÆ¶¯·þÎñµÄÏÞ¶È¡£×êÑÐÈËÔ±³ÆËûÃÇÔÚ2018ÄêÖÁ2019ÄêÖ®¼ä³É¹¦ÉøÈëµ½ÄÏÃÀ¡¢ÑÇÖÞ¡¢Å·Ö޺ͷÇÖÞµÄ28¼ÒµçÐÅÔËÓªÉÌ¡£´Ë±í£¬µ±5GÍøÂç³ÉÁ¢ÔÚÏÖÓмܹ¹ºÍºÍ̸֮ÉÏʱ£¬ÕâЩ°²È«·ì϶½«³ÖÐø´æÔÚ£¬¹¥»÷ÕßÄܹ»³ÖÐø¸ú×ÙÓû§µÄµØÎ»¡¢»ñÈ¡Ãô¸ÐÐÅÏ¢ÒÔ¼°½µ¼¶µ½3GÍøÂçµÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/all-4g-networks-susceptible-to-dos/?&web_view=true


2.ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳ÏúÊÛ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÉÏÖÜÄ©ÆÚ¼ä£¬ÀÕË÷Èí¼þDharmaµÄÔ´´úÂëÔÚÁ½¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉÏÏúÊÛ£¬ÆäÊÛ¼ÛµÍÖÁ2000ÃÀÔª¡£Æ¾¾ÝFBIÔÚ½ñÄêRSA»áÒéÉϵÄÒ»´ÎÑݽ²£¬DharmaÊǽüÄêÀ´»ñÀûµÚ¶þ¶àµÄÀÕË÷Èí¼þÒµÎñ£¬ÔÚ2016Äê11ÔÂÖÁ2019Äê11ÔÂÖ®¼ä»ñµÃÁ˳¬¹ý2400ÍòÃÀÔªµÄÊê½ðÖ§¸¶¡£ÆäÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉÏÏúÊۺܿÉÄܻᵼÖ¸ü¿í·ºµÄй¶£¬½ø¶øÔÚ¶à¸ö·¸×OÍÅÖ®¼äÀ©É¢£¬×îÖÕµ¼Ö¹¥»÷¼¤Ôö¡£DharmaµÄ¼ÓÃܹ滮¼«¶ÈÏȽø£¬×Ô2017ÄêÒÔÀ´Ò»ÏòûÓÐÃâ·ÑµÄ½âÃܹ¤¾ß¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/


3.ºÚ¿ÍÀûÓÃÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÇÔÈ¡Óû§µÄ±ÈÌØ±Ò


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


MyCrypto°²È«×ܼàHarry Denley·¢ÏÖÓÐ9¸öÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÊÔͼÇÔÈ¡Óû§µÄ±ÈÌØ±Ò£¬ÔÚ´ÓǰµÄËĸöÐÇÆÚÖУ¬ÕâÐ©ÍøÕ¾ÒѾ­ÇÔÈ¡Á˳¬¹ý7¸ö±ÈÌØ±Ò£¨¼ÛֵԼΪ4.5ÍòÃÀÔª£©µÄ×ʽð¡£ÕâÖÖÍøÕ¾·þÎñÔ®ÊÖÓû§½«Æä±ÈÌØ±ÒµØÖ·×ª»»³É¶þάÂ룬ÒÔ½»¸øÆäËüÓû§½øÐÐÖ§¸¶¡£µ«Denley·¢ÏÖÕâ9¸öÍøÕ¾ÏÖʵÉÏÖ»ÌìÉúÁËÚ¿Æ­ÕßÇ®°üµÄ¶þάÂë¡£´Ë±í£¬ÍйÜÕâ9¸öÍøÕ¾µÄ3¸öWeb·þÎñÆ÷»¹ÍйÜ×Å450¶à¸öÆäËüµÄ¶ñÒâÍøÕ¾£¬Ö»¹Ü´óÎÞÊýÍøÕ¾²¢²»»îÔ¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/network-of-fake-qr-code-generators-will-steal-your-bitcoin/


4.2004ÄêÖÁ2019Äê¶íÂÞ˹ºÚ¿Í»î¶¯·ÖÎö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹úµý±¨ÉçÇøµÄ²¼×È¡¤°¬Âס¤ººÃܶû¶Ù£¨Booz Allen Hamilton£©°ä²¼ÁËÒ»·ÝÈ«Ãæ»ã±¨£¬¾ßÌå½éÉÜÁË2004ÄêÖÁ2019ÄêÆÚ¼ä¶íÂÞ˹µÄ¾üÊÂÍøÂç¹¥»÷»î¶¯¡£¸Ã»ã±¨³Áµã¹Ø×¢ÓɶíÂÞ˹¾ü¶Ó´ÓÊôµÄµý±¨²¿ÃŽøÐеÄÍøÂç¹¥»÷¡£¾ßÌåÀ´Ëµ£¬Booz Allen½«´Óǰ15ÄêÆÚ¼äµÄ200¶à¸öGRUÍøÂç¹¥»÷»î¶¯¹éΪ23À࣬²¢½ÒʾÁËÿһ¸ö¹¥»÷»î¶¯Óë¶íÂÞ˹ÖܱßÕþÖλ·¾³±ä¶¯µÄ¹ØÏµ¡£¸Ã»ã±¨µÄ×îÖÕ½áÂÛÊÇÄܹ»Ô¤²âGRUµÄÍøÂç¹¥»÷»î¶¯¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/booz-allen-analyzed-200-russian-hacking-operations-to-better-understand-their-tactics/?&web_view=true


5.WPvivid²å¼þ¶ÌȱÊÚȨ²é³­£¬¿ÉÓÃÓÚ»ñÈ¡ÍøÕ¾ËùÓÐÎļþ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


WebARX°²È«×¨¼ÒÖÒ¸æ³Æ£¬ÓÉÓÚWPvivid²å¼þÖжÌȱһ¸öÊÚȨ²é³­£¬µ¼Ö¹¥»÷Õ߿ɻñÈ¡WordPressÍøÕ¾µÄËùÓÐÎļþ¡£WPvividÊÇÒ»¸öÃâ·ÑµÄ¶àºÏÒ»±¸·Ý¡¢»¹Ô­ºÍǨáã²å¼þ£¬ËüÓµÓнü4Íò¸ö»îÔ¾×°Öá£¶ÔÆä´úÂëµÄ·ÖÎöÏÔʾ£¬Ò»Ð©wp_ajax²Ù×÷δ½øÐÐÊÚȨ²é³­£¬´Ó¶ø¿Éµ¼Ö¿çÕ¾µãÒªÇóαÔ죨CSRF£©¹¥»÷¡£ÊÜÓ°Ïì×î´óµÄ²Ù×÷ÊÇ¡°wp_ajax_wpvivid_add_remote¡±£¬ÕâÒâζ×ÅÓµÓÐÈκνÇÉ«µÄÓû§¶¼Äܹ»Ôö³¤ÐµĴ洢µØÎ»²¢½«ÆäÓÃ×÷ĬÈϱ¸·ÝµØÎ»£¬µ±Ï´α¸·ÝÔËÐÐʱ£¬Õû¸öÊý¾Ý¿â¼°Îļþ½«±»ÉÏ´«µ½¸Ã´æ´¢µØÎ»£¬´Ó¶øÊ¹¹¥»÷ÕßÄܹ»½Ó¼ûÈκÎÎļþ¡£WPvivid¿ª·¢ÍŶÓÒѾ­ÔÚа汾Öн¨¸´Á˸ÃÎÊÌâ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/100567/hacking/wpvivid-backup-plugin-flaw.html


6.¹È¸èÈ¥Äê¹²·¢Ëͽü4Íò¸öµ±¾ÖÖ§³ÖµÄ´¹µö¹¥»÷ÖÒ¸æ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÚ2019Ä꣬¹È¸è¹²·¢ËÍÁ˽ü4Íò¸öÕë¶Ôµ±¾ÖÖ§³ÖµÄ´¹µö¹¥»÷»ò¶ñÒâÈí¼þ¹¥»÷µÄÖҸ棬±È2018Äê½µÂäÁ˽ü25£¥¡£½µÂäµÄÔ­ÒòÒ»·½ÃæÊDZ£»¤´ëÊ©Æðµ½ÁË×÷Óã¬ÁíÒ»·½ÃæÊǹ¥»÷ƵÂÊÔÚ½µµÍ¡£×î½ü¼¸¸öÔµÄһЩÐÂÐËÇ÷ÏòÔ̺¬£º¼ÙÒâÐÂÎÅýÌåºÍ¼ÇÕß»º²½ÐéαÐÅÏ¢µÄ¹¥»÷ÔÚÔö³¤£»µ±¾ÖÖ§³ÖµÄ¹¥»÷Õß³ÖÐøÖØÒªÕë¶ÔµØÔµÕþÖεÐÊÖ¡¢µ±¾Ö¹ÙÔ±¡¢¼ÇÕß¡¢·ÖÆçÕþ¼ûÕߺͼ¤½ø·Ö×ӵȣ»¹¥»÷Õß·´¸´¹¥»÷ͳһָ±ê£¬2019ÄêÓÐÎå·ÖÖ®Ò»µÄÓû§Ôâµ½¹¥»÷ÕßµÄÂŴι¥»÷£»¹¥»÷Õß»ý¼«ÀûÓÃ0day½øÐй¥»÷¡£

 

Ô­ÎÄÁ´½Ó£º

https://blog.google/technology/safety-security/threat-analysis-group/identifying-vulnerabilities-and-protecting-you-phishing/