¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180810

Ðû²¼Ê±¼ä 2018-08-10

¡¾ÆÊÎö±¨¸æ¡¿°£É­ÕÜÐû²¼ÍøÂçÇå¾²Íþв±¨¸æ£¬Ç¿µ÷CNIºÍ¹©Ó¦Á´ÖеÄΣº¦


ƾ֤°£É­ÕÜ×îÐÂÐû²¼µÄÍøÂçÇå¾²Íþв±¨¸æ£¬¶ÔÒªº¦»ù´¡ÉèÊ©£¨CNI£©ºÍ¹©Ó¦Á´µÄ¹¥»÷ÒÔ¼°¶ñÒâÍÚ¿ó¹¥»÷Êǵ±½ñÆóÒµÃæÁÙµÄ×î´óÍþв¡£¸Ã±¨¸æ³Æ¹ØÓÚÍøÂç·¸·¨·Ö×Ӻ͹ú¼Ò¼¶¹¥»÷ÕßÀ´ËµCNIÊÇÒ»¸ö¼ÛÖµÔ½À´Ô½¸ßµÄ¹¥»÷Ä¿µÄ£¬¶ø¹©Ó¦Á´Ôò±»¹¥»÷ÕßÊÓΪÆóÒµÇå¾²Á´Öеı¡Èõ»·½Ú¡£±¨¸æ»¹Ö¸³öÕë¶ÔÃÅÂޱҵȼÓÃÜÇ®±ÒµÄ¶ñÒâÍÚ¿ó¹¥»÷À˳±ºÜÓпÉÄܽ«ÑÓÐøÖÁ2019Äê¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/accenture-cni-and-supply-chains-at/


¡¾ÆÊÎö±¨¸æ¡¿VectraÐû²¼2018¹¥»÷ÕßÐÐΪÇ÷ÊÆ±¨¸æ¼°2018ÖÆÔìÒµ¾Û½¹±¨¸æ


±¾ÖÜÈýVectraÐû²¼2018¹¥»÷ÕßÐÐΪÇ÷ÊÆ±¨¸æºÍ2018ÖÆÔìÒµ¾Û½¹±¨¸æ£¬±¨¸æÖк­¸ÇÁ˾ŴóÐÐÒµÖеĹ¥»÷ÕßÐÐΪÇ÷ÊÆ£¬°üÀ¨¿Æ¼¼ÐÐÒµ¡¢·þÎñÒµ¡¢ÁãÊÛÒµ¡¢ÖÆÔìÒµ¡¢Ò½ÁÆÐÐÒµ¡¢Õþ¸®¡¢ÓéÀÖÒµ¡¢ÄÜÔ´ÒÔ¼°½ÌÓýÐÐÒµ¡£ÆäÖнÌÓýÒµÃæÁÙµÄÍþв×î¶à£¬ÄÜÔ´ÒµÆä´Î£¬ÖÆÔìÒµÅÅÔÚµÚÈý¡£VectraÔÚ¶à¸öÖÆÔ칫˾Öз¢Ã÷ÁË´ó×ÚÍþв£¬ÆäÖаüÀ¨´ó×ÚµÄÄÚ²¿¶ñÒâÐÐΪ£¬ÕâÅú×¢¹¥»÷ÕßÒѾ­ÔÚÆäÍøÂçÄÚ²¿¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/reconnaissance-lateral-movement-soar-manufacturing-industry


¡¾ÆÊÎö±¨¸æ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚDarkHydrusµÄ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ


Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïDarkHydrusµÄ¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£2018Äê6ÔÂ24ÈÕÑо¿ÍŶÓÊӲ쵽DarkHydrusÌᳫµÄÕë¶ÔÖж«Ò»¸ö½ÌÓý»ú¹¹µÄ¹¥»÷Ô˶¯£¬¸Ã¹¥»÷Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄƾ֤¡£DarkHydrusÔڸô¹ÂÚ¹¥»÷Ô˶¯ÖÐʹÓÿªÔ´¹¤¾ßPhishery½¨Éè¶ñÒâµÄÎĵµ¸½¼þ£¬²¢Í¨¹ýC2·þÎñÆ÷ÍøÂçÓû§µÄƾ֤¡£

Ô­ÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/08/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east/


¡¾Îó²î²¹¶¡¡¿ISCÐû²¼BINDµÄÇå¾²¸üУ¬ÐÞ¸´Ò»´¦¿Éµ¼ÖÂDoSµÄÎó²î


ISCÐû²¼DNSÈí¼þBINDµÄÇå¾²¸üУ¬ÐÞ¸´Ò»¸ö¿Éµ¼ÖÂDoSµÄÇå¾²Îó²î¡£¸ÃÎó²î£¨CVE-2018-5740£©ÊÇÓɽ£ÇÅ´óѧµÄÑо¿Ö°Ô±Tony Finch·¢Ã÷µÄ£¬Ó°ÏìÁ˾ßÓÐdeny-answer-aliases¹¦Ð§µÄ·þÎñÆ÷£¨´Ë¹¦Ð§Ä¬ÈÏ´¦ÓÚ½ûÓÃ״̬£©¡£Àֳɴ¥·¢´ËÎó²îµÄ¹¥»÷Õß½«Ôì³Éname.cÖеÄINSIST¶ÏÑÔʧ°Ü£¬µ¼ÖÂÀú³Ì×èÖ¹ÔËÐк;ܾø·þÎñ¡£¶à¸öBIND°æ±¾Êܵ½Ó°Ï죬½¨ÒéÓû§¾¡¿ì¾ÙÐиüС£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75200/security/bind-dns-software-dos.html


¡¾Îó²î²¹¶¡¡¿Î÷ÃÅ×ÓÐû²¼TIA PortalµÄÇå¾²¸üУ¬ÐÞ¸´2¸öÇå¾²Îó²î


¹¤¿ØÇå¾²³§ÉÌNozomi NetworksµÄÑо¿Ö°Ô±·¢Ã÷Î÷ÃÅ×ÓSIMATIC STEP7ºÍSIMATIC WinCCµÄTIA Portal±£´æ2¸öÇå¾²Îó²î£¬Ê¹µÃICSÇéÐÎÃæÁÙΣº¦¡£µÚÒ»¸öÎó²î£¨CVE-2018-11453£©ÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâÎļþ´¥·¢¾Ü¾ø·þÎñ»òí§Òâ´úÂëÖ´ÐУ¬µÚ¶þ¸öÎó²î£¨CVE-2018-11454£©ÓëÌØ¶¨TIA PortalĿ¼ÖеIJ»×¼È·ÎļþȨÏÞÉèÖÃÓйØ¡£Î÷ÃÅ×ÓÐû²¼ÁËÏà¹Ø²úÆ·µÄÇå¾²¸üÐÂÒÔÐÞ¸´Õâ2¸öÎó²î¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/flaws-siemens-tool-put-ics-environments-risk


¡¾¹¥»÷ÊÂÎñ¡¿ÃÀÖ°Òµ¸ß¶û·òЭ»áPGAÒÉÔâÀÕË÷Èí¼þBitPaymer¹¥»÷


ƾ֤GolfWeekµÄ±¨µÀ£¬±¾ÖܶþÃÀ¹úÖ°Òµ¸ß¶û·òЭ»á£¨PGA£©ÒÉÔâÀÕË÷Èí¼þBitPaymerµÄ¹¥»÷¡£ÓëÀÕË÷Èí¼þSamSamÒ»Ñù£¬BitPaymerÇãÏòÓÚͨ¹ýRDP·þÎñÈëÇÖÄ¿µÄ×éÖ¯µÄÍøÂ磬²¢ºáÏòÈö²¥ÖÁÿһ̨ÅÌËã»ú¡£¸Ã±äÖÖÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.lockedÀ©Õ¹Ãû£¬²¢ÀÕË÷½Ï¸ßµÄÊê½ð¡£ÔÚÒÑÍùµÄ¼¸ÖÜÄÚBitpaymerÒѾ­·ºÆðÁËÊý´ÎÕë¶ÔÆóÒµ¡¢Õþ¸®»ú¹¹ºÍÒ½ÔºµÄ¹¥»÷¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/the-pga-possibly-infected-with-the-bitpaymer-ransomware/