FireEye 2019 Q1µç×ÓÓʼþÍþв±¨¸æ£¬´¹ÂÚ¹¥»÷ÔöÌí17% £»Silex¿ÉÈÃIoT×°±¸±äש£¬ÒÑѬȾ2000¶ą̀װ±¸

Ðû²¼Ê±¼ä 2019-06-26
1¡¢FireEyeÐû²¼Q1 µç×ÓÓʼþÍþв±¨¸æ£¬´¹ÂÚ¹¥»÷ÔöÌí17%

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!
 
ƾ֤±¾ÖܶþFireEyeÐû²¼µÄ2019ÄêµÚÒ»¼¾¶Èµç×ÓÓʼþÍþв±¨¸æ£¬Ê¹ÓÃHTTPSµÄ¶ñÒâURL±ÈÀýÔöÌíÁË26%£¬¶ø¹Å°åµÄ¸½¼þΪ¶ñÒâÈí¼þµÄµç×ÓÓʼþÔÚÎȲ½Ï½µ¡ £»ùÓÚ¶Ô13ÒÚ·âµç×ÓÓʼþµÄÆÊÎö£¬¸Ã±¨¸æÖ¸³ö2019ÄêµÚÒ»¼¾¶ÈµÄÍøÂç´¹ÂÚ¹¥»÷±ÈÉÏÒ»¼¾¶ÈÔöÌíÁË17%£¬×ܹ²Óнü30%µÄ¹¥»÷ÊÇÄ£ÄâMicrosoft¡¢OneDrive¡¢Apple¡¢AmazonºÍPayPalµÈ×ÅÃûÆ·ÅÆ¡£±ðµÄ£¬Îļþ¹²Ïí·þÎñÔÚÕë¶ÔÆóÒµµÄÍøÂç¹¥»÷Öб»¸üƵÈÔµØÊ¹Ó㬰üÀ¨Google DriveºÍDropbox¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.fireeye.com/offers/rpt-email-threat.html

2¡¢¶ñÒâÈí¼þOSX/Linker£¬Ê¹ÓÃmacOSÖÐδÐÞ²¹µÄGatekeeperÈÆ¹ýÎó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!
 
IntegoÇå¾²Ñо¿Ö°Ô±ÖÒÑÔ³ÆÐµĶñÒâÈí¼þOSX/LinkerÕýÔÚʹÓÃmacOSÖÐδÐÞ¸´µÄGatekeeperÈÆ¹ýÎó²î¡£¸ÃÎó²î¿ÉÔÚ²»ÏòÓû§ÏÔʾÈκÎÖÒÑÔÐÅÏ¢»òÒªÇó»ñµÃÔÊÐíµÄÇéÐÎÏÂÖ´Ðв»ÊÜÐÅÍеĴúÂë¡£OSX/LinkerÉÐδÔÚÒ°Íâ·ºÆð£¬Ñо¿Ö°Ô±Joshua LongÌåÏָöñÒâÈí¼þËÆºõ»¹ÔÚ¿ª·¢ÖУ¬ËäÈ»¶ñÒâÑù±¾Ê¹ÓÃÁËδÐÞ²¹µÄGatekeeperÈÆ¹ýÎó²î£¬µ«Ã»Óдӹ¥»÷ÕߵķþÎñÆ÷ÉÏÏÂÔØÈκζñÒâÓ¦ÓóÌÐò¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/06/macos-malware-gatekeeper.html

3¡¢Ð¶ñÒâÈí¼þSilex¿ÉÈÃIoT×°±¸±äש£¬ÒÑѬȾ2000¶ą̀װ±¸

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!
 
AkamaiÑо¿Ô±Larry Cashdollar·¢Ã÷жñÒâÈí¼þSilexÕýÔÚ¾ÙÐй¥»÷£¬¸Ã¶ñÒâÈí¼þ»á²Á³ýIoT×°±¸µÄ¹Ì¼þ£¬É¾³ýÆä´æ´¢¡¢·À»ðǽ¹æÔòÒÔ¼°ÍøÂçÉèÖã¬×îÖÕµ¼ÖÂ×°±¸×èÖ¹ÔËÐС£ÒªÏë»Ö¸´×°±¸µÄÔËÐУ¬Êܺ¦Õß±ØÐèÊÖ¶¯ÖØÐÂ×°ÖÃ×°±¸¹Ì¼þ¡ £¿ÉÄÜ»áÓÐһЩÊܺ¦ÕßÒÔΪÓöµ½ÁËÓ²¼þ¹ÊÕ϶øÑïÆú×°±¸¡£¹¥»÷ȪԴÊÇλÓÚÒÁÀʵķþÎñÆ÷£¬¹¥»÷ÕßÖ÷Ҫͨ¹ýÒÑÖªµÄIoT×°±¸Ä¬ÈϵǼƾ֤»ñµÃ¶Ô×°±¸µÄ»á¼û¡£¸Ã¹¥»÷Ô˶¯ÈÔÔÚ¾ÙÐÐÖУ¬ÒÑÓÐÁè¼Ý2000̨װ±¸±»±äש¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/new-silex-malware-is-bricking-iot-devices-has-scary-plans/

4¡¢ÐÂÀ¬»øÓʼþÔ˶¯£¬Ê¹ÓÃISOÎļþÈö²¥LokiBotºÍNanocore

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!
 
NetskopeÑо¿Ö°Ô±ÔÚ4Ô·ÝÊӲ쵽¶à¸ö¶ñÒâ¹¥»÷Ô˶¯Ê¹ÓÃISO¾µÏñÎļþÈö²¥LokiBotºÍNanocore£¬ÕâЩISOÎļþ×㹻С£¬ÒÔÖÁÓÚ¿ÉÒÔ·ÅÈëµç×ÓÓʼþµÄ¸½¼þÖС£Í¨³£ÇéÐÎÏÂISOÎļþÒª´óÓÚ100MB£¬µ«¹¥»÷Ô˶¯ÖеÄISOÎļþµÄ¾Þϸ´Ó1MBµ½2MB²»µÈ¡£´Ó¹¥»÷ÕߵĽǶÈÀ´¿´£¬Ê¹ÓÃISOÎļþºÜÓÐÒâÒ壬ÓÉÓÚ´ó´ó¶¼ÏÖ´ú²Ù×÷ϵͳ¿ÉÒÔÔÚÓû§»á¼û¾µÏñʱ×Ô¶¯¹ÒÔØ¾µÏñ²¢ÏÔʾÆäÄÚÈÝ¡£±ðµÄ£¬³öÓÚÐÔÄÜÔµ¹ÊÔ­ÓÉ£¬Ò»Ð©Çå¾²½â¾ö¼Æ»®ÇãÏòÓÚ½«ISOÎļþÁÐÈë°×Ãûµ¥£¬´Ó¶øÊ¹ËüÃDz»Ò×±»¼ì²â¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/malspam-campaigns-hide-infostealers-in-iso-image-files/

5¡¢·ÆÄá¿Ë˹µçÆøÐÞ¸´AutomationworxÌ×¼þÖеĶà¸öÎó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!
 
µÂ¹ú·ÆÄá¿Ë˹µçÆø£¨Phoenix Contact£©ÐÞ¸´Automationworx×Ô¶¯»¯Ì×¼þÖеĶà¸öÎó²î£¬°üÀ¨Ö¸Õëδ³õʼ»¯Îó²î£¨CVE-2019-12870£©¡¢use-after-freeÎó²î£¨CVE-2019-12871£©ºÍÔ½½ç¶ÁÎó²î£¨CVE-2019-12869£©¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨PC Worx 1.86¼°Ö®Ç°°æ±¾¡¢PC Worx Express 1.86¼°Ö®Ç°°æ±¾ºÍConfig+ 1.86 ¼°Ö®Ç°°æ±¾¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/flaws-phoenix-contact-automationworx-allow-code-execution-malicious-files

6¡¢ABBÐÞ¸´×Ô¶¯»¯ÏµÍ³HMIÖеÄÊ®¶à¸öÎó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!
 
DarkMatter xen1thLabsÑо¿ÍŶӷ¢Ã÷ÈðÊ¿¹¤ÒµÊÖÒÕ¹«Ë¾ABBµÄHMI²úÆ·ÖеÄ12¸öÎó²î£¬ÕâЩÎó²î¿Éµ¼ÖÂÉí·ÝÑéÖ¤ÈÆ¹ý¡¢í§Òâ´úÂëÖ´ÐкÍÐÅϢй¶µÈ¡£Îó²î¹æÄ£º­¸Ç¹ýʱµÄÈí¼þ×é¼þ¡¢Ó²±àÂëµÄÖÎÀíԱƾ֤¡¢²»Çå¾²µÄÈí¼þ¸üлúÖÆ¡¢FTP·þÎñÆ÷ÖеÄ·¾¶±éÀú¡¢¾Ü¾ø·þÎñÒÔ¼°´úÂëÖ´ÐеÈ£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÇëÇóÀ´Ê¹ÓÃÕâЩÎó²î¡£ÀÖ³ÉʹÓÃÎó²îµÄ¹¥»÷Õß¿ÉÄÜ»á×èÖ¹¶ÔÊÜÓ°Ïìϵͳ½ÚµãµÄÕýµ±»á¼û¡¢Ô¶³Ì×èֹϵͳ½Úµã¡¢¿ØÖÆÏµÍ³½Úµã»òÔÚϵͳ½ÚµãÖвåÈëºÍÔËÐÐí§Òâ´úÂë¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/abb-patches-many-vulnerabilities-hmi-products