¹ã²¥µç̨KHSUÒòÀÕË÷Èí¼þ¹¥»÷µ¼Ö½ÚÄ¿ÖÐÖ¹£»À¶Ê®×Ö¹«Ë¾½«ÎªÊý¾Ý×ß©ÊÂÎñÖ§¸¶1000ÍòÃÀÔª
Ðû²¼Ê±¼ä 2019-07-151¡¢À¶Ê®×Ö¹«Ë¾½«ÎªÊý¾Ý×ß©ÊÂÎñÖ§¸¶1000ÍòÃÀÔª
Ò½Áưü¹Ü¹«Ë¾Premera Blue CrossÒѾÔÞ³ÉÏò30¸öÖÝÖ§¸¶1000ÍòÃÀÔª×÷Ϊ2015ÄêÊý¾Ýй¶ÊÂÎñµÄÏ¢Õù½ð¡£¸ÃÊÂÎñ±¬·¢ÔÚ2014Äê5ÔÂÖÁ2015Äê3ÔÂʱ´ú£¬¹¥»÷Õß»á¼ûÁË1040ÍòÈ˵ÄÒ½ÁƼͼ¡¢ÒøÐÐÕË»§ÐÅÏ¢ÒÔ¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£Æ¾Ö¤Ï¢ÕùÐÒ飬Premera½«Ïò»ªÊ¢¶ÙÖ§¸¶540ÍòÃÀÔª£¬ÆäÓà½ð¶î½«Ö§¸¶¸øÆäËüÖÝ¡£¸Ã¹«Ë¾»¹°ü¹Ü½«ÊµÑéÊý¾ÝÇå¾²¿ØÖÆÒÔ±£»¤Ð¡ÎÒ˽¼ÒÒ½ÁÆÐÅÏ¢£¬²¢ÇÒÿÄêÉó²éÆäÇ徲ʵ¼ùºÍÏò˾·¨²¿³¤°ì¹«ÊÒÌṩÊý¾ÝÇå¾²±¨¸æ¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/premera-blue-cross-pays-states-10-million-over-data-breach
2¡¢¹ã²¥µç̨KHSUÒòÀÕË÷Èí¼þ¹¥»÷µ¼Ö½ÚÄ¿ÖÐÖ¹
ÃÀ¹ú¼ÓÖݺ鱤ÖÝÁ¢´óѧӵÓеÄKHSU¹ã²¥µç̨Ôâµ½ÀÕË÷Èí¼þ¹¥»÷£¬µ¼Ö¸õç̨µÄËùÓÐϵͳºÍ´æ´¢·þÎñÆ÷̱»¾£¬½ÚÄ¿±»ÆÈÖÐÖ¹¡£µ«KHSUÈ·ÈϳÆÊÜѬȾµÄ·þÎñÆ÷²¢Î´°üÀ¨ÈκÎÃô¸ÐÐÅÏ¢¡£KHSUÔÚ7ÔÂ1ÈÕ·¢Ã÷´Ë´Î¹¥»÷£¬¹¥»÷ÕßʹÓÃÁËKHSUϵͳÖеÄÇå¾²Îó²î¡£KHSUÌåÏÖûÓÐÊÕµ½Êê½ðÒªÇó£¬Ò²²»ÖªµÀ¹¥»÷µÄȪԴ¡£ÔÚ·¢Ã÷ÊÂÎñºó£¬KHSUÏòÁª°îÖ´·¨²¿·ÖºÍÁª°îͨѶίԱ»á±¨¸æÁËÕâÒ»ÊÂÎñ¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/khsu-radio-stations-regular-programming-interrupted-due-to-ransomware-attack-e39dbd3d
3¡¢GlamoriserÀ¶ÑÀÖ±·¢Æ÷Ò×ÔâºÚ¿Í¹¥»÷£¬¿ÉÒýÉúÆøÔÖΣº¦
Ñо¿Ö°Ô±³ÆÀ¶ÑÀÖ±·¢Æ÷Glamoriser±£´æÇå¾²Îó²î£¬Ò×±»ºÚ¿Í¸Ä¶¯ÒÔÒýÉúÆøÔÖ¡£¸ÃÖ±·¢Æ÷¿Éͨ¹ýÀ¶ÑÀµÍ¹¦ºÄÅä¶Ô»úÖÆ£¨BLE£©ÓëÊÖ»úAPPÅþÁ¬£¬Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬ÓÉÓÚÖÆÔìÉÌûÓпª·¢Åä¶Ô/°ó¶¨¹¦Ð§£¨¼´APPºÍÖ±·¢Æ÷Ö®¼äûÓÐÈκÎÇå¾²¿ØÖÆ»òÉí·ÝÈÏÖ¤£©£¬ÕâʹµÃÓ¦ÓùæÄ£ÄÚµÄÈκÎÈ˶¼¿ÉÒÔ¿ØÖÆÖ±·¢Æ÷ÒýÉúÆøÔÖΣº¦£¬ÀýÈçÌá¸ßζȲ¢½«×Ô¶¯¹Ø±Õʱ¼äÑÓÉìÖÁ20·ÖÖÓ¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/firestarter-hacked-hair-straighteners/146434/
4¡¢Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þLoocipherµÄ½âÃܹ¤¾ß
Yoroi-Cybaze ZLabÑо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þLoocipherµÄÃ⺬»ìÃÜÆ÷¡£Æ¾Ö¤FortinetµÄ˵·¨£¬LooCipherʹÓõļÓÃÜËã·¨ÊÇ´øÓÐ16×Ö½ÚÃÜÔ¿µÄAES-128 ECB¡£ÃÜÔ¿´ÓÔ¤½ç˵µÄ×Ö·ûÊý×éÖÐËæ»úÌìÉú¡£ÓÉÓÚAESÊǶԳÆÃÜÔ¿Ëã·¨£¬Òò´Ë»ñµÃ¸ÃÃÜÔ¿½«¿ÉÒÔ»Ö¸´ËùÓеļÓÃÜÎļþ¡£Cybaze-Yoroi ZLabÐû²¼ÁËÒ»¸ö¿ÉÒÔ´ÓÄÚ´æÖÐÌáÈ¡ÃÜÔ¿²¢½âÃÜÎļþµÄ×Ô¶¯¹¤¾ß£¬¸Ã¹¤¾ßÒªÇóLooCipherÀú³Ì´¦ÓÚÔ˶¯×´Ì¬£¬ÈôÊÇÀú³Ì±»ÖÕÖ¹»òPCÖØÆô£¬Ôò¸Ã¹¤¾ßÎÞ·¨ÔÙÆð×÷Óá£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88310/malware/loocipher-ransomware-decryptor.html
5¡¢MioriбäÖÖ£¬Ê¹ÓöÀÍÌÐÒéÓëC2·þÎñÆ÷¾ÙÐÐͨѶ

Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷½©Ê¬ÍøÂçMioriµÄÒ»¸öбäÖÖ£¬¸Ã±äÖÖʹÓöÀÍ̵ÄÐÒéÓëC2¾ÙÐÐͨѶ¡£ÒÔǰµÄMiori±äÖÖʹÓûùÓÚ¶þ½øÖƵÄÐÒéÓëC2·þÎñÆ÷ͨѶ£¬²¢ÏòÖªµÀC2 IPµØµãµÄÈκÎÈËÏÔʾµÇ¼ÌáÐÑ¡£µ«¸ÃбäÖÖ½ÓÄÉ»ùÓÚÎı¾µÄÐÒé¾ÙÐÐC2ͨѶ£¬²¢ÊµÑéÁ˱£»¤²½·¥£ºÈôÊÇûÓÐÌṩָ¶¨µÄ×Ö·û´®£¬Ôò»á¶Ï¿ªÅþÁ¬¡£Ëü»¹Ö§³Ö¼ÓÃÜÏÂÁî¡£¶ÔÑù±¾µÄÆÊÎöÕ¹ÏÖÁ˳öÊÛMiori botÔ´´úÂëµÄÍøÕ¾µÄURL£¬ÊÛ¼ÛΪ110ÃÀÔª¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88303/malware/miori-botnet-new-c2-protocol.html
6¡¢Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄÕë¶ÔÄ¿½ñ»îÔ¾µÄDNSÐ®ÖÆ¹¥»÷Ðû²¼¾¯±¨

Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼¹ØÓÚÄ¿½ñ»îÔ¾µÄDNSÐ®ÖÆ¹¥»÷µÄ¾¯±¨¡£Õâ·ÝÎļþ¸ÅÊöÁËDNSÐ®ÖÆ¹¥»÷´øÀ´µÄΣº¦£¬²¢ÎªÆóÒµÌṩÁË»º½â½¨Òé¡£ÆóÒµµÄÓòÃû×¢²á·þÎñÉÌÕË»§ÊǸ߼ÛÖµµÄÄ¿µÄ£¬³£ÔÚײ¿â¹¥»÷¡¢´¹ÂÚ¹¥»÷»òÆäËüÐÎʽµÄÉç½»¹¤³Ì¹¥»÷Öб»½ÓÊÜ¡£NCSC½¨ÒéʹÓÃרÃŵÄÇ¿ÃÜÂë¶ÔÕâÀàÕË»§¾ÙÐб£»¤£¬²¢¾¡¿ÉÄÜÆôÓöàÒòËØÉí·ÝÑéÖ¤¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ncsc-issues-alert-about-active-dns-hijacking-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ