¹¤ÐŲ¿¾Í¡¶¹¤Òµ»¥ÁªÍøÆóÒµÍøÂçÇå¾²·ÖÀà·Ö¼¶Ö¸ÄÏ£¨ÊÔÐУ©¡·Õ÷ÇóÒâ¼û£»MacÍþв¼ì²âÊýÄ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ

Ðû²¼Ê±¼ä 2019-12-19


1.¹¤ÐŲ¿¾Í¡¶¹¤Òµ»¥ÁªÍøÆóÒµÍøÂçÇå¾²·ÖÀà·Ö¼¶Ö¸ÄÏ£¨ÊÔÐУ©¡·Õ÷ÇóÒâ¼û


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¾Ý¹¤ÐŲ¿¹ÙÍø £¬Îª¹á³¹Âäʵ¡¶ÔöÇ¿¹¤Òµ»¥ÁªÍøÇå¾²ÊÂÇéµÄÖ¸µ¼Òâ¼û¡· £¬Íƶ¯¹¤Òµ»¥ÁªÍøÇå¾²ÔðÈÎÂäʵ £¬¶Ô¹¤Òµ»¥ÁªÍøÆóÒµÍøÂçÇ徲ʵÑé·ÖÀà·Ö¼¶ÖÎÀí £¬ÌáÉý¹¤Òµ»¥ÁªÍøÇå¾²°ü¹ÜÄÜÁ¦ºÍˮƽ £¬¹¤ÐŲ¿Ñо¿Æð²ÝÁË¡¶¹¤Òµ»¥ÁªÍøÆóÒµÍøÂçÇå¾²·ÖÀà·Ö¼¶Ö¸ÄÏ£¨ÊÔÐУ©¡·£¨Õ÷ÇóÒâ¼û¸å£©¡£ÏÖÏòÉç»á¹ûÕæÕ÷ÇóÒâ¼û¡£¹¤ÐŲ¿ÌåÏÖ £¬ÓÐÈýÀàÆóÒµÊÊÓÃÓÚ±¾Ö¸ÄÏ£º1. Ó¦Óù¤Òµ»¥ÁªÍøµÄ¹¤ÒµÆóÒµ£»2. ¹¤Òµ»¥ÁªÍøÆ½Ì¨ÆóÒµ£¨Ö÷ÒªÖ¸¶ÔÍâÌṩ¹¤Òµ»¥ÁªÍøÆ½Ì¨µÈ»¥ÁªÍøÐÅÏ¢·þÎñµÄÆóÒµ£©£»3. ¹¤Òµ»¥ÁªÍø»ù´¡ÉèÊ©ÔËÓªÆóÒµ £¬Ö÷Òª°üÀ¨»ù´¡µçÐÅÔËÓªÆóÒµºÍ±êʶÆÊÎöϵͳ½¨ÉèÔËÓª»ú¹¹¡£±ðµÄ £¬¹¤ÐŲ¿ÌåÏÖ £¬±¾´ÎÖ¸ÄϵĻùÀ´Ô´Ôò°üÀ¨£ºÆóÒµ·Ö¼¶ÓëÐÐÒµÍøÂçÇå¾²Ó°ÏìˮƽÏà¹ØÁª¡¢ÐÐÒµÖ¸µ¼ÓëµØ·½î¿ÏµÏàÍŽᡢÆóÒµ×ÔÆÀÓëÊôµØºË²éÏàÍŽáµÈ¡£


  Ô­ÎÄÁ´½Ó£º

http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057724/n3057728/c7571643/content.html


2.IMGEÒâÍâй¶6000¶àÃû²¨Òô¹«Ë¾Ô±¹¤ÐÅÏ¢


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¾ÝThe Daily Beast±¨µÀ £¬×ܲ¿Î»ÓÚ»ªÊ¢¶ÙÌØÇøµÄÊý×Ö×Éѯ¹«Ë¾IMGEÒâÍâй¶ÁË6000¶àÃû²¨ÒôÔ±¹¤µÄÐÕÃû¡¢µç»°ºÅÂë¡¢¼ÒͥסËùºÍµç×ÓÓʼþµØµãµÈÐÅÏ¢¡£ÊÜÓ°ÏìµÄÖ°Ô±°üÀ¨Õþ¸®Ïà¹ØÖ°Ô±ºÍ¸ß¼¶ÖÎÀíÖ°Ô± £¬ÉõÖÁ°üÀ¨ÔÚ¹ú·À³Ð°üÉ̵ĸ߼¶Ô­ÐÍÉè¼Æ²¿·ÖÊÂÇéµÄ¸ßÃô¸ÐÐÔÊÖÒÕÖ°Ô±¡£²¨Òô½²»°ÈËÌåÏÖÕâЩÐÅÏ¢ÊÇÓÉÍøÕ¾¹©Ó¦É̵ÄÈËΪ¹ýʧµ¼ÖµÄ £¬²¨Òô¹«Ë¾ÈÏÕæ¿´´ýÍøÂçÇå¾²ºÍÓû§Òþ˽ £¬ÒªÇó¹©Ó¦É̱£»¤Î¯ÍиøËûÃǵÄÊý¾Ý £¬²¨ÒôÕýÔÚÇ×½ü¼àÊÓÇéÐÎÒÔÈ·±£ÎÊÌⱻѸËÙ½â¾ö¡£


 Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cloud-data-leak-thousands/


3.±¾Ìïй¶Լ2.6Íò±±ÃÀ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÔÚ10ÔÂ21ÈÕ¹ýʧÉèÖÃÆäElasticsearch¼¯Èººó £¬Æû³µ¾ÞÍ·±¾Ìïй¶ÁËԼĪ2.6Íò±±ÃÀ³µÖ÷µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£Êý¾Ý¿âÖеļͼ°üÀ¨¿Í»§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢Óʼĵص㡢³µÁ¾Ðͺš¢VIN¡¢Ð­ÒéIDÒÔ¼°ÖÖÖÖ±¾Ìï³µÁ¾µÄ·þÎñÐÅÏ¢µÈ¡£±¾ÌïÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ £¬ÓÐÎÊÌâµÄÊý¾Ý¿âÊÇÓÃÓÚ´¦Öóͷ£Ð¿ͻ§×¢²áºÍÄÚ²¿ÈÕÖ¾µÄ±±ÃÀÔ¶³ÌÐÅÏ¢´¦Öóͷ£·þÎñµÄÊý¾Ý¼Í¼ºÍ¼à¿Ø·þÎñÆ÷¡£ÊÂÎñÖÐûÓÐÓ°Ïì¿Í»§µÄ²ÆÎñÐÅÏ¢¡¢ÐÅÓÿ¨Êý¾Ý»òƾ֤¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/honda-exposes-26-000-records-of-north-american-customers/


4.Gangnam Industrial StyleÃé×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


CyberXÍþвÑо¿Ð¡×éSection 52Åû¶Ö÷ÒªÕë¶Ô¹¤Òµ¡¢¹¤³ÌºÍÖÆÔìÆóÒµµÄAPT¹¥»÷Ô˶¯ £¬¸Ã¹¥»÷ÍŻﱻ³ÆÎªGangnam Industrial Style £¬ÏÖÔÚÒÑÓÐÖÁÉÙ200¼Ò¹«Ë¾³ÉΪÊܺ¦Õß¡£Ö»¹Ü´ó´ó¶¼Êܺ¦ÕßλÓÚº«¹ú £¬µ«°üÀ¨ÈÕ±¾¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢¶ò¹Ï¶à¶ûºÍÓ¢¹úÔÚÄÚµÄÐí¶à¹ú¼ÒµÄ¹«Ë¾¶¼Êܵ½Ó°Ïì¡£¹¥»÷ÕßÖ÷Ҫͨ¹ý´¹ÂÚÓʼþÌᳫ¹¥»÷ £¬ÕâЩÓʼþµÄÖ÷Ìâ/¸½¼þÓ빤ҵÓйØ £¬°üÀ¨°×ƤÊé¡¢µç³§Ê¾ÒâͼÒÔ¼°¶ÔÉè¼ÆÉèÊ©£¨Èç×ÔÈ»Æø´¦Öóͷ£ºÍÉú²ú×°Ö㩵ı¨¼ÛÇëÇóµÈ¡£¹¥»÷ÕßʹÓõĶñÒâÈí¼þÖ÷ҪΪSeparµÄ±äÖÖ £¬Separ¿ÉÇÔÈ¡Firefox¡¢ChromeºÍSafari´æ´¢µÄÃÜÂëÒÔ¼°´ÓGmail¡¢Yahoo¡¢Windows LiveºÍHotmailÖÐÇÔÈ¡ÓʼþÕË»§µÄƾ֤¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/south-korean-industrial-giants-slammed-in-new-info-stealing-hacker-campaign/


5.LazarusʹÓÃDacls RAT¿ªÕ¹Ð¹¥»÷Ô˶¯


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ñо¿Ö°Ô±·¢Ã÷Ò»¸öÃûΪDaclsµÄжñÒâÈí¼þ £¬¸Ã¶ñÒâÈí¼þ¿ÉÕë¶ÔWindowsºÍLinux×°±¸ £¬²¢ÇÒÓëAPT×éÖ¯Lazarus GroupÓйØ¡£ÕâÊÇLazarusÊ×´ÎÕë¶ÔLinuxƽ̨ £¬Ñо¿Ö°Ô±ÌåÏÖÏÖÔÚÒµ½ç´Óδ¹ûÕæ¹ýLazarus GroupÕë¶ÔLinuxƽ̨µÄ¹¥»÷Ñù±¾ºÍ°¸Àý¡£DaclsÊÇÄ£¿é»¯µÄ¶ñÒâÈí¼þ £¬Ê¹ÓÃTLSºÍRC4Ë«²ã¼ÓÃÜÀ´±£»¤ÆäÏÂÁîºÍ¿ØÖÆ£¨C2£©Í¨Ñ¶Í¨µÀ £¬²¢Ê¹ÓÃAES¼ÓÃÜÆäÉèÖÃÎļþ £¬²¢ÇÒ»¹¾ßÓÐC2Ö¸Á̬¸üй¦Ð§¡£¸ÃRAT»¹¾ßÓз´ÏòP2P²å¼þ £¬ÓÃÓڳ䵱C2ÅþÁ¬µÄÊðÀíÒÔ×èÖ¹Ö±½ÓÅþÁ¬µ½Æä»ù´¡ÉèÊ©¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-linux-windows-with-new-dacls-malware/


6.MacÍþв¼ì²âÊýÄ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ƾ֤MalwarebytesµÄ×îб¨¸æ £¬MacÍþв¼ì²âÊýÄ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ¡£Ö»¹Ü¹Å°å¿´·¨ÒÔΪMacÊܵ½µÄѬȾҪ±ÈWindows PCÉٵöà £¬µ«2019ÄêMalwarebytesµÄÒ£²âÊý¾ÝÅú×¢MacÍþв¼ì²âÊýÄ¿·ºÆðÁ˾ªÈ˵ÄÉÏÉýÇ÷ÊÆ¡£ÔÚËùÓÐÆ½Ì¨£¨Windows PC¡¢MacºÍAndroid£©ÉϵÄÍþв¼ì²âÅÅÐаñ£¨Top25£©ÖÐ £¬ÓÐ6¸öÊÇMacÍþв £¬×ÜÌå¶øÑÔ £¬MacÍþвռ×ܼìÕÉÁ¿µÄ16£¥ÒÔÉÏ¡£Ë¼Á¿µ½MalwarebytesµÄMacÓû§ÈºÔ¼ÄªÊÇWindowsÓû§ÈºµÄ1/12 £¬ÕâÒ»Êý×ÖÔ½·¢ÏÔ×Å¡£ÔÚ2019Äêµ¥¸öÅÌËã»úÉϵÄÍþв¼ì²âÊýÄ¿ÖÐ £¬Windows PCΪƽ¾ù4.2´Î £¬¶øMacÓû§ÎªÆ½¾ù9.8´Î £¬ÊÇWindowsÓû§µÄÁ½±¶¡£


 Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/mac/2019/12/mac-threat-detections-on-the-rise-in-2019/