2019ÄêϰëÄêÍþвÇ鱨±¨¸æ£»2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ£»Ã׸ß÷ÂùÝ1070Íò¿Í»§ÐÅϢй¶

Ðû²¼Ê±¼ä 2020-02-20

1.NETSCOUTÐû²¼2019ÄêϰëÄêÍþвÇ鱨±¨¸æ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


NetscoutÐû²¼ÁËÆä2019ÄêϰëÄêÍþвÇ鱨±¨¸æ £¬±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£º¹¥»÷ÕßʹÓÃÁË7ÖÖеÄUDP·´Éä/·Å´ó¹¥»÷ £¬²¢ÍŽáÒÑÖªµÄ¹¥»÷ÏòÁ¿ÌᳫÕë¶ÔÐÔDDoS¹¥»÷£»Õë¶Ô±ÊÖ±ÐÐÒµµÄ´ó¹æÄ£¹¥»÷±ä¶à £¬ÀýÈçÕë¶ÔÎÀÐǵçÐŵĹ¥»÷ÔöÌíÁË295%£»¹¥»÷ÕßʹÓÃÏȽøµÄÕì̽ÊÖÒÕ½«Ä¿µÄËø¶¨ÔÚÊÜÓÅÒì±£»¤µÄÄ¿µÄ£¨ÈçISPºÍ½ðÈÚ»ú¹¹£©ÉÏ £¬ÒÔ·Å´óÕë¶ÔÌØ¶¨ÆóÒµºÍÍøÂçÔËÓªÉ̵Ĺ¥»÷£»´Ó2018 H2µ½2019 H2 £¬Õë¶ÔÎÞÏßͨѶ¹«Ë¾µÄDDoS¹¥»÷ƵÂÊÔöÌíÁË64£¥£»»ùÓÚMiraiµÄ±äÌåÔÚ2019ÄêϰëÄêÕ¼ÓÐÖ÷µ¼Ö°Î»£¨ÔöÌíÁË57£¥£© £¬¿ÉÕë¶Ô17ÖÖϵͳ¼Ü¹¹£»WISRµÄ·þÎñÌṩÉÌÌåÏÖÕë¶Ô¹ûÕæÌ»Â¶µÄ»ù´¡ÉèÊ©µÄDDoS¹¥»÷ÔöÌíÁË52£¥ £¬¶øÉÏÒ»ÄêΪ38£¥ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.netscout.com/press-releases/netscouts-threat-intelligence-report-2H2019


2.CyberMDXÐû²¼2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ƾ֤CyberMDXµÄ2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ £¬µä·¶µÄÒ½ÔºÖÐËùÓÐWindows×°±¸ÖÐÓÐ22£¥ÈÔȻûÓÐ×°ÖÃBlueKeepÎó²îµÄÐÞ¸´²¹¶¡ £¬¶ø¹ØÓÚÔÚWindowsÉÏÔËÐеÄÁªÍøÒ½ÁÆ×°±¸¶øÑÔ £¬ÕâÒ»Êý×ÖÉÏÉýµ½ÁË45£¥ £¬ÕâÒâζ×ÅÏÕЩһ°ëµÄÁªÍøÒ½ÁÆ×°±¸Ò×Êܹ¥»÷ ¡£ÕâЩװ±¸¿ÉÄܰüÀ¨·ÅÉä×°±¸¡¢¼àÊÓÆ÷¡¢XÉäÏߺͳ¬Éù×°±¸ÒÔ¼°Âé×í»úµÈ ¡£ÈôÊÇ²î³ØÕâЩװ±¸¾ÙÐÐÐÞ²¹ £¬¹¥»÷Õß¿ÉÄÜ»áËÑË÷µ½Ò×ÊÜBlueKeep¹¥»÷µÄ»úе £¬´Ó¶øÊ¹Ò½ÔºÍøÂçºÍ»¼Õß´¦ÓÚΣÏÕÖ®ÖÐ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cybersecurity-warning-almost-half-of-connected-medical-devices-are-vulnerable-to-hackers-exploiting-bluekeep/


3.ÒÁÀÊAPTÍøÂçÌØ¹¤Ô˶¯Fox KittenµÄÆÊÎö±¨¸æ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ºÚ¿ÍÕýÔÚʹÓÃÓÉThemeREX¿ª·¢µÄWordPress²å¼þÖеÄ0dayÀ´ÈëÇÖWordPressÍøÕ¾ ¡£Çå¾²³§ÉÌWordfenceÓÚ2ÔÂ18ÈÕ¼ì²âµ½ÁË´ËÀ๥»÷ ¡£ThemeREX²å¼þԤװÁËËùÓÐThemeREXÉÌÒµÖ÷Ìâ £¬²¢ÇÒ×ÊÖúÓû§ÉèÖÃÐÂÕ¾µãºÍ¿ØÖÆÖÖÖÖÖ÷Ì⹦Ч £¬WordfenceÔ¤¼Æ¸Ã²å¼þÒÑ×°ÖÃÔÚÁè¼Ý4.4Íò¸öÕ¾µãÉÏ ¡£¸Ã²å¼þ¿Éͨ¹ýÉèÖÃWordPress REST-API¶ËµãÀ´ÊÂÇé £¬µ«²»»á¼ì²é·¢Ë͵½´ËREST APIµÄÏÂÁîÊÇ·ñÀ´×ÔÊÚȨÓû§ £¬ÕâÒâζ×ÅÈκηÿͶ¼¿ÉÒÔÖ´ÐÐÔ¶³Ì´úÂë £¬ÉõÖÁ½¨ÉèеÄÖÎÀíÓû§ºÍ½ÓÊÜÍøÕ¾ ¡£Ñо¿Ö°Ô±ÌåÏÖÈôÊÇÓû§ÔËÐеIJå¼þ°æ±¾¸ßÓÚ1.6.50 £¬ÄÇôǿÁÒ½¨ÒéÓû§ÔÝʱɾ³ýThemeREX²å¼þ £¬Ö±µ½ÐÞ¸´²¹¶¡Ðû²¼ÎªÖ¹ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/iranian-apts-fox-kitten-global-spy-campaign/152974/


4.Çå¾²Ñо¿Ö°Ô±Åû¶΢Èí¶à¸ö×ÓÓòÃû±»Ð®ÖÆÎÊÌâ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


NIC.gpÇå¾²Ñо¿Ô±Michel GaschetÖ¸³ö΢Èí±£´æ¶à¸ö×ÓÓòÃûÐ®ÖÆÎÊÌâ £¬ÕâЩ×ÓÓòÃû¿ÉÄܱ»Ð®ÖƺÍÓÃÓÚ¹¥»÷Óû§¡¢Ô±¹¤»òÏÔʾÀ¬»øÄÚÈÝ ¡£ÔÚÒÑÍùÈýÄêÖÐ £¬GaschetÒ»Ö±ÔÚÏò΢Èí±¨¸æ´øÓйýʧÉèÖõÄDNS¼Í¼µÄ×ÓÓòÃû £¬ÀýÈç2017ÄêËû±¨¸æÁË21¸öÒ×±»Ð®ÖƵÄmsn.com×ÓÓòÃû £¬2019ÄêËûÓÖ±¨¸æÁË142¸öÉèÖùýʧµÄmicrosoft.com×ÓÓòÃû £¬µ«Î¢Èí½öÐÞ¸´ÁËÆäÖÐ5£¥µ½10£¥µÄ×ÓÓòÃû ¡£Gaschet»¹Ö¸³öËûÖÁÉÙÔÚ4¸öÕýµ±µÄ΢Èí×ÓÓòÖз¢Ã÷ÁËÓ¡¶ÈÄáÎ÷ÑÇÆË¿Ë¶Ä³¡µÄ¹ã¸æ £¬°üÀ¨portal.ds.microsoft.com¡¢perfect10.microsoft.com¡¢ies.global.microsoft.comºÍblog-ambassadors.microsoft.com ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-has-a-subdomain-hijacking-problem/


5.ºÚ¿ÍʹÓÃThemeREX²å¼þ0day¹¥»÷WordPressÍøÕ¾


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ñо¿Ö°Ô±ÌåÏÖÒÁÀÊAPT34/OilRigºÍAPT33/Elfin¿ÉÄÜÕýÔÚ¿ªÕ¹Ò»ÏîΪÆÚÈýÄêµÄ´ó¹æÄ£ÍøÂçÌØ¹¤Ô˶¯ £¬¸ÃÔ˶¯±»³ÆÎªFox Kitten ¡£¹¥»÷Õß½¨ÉèÁ˸߶ÈÉú³¤ÇÒ³¤ÆÚµÄ»ù´¡¼Ü¹¹ £¬ÓÃÓÚ»á¼û¹«Ë¾ÍøÂçºÍʵÑéÕì̽ÓëÌØ¹¤Ô˶¯ ¡£Ñо¿Ö°Ô±Ö¸³ö¹¥»÷ÕßÒ²¿ÉÒÔʹÓÃÕâЩ»ù´¡ÉèÊ©°²ÅÅÆÆËðÐԵĶñÒâÈí¼þ £¬ÀýÈçÓëAPT¹ØÁªµÄÊý¾Ý²Á³ýÆ÷ZeroCleareºÍDustman ¡£¹¥»÷ÕßʹÓõijõʼѬȾǰÑÔ°üÀ¨Palo Alto NetworksÔÚ²î±ðVPN·þÎñ£¨ÀýÈçPulse Secure VPN¡¢Fortinet VPNºÍGlobal Protect£©ÖÐÅû¶µÄÎó²î £¬¹¥»÷ÕßʹÓõ͍Öƹ¤¾ß»¹°üÀ¨POWSSHNETºóÃÅ¡¢Êý¾Ý¿âºÍ¿ª·Å¶Ë¿ÚÓ³É乤¾ßSTSRCheck¡¢´ÓC2·þÎñÆ÷ÏÂÔØÎļþµÄVBScript¾ç±¾µÈ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-exploit-zero-day-in-wordpress-plugin-to-create-rogue-admin-accounts/


6.Ã׸ß÷ÂùÝ1070Íò¿Í»§ÐÅϢй¶ £¬ÒÑÔÚÂÛ̳Ðû²¼


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ã׸ß÷ÂùÝÈÏ¿ÉÔ¼1070ÍòסËÞ¿Í»§µÄÐÅÏ¢±»ºÚ¿Í͵ȡ £¬ÕâЩÊý¾ÝÒÑÔÚ±¾Öܱ»ÉÏ´«ÖÁºÚ¿ÍÂÛ̳ £¬³ýÁËͨÀýµÄÓοÍÖ®Íâ £¬ÊÜÓ°ÏìµÄ¿Í»§»¹º­¸ÇÃûÈË¡¢CEO¡¢¼ÇÕß¡¢Õþ¸®¹ÙÔ±ºÍ¿Æ¼¼¹«Ë¾µÄÔ±¹¤µÈ ¡£Éæ¼°µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãºÍÉúÈÕµÈ ¡£Æ¾Ö¤Ã׸ß÷µÄ˵·¨ £¬ÕâЩÐÅÏ¢ÊÇÔÚ2019ÄêÑ×Ìì¶ÔÆäÔÆ·þÎñÆ÷µÄδÊÚȨ»á¼ûÖб»µÁµÄ £¬±»µÁÐÅÏ¢²»Éæ¼°ÈκβÆÎñ¡¢ÒøÐп¨»òÃÜÂëÊý¾Ý ¡£ÊÂÎñ±¬·¢ºóÃ׸ß÷ÒѾ­Í¨ÖªÁËËùÓÐÊܲ¨¼°µÄÓû§ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/