¿¨°Í˹»ù·¢Ã÷ÒÁÀÊAPT×éÖ¯OilrigʹÓÃDoHÇÔÈ¡ÍøÂçÖÐÊý¾Ý£»ÐÂEtherOops¹¥»÷ʹÓÃÒÔÌ«ÍøµçÀÂÕë¶ÔÆóÒµÄÚÍøÖÐ×°±¸
Ðû²¼Ê±¼ä 2020-08-061.¿¨°Í˹»ù·¢Ã÷ÒÁÀÊAPT×éÖ¯OilrigʹÓÃDoHÇÔÈ¡ÍøÂçÖÐÊý¾Ý
¿¨°Í˹»ù·¢Ã÷£¬ÒÁÀÊAPT×éÖ¯Oilrig£¨APT34£©Ê¹ÓÃDNS-over-HTTPS£¨DoH£©ÐÒé´Ó±»ÈëÇÖµÄÍøÂçÖÐÇÔÈ¡Êý¾Ý¡£¿¨°Í˹»ùµÄ¶ñÒâÈí¼þÆÊÎöʦVincente DiazÌåÏÖ£¬Oilrig×îÏÈʹÓÃDNSExfiltrator¾ÙÐй¥»÷£¬Æä¿ÉÒÔͨ¹ýÍøÂçÊý¾Ý²¢½«ÆäÒþ²ØÔڷDZê×¼ÐÒéÖУ¬´Ó¶ø½¨ÉèÒþ²ØµÄͨѶͨµÀ£¬OilrigÒ»Ö±ÔÚʹÓÃDNSExfiltratorÔÚÄÚ²¿ÍøÂçÖкáÏòÒÆ¶¯²¢ÍµÈ¡Êý¾Ý¡£OilrigÊÇÊ׸öʹÓÃDoHµÄAPT×éÖ¯£¬¸Ã×éÖ¯ÔÀ´Ò²Éæ×ã¹ý»ùÓÚDNSµÄÉøÍ¸ÊÖÒÕ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/iranian-hacker-group-becomes-first-known-apt-to-weaponize-dns-over-https-doh/#ftag=RSSbaffb68
2.WastedLockerʹÓÃWindowsÄÚ´æÖÎÀí¹¦Ð§ÌÓ±Üɱ¶¾Èí¼þ¼ì²â
ÀÕË÷Èí¼þWastedLockerʹÓÃWindowsÄÚ´æÖÎÀí¹¦Ð§ÌÓ±Üɱ¶¾Èí¼þµÄ¼ì²â¡£ÎªÁËÈÆ¹ý·´ÀÕË÷Èí¼þ½â¾ö¼Æ»®µÄ¼ì²â£¬WastedLocker»áʹÓÃÒ»¸öÀú³ÌÀ´·¿ªÒ»¸öÎļþ£¬²¢½«Æä¶ÁÈ¡µ½Windows Cache ManagerÖУ¬È»ºó¹Ø±ÕÔʼÎļþ¡£ÓÉÓÚÊý¾ÝÏÖÔÚ´æ´¢ÔÚWindows»º´æÖÎÀíÆ÷ÖУ¬Òò´ËWastedLocker½«¼ÓÃÜ»º´æÖеÄÎļþÄÚÈÝ¡£ÓÉÓÚWindows»º´æÖÎÀíÆ÷×÷ΪϵͳÀú³ÌÔËÐУ¬Çå¾²Èí¼þ½«ÒÔΪÕâÊÇÕýµ±µÄWindowsÀú³Ì¼ÓÃÜÊý¾Ý¡£¸ÃÒªÁìÓÐÓõØÈƹýÁËÀÕË÷Èí¼þ±£»¤Ä£¿é£¬²¢ÔÊÐíWastedLocker¼ÓÃÜËùÓÐÎļþ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/wastedlocker-ransomware-abuses-windows-feature-to-evade-detection/
3.ÐÂEtherOops¹¥»÷ʹÓÃÒÔÌ«ÍøµçÀ£¬Õë¶ÔÆóÒµÄÚÍøÖÐ×°±¸
ÎïÁªÍøÑо¿»ú¹¹ArmisµÄÑо¿Ö°Ô±·¢Ã÷й¥»÷·½·¨EtherOops£¬¸ÃÊÖÒÕʹÓÃÓйÊÕϵÄÒÔÌ«ÍøµçÀ£¬¿ÉÓÃÓÚ¹¥»÷ÆóÒµÄÚ²¿ÍøÂçÖеÄ×°±¸¡£EtherOops»ù±¾ÉÏÊÇÖð°ü¹¥»÷£¬ÓйÊÕϵĵçÀ£¨ÒªÃ´ÊÇÓÉÓÚ²»ÍêÉÆµÄµçÀ£¬ÒªÃ´ÊÇÓÉÓÚ¶ñÒâ×ÌÈŹ¥»÷£©½«Ôâµ½µç×Ó×ÌÈÅ£¬²¢·×ªÏÖʵÊý¾Ý°üÖеıÈÌØ£¬Öð²½ÆÆËðÍâ¿Ç£¬Ê¹ÄÚ²¿ÓÐÓøºÔØ´¦ÓÚÔ˶¯×´Ì¬¡£EtherOops¹¥»÷Àֳɺ󣬿ÉÖ±½Ó´ÓInternetÉøÍ¸ÍøÂç£¬ÉøÍ¸À´×ÔDMZÍø¶ÎµÄÄÚ²¿ÍøÂ磬²¢ÔÚÄÚ²¿ÍøÂçµÄ¸÷¸ö²¿·ÖÖ®¼äºáÏòÒÆ¶¯¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-etheroops-attack-takes-advantage-of-faulty-ethernet-cables/
4.¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼COVID-19¶ÔÈ«ÇòÍøÂç·¸·¨Ó°ÏìµÄ±¨¸æ
¹ú¼ÊÐ̾¯×éÖ¯£¨Interpol£©Ðû²¼Á˹ØÓÚCOVID-19¶ÔÈ«ÇòÍøÂç·¸·¨µÄÓ°ÏìµÄ±¨¸æ¡£±¨¸æÌåÏÖ£¬ÀÕË÷Èí¼þLockBitÏÖÔÚ½«ÃÀ¹úÖÐÐÍÆóÒµ×÷ΪÖ÷Òª¹¥»÷Ä¿µÄ¡£±ðµÄ£¬Æ¾Ö¤ËûÃÇµÄÆÊÎö£¬CERBER¡¢NetWalkerºÍRyukÊÇ×î½ü·¢Ã÷µÄ¶¥¼¶ÀÕË÷Èí¼þ¼Ò×壬ËûÃÇÒ»Ö±Ò»Ö±Éú³¤ÒÔ×îºéÁ÷ƽµØÌá¸ßµ¥´Î¹¥»÷µÄΣº¦¼°ÊÕÒæ¡£Interpol½¨Ò鹫˾ºÍ×éÖ¯¼á³ÖÆäÈí¼þºÍÓ²¼þΪ×îÐÂ״̬£¬²¢Ê¹ÓÃÍÑ»ú´æ´¢×°±¸±¸·ÝÆäÊý¾Ý£¬ÒÔ±ÜÃâÀÕË÷Èí¼þ¶ÔÊý¾Ý¾ÙÐлá¼ûºÍ¼ÓÃÜ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/interpol-lockbit-ransomware-attacks-affecting-american-smbs/
5.Check Point±¨¸æ£¬GoogleºÍAmazonΪ´¹ÂÚ¹¥»÷Ö÷Ҫð³äÄ¿µÄ
Check PointÐû²¼ÁËÆ·ÅÆÍøÂç´¹ÂÚ±¨¸æ£¬·¢Ã÷GoogleºÍAmazonÎªÆ·ÅÆÍøÂç´¹ÂÚ¹¥»÷Ö÷Ҫð³äÄ¿µÄ¡£ÔÚÆ·ÅÆÍøÂç´¹ÂÚ¹¥»÷ÖУ¬¹¥»÷Õßͨ¹ýʹÓÃÏàËÆµÄÓòºÍURLÀ´Ã°³ä×ÅÃûÆ·ÅÆµÄ¹Ù·½ÍøÕ¾£¬Í¨³£»¹»áʹÓÃÓëÔÊ¼ÍøÕ¾ÏàËÆµÄÍøÒ³¡£Ñо¿Ö°Ô±·¢Ã÷£¬¹È¸è£¨13£¥£©ºÍÑÇÂíÑ·£¨13£¥£©Ò»Æð×é³ÉÁׯÃÀ๥»÷µÄËÄ·ÖÖ®Ò»¡£½ÓÏÂÀ´ÊÇWhatsApp£¨9£¥£©ºÍFacebook£¨9£¥£©£¬Æä´ÎÊÇMicrosoft£¨7£¥£©¡¢Outlook£¨3£¥£©¡¢Netflix£¨2£¥£©¡¢Apple£¨2£¥£©¡¢Huawei£¨2£¥£©ºÍPayPal£¨ 2£¥£©¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/vulnerabilities---threats/google-and-amazon-replace-apple-as-phishers-favorite-brands/d/d-id/1338572?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
6.NSAÐû²¼Ê¹ÓÃIoT×°±¸ºÍÒÆ¶¯Ó¦ÓÃʱ½µµÍλÖøú×ÙΣº¦µÄÖ¸ÄÏ
ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)Ðû²¼ÁËÒ»·ÝÖ¸ÄÏ£¬Ö¸µ¼ÈËÃÇÔõÑùÔÚʹÓÃÒÆ¶¯ºÍÎïÁªÍø×°±¸¡¢É罻ýÌåºÍÒÆ¶¯Ó¦ÓóÌÐòʱ¾¡¿ÉÄÜÉÙµØÌ»Â¶Î»ÖÃÐÅÏ¢£¬¸ÃÖ¸ÄÏÖ÷ÒªÕë¶ÔÖ÷ÒªÊÇÕë¶ÔNSSºÍDoDϵͳÓû§¡£ÖÇÄÜÊÖ»úÇå¾²°åµçÄÔµÈ×°±¸»áʹÓÃGPSºÍÎÞÏßÐźÅÀ´È·¶¨Óû§µÄλÖ㬽ûÓÃÕâЩ·þÎñ½«´ó´óïÔÌλÖÃÊý¾Ý̻¶µÄ¿ÉÄÜ¡£±ðµÄ£¬»¹¿ÉÒÔ½ûÓÃÉè±¹ØÁ¬ÄλÖ÷þÎñÉèÖ㻵±²»Ê¹ÓÃ×°±¸Ê±Ê¹Óú½ÐÐģʽ£¬Õâ¿ÉÒÔÈ·±£BTºÍWi-Fi´¦ÓÚ½ûÓÃ״̬£»¾¡¿ÉÄÜÉÙµØÔÊÐíÓ¦ÓóÌÐòµÄȨÏÞ£»×î´óÏ޶ȵؽûÓÃ¹ã¸æÈ¨ÏÞ£»½ûÓÃÔÊÐí¸ú×Ùɥʧ¡¢±»µÁ»òɥʧװ±¸µÄÉèÖã»Ê¹ÓÃÄäÃûÐéÄâרÓÃÍø(VPN)×ÊÖúÒþ²ØÎ»Ö㻾¡¿ÉÄÜïÔÌ´æ´¢ÔÚÔÆÖеÄλÖÃÐÅÏ¢µÄÊýÄ¿¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/nsa-offers-advice-on-how-to-reduce-location-tracking-risks/


¾©¹«Íø°²±¸11010802024551ºÅ