2019ÄêϰëÄêÍþвÇ鱨±¨¸æ £»2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ £»Ã׸ß÷ÂùÝ1070Íò¿Í»§ÐÅϢй¶

Ðû²¼Ê±¼ä 2020-02-20

1.NETSCOUTÐû²¼2019ÄêϰëÄêÍþвÇ鱨±¨¸æ


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


NetscoutÐû²¼ÁËÆä2019ÄêϰëÄêÍþвÇ鱨±¨¸æ£¬±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£º¹¥»÷ÕßʹÓÃÁË7ÖÖеÄUDP·´Éä/·Å´ó¹¥»÷£¬²¢ÍŽáÒÑÖªµÄ¹¥»÷ÏòÁ¿ÌᳫÕë¶ÔÐÔDDoS¹¥»÷ £»Õë¶Ô±ÊÖ±ÐÐÒµµÄ´ó¹æÄ£¹¥»÷±ä¶à£¬ÀýÈçÕë¶ÔÎÀÐǵçÐŵĹ¥»÷ÔöÌíÁË295% £»¹¥»÷ÕßʹÓÃÏȽøµÄÕì̽ÊÖÒÕ½«Ä¿µÄËø¶¨ÔÚÊÜÓÅÒì± £»¤µÄÄ¿µÄ£¨ÈçISPºÍ½ðÈÚ»ú¹¹£©ÉÏ£¬ÒÔ·Å´óÕë¶ÔÌØ¶¨ÆóÒµºÍÍøÂçÔËÓªÉ̵Ĺ¥»÷ £»´Ó2018 H2µ½2019 H2£¬Õë¶ÔÎÞÏßͨѶ¹«Ë¾µÄDDoS¹¥»÷ƵÂÊÔöÌíÁË64£¥ £»»ùÓÚMiraiµÄ±äÌåÔÚ2019ÄêϰëÄêÕ¼ÓÐÖ÷µ¼Ö°Î»£¨ÔöÌíÁË57£¥£©£¬¿ÉÕë¶Ô17ÖÖϵͳ¼Ü¹¹ £»WISRµÄ·þÎñÌṩÉÌÌåÏÖÕë¶Ô¹ûÕæÌ»Â¶µÄ»ù´¡ÉèÊ©µÄDDoS¹¥»÷ÔöÌíÁË52£¥£¬¶øÉÏÒ»ÄêΪ38£¥ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.netscout.com/press-releases/netscouts-threat-intelligence-report-2H2019


2.CyberMDXÐû²¼2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


ƾ֤CyberMDXµÄ2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ£¬µä·¶µÄÒ½ÔºÖÐËùÓÐWindows×°±¸ÖÐÓÐ22£¥ÈÔȻûÓÐ×°ÖÃBlueKeepÎó²îµÄÐÞ¸´²¹¶¡£¬¶ø¹ØÓÚÔÚWindowsÉÏÔËÐеÄÁªÍøÒ½ÁÆ×°±¸¶øÑÔ£¬ÕâÒ»Êý×ÖÉÏÉýµ½ÁË45£¥£¬ÕâÒâζ×ÅÏÕЩһ°ëµÄÁªÍøÒ½ÁÆ×°±¸Ò×Êܹ¥»÷ ¡£ÕâЩװ±¸¿ÉÄܰüÀ¨·ÅÉä×°±¸¡¢¼àÊÓÆ÷¡¢XÉäÏߺͳ¬Éù×°±¸ÒÔ¼°Âé×í»úµÈ ¡£ÈôÊÇ²î³ØÕâЩװ±¸¾ÙÐÐÐÞ²¹£¬¹¥»÷Õß¿ÉÄÜ»áËÑË÷µ½Ò×ÊÜBlueKeep¹¥»÷µÄ»úе£¬´Ó¶øÊ¹Ò½ÔºÍøÂçºÍ»¼Õß´¦ÓÚΣÏÕÖ®ÖÐ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cybersecurity-warning-almost-half-of-connected-medical-devices-are-vulnerable-to-hackers-exploiting-bluekeep/


3.ÒÁÀÊAPTÍøÂçÌØ¹¤»î¶¯Fox KittenµÄÆÊÎö±¨¸æ


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


ºÚ¿ÍÕýÔÚʹÓÃÓÉThemeREX¿ª·¢µÄWordPress²å¼þÖеÄ0dayÀ´ÈëÇÖWordPressÍøÕ¾ ¡£Çå¾²³§ÉÌWordfenceÓÚ2ÔÂ18ÈÕ¼ì²âµ½ÁË´ËÀ๥»÷ ¡£ThemeREX²å¼þԤװÁËËùÓÐThemeREXÉÌÒµÖ÷Ì⣬²¢ÇÒ×ÊÖúÓû§ÉèÖÃÐÂÕ¾µãºÍ¿ØÖÆÖÖÖÖÖ÷Ì⹦Ч£¬WordfenceÔ¤¼Æ¸Ã²å¼þÒÑ×°ÖÃÔÚÁè¼Ý4.4Íò¸öÕ¾µãÉÏ ¡£¸Ã²å¼þ¿Éͨ¹ýÉèÖÃWordPress REST-API¶ËµãÀ´ÊÂÇ飬µ«²»»á¼ì²é·¢Ë͵½´ËREST APIµÄÏÂÁîÊÇ·ñÀ´×ÔÊÚȨÓû§£¬ÕâÒâζ×ÅÈκηÿͶ¼¿ÉÒÔÖ´ÐÐÔ¶³Ì´úÂ룬ÉõÖÁ½¨ÉèеĹÜÀíÓû§ºÍ½ÓÊÜÍøÕ¾ ¡£Ñо¿Ö°Ô±ÌåÏÖÈôÊÇÓû§ÔËÐеIJå¼þ°æ±¾¸ßÓÚ1.6.50£¬ÄÇôǿÁÒ½¨ÒéÓû§ÔÝʱɾ³ýThemeREX²å¼þ£¬Ö±µ½ÐÞ¸´²¹¶¡Ðû²¼ÎªÖ¹ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/iranian-apts-fox-kitten-global-spy-campaign/152974/


4.Çå¾²Ñо¿Ö°Ô±Åû¶΢Èí¶à¸ö×ÓÓòÃû±»Ð®ÖÆÎÊÌâ


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


NIC.gpÇå¾²Ñо¿Ô±Michel GaschetÖ¸³ö΢Èí±£´æ¶à¸ö×ÓÓòÃûÐ®ÖÆÎÊÌ⣬ÕâЩ×ÓÓòÃû¿ÉÄܱ»Ð®ÖƺÍÓÃÓÚ¹¥»÷Óû§¡¢Ô±¹¤»òÏÔʾÀ¬»øÄÚÈÝ ¡£ÔÚÒÑÍùÈýÄêÖУ¬GaschetÒ»Ö±ÔÚÏò΢Èí±¨¸æ´øÓйýʧÉèÖõÄDNS¼Í¼µÄ×ÓÓòÃû£¬ÀýÈç2017ÄêËû±¨¸æÁË21¸öÒ×±»Ð®ÖƵÄmsn.com×ÓÓòÃû£¬2019ÄêËûÓÖ±¨¸æÁË142¸öÉèÖùýʧµÄmicrosoft.com×ÓÓòÃû£¬µ«Î¢Èí½öÐÞ¸´ÁËÆäÖÐ5£¥µ½10£¥µÄ×ÓÓòÃû ¡£Gaschet»¹Ö¸³öËûÖÁÉÙÔÚ4¸öÕýµ±µÄ΢Èí×ÓÓòÖз¢Ã÷ÁËÓ¡¶ÈÄáÎ÷ÑÇÆË¿Ë¶Ä³¡µÄ¹ã¸æ£¬°üÀ¨portal.ds.microsoft.com¡¢perfect10.microsoft.com¡¢ies.global.microsoft.comºÍblog-ambassadors.microsoft.com ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-has-a-subdomain-hijacking-problem/


5.ºÚ¿ÍʹÓÃThemeREX²å¼þ0day¹¥»÷WordPressÍøÕ¾


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


Ñо¿Ö°Ô±ÌåÏÖÒÁÀÊAPT34/OilRigºÍAPT33/Elfin¿ÉÄÜÕýÔÚ¿ªÕ¹Ò»ÏîΪÆÚÈýÄêµÄ´ó¹æÄ£ÍøÂçÌØ¹¤»î¶¯£¬¸Ã»î¶¯±»³ÆÎªFox Kitten ¡£¹¥»÷Õß½¨ÉèÁ˸߶ÈÉú³¤ÇÒ³¤ÆÚµÄ»ù´¡¼Ü¹¹£¬ÓÃÓÚ»á¼û¹«Ë¾ÍøÂçºÍʵÑéÕì̽ÓëÌØ¹¤»î¶¯ ¡£Ñо¿Ö°Ô±Ö¸³ö¹¥»÷ÕßÒ²¿ÉÒÔʹÓÃÕâЩ»ù´¡ÉèÊ©°²ÅÅÆÆËðÐԵĶñÒâÈí¼þ£¬ÀýÈçÓëAPT¹ØÁªµÄÊý¾Ý²Á³ýÆ÷ZeroCleareºÍDustman ¡£¹¥»÷ÕßʹÓõijõʼѬȾǰÑÔ°üÀ¨Palo Alto NetworksÔÚ²î±ðVPN·þÎñ£¨ÀýÈçPulse Secure VPN¡¢Fortinet VPNºÍGlobal Protect£©ÖÐÅû¶µÄÎó²î£¬¹¥»÷ÕßʹÓõ͍Öƹ¤¾ß»¹°üÀ¨POWSSHNETºóÃÅ¡¢Êý¾Ý¿âºÍ¿ª·Å¶Ë¿ÚÓ³É乤¾ßSTSRCheck¡¢´ÓC2·þÎñÆ÷ÏÂÔØÎļþµÄVBScript¾ç±¾µÈ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-exploit-zero-day-in-wordpress-plugin-to-create-rogue-admin-accounts/


6.Ã׸ß÷ÂùÝ1070Íò¿Í»§ÐÅϢй¶£¬ÒÑÔÚÂÛ̳Ðû²¼


Ò«ÊÀÓéÀÖ-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ¡£


Ã׸ß÷ÂùÝÈÏ¿ÉÔ¼1070ÍòסËÞ¿Í»§µÄÐÅÏ¢±»ºÚ¿Í͵ȡ£¬ÕâЩÊý¾ÝÒÑÔÚ±¾Öܱ»ÉÏ´«ÖÁºÚ¿ÍÂÛ̳£¬³ýÁËͨÀýµÄÓοÍÖ®Í⣬ÊÜÓ°ÏìµÄ¿Í»§»¹º­¸ÇÃûÈË¡¢CEO¡¢¼ÇÕß¡¢Õþ¸®¹ÙÔ±ºÍ¿Æ¼¼¹«Ë¾µÄÔ±¹¤µÈ ¡£Éæ¼°µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·ºÍÉúÈÕµÈ ¡£Æ¾Ö¤Ã׸ß÷µÄ˵·¨£¬ÕâЩÐÅÏ¢ÊÇÔÚ2019ÄêÑ×Ìì¶ÔÆäÔÆ·þÎñÆ÷µÄδÊÚȨ»á¼ûÖб»µÁµÄ£¬±»µÁÐÅÏ¢²»Éæ¼°ÈκβÆÎñ¡¢ÒøÐп¨»òÃÜÂëÊý¾Ý ¡£ÊÂÎñ±¬·¢ºóÃ׸ß÷ÒѾ­Í¨ÖªÁËËùÓÐÊܲ¨¼°µÄÓû§ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/