¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181130
Ðû²¼Ê±¼ä 2018-11-30
ΪÔö½ø¸÷Appı»®Õ߸üºÃµØ×ñÊØ¡¶ÖлªÈËÃñ¹²ºÍ¹úÍøÂçÇå¾²·¨¡·¡¢¡¶Ð¡ÎÒ˽¼ÒÐÅÏ¢Çå¾²¹æ·¶¡·µÈÏà¹ØÖ´·¨ºÍ±ê×¼¹æ·¶£¬£¬£¬£¬Î¬»¤¿í´óÏûºÄÕßµÄСÎÒ˽¼ÒÐÅÏ¢Çå¾²£¬£¬£¬£¬ÖÐÏûÐÓÚ2018Äê8-10Ô¿ªÕ¹ÁËAppСÎÒ˽¼ÒÐÅÏ¢ÍøÂçÓëÒþ˽Õþ²ß²âÆÀ»î¶¯¡£¡£¡£¡£¡£±¾´Î²âÆÀµÄApp¹²ÓÐ10ÀࣺͨѶÉç½»¡¢Ó°Òô²¥·Å¡¢ÍøÉϹºÎï¡¢ÉúÒâÖ§¸¶¡¢³öÐе¼º½¡¢½ðÈÚÀí²Æ¡¢ÂÃÓÎסËÞ¡¢ÐÂÎÅÔĶÁ¡¢ÓÊÏäÔÆÅ̺ÍÅÄÉãÃÀ»¯¡£¡£¡£¡£¡£¡¶²âÆÀ±¨¸æ¡·ÏÔʾ£¬£¬£¬£¬½ðÈÚÀí²Æ¡¢ÓÊÏäÔÆÅÌÀàAppÆÀ·ÖÏà¶Ô½ÏµÍ£»£»£»£»ÔÚÍøÂçСÎÒ˽¼ÒÐÅÏ¢·½Ã棬£¬£¬£¬10ÀàAppÆÕ±é±£´æÉæÏÓÌ«¹ýÍøÂçСÎÒ˽¼ÒÐÅÏ¢µÄÇéÐΣ»£»£»£»ÔÚÒþ˽Õþ²ß·½Ã棬£¬£¬£¬47¿îAppÒþ˽Ìõ¿îÄÚÈݲ»´ï±ê£¬£¬£¬£¬ÆäÖÐ34¿îAppûÓÐÒþ˽Ìõ¿î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
http://www.cca.org.cn/zxsd/detail/28309.html2¡¢¹¤ÐŲ¿Ðû²¼2018ÄêµÚÈý¼¾¶ÈÐÅϢͨѶÐÐÒµÍøÂçÇå¾²î¿ÏµÇéÐÎת´ï
¹¤ÐŲ¿ÍøÂçÇå¾²ÖÎÀí¾ÖÐû²¼2018ÄêµÚÈý¼¾¶ÈÐÅϢͨѶÐÐÒµÍøÂçÇå¾²î¿ÏµÇéÐÎת´ï£¬£¬£¬£¬µÚÈý¼¾¶ÈµÄÍøÂçÇå¾²×ÜÌåÌ¬ÊÆ°üÀ¨£º£¨Ò»£©ÍøÂçÔËÐÐÇå¾²ÎÊÌâÍ»³ö¡£¡£¡£¡£¡£Èý¼¾¶È£¬£¬£¬£¬¼à²â´¦Öóͷ£¶ñÒâÍøÂç×ÊÔ´¡¢¶ñÒâ³ÌÐò¡¢Çå¾²Îó²îµÈÍøÂçÇå¾²ÍþвԼ3397Íò¸ö£¬£¬£¬£¬ÆäÖÐWannaCryÀÕË÷²¡¶¾Ñ¬È¾µÄ×°±¸ÌìÌìÈԸߴï6000ÖÁ14000̨¡£¡£¡£¡£¡££¨¶þ£©¹¤Òµ»¥ÁªÍøÇ徲Σº¦ÐèÒýÆðÖØÊÓ¡£¡£¡£¡£¡£Ò»Á¬¼à²âµÄÖØµã¹¤Òµ»¥ÁªÍøÆ½Ì¨ÖУ¬£¬£¬£¬·¢Ã÷ÒÉËÆÎ£º¦2600Óà¸ö¡£¡£¡£¡£¡££¨Èý£©Í¨Ñ¶ÐÅÏ¢Õ©ÆÖÎÀíÌ¬ÊÆ×ÜÌ寽ÎÈ¡£¡£¡£¡£¡£Èý¼¾¶È£¬£¬£¬£¬ÊÜÀíÉæÏÓͨѶÐÅÏ¢Õ©ÆÓû§¾Ù±¨1.4ÍòÓà¼þ´Î£¬£¬£¬£¬»·±ÈϽµ4.9%¡£¡£¡£¡£¡£¡°»úƱ¸ÄÇ©¡±¡¢¡°ÒøÐп¨¶³½á¡±¡¢¡°¹ºÎïÍøÕ¾¿Í·þ¡±µÈ³ÉΪÖ÷ÒªÕ©ÆÊÖ·¨¡£¡£¡£¡£¡££¨ËÄ£©Òƶ¯Í¨Ñ¶×ªÊÛÆóÒµµç»°Óû§ÊµÃû¹ÒºÅ׼ȷÂÊÎȲ½ÌáÉý¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057724/n3057728/c6514815/content.html3¡¢´÷¶û±¾Ô³õÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬³õ³ÌÐò²é³ÆÎÞÊý¾Ýй¶
´÷¶ûÐû³Æ±¾Ô³õÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬µ«Ã»ÓÐÓû§Êý¾Ýй¶¡£¡£¡£¡£¡£¸ÃÈëÇÖÊÂÎñ±¬·¢ÔÚ11ÔÂ9ÈÕ£¬£¬£¬£¬Æ¾Ö¤´÷¶ûµÄת´ï£¬£¬£¬£¬Î´¾ÊÚȨµÄ¹¥»÷ÕßÊÔͼ´ÓÆäϵͳÖÐÇÔÈ¡Dell.comµÄÓû§ÕË»§ÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµãºÍ¹þÏ£ÃÜÂë¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÕßÓпÉÄÜ´Ó´÷¶ûµÄϵͳÖÐɾ³ýÁ˲¿·Ö´ËÀàÐÅÏ¢£¬£¬£¬£¬µ«³õ³ÌÐò²éÅúעûÓÐÈκÎÓû§ÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£´÷¶û¾Ü¾øÍ¸Â¶ÊÜÓ°ÏìµÄÓû§ÊýÄ¿£¬£¬£¬£¬µ«¾öÒé¶ÔËùÓеÄDell.comÓû§ÕË»§Ç¿ÖƾÙÐÐÃÜÂëÖØÖᣡ£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/dell-announces-security-breach/4¡¢ÌðÌðȦÁ¬ËøµêDunkin¡¯ DonutsÔâײ¿â£¬£¬£¬£¬²¿·ÖÓû§ÐÅÏ¢ÒÉй¶
ƾ֤ÌðÌðȦÁ¬ËøµêDunkin¡¯ DonutsÐû²¼µÄ֪ͨ£¬£¬£¬£¬10ÔÂ31Èոù«Ë¾Ô⵽ײ¿â¹¥»÷£¬£¬£¬£¬ËäÈ»ÆäÇå¾²²½·¥×èÖ¹Á˴󲿷ֹ¥»÷ʵÑ飬£¬£¬£¬µ«¹¥»÷ÕßÈÔÈ»¿ÉÄÜÀֳɵǼÁ˲¿·ÖÓû§µÄÕË»§¡£¡£¡£¡£¡£¿£¿£¿£¿£¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢16λDD PerksÕʺÅÒÔ¼°DD Perks QRÂë¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÇ¿ÖÆËùÓпÉÄÜÊܵ½Ó°ÏìµÄÓû§ÖØÖÃÆäÃÜÂë¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/hackers-breach-dunkin-donuts-accounts-in-credential-stuffing-attack/139472/5¡¢»ùÓÚAutoCADµÄÌØ¹¤»î¶¯±»·¢Ã÷£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ
Çå¾²³§ÉÌForcepoint·¢Ã÷Ò»¸öʹÓûùÓÚAutoCADµÄ¶ñÒâÈí¼þµÄй¤ÒµÌع¤»î¶¯£¬£¬£¬£¬¸Ã»î¶¯×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬Æä2018Äê»î¶¯µÄнüÊܺ¦ÕßÖ÷ҪλÓÚÖйú¡¢Ó¡¶È¡¢ÍÁ¶úÆäºÍ°¢ÁªÇõ¡£¡£¡£¡£¡£ForcepointÌåÏָû±³ºóµÄÍŶӿÉÄÜÊ®·ÖÖØ´ó£¬£¬£¬£¬¹¥»÷ÕßÀֳɵع¥»÷ÁËλÓÚ²î±ð¹ú¼Ò/µØÇøµÄ¶à¸ö¹«Ë¾£¬£¬£¬£¬ÆäÖÐÖÁÉÙÒ»¸ö¹¥»÷»î¶¯Ö÷ÒªÕë¶ÔÄÜÔ´Òµ£¬£¬£¬£¬ÁíÒ»¸ö¹¥»÷»î¶¯×¨×¢ÓÚÆû³µÖÆÔìÒµ¡£¡£¡£¡£¡£¹¥»÷ÕßÖ÷ҪʹÓðüÀ¨¶ñÒâAutoCADÎļþ»òÏÂÔØÁ´½ÓµÄÓã²æÊ½´¹ÂÚÓʼþʵÑé¹¥»÷£¬£¬£¬£¬ÕâЩAutoCADÎļþÖаüÀ¨Òþ²ØµÄ.fasÄ£¿£¿£¿£¿£¿é£¨ÀàËÆÓÚwordÖеĺ꣩£¬£¬£¬£¬ÓÃÓÚÅþÁ¬Ô¶³ÌC&C²¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-industrial-espionage-campaign-leverages-autocad-based-malware/6¡¢EternalSilence£¬£¬£¬£¬ºÚ¿ÍʹÓÃUPnProxyÈëÇÖÔ¼4.5Íò·ÓÉÆ÷
Çå¾²³§ÉÌAkamai·¢Ã÷Ò»¸öÕë¶Ô·ÓÉÆ÷µÄ¶ñÒâ¹¥»÷»î¶¯£¬£¬£¬£¬¸Ã»î¶¯±»³ÆÎªEternalSilence£¨ÓÀºãĬȻ£©£¬£¬£¬£¬¹¥»÷ÕßʹÓöñÒâÊðÀíϵͳUPnProxyѬȾÁËÔ¼4.5Íò¸ö·ÓÉÆ÷£¬£¬£¬£¬²¢Ëæºóͨ¹ýÕâЩ·ÓÉÆ÷µÄ¶Ë¿ÚÈëÇÖÅþÁ¬µÄ×°±¸£¬£¬£¬£¬AkamaiÒÔΪÒÑÓÐ170Íò×°±¸Êܵ½Ó°Ïì¡£¡£¡£¡£¡£AkamaiÎÞ·¨Ì½Öª×îÖÕµÄÓÐÓúÉÔØ£¬£¬£¬£¬µ«ºÜ¿Ï¶¨¹¥»÷ÕßʹÓÃÁËEternalBlueºÍEternalRedÎó²î¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Í¨¹ýɨÃèÒ×Êܹ¥»÷µÄUPnPЧÀÍ£¬£¬£¬£¬Akamai·¢Ã÷¹²ÓÐ27.7Íò¸ö·ÓÉÆ÷ÔÚÏß̻¶¡£¡£¡£¡£¡£ºÃÐÂÎÅÊÇ£¬£¬£¬£¬Õâ²¢²»ÊÇÕë¶ÔÐԵĹ¥»÷£¬£¬£¬£¬¶øÊÇʱ»úÖ÷Òå¹¥»÷¡£¡£¡£¡£¡£AkamaiÔÚ±¨¸æÖÐÑÝʾÁËÔõÑù´ÓÊÜѬȾµÄ·ÓÉÆ÷ÉÑþ³Øý¶ñÒâµÄNATÌõÄ¿¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blogs.akamai.com/sitr/2018/11/upnproxy-eternalsilence.html
ÉùÃ÷£º±¾×ÊѶÓÉ¿·¢k8άËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ