¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181226
Ðû²¼Ê±¼ä 2018-12-26
MWR InfoSecurityµÄÑо¿Ö°Ô±·¢Ã÷Twinkly LEDÖÇÄܵƱ£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÔ¶³Ì¿ØÖÆÕâЩµÆ¡£¡£¡£¡£TwinklyµÆ¿ÉÒÔͨ¹ýÒÆ¶¯appÀ´ÖÎÀí£¬£¬£¬£¬£¬£¬µ«¸ÃappÓëµÆÖ®¼äûÓнÓÄɼÓÃÜͨѶ£¬£¬£¬£¬£¬£¬ÆäÉí·ÝÑéÖ¤Àú³Ì±£´æÎó²î£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±¿ÉÒÔʹÓù̼þÖеÄÓ²±àÂëÆ¾Ö¤Í¨¹ýMQTTÐÒéÔ¶³Ì¿ØÖƵƣ¬£¬£¬£¬£¬£¬ÉõÖÁ¿ÉÒÔʹÓõƹâµÄת±äÀ´ÍæÌ°³ÔÉß¡£¡£¡£¡£Ñо¿Ö°Ô±Ô¤¼Æ»¥ÁªÍøÉÏÔ¼ÓÐ2Íǫ̀װ±¸Ò×Êܹ¥»÷£¬£¬£¬£¬£¬£¬µ«ÕâÖÖ¹¥»÷µÄΣº¦ÐÔ²»´ó£¬£¬£¬£¬£¬£¬¸ü¶àµØÀàËÆÓÚ¿ªÍçЦ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hacking-christmas-lights-for-fun-and-mischief/2¡¢IBM Trusteer Rapport for MacOS±£´æÄں˼¶Îó²î£¬£¬£¬£¬£¬£¬ÉÐÎÞÐÞ¸´²¹¶¡
Trustwave SpiderLabsµÄÑо¿Ö°Ô±·¢Ã÷IBM Trusteer RapportÖÕ¶ËÇå¾²¹¤¾ßµÄÇý¶¯³ÌÐò±£´æÒ»¸öÄں˼¶Îó²î£¬£¬£¬£¬£¬£¬ÓÉÓÚIBMδÄÜÔÚ120ÌìÄÚÐû²¼ÐÞ¸´²¹¶¡£¡£¡£¡£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ïò¹«ÖÚÅû¶ÁËÕâ¸öÎó²î¡£¡£¡£¡£Trusteer Rapport for MacOSÓÃÓÚÔÚÓû§ÅþÁ¬µ½¶ñÒâÍøÕ¾Ê±Ëø¶¨ä¯ÀÀÆ÷£¬£¬£¬£¬£¬£¬±£»£»£»£»£»£»¤Óû§µÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÆäÇý¶¯³ÌÐòÔÚ´¦Öóͷ£Óû§»º³åÇøÊ±±£´æ·ûºÅ¹ýʧ£¬£¬£¬£¬£¬£¬¸Ã¹ýʧ¿Éµ¼ÖÂMacOSÄÚºËÖеÄÄÚ´æË𻵣¬£¬£¬£¬£¬£¬²¢×îÖÕµ¼ÖÂÄں˼¶í§Òâ´úÂëÖ´ÐС£¡£¡£¡£¸ÃÎó²îÖ»ÄÜͨ¹ýÍâµØ¹¥»÷À´Ê¹Ó㬣¬£¬£¬£¬£¬ÕâÉÔ΢¼õÇáÁËÆäΣº¦¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/79141/hacking/kernel-buffer-overflow-trusteer-rapport.html3¡¢ÒøÐÐľÂíDanaBot£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÅ·ÖÞÒøÐк͵ç×ÓÓʼþЧÀÍÉÌ
F5 Networks·¢Ã÷ÒøÐÐľÂíDanaBotÔÚ2018Äê11ÔÂ7ÈÕÖÁ12ÔÂ4ÈÕʱ´úÊ®·Ö»îÔ¾£¬£¬£¬£¬£¬£¬ÆäÄ¿µÄº¸ÇÁ˶à¸ö¹ú¼ÒµÄ¶à¸öÐÐÒµ£¬£¬£¬£¬£¬£¬°üÀ¨ÒøÐС¢µç×ÓÓʼþЧÀÍÉ̺ͱÈÌØ±ÒÉúÒâËù¡£¡£¡£¡£DanaBot 88%µÄÄ¿µÄÊÇÒøÐÐÓû§£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÒâ´óÀû£¬£¬£¬£¬£¬£¬Æä´ÎΪ²¨À¼ºÍµÂ¹ú¡£¡£¡£¡£11%µÄÄ¿µÄΪµç×ÓÓʼþЧÀÍÉÌ£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡£¡£¡£¡£11ÔÂ21ÈÕΪDanaBot¶ñÒâ»î¶¯µÄ×îá¯Áë¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.f5.com/labs/articles/threat-intelligence/danabot-november-campaigns-target-european-banks4¡¢Õë¶ÔÈÕ±¾¹«ÃñµÄº£Ð¥Ô¤¾¯À¬»øÓʼþ£¬£¬£¬£¬£¬£¬Ö÷Òª·Ö·¢Smoke LoaderºÍAZORult
2018Äê11ÔÂFortiGuard Labs·¢Ã÷Ò»¸öÕë¶ÔÈÕ±¾¹«ÃñµÄº£Ð¥Ô¤¾¯À¬»øÓʼþ»î¶¯£¬£¬£¬£¬£¬£¬¸ÃÀ¬»øÓʼþ°üÀ¨Ò»¸öÖ¸ÏòÈÕ±¾ÆøÏóÌü£¨JMA£©µÄ¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬£¬ÓÃÓÚ·Ö·¢Smoke LoaderľÂíºÍAZORultľÂí¡£¡£¡£¡£ÏÖÔÚÕâ¸öÐéαµÄJMAÍøÕ¾ÈÔÈ»Ôڳ䵱AZORultµÄC&CЧÀÍÆ÷£¬£¬£¬£¬£¬£¬²¢½«Óû§Öض¨Ïòµ½Õýµ±µÄJMAÍøÕ¾¡£¡£¡£¡£À¬»øÓʼþÖеÄÄÚÈÝûÓÐʹÓÃÔÉúÈÕÓ£¬£¬£¬£¬£¬²¢ÇÒ±£´æÓï·¨¹ýʧ£¬£¬£¬£¬£¬£¬Òò´ËËüÃÇ¿ÉÄÜÊÇÓÉÍâ¹úÈ˱àдµÄ»òÊÇ»úе·ÒëµÄ¡£¡£¡£¡£11ÔÂ25ÈÕÖ®ºó£¬£¬£¬£¬£¬£¬´Ó¶ñÒâÁ´½ÓÏÂÔØµÄ¶ñÒâÈí¼þ´ÓSmoke Loader¸ü¸ÄΪAZORult£¬£¬£¬£¬£¬£¬ËüÃǵÄC&CÓòÃû¶¼ÊÇjma-go[.]jp¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fortinet.com/blog/threat-research/fake-tsunami-brings-malware-to-japan.html5¡¢×î³õ±¬·¢18¸öÔº󣬣¬£¬£¬£¬£¬ÈÔÓÐÊýÊ®Íǫ̀ÅÌËã»úѬȾWannaCry
ƾ֤Kryptos LogicµÄÍþвÇ鱨Ö÷¹ÜJamie HankinsµÄÑо¿£¬£¬£¬£¬£¬£¬ÔÚWannaCry×î³õ±¬·¢µÄ18¸öÔº󣬣¬£¬£¬£¬£¬ÈÔÓÐÊýÊ®Íǫ̀ÅÌËã»úѬȾÁ˸ÃÀÕË÷Èí¼þ¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þµÄkill switchÓòÃûÏÖÔÚÍйÜÔÚCloudflareÉÏ£¬£¬£¬£¬£¬£¬Æ¾Ö¤HankinsµÄÊý¾Ý£¬£¬£¬£¬£¬£¬WannaCryµÄkill switchÓòÃûÔÚÒ»ÖÜÄÚÎüÊÕµ½Áè¼Ý1700Íò¸öÅþÁ¬£¬£¬£¬£¬£¬£¬ÕâЩÅþÁ¬À´×ÔÁè¼Ý63Íò¸ö²î±ðµÄIPµØµã£¬£¬£¬£¬£¬£¬º¸Ç194¸ö²î±ðµÄ¹ú¼Ò/µØÇø¡£¡£¡£¡£ÈÔÈ»Êܵ½WannaCryѬȾµÄ¹ú¼ÒÅÅÃûÖÐÖйú¡¢Ó¡¶ÈÄáÎ÷ÑǺÍÔ½ÄÏÅÅÁÐǰÈý¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/18-months-later-wannacry-still-lurks-on-infected-computers/6¡¢IBM X-ForceÐû²¼2019ÄêÍøÂç·¸·¨ÍþвԶ¾°µÄÕ¹Íû±¨¸æ
IBM X-ForceÐû²¼¹ØÓÚ2019ÄêÍøÂç·¸·¨ÍþвÃûÌõÄÕ¹Íû±¨¸æ£¬£¬£¬£¬£¬£¬±¨¸æ³Æ2019ÄêÆóÒµ½«ïÔÌʹÓÃÉç±£ºÅÂë×÷ΪÉí·ÝÑéÖ¤±êʶ£»£»£»£»£»£»GDPR½«¶ÔÍþвÇ鱨¡¢ÍøÂçÇå¾²´øÀ´¸üÆÕ±éµÄÓ°Ï죻£»£»£»£»£»¹¥»÷Õß½«¸ü¶àµØÊ¹ÓÃÃæÏò¹«ÖÚµÄ×ÔÖúЧÀÍÏµÍ³ÍøÂçÓмÛÖµµÄÓû§Êý¾Ý£»£»£»£»£»£»ÍøÂçÇå¾²°ü¹ÜЧÀÍÉ̽«¸ü¶àµØÓëÇå¾²¹©Ó¦É̾ÙÐÐÏàÖú£»£»£»£»£»£»·¸·¨·Ö×Ó½«¸ü¶àµØÕë¶ÔÂÃÓΡ¢ÂùÝÒµµÄÊý¾Ý£»£»£»£»£»£»Ò»Ð©¹ÉƱÂô¿Õ¿ÉÄÜÓëÍøÂç¹¥»÷Óйأ¬£¬£¬£¬£¬£¬2019Ä꽫»áÅû¶һЩÊÂÎñ»ò»î¶¯£»£»£»£»£»£»¶ñÒâÍÚ¿ó¹¥»÷½«¸ü¶àµØÊ¹ÓÃPowerShellÒÔÎÞÎļþµÄÐÎʽ¾ÙÐС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityintelligence.com/ibm-x-force-security-predictions-for-the-2019-cybercrime-threat-landscape/ÉùÃ÷£º±¾×ÊѶÓÉ¿·¢k8άËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ