Upstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·£»£»£»£»£»£»Ó¢¹úÕþ¸®ÖØÐÂÊÓ²ìÂ×¶ØÖ¤È¯ÉúÒâËùÈ¥Äêå´»úÊÂÎñ

Ðû²¼Ê±¼ä 2020-01-07


1.Upstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Upstream Security2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·»ùÓÚ¶ÔÒÑÍùÊ®ÄêÖÐ367Æð¹ûÕæ±¨¸æµÄÆû³µÍøÂçÇå¾²ÊÂÎñ¾ÙÐÐÆÊÎö£¬£¬£¬£¬£¬ÖصãÇ¿µ÷ÁË2019Äêʱ´ú·¢Ã÷µÄÎó²îÓë¿´·¨¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³ö£¬£¬£¬£¬£¬»¥ÁªÍøÆû³µÒÑÔÚ½ÓÊÜÆû³µÊг¡£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓÐ3.3ÒÚÁ¾»¥ÁªÍøÆû³µ£¬£¬£¬£¬£¬ÕâÒâζ×Åÿ´Î¹¥»÷µÄDZÔÚÆÆËðÁ¦³É±¶ÔöÌí£¬£¬£¬£¬£¬´ó¹æÄ£µÄ¹¥»÷ÊÂÎñ¿ÉÄÜ»áÆÆËðÕû¸ö¶¼»á£¬£¬£¬£¬£¬ÉõÖÁµ¼ÖÂÔÖÄÑÐÔµÄÉúÃüËðʧ¡£¡£¡£¡£¡£¡£×Ô2016ÄêÒÔÀ´£¬£¬£¬£¬£¬Ã¿ÄêÆû³µÍøÂçÇå¾²ÊÂÎñµÄÊýÄ¿ÔöÌíÁË605%£¬£¬£¬£¬£¬½ö2019ÄêÒ»Äê¾ÍÔöÌíÁËÒ»±¶ÒÔÉÏ¡£¡£¡£¡£¡£¡£ÔÚ2019Ä꣬£¬£¬£¬£¬ÓÐ57%µÄÊÂÎñÊÇÓÉÍøÂç×ï·¸¾ÙÐеÄ£¬£¬£¬£¬£¬ÆäÄ¿µÄÊÇÆÆËðÓªÒµ¡¢ÇÔÈ¡¿î×Ó»òË÷ÒªÊê½ð¡£¡£¡£¡£¡£¡£½öÓÐ38%ÊÇÑо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬£¬£¬ÆäÄ¿µÄÏò¹«Ë¾ºÍÏûºÄÕß¾¯ÃܸæÏÖµÄÎó²î¡£¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/01/06/automotive-cybersecurity-incidents/


2.΢ÈíÐû²¼RDP±©Á¦¹¥»÷ÆÊÎö±¨¸æ£¬£¬£¬£¬£¬Æ½¾ùÒ»Á¬Ê±¼äΪ2-3Ìì


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


΢ÈíÐû²¼ÁËÒ»·ÝÕë¶ÔRDP±©Á¦¹¥»÷µÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬¸ÃÏîÑо¿ÊÇ»ùÓÚ´ÓÁè¼Ý4.5Íò¸ö×°ÖÃÁËÃâ·ÑMicrosoft Defender ATPµÄÊÂÇéÕ¾ÉÏÍøÂçµÄÊý¾Ý¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÓëʧ°ÜºÍÀֳɵÄRDPµÇ¼ÊÂÎñÓйأ¨»®·ÖÊÇIDΪ4265ºÍ4264µÄWindowsÊÂÎñ£©£¬£¬£¬£¬£¬²¢ÇÒÉæ¼°Óû§/¹¥»÷Õß¿ÉÄÜʹÓõÄÓû§ÃûÏêϸÐÅÏ¢£¬£¬£¬£¬£¬Êý¾ÝÍøÂçÁ˼¸¸öÔµÄʱ¼ä¡£¡£¡£¡£¡£¡£Î¢ÈíÔÚ±¨¸æÖÐÌåÏÖ£¬£¬£¬£¬£¬×î½üÊӲ쵽µÄRDP±©Á¦¹¥»÷ƽ¾ùÒ»Á¬2-3Ì죬£¬£¬£¬£¬Ô¼90£¥µÄ°¸ÀýÒ»Á¬Ê±¼äÔÚÒ»ÖÜÄÚ£¬£¬£¬£¬£¬Ö»Óв»µ½5£¥µÄ°¸ÀýÒ»Á¬Ê±¼äÔÚÁ½ÖÜ»òÒÔÉÏ¡£¡£¡£¡£¡£¡£Ô¼ÓÐ0.08£¥µÄRDP±©Á¦¹¥»÷ÀֳɾÙÐÐÁ˵Ǽ¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/


3.Ó¢¹úÕþ¸®ÖØÐÂÊÓ²ìÂ×¶ØÖ¤È¯ÉúÒâËùÈ¥Äêå´»úÊÂÎñ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ó¢¹úÕþ¸®ÕýÔÚÖØÐÂÉó²éÂ×¶ØÖ¤È¯ÉúÒâËùÈ¥ÄêµÄå´»úÊÂÎñ£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÆäÊÇ·ñÓëÍøÂç¹¥»÷ÓйØ¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê8ÔÂ16ÈÕ£¬£¬£¬£¬£¬¡°Èí¼þ¹ÊÕÏ¡±µ¼ÖÂÐÇÆÚÎåµÄÔç¼äÉúÒâÕßÔÚÒ»¸ö°ëСʱÒÔÉϵÄʱ¼äÄÚÎÞ·¨ÉúÒâ¹ÉƱ¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñʹµÃ¸»Ê±100ºÍ¸»Ê±250Ö¸Êý¾ùÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£ÆäʱÂ×¶ØÖ¤½»ËùµÄ¹ÙÔ±ÌåÏÖ¡°Èí¼þÊÖÒÕÎÊÌ⡱ÊÇÊÂÎñµÄ»ù´¡Ôµ¹ÊÔ­ÓÉ£¬£¬£¬£¬£¬µ«Ã»ÓÐÌṩÈκνøÒ»²½µÄϸ½Ú¡£¡£¡£¡£¡£¡£µ«Æ¾Ö¤½üÆÚ¡¶»ª¶û½ÖÈÕ±¨¡·µÄ±¨µÀ£¬£¬£¬£¬£¬ÕýÔÚ¾ÙÐеÄÒ»ÏîÊÓ²ìÅú×¢¸ÃÊÂÎñ¿ÉÄܲ»µ«½öÊÇÓÉÓÚÈí¼þÎÊÌâ¡£¡£¡£¡£¡£¡£ÐÂÎÅÈËÊ¿³ÆÓ¢¹úÕþ¸®Í¨Ñ¶×ܲ¿£¨GCHQ£©Ï£ÍûÏàʶ崻úÊÂÎñÊÇ·ñÊÇÓÉÓÚºÚ¿ÍÊÔͼ¡°ÆÆËðÊг¡¡±µ¼ÖµÄ¡£¡£¡£¡£¡£¡£ÔÚÒÑÍùÁ½¸öÔÂÖУ¬£¬£¬£¬£¬Ç鱨»ú¹¹ÒÑÁªÏµ¸ÃÉúÒâËù»ñÈ¡ÌØÁíÍâÐÅÏ¢¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/uk-government-investigates-possible-cyberattack-link-to-london-stock-exchange-outage/


4.È¥ÄêѬȾSodinokibiµÄ¼ÓÖÝITЧÀÍÔËÓªÉÌSynoptek¾öÒéÖ§¸¶Êê½ð


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¼ÓÀû¸£ÄáÑÇÖݵÄITЧÀÍÉÌSynoptekÔÚѬȾÀÕË÷Èí¼þSodinokibiºó¾öÒéÖ§¸¶Êê½ðÒÔ½âÃÜÆäÎļþ¡£¡£¡£¡£¡£¡£SynoptekÓµÓб鲼¶à¸öÐÐÒµµÄ1100¶à¼Ò¿Í»§£¬£¬£¬£¬£¬°üÀ¨µØ·½Õþ¸®¡¢½ðÈÚЧÀÍ¡¢Ò½ÁƱ£½¡¡¢ÖÆÔìÒµ¡¢Ã½Ìå¡¢ÁãÊÛºÍÈí¼þÐÐÒµ¡£¡£¡£¡£¡£¡£Ñ¬È¾ÊÂÎñ±¬·¢ÔÚÈ¥Äê12ÔÂ23ÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍÊ×ÏÈÈëÇÖÁ˹«Ë¾ÍøÂ磬£¬£¬£¬£¬È»ºó×°ÖÃÁËÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£ÆäʱSynoptek֤ʵÁ˴˴ι¥»÷£¬£¬£¬£¬£¬µ«Ã»ÓнÒÏþ̸ÂÛ¡£¡£¡£¡£¡£¡£SodiniokibiÍÅ»ïËÆºõרעÓÚÕë¶ÔÃÀ¹úITЧÀÍÉÌ£¬£¬£¬£¬£¬2019Äê8ÔÂPercSoft¹«Ë¾Êܵ½Ñ¬È¾£¬£¬£¬£¬£¬12Ô¸öñÒâÈí¼þѬȾÁËComplete Technology SolutionsµÄϵͳÒÔ¼°ÃÀ¹úÖ÷ÒªÊý¾ÝÖÐÐÄÌṩÉÌÖ®Ò»CyrusOne¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/96017/malware/sodinokibi-ransomware-attack.html


5.ChromeÀ©Õ¹Ledge SecureÇÔÈ¡¼ÛÖµ1.6ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ƾ֤DecryptµÄ±¨¸æ£¬£¬£¬£¬£¬Chrome¶ñÒâÀ©Õ¹Ledge Secure½øÈëÁËChromeÓ¦ÓÃÊÐËÁ²¢ÀÖ³ÉÇÔÈ¡ÁËÖÁÉÙ¼ÛÖµ1.6ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¸ÃÀ©Õ¹Éù³Æ¿ÉÒԳ䵱Chromeä¯ÀÀÆ÷ÖеļÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬£¬²¢ÒÔijÖÖ·½·¨Ïë·¨ÈÆ¹ýÁËGoogleµÄ¹ýÂËÆ÷£¬£¬£¬£¬£¬×îÖÕ½øÈëÁËÓ¦ÓÃÊÐËÁ¹©Óû§ÏÂÔØ¡£¡£¡£¡£¡£¡£·¨¹úLedger¹«Ë¾ÔÚTwitterÉÏÈ·ÈÏÁ˸ÃÀ©Õ¹²¢²»ÊÇÕýµ±µÄ£¬£¬£¬£¬£¬²¢½¨ÒéÓû§×èÖ¹ÔÚÆä×°±¸ÉÏ×°ÖøÃÀ©Õ¹¡£¡£¡£¡£¡£¡£ÏÖÔÚGoogleÒѾ­´ÓChromeÓ¦ÓÃÊÐËÁÖÐɾ³ýÁ˸ÃÀ©Õ¹¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/shady-google-chrome-extension-steals-16-000-worth-of-cryptocurrency-528762.shtml


6.ÀÕË÷Èí¼þREvilÆð¾¢Õë¶Ôδ´ò²¹¶¡µÄPulse Secure VPNЧÀÍÆ÷


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±±Þ²ßÕýÔÚʹÓÃPulse Secure VPNµÄ×éÖ¯Á¬Ã¦×°ÖÃÐÞ¸´²¹¶¡£¬£¬£¬£¬£¬²»È»ËüÃǽ«ÃæÁÙÀÕË÷Èí¼þREvilµÄ¹¥»÷¡£¡£¡£¡£¡£¡£Ó¢¹úÇå¾²Ñо¿Ô±¿­ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©Ìá¼°µÄ²¹¶¡ÊÇÃÀ¹úCISA¡¢¹ú¼ÒÇå¾²¾ÖºÍÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄÔÚÈ¥Äê10Ô·ÝÐû²¼µÄÖÒÑÔÖÐÌá¼°µÄÎó²î²¹¶¡£¬£¬£¬£¬£¬°üÀ¨CVE-2019-11510ºÍCVE-2019-11539¡£¡£¡£¡£¡£¡£BeaumontÖ¸³ö£¬£¬£¬£¬£¬Pulse Secure VPNÎó²î¡°ºÜÊÇÑÏÖØ¡±£¬£¬£¬£¬£¬ÓÉÓÚËüÔÊÐíûÓÐÓÐÓÃÆ¾Ö¤µÄÔ¶³Ì¹¥»÷ÕßÔ¶³ÌÅþÁ¬µ½¹«Ë¾ÍøÂ磬£¬£¬£¬£¬½ûÓöàÒòËØÉí·ÝÑéÖ¤ÒÔ¼°ÒÔ´¿Îı¾ÐÎʽԶ³ÌÉó²éÈÕÖ¾»ººÍ´æµÄÃÜÂë¡£¡£¡£¡£¡£¡£Æ¾Ö¤Çå¾²¹«Ë¾Bad PacketsÓÚ1ÔÂ4ÈÕ¾ÙÐеÄɨÃ裬£¬£¬£¬£¬ÓÐ3825¸öPulse Secure VPNЧÀÍÆ÷ÉÐδÕë¶ÔÎó²îCVE-2019-11510¾ÙÐÐÐÞ¸´£¬£¬£¬£¬£¬ÕâЩÒ×Êܹ¥»÷µÄVPNЧÀÍÆ÷ÖÐÓÐ1300¶à¸öλÓÚÃÀ¹ú¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/