KasperskyÐû²¼2020ÄêµÚÒ»¼¾¶ÈDDoS¹¥»÷Ç÷ÊÆ±¨¸æ£»£»£»£»£»£»£»£»µÂÖÝ·¨ÔºÏµÍ³ÔâÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2020-05-121.KasperskyÐû²¼2020ÄêµÚÒ»¼¾¶ÈDDoS¹¥»÷Ç÷ÊÆ±¨¸æ
KasperskyÐû²¼ÁË2020ÄêµÚÒ»¼¾¶ÈDDoS¹¥»÷Ç÷ÊÆ±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤±¨¸æÐÎò£¬£¬£¬£¬£¬£¬£¬£¬µÚÒ»¼¾¶ÈÊܵ½DDoS¹¥»÷×î¶àµÄÊÇÒ½ÁÆ×éÖ¯¡¢½»¸¶Ð§ÀÍÒÔ¼°ÓÎÏ·ºÍ½ÌÓýÆ½Ì¨ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬£¬£¬£¬3ÔÂÖÐÑ®¹¥»÷ÕßÊÔͼ¹¥»÷ÃÀ¹úÎÀÉúÓ빫¹²Ð§ÀͲ¿£¨HHS£©ÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¡£²¢ÇÒ£¬£¬£¬£¬£¬£¬£¬£¬Ïà±ÈÓÚÉÏÒ»¼¾¶È£¬£¬£¬£¬£¬£¬£¬£¬±¾¼¾¶ÈDDoS¹¥»÷µÄÊýÄ¿ºÍÖÊÁ¿¾ùÏÔÖøÔöÌí£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Ò»Á¬Ê±¼äÒ²ÓÐËù¼Ó³¤¡£¡£¡£¡£¡£¡£¡£¡£Õë¶Ô½ÌÓýºÍÐÐÕþÐÐÒµµÄDDoS¹¥»÷ÊýÄ¿Óë2019ÄêͬÆÚÏà±ÈÔöÌíÁËÁ½±¶£¬£¬£¬£¬£¬£¬£¬£¬Îª19£¥¡£¡£¡£¡£¡£¡£¡£¡£½©Ê¬ÍøÂçÂþÑÜ×î¶àµÄ¹ú¼ÒΪ°ÍÎ÷£¬£¬£¬£¬£¬£¬£¬£¬ÆäIPµØµãÕ¼12.25£¥£¬£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÖйú£¨11.51£¥£©ºÍ°£¼°£¨7.87£¥£©¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/ddos-attacks-in-q1-2020/96837/
2.µÂÖÝ·¨ÔºÏµÍ³ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂç±»ÆÈ½ûÓÃ
µÂ¿ËÈøË¹ÖÝ˾·¨²¿·ÖÓÚ5ÔÂ11ÈÕ½ÒÏþÉùÃ÷£¬£¬£¬£¬£¬£¬£¬£¬ÆäÉÏËß·¨ÔººÍÖÝ˾·¨»ú¹¹µÄ·¨ÔºÖÎÀí°ì¹«ÊÒ£¨OCA£©ÔÚ·ÖÖ§»ú¹¹ÍøÂç·¢Ã÷ÁËÒ»´ÎÑÏÖØµÄÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬±¬·¢Ê±¼äΪ5ÔÂ8ÈÕÍíÉÏ£¬£¬£¬£¬£¬£¬£¬£¬²¢È·ÒÔΪÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬Êܵ½Ó°ÏìµÄÍøÕ¾ºÍЧÀÍÆ÷ËùÔڵķÖÖ§ÍøÂçÒѾ±»½ûÓ㬣¬£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâ¶ñÒâÈí¼þÈö²¥µ½ÆäËûϵͳ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÍøÂç»áÒ»Ö±¼á³Ö½ûÓÃ״ֱ̬µ½ÎÊÌâ½â¾ö¡£¡£¡£¡£¡£¡£¡£¡£OCAÌåÏÖÕýÔÚÊÓ²ì´ËÊ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÊÔͼ»Ö¸´ÊÜÓ°ÏìÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬¶øÓÉÓڱ༺͹²ÏíÎļþµÄÐ×÷¹¤¾ßÒÔ¼°µç×ÓÓʼþÒÑǨáãÖÁÔÆÏµÍ³ÖУ¬£¬£¬£¬£¬£¬£¬£¬Òò¶øÎ´Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬£¬Ê¹²¿·Ö·ÖÖ§»ú¹¹ºÍ·¨ÔºÄܹ»¼ÌÐø¿ªÕ¹ÓªÒµºÍÈÕ³£»£»£»£»£»£»£»£»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/texas-courts-hit-by-ransomware-network-disabled-to-limit-spread/
3.ÀÕË÷Èí¼þSodinokibiй¦Ð§£¬£¬£¬£¬£¬£¬£¬£¬¿É¼ÓÃÜËø¶¨µÄÎļþ
ÀÕË÷Èí¼þSodinokibiÐÂÔöÁËÒ»ÏЧ£¬£¬£¬£¬£¬£¬£¬£¬¼´¿ÉÒÔ¼ÓÃÜÕýÔÚ±»ÁíÒ»¸öÀú³Ì·¿ª»òËø¶¨µÄÎļþ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹¦Ð§Ê¹Ëü¿ÉÒÔ¶ÔÊܺ¦Õߵĸü¶àÎļþ¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£¡£¡£Êý¾Ý¿â»òÓʼþЧÀÍÆ÷ͨ³£»£»£»£»£»£»£»£»áËø¶¨ËüÃÇÒÑ·¿ªµÄÎļþ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ·ÀÊý¾ÝÒòÁ½¸öͬʱдÈëÎļþµÄÀú³Ì¶øÆÆË𣬣¬£¬£¬£¬£¬£¬£¬Í¬Ê±»¹¿ÉÒÔ±ÜÃâÀÕË÷Èí¼þ¶ÔËüÃǾÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷SodinokibiÏÖÔÚÕýÔÚʹÓÃWindows Restart Manager APIÀ´¹Ø±ÕÆäËûÀú³Ì£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶øÊÍ·ÅËø¶¨ÎļþÒÔ¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬£¬SodinokibiÏÖÔÚÄܹ»¼ÓÃܸü¶àÎļþ£¬£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇÒªº¦Îļþ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/sodinokibi-ransomware-can-now-encrypt-open-and-locked-files/
4.΢ÈíºÍÓ¢ÌØ¶ûÁªºÏÑо¿¼ì²â¶ñÒâÈí¼þµÄÐÂÒªÁìSTAMINA
΢ÈíºÍÓ¢ÌØ¶û×î½üÏàÖú¿ªÕ¹ÁËÃûΪSTAMINAµÄÑо¿ÏîÄ¿£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ̽Ë÷¼ì²âºÍ·ÖÀà¶ñÒâÈí¼þµÄÐÂÒªÁì¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÏîÄ¿ÒÀÀµÓÚÒ»ÖÖÐÂÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬½«¶ñÒâÈí¼þÑù±¾×ª»»³É»Ò¶ÈͼÏñ£¬£¬£¬£¬£¬£¬£¬£¬È»ºóɨÃèͼÏñ£¬£¬£¬£¬£¬£¬£¬£¬Ñ°ÕÒÌØ¶¨ÓÚ¶ñÒâÈí¼þÑù±¾µÄÎÆÀíºÍ½á¹¹Ä£Ê½¡£¡£¡£¡£¡£¡£¡£¡£Ê×ÏÈ»ñÈ¡ÊäÈëÎļþ²¢½«Æä¶þ½øÖÆÐÎʽת»»ÎªÔʼÏñËØÊý¾ÝÁ÷£¬£¬£¬£¬£¬£¬£¬£¬È»ºó½«¸ÃһάÏñËØÁ÷ת»»Îª2DÕÕÆ¬£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ±ãͼÏñÆÊÎöËã·¨¶ÔÆä¾ÙÐÐÆÊÎö¡£¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ËüÌṩÁË220Íò¸öÊÜѬȾPEÎļþµÄ¹þÏ£Ñù±¾×÷Ϊ¸ÃÑо¿µÄ»ù´¡£¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬STAMINAÔÚʶ±ðºÍ·ÖÀà¶ñÒâÈí¼þÑù±¾·½Ãæ×¼È·ÐԸߴï99.07£¥£¬£¬£¬£¬£¬£¬£¬£¬Îó±¨ÂÊΪ2.58£¥¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-and-intel-project-converts-malware-into-images-before-analyzing-it/
5.Õë¶Ô¶íÂÞ˹µÄ´¹ÂÚ¹¥»÷ÔöÌí10±¶£¬£¬£¬£¬£¬£¬£¬£¬Ç±ÔÚËðʧΪ4050ÍòÃÀÔª
ƾ֤KasperskyʵÑéÊÒµÄÑо¿£¬£¬£¬£¬£¬£¬£¬£¬Õë¶Ô¶íÂÞ˹µÄÍøÕ¾Õ©Æ¹¥»÷´ÎÊýÔöÌíÁË10±¶£¬£¬£¬£¬£¬£¬£¬£¬µÖ´ï1500Íò£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ´ËÀàÍøÕ¾µÄÊýĿҲÔöÌíÁËÒ»±¶£¬£¬£¬£¬£¬£¬£¬£¬µÖ´ï10000¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬×¨¼Ò²¢Ã»ÓÐ˵¶íÂÞ˹Òò´Ë¹¥»÷ËðʧÁ˼¸¶à£¬£¬£¬£¬£¬£¬£¬£¬µ«¼ÙÉèÿ¸öÕ©ÆÍøÕ¾¶¼ÓÐÖÁÉÙÒ»¸öÓû§ÊÜÆ£¬£¬£¬£¬£¬£¬£¬£¬ÄÇô2020ÄêµÚÒ»¼¾¶ÈµÄDZÔÚËðʧ¿ÉÄÜ»áÁè¼Ý30ÒÚ¬²¼£¨4050ÍòÃÀÔª£©¡£¡£¡£¡£¡£¡£¡£¡£ÊµÑéÊ񵀮ÊÎöʦTatyana SidorinaÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Î±×°³É¹ú¼Ò²ÊƱµÄ¹¥»÷¾ÍÓÐ219ÖÖ£¬£¬£¬£¬£¬£¬£¬£¬¶øÔÚÈ¥Äê»ù±¾ÉÏûÓдËÀ๥»÷¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2020/05/russians-began-to-click-on-scam-sites.html
6.ÒßÇéÔµ¹ÊÔÓÉ£¬£¬£¬£¬£¬£¬£¬£¬Black HatºÍDEF CON½«ÒÔÊÓÆµ¾Û»áÐÎʽ¾ÙÐÐ
ÓÉÓÚCOVID-19£¬£¬£¬£¬£¬£¬£¬£¬Ò»ÄêÖÐ×î´óµÄÁ½´ÎÍøÂçÇå¾²¾Û»áBlack HatºÍDEF CON×÷·ÏÁËÏßϵĻ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼½ÓÄÉÊÓÆµ¾Û»áµÄÐÎʽ¾ÙÐС£¡£¡£¡£¡£¡£¡£¡£ÔçÏÈ£¬£¬£¬£¬£¬£¬£¬£¬Á½³¡¾Û»áÍýÏëÓÚ2020Äê8ÔÂÔÚÀ˹ά¼Ó˹¾ÙÐУ¬£¬£¬£¬£¬£¬£¬£¬Black Hat 8ÔÂ1ÈÕÖÁ8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬DEF CON 8ÔÂ7ÈÕÖÁ8ÔÂ9ÈÕ¡£¡£¡£¡£¡£¡£¡£¡£ØÊºóÓÉÓÚÒßÇé¸ÄΪÏßÉÏģʽ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÈÕÆÚÉÐδ¸ü¸Ä£¬£¬£¬£¬£¬£¬£¬£¬Á½¸ö¾Û»áÍýÏ뽫ÔÚÆäÏÈǰÐû²¼µÄÈÕÆÚ¾ÙÐУ¬£¬£¬£¬£¬£¬£¬£¬²¢»áʵʱֱ²¥Óë²Î»áÕߵĶԻ°¡£¡£¡£¡£¡£¡£¡£¡£DEF CON˾ÀíJeff Moss ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Ã÷ÄêµÄ¾Û»áÍýÏëΪÏÖ³¡»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬ÓÚ2021Äê8ÔÂ5ÈÕÖÁ8ÈÕ¾ÙÐС£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/black-hat-and-def-con-security-conferences-to-take-place-in-a-virtual-format/


¾©¹«Íø°²±¸11010802024551ºÅ