TwitterÔÚÈ«Çò¹æÄ£ÄÚЧÀÍÖÐÖ¹£¬£¬ £¬£¬£¬£¬£¬ÊÂÎñÈÔÔÚÊÓ²ìÖУ»£»£»£»£»£»£»Î÷°àÑÀPhone HouseѬȾBabuk£¬£¬ £¬£¬£¬£¬£¬300Íò¿Í»§µÄÐÅϢй¶

Ðû²¼Ê±¼ä 2021-04-19

1.TwitterÔÚÈ«Çò¹æÄ£ÄÚЧÀÍÖÐÖ¹£¬£¬ £¬£¬£¬£¬£¬ÊÂÎñÈÔÔÚÊÓ²ìÖÐ


1.jpg


TwitterÔÚÉÏÖÜÎåÍíÉϱ¬·¢Á˵ÄÖÐÖ¹£¬£¬ £¬£¬£¬£¬£¬²¢Ò»Ö±Ò»Á¬µ½ÖÜÁùÉÏÎç¡£¡£¡£¡£¡£¡£¡£Óû§·´Ó¦µÄÎÊÌâ°üÀ¨ÎÞ·¨Õý³£ËÑË÷¡¢ÄÚÈÝÎÞ·¨¼ÓÔØ¡¢Í¼ÏñÎÞ·¨ÏÔʾÉõÖÁÎÞ·¨µÇÂ¼ÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¾Ýͳ¼Æ´Ë´ÎÖÐÖ¹Ó°ÏìÁËÈ«Çò¹æÄ£ÄÚµÄÓû§£¬£¬ £¬£¬£¬£¬£¬µ«ÂÞÂíÄáÑǵÈһЩ¹ú¼ÒËÆºõ²¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£TwitterÌåÏÖ´Ë´ÎÖÐÖ¹ÊÇÆäЧÀÍÆ÷ÉϵÄÎÊÌ⣬£¬ £¬£¬£¬£¬£¬²¢ÒѾ­ÔÚÆð¾¢½â¾öʹһÇо¡¿ì»Ö¸´Õý³££¬£¬ £¬£¬£¬£¬£¬¿ÉÊDz¢Î´ÌṩÓйش˴ιÊÕϵÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/technology/twitter-is-suffering-from-another-worldwide-outage-today/


2.AdvIntel·¢Ã÷RyukʹÓÃKeeThiefµÈй¤¾ßµÄ¹¥»÷»î¶¯


2.jpg


Çå¾²¹«Ë¾Advanced Intelligence·¢Ã÷RyukʹÓÃKeeThiefµÈй¤¾ßµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽£¬£¬ £¬£¬£¬£¬£¬½ñÄêRyukÀÕË÷Èí¼þ¸ü¶àµØÒÀÀµÓÚ¶ÔRDP̻¶µÄÖ÷»ú¾ÙÐдó¹æÄ£±©Á¦ÆÆ½âºÍÃÜÂëÅçÈ÷¹¥»÷À´ÈëÇÖÄ¿µÄÍøÂç¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬ÔÚÕâЩ¹¥»÷Öл¹·¢Ã÷ÁËÐÂÊÖÒÕ£¬£¬ £¬£¬£¬£¬£¬°üÀ¨Ê¹ÓôÓKeePassÃÜÂëÖÎÀíÆ÷ÇÔȡƾ֤µÄ¿ªÔ´¹¤¾ßKeeThief£¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°×°ÖñãЯʽ°æ±¾µÄNotepad ++£¬£¬ £¬£¬£¬£¬£¬ÔÚPowerShellÖ´ÐÐÊÜÏÞµÄϵͳÉÏÔËÐÐPowerShell¾ç±¾¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ryuk-ransomware-operation-updates-hacking-techniques/


3.Î÷°àÑÀPhone HouseѬȾBabuk£¬£¬ £¬£¬£¬£¬£¬300Íò¿Í»§µÄÐÅϢй¶


3.jpg


Î÷°àÑÀPhone HouseѬȾBabuk£¬£¬ £¬£¬£¬£¬£¬²¢±»ÀÕË÷600ÍòÃÀÔª£¨Ô¼97¸ö±ÈÌØ±Ò£©µÄÊê½ð¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜÁù£¬£¬ £¬£¬£¬£¬£¬BabukÔÚ°µÍø³ÆÒÑÇÔÈ¡Phone HouseµÄ10¸öÊý¾Ý¿â£¬£¬ £¬£¬£¬£¬£¬ÆäÖаüÀ¨ÁËÁè¼Ý300Íò¿Í»§ºÍÔ±¹¤µÄ˽ÈËÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢³öÉúÈÕÆÚ¡¢DNI¡¢ÒøÐÐÕË»§¡¢Ð¡ÎÒ˽¼ÒÊÖ»ú¡¢µç×ÓÓʼþ¡¢Ð¡ÎÒ˽¼ÒסËùµØµãºÍÊÂÇ鹫˾µÈÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬£¬Phone House²¢Î´¶Ô´ËÊÂÎñ×÷³ö»ØÓ¦¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.elconfidencial.com/tecnologia/2021-04-17/phone-house-ciberataque-chantaje-hackers-babuk_3038839/


4.ClarotyÅû¶OpENer¿ÍÕ»ÖеÄ5¸öÑÏÖØµÄÎó²î


4.jpg


Çå¾²¹«Ë¾ClarotyÅû¶ÁËOpENer EtherNet/IP£¨ENIP£©¿ÍÕ»ÖеÄ5¸öÑÏÖØµÄÎó²î£¬£¬ £¬£¬£¬£¬£¬ËüÃÇ¿ÉÄܵ¼Ö¹¤ÒµÏµÍ³Êܵ½¾Ü¾øÐ§ÀÍ£¨DoS£©¹¥»÷¡¢ÐÅϢй¶ºÍÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬ £¬£¬£¬£¬£¬×îΪÑÏÖØµÄÊÇÔ½½çдÈëÎó²î£¨CVE-2020-13556£©£¬£¬ £¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬ £¬£¬£¬£¬£¬¿Éͨ¹ýһϵÁÐÌØÖÆµÄÍøÂçÇëÇóÀ´Ô¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬ÉÐÓпɵ¼ÖÂDoSµÄÎó²î£¨CVE-2021-27478£©ºÍÔ½½ç¶ÁÈ¡Îó²î£¨CVE-2021-27478£©µÈ¡£¡£¡£¡£¡£¡£¡£CISAÔÚÖÒÑԳƣ¬£¬ £¬£¬£¬£¬£¬2021Äê2ÔÂ10ÈÕ֮ǰµÄËùÓÐOpENer EtherNet/IP¿ÍÕ»°æ±¾¶¼Ò×ÊÜÕâЩÎó²îµÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/vulnerabilities-opener-stack-expose-industrial-devices-attacks


5.SophosÐû²¼2021ÄêÍøÂçÇå¾²ÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


5.jpg


SophosÐû²¼ÁË2021ÄêÍøÂçÇå¾²ÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æ³Æ£¬£¬ £¬£¬£¬£¬£¬µÖÓùÀÕË÷Èí¼þ¹¥»÷ÐèÒªËø¶¨½øÈëÍøÂçµÄ·½·¨¡¢±£±£´æÏß±¸·Ý²¢È·±£ÆäÔÚÐèҪʱ¿ÉÓá¢Ëõ¶Ì½â¾ö¶ñÒâÈí¼þËùÐèµÄʱ¼ä¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬2021ÄêÀÕË÷Èí¼þµÄ¿ÉÄܻᱬ·¢ÖØ´óת±ä£¬£¬ £¬£¬£¬£¬£¬ÀýÈ磬£¬ £¬£¬£¬£¬£¬¹¥»÷ÕßʹÓþӼÒÊÂÇéÔ±¹¤µÄ¸ü¶àÓÅÊÆ£¬£¬ £¬£¬£¬£¬£¬À´ÈÚÈëÉÌÒµÇéÐΣ»£»£»£»£»£»£»ÀÕË÷¼´Ð§ÀÍ£¨RAAS£©³ÊÉÏÉýÇ÷ÊÆ£»£»£»£»£»£»£»Ô¤¼ÆÕë¶ÔÔÆ»ù´¡¼Ü¹¹µÄ¹¥»÷ºÍ¶à¼¶ÀÕË÷¹¥»÷½«»áÔöÌí¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2021-threat-report.pdf


6.NortonLifeLockÐû²¼COVID-19ʱ´úÍøÂç·¸·¨±¨¸æ


6.jpg


NortonLifeLockÐû²¼ÁËÔÚCOVID-19ʱ´úÍøÂç·¸·¨µÄ±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬£¬£¬£¬£¬ÔÚÈ¥ÄêÈ«Çò½ü3.3ÒÚÈË£¨65£¥£©Ôâµ½ÁËÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬£¬×Ü¼ÆÆÆ·ÑÁË27ÒÚ¸öСʱÀ´Ó¦¶ÔÓöµ½µÄÎÊÌ⣬£¬ £¬£¬£¬£¬£¬Áè¼Ý5500ÍòÈËÊÇÔâµ½ÁËÉí·ÝµÁÓᣡ£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬73£¥µÄÃÀ¹úÈËÌåÏÖËûÃÇÔÚÍøÂçÉ쮮ᄵÄʱ¼ä±ÈÒÔÍùÈκÎʱ¼ä¶¼¶à£¬£¬ £¬£¬£¬£¬£¬ÆäÖÐ59£¥µÄÈ˸üµ£ÐijÉÎªÍøÂç·¸·¨µÄÊܺ¦Õߣ¬£¬ £¬£¬£¬£¬£¬ÉÐÓÐ56£¥µÄÃÀ¹úÈËÈϿɺÜÄÑÈ·¶¨ËûÃÇÔÚÍøÉÏ¿´µ½µÄÐÅÏ¢ÊÇ·ñÀ´×Ô¿É¿¿µÄȪԴ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://investor.nortonlifelock.com/About/Investors/press-releases/press-release-details/2021/COVID-19-Pandemic-Leaves-Consumers-Vulnerable-to-Cybercrime/default.aspx