¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181105

Ðû²¼Ê±¼ä 2018-11-05
1¡¢Çå¾²³§ÉÌÐû²¼2018ÄêQ3ÍøÂçÍþвÇ÷ÊÆµÄÆÊÎö±¨¸æ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤ProofpointµÄ2018ÄêµÚÈý¼¾¶ÈÍþвÇ÷ÊÆ±¨¸æ £¬ £¬£¬£¬£¬µç×ÓÓʼþÈÔÈ»ÊÇÍøÂç·¸·¨·Ö×ÓÈö²¥¶ñÒâÈí¼þºÍ¾ÙÐд¹ÂڻµÄÊ×Ñ¡¹¥»÷ÊֶΡ£¡£¡£´Ó2018ÄêµÄQ2µ½Q3 £¬ £¬£¬£¬£¬ÍýÏëÇÔÈ¡Æóҵƾ֤µÄµç×ÓÓʼþÔöÌíÁËÁè¼Ý300%¡£¡£¡£Ê¹ÓÃÉ罻ýÌåÉϵÄÐéα¿Í»§Ð§ÀÍÓÕÆ­Óû§Ð¡ÎÒ˽¼ÒÊý¾ÝµÄ´¹ÂڻÔÚ9ÔµִïÁË×î¸ßˮƽ £¬ £¬£¬£¬£¬ÓëÈ¥ÄêͬÆÚÏà±ÈÔöÌíÁË486%¡£¡£¡£ÒøÐÐľÂíÕ¼ËùÓжñÒâÓÐÓúÉÔØµÄ46£¥ £¬ £¬£¬£¬£¬¶øEmotetºÍZeus PandaÕ¼ÒøÐÐľÂíµÄ90%¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.proofpoint.com/sites/default/files/pfpt-us-tr-q318-quarterly-threat-report.pdf


2¡¢ÃÀÖ¥¼Ó¸çCPSÔ¼8ÍòÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤֥¼Ó¸çÌ«Ñô±¨µÄ±¨µÀ £¬ £¬£¬£¬£¬Ö¥¼Ó¸ç¹«Á¢Ñ§Ð£µÄÒ»Ãûǰ¹ÍÔ±Kristi SimsÇÔÈ¡ÁËÔ¼8ÍòÃûÔ±¹¤¡¢×ÔÔ¸Õߺ͹©Ó¦É̵ÄСÎÒ˽¼ÒÐÅÏ¢ £¬ £¬£¬£¬£¬ÕâЩÐÅÏ¢°üÀ¨ÐÕÃû¡¢Ô±¹¤ID¡¢µç»°ºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢·¸·¨ÀúÊ·ºÍDCFSÊÓ²ìЧ¹ûµÈ £¬ £¬£¬£¬£¬²»°üÀ¨ÈκÎÉç±£ºÅÂë¡£¡£¡£KrimsÏÖÔÚÒѱ»Ö¥¼Ó¸ç¾¯·½¾Ð²¶ºÍ¾ÐÁô £¬ £¬£¬£¬£¬²¢½«ÃæÁÙ¶àÏî×ïÃûµÄÖ¸¿Ø¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/80-000-individuals-had-their-personal-info-stolen-by-former-cps-employee-523592.shtml


3¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓý©Ê¬ÍøÂçNecursµÄ´¹ÂÚÕ©Æ­»î¶¯

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


˼¿ÆTalosÑо¿Ö°Ô±·¢Ã÷ʹÓý©Ê¬ÍøÂçNecursµÄ´¹ÂÚÕ©Æ­»î¶¯¡£¡£¡£¹¥»÷Õß´Ó³ÉÈËÍøÕ¾Ð¹Â¶µÄÊý¾Ý¿âÖÐÑ¡ÔñÄ¿µÄ £¬ £¬£¬£¬£¬Ã°³äÓµÓÐÆäԢĿɫÇéÊÓÆµµÄÖ¤¾Ý £¬ £¬£¬£¬£¬ÒԴ˾ÙÐÐÍþвºÍڲƭ¡£¡£¡£Ñо¿Ö°Ô±¹²·¢Ã÷Á½¸öÀàËÆµÄ»î¶¯ £¬ £¬£¬£¬£¬Ò»¸öÊÇ8ÔÂ30ºÅ×îÏȵÄFrom£ºheader»î¶¯ £¬ £¬£¬£¬£¬ÁíÒ»¸öÊÇ10ÔÂ5ºÅµÄAaron Smith»î¶¯¡£¡£¡£Aaron SmithÖÁÉÙ´Ó137606¸ö²î±ðµÄIPµØµã£¨Ô¼1000¸öIPÓëNecursÓйأ©·¢ËÍÁË233236·â´¹ÂÚÓʼþ £¬ £¬£¬£¬£¬ÊÕ¼þÈ˵ÄÊýĿΪ15826 £¬ £¬£¬£¬£¬Æ½¾ùÿ¸öÊÕ¼þÈËÊÕµ½15·âÓʼþ¡£¡£¡£
  Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/necurs-botnet-distributing-sextortion-email-scams/


4¡¢ÈðÊ¿Sauter¹«Ë¾Ðû²¼Â¥Óî×Ô¶¯»¯²úÆ·µÄÇå¾²¸üР£¬ £¬£¬£¬£¬ÐÞ¸´Ò»¸öXXEÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Çå¾²³§ÉÌApplied RiskµÄÑо¿Ö°Ô±Gjoko Krstic·¢Ã÷Èðʿ¥Óî×Ô¶¯»¯¹«Ë¾SauterµÄCASE Suite²úÆ·±£´æÒ»¸öXXEÎó²î¡£¡£¡£¸ÃÎó²î£¨CVE-2018-17912£©ÔÊÐí¹¥»÷Õßͨ¹ýOOB¹¥»÷»á¼ûºÍ¼ìË÷í§ÒâÊý¾Ý £¬ £¬£¬£¬£¬ÉõÖÁµ¼ÖÂDoS £¬ £¬£¬£¬£¬CASE Suite 3.10¼°Ö®Ç°µÄ°æ±¾Êܵ½Ó°Ïì¡£¡£¡£ÔÚ10ÔÂ15ÈÕICS-CERTÏòÆäת´ïÁ˸ÃÎó²îºó £¬ £¬£¬£¬£¬Sauter½öÆÆ·ÑÁË10Ìì¾ÍÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/sauter-quickly-patches-flaw-building-automation-software


5¡¢Ñо¿ÍŶÓÅû¶СÒϼÒÓÃÉãÏñÍ·ÖеĶà¸öÇå¾²Îó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


˼¿ÆTalosÍŶÓÅû¶СÒϼÒÓÃÉãÏñÍ·ÖеĶà¸öÇå¾²Îó²î¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÎó²î½ûÓÃÉãÏñÍ·¡¢É¾³ýÉãÏñÍ·ÉÏ´æ´¢µÄÊÓÆµ¡¢Éó²éÊÓÆµ¡¢ÕëµÐÊÖ»úappÌᳫDZÔڵĹ¥»÷ºÍÈëÇÖ¼ÒÍ¥ÍøÂç¹¥»÷ÆäËü×°±¸µÈ¡£¡£¡£Îó²î¹æÄ£°üÀ¨Ô¶³Ì´úÂëÖ´ÐС¢ÏÂÁî×¢Èë¡¢Éí·ÝÑéÖ¤ÈÆ¹ýÒÔ¼°¾Ü¾øÐ§À͵È¡£¡£¡£ÏêϸÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó £¬ £¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ×îеĹ̼þ°æ±¾¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2018/10/vulnerability-spotlight-Yi-Technology.html


6¡¢Twitterɾ³ýÁè¼Ý1Íò¸öÊÔͼӰÏìÃÀ¹úÖÐÆÚÑ¡¾ÙµÄ»úеÈËÕË»§

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


TwitterÐû³ÆÔÚ9ÔÂβºÍ10Ô³õÒѾ­É¾³ýÁËÁè¼Ý1Íò¸ö»úеÈËÕË»§ £¬ £¬£¬£¬£¬ÕâЩÕË»§ÊÔͼÐû²¼ÐÅÏ¢ÒÔÓ°ÏìÃÀ¹úµÄÖÐÆÚÑ¡¾Ù¡£¡£¡£ÃÀ¹úÃñÖ÷µ³¹ú»á¾ºÑ¡Î¯Ô±»á£¨DCCC£©¿ª·¢ÁËÒ»¸öÓÃÓÚʶ±ðºÍ±¨¸æÓÉ»úеÈË¿ØÖƵÄÉ罻ýÌåÕË»§µÄϵͳ £¬ £¬£¬£¬£¬²¢ÒªÇóTwitterɾ³ýÕâЩÕË»§¡£¡£¡£¸ÃϵͳʹÓÃÁËһЩ¹ûÕæµÄ¹¤¾ß £¬ £¬£¬£¬£¬ÀýÈçHoaxleyºÍBotometerµÈ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/77642/social-networks/twitter.html


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí