¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181105
Ðû²¼Ê±¼ä 2018-11-05
ƾ֤ProofpointµÄ2018ÄêµÚÈý¼¾¶ÈÍþвÇ÷ÊÆ±¨¸æ£¬£¬£¬£¬£¬µç×ÓÓʼþÈÔÈ»ÊÇÍøÂç·¸·¨·Ö×ÓÈö²¥¶ñÒâÈí¼þºÍ¾ÙÐд¹ÂڻµÄÊ×Ñ¡¹¥»÷ÊֶΡ£¡£¡£´Ó2018ÄêµÄQ2µ½Q3£¬£¬£¬£¬£¬ÍýÏëÇÔÈ¡Æóҵƾ֤µÄµç×ÓÓʼþÔöÌíÁËÁè¼Ý300%¡£¡£¡£Ê¹ÓÃÉ罻ýÌåÉϵÄÐéα¿Í»§Ð§ÀÍÓÕÆÓû§Ð¡ÎÒ˽¼ÒÊý¾ÝµÄ´¹ÂڻÔÚ9ÔµִïÁË×î¸ßˮƽ£¬£¬£¬£¬£¬ÓëÈ¥ÄêͬÆÚÏà±ÈÔöÌíÁË486%¡£¡£¡£ÒøÐÐľÂíÕ¼ËùÓжñÒâÓÐÓúÉÔØµÄ46£¥£¬£¬£¬£¬£¬¶øEmotetºÍZeus PandaÕ¼ÒøÐÐľÂíµÄ90%¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.proofpoint.com/sites/default/files/pfpt-us-tr-q318-quarterly-threat-report.pdf2¡¢ÃÀÖ¥¼Ó¸çCPSÔ¼8ÍòÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔ

ƾ֤֥¼Ó¸çÌ«Ñô±¨µÄ±¨µÀ£¬£¬£¬£¬£¬Ö¥¼Ó¸ç¹«Á¢Ñ§Ð£µÄÒ»Ãûǰ¹ÍÔ±Kristi SimsÇÔÈ¡ÁËÔ¼8ÍòÃûÔ±¹¤¡¢×ÔÔ¸Õߺ͹©Ó¦É̵ÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢°üÀ¨ÐÕÃû¡¢Ô±¹¤ID¡¢µç»°ºÅÂë¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢·¸·¨ÀúÊ·ºÍDCFSÊÓ²ìЧ¹ûµÈ£¬£¬£¬£¬£¬²»°üÀ¨ÈκÎÉç±£ºÅÂë¡£¡£¡£KrimsÏÖÔÚÒѱ»Ö¥¼Ó¸ç¾¯·½¾Ð²¶ºÍ¾ÐÁô£¬£¬£¬£¬£¬²¢½«ÃæÁÙ¶àÏî×ïÃûµÄÖ¸¿Ø¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/80-000-individuals-had-their-personal-info-stolen-by-former-cps-employee-523592.shtml3¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓý©Ê¬ÍøÂçNecursµÄ´¹ÂÚթƻ

˼¿ÆTalosÑо¿Ö°Ô±·¢Ã÷ʹÓý©Ê¬ÍøÂçNecursµÄ´¹ÂÚթƻ¡£¡£¡£¹¥»÷Õß´Ó³ÉÈËÍøÕ¾Ð¹Â¶µÄÊý¾Ý¿âÖÐÑ¡ÔñÄ¿µÄ£¬£¬£¬£¬£¬Ã°³äÓµÓÐÆäԢĿɫÇéÊÓÆµµÄÖ¤¾Ý£¬£¬£¬£¬£¬ÒԴ˾ÙÐÐÍþвºÍڲơ£¡£¡£Ñо¿Ö°Ô±¹²·¢Ã÷Á½¸öÀàËÆµÄ»î¶¯£¬£¬£¬£¬£¬Ò»¸öÊÇ8ÔÂ30ºÅ×îÏȵÄFrom£ºheader»î¶¯£¬£¬£¬£¬£¬ÁíÒ»¸öÊÇ10ÔÂ5ºÅµÄAaron Smith»î¶¯¡£¡£¡£Aaron SmithÖÁÉÙ´Ó137606¸ö²î±ðµÄIPµØµã£¨Ô¼1000¸öIPÓëNecursÓйأ©·¢ËÍÁË233236·â´¹ÂÚÓʼþ£¬£¬£¬£¬£¬ÊÕ¼þÈ˵ÄÊýĿΪ15826£¬£¬£¬£¬£¬Æ½¾ùÿ¸öÊÕ¼þÈËÊÕµ½15·âÓʼþ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/necurs-botnet-distributing-sextortion-email-scams/
4¡¢ÈðÊ¿Sauter¹«Ë¾Ðû²¼Â¥Óî×Ô¶¯»¯²úÆ·µÄÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Ò»¸öXXEÎó²î

Çå¾²³§ÉÌApplied RiskµÄÑо¿Ö°Ô±Gjoko Krstic·¢Ã÷Èðʿ¥Óî×Ô¶¯»¯¹«Ë¾SauterµÄCASE Suite²úÆ·±£´æÒ»¸öXXEÎó²î¡£¡£¡£¸ÃÎó²î£¨CVE-2018-17912£©ÔÊÐí¹¥»÷Õßͨ¹ýOOB¹¥»÷»á¼ûºÍ¼ìË÷í§ÒâÊý¾Ý£¬£¬£¬£¬£¬ÉõÖÁµ¼ÖÂDoS£¬£¬£¬£¬£¬CASE Suite 3.10¼°Ö®Ç°µÄ°æ±¾Êܵ½Ó°Ïì¡£¡£¡£ÔÚ10ÔÂ15ÈÕICS-CERTÏòÆäת´ïÁ˸ÃÎó²îºó£¬£¬£¬£¬£¬Sauter½öÆÆ·ÑÁË10Ìì¾ÍÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/sauter-quickly-patches-flaw-building-automation-software5¡¢Ñо¿ÍŶÓÅû¶СÒϼÒÓÃÉãÏñÍ·ÖеĶà¸öÇå¾²Îó²î

˼¿ÆTalosÍŶÓÅû¶СÒϼÒÓÃÉãÏñÍ·ÖеĶà¸öÇå¾²Îó²î¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÎó²î½ûÓÃÉãÏñÍ·¡¢É¾³ýÉãÏñÍ·ÉÏ´æ´¢µÄÊÓÆµ¡¢Éó²éÊÓÆµ¡¢ÕëµÐÊÖ»úappÌᳫDZÔڵĹ¥»÷ºÍÈëÇÖ¼ÒÍ¥ÍøÂç¹¥»÷ÆäËü×°±¸µÈ¡£¡£¡£Îó²î¹æÄ£°üÀ¨Ô¶³Ì´úÂëÖ´ÐС¢ÏÂÁî×¢Èë¡¢Éí·ÝÑéÖ¤ÈÆ¹ýÒÔ¼°¾Ü¾øÐ§À͵ȡ£¡£¡£ÏêϸÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ×îеĹ̼þ°æ±¾¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2018/10/vulnerability-spotlight-Yi-Technology.html6¡¢Twitterɾ³ýÁè¼Ý1Íò¸öÊÔͼӰÏìÃÀ¹úÖÐÆÚÑ¡¾ÙµÄ»úеÈËÕË»§

TwitterÐû³ÆÔÚ9ÔÂβºÍ10Ô³õÒѾɾ³ýÁËÁè¼Ý1Íò¸ö»úеÈËÕË»§£¬£¬£¬£¬£¬ÕâЩÕË»§ÊÔͼÐû²¼ÐÅÏ¢ÒÔÓ°ÏìÃÀ¹úµÄÖÐÆÚÑ¡¾Ù¡£¡£¡£ÃÀ¹úÃñÖ÷µ³¹ú»á¾ºÑ¡Î¯Ô±»á£¨DCCC£©¿ª·¢ÁËÒ»¸öÓÃÓÚʶ±ðºÍ±¨¸æÓÉ»úеÈË¿ØÖƵÄÉ罻ýÌåÕË»§µÄϵͳ£¬£¬£¬£¬£¬²¢ÒªÇóTwitterɾ³ýÕâЩÕË»§¡£¡£¡£¸ÃϵͳʹÓÃÁËһЩ¹ûÕæµÄ¹¤¾ß£¬£¬£¬£¬£¬ÀýÈçHoaxleyºÍBotometerµÈ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/77642/social-networks/twitter.htmlÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí