RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£»£»£»£»£»ÃÀ¹ú·Ò×˹°²ÄÇÖÝÒòÔâÀÕË÷Èí¼þ¹¥»÷Ðû²¼½øÈë½ôÆÈ״̬

Ðû²¼Ê±¼ä 2019-07-26
1¡¢RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£¬£¬£¬ £¬ £¬£¬£¬Ã¿·ÖÖÓËðʧ290ÍòÃÀÔª


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤RiskIQµÄÊý¾Ý£¬£¬£¬ £¬ £¬£¬£¬È¥ÄêÍøÂç·¸·¨·Ö×Óÿ·ÖÖÓ¸øÈ«Çò¾­¼ÃÔì³É290ÍòÃÀÔªµÄËðʧ£¬£¬£¬ £¬ £¬£¬£¬ÕûÄê×ܼÆÔì³É1.5ÍòÒÚÃÀÔªµÄËðʧ¡£¡£¡£¡£ÆäËüÊý¾Ý°üÀ¨£¬£¬£¬ £¬ £¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùÿ·ÖÖÓµÄËðʧ´ï1930ÃÀÔª£»£»£»£»£»´¹ÂÚ¹¥»÷ÿ·ÖÖÓÔì³ÉµÄËðʧ´ï17700ÃÀÔª£»£»£»£»£»2019ÄêÈ«ÇòÀÕË÷Èí¼þÊÂÎñµÄÔ¤¼Æ±¾Ç®ÎªÃ¿·ÖÖÓ22184ÃÀÔª£»£»£»£»£»Ã¿·ÖÖÓй¶µÄÉí·ÝÊý¾ÝÌõÊýΪ8100Ìõ£»£»£»£»£»Ã¿·ÖÖÓ¼ì²âµ½µÄ¶ñÒâÖØ¶¨ÏòΪ7¸öµÈ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/external-threat-management/2019-evil-internet-minute/


2¡¢ÃÀ¹ú·Ò×˹°²ÄÇÖÝÒòÔâÀÕË÷Èí¼þ¹¥»÷Ðû²¼½øÈë½ôÆÈ״̬


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹ú·Ò×˹°²ÄÇÖÝÖݳ¤John EdwardsÔÚÒ»²¨Õë¶Ô¸ÃÖÝÑ§ÇøµÄÀÕË÷Èí¼þ¹¥»÷À˳±ºóÐû²¼½øÈë½ôÆÈ״̬£¬£¬£¬ £¬ £¬£¬£¬¸Ã½ôÆÈÉùÃ÷½«ÔÊÐí·Ò×˹°²ÄÇÖݵÄÇ徲ר¼ÒºÍÏà¹Ø×ÊԴЭÖúÍâµØÕþ¸®»ú¹¹±£»£»£»£»£»¤ÆäÍøÂç¡£¡£¡£¡£½öÔÚ7Ô·ݣ¬£¬£¬ £¬ £¬£¬£¬¸ÃÖݾÍÓÐËĸöÑ§ÇøÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬ £¬£¬£¬µ¼ÖÂÆäÅÌËã»úϵͳºÍµç»°ÏµÍ³ÖÐÖ¹£¬£¬£¬ £¬ £¬£¬£¬ÕâËĸöÑ§Çø»®·ÖÊÇMorehouse¡¢Sabine¡¢Monroe CityºÍOuachita¡£¡£¡£¡£¸Ã½ôÆÈÉùÃ÷»¹ÒªÇóËùÓÐÊÜÀÕË÷Èí¼þ¹¥»÷Ó°ÏìµÄÕþ¸®»ú¹¹ÏòÖݹÙÔ±±¨¸æ£¬£¬£¬ £¬ £¬£¬£¬²¢ÏÞÖÆÇå¾²¹«Ë¾ÔÚ½ôÆÈÇéÐÎÏÂÌá¼Û¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ransomware-attacks-prompt-louisiana-to-declare-state-of-emergency/


3¡¢Ó¢¹úµçÐŹ«Ë¾SkyÔÚÔâÊÜײ¿â¹¥»÷ºóÖØÖÃÓû§ÃÜÂë


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔÚÉϸöÔÂÔ⵽ײ¿â¹¥»÷Ö®ºó£¬£¬£¬ £¬ £¬£¬£¬Ó¢¹úµçÐŹ«Ë¾SkyËø¶¨ÁËÓû§µÄÕË»§²¢ÒªÇóËûÃÇÖØÖÃÃÜÂë¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ´ËÏî²½·¥ÊÇÔ¤·À²½·¥£¬£¬£¬ £¬ £¬£¬£¬ÕâЩ±»Ëø¶¨µÄSky.comÓû§ÕË»§Ã»Óб»ºÚ¿ÍÈëÇÖ¡£¡£¡£¡£ÕâЩÓû§½«»áÊÕµ½¸Ã¹«Ë¾µÄµç×ÓÓʼþ֪ͨ£¬£¬£¬ £¬ £¬£¬£¬ÒªÇóËûÃÇ»á¼û¹«Ë¾ÍøÕ¾»ò²¦´òµç»°ÒÔ½âËøËûÃǵÄÕË»§£¬£¬£¬ £¬ £¬£¬£¬²¢Í¨¹ýһϵÁÐ°ì·¨ÖØÖÃÕË»§ÃÜÂë¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/credentials-stuffing-attack-prompts-password-resets-for-sky-customers/


4¡¢ºÚ¿ÍÀÄÓÃÎļþ¹²ÏíЧÀÍWeTransfer·Ö·¢À¬»øÓʼþ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


CofenseÇå¾²Ñо¿Ô±Jake Longden·¢Ã÷¹¥»÷ÕßÕýÔÚÀÄÓÃÎļþ¹²ÏíЧÀÍWeTransferÀ´·Ö·¢À¬»øÓʼþ£¬£¬£¬ £¬ £¬£¬£¬ÒÔÈÆ¹ýÇå¾²Íø¹ØµÄ¼ì²â¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬£¬ £¬ £¬£¬£¬ºÚ¿Í½«Öض¨Ïòµ½´¹ÂÚÒ³ÃæµÄHTM»òHTMLÎļþÉÏ´«ÖÁWeTransferЧÀÍ£¬£¬£¬ £¬ £¬£¬£¬²¢Í¨¹ýµç×ÓÓʼþ½«¸ÃÁ´½Ó¹²Ïí¸øÄ¿µÄÓû§¡£¡£¡£¡£¸Ã´¹ÂÚÕ¾µãÓÃÓÚÇÔÈ¡Óû§µÄOffice365µÇ¼ƾ֤¡£¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽ʹÓøÃÒªÁìÕë¶ÔÒøÐС¢µçÁ¦ºÍýÌåÐÐÒµµÄ¹¥»÷ÕýÔÚÔöÌí¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/popular-file-sharing-service-wetransfer-used-in-malicious-spam-campaigns/146671/


5¡¢¶íÂÞ˹¹ú·À³Ð°üÉÌ¿ª·¢µÄ¶ñÒâÈí¼þMonokleÔÚÒ°ÍâÈö²¥


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


LookoutÑо¿Ö°Ô±·¢Ã÷Ò»¸öеÄÒÆ¶¯Ìع¤Èí¼þMonokle£¬£¬£¬ £¬ £¬£¬£¬¸ÃÌØ¹¤Èí¼þ¾Ý³ÆÊÇÓɶíÂÞ˹¹ú·À³Ð°üÉÌSpecial Technology Center Ltd.¿ª·¢µÄ£¬£¬£¬ £¬ £¬£¬£¬×Ô2016Äê3ÔÂÒÔÀ´¾ÍÔÚÒ°ÍâÈö²¥¡£¡£¡£¡£MonokleÖ÷ÒªÃé×¼AndroidÊÖ»ú£¬£¬£¬ £¬ £¬£¬£¬µ«ÊÊÓÃÓÚiOSµÄ°æ±¾Ò²ÔÚ¿ª·¢ÖС£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄ¹¦Ð§Ê®·Öǿʢ£¬£¬£¬ £¬ £¬£¬£¬°üÀ¨78ÖÖ²î±ðµÄÔ¤½ç˵ÏÂÁî¡£¡£¡£¡£Æ¾Ö¤LookoutÑо¿Ö°Ô±µÄ˵·¨£¬£¬£¬ £¬ £¬£¬£¬Monokle±»ÓÃÓÚÕë¶Ô¶«Å·¡¢ÐðÀûÑÇÒÔ¼°ÖÐÑǹú¼ÒµÄ¸ß¼ÛֵĿµÄ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/russian-android-spying-apps.html


6¡¢WatchbogбäÖÖ¿ÉɨÃèÒ×ÊÜBlueKeep¹¥»÷µÄϵͳ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Intezer LabsÑо¿ÍŶӷ¢Ã÷WatchBogµÄбäÖÖʵÏÖÁËÒ»¸öBlueKeepÎó²îɨÃèÄ£¿£¿£¿£¿£¿ £¿é£¬£¬£¬ £¬ £¬£¬£¬ÕâÒâζ×ÅWatchBogÕýÔÚ×¼±¸Ò»·ÝÒ×Êܹ¥»÷µÄϵͳµÄÁÐ±í£¬£¬£¬ £¬ £¬£¬£¬ÒÔ±ãÔÚδÀ´¶¨Î»»ò³öÊÛ¸øµÚÈý·½ÒÔ»ñÈ¡ÀûÈ󡣡£¡£¡£¸ÃбäÖÖÔÚѬȾÅÌËã»úºó£¬£¬£¬ £¬ £¬£¬£¬½«´ÓC2ЧÀÍÆ÷ÌṩµÄÁбíÖÐɨÃèËùÓÐIPµØµã£¬£¬£¬ £¬ £¬£¬£¬Íê³ÉɨÃèÀú³Ìºó£¬£¬£¬ £¬ £¬£¬£¬ÔÙ½«É¨Ãèµ½µÄÒ×Êܹ¥»÷µÄÖ÷»úÁбíͨ¹ýRC4¼ÓÃܵÄÊ®Áù½øÖÆ×Ö·û´®·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£¡£Ä¿½ñWatchBog»¹Î´±»ÓÃÓÚÆÆËðÐÔµÄÄ¿µÄ£¬£¬£¬ £¬ £¬£¬£¬Æä×îÖÕÄ¿µÄÊǾÙÐÐÍڿ󡣡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/