2019ÄêϰëÄêÍþвÇ鱨±¨¸æ£» £»£»£»£»£»£»2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ£» £»£»£»£»£»£»Ã׸ß÷ÂùÝ1070Íò¿Í»§ÐÅϢй¶

Ðû²¼Ê±¼ä 2020-02-20

1.NETSCOUTÐû²¼2019ÄêϰëÄêÍþвÇ鱨±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


NetscoutÐû²¼ÁËÆä2019ÄêϰëÄêÍþвÇ鱨±¨¸æ £¬£¬£¬£¬±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£º¹¥»÷ÕßʹÓÃÁË7ÖÖеÄUDP·´Éä/·Å´ó¹¥»÷ £¬£¬£¬£¬²¢Á¬ÏµÒÑÖªµÄ¹¥»÷ÏòÁ¿ÌᳫÕë¶ÔÐÔDDoS¹¥»÷£» £»£»£»£»£»£»Õë¶Ô±ÊÖ±ÐÐÒµµÄ´ó¹æÄ£¹¥»÷±ä¶à £¬£¬£¬£¬ÀýÈçÕë¶ÔÎÀÐǵçÐŵĹ¥»÷ÔöÌíÁË295%£» £»£»£»£»£»£»¹¥»÷ÕßʹÓÃÏȽøµÄÕì̽ÊÖÒÕ½«Ä¿µÄËø¶¨ÔÚÊÜÓÅÒì±£» £»£»£»£»£»£»¤µÄÄ¿µÄ£¨ÈçISPºÍ½ðÈÚ»ú¹¹£©ÉÏ £¬£¬£¬£¬ÒÔ·Å´óÕë¶ÔÌØ¶¨ÆóÒµºÍÍøÂçÔËÓªÉ̵Ĺ¥»÷£» £»£»£»£»£»£»´Ó2018 H2µ½2019 H2 £¬£¬£¬£¬Õë¶ÔÎÞÏßͨѶ¹«Ë¾µÄDDoS¹¥»÷ƵÂÊÔöÌíÁË64£¥£» £»£»£»£»£»£»»ùÓÚMiraiµÄ±äÌåÔÚ2019ÄêϰëÄêÕ¼ÓÐÖ÷µ¼Ö°Î»£¨ÔöÌíÁË57£¥£© £¬£¬£¬£¬¿ÉÕë¶Ô17ÖÖϵͳ¼Ü¹¹£» £»£»£»£»£»£»WISRµÄЧÀÍÌṩÉÌÌåÏÖÕë¶Ô¹ûÕæÌ»Â¶µÄ»ù´¡ÉèÊ©µÄDDoS¹¥»÷ÔöÌíÁË52£¥ £¬£¬£¬£¬¶øÉÏÒ»ÄêΪ38£¥¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.netscout.com/press-releases/netscouts-threat-intelligence-report-2H2019


2.CyberMDXÐû²¼2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤CyberMDXµÄ2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ £¬£¬£¬£¬µä·¶µÄÒ½ÔºÖÐËùÓÐWindows×°±¸ÖÐÓÐ22£¥ÈÔȻûÓÐ×°ÖÃBlueKeepÎó²îµÄÐÞ¸´²¹¶¡ £¬£¬£¬£¬¶ø¹ØÓÚÔÚWindowsÉÏÔËÐеÄÁªÍøÒ½ÁÆ×°±¸¶øÑÔ £¬£¬£¬£¬ÕâÒ»Êý×ÖÉÏÉýµ½ÁË45£¥ £¬£¬£¬£¬ÕâÒâζ×ÅÏÕЩһ°ëµÄÁªÍøÒ½ÁÆ×°±¸Ò×Êܹ¥»÷¡£¡£¡£¡£¡£ÕâЩװ±¸¿ÉÄܰüÀ¨·ÅÉä×°±¸¡¢¼àÊÓÆ÷¡¢XÉäÏߺͳ¬Éù×°±¸ÒÔ¼°Âé×í»úµÈ¡£¡£¡£¡£¡£ÈôÊÇ²î³ØÕâЩװ±¸¾ÙÐÐÐÞ²¹ £¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜ»áËÑË÷µ½Ò×ÊÜBlueKeep¹¥»÷µÄ»úе £¬£¬£¬£¬´Ó¶øÊ¹Ò½ÔºÍøÂçºÍ»¼Õß´¦ÓÚΣÏÕÖ®ÖС£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cybersecurity-warning-almost-half-of-connected-medical-devices-are-vulnerable-to-hackers-exploiting-bluekeep/


3.ÒÁÀÊAPTÍøÂçÌØ¹¤»î¶¯Fox KittenµÄÆÊÎö±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿ÍÕýÔÚʹÓÃÓÉThemeREX¿ª·¢µÄWordPress²å¼þÖеÄ0dayÀ´ÈëÇÖWordPressÍøÕ¾¡£¡£¡£¡£¡£Çå¾²³§ÉÌWordfenceÓÚ2ÔÂ18ÈÕ¼ì²âµ½ÁË´ËÀ๥»÷¡£¡£¡£¡£¡£ThemeREX²å¼þԤװÁËËùÓÐThemeREXÉÌÒµÖ÷Ìâ £¬£¬£¬£¬²¢ÇÒ×ÊÖúÓû§ÉèÖÃÐÂÕ¾µãºÍ¿ØÖÆÖÖÖÖÖ÷Ì⹦Ч £¬£¬£¬£¬WordfenceÔ¤¼Æ¸Ã²å¼þÒÑ×°ÖÃÔÚÁè¼Ý4.4Íò¸öÕ¾µãÉÏ¡£¡£¡£¡£¡£¸Ã²å¼þ¿Éͨ¹ýÉèÖÃWordPress REST-API¶ËµãÀ´ÊÂÇé £¬£¬£¬£¬µ«²»»á¼ì²é·¢Ë͵½´ËREST APIµÄÏÂÁîÊÇ·ñÀ´×ÔÊÚȨÓû§ £¬£¬£¬£¬ÕâÒâζ×ÅÈκηÿͶ¼¿ÉÒÔÖ´ÐÐÔ¶³Ì´úÂë £¬£¬£¬£¬ÉõÖÁ½¨ÉèеÄÖÎÀíÓû§ºÍ½ÓÊÜÍøÕ¾¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖÈôÊÇÓû§ÔËÐеIJå¼þ°æ±¾¸ßÓÚ1.6.50 £¬£¬£¬£¬ÄÇôǿÁÒ½¨ÒéÓû§ÔÝʱɾ³ýThemeREX²å¼þ £¬£¬£¬£¬Ö±µ½ÐÞ¸´²¹¶¡Ðû²¼ÎªÖ¹¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/iranian-apts-fox-kitten-global-spy-campaign/152974/


4.Çå¾²Ñо¿Ö°Ô±Åû¶΢Èí¶à¸ö×ÓÓòÃû±»Ð®ÖÆÎÊÌâ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


NIC.gpÇå¾²Ñо¿Ô±Michel GaschetÖ¸³ö΢Èí±£´æ¶à¸ö×ÓÓòÃûÐ®ÖÆÎÊÌâ £¬£¬£¬£¬ÕâЩ×ÓÓòÃû¿ÉÄܱ»Ð®ÖƺÍÓÃÓÚ¹¥»÷Óû§¡¢Ô±¹¤»òÏÔʾÀ¬»øÄÚÈÝ¡£¡£¡£¡£¡£ÔÚÒÑÍùÈýÄêÖÐ £¬£¬£¬£¬GaschetÒ»Ö±ÔÚÏò΢Èí±¨¸æ´øÓйýʧÉèÖõÄDNS¼Í¼µÄ×ÓÓòÃû £¬£¬£¬£¬ÀýÈç2017ÄêËû±¨¸æÁË21¸öÒ×±»Ð®ÖƵÄmsn.com×ÓÓòÃû £¬£¬£¬£¬2019ÄêËûÓÖ±¨¸æÁË142¸öÉèÖùýʧµÄmicrosoft.com×ÓÓòÃû £¬£¬£¬£¬µ«Î¢Èí½öÐÞ¸´ÁËÆäÖÐ5£¥µ½10£¥µÄ×ÓÓòÃû¡£¡£¡£¡£¡£Gaschet»¹Ö¸³öËûÖÁÉÙÔÚ4¸öÕýµ±µÄ΢Èí×ÓÓòÖз¢Ã÷ÁËÓ¡¶ÈÄáÎ÷ÑÇÆË¿Ë¶Ä³¡µÄ¹ã¸æ £¬£¬£¬£¬°üÀ¨portal.ds.microsoft.com¡¢perfect10.microsoft.com¡¢ies.global.microsoft.comºÍblog-ambassadors.microsoft.com¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-has-a-subdomain-hijacking-problem/


5.ºÚ¿ÍʹÓÃThemeREX²å¼þ0day¹¥»÷WordPressÍøÕ¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±ÌåÏÖÒÁÀÊAPT34/OilRigºÍAPT33/Elfin¿ÉÄÜÕýÔÚ¿ªÕ¹Ò»ÏîΪÆÚÈýÄêµÄ´ó¹æÄ£ÍøÂçÌØ¹¤»î¶¯ £¬£¬£¬£¬¸Ã»î¶¯±»³ÆÎªFox Kitten¡£¡£¡£¡£¡£¹¥»÷Õß½¨ÉèÁ˸߶ÈÉú³¤ÇÒ³¤ÆÚµÄ»ù´¡¼Ü¹¹ £¬£¬£¬£¬ÓÃÓÚ»á¼û¹«Ë¾ÍøÂçºÍʵÑéÕì̽ÓëÌØ¹¤»î¶¯¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö¹¥»÷ÕßÒ²¿ÉÒÔʹÓÃÕâЩ»ù´¡ÉèÊ©°²ÅÅÆÆËðÐԵĶñÒâÈí¼þ £¬£¬£¬£¬ÀýÈçÓëAPT¹ØÁªµÄÊý¾Ý²Á³ýÆ÷ZeroCleareºÍDustman¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓõijõʼѬȾǰÑÔ°üÀ¨Palo Alto NetworksÔÚ²î±ðVPNЧÀÍ£¨ÀýÈçPulse Secure VPN¡¢Fortinet VPNºÍGlobal Protect£©ÖÐÅû¶µÄÎó²î £¬£¬£¬£¬¹¥»÷ÕßʹÓõ͍Öƹ¤¾ß»¹°üÀ¨POWSSHNETºóÃÅ¡¢Êý¾Ý¿âºÍ¿ª·Å¶Ë¿ÚÓ³É乤¾ßSTSRCheck¡¢´ÓC2ЧÀÍÆ÷ÏÂÔØÎļþµÄVBScript¾ç±¾µÈ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-exploit-zero-day-in-wordpress-plugin-to-create-rogue-admin-accounts/


6.Ã׸ß÷ÂùÝ1070Íò¿Í»§ÐÅϢй¶ £¬£¬£¬£¬ÒÑÔÚÂÛ̳Ðû²¼


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ã׸ß÷ÂùÝÈÏ¿ÉÔ¼1070ÍòסËÞ¿Í»§µÄÐÅÏ¢±»ºÚ¿Í͵ȡ £¬£¬£¬£¬ÕâЩÊý¾ÝÒÑÔÚ±¾Öܱ»ÉÏ´«ÖÁºÚ¿ÍÂÛ̳ £¬£¬£¬£¬³ýÁËͨÀýµÄÓοÍÖ®Íâ £¬£¬£¬£¬ÊÜÓ°ÏìµÄ¿Í»§»¹º­¸ÇÃûÈË¡¢CEO¡¢¼ÇÕß¡¢Õþ¸®¹ÙÔ±ºÍ¿Æ¼¼¹«Ë¾µÄÔ±¹¤µÈ¡£¡£¡£¡£¡£Éæ¼°µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãºÍÉúÈյȡ£¡£¡£¡£¡£Æ¾Ö¤Ã׸ß÷µÄ˵·¨ £¬£¬£¬£¬ÕâЩÐÅÏ¢ÊÇÔÚ2019ÄêÑ×Ìì¶ÔÆäÔÆÐ§ÀÍÆ÷µÄδÊÚȨ»á¼ûÖб»µÁµÄ £¬£¬£¬£¬±»µÁÐÅÏ¢²»Éæ¼°ÈκβÆÎñ¡¢ÒøÐп¨»òÃÜÂëÊý¾Ý¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºóÃ׸ß÷ÒѾ­Í¨ÖªÁËËùÓÐÊܲ¨¼°µÄÓû§¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/