ÐŰ²±êί¡¶ÍøÂçÇå¾²±ê׼ʵ¼ùÖ¸ÄÏ¡ªÔ¶³Ì°ì¹«Çå¾²·À»¤¡·£»£»£»£»2019Ä꿪Դ´úÂëÎó²îÊýÄ¿ÔöÌí½ü50£¥
Ðû²¼Ê±¼ä 2020-03-171.ÐŰ²±êί¡¶ÍøÂçÇå¾²±ê׼ʵ¼ùÖ¸ÄÏ¡ªÔ¶³Ì°ì¹«Çå¾²·À»¤¡·
ÌìÏÂÐÅÏ¢Çå¾²±ê×¼»¯ÊÖÒÕίԱ»áÃØÊé´¦Õë¶ÔÔ¶³Ì°ì¹«Çå¾²ÎÊÌ⣬£¬£¬£¬£¬£¬£¬×éÖ¯Ïà¹Ø³§É̺ÍÇ徲ר¼Ò£¬£¬£¬£¬£¬£¬£¬ÌåÀýÁË¡¶ÍøÂçÇå¾²±ê׼ʵ¼ùÖ¸ÄÏ¡ªÔ¶³Ì°ì¹«Çå¾²·À»¤¡·¡£¡£¡£¡£¡¶Êµ¼ùÖ¸ÄÏ¡·¸ø³öÁËÔ¶³Ì°ì¹«µÄµä·¶Ó¦Óó¡¾°£¬£¬£¬£¬£¬£¬£¬ÆÊÎöÁËÔ¶³Ì°ì¹«¿ÉÄÜÃæÁٵİ칫ϵͳ×ÔÉíÇå¾²¡¢Êý¾ÝÇå¾²¡¢×°±¸Çå¾²ºÍСÎÒ˽¼ÒÐÅÏ¢±£»£»£»£»¤µÈΣº¦£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÔ¶³Ì°ì¹«ÏµÍ³µÄʹÓ÷½ºÍÓû§£¬£¬£¬£¬£¬£¬£¬»®·Ö¸ø³öÁËÇå¾²¿ØÖƲ½·¥½¨Òé¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬Ê¹Ó÷½Ó¦ÔÚÖÎÀíºÍÊÖÒÕÁ½·½Ã濪չÇå¾²·À»¤£¬£¬£¬£¬£¬£¬£¬½¡È«Ô¶³Ì°ì¹«ÖÎÀíÖÆ¶È£¬£¬£¬£¬£¬£¬£¬ÔöÇ¿ÔËάÖÎÀí£¬£¬£¬£¬£¬£¬£¬Ç¿»¯Çå¾²²½·¥¡£¡£¡£¡£Óû§Ó¦Ìá¸ß×ÔÉíÇå¾²Òâʶ£¬£¬£¬£¬£¬£¬£¬ÖصãÕë¶Ô×°±¸¡¢Êý¾Ý¡¢ÇéÐεȷ½ÃæµÄÇ徲Σº¦¾ÙÐзÀ»¤¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.tc260.org.cn/upload/2020-03-13/1584090952093076364.pdf
2.2019Ä꿪Դ´úÂëÎó²îÊýÄ¿Ê×´ÎÁè¼Ý6000¸ö£¬£¬£¬£¬£¬£¬£¬ÔöÌí½ü50£¥
ƾ֤¿ªÔ´Çå¾²ÓëºÏ¹æ¹«Ë¾WhiteSourceµÄÒ»·Ý±¨¸æ£¬£¬£¬£¬£¬£¬£¬È¥Ä꿪Դ´úÂëÖеÄÎó²î¼¤Ôö¡£¡£¡£¡£¸Ã±¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬2017ÄêºÍ2018Ä꿪ԴÎó²îµÄÊýÄ¿ÎȹÌÔÚ4000¶à¸ö£¬£¬£¬£¬£¬£¬£¬Óë2017Äê֮ǰ´ÓÎ´Í»ÆÆ2000¸öµÄÊý×ÖÏà±È£¬£¬£¬£¬£¬£¬£¬Îó²îÊýÄ¿ÔöÌíÁËÒ»±¶ÒÔÉÏ¡£¡£¡£¡£È»ºóÔÚ2019Ä꣬£¬£¬£¬£¬£¬£¬¿ªÔ´Îó²îÊýÄ¿ÔÙ´ÎìÉý£¬£¬£¬£¬£¬£¬£¬Ê×´ÎÁè¼Ý6000¸ö£¬£¬£¬£¬£¬£¬£¬Õâ´ú±íÁ˽ü50£¥µÄÔöÌí¡£¡£¡£¡£µ½ÏÖÔÚΪֹ¿ªÔ´Îó²îÖÐ×î³£¼ûµÄÀàÐÍÊÇ¿çÕ¾µã¾ç±¾£¨XSS£©£¬£¬£¬£¬£¬£¬£¬¸ÃÀàÐÍÏÕЩռËùÓÐÎó²îµÄËÄ·ÖÖ®Ò»£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÊäÈëÑéÖ¤²»×¼È·¡¢»º³åÇø¹ýʧ¡¢Ô½½ç¶ÁÈ¡ºÍÐÅϢй¶¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://nakedsecurity.sophos.com/2020/03/16/open-source-bugs-have-soared-in-the-past-year/
3.2020ÄêÔÆÉèÖùýʧ±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÒÑÍùÁ½Äêй¶330ÒÚÌõ¼Í¼
ƾ֤DivvyCloudµÄ2020ÄêÔÆÉèÖùýʧ±¨¸æ£¬£¬£¬£¬£¬£¬£¬2018ÄêºÍ2019ÄêÓнü334ÒÚÌõ¼Í¼ÒòÔÆÉèÖùýʧµ¼ÖÂй¶£¬£¬£¬£¬£¬£¬£¬È«ÇòÆóÒµµÄ±¾Ç®Îª¿ìÒª5ÍòÒÚÃÀÔª¡£¡£¡£¡£´Ó2018Äêµ½2019Ä꣬£¬£¬£¬£¬£¬£¬ÔÆÉèÖùýʧ̻¶µÄ¼Í¼ÊýĿͬ±ÈÔöÌíÁË80£¥£¬£¬£¬£¬£¬£¬£¬ÓëÖ®Ïà¹ØµÄ¹«Ë¾×ܱ¾Ç®Ò²ÓÐËùÔöÌí¡£¡£¡£¡£²»ÐÒµÄÊÇ£¬£¬£¬£¬£¬£¬£¬×¨¼ÒÃÇÔ¤¼ÆÕâÖÖÉÏÉýÇ÷ÊÆ½«Ò»Á¬ÏÂÈ¥£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ¹«Ë¾¼ÌÐøÑ¸ËÙ½ÓÄÉÔÆÐ§À͵«Î´ÄÜʵÑéÊʵ±µÄÔÆÇå¾²²½·¥¡£¡£¡£¡£ElasticsearchÉèÖùýʧռËùÓÐй¶µÄ20£¥£¬£¬£¬£¬£¬£¬£¬µ«ÕâЩÊÂÎñй¶µÄ¼Í¼ÊýĿռËùÓмͼµÄ44£¥¡£¡£¡£¡£´Ó2018Äêµ½2019Ä꣬£¬£¬£¬£¬£¬£¬ÓÉElasticsearchÉèÖùýʧµ¼ÖµÄй¶ÊýÄ¿ÏÕЩÔöÌíÁËÁ½±¶¡£¡£¡£¡£S3´æ´¢Í°ÉèÖùýʧռËùÓÐй¶µÄ16£¥£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇÓë2018ÄêÏà±È£¬£¬£¬£¬£¬£¬£¬2019ÄêÉèÖùýʧµÄS3ЧÀÍÆ÷ïÔÌÁË45£¥¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.computerweekly.com/news/252478833/Cost-of-cloud-misconfigurations-set-at-5tn?&web_view=true
4.Android¸ú×ÙÈí¼þMonitorMinor£¬£¬£¬£¬£¬£¬£¬¿É¸ú×ÙGmailÓû§»î¶¯
¿¨°Í˹»ùÇ徲ר¼Ò·¢Ã÷ÐÂAndroid¸ú×ÙÈí¼þMonitorMinor£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔ¸ú×ÙGmail¡¢WhatsApp¡¢InstagramºÍFacebookµÄÓû§»î¶¯¡£¡£¡£¡£Ç徲ר¼Ò³ÆMonitorMinor±ÈÆä¼Ò×åµÄËùÓÐÏÖÓÐÈí¼þ¹¦Ð§¸üǿʢ£¬£¬£¬£¬£¬£¬£¬ËüʹÓÃÁËSuperUserÀàÐ͵ÄÓ¦ÓóÌÐò£¨SUÊÊÓóÌÐò£©À´»ñµÃϵͳµÄroot»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬»¹¿ÉÒÔÌáÈ¡Éè±¹ØÁ¬Ä/data/system/gesture.keyÎļþ£¬£¬£¬£¬£¬£¬£¬¸ÃÎļþ°üÀ¨ÁËÆÁÄ»½âËøÄ£Ê½/ÃÜÂëµÄ¹þÏ£Öµ¡£¡£¡£¡£MonitorMonor¹¥»÷Õß¿ÉÒÔʹÓÃËüÀ´½âËø×°±¸£¬£¬£¬£¬£¬£¬£¬ÕâÊǵÚÒ»¸öʵÏִ˹¦Ð§µÄ¸ú×ÙÈí¼þ¡£¡£¡£¡£MonitorMinor»¹Ê¹ÓÃAccessibility Services APIÀ´×赲ĿµÄAPPÖеÄÊÂÎñ£¬£¬£¬£¬£¬£¬£¬×ÝȻûÓÐrootȨÏÞ£¬£¬£¬£¬£¬£¬£¬ËüÒ²¿ÉÒÔʹÓôËAPIÔÚËùÓÐ×°±¸ÉÏÓÐÓÃÔËÐС£¡£¡£¡£Æ¾Ö¤¿¨°Í˹»ùµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬¸Ã¸ú×ÙÈí¼þ´ó´ó¶¼×°ÖÃÔÚÓ¡¶È£¨14.71£¥£©¡¢Æä´ÎÊÇÄ«Î÷¸ç£¨11.76£¥£©¡¢µÂ¹ú¡¢É³Ìذ¢À²®ºÍÓ¢¹ú£¨5.88£¥£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/monitorminor-vicious-stalkerware/95575/?utm_source=rss&utm_medium=rss&utm_campaign=monitorminor-vicious-stalkerware
5.Ñо¿ÍŶÓÐû²¼ÐÂÀÕË÷Èí¼þ¼Ò×åPXJµÄÆÊÎö±¨¸æ
IBM X-ForceµÄÇ徲ר¼Ò·¢Ã÷ÁËÒ»ÖÖеÄÀÕË÷Èí¼þPXJ Ransomware£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü¸ÃÀÕË÷Èí¼þʵÏÖÁË´ó´ó¶¼ÀÕË÷Èí¼þ¹²ÓеĹ¦Ð§£¬£¬£¬£¬£¬£¬£¬µ«ËüËÆºõ²¢Î´ÓëÒÑÖªµÄÀÕË÷Èí¼þ¼Ò×å¹²Ïíµ×²ã´úÂë¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2ÔÂ29ÈÕÊ״η¢Ã÷ÁËPXJ£¬£¬£¬£¬£¬£¬£¬ÆäʱÓÐÁ½¸öÑù±¾±»ÉÏ´«µ½VirusTotal¡£¡£¡£¡£PXJµÄÃû³ÆÀ´×Ô¸½¼Óµ½¼ÓÃÜÎļþµÄÀ©Õ¹Ãû£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÒ²±»³ÆÎªXVFXGW£¬£¬£¬£¬£¬£¬£¬À´×ÔÓÚ¶ñÒâÈí¼þ½¨ÉèµÄ¡°XVFXGW DOUBLE SET¡±¼°ÀÕË÷Ʊ¾ÝÖаüÀ¨µÄµç×ÓÓʼþµØµã£¨¡°xvfxgw3929@protonmail.com¡±ºÍ¡°xvfxgw213@decoymail.com¡±£©¡£¡£¡£¡£PXJʹÓÃAESºÍRSAËã·¨À´¼ÓÃÜÊý¾Ý¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ±¨¸æÖÐÆÊÎöÁËÓйØPXJµÄÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÈëÇÖÖ¸±ê£¨IoC£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityintelligence.com/posts/pxj-ransomware-campaign-identified-by-x-force-iris/
6.ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©ÔâDDoS¹¥»÷
ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©ÓÚÖÜÈÕÔâµ½DDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«¸Ã»ú¹¹ÌåÏÖÊÂÎñ²¢Î´Ôì³ÉÈκÎÖØ´óÆÆË𡣡£¡£¡£Ê״ᨵÀÕâÒ»ÊÂÎñµÄÅí²©Éç×î³õʹÓÃÁË¡°ÍøÂçÈëÇÖ¡±Ò»´Ê£¬£¬£¬£¬£¬£¬£¬µ«ØÊºó½«Æä´ÓÎÄÕÂÕýÎÄÖÐɾ³ý-µ«ÈÔÈ»±£±£´æ¸±ÎÊÌâÖС£¡£¡£¡£¡¶»ªÊ¢¶ÙÓʱ¨¡·³ÆHSµÄÍøÕ¾ÏÖʵÉÏ´ÓδÒòÕâ´Î¹¥»÷¶øÍ߽⡣¡£¡£¡£Æ¾Ö¤Ò»Ð©±¨µÀ£¬£¬£¬£¬£¬£¬£¬¹¥»÷¿ÉÄÜÊÇÓÉÍâ¹ú¹¥»÷ÕßÌᳫµÄ£¬£¬£¬£¬£¬£¬£¬ÆäÄ¿µÄÊÇÆÆËðHHS¶ÔCOVID-19Σ»£»£»£»úµÄ·´Ó¦£¬£¬£¬£¬£¬£¬£¬µ«ÕâÒ»ÀíÂÛÉÐδ»ñµÃ֤ʵ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/hhs-says-ddos-attack-failed-cause-disruption