Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î£»£»£»ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ

Ðû²¼Ê±¼ä 2020-03-30

1.Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Positive TechnologiesµÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬ËùÓеÄ4GºÍ²¿·Ö5GµçÐÅÍøÂç¶¼Ò×Êܵ½Ê¹ÓÃDiameterÐÅÁîЭÒéÎó²îµÄDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£DiameterÐÅÁîЭÒéÓÃÓÚÔÚ4GÍøÂçÖÐÈÏÖ¤ºÍÊÚȨÐÂÎÅ·Ö·¢£¬£¬£¬ËüÊÇLTEÖеÄÒªº¦×é³É²¿·Ö£¬£¬£¬ÓÐÖúÓÚ»¥ÁªÍøÐ­ÒéÍøÂçÔªËØÖ®¼äµÄת»»ºÍͨѶ¡£¡£¡£¡£¡£¡£¡£¸ÃЭÒéÖеÄÎó²îÔÊÐí¹¥»÷Õ߸ú×ÙÓû§µÄλÖò¢»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬ËæºóʹÓÃÕâЩÐÅÏ¢×èµ²ÓïÒôºô½ÐºÍÈÆ¹ý¶ÔÒÆ¶¯Ð§À͵ÄÏÞÖÆ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆËûÃÇÔÚ2018ÄêÖÁ2019ÄêÖ®¼äÀÖ³ÉÉøÍ¸µ½ÄÏÃÀ¡¢ÑÇÖÞ¡¢Å·Ö޺ͷÇÖÞµÄ28¼ÒµçÐÅÔËÓªÉÌ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬µ±5GÍøÂ罨ÉèÔÚÏÖÓмܹ¹ºÍЭÒéÖ®ÉÏʱ£¬£¬£¬ÕâЩÇå¾²Îó²î½«¼ÌÐø±£´æ£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÌÐø¸ú×ÙÓû§µÄλÖᢻñÈ¡Ãô¸ÐÐÅÏ¢ÒÔ¼°½µ¼¶µ½3GÍøÂçµÈ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/all-4g-networks-susceptible-to-dos/?&web_view=true


2.ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÉÏÖÜĩʱ´ú£¬£¬£¬ÀÕË÷Èí¼þDharmaµÄÔ´´úÂëÔÚÁ½¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉϳöÊÛ£¬£¬£¬ÆäÊÛ¼ÛµÍÖÁ2000ÃÀÔª¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤FBIÔÚ½ñÄêRSA¾Û»áÉϵÄÒ»´ÎÑݽ²£¬£¬£¬DharmaÊǽüÄêÀ´×¬Ç®µÚ¶þ¶àµÄÀÕË÷Èí¼þÓªÒµ£¬£¬£¬ÔÚ2016Äê11ÔÂÖÁ2019Äê11ÔÂÖ®¼ä»ñµÃÁËÁè¼Ý2400ÍòÃÀÔªµÄÊê½ðÖ§¸¶¡£¡£¡£¡£¡£¡£¡£ÆäÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉϳöÊۺܿÉÄܻᵼÖ¸üÆÕ±éµÄй¶£¬£¬£¬½ø¶øÔÚ¶à¸ö·¸·¨¼¯ÍÅÖ®¼äÀ©É¢£¬£¬£¬×îÖÕµ¼Ö¹¥»÷¼¤Ôö¡£¡£¡£¡£¡£¡£¡£DharmaµÄ¼ÓÃܼƻ®ºÜÊÇÏȽø£¬£¬£¬×Ô2017ÄêÒÔÀ´Ò»Ö±Ã»ÓÐÃâ·ÑµÄ½âÃܹ¤¾ß¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/


3.ºÚ¿ÍʹÓÃÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÇÔÈ¡Óû§µÄ±ÈÌØ±Ò


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


MyCryptoÇå¾²×ܼàHarry Denley·¢Ã÷ÓÐ9¸öÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÊÔͼÇÔÈ¡Óû§µÄ±ÈÌØ±Ò£¬£¬£¬ÔÚÒÑÍùµÄËĸöÐÇÆÚÖУ¬£¬£¬ÕâÐ©ÍøÕ¾ÒѾ­ÇÔÈ¡ÁËÁè¼Ý7¸ö±ÈÌØ±Ò£¨¼ÛֵԼΪ4.5ÍòÃÀÔª£©µÄ×ʽ𡣡£¡£¡£¡£¡£¡£ÕâÖÖÍøÕ¾Ð§ÀÍ×ÊÖúÓû§½«Æä±ÈÌØ±ÒµØµãת»»³É¶þάÂ룬£¬£¬ÒÔ½»¸øÆäËüÓû§¾ÙÐÐÖ§¸¶¡£¡£¡£¡£¡£¡£¡£µ«Denley·¢Ã÷Õâ9¸öÍøÕ¾ÏÖʵÉÏÖ»ÌìÉúÁËÕ©Æ­ÕßÇ®°üµÄ¶þάÂë¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÍйÜÕâ9¸öÍøÕ¾µÄ3¸öWebЧÀÍÆ÷»¹ÍйÜ×Å450¶à¸öÆäËüµÄ¶ñÒâÍøÕ¾£¬£¬£¬Ö»¹Ü´ó´ó¶¼ÍøÕ¾²¢²»»îÔ¾¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/network-of-fake-qr-code-generators-will-steal-your-bitcoin/


4.2004ÄêÖÁ2019Äê¶íÂÞ˹ºÚ¿Í»î¶¯ÆÊÎö±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹úÇ鱨ÉçÇøµÄ²¼×È¡¤°¬Âס¤ººÃܶû¶Ù£¨Booz Allen Hamilton£©Ðû²¼ÁËÒ»·ÝÖÜÈ«±¨¸æ£¬£¬£¬ÏêϸÏÈÈÝÁË2004ÄêÖÁ2019Äêʱ´ú¶íÂÞ˹µÄ¾üÊÂÍøÂç¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖØµã¹Ø×¢ÓɶíÂÞ˹¾ü¶ÓÁ¥ÊôµÄÇ鱨²¿·Ö¾ÙÐеÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬Booz Allen½«ÒÑÍù15Äêʱ´úµÄ200¶à¸öGRUÍøÂç¹¥»÷»î¶¯¹éΪ23À࣬£¬£¬²¢Õ¹ÏÖÁËÿһ¸ö¹¥»÷»î¶¯Óë¶íÂÞ˹ÖܱßÕþÖÎÇéÐÎת±äµÄ¹ØÏµ¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æµÄ×îÖÕ½áÂÛÊÇ¿ÉÒÔÕ¹ÍûGRUµÄÍøÂç¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/booz-allen-analyzed-200-russian-hacking-operations-to-better-understand-their-tactics/?&web_view=true


5.WPvivid²å¼þȱÉÙÊÚȨ¼ì²é£¬£¬£¬¿ÉÓÃÓÚ»ñÈ¡ÍøÕ¾ËùÓÐÎļþ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


WebARXÇ徲ר¼ÒÖÒÑԳƣ¬£¬£¬ÓÉÓÚWPvivid²å¼þÖÐȱÉÙÒ»¸öÊÚȨ¼ì²é£¬£¬£¬µ¼Ö¹¥»÷Õ߿ɻñÈ¡WordPressÍøÕ¾µÄËùÓÐÎļþ¡£¡£¡£¡£¡£¡£¡£WPvividÊÇÒ»¸öÃâ·ÑµÄ¶àºÏÒ»±¸·Ý¡¢»¹Ô­ºÍǨáã²å¼þ£¬£¬£¬Ëü¾ßÓнü4Íò¸ö»îÔ¾×°Öᣡ£¡£¡£¡£¡£¡£¶ÔÆä´úÂëµÄÆÊÎöÏÔʾ£¬£¬£¬Ò»Ð©wp_ajax²Ù×÷δ¾ÙÐÐÊÚȨ¼ì²é£¬£¬£¬´Ó¶ø¿Éµ¼Ö¿çÕ¾µãÇëÇóαÔ죨CSRF£©¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°Ïì×î´óµÄ²Ù×÷ÊÇ¡°wp_ajax_wpvivid_add_remote¡±£¬£¬£¬ÕâÒâζמßÓÐÈκνÇÉ«µÄÓû§¶¼¿ÉÒÔÌí¼ÓеĴ洢λÖò¢½«ÆäÓÃ×÷ĬÈϱ¸·ÝλÖ㬣¬£¬µ±Ï´α¸·ÝÔËÐÐʱ£¬£¬£¬Õû¸öÊý¾Ý¿â¼°Îļþ½«±»ÉÏ´«µ½¸Ã´æ´¢Î»Ö㬣¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔ»á¼ûÈκÎÎļþ¡£¡£¡£¡£¡£¡£¡£WPvivid¿ª·¢ÍŶÓÒѾ­ÔÚа汾ÖÐÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/100567/hacking/wpvivid-backup-plugin-flaw.html


6.¹È¸èÈ¥Äê¹²·¢Ëͽü4Íò¸öÕþ¸®Ö§³ÖµÄ´¹ÂÚ¹¥»÷ÖÒÑÔ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔÚ2019Ä꣬£¬£¬¹È¸è¹²·¢ËÍÁ˽ü4Íò¸öÕë¶ÔÕþ¸®Ö§³ÖµÄ´¹ÂÚ¹¥»÷»ò¶ñÒâÈí¼þ¹¥»÷µÄÖÒÑÔ£¬£¬£¬±È2018ÄêϽµÁ˽ü25£¥¡£¡£¡£¡£¡£¡£¡£Ï½µµÄÔµ¹ÊÔ­ÓÉÒ»·½ÃæÊDZ£»£»£»¤²½·¥Æðµ½ÁË×÷Ó㬣¬£¬ÁíÒ»·½ÃæÊǹ¥»÷ƵÂÊÕýÔÚ½µµÍ¡£¡£¡£¡£¡£¡£¡£×î½ü¼¸¸öÔµÄһЩÐÂÐËÇ÷ÊÆ°üÀ¨£ºÃ°³äÐÂÎÅýÌåºÍ¼ÇÕßÉ¢²½ÐéαÐÅÏ¢µÄ¹¥»÷ÕýÔÚÔöÌí£»£»£»Õþ¸®Ö§³ÖµÄ¹¥»÷Õß¼ÌÐøÖ÷ÒªÕë¶ÔµØÔµÕþÖεÐÊÖ¡¢Õþ¸®¹ÙÔ±¡¢¼ÇÕß¡¢²î±ðÕþ¼ûÕߺͼ¤½ø·Ö×ӵȣ»£»£»¹¥»÷ÕßÖØ¸´¹¥»÷ͳһĿµÄ£¬£¬£¬2019ÄêÓÐÎå·ÖÖ®Ò»µÄÓû§Ôâµ½¹¥»÷ÕߵĶà´Î¹¥»÷£»£»£»¹¥»÷Õ߯ð¾¢Ê¹ÓÃ0day¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://blog.google/technology/safety-security/threat-analysis-group/identifying-vulnerabilities-and-protecting-you-phishing/