Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î£»£»£»£» £»ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ

Ðû²¼Ê±¼ä 2020-03-30

1.Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Positive TechnologiesµÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬£¬ËùÓеÄ4GºÍ²¿·Ö5GµçÐÅÍøÂç¶¼Ò×Êܵ½Ê¹ÓÃDiameterÐÅÁîЭÒéÎó²îµÄDoS¹¥»÷¡£¡£¡£¡£¡£¡£DiameterÐÅÁîЭÒéÓÃÓÚÔÚ4GÍøÂçÖÐÈÏÖ¤ºÍÊÚȨÐÂÎÅ·Ö·¢£¬£¬£¬£¬ËüÊÇLTEÖеÄÒªº¦×é³É²¿·Ö£¬£¬£¬£¬ÓÐÖúÓÚ»¥ÁªÍøÐ­ÒéÍøÂçÔªËØÖ®¼äµÄת»»ºÍͨѶ¡£¡£¡£¡£¡£¡£¸ÃЭÒéÖеÄÎó²îÔÊÐí¹¥»÷Õ߸ú×ÙÓû§µÄλÖò¢»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬ËæºóʹÓÃÕâЩÐÅÏ¢×èµ²ÓïÒôºô½ÐºÍÈÆ¹ý¶ÔÒÆ¶¯Ð§À͵ÄÏÞÖÆ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆËûÃÇÔÚ2018ÄêÖÁ2019ÄêÖ®¼äÀÖ³ÉÉøÍ¸µ½ÄÏÃÀ¡¢ÑÇÖÞ¡¢Å·Ö޺ͷÇÖÞµÄ28¼ÒµçÐÅÔËÓªÉÌ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬µ±5GÍøÂ罨ÉèÔÚÏÖÓмܹ¹ºÍЭÒéÖ®ÉÏʱ£¬£¬£¬£¬ÕâЩÇå¾²Îó²î½«¼ÌÐø±£´æ£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÌÐø¸ú×ÙÓû§µÄλÖᢻñÈ¡Ãô¸ÐÐÅÏ¢ÒÔ¼°½µ¼¶µ½3GÍøÂçµÈ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/all-4g-networks-susceptible-to-dos/?&web_view=true


2.ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÉÏÖÜĩʱ´ú£¬£¬£¬£¬ÀÕË÷Èí¼þDharmaµÄÔ´´úÂëÔÚÁ½¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉϳöÊÛ£¬£¬£¬£¬ÆäÊÛ¼ÛµÍÖÁ2000ÃÀÔª¡£¡£¡£¡£¡£¡£Æ¾Ö¤FBIÔÚ½ñÄêRSA¾Û»áÉϵÄÒ»´ÎÑݽ²£¬£¬£¬£¬DharmaÊǽüÄêÀ´×¬Ç®µÚ¶þ¶àµÄÀÕË÷Èí¼þÓªÒµ£¬£¬£¬£¬ÔÚ2016Äê11ÔÂÖÁ2019Äê11ÔÂÖ®¼ä»ñµÃÁËÁè¼Ý2400ÍòÃÀÔªµÄÊê½ðÖ§¸¶¡£¡£¡£¡£¡£¡£ÆäÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉϳöÊۺܿÉÄܻᵼÖ¸üÆÕ±éµÄй¶£¬£¬£¬£¬½ø¶øÔÚ¶à¸ö·¸·¨¼¯ÍÅÖ®¼äÀ©É¢£¬£¬£¬£¬×îÖÕµ¼Ö¹¥»÷¼¤Ôö¡£¡£¡£¡£¡£¡£DharmaµÄ¼ÓÃܼƻ®ºÜÊÇÏȽø£¬£¬£¬£¬×Ô2017ÄêÒÔÀ´Ò»Ö±Ã»ÓÐÃâ·ÑµÄ½âÃܹ¤¾ß¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/


3.ºÚ¿ÍʹÓÃÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÇÔÈ¡Óû§µÄ±ÈÌØ±Ò


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


MyCryptoÇå¾²×ܼàHarry Denley·¢Ã÷ÓÐ9¸öÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÊÔͼÇÔÈ¡Óû§µÄ±ÈÌØ±Ò£¬£¬£¬£¬ÔÚÒÑÍùµÄËĸöÐÇÆÚÖУ¬£¬£¬£¬ÕâÐ©ÍøÕ¾ÒѾ­ÇÔÈ¡ÁËÁè¼Ý7¸ö±ÈÌØ±Ò£¨¼ÛֵԼΪ4.5ÍòÃÀÔª£©µÄ×ʽ𡣡£¡£¡£¡£¡£ÕâÖÖÍøÕ¾Ð§ÀÍ×ÊÖúÓû§½«Æä±ÈÌØ±ÒµØµãת»»³É¶þάÂ룬£¬£¬£¬ÒÔ½»¸øÆäËüÓû§¾ÙÐÐÖ§¸¶¡£¡£¡£¡£¡£¡£µ«Denley·¢Ã÷Õâ9¸öÍøÕ¾ÏÖʵÉÏÖ»ÌìÉúÁËÕ©Æ­ÕßÇ®°üµÄ¶þάÂë¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÍйÜÕâ9¸öÍøÕ¾µÄ3¸öWebЧÀÍÆ÷»¹ÍйÜ×Å450¶à¸öÆäËüµÄ¶ñÒâÍøÕ¾£¬£¬£¬£¬Ö»¹Ü´ó´ó¶¼ÍøÕ¾²¢²»»îÔ¾¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/network-of-fake-qr-code-generators-will-steal-your-bitcoin/


4.2004ÄêÖÁ2019Äê¶íÂÞ˹ºÚ¿Í»î¶¯ÆÊÎö±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹úÇ鱨ÉçÇøµÄ²¼×È¡¤°¬Âס¤ººÃܶû¶Ù£¨Booz Allen Hamilton£©Ðû²¼ÁËÒ»·ÝÖÜÈ«±¨¸æ£¬£¬£¬£¬ÏêϸÏÈÈÝÁË2004ÄêÖÁ2019Äêʱ´ú¶íÂÞ˹µÄ¾üÊÂÍøÂç¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖØµã¹Ø×¢ÓɶíÂÞ˹¾ü¶ÓÁ¥ÊôµÄÇ鱨²¿·Ö¾ÙÐеÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬Booz Allen½«ÒÑÍù15Äêʱ´úµÄ200¶à¸öGRUÍøÂç¹¥»÷»î¶¯¹éΪ23À࣬£¬£¬£¬²¢Õ¹ÏÖÁËÿһ¸ö¹¥»÷»î¶¯Óë¶íÂÞ˹ÖܱßÕþÖÎÇéÐÎת±äµÄ¹ØÏµ¡£¡£¡£¡£¡£¡£¸Ã±¨¸æµÄ×îÖÕ½áÂÛÊÇ¿ÉÒÔÕ¹ÍûGRUµÄÍøÂç¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/booz-allen-analyzed-200-russian-hacking-operations-to-better-understand-their-tactics/?&web_view=true


5.WPvivid²å¼þȱÉÙÊÚȨ¼ì²é£¬£¬£¬£¬¿ÉÓÃÓÚ»ñÈ¡ÍøÕ¾ËùÓÐÎļþ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


WebARXÇ徲ר¼ÒÖÒÑԳƣ¬£¬£¬£¬ÓÉÓÚWPvivid²å¼þÖÐȱÉÙÒ»¸öÊÚȨ¼ì²é£¬£¬£¬£¬µ¼Ö¹¥»÷Õ߿ɻñÈ¡WordPressÍøÕ¾µÄËùÓÐÎļþ¡£¡£¡£¡£¡£¡£WPvividÊÇÒ»¸öÃâ·ÑµÄ¶àºÏÒ»±¸·Ý¡¢»¹Ô­ºÍǨáã²å¼þ£¬£¬£¬£¬Ëü¾ßÓнü4Íò¸ö»îÔ¾×°Öᣡ£¡£¡£¡£¡£¶ÔÆä´úÂëµÄÆÊÎöÏÔʾ£¬£¬£¬£¬Ò»Ð©wp_ajax²Ù×÷δ¾ÙÐÐÊÚȨ¼ì²é£¬£¬£¬£¬´Ó¶ø¿Éµ¼Ö¿çÕ¾µãÇëÇóαÔ죨CSRF£©¹¥»÷¡£¡£¡£¡£¡£¡£ÊÜÓ°Ïì×î´óµÄ²Ù×÷ÊÇ¡°wp_ajax_wpvivid_add_remote¡±£¬£¬£¬£¬ÕâÒâζמßÓÐÈκνÇÉ«µÄÓû§¶¼¿ÉÒÔÌí¼ÓеĴ洢λÖò¢½«ÆäÓÃ×÷ĬÈϱ¸·ÝλÖ㬣¬£¬£¬µ±Ï´α¸·ÝÔËÐÐʱ£¬£¬£¬£¬Õû¸öÊý¾Ý¿â¼°Îļþ½«±»ÉÏ´«µ½¸Ã´æ´¢Î»Ö㬣¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔ»á¼ûÈκÎÎļþ¡£¡£¡£¡£¡£¡£WPvivid¿ª·¢ÍŶÓÒѾ­ÔÚа汾ÖÐÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/100567/hacking/wpvivid-backup-plugin-flaw.html


6.¹È¸èÈ¥Äê¹²·¢Ëͽü4Íò¸öÕþ¸®Ö§³ÖµÄ´¹ÂÚ¹¥»÷ÖÒÑÔ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔÚ2019Ä꣬£¬£¬£¬¹È¸è¹²·¢ËÍÁ˽ü4Íò¸öÕë¶ÔÕþ¸®Ö§³ÖµÄ´¹ÂÚ¹¥»÷»ò¶ñÒâÈí¼þ¹¥»÷µÄÖÒÑÔ£¬£¬£¬£¬±È2018ÄêϽµÁ˽ü25£¥¡£¡£¡£¡£¡£¡£Ï½µµÄÔµ¹ÊÔ­ÓÉÒ»·½ÃæÊDZ£»£»£»£» £»¤²½·¥Æðµ½ÁË×÷Ó㬣¬£¬£¬ÁíÒ»·½ÃæÊǹ¥»÷ƵÂÊÕýÔÚ½µµÍ¡£¡£¡£¡£¡£¡£×î½ü¼¸¸öÔµÄһЩÐÂÐËÇ÷ÊÆ°üÀ¨£ºÃ°³äÐÂÎÅýÌåºÍ¼ÇÕßÉ¢²½ÐéαÐÅÏ¢µÄ¹¥»÷ÕýÔÚÔöÌí£»£»£»£» £»Õþ¸®Ö§³ÖµÄ¹¥»÷Õß¼ÌÐøÖ÷ÒªÕë¶ÔµØÔµÕþÖεÐÊÖ¡¢Õþ¸®¹ÙÔ±¡¢¼ÇÕß¡¢²î±ðÕþ¼ûÕߺͼ¤½ø·Ö×ӵȣ»£»£»£» £»¹¥»÷ÕßÖØ¸´¹¥»÷ͳһĿµÄ£¬£¬£¬£¬2019ÄêÓÐÎå·ÖÖ®Ò»µÄÓû§Ôâµ½¹¥»÷ÕߵĶà´Î¹¥»÷£»£»£»£» £»¹¥»÷Õ߯ð¾¢Ê¹ÓÃ0day¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://blog.google/technology/safety-security/threat-analysis-group/identifying-vulnerabilities-and-protecting-you-phishing/