¶ñÒâÈí¼þAlina»Ø¹é£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓÃDNSËíµÀÇÔÊØÐÅÓÿ¨Êý¾Ý£»£»£»£»£»£»CiscoÖÒÑÔСÐÍÆóÒµ½»Á÷»ú±£´æÎó²î£¬£¬£¬£¬£¬£¬ £¬¿É»á¼ûÖÎÀí½çÃæ

Ðû²¼Ê±¼ä 2020-07-03

1.¶ñÒâÈí¼þAlina»Ø¹é£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓÃDNSËíµÀÇÔÊØÐÅÓÿ¨Êý¾Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Black Lotus LabsÑо¿Ö°Ô±·¢Ã÷POS¶ñÒâÈí¼þAlina»Ø¹é£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓÃDNSËíµÀÇÔÊØÐÅÓÿ¨Êý¾Ý¡£¡£¡£¡£¡£ ¡£ÔÚÐÅÓÿ¨ÉúÒâʱ´ú£¬£¬£¬£¬£¬£¬ £¬Êý¾Ýͨ³£»£»£»£»£»£»á±»½âÃÜ£¬£¬£¬£¬£¬£¬ £¬²¢ÒÔδ¼ÓÃܵÄÐÎʽÔÝʱ´æ´¢ÔÚPOS´æ´¢Æ÷ÖС£¡£¡£¡£¡£ ¡£¸Ã¶ñÒâÈí¼þ»áÔÚPOS×°±¸µÄRAMÖÐËÑË÷´Ëδ¼ÓÃܵÄÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬ £¬²¢½«Æä·¢ËÍ»ØC2ЧÀÍÆ÷¡£¡£¡£¡£¡£ ¡£ÎªÁËÈ·±£ÔÚÄÜÕÒµ½ÕæÊµµÄÐÅÓÿ¨Êý¾Ý£¬£¬£¬£¬£¬£¬ £¬¶ñÒâÈí¼þ»¹»áʹÓÃLuhnУÑéºÍËã·¨ÑéÖ¤¿¨ºÅµÄ×îºóһλÊÇ·ñΪ׼ȷµÄУÑéλ¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/alina-point-sale-malware-ongoing-campaign/157087/


2.ÃÀ¹úCISAÐû²¼·ÀÓùÀ´×ÔTorÄäÃûÍøÂçµÄ¹¥»÷µÄÖ¸ÄÏ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹úCISAÐû²¼ÁËÆäÓëFBIÏàÖú±àдµÄÓйر£»£»£»£»£»£»¤ÍøÂçÃâÊÜÀ´×ÔTorÄäÃûÍøÂçÌᳫµÄÍøÂç¹¥»÷µÄÖ¸ÄÏ£¬£¬£¬£¬£¬£¬ £¬ÏÈÈÝÁ˺ڿÍÔÚ¹¥»÷»î¶¯ÖÐʹÓÃTor¾ÙÐÐÄäÃûµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£ ¡£¸ÃÖ¸ÄÏÖеÄʾÀý°üÀ¨Ö´ÐÐÕì̽¡¢ÉøÍ¸ÏµÍ³¡¢ÇÔÈ¡ºÍʹÓÃÊý¾Ý¡¢ÒÔ¼°Í¨¹ý¾Ü¾øÐ§À͹¥»÷ºÍÀÕË÷Èí¼þÓÐÓÃÔØºÉµÄת´ïʹЧÀÍÍÑ»ú¡£¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬CISAºÍFBI½¨Ò鹫˾ºÍ×é֯ͨ¹ýÆÀ¹ÀËûÃÇÒòTorÔì³ÉµÄСÎÒ˽¼ÒΣº¦Î£º¦£¬£¬£¬£¬£¬£¬ £¬À´½ÓÄÉÊʵ±µÄ»º½â²½·¥£¬£¬£¬£¬£¬£¬ £¬ÒÔ×èÖ¹»ò¼àÊÓÀ´×ÔÒÑÖªTor½ÚµãµÄÈëÕ¾ºÍ³öÕ¾Á÷Á¿¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-govt-shares-tips-on-defending-against-cyberattacks-via-tor/


3.ÃÀ¹úNSAÐû²¼Óйر£»£»£»£»£»£»¤IPsecÐéÄâרÓÃÍøÂçµÄÖ¸ÄÏ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©Ðû²¼ÁËÓйØÔõÑù׼ȷ±£»£»£»£»£»£»¤IPÇå¾²£¨IPsec£©ÐéÄâרÓÃÍø£¨VPN£©ÃâÊÜDZÔÚ¹¥»÷µÄÖ¸ÄÏ¡£¡£¡£¡£¡£ ¡£¸ÃÖ¸ÄϳýÁËΪ×éÖ¯ÌṩÓйØÔõÑù±£»£»£»£»£»£»¤IPsecµÄ½¨ÒéÍ⣬£¬£¬£¬£¬£¬ £¬»¹Ç¿µ÷ÁËʹÓÃǿʢµÄ¼ÓÃÜÊÖÒÕ±£»£»£»£»£»£»¤Á÷Á¿ÖаüÀ¨µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬ £¬ÒÔ¼°ÔÚÅþÁ¬µ½Ô¶³ÌЧÀÍÆ÷ʱ±éÀú²»ÊÜÐÅÈεÄÍøÂçµÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£ ¡£NSAÌåÏÖVPNÊÇÆôÓÃÔ¶³Ì»á¼ûºÍÇå¾²ÅþÁ¬Ô¶³ÌÕ¾µãËù±ØÐèµÄ£¬£¬£¬£¬£¬£¬ £¬µ«Ã»ÓÐÊʵ±µÄÉèÖᢲ¹¶¡ÖÎÀí¡¢ºÍ¼Ó¹ÌµÄVPNÊÇÈÝÒ×Êܵ½¹¥»÷¡£¡£¡£¡£¡£ ¡£NSA½¨ÒéïÔÌ­VPNÍø¹ØµÄ¹¥»÷Ãæ£¬£¬£¬£¬£¬£¬ £¬ÑéÖ¤¼ÓÃÜËã·¨ÊÇ·ñÇкϹú¼ÒÇ徲ϵͳÕþ²ßίԱ»á£¨CNSSP£©15µÄ»®¶¨£¬£¬£¬£¬£¬£¬ £¬×èֹʹÓÃĬÈϵÄVPNÉèÖ㬣¬£¬£¬£¬£¬ £¬É¾³ýδʹÓûò²»ÇкÏÒªÇóµÄ¼ÓÃÜÌ×¼þ£¬£¬£¬£¬£¬£¬ £¬ÒÔ¼°ÊµÊ±¸üÐÂVPNÍø¹ØºÍ¿Í»§¶Ë¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/nsa-releases-guidance-on-securing-ipsec-virtual-private-networks/


4.ÃÀ¹úÊýÊ®¸öÐÂÎÅÍøÕ¾Ôâµ½ÀÕË÷Èí¼þWastedLocker¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


SymantecÍþвÇ鱨Ñо¿Ö°Ô±Ö¤Êµ£¬£¬£¬£¬£¬£¬ £¬Evil CorpÈëÇÖÁË30¶à¼ÒÃÀ¹ú´óÐÍ˽Ӫ¹«Ë¾£¬£¬£¬£¬£¬£¬ £¬¶øÕâЩ¹«Ë¾ÆìϵÄÊýÊ®¼ÒÐÂÎÅÍøÕ¾Ò²Ôâµ½Á˹¥»÷¡£¡£¡£¡£¡£ ¡£ºÚ¿ÍʹÓÃÁË»ùÓÚJavaScriptµÄ¶ñÒâSocGholish¿ò¼Ü¾ÙÐй¥»÷£¬£¬£¬£¬£¬£¬ £¬Ê×ÏÈͨ¹ý·¢ËÍαÔìµÄÈí¼þ¸üÐÂÌáÐÑ·Ö·¢¶ñÒâÈí¼þÓÐÓÃÔØºÉ¡£¡£¡£¡£¡£ ¡£Ò»µ©¹«Ë¾Ô±¹¤±»Ñ¬È¾ºó£¬£¬£¬£¬£¬£¬ £¬ºÚ¿Í¾Í»áʹÓÃCobalt StrikeÍþв·ÂÕæÈí¼þºÍһЩԶ³Ì¹¤¾ßÇÔȡƾ֤¡¢ÌáÉýȨÏÞ²¢ÔÚÍøÂçÉÏÒÆ¶¯£¬£¬£¬£¬£¬£¬ £¬×îÖÕ×°ÖÃÀÕË÷Èí¼þWastedLocker¡£¡£¡£¡£¡£ ¡£²¢ÇÒ£¬£¬£¬£¬£¬£¬ £¬ÔÚ×°ÖÃÀÕË÷Èí¼þ֮ǰ£¬£¬£¬£¬£¬£¬ £¬ËûÃÇ»¹Ê¹ÓÃPowerShell¾ç±¾ºÍÕýµ±¹¤¾ßÔÚÊܺ¦ÕßµÄÍøÂçÉϽûÓÃWindows Defender¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dozens-of-us-news-sites-hacked-in-wastedlocker-ransomware-attacks/


5.CiscoÖÒÑÔÆäСÐÍÆóÒµ½»Á÷»ú±£´æÎó²î£¬£¬£¬£¬£¬£¬ £¬¿É»á¼ûÖÎÀí½çÃæ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Cisco SystemsÖÒÑԳƣ¬£¬£¬£¬£¬£¬ £¬Ò»¸öÑÏÖØµÄÎó²îÓ°ÏìÁËÆä7¿îСÐÍÆóÒµ½»Á÷»ú£¬£¬£¬£¬£¬£¬ £¬¸ÃÎó²î¿Éʹδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»ñµÃCiscoСÐÍÆóÒµ½»Á÷»úµÄÖÎÀíȨÏÞ¡£¡£¡£¡£¡£ ¡£¸ÃÎó²î£¨CVE-2020-3297£©±¬·¢µÄÔµ¹ÊÔ­ÓÉÔÚÓÚʹÓÃÈõìØÌìÉú»á»°±êʶ·ûÖµ¡£¡£¡£¡£¡£ ¡£Ë¼¿ÆµÄת´ï³Æ£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¿ÉÒÔͨ¹ý±©Á¦¹¥»÷ʹÓôËÎó²îÀ´È·¶¨Ä¿½ñ»á»°±êʶ·û£¬£¬£¬£¬£¬£¬ £¬È»ºóÖØÓøûỰ±êʶ·ûÀ´½ÓÊÜÕýÔÚ¾ÙÐеĻỰ¡£¡£¡£¡£¡£ ¡£ÊÜ´ËÎó²îÓ°ÏìµÄ²úÆ·ÓУºCisco 250ϵÁÐÖÇÄܽ»Á÷»ú¡¢350ϵÁÐÖÎÀíÐͽ»Á÷»ú¡¢350XϵÁпɶѵþÖÎÀíÐͽ»Á÷»ú¡¢550XϵÁпɶѵþÖÎÀíÐͽ»Á÷»ú¡¢Small Business 200ϵÁÐÖÇÄܽ»Á÷»ú¡¢Small Business 300ϵÁÐÖÎÀíÐͽ»Á÷»úºÍSmall Business 500ϵÁпɶѵþÖÎÀíÐÍ¿ª¹Ø¡£¡£¡£¡£¡£ ¡£Ë¼¿ÆÔڹ̼þ°æ±¾2.5.5.47ÖÐÐÞ¸´ÁËÕâ¸öÎó²î¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/cisco-warns-high-severity-bug-small-business-switch/157090/


6.¾Ýͳ¼Æ£¬£¬£¬£¬£¬£¬ £¬2020 Q1 DDoS¹¥»÷±ÈÈ¥Äêͬ±ÈÔöÌí278£¥


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤NexusguardµÄÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬2020ÄêµÚÒ»¼¾¶ÈµÄDDoS¹¥»÷ÊýÄ¿Óë2019ÄêµÚÒ»¼¾¶ÈÏà±ÈÔöÌíÁË278£¥ÒÔÉÏ£¬£¬£¬£¬£¬£¬ £¬ÓëÉÏÒ»¼¾¶ÈÏà±ÈÔöÌíÁË542£¥ÒÔÉÏ¡£¡£¡£¡£¡£ ¡£ÊÓ²ìЧ¹ûÅú×¢£¬£¬£¬£¬£¬£¬ £¬Ë鯬¹¥»÷ÔÚ¼ÌÐøÉøÍ¸¹Å°åµÄãÐÖµ¼ì²â£¬£¬£¬£¬£¬£¬ £¬ÕâЩ¹¥»÷µÄЧ¹ûÊǽ«´ó×ÚÀ¬»øÁ÷Á¿»ãÈëÒ»¸ö´óµÄIP³Ø£¬£¬£¬£¬£¬£¬ £¬µ±²î±ðIP×îÏÈÀÛ»ýʱ£¬£¬£¬£¬£¬£¬ £¬ÕâЩÀ¬»øÁ÷Á¿»áÛÕ±ÕÄ¿µÄ¡£¡£¡£¡£¡£ ¡£¸Ã±¨¸æÅú×¢£¬£¬£¬£¬£¬£¬ £¬90%µÄ¹¥»÷ʹÓõÄÊǵ¥Ê¸Á¿¹¥»÷£¬£¬£¬£¬£¬£¬ £¬ÕâÓëÒÑÍùÊ¢ÐеĶàʸÁ¿¹¥»÷ÓÐËù²î±ð¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/07/02/q1-2020-ddos-attacks/