CNSAÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·£»£»£» £»£» £»£»TalosÅû¶Allen-BradleyÊÊÅäÆ÷ÖÐδÐÞ²¹µÄDoSÎó²î

Ðû²¼Ê±¼ä 2020-10-16
1.CNSAÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·


1.jpg


10ÔÂ12ÈÕ£¬£¬£¬ÖйúÍøÂçÊÓÌý½ÚĿЧÀÍЭ»áÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·£¬£¬£¬Ê׶ȹûÕæÎÒ¹úÍøÂçÊÓÌýÓû§¹æÄ£ºÍ¹¤Òµ¹æÄ£¡£¡£¡£ ¡£¡£¡£¡£¸Ã±¨¸æ»ùÓÚÊý¾ÝÍÚ¾ò¡¢µ÷ÑÐÒÔ¼°µÚÈý·½Êý¾Ý£¬£¬£¬¶Ô2019-2020ÄêµÄÍøÂçÊÓÌýÐÐÒµÏÖ×´ºÍÉú³¤Ç÷ÊÆ¾ÙÐÐȨÍþ¡¢ÖÜÈ«µÄÑÐÅС£¡£¡£ ¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬×èÖ¹2020Äê6Ô£¬£¬£¬ÎÒ¹úÍøÂçÊÓÌýÓû§¹æÄ£´ï9.01ÒÚ£¬£¬£¬ 2019ÄêÍøÂçÊÓÌý¹¤Òµ¹æÄ£´ï4541.3ÒÚ¡£¡£¡£ ¡£¡£¡£¡£ÆäÖжÌÊÓÆµµÄÓû§Ê¹ÓÃÂÊ×î¸ß£¬£¬£¬´ï87.0%£¬£¬£¬Óû§¹æÄ£8.18ÒÚ£»£»£» £»£» £»£»×ÛºÏÊÓÆµµÄÓû§Ê¹ÓÃÂÊΪ77.1%£¬£¬£¬Óû§¹æÄ£7.24ÒÚ¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

http://www.xinhuanet.com/info/2020-10/13/c_139436283.htm


2.Barnes£¦NobleÔâµ½ÍøÂç¹¥»÷£¬£¬£¬¿Í»§Êý¾Ý»òÒÑй¶


2.jpg


ÃÀ¹úÁ¬ËøÊéµêBarnes£¦Noble³ÆÆäÔâµ½ÍøÂç¹¥»÷£¬£¬£¬¿Í»§Êý¾Ý»òÒÑй¶¡£¡£¡£ ¡£¡£¡£¡£Barnes£¦Noble͸¶ËûÃÇÔÚ2020Äê10ÔÂ10ÈÕÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬µ¼ÖÂδ¾­ÊÚȨµÄ¹¥»÷Õ߿ɲ»·¨»á¼ûBarnes£¦Noble¹«Ë¾µÄijЩϵͳ£¬£¬£¬Õâ¿ÉÄÜ»áй¶ÓйØÓû§µÄÏêϸÐÅÏ¢£¬£¬£¬°üÀ¨µç×ÓÓʼþµØµã¡¢Õ˵¥µØµã¡¢ËÍ»õµØµãºÍ¹ºÖÃÀúÊ·¼Í¼¡£¡£¡£ ¡£¡£¡£¡£ÏÖÔڸù«Ë¾ÕýÔÚ¶ÔÊÂÎñÔµ¹ÊÔ­ÓɾÙÐÐÊӲ죬£¬£¬Çå¾²¹«Ë¾ÍƲâÓпÉÄÜΪÀÕË÷Èí¼þ¹¥»÷µ¼Ö¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/barnes-and-noble-hit-by-cyberattack-that-exposed-customer-data/


3.ºÚ¿ÍÓÃͼÐÎÉè¼ÆÍøÕ¾Canva½¨ÉèºÍÍйÜÍøÂç´¹ÂÚÒ³Ãæ


3.jpg


ÍøÂçÇå¾²¹«Ë¾Cofense³Æ£¬£¬£¬ºÚ¿ÍÔ½À´Ô½¶àµØÊ¹ÓÃͼÐÎÉè¼ÆÍøÕ¾Canva½¨ÉèºÍÍйÜÍøÂç´¹ÂÚÒ³Ãæ¡£¡£¡£ ¡£¡£¡£¡£ÔÚÒ»¸ö´¹ÂÚÓʼþʾÀýÖУ¬£¬£¬ºÚ¿ÍαÔìÁËSharePoint eFax֪ͨ£¬£¬£¬Ê¹ÓÃÖ¸Ïòcanva.comÉϵÄÍøÂç´¹ÂÚÉϰ¶Ò³ÃæµÄÁ´½Ó£¬£¬£¬×îÖÕ½«Óû§Öض¨Ïòµ½´¹ÂÚÍøÕ¾¡£¡£¡£ ¡£¡£¡£¡£CofenseÌåÏÖ£¬£¬£¬ºÚ¿ÍÖ®ÒÔÊÇÑ¡ÔñCanva¶ø²»ÊÇGoogle Docs¡¢Sheets»òDropbox£¬£¬£¬ÊÇÓÉÓÚÆäËüƽ̨ӵÓиüºÃµÄϵͳÀ´¼ì²âºÍɾ³ý¶ñÒâÈí¼þ£¬£¬£¬¶øCanva²¢·Ç±»Éè¼ÆÎªÍÐ¹ÜÆ½Ì¨£¬£¬£¬¶øÖ»ÊÇÒ»¸öÓÃÓÚͼÐν¨ÉèÆ½Ì¨¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/canva-design-platform-actively-abused-in-credentials-phishing


4.ÒÁÀʺڿÍÕë¶ÔѧÊõ»ú¹¹ÌᳫÐÂÒ»ÂÖ´¹ÂÚ¹¥»÷»î¶¯


4.jpg


Çå¾²¹«Ë¾Malwarebytes³Æ£¬£¬£¬ ÒÁÀʺڿÍ×éÖ¯Silent LibrarianÕë¶ÔѧÊõ»ú¹¹ÌᳫÐÂÒ»ÂÖ´¹ÂÚ¹¥»÷»î¶¯¡£¡£¡£ ¡£¡£¡£¡£¹¥»÷ÕßÑ¡ÔñÔÚÐÂѧÄê×îÏÈ֮ʱÌᳫ»î¶¯£¬£¬£¬Í¨¹ýÏòÊܺ¦Õß·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬ÓÕʹÆäµã»÷ÓʼþÖÐαÔì³É´óѧÃÅ»§ÍøÕ¾»òÏà¹ØÓ¦ÓóÌÐò£¨ÀýÈç´óѧͼÊé¹Ý£©µÄÁ´½Ó£¬£¬£¬Ö¼ÔÚ½«Êܺ¦ÕßÖØ¶¨Ïòµ½ÓòÃûÏàËÆµÄ´¹ÂÚÍøÕ¾ÉÏ£¬£¬£¬ÒÔÍøÂçµÇ¼ƾ֤¡£¡£¡£ ¡£¡£¡£¡£MalwarebytesÌåÏÖ¸Ã×éÖ¯ÔÚÖ®Ç°Ò²ÔøÌᳫ¹ýÕë¶ÔѧÊõ»ú¹¹µÄ¹¥»÷£¬£¬£¬µ«Õâ´ÎÈ´½«²¿·ÖÍøÂç´¹ÂÚÕ¾µãÍйÜÔÚÒÁÀʵÄЧÀÍÆ÷ÉÏ¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/iranian-hackers-restart-attacks-on-universities-as-the-new-school-year-begins/


5.TalosÅû¶Allen-BradleyÊÊÅäÆ÷ÖÐδÐÞ²¹µÄDoSÎó²î


5.jpg


Cisco TalosµÄÑо¿Ö°Ô±Åû¶ÁË5¸öÑÏÖØµÄ»º³åÇøÒç³öÎó²î£¬£¬£¬Ó°ÏìÁË4.003°æ»ò¸üÔç°æ±¾µÄAllen-Bradley×°±¸¡£¡£¡£ ¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËÍÌØÖÆµÄ¶ñÒâÊý¾Ý°üÀ´Ê¹ÓÃÉÏÊöÎó²î£¬£¬£¬Õ⽫µ¼ÖÂÊܺ¦ÕßµÄÍøÂçÓë×°±¸Ö®¼äµÄͨѶɥʧ£¬£¬£¬´Ó¶øµ¼Ö¾ܾøÐ§ÀÍ¡£¡£¡£ ¡£¡£¡£¡£Éú²úÉ̽¨Ò齫װ±¸ÉèÖÃΪ½ö½ÓÊÜÀ´×Ô¶Ë¿Ú44818ÉÏ¿ÉÐÅÈÎȪԴµÄCIPÅþÁ¬£¬£¬£¬²¢ÊµÑéÍøÂç·Ö¶ÎºÍÇå¾²¿ØÖÆ£¬£¬£¬ÒÔ×îºéÁ÷ƽµØïÔÌ­Ó°Ïì¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/109480/ics-scada/allen-bradley-adapter-dos-flaws.html


6.ºÚ¿Í¹ûÕæÃÀ¹úÁ¬Ëø²ÍÌüDickeyµÄ300ÍòÓû§Ö§¸¶¿¨ÐÅÏ¢


6.jpg


Gemini Advisory·¢Ã÷£¬£¬£¬ºÚ¿ÍÔÚ°µÍøJoker's Stash¹ûÕæÁËÃÀ¹úÉÕ¿¾Á¬Ëø²ÍÌüDickey's BBQ PitµÄ300ÍòÓû§µÄÖ§¸¶¿¨ÐÅÏ¢¡£¡£¡£ ¡£¡£¡£¡£Gemini³ÆºÚ¿ÍÊÇͨ¹ýÈëÇÖDickey²ÍÌüʹÓõÄPOS»úÇÔÊØÐÅÏ¢µÄ£¬£¬£¬²¢ÒÑÀֳɯÆËðÁ˱鲼30¸öÖݵÄ156¸ö²ÍÌü¡£¡£¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÕâЩÊý¾ÝËÆºõÊÇÔÚ2019Äê7ÔÂÖÁ2020Äê8ÔÂÖ®¼ä±»ÇÔÈ¡µÄ£¬£¬£¬ºÚ¿ÍÖ÷ÒªÕë¶ÔʹÓÃÁ˹ýʱ´ÅÌõÊÖÒյĿ¨£¬£¬£¬²¢ÇÒÿÕÅ¿¨µÄƽ¾ù¼ÛÇ®½öΪ17ÃÀÔª¡£¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/card-details-for-3-million-dickeys-customers-posted-on-carding-forum/