RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£»£»£»£»£»£»£»ÃÀ¹ú·Ò×˹°²ÄÇÖÝÒòÔâÀÕË÷Èí¼þ¹¥»÷Ðû²¼½øÈë½ôÆÈ״̬

Ðû²¼Ê±¼ä 2019-07-26
1¡¢RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£¬£¬ £¬Ã¿·ÖÖÓËðʧ290ÍòÃÀÔª


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤RiskIQµÄÊý¾Ý£¬£¬ £¬È¥ÄêÍøÂç·¸·¨·Ö×Óÿ·ÖÖÓ¸øÈ«Çò¾­¼ÃÔì³É290ÍòÃÀÔªµÄËðʧ£¬£¬ £¬ÕûÄê×ܼÆÔì³É1.5ÍòÒÚÃÀÔªµÄËðʧ¡£¡£¡£¡£¡£¡£¡£ÆäËüÊý¾Ý°üÀ¨£¬£¬ £¬¼ÓÃÜÇ®±ÒÉúÒâËùÿ·ÖÖÓµÄËðʧ´ï1930ÃÀÔª£»£»£»£»£»£»£»´¹ÂÚ¹¥»÷ÿ·ÖÖÓÔì³ÉµÄËðʧ´ï17700ÃÀÔª£»£»£»£»£»£»£»2019ÄêÈ«ÇòÀÕË÷Èí¼þÊÂÎñµÄÔ¤¼Æ±¾Ç®ÎªÃ¿·ÖÖÓ22184ÃÀÔª£»£»£»£»£»£»£»Ã¿·ÖÖÓй¶µÄÉí·ÝÊý¾ÝÌõÊýΪ8100Ìõ£»£»£»£»£»£»£»Ã¿·ÖÖÓ¼ì²âµ½µÄ¶ñÒâÖØ¶¨ÏòΪ7¸öµÈ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/external-threat-management/2019-evil-internet-minute/


2¡¢ÃÀ¹ú·Ò×˹°²ÄÇÖÝÒòÔâÀÕË÷Èí¼þ¹¥»÷Ðû²¼½øÈë½ôÆÈ״̬


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹ú·Ò×˹°²ÄÇÖÝÖݳ¤John EdwardsÔÚÒ»²¨Õë¶Ô¸ÃÖÝÑ§ÇøµÄÀÕË÷Èí¼þ¹¥»÷À˳±ºóÐû²¼½øÈë½ôÆÈ״̬£¬£¬ £¬¸Ã½ôÆÈÉùÃ÷½«ÔÊÐí·Ò×˹°²ÄÇÖݵÄÇ徲ר¼ÒºÍÏà¹Ø×ÊԴЭÖúÍâµØÕþ¸®»ú¹¹±£»£»£»£»£»£»£»¤ÆäÍøÂç¡£¡£¡£¡£¡£¡£¡£½öÔÚ7Ô·Ý£¬£¬ £¬¸ÃÖݾÍÓÐËĸöÑ§ÇøÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬µ¼ÖÂÆäÅÌËã»úϵͳºÍµç»°ÏµÍ³ÖÐÖ¹£¬£¬ £¬ÕâËĸöÑ§Çø»®·ÖÊÇMorehouse¡¢Sabine¡¢Monroe CityºÍOuachita¡£¡£¡£¡£¡£¡£¡£¸Ã½ôÆÈÉùÃ÷»¹ÒªÇóËùÓÐÊÜÀÕË÷Èí¼þ¹¥»÷Ó°ÏìµÄÕþ¸®»ú¹¹ÏòÖݹÙÔ±±¨¸æ£¬£¬ £¬²¢ÏÞÖÆÇå¾²¹«Ë¾ÔÚ½ôÆÈÇéÐÎÏÂÌá¼Û¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ransomware-attacks-prompt-louisiana-to-declare-state-of-emergency/


3¡¢Ó¢¹úµçÐŹ«Ë¾SkyÔÚÔâÊÜײ¿â¹¥»÷ºóÖØÖÃÓû§ÃÜÂë


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔÚÉϸöÔÂÔ⵽ײ¿â¹¥»÷Ö®ºó£¬£¬ £¬Ó¢¹úµçÐŹ«Ë¾SkyËø¶¨ÁËÓû§µÄÕË»§²¢ÒªÇóËûÃÇÖØÖÃÃÜÂë¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ´ËÏî²½·¥ÊÇÔ¤·À²½·¥£¬£¬ £¬ÕâЩ±»Ëø¶¨µÄSky.comÓû§ÕË»§Ã»Óб»ºÚ¿ÍÈëÇÖ¡£¡£¡£¡£¡£¡£¡£ÕâЩÓû§½«»áÊÕµ½¸Ã¹«Ë¾µÄµç×ÓÓʼþ֪ͨ£¬£¬ £¬ÒªÇóËûÃÇ»á¼û¹«Ë¾ÍøÕ¾»ò²¦´òµç»°ÒÔ½âËøËûÃǵÄÕË»§£¬£¬ £¬²¢Í¨¹ýһϵÁÐ°ì·¨ÖØÖÃÕË»§ÃÜÂë¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/credentials-stuffing-attack-prompts-password-resets-for-sky-customers/


4¡¢ºÚ¿ÍÀÄÓÃÎļþ¹²ÏíЧÀÍWeTransfer·Ö·¢À¬»øÓʼþ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


CofenseÇå¾²Ñо¿Ô±Jake Longden·¢Ã÷¹¥»÷ÕßÕýÔÚÀÄÓÃÎļþ¹²ÏíЧÀÍWeTransferÀ´·Ö·¢À¬»øÓʼþ£¬£¬ £¬ÒÔÈÆ¹ýÇå¾²Íø¹ØµÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬ £¬ºÚ¿Í½«Öض¨Ïòµ½´¹ÂÚÒ³ÃæµÄHTM»òHTMLÎļþÉÏ´«ÖÁWeTransferЧÀÍ£¬£¬ £¬²¢Í¨¹ýµç×ÓÓʼþ½«¸ÃÁ´½Ó¹²Ïí¸øÄ¿µÄÓû§¡£¡£¡£¡£¡£¡£¡£¸Ã´¹ÂÚÕ¾µãÓÃÓÚÇÔÈ¡Óû§µÄOffice365µÇ¼ƾ֤¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽ʹÓøÃÒªÁìÕë¶ÔÒøÐС¢µçÁ¦ºÍýÌåÐÐÒµµÄ¹¥»÷ÕýÔÚÔöÌí¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/popular-file-sharing-service-wetransfer-used-in-malicious-spam-campaigns/146671/


5¡¢¶íÂÞ˹¹ú·À³Ð°üÉÌ¿ª·¢µÄ¶ñÒâÈí¼þMonokleÔÚÒ°ÍâÈö²¥


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


LookoutÑо¿Ö°Ô±·¢Ã÷Ò»¸öеÄÒÆ¶¯Ìع¤Èí¼þMonokle£¬£¬ £¬¸ÃÌØ¹¤Èí¼þ¾Ý³ÆÊÇÓɶíÂÞ˹¹ú·À³Ð°üÉÌSpecial Technology Center Ltd.¿ª·¢µÄ£¬£¬ £¬×Ô2016Äê3ÔÂÒÔÀ´¾ÍÔÚÒ°ÍâÈö²¥¡£¡£¡£¡£¡£¡£¡£MonokleÖ÷ÒªÃé×¼AndroidÊÖ»ú£¬£¬ £¬µ«ÊÊÓÃÓÚiOSµÄ°æ±¾Ò²ÔÚ¿ª·¢ÖС£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄ¹¦Ð§Ê®·Öǿʢ£¬£¬ £¬°üÀ¨78ÖÖ²î±ðµÄÔ¤½ç˵ÏÂÁî¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤LookoutÑо¿Ö°Ô±µÄ˵·¨£¬£¬ £¬Monokle±»ÓÃÓÚÕë¶Ô¶«Å·¡¢ÐðÀûÑÇÒÔ¼°ÖÐÑǹú¼ÒµÄ¸ß¼ÛֵĿµÄ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/russian-android-spying-apps.html


6¡¢WatchbogбäÖÖ¿ÉɨÃèÒ×ÊÜBlueKeep¹¥»÷µÄϵͳ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Intezer LabsÑо¿ÍŶӷ¢Ã÷WatchBogµÄбäÖÖʵÏÖÁËÒ»¸öBlueKeepÎó²îɨÃèÄ£¿£¿£¿ £¿£¿£¿é£¬£¬ £¬ÕâÒâζ×ÅWatchBogÕýÔÚ×¼±¸Ò»·ÝÒ×Êܹ¥»÷µÄϵͳµÄÁбí£¬£¬ £¬ÒÔ±ãÔÚδÀ´¶¨Î»»ò³öÊÛ¸øµÚÈý·½ÒÔ»ñÈ¡ÀûÈ󡣡£¡£¡£¡£¡£¡£¸ÃбäÖÖÔÚѬȾÅÌËã»úºó£¬£¬ £¬½«´ÓC2ЧÀÍÆ÷ÌṩµÄÁбíÖÐɨÃèËùÓÐIPµØµã£¬£¬ £¬Íê³ÉɨÃèÀú³Ìºó£¬£¬ £¬ÔÙ½«É¨Ãèµ½µÄÒ×Êܹ¥»÷µÄÖ÷»úÁбíͨ¹ýRC4¼ÓÃܵÄÊ®Áù½øÖÆ×Ö·û´®·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Ä¿½ñWatchBog»¹Î´±»ÓÃÓÚÆÆËðÐÔµÄÄ¿µÄ£¬£¬ £¬Æä×îÖÕÄ¿µÄÊǾÙÐÐÍڿ󡣡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/