¹¤ÐŲ¿¾Í¡¶¹¤Òµ»¥ÁªÍøÆóÒµÍøÂçÇå¾²·ÖÀà·Ö¼¶Ö¸ÄÏ£¨ÊÔÐУ©¡·Õ÷ÇóÒâ¼û£»£»£»£»£»£»£»MacÍþв¼ì²âÊýÄ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ

Ðû²¼Ê±¼ä 2019-12-19


1.¹¤ÐŲ¿¾Í¡¶¹¤Òµ»¥ÁªÍøÆóÒµÍøÂçÇå¾²·ÖÀà·Ö¼¶Ö¸ÄÏ£¨ÊÔÐУ©¡·Õ÷ÇóÒâ¼û


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¾Ý¹¤ÐŲ¿¹ÙÍø£¬£¬£¬£¬£¬£¬Îª¹á³¹Âäʵ¡¶ÔöÇ¿¹¤Òµ»¥ÁªÍøÇå¾²ÊÂÇéµÄÖ¸µ¼Òâ¼û¡·£¬£¬£¬£¬£¬£¬Íƶ¯¹¤Òµ»¥ÁªÍøÇå¾²ÔðÈÎÂäʵ£¬£¬£¬£¬£¬£¬¶Ô¹¤Òµ»¥ÁªÍøÆóÒµÍøÂçÇ徲ʵÑé·ÖÀà·Ö¼¶ÖÎÀí£¬£¬£¬£¬£¬£¬ÌáÉý¹¤Òµ»¥ÁªÍøÇå¾²°ü¹ÜÄÜÁ¦ºÍˮƽ£¬£¬£¬£¬£¬£¬¹¤ÐŲ¿Ñо¿Æð²ÝÁË¡¶¹¤Òµ»¥ÁªÍøÆóÒµÍøÂçÇå¾²·ÖÀà·Ö¼¶Ö¸ÄÏ£¨ÊÔÐУ©¡·£¨Õ÷ÇóÒâ¼û¸å£©¡£¡£¡£ÏÖÏòÉç»á¹ûÕæÕ÷ÇóÒâ¼û¡£¡£¡£¹¤ÐŲ¿ÌåÏÖ£¬£¬£¬£¬£¬£¬ÓÐÈýÀàÆóÒµÊÊÓÃÓÚ±¾Ö¸ÄÏ£º1. Ó¦Óù¤Òµ»¥ÁªÍøµÄ¹¤ÒµÆóÒµ£»£»£»£»£»£»£»2. ¹¤Òµ»¥ÁªÍøÆ½Ì¨ÆóÒµ£¨Ö÷ÒªÖ¸¶ÔÍâÌṩ¹¤Òµ»¥ÁªÍøÆ½Ì¨µÈ»¥ÁªÍøÐÅϢЧÀÍµÄÆóÒµ£©£»£»£»£»£»£»£»3. ¹¤Òµ»¥ÁªÍø»ù´¡ÉèÊ©ÔËÓªÆóÒµ£¬£¬£¬£¬£¬£¬Ö÷Òª°üÀ¨»ù´¡µçÐÅÔËÓªÆóÒµºÍ±êʶÆÊÎöϵͳ½¨ÉèÔËÓª»ú¹¹¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¤ÐŲ¿ÌåÏÖ£¬£¬£¬£¬£¬£¬±¾´ÎÖ¸ÄϵĻùÀ´Ô´Ôò°üÀ¨£ºÆóÒµ·Ö¼¶ÓëÐÐÒµÍøÂçÇå¾²Ó°ÏìˮƽÏà¹ØÁª¡¢ÐÐÒµÖ¸µ¼ÓëµØ·½î¿ÏµÏàÁ¬Ïµ¡¢ÆóÒµ×ÔÆÀÓëÊôµØºË²éÏàÁ¬ÏµµÈ¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º

http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057724/n3057728/c7571643/content.html


2.IMGEÒâÍâй¶6000¶àÃû²¨Òô¹«Ë¾Ô±¹¤ÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¾ÝThe Daily Beast±¨µÀ£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ»ªÊ¢¶ÙÌØÇøµÄÊý×Ö×Éѯ¹«Ë¾IMGEÒâÍâй¶ÁË6000¶àÃû²¨ÒôÔ±¹¤µÄÐÕÃû¡¢µç»°ºÅÂë¡¢¼ÒͥסËùºÍµç×ÓÓʼþµØµãµÈÐÅÏ¢¡£¡£¡£ÊÜÓ°ÏìµÄÖ°Ô±°üÀ¨Õþ¸®Ïà¹ØÖ°Ô±ºÍ¸ß¼¶ÖÎÀíÖ°Ô±£¬£¬£¬£¬£¬£¬ÉõÖÁ°üÀ¨ÔÚ¹ú·À³Ð°üÉ̵ĸ߼¶Ô­ÐÍÉè¼Æ²¿·ÖÊÂÇéµÄ¸ßÃô¸ÐÐÔÊÖÒÕÖ°Ô±¡£¡£¡£²¨Òô½²»°ÈËÌåÏÖÕâЩÐÅÏ¢ÊÇÓÉÍøÕ¾¹©Ó¦É̵ÄÈËΪ¹ýʧµ¼ÖµÄ£¬£¬£¬£¬£¬£¬²¨Òô¹«Ë¾ÈÏÕæ¿´´ýÍøÂçÇå¾²ºÍÓû§Òþ˽£¬£¬£¬£¬£¬£¬ÒªÇó¹©Ó¦É̱£»£»£»£»£»£»£»¤Î¯ÍиøËûÃǵÄÊý¾Ý£¬£¬£¬£¬£¬£¬²¨ÒôÕýÔÚÇ×½ü¼àÊÓÇéÐÎÒÔÈ·±£ÎÊÌⱻѸËÙ½â¾ö¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cloud-data-leak-thousands/


3.±¾Ìïй¶Լ2.6Íò±±ÃÀ¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔÚ10ÔÂ21ÈÕ¹ýʧÉèÖÃÆäElasticsearch¼¯Èººó£¬£¬£¬£¬£¬£¬Æû³µ¾ÞÍ·±¾Ìïй¶ÁËԼĪ2.6Íò±±ÃÀ³µÖ÷µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£Êý¾Ý¿âÖеļͼ°üÀ¨¿Í»§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢Óʼĵص㡢³µÁ¾Ðͺš¢VIN¡¢Ð­ÒéIDÒÔ¼°ÖÖÖÖ±¾Ìï³µÁ¾µÄЧÀÍÐÅÏ¢µÈ¡£¡£¡£±¾ÌïÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬ÓÐÎÊÌâµÄÊý¾Ý¿âÊÇÓÃÓÚ´¦Öóͷ£Ð¿ͻ§×¢²áºÍÄÚ²¿ÈÕÖ¾µÄ±±ÃÀÔ¶³ÌÐÅÏ¢´¦Öóͷ£Ð§À͵ÄÊý¾Ý¼Í¼ºÍ¼à¿ØÐ§ÀÍÆ÷¡£¡£¡£ÊÂÎñÖÐûÓÐÓ°Ïì¿Í»§µÄ²ÆÎñÐÅÏ¢¡¢ÐÅÓÿ¨Êý¾Ý»òƾ֤¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/honda-exposes-26-000-records-of-north-american-customers/


4.Gangnam Industrial StyleÃé×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


CyberXÍþвÑо¿Ð¡×éSection 52Åû¶Ö÷ÒªÕë¶Ô¹¤Òµ¡¢¹¤³ÌºÍÖÆÔìÆóÒµµÄAPT¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÍŻﱻ³ÆÎªGangnam Industrial Style£¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓÐÖÁÉÙ200¼Ò¹«Ë¾³ÉΪÊܺ¦Õß¡£¡£¡£Ö»¹Ü´ó´ó¶¼Êܺ¦ÕßλÓÚº«¹ú£¬£¬£¬£¬£¬£¬µ«°üÀ¨ÈÕ±¾¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢¶ò¹Ï¶à¶ûºÍÓ¢¹úÔÚÄÚµÄÐí¶à¹ú¼ÒµÄ¹«Ë¾¶¼Êܵ½Ó°Ïì¡£¡£¡£¹¥»÷ÕßÖ÷Ҫͨ¹ý´¹ÂÚÓʼþÌᳫ¹¥»÷£¬£¬£¬£¬£¬£¬ÕâЩÓʼþµÄÖ÷Ìâ/¸½¼þÓ빤ҵÓйØ£¬£¬£¬£¬£¬£¬°üÀ¨°×ƤÊé¡¢µç³§Ê¾ÒâͼÒÔ¼°¶ÔÉè¼ÆÉèÊ©£¨Èç×ÔÈ»Æø´¦Öóͷ£ºÍÉú²ú×°Ö㩵ı¨¼ÛÇëÇóµÈ¡£¡£¡£¹¥»÷ÕßʹÓõĶñÒâÈí¼þÖ÷ҪΪSeparµÄ±äÖÖ£¬£¬£¬£¬£¬£¬Separ¿ÉÇÔÈ¡Firefox¡¢ChromeºÍSafari´æ´¢µÄÃÜÂëÒÔ¼°´ÓGmail¡¢Yahoo¡¢Windows LiveºÍHotmailÖÐÇÔÈ¡ÓʼþÕË»§µÄƾ֤¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/south-korean-industrial-giants-slammed-in-new-info-stealing-hacker-campaign/


5.LazarusʹÓÃDacls RAT¿ªÕ¹Ð¹¥»÷»î¶¯


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±·¢Ã÷Ò»¸öÃûΪDaclsµÄжñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¿ÉÕë¶ÔWindowsºÍLinux×°±¸£¬£¬£¬£¬£¬£¬²¢ÇÒÓëAPT×éÖ¯Lazarus GroupÓйØ¡£¡£¡£ÕâÊÇLazarusÊ×´ÎÕë¶ÔLinuxƽ̨£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖÏÖÔÚÒµ½ç´Óδ¹ûÕæ¹ýLazarus GroupÕë¶ÔLinuxƽ̨µÄ¹¥»÷Ñù±¾ºÍ°¸Àý¡£¡£¡£DaclsÊÇÄ£¿£¿£¿£¿£¿é»¯µÄ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Ê¹ÓÃTLSºÍRC4Ë«²ã¼ÓÃÜÀ´±£»£»£»£»£»£»£»¤ÆäÏÂÁîºÍ¿ØÖÆ£¨C2£©Í¨Ñ¶Í¨µÀ£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃAES¼ÓÃÜÆäÉèÖÃÎļþ£¬£¬£¬£¬£¬£¬²¢ÇÒ»¹¾ßÓÐC2Ö¸Á̬¸üй¦Ð§¡£¡£¡£¸ÃRAT»¹¾ßÓз´ÏòP2P²å¼þ£¬£¬£¬£¬£¬£¬ÓÃÓڳ䵱C2ÅþÁ¬µÄÊðÀíÒÔ×èÖ¹Ö±½ÓÅþÁ¬µ½Æä»ù´¡ÉèÊ©¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-linux-windows-with-new-dacls-malware/


6.MacÍþв¼ì²âÊýÄ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤MalwarebytesµÄ×îб¨¸æ£¬£¬£¬£¬£¬£¬MacÍþв¼ì²âÊýÄ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ¡£¡£¡£Ö»¹Ü¹Å°å¿´·¨ÒÔΪMacÊܵ½µÄѬȾҪ±ÈWindows PCÉٵö࣬£¬£¬£¬£¬£¬µ«2019ÄêMalwarebytesµÄÒ£²âÊý¾ÝÅú×¢MacÍþв¼ì²âÊýÄ¿·ºÆðÁ˾ªÈ˵ÄÉÏÉýÇ÷ÊÆ¡£¡£¡£ÔÚËùÓÐÆ½Ì¨£¨Windows PC¡¢MacºÍAndroid£©ÉϵÄÍþв¼ì²âÅÅÐаñ£¨Top25£©ÖУ¬£¬£¬£¬£¬£¬ÓÐ6¸öÊÇMacÍþв£¬£¬£¬£¬£¬£¬×ÜÌå¶øÑÔ£¬£¬£¬£¬£¬£¬MacÍþвռ×ܼìÕÉÁ¿µÄ16£¥ÒÔÉÏ¡£¡£¡£¿£¿£¿£¿£Ë¼Á¿µ½MalwarebytesµÄMacÓû§ÈºÔ¼ÄªÊÇWindowsÓû§ÈºµÄ1/12£¬£¬£¬£¬£¬£¬ÕâÒ»Êý×ÖÔ½·¢ÏÔ×Å¡£¡£¡£ÔÚ2019Äêµ¥¸öÅÌËã»úÉϵÄÍþв¼ì²âÊýÄ¿ÖУ¬£¬£¬£¬£¬£¬Windows PCΪƽ¾ù4.2´Î£¬£¬£¬£¬£¬£¬¶øMacÓû§ÎªÆ½¾ù9.8´Î£¬£¬£¬£¬£¬£¬ÊÇWindowsÓû§µÄÁ½±¶¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/mac/2019/12/mac-threat-detections-on-the-rise-in-2019/