ÒÁÀʺڿÍʹÓÃVPNÈí¼þÎó²î¹¥»÷È«ÇòµÄÆóÒµºÍÕþ¸®»ú¹¹£»£»£»£»£»£»¼ÓÄô󲿷ÖÕþ¸®²¿·ÖÒÑÍùÁ½Ä걬·¢Êý¾Ýй¶ÊÂÎñ7992Æð

Ðû²¼Ê±¼ä 2020-02-18

1.ÒÁÀʺڿÍʹÓÃVPNÈí¼þÎó²î¹¥»÷È«ÇòµÄÆóÒµºÍÕþ¸®»ú¹¹


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤Çå¾²³§ÉÌClearSkyµÄÒ»·Ý±¨¸æ£¬ £¬£¬£¬£¬£¬£¬ÒÁÀʺڿÍÒ»Ö±ÔÚʹÓÃVPNÈí¼þÖеÄÎó²îÔÚÌìϸ÷µØµÄ¹«Ë¾ÖÐÖ²ÈëºóÃÅ£¬ £¬£¬£¬£¬£¬£¬ÆäÄ¿µÄº­¸ÇIT¡¢µçÐÅ¡¢Ê¯ÓͺÍ×ÔÈ»Æø¡¢º½¿Õ¡¢Çå¾²ÁìÓòµÄ¹«Ë¾ºÍÕþ¸®»ú¹¹¡£¡£¡£¡£ÒÁÀʺڿÍÒѽ«Pulse Secure¡¢Fortinet¡¢Palo Alto NetworksºÍCitrixµÄVPN¶¨Î»ÎªÈëÇÖ´óÐ͹«Ë¾µÄ¹¤¾ß£¬ £¬£¬£¬£¬£¬£¬ÆäʹÓõÄÎó²î°üÀ¨Pulse Secure VPN(CVE-2019-11510)¡¢Fortinet FortiOS VPN(CVE-2018-13379)¡¢Palo Alto Networks VPN(CVE-2019-1579)ÒÔ¼°Citrix VPN(CVE-2019-19781)µÈ¡£¡£¡£¡£¶ÔÕâЩϵͳµÄ¹¥»÷ʼÓÚÈ¥ÄêÑ×Ì죬 £¬£¬£¬£¬£¬£¬µ«µ½2020ÄêÕâÖÖ¹¥»÷ÈÔÔÚ¼ÌÐø¡£¡£¡£¡£ClearSky±¨¸æÇ¿µ÷£¬ £¬£¬£¬£¬£¬£¬¶ÔÈ«ÇòVPNЧÀÍÆ÷µÄ¹¥»÷ËÆºõÊÇÖÁÉÙÈý¸öÒÁÀʺڿÍ×éÖ¯µÄÊÂÇ飬 £¬£¬£¬£¬£¬£¬°üÀ¨APT33¡¢APT34ºÍAPT39¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/iranian-hackers-have-been-hacking-vpn-servers-to-plant-backdoors-in-companies-around-the-world/


2.¼ÓÄô󲿷ÖÕþ¸®²¿·ÖÒÑÍùÁ½Ä걬·¢Êý¾Ýй¶ÊÂÎñ7992Æð


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤¼ÓÄôó¹ã²¥¹«Ë¾£¨CBC£©µÄ±¨µÀ£¬ £¬£¬£¬£¬£¬£¬¼ÓÄôóµÄһЩÕþ¸®²¿·ÖºÍ»ú¹¹ÔÚÒÑÍùÁ½ÄêÖÐÂÄÀúÁË7992ÆðÊý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬Î£º¦ÁË14.4Íò¹«ÃñµÄÒþ˽ÐÅÏ¢¡£¡£¡£¡£¼ÓÄôó˰Îñ¾Ö£¨CRA£©ÊDZ¬·¢Êý¾Ýй¶ÊÂÎñ×î¶àµÄ»ú¹¹£¬ £¬£¬£¬£¬£¬£¬Éæ¼°3020ÆðÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬²¨¼°5.9Íò¹«Ãñ¡£¡£¡£¡£CRA½«ÊÂÎñ±¬·¢µÄÔµ¹ÊÔ­Óɹé×ïΪ´¹ÂÚÓʼþ¡¢Çå¾²ÊÂÎñÒÔ¼°Ô±¹¤ÐÐΪ²»µ±¡£¡£¡£¡£Æä´ÎÊǼÓÄôóÎÀÉú²¿£¬ £¬£¬£¬£¬£¬£¬ËüÓë122ÆðÊÂÎñÓйØ£¬ £¬£¬£¬£¬£¬£¬Ó°ÏìÁË23894ÈË¡£¡£¡£¡£CBC×Ô¼ºÅÅÃûµÚÈý£¬ £¬£¬£¬£¬£¬£¬¹²ÓÐ17ÆðÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬Ó°ÏìÁË20129ÃûÔ±¹¤¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/report-shows-personal-info-on-144k-canadians-breached-by-federal-entities/


3.°ÂµØÀûÍâ½»²¿Ðû³ÆÕë¶ÔÆäϵͳµÄÍøÂç¹¥»÷ÒÑ¿¢ÊÂ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


°ÂµØÀûÍâ½»²¿Ðû²¼£¬ £¬£¬£¬£¬£¬£¬¾Ý³ÆÓɹú¼ÒÐÐΪÕßÌᳫµÄÕë¶ÔÆäϵͳµÄÍøÂç¹¥»÷ÒѾ­¿¢Ê¡£¡£¡£¡£Ò»Ô³õ°ÂµØÀûÍâ½»²¿Ðû²¼Ôâµ½¡°ÑÏÖØµÄÍøÂç¹¥»÷¡±£¬ £¬£¬£¬£¬£¬£¬²¢Çҳơ°ÓÉÓÚ¹¥»÷µÄÑÏÖØÐÔºÍÐÔ×Ó£¬ £¬£¬£¬£¬£¬£¬²»¿Éɨ³ýÕâÊǹú¼ÒÐÐΪÕßµÄÕë¶ÔÐÔ¹¥»÷¡£¡£¡£¡£Ö»¹Ü½ÓÄÉÁËËùÓÐÑÏ¿áµÄÇå¾²²½·¥£¬ £¬£¬£¬£¬£¬£¬µ«ÈÔûÓÐ100£¥µÄ·À»¤²½·¥À´Ìá·ÀÍøÂç¹¥»÷¡£¡£¡£¡£¡±¹¥»÷±¬·¢ÔÚ1ÔÂ4ÈÕÐÇÆÚÁùÍíÉÏ£¬ £¬£¬£¬£¬£¬£¬²¢Ñ¸ËÙ±»·¢Ã÷¡£¡£¡£¡£ÍâµØ±¨µÀÏÔʾ¹¥»÷Õë¶ÔµÄÊǸò¿·ÖµÄIT»ù´¡¼Ü¹¹¡£¡£¡£¡£°ÂµØÀûÍâ½»²¿ÉÏÖÜÐû²¼£¬ £¬£¬£¬£¬£¬£¬¶ÔÆäϵͳµÄÍøÂç¹¥»÷ÒѾ­¿¢Ê¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/97879/intelligence/austrias-foreign-ministry-attack.html


4.Ó¢¸ñÀ¼µØ·½Õþ¸®Redcar CouncilÒÉÔâÀÕË÷Èí¼þ¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ó¢¸ñÀ¼¶«±±²¿µÄµÂ¿¨ºÍ¿ËÀû·òÀ¼×ÔÖÎÊÐÕò£¨Redcar£¦Cleveland Borough Council£©ÒÉÔâÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬£¬Ê¹µÃ13.5ÍòÍâµØ×¡ÃñÔÚÒ»ÖܶàµÄʱ¼äÄÚÎÞ·¨Ê¹ÓÃÔÚÏß¹«¹²Ð§ÀÍ£¬ £¬£¬£¬£¬£¬£¬°üÀ¨ÍøÉÏÔ¤Ô¼¡¢Éç»á¾ìעϵͳ¡¢×¡·¿Í¶Ëߵȣ¬ £¬£¬£¬£¬£¬£¬µ«Ë°¿îÖ§¸¶ÏµÍ³Î´ÊÜÓ°Ïì¡£¡£¡£¡£Ö»¹Ü¸ÃÕò¾Ü¾øÈ·ÈϺڿ͹¥»÷µÄÐÔ×Ó£¬ £¬£¬£¬£¬£¬£¬µ«´Ë´Î¹¥»÷¾ßÓÐÀÕË÷Èí¼þ¹¥»÷µÄËùÓÐÌØÕ÷¡£¡£¡£¡£NCSCµÄר¼ÒÕýÔÚÏòÆäÌṩ֧³Ö¡£¡£¡£¡£¸ÃÕò»¹³ÆÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢ÓÐÈκÎÊý¾Ýɥʧ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cyber-attack-takes-down-redcar/


5.Ó¢¹ú·´Ð˷ܼÁ»ú¹¹ÔÚ2019ÄêQ4ÊÕµ½Áè¼Ý1.1Íò·âÀ¬»øÓʼþ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤×îеÄÐÅÏ¢×ÔÓÉ£¨FOI£©Êý¾Ý£¬ £¬£¬£¬£¬£¬£¬Ó¢¹úµÄ·´Ð˷ܼÁ»ú¹¹£¨UKAD£©ÔÚ2019ÄêµÄ×îºóÈý¸öÔÂÖÐÊÕµ½1.1Íò·âÀ¬»øÓʼþ£¬ £¬£¬£¬£¬£¬£¬ÆäÖÐÁè¼ÝÎå·ÖÖ®Ò»£¨21£¥£©µÄÓʼþΪ´¹ÂÚÓʼþ£¬ £¬£¬£¬£¬£¬£¬¶ø°üÀ¨¶ñÒâÈí¼þµÄÓʼþÊýÄ¿Ôò´Ó10ÔµÄ4¸öÔöÌíµ½12ÔµÄ41¸ö£¬ £¬£¬£¬£¬£¬£¬Õû¸ö¼¾¶È×ܼÆ52¸ö¡£¡£¡£¡£ÐÒÔ˵ÄÊÇ£¬ £¬£¬£¬£¬£¬£¬UKADÒÔΪËùÓй¥»÷ʵÑ鶼ûÓÐÀֳɣ¬ £¬£¬£¬£¬£¬£¬µ«Ëü¿Ï¶¨»á³ÉΪ¹ú¼Ò×ÊÖúµÄ¹¥»÷ÕßµÄÄ¿µÄ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/uk-antidoping-agency-11000


6.LokiBotľÂíαװ³ÉEpic GamesÓÎÏ·×°ÖóÌÐòÈö²¥


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨



Ç÷ÊÆ¿Æ¼¼¿ËÈÕ¼ì²âµ½LokiBotľÂíµÄÒ»¸öбäÌ壬 £¬£¬£¬£¬£¬£¬¸Ã±äÌåαװ³ÉEpic GamesÊÐËÁµÄÓÎÏ·×°ÖóÌÐòÀ´Èö²¥¡£¡£¡£¡£¸ÃαÔìµÄ×°ÖóÌÐòÊÇʹÓÃNSIS£¨Nullsoft¾ç±¾×°ÖÃϵͳ£©¹¤¾ß¹¹½¨µÄ£¬ £¬£¬£¬£¬£¬£¬ÆäʹÓÃÁËEpic GamesµÄlogoÀ´ÓÕÆ­Óû§ÔËÐС£¡£¡£¡£Ö´Ðкó£¬ £¬£¬£¬£¬£¬£¬¸Ã³ÌÐò»áÔÚÊÜÓ°ÏìÅÌËã»úµÄ¡°£¥AppData£¥Ä¿Â¼¡±ÖÐÊÍ·ÅÁ½¸öÎļþ£ºC#Ô´´úÂëÎļþºÍ.NET¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£È»ºó£¬ £¬£¬£¬£¬£¬£¬.NET¿ÉÖ´ÐÐÎļþ½«¶ÁÈ¡²¢±àÒëC#´úÂëÎļþ£¬ £¬£¬£¬£¬£¬£¬Å²ÓÃÆäÖеĺ¯Êý¼ÓÔØÇ¶ÈëÆäÖеļÓÃÜ»ã±à´úÂ룬 £¬£¬£¬£¬£¬£¬×îÖÕÖ´ÐÐLokiBot¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/lokibot-impersonates-popular-game-launcher-and-drops-compiled-c-code-file/