2019ÄêϰëÄêÍþвÇ鱨±¨¸æ£»£» £»2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ£»£» £»Ã׸ß÷ÂùÝ1070Íò¿Í»§ÐÅϢй¶

Ðû²¼Ê±¼ä 2020-02-20

1.NETSCOUTÐû²¼2019ÄêϰëÄêÍþвÇ鱨±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


NetscoutÐû²¼ÁËÆä2019ÄêϰëÄêÍþвÇ鱨±¨¸æ£¬£¬£¬£¬£¬ £¬£¬±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£º¹¥»÷ÕßʹÓÃÁË7ÖÖеÄUDP·´Éä/·Å´ó¹¥»÷£¬£¬£¬£¬£¬ £¬£¬²¢Á¬ÏµÒÑÖªµÄ¹¥»÷ÏòÁ¿ÌᳫÕë¶ÔÐÔDDoS¹¥»÷£»£» £»Õë¶Ô±ÊÖ±ÐÐÒµµÄ´ó¹æÄ£¹¥»÷±ä¶à£¬£¬£¬£¬£¬ £¬£¬ÀýÈçÕë¶ÔÎÀÐǵçÐŵĹ¥»÷ÔöÌíÁË295%£»£» £»¹¥»÷ÕßʹÓÃÏȽøµÄÕì̽ÊÖÒÕ½«Ä¿µÄËø¶¨ÔÚÊÜÓÅÒì±£»£» £»¤µÄÄ¿µÄ£¨ÈçISPºÍ½ðÈÚ»ú¹¹£©ÉÏ£¬£¬£¬£¬£¬ £¬£¬ÒÔ·Å´óÕë¶ÔÌØ¶¨ÆóÒµºÍÍøÂçÔËÓªÉ̵Ĺ¥»÷£»£» £»´Ó2018 H2µ½2019 H2£¬£¬£¬£¬£¬ £¬£¬Õë¶ÔÎÞÏßͨѶ¹«Ë¾µÄDDoS¹¥»÷ƵÂÊÔöÌíÁË64£¥£»£» £»»ùÓÚMiraiµÄ±äÌåÔÚ2019ÄêϰëÄêÕ¼ÓÐÖ÷µ¼Ö°Î»£¨ÔöÌíÁË57£¥£©£¬£¬£¬£¬£¬ £¬£¬¿ÉÕë¶Ô17ÖÖϵͳ¼Ü¹¹£»£» £»WISRµÄЧÀÍÌṩÉÌÌåÏÖÕë¶Ô¹ûÕæÌ»Â¶µÄ»ù´¡ÉèÊ©µÄDDoS¹¥»÷ÔöÌíÁË52£¥£¬£¬£¬£¬£¬ £¬£¬¶øÉÏÒ»ÄêΪ38£¥¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.netscout.com/press-releases/netscouts-threat-intelligence-report-2H2019


2.CyberMDXÐû²¼2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤CyberMDXµÄ2020ÄêÒ½ÁƱ£½¡ÐÐÒµÇå¾²Ô¶¾°±¨¸æ£¬£¬£¬£¬£¬ £¬£¬µä·¶µÄÒ½ÔºÖÐËùÓÐWindows×°±¸ÖÐÓÐ22£¥ÈÔȻûÓÐ×°ÖÃBlueKeepÎó²îµÄÐÞ¸´²¹¶¡£¬£¬£¬£¬£¬ £¬£¬¶ø¹ØÓÚÔÚWindowsÉÏÔËÐеÄÁªÍøÒ½ÁÆ×°±¸¶øÑÔ£¬£¬£¬£¬£¬ £¬£¬ÕâÒ»Êý×ÖÉÏÉýµ½ÁË45£¥£¬£¬£¬£¬£¬ £¬£¬ÕâÒâζ×ÅÏÕЩһ°ëµÄÁªÍøÒ½ÁÆ×°±¸Ò×Êܹ¥»÷¡£¡£¡£¡£¡£¡£ÕâЩװ±¸¿ÉÄܰüÀ¨·ÅÉä×°±¸¡¢¼àÊÓÆ÷¡¢XÉäÏߺͳ¬Éù×°±¸ÒÔ¼°Âé×í»úµÈ¡£¡£¡£¡£¡£¡£ÈôÊÇ²î³ØÕâЩװ±¸¾ÙÐÐÐÞ²¹£¬£¬£¬£¬£¬ £¬£¬¹¥»÷Õß¿ÉÄÜ»áËÑË÷µ½Ò×ÊÜBlueKeep¹¥»÷µÄ»úе£¬£¬£¬£¬£¬ £¬£¬´Ó¶øÊ¹Ò½ÔºÍøÂçºÍ»¼Õß´¦ÓÚΣÏÕÖ®ÖС£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cybersecurity-warning-almost-half-of-connected-medical-devices-are-vulnerable-to-hackers-exploiting-bluekeep/


3.ÒÁÀÊAPTÍøÂçÌØ¹¤»î¶¯Fox KittenµÄÆÊÎö±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿ÍÕýÔÚʹÓÃÓÉThemeREX¿ª·¢µÄWordPress²å¼þÖеÄ0dayÀ´ÈëÇÖWordPressÍøÕ¾¡£¡£¡£¡£¡£¡£Çå¾²³§ÉÌWordfenceÓÚ2ÔÂ18ÈÕ¼ì²âµ½ÁË´ËÀ๥»÷¡£¡£¡£¡£¡£¡£ThemeREX²å¼þԤװÁËËùÓÐThemeREXÉÌÒµÖ÷Ì⣬£¬£¬£¬£¬ £¬£¬²¢ÇÒ×ÊÖúÓû§ÉèÖÃÐÂÕ¾µãºÍ¿ØÖÆÖÖÖÖÖ÷Ì⹦Ч£¬£¬£¬£¬£¬ £¬£¬WordfenceÔ¤¼Æ¸Ã²å¼þÒÑ×°ÖÃÔÚÁè¼Ý4.4Íò¸öÕ¾µãÉÏ¡£¡£¡£¡£¡£¡£¸Ã²å¼þ¿Éͨ¹ýÉèÖÃWordPress REST-API¶ËµãÀ´ÊÂÇ飬£¬£¬£¬£¬ £¬£¬µ«²»»á¼ì²é·¢Ë͵½´ËREST APIµÄÏÂÁîÊÇ·ñÀ´×ÔÊÚȨÓû§£¬£¬£¬£¬£¬ £¬£¬ÕâÒâζ×ÅÈκηÿͶ¼¿ÉÒÔÖ´ÐÐÔ¶³Ì´úÂ룬£¬£¬£¬£¬ £¬£¬ÉõÖÁ½¨ÉèеÄÖÎÀíÓû§ºÍ½ÓÊÜÍøÕ¾¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖÈôÊÇÓû§ÔËÐеIJå¼þ°æ±¾¸ßÓÚ1.6.50£¬£¬£¬£¬£¬ £¬£¬ÄÇôǿÁÒ½¨ÒéÓû§ÔÝʱɾ³ýThemeREX²å¼þ£¬£¬£¬£¬£¬ £¬£¬Ö±µ½ÐÞ¸´²¹¶¡Ðû²¼ÎªÖ¹¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/iranian-apts-fox-kitten-global-spy-campaign/152974/


4.Çå¾²Ñо¿Ö°Ô±Åû¶΢Èí¶à¸ö×ÓÓòÃû±»Ð®ÖÆÎÊÌâ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


NIC.gpÇå¾²Ñо¿Ô±Michel GaschetÖ¸³ö΢Èí±£´æ¶à¸ö×ÓÓòÃûÐ®ÖÆÎÊÌ⣬£¬£¬£¬£¬ £¬£¬ÕâЩ×ÓÓòÃû¿ÉÄܱ»Ð®ÖƺÍÓÃÓÚ¹¥»÷Óû§¡¢Ô±¹¤»òÏÔʾÀ¬»øÄÚÈÝ¡£¡£¡£¡£¡£¡£ÔÚÒÑÍùÈýÄêÖУ¬£¬£¬£¬£¬ £¬£¬GaschetÒ»Ö±ÔÚÏò΢Èí±¨¸æ´øÓйýʧÉèÖõÄDNS¼Í¼µÄ×ÓÓòÃû£¬£¬£¬£¬£¬ £¬£¬ÀýÈç2017ÄêËû±¨¸æÁË21¸öÒ×±»Ð®ÖƵÄmsn.com×ÓÓòÃû£¬£¬£¬£¬£¬ £¬£¬2019ÄêËûÓÖ±¨¸æÁË142¸öÉèÖùýʧµÄmicrosoft.com×ÓÓòÃû£¬£¬£¬£¬£¬ £¬£¬µ«Î¢Èí½öÐÞ¸´ÁËÆäÖÐ5£¥µ½10£¥µÄ×ÓÓòÃû¡£¡£¡£¡£¡£¡£Gaschet»¹Ö¸³öËûÖÁÉÙÔÚ4¸öÕýµ±µÄ΢Èí×ÓÓòÖз¢Ã÷ÁËÓ¡¶ÈÄáÎ÷ÑÇÆË¿Ë¶Ä³¡µÄ¹ã¸æ£¬£¬£¬£¬£¬ £¬£¬°üÀ¨portal.ds.microsoft.com¡¢perfect10.microsoft.com¡¢ies.global.microsoft.comºÍblog-ambassadors.microsoft.com¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-has-a-subdomain-hijacking-problem/


5.ºÚ¿ÍʹÓÃThemeREX²å¼þ0day¹¥»÷WordPressÍøÕ¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±ÌåÏÖÒÁÀÊAPT34/OilRigºÍAPT33/Elfin¿ÉÄÜÕýÔÚ¿ªÕ¹Ò»ÏîΪÆÚÈýÄêµÄ´ó¹æÄ£ÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬£¬ £¬£¬¸Ã»î¶¯±»³ÆÎªFox Kitten¡£¡£¡£¡£¡£¡£¹¥»÷Õß½¨ÉèÁ˸߶ÈÉú³¤ÇÒ³¤ÆÚµÄ»ù´¡¼Ü¹¹£¬£¬£¬£¬£¬ £¬£¬ÓÃÓÚ»á¼û¹«Ë¾ÍøÂçºÍʵÑéÕì̽ÓëÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö¹¥»÷ÕßÒ²¿ÉÒÔʹÓÃÕâЩ»ù´¡ÉèÊ©°²ÅÅÆÆËðÐԵĶñÒâÈí¼þ£¬£¬£¬£¬£¬ £¬£¬ÀýÈçÓëAPT¹ØÁªµÄÊý¾Ý²Á³ýÆ÷ZeroCleareºÍDustman¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓõijõʼѬȾǰÑÔ°üÀ¨Palo Alto NetworksÔÚ²î±ðVPNЧÀÍ£¨ÀýÈçPulse Secure VPN¡¢Fortinet VPNºÍGlobal Protect£©ÖÐÅû¶µÄÎó²î£¬£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßʹÓõ͍Öƹ¤¾ß»¹°üÀ¨POWSSHNETºóÃÅ¡¢Êý¾Ý¿âºÍ¿ª·Å¶Ë¿ÚÓ³É乤¾ßSTSRCheck¡¢´ÓC2ЧÀÍÆ÷ÏÂÔØÎļþµÄVBScript¾ç±¾µÈ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-exploit-zero-day-in-wordpress-plugin-to-create-rogue-admin-accounts/


6.Ã׸ß÷ÂùÝ1070Íò¿Í»§ÐÅϢй¶£¬£¬£¬£¬£¬ £¬£¬ÒÑÔÚÂÛ̳Ðû²¼


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ã׸ß÷ÂùÝÈÏ¿ÉÔ¼1070ÍòסËÞ¿Í»§µÄÐÅÏ¢±»ºÚ¿Í͵ȡ£¬£¬£¬£¬£¬ £¬£¬ÕâЩÊý¾ÝÒÑÔÚ±¾Öܱ»ÉÏ´«ÖÁºÚ¿ÍÂÛ̳£¬£¬£¬£¬£¬ £¬£¬³ýÁËͨÀýµÄÓοÍÖ®Í⣬£¬£¬£¬£¬ £¬£¬ÊÜÓ°ÏìµÄ¿Í»§»¹º­¸ÇÃûÈË¡¢CEO¡¢¼ÇÕß¡¢Õþ¸®¹ÙÔ±ºÍ¿Æ¼¼¹«Ë¾µÄÔ±¹¤µÈ¡£¡£¡£¡£¡£¡£Éæ¼°µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãºÍÉúÈյȡ£¡£¡£¡£¡£¡£Æ¾Ö¤Ã׸ß÷µÄ˵·¨£¬£¬£¬£¬£¬ £¬£¬ÕâЩÐÅÏ¢ÊÇÔÚ2019ÄêÑ×Ìì¶ÔÆäÔÆÐ§ÀÍÆ÷µÄδÊÚȨ»á¼ûÖб»µÁµÄ£¬£¬£¬£¬£¬ £¬£¬±»µÁÐÅÏ¢²»Éæ¼°ÈκβÆÎñ¡¢ÒøÐп¨»òÃÜÂëÊý¾Ý¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºóÃ׸ß÷ÒѾ­Í¨ÖªÁËËùÓÐÊܲ¨¼°µÄÓû§¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/