µÂÍâÑóÂôƽ̨Lieferando.deÔâDDoS¹¥»÷£»£»£»£»£»£»£»¼ÓÄôóISPÂÞ½Ü˹ͨѶ¹«Ë¾Ð¹Â¶¿Í»§ÐÅÏ¢

Ðû²¼Ê±¼ä 2020-03-20

1.Cyentia 2020ÄêÐÅϢΣº¦¶´²ì±¨¸æ£¬£¬£¬£¬£¬ÆóÒµÍøÂçά»¤±¾Ç®ÉÏÉý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨



ƾ֤CyentiaÑо¿ËùµÄ×îÐÂÑо¿±¨¸æ£¬£¬£¬£¬£¬Ô¤¼ÆÔÚ12¸öÔµÄʱ¼äÄÚÓÐËÄ·ÖÖ®Ò»µÄ²Æ²ú1000Ç¿ÆóÒµ½«ÔâÊÜÍøÂçÊÂÎñÔì³ÉµÄËðʧ£¬£¬£¬£¬£¬²¢ÇҲƲú1000Ç¿ÆóÒµÒòÍøÂçÊÂÎñËðʧ1ÒÚÃÀÔªÒÔÉϵļ¸ÂÊΪ6%¡£¡£¡£¡£¡£¡£¡£¸ÃÑо¿ËùµÄ2020Äê¡¶ÐÅϢΣº¦¶´²ìÑо¿±¨¸æ¡·³Æ£¬£¬£¬£¬£¬ÔÚÍøÂçÇå¾²ÊÂÎñÔì³ÉµÄËðʧÖУ¬£¬£¬£¬£¬10%µÄÊÂÎñ½«Áè¼Ý2000ÍòÃÀÔª£¬£¬£¬£¬£¬ÆäÖÐÐÅϢЧÀͺÍÁãÊÛÐÐÒµÊÜÓ°Ïì×î´ó£¬£¬£¬£¬£¬¶þÕßµÄËðʧҪ±ÈÆäËüÐÐÒµ¸ß10¸öµã¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ¸ú×ÙÁËÒÑÍùÊ®ÄêµÄÊÂÎñ±¨¸æ£¬£¬£¬£¬£¬³Æ´óÐÍÆóÒµ¸ü¿ÉÄÜ·¢Ë®¹ûÕæ±¨¸æµÄÊÂÎñ£¬£¬£¬£¬£¬²Æ²ú1000Ç¿ÆóÒµÊǸü´óµÄÄ¿µÄ£¬£¬£¬£¬£¬Ò²¾ßÓиü´óµÄÄ¿µÄÁìÓò£¬£¬£¬£¬£¬ËûÃǵÄÊÂÎñ¸ü¿ÉÄܳÉΪͷÌõÐÂÎÅ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cyber-event-costs-worse/


2.·¸·¨ÍÅ»ïMoleRATsʹÓÃαÔìµÄÐÂÎÅÍøÕ¾Á÷Á¿Òþ²ØÆäC2ͨѶ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±·¢Ã÷·¸·¨ÍÅ»ïMoleRATsÔÚ×î½üµÄ´¹ÂÚ¹¥»÷»î¶¯Öзַ¢Spark£¨EnigmaSpark£©ºóÃÅ£¬£¬£¬£¬£¬²¢ÇÒʹÓÃαÔìµÄÐÂÎÅÍøÕ¾Á÷Á¿À´Èƹý¼ì²â¡£¡£¡£¡£¡£¡£¡£ÓÐÖ¤¾ÝÅú×¢¸Ã×éÖ¯×Ô2017Äê3ÔÂÒÔÀ´Ò»Ö±Ê¹ÓÃÒÔºóÃÅ£¬£¬£¬£¬£¬²¢ÇÒ°²ÅÅÁËÊýÊ®ÖÖ±äÌ壬£¬£¬£¬£¬ÕâЩ±äÌåÖÁÉÙÓë15¸öC&CÓòͨѶ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Æä¹¥»÷Ä¿µÄºÍÓÕ¶üÎļþ£¬£¬£¬£¬£¬¸Ã¹¥»÷»î¶¯¿´ÆðÀ´ÏñÊdzöÓÚÕþÖÎÄîÍ·£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°ÍÀÕ˹̹¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚHTTP? POSTÇëÇóÖÐʹÓÃαÔìµÄÖ÷»ú±êÍ·£¬£¬£¬£¬£¬¸ÃÇëÇó½«Ä¿µÄµÄϵͳÐÅϢת´ïµ½C2ЧÀÍÆ÷£¨nysura].[com£©£¬£¬£¬£¬£¬µ«±êÍ·È´ÏÔʾĿµÄµØµãΪcnet].[com¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-hide-malware-c2-communication-by-faking-news-site-traffic/


3.½©Ê¬ÍøÂçStantinkoÍÚ¿óÄ£¿£¿£¿éÒýÈë¶àÖÖеĻìÏýÊÖÒÕ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ESETÑо¿Ö°Ô±·¢Ã÷½©Ê¬ÍøÂçStantinko·Ö·¢µÄÐÂÍÚ¿óÄ£¿£¿£¿éÒýÈë¶àÖÖ»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬ÆäÖÐһЩÉÐδ±»¹ûÕæÐÎò¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁËÕâЩÊÖÒÕ£¬£¬£¬£¬£¬²¢ÐÎòÁËÕë¶ÔijЩÊÖÒյĿÉÄܶԲß¡£¡£¡£¡£¡£¡£¡£StantinkoÒýÈëµÄ»ìÏýÊÖÒÕ°üÀ¨£º×Ö·û´®»ìÏý-½á¹¹ÓÐÒâÒåµÄ×Ö·û´®£¬£¬£¬£¬£¬²¢ÇÒ½öÔÚʹÓÃËüÃÇʱ·ºÆðÔÚÄÚ´æÖУ»£»£»£»£»£»£»¿ØÖÆÁ÷»ìÏý¨C½«¿ØÖÆÁ÷ת»»ÎªÄÑÒÔÔĶÁµÄÐÎʽ£¬£¬£¬£¬£¬²¢ÇÒÈôÊDz»¾ÙÐдó×ÚÆÊÎö£¬£¬£¬£¬£¬ÔòÎÞ·¨Õ¹Íû»ù±¾¿éµÄÖ´ÐÐ˳Ðò£»£»£»£»£»£»£»ËÀ´úÂë¨CÌí¼Ó´ÓδִÐеĴúÂ룬£¬£¬£¬£¬ÒÔ¼°»¹°üÀ¨´ÓδŲÓõĵ¼³ö±í£¬£¬£¬£¬£¬ÆäÄ¿µÄÊÇʹÎļþ¿´ÆðÀ´¸üÕýµ±ÒÔ±ÜÃâ¼ì²â£»£»£»£»£»£»£»ÎÞЧ´úÂë¨CÒÑÖ´ÐеĴúÂëµÄÌí¼Ó£¬£¬£¬£¬£¬µ«¶ÔÕûÌ幦ЧûÓÐʵÖÊÓ°Ï죬£¬£¬£¬£¬ÆäÄ¿µÄÖ¼ÔÚÈÆ¹ýÐÐΪ¼ì²â£»£»£»£»£»£»£»´Ë×Ö·û´®ºÍ×ÊÔ´¨CÌí¼Ó×ÊÔ´ºÍ×Ö·û´®¶ø²»Ó°Ï칦Ч¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/03/19/stantinko-new-cryptominer-unique-obfuscation-techniques/


4.NISTºÍDHSÐû²¼ÓйØÍøÂç¾Û»á¼°VPNµÄ±£»£»£»£»£»£»£»¤Ö¸ÄÏ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÓÉÓÚ¹Ú×´²¡¶¾µÄÊ¢ÐУ¬£¬£¬£¬£¬ÈËÃDZ»ÆÈÔڼҰ칫£¬£¬£¬£¬£¬ÃÀ¹úNISTºÍDHSÐû²¼ÁËһϵÁÐÓйØÔõÑù±£»£»£»£»£»£»£»¤ÍøÂç¾Û»áºÍÆóÒµVPNÅþÁ¬µÄÇå¾²Ö¸ÄÏ¡£¡£¡£¡£¡£¡£¡£´ó´ó¶¼ÍøÂç¾Û»áЧÀ;ßÓÐÄÚÖõÄÇå¾²ÐÔ¹¦Ð§£¬£¬£¬£¬£¬µ«×ñÕÕÆóÒµµÄÍøÂç¾Û»áÇå¾²ÐÔÕ½ÂÔÓ¦¸ÃÈ·±£¸üÇ¿Á¦µÄ±£»£»£»£»£»£»£»¤£¬£¬£¬£¬£¬ÆóÒµÓ¦¸Ã˼Á¿ÏÞÖÆ»á¼û´úÂëµÄÖØ¸´Ê¹Ó㬣¬£¬£¬£¬Ê¹ÓÃÒ»´ÎÐÔPINÂë»ò¾Û»á±êʶ·û´úÂëÒÔ¼°½ÓÄɶàÒòËØÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬»¹Ó¦¸ÃÔÚÓë»áÕß¼ÓÈëʱÆôÓÃ֪ͨ£¬£¬£¬£¬£¬Ê¹ÓÃÒDZí°å¼àÊÓÓë»áÕߣ¬£¬£¬£¬£¬½öÔÚÐëҪʱ¼Í¼¾Û»á£¬£¬£¬£¬£¬½ûÓò»ÐèÒªµÄ¹¦Ð§£¬£¬£¬£¬£¬ÀýÈç̸Ìì»òÎļþ¹²ÏíµÈ¡£¡£¡£¡£¡£¡£¡£ÆóÒµVPNÃæÁÙµÄΣº¦°üÀ¨Õë¶ÔµÇ¼ƾ֤µÄ´¹ÂÚ¹¥»÷¡¢È±ÉÙ¶àÒòËØÉí·ÝÑéÖ¤ºÍȱ·¦×ã¹»µÄVPNÅþÁ¬À´È·±£ËùÓÐÔ±¹¤¶¼¿ÉÒÔÔ¶³Ì°ì¹«µÈ£¬£¬£¬£¬£¬½¨ÒéÆóҵʼÖÕ¸üÐÂÆäVPN£¬£¬£¬£¬£¬²¢È·±£ÍøÂç»ù´¡½á¹¹ºÍÓÃÓÚÔ¶³ÌÅþÁ¬µ½ÊÂÇéÇéÐεÄ×°±¸¾ßÓÐ×îеÄÈí¼þ²¹¶¡ºÍÇå¾²ÉèÖᣡ£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/nist-dhs-publish-guidance-securing-virtual-meetings-vpns


5.µÂÍâÑóÂôƽ̨Lieferando.deÔâDDoS¹¥»÷µ¼ÖÂЧÀÍ̱»¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


µÂÍâÑóÂôƽ̨Lieferando.deÔâDDoS¹¥»÷µ¼ÖÂЧÀÍ̱»¾¡£¡£¡£¡£¡£¡£¡£¸Ãƽ̨¹ØÁªÁË1.5Íò¶à¼ÒµÂ¹ú²Í¹Ý£¬£¬£¬£¬£¬ÓÉÓÚCOVID-19ʱ´úµÂ¹ú¶Ô²ÍÌü¾ÙÐÐÁËÑÏ¿áµÄÏÞÖÆ£¬£¬£¬£¬£¬ÀýÈçÏÞÖÆ¿ÍÈ˵ÄÈËÊý¡¢Ôö´ó×À×ÓÖ®¼äµÄ¾àÀë¡¢ÔÚÏÂÖç6µãÖÁÔçÉÏ6µãÖ®¼ä±ØÐè¹ØÃŵȣ¬£¬£¬£¬£¬Òò´ËÕâ´ÎDDoS¹¥»÷Ó°ÏìÁË´ó×ÚÑ¡ÔñʹÓÃÍâÂô¶©²ÍµÄÓû§¡£¡£¡£¡£¡£¡£¡£Ò»Ð©¿Í»§Ëß¿à³ÆÖ»¹Ü¸Ãƽ̨µÄϵͳÒò¹¥»÷¶øÌ±»¾£¬£¬£¬£¬£¬µ«¸ÃЧÀÍÈÔ½ÓÊÜж©µ¥£¬£¬£¬£¬£¬Ö»ÊÇûÓÐ¶ÔÆä¾ÙÐд¦Öóͷ£¡£¡£¡£¡£¡£¡£¡£¸Ãƽ̨³Æ½«ÍË»¹ÒÑÖ§¸¶ÇÒδ½»¸¶µÄ¶©µ¥£¬£¬£¬£¬£¬µ«¿Í»§±ØÐèͨ¹ýµç×ÓÓʼþÓëËûÃÇÁªÏµ¡£¡£¡£¡£¡£¡£¡£¾Ý³Æ¹¥»÷ÕßÒªÇó2±ÈÌØ±Ò£¨Ô¼ºÏ1.1ÍòÃÀÔª£©µÄÊê½ðÀ´×èÖ¹¹¥»÷¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/food-delivery-service-in-germany-under-ddos-attack/


6.¼ÓÄôóISPÂÞ½Ü˹ͨѶ¹«Ë¾Ð¹Â¶¿Í»§Òþ˽ÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¼ÓÄôóISPÂÞ½Ü˹ͨѶ¹«Ë¾Í¨Öª¿Í»§³ÆÓÉÓÚÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬µ¼Ö¿ͻ§µÄСÎÒ˽¼ÒÐÅÏ¢ÔÚÍøÉÏ̻¶¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖËüÔÚ2ÔÂ26ÈÕµÃÖª°üÀ¨¿Í»§ÐÅÏ¢µÄ¹©Ó¦ÉÌÊý¾Ý¿âÔÚÍøÉÏ̻¶£¬£¬£¬£¬£¬µ¼Ö¿ͻ§µÄµØµã¡¢Õ˺š¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëµÈÐÅϢй¶£¬£¬£¬£¬£¬µ«Êý¾Ý¿âÖв»°üÀ¨ÐÅÓÿ¨¡¢ÒøÐÐÕË»§»òÃÜÂëÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÏêϸÊÜÓ°ÏìµÄ¿Í»§ÊýÄ¿Éв»ÇåÎú£¬£¬£¬£¬£¬µ«ÂÞ½Ü˹½«ÎªÊÜÓ°ÏìµÄ¿Í»§ÌṩÃâ·ÑµÄTransunionÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/rogers-data-breach-exposed-customer-info-in-unsecured-database/