¡¾·ÖÎö»ã±¨¡¿¿¨°Í˹»ù°ä²¼2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹Û»ã±¨
¿¨°Í˹»ù³¢ÊÔÊÒICS CERT°ä²¼¹ØÓÚ2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹ÛµÄ·ÖÎö»ã±¨¡£Óë2017ÄêϰëÄêÏà±È£¬2018ÄêÉϰëÄêÔâµ½¹¥»÷µÄICSÍÆËã»úµÄ±ÈÀýÔö³¤ÁË3.5¸ö°Ù·Öµã£¬´ïµ½ÁË41.2%¡£Í¬±ÈÔòÊÇÔö³¤ÁË4.6¸ö°Ù·Öµã¡£·ÇÖÞ¡¢ÑÇÖÞºÍÀ¶¡ÃÀÖÞµÄICSÍÆËã»úÔâµ½¹¥»÷µÄ±ÈÀýÔ¶µÍÓÚÅ·ÖÞ¡¢±±ÃÀºÍ°Ä´óÀûÑÇ¡£¶«Å·µÄÊý×ÖÒ²ºëÔ¶ÓÚÎ÷Å·µÄÊý×Ö¡£ÄÏÅ·Ôâµ½¹¥»÷µÄICSÍÆËã»úµÄ±ÈÀýÒª¸ßÓÚ±±Å·ºÍÎ÷Å·¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/threat-landscape-for-industrial-automation-systems-in-h1-2018/87913/
¡¾Íþвµý±¨¡¿F5·¢ÏÖÀûÓÃStruts 2·ì϶µÄ¶ñÒâÍÚ¿ó»î¶¯CroniX
F5 Labs×êÑÐÍŶӷ¢ÏÖÒ»¸öеĶñÒâÍÚ¿ó»î¶¯CroniX¡£¸Ã¹¥»÷»î¶¯ÖØÒªÕë¶ÔLinuxϵͳ£¬ÀûÓÃApache Struts 2·ì϶£¨CVE-2018-11776£©Ö´ÐÐÔ¶³Ì´úÂë¡£¹¥»÷µÄ×¢ÈëµãλÓÚURLÖС£ÆäʹÓöñÒâÈí¼þCronÒÔ»ñµÃÓÆ¾ÃÐÔ£¬²¢ÀûÓÃXhideÒÔÐéαµÄ¹ý³ÌÃû³ÆÆô¶¯¿ÉÖ´ÐÐÎļþ¡£CroniXµÄÖØÒªÖ÷ÕÅÊÇÍÚ¾òÃÅÂÞ±Ò£¬Ëü»¹»á²é³¹ý³ÌÃû³Æ²¢É±ËÀÕ¼ÓÃ60%ÒÔÉÏCPU×ÊÔ´µÄ¹ý³Ì£¬ÒÔ½â³ý¾ºÕùÕß¡£
ÔÎÄÁ´½Ó£ºhttps://www.f5.com/labs/articles/threat-intelligence/apache-struts-2-vulnerability--cve-2018-11776--exploited-in-cron
¡¾Íþвµý±¨¡¿½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂÆÚ¼ä·¢³öÁË78Íò·âÀ¬»øÓʼþ
IBM X-Force×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂÆÚ¼ä¹²·¢³öÁ˳¬¹ý78Íò·âÀ¬»øÓʼþ¡£ÕâЩÀ¬»øÓʼþ¶¼Ô̺¬¶ñÒâµÄIQYÎļþ£¬ÓÃÓÚ·Ö·¢¶ñÒâÈí¼þFlawedAmmyy RAT¡¢MarapºÍQuant Loader¡£×êÑÐÈËÔ±¹²¹Û²ìµ½5¸ö¹¥»÷º£³±£¬5ÔÂ25ÈÕNecurs·¢ËÍÁ˳¬¹ý30Íò·âÀ¬»øÓʼþ£¬6ÔÂ7ÈÕÓÖ·¢ËÍÁËÔ¼20Íò·â¡£ËæºóµÄ6ÔÂ13ÈÕ·¢ËÍÁ˳¬¹ý15Íò·â£¬7ÔÂ13ÈÕ²»µ½10Íò·âÒÔ¼°7ÔÂ17ÈÕµÄÉÙÓÚ5Íò·â¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/necurs-spews-780-000-emails-with-weaponized-iqy-files/
¡¾Êý¾Ýй¶¡¿°ÍÑó×°×°Á¬ËøµêC£¦AÔâºÚ¿ÍÈëÇÖ£¬Ô¼3.6ÍòÓû§µÄÐÅϢй¶
ÉÏÖܰÍÑó×°×°Á¬ËøµêC£¦AµÄÀñÎ│ÂòÂôϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬²¿ÃŲɰìÁËÀñÎ│µÄÓû§µÄÐÅϢй¶£¬Ô̺¬Óû§ID¡¢µç×ÓÓʼþµØÖ·¡¢¿¨Óà¶î¡¢¶©µ¥ºÅÒÔ¼°²É°ìÊý¾ÝµÈ¡£Æ¾¾Ý°ÍÎ÷ÍøÕ¾TecmundoµÄ±¨Â·£¬Ô¼3.6ÍòÓû§µÄÐÅϢй¶¡£Ä¿Ç°°ÍÎ÷Áª¹ú¹«¹²ÊÂÎñ²¿ÔÚ¾ÍÊý¾Ýй¶ÊÂÎñ·¢Õ¹µ÷²é¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75943/data-breach/ca-brazil-data-breach.html
¡¾·ì϶²¹¶¡¡¿Ê©ÄÍµÂµçÆø°ä²¼Modicon PLC°²È«¸üУ¬½¨¸´Ò»¸ö¿ÉÔì³ÉÑϳÁ·ÛËéµÄ·ì϶
Ê©ÄÍµÂµçÆø°ä²¼Modicon PLCµÄ°²È«¸üУ¬½¨¸´Ò»¸ö¿ÉÄܶÔICSÔì³ÉÑϳÁ·ÛËéµÄ°²È«·ì϶¡£¸Ã·ì϶£¨CVE-2018-7789£©ÓëÒì³£Çé¿öµÄ²»ÕýÈ·²é³Óйأ¬¹¥»÷Õß¿ÉÀûÓø÷ì϶Զ³Ì³ÁÆôModicon M221½ÚÔìÆ÷¡£Æ¾¾ÝÊ©ÄÍµÂµçÆøµÄ˵·¨£¬ÔËÐй̼þ°æ±¾1.6.2.0֮ǰµÄËùÓа汾µÄModicon M221½ÚÔìÆ÷¶¼Êܵ½Ó°Ï죬½¨ÒéÓû§¾¡¿ìÉý¼¶ÖÁ1.6.2.0¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/flaw-schneider-plc-allows-significant-disruption-ics
¡¾Õþ²ßÂÉÀý¡¿¹úÎñÔº°ì¹«Ìü¹ØÓÚ¼ÓÇ¿µ±¾ÖÍøÕ¾ÓòÃûÖÎÀíµÄ֪ͨ
ΪÂäʵµ³ÖÐÑë¡¢¹úÎñÔº¹ØÓÚ¼ÓÇ¿ÍøÂ簲ȫ½¨ÉèµÄ¾ö²ß²¿Êð£¬Íƽøµ±¾ÖÍøÕ¾½¡È«ÓÐÐò·¢Õ¹£¬Ï־ͼÓÇ¿µ±¾ÖÍøÕ¾ÓòÃûÖÎÀí¹¤×÷֪ͨÈçÏ£ºÒ»¡¢½¡È«µ±¾ÖÍøÕ¾ÓòÃûÖÎÀíÌåÔ죻¶þ¡¢½øÒ»²½¹æ·¶µ±¾ÖÍøÕ¾ÓòÃû½á¹¹£»Èý¡¢ÓÅ»¯µ±¾ÖÍøÕ¾ÓòÃû×¢²á×¢ÏúµÈÁ÷³Ì£»ËÄ¡¢¼ÓÇ¿ÓòÃû°²È«·À»¤¼°¼à²â´ëÖù¤×÷¡£
ÔÎÄÁ´½Ó£ºhttp://www.shanghai.gov.cn/nw2/nw2314/nw2315/nw32813/nw32816/nw39542/userobject82aw151108.html?7