¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181105

°ä²¼¹¦·ò 2018-11-05
1¡¢°²È«³§Ḛ́䲼2018ÄêQ3ÍøÂçÍþвÇ÷ÏòµÄ·ÖÎö»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝProofpointµÄ2018ÄêµÚÈý¼¾¶ÈÍþвÇ÷Ïò»ã±¨ £¬µç×ÓÓʼþÒÀÈ»ÊÇÍøÂç·¸×ï·Ö×Ó´«²¼¶ñÒâÈí¼þºÍ½øÐд¹µö»î¶¯µÄÊ×Ñ¡¹¥»÷¼¿Á©¡£´Ó2018ÄêµÄQ2µ½Q3 £¬Ì°Í¼ÇÔÈ¡Æóҵʹ´¦µÄµç×ÓÓʼþÔö³¤Á˳¬¹ý300%¡£ÀûÓÃÉ罻ýÌåÉϵÄÐéα¿Í»§·þÎñºýŪÓû§Ó×ÎÒÊý¾ÝµÄ´¹µö»î¶¯ÔÚ9Ô´ﵽÁË×î¸ßˮƽ £¬ÓëÈ¥ÄêͬÆÚÏà±ÈÔö³¤ÁË486%¡£ÒøÐÐľÂíÕ¼ËùÓжñÒâÓÐЧºÉÔØµÄ46£¥ £¬¶øEmotetºÍZeus PandaÕ¼ÒøÐÐľÂíµÄ90%¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.proofpoint.com/sites/default/files/pfpt-us-tr-q318-quarterly-threat-report.pdf


2¡¢ÃÀÖ¥¼Ó¸çCPSÔ¼8ÍòÔ±¹¤µÄÓ×ÎÒÐÅÏ¢±»ÇÔ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝÖ¥¼Ó¸çÌ«Ñô±¨µÄ±¨Â· £¬Ö¥¼Ó¸ç¹«Á¢Ñ§ÌõÄÒ»Ãûǰ¹ÍÔ±Kristi SimsÇÔÈ¡ÁËÔ¼8ÍòÃûÔ±¹¤¡¢×ÔÔ¸Õߺ͹©¸øÉ̵ÄÓ×ÎÒÐÅÏ¢ £¬ÕâЩÐÅÏ¢Ô̺¬ÐÕÃû¡¢Ô±¹¤ID¡¢µç»°ºÅÂë¡¢µØÖ·¡¢µ®ÉúÈÕÆÚ¡¢·¸×ﺹÇàºÍDCFSµ÷²éÁ˾ֵÈ £¬²»Ô̺¬ÈκÎÉç±£ºÅÂë¡£KrimsĿǰÒѱ»Ö¥¼Ó¸ç¾¯·½¿ÛÁôºÍ¿ÛÁô £¬²¢½«Ãæ¶Ô¶àÏî×ïÃûµÄÖ¸¿Ø¡£

  

Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/80-000-individuals-had-their-personal-info-stolen-by-former-cps-employee-523592.shtml


3¡¢×êÑÐÈËÔ±·¢ÏÖÀûÓý©Ê¬ÍøÂçNecursµÄ´¹µöÚ¿Æ­»î¶¯

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalos×êÑÐÈËÔ±·¢ÏÖÀûÓý©Ê¬ÍøÂçNecursµÄ´¹µöÚ¿Æ­»î¶¯¡£¹¥»÷Õß´Ó³ÉÈËÍøÕ¾Ð¹Â¶µÄÊý¾Ý¿âµ±Ñ¡ÔñÖ¸±ê £¬¼Ù×°Õ¼ÓÐÆäÅÔ¹ÛÉ«ÇéÊÓÆµµÄÖ¤¾Ý £¬ÒԴ˽øÐÐÍþвºÍڲƭ¡£×êÑÐÈËÔ±¹²·¢ÏÖÁ½¸öÀàËÆµÄ»î¶¯ £¬Ò»¸öÊÇ8ÔÂ30ºÅÆðÍ·µÄFrom£ºheader»î¶¯ £¬ÁíÒ»¸öÊÇ10ÔÂ5ºÅµÄAaron Smith»î¶¯¡£Aaron SmithÖÁÉÙ´Ó137606¸ö·ÖÆçµÄIPµØÖ·£¨Ô¼1000¸öIPÓëNecursÓйأ©·¢ËÍÁË233236·â´¹µöÓʼþ £¬ÊÕ¼þÈ˵ÄÊýÁ¿Îª15826 £¬¾ùÔÈÿ¸öÊÕ¼þÈËÊÕµ½15·âÓʼþ¡£
  Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/necurs-botnet-distributing-sextortion-email-scams/


4¡¢ÈðÊ¿Sauter¹«Ë¾°ä²¼Â¥Óî×Ô¶¯»¯²úÆ·µÄ°²È«¸üР£¬½¨¸´Ò»¸öXXE·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«³§ÉÌApplied RiskµÄ×êÑÐÈËÔ±Gjoko Krstic·¢ÏÖÈðʿ¥Óî×Ô¶¯»¯¹«Ë¾SauterµÄCASE Suite²úÆ·´æÔÚÒ»¸öXXE·ì϶¡£¸Ã·ì϶£¨CVE-2018-17912£©ÔÊÐí¹¥»÷Õßͨ¹ýOOB¹¥»÷½Ó¼ûºÍ¼ìË÷ËÁÒâÊý¾Ý £¬ÉõÖÁµ¼ÖÂDoS £¬CASE Suite 3.10¼°Ö®Ç°µÄ°æ±¾Êܵ½Ó°Ïì¡£ÔÚ10ÔÂ15ÈÕICS-CERTÏòÆä´«µÝÁ˸÷ì϶ºó £¬Sauter½öÆÆ·ÑÁË10Ìì¾Í°ä²¼ÁËÓйؽ¨¸´²¹¶¡¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/sauter-quickly-patches-flaw-building-automation-software


5¡¢×êÑÐÍŶÓÅû¶Ó×ÒϼÒÓÃÉãÏñÍ·ÖеĶà¸ö°²È«·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalosÍŶÓÅû¶Ó×ÒϼÒÓÃÉãÏñÍ·ÖеĶà¸ö°²È«·ì϶¡£¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩ·ì϶½ûÓÃÉãÏñÍ·¡¢É¾³ýÉãÏñÍ·ÉÏ´æ´¢µÄÊÓÆµ¡¢²é¿´ÊÓÆµ¡¢ÕëµÐÊÖ»úappÌáÒéDZÔڵĹ¥»÷ºÍÈëÇÖ¼ÒÍ¥ÍøÂç¹¥»÷ÆäËüÉ豸µÈ¡£·ì϶ÁìÓòÔ̺¬Ô¶³Ì´úÂëÖ´ÐÓ×¢ºÅÁî×¢Èë¡¢Éí·ÝÑéÖ¤ÈÆ¹ýÒÔ¼°»Ø¾ø·þÎñµÈ¡£¾ßÌå·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó £¬½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ×îеĹ̼þ°æ±¾¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2018/10/vulnerability-spotlight-Yi-Technology.html


6¡¢Twitterɾ³ý³¬¹ý1Íò¸öÊÔͼӰÏìÃÀ¹úÖÐÆÚÑ¡¾ÙµÄ»úеÈËÕË»§

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


TwitterÐû³ÆÔÚ9Ôµ׺Í10Ô³õÒѾ­É¾³ýÁ˳¬¹ý1Íò¸ö»úеÈËÕË»§ £¬ÕâЩÕË»§ÊÔͼ°ä²¼ÐÅÏ¢ÒÔÓ°ÏìÃÀ¹úµÄÖÐÆÚÑ¡¾Ù¡£ÃÀ¹úÃñÖ÷µ³¹ú»á¾ºÑ¡Î¯Ô±»á£¨DCCC£©¿ª·¢ÁËÒ»¸öÓÃÓÚ¼ø±ðºÍ»ã±¨ÓÉ»úеÈ˽ÚÔìµÄÉ罻ýÌåÕË»§µÄϵͳ £¬²¢ÒªÇóTwitterɾ³ýÕâЩÕË»§¡£¸ÃϵͳÀûÓÃÁËһЩ¹«¿ªµÄ¹¤¾ß £¬ÀýÈçHoaxleyºÍBotometerµÈ¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/77642/social-networks/twitter.html


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù