RiskIQ°ä²¼2019»¥ÁªÍø·¸×ï»ã±¨£»ÃÀ¹ú·Ò×˹°²ÄÇÖÝÒòÔâÀÕË÷Èí¼þ¹¥»÷°ä·¢½øÈ봹Σ״̬

°ä²¼¹¦·ò 2019-07-26
1¡¢RiskIQ°ä²¼2019»¥ÁªÍø·¸×ï»ã±¨£¬Ã¿·ÖÖÓËðʧ290ÍòÃÀÔª


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝRiskIQµÄÊý¾Ý£¬È¥ÄêÍøÂç·¸×ï·Ö×Óÿ·ÖÖÓ¸øÈ«Çò¾­¼ÃÔì³É290ÍòÃÀÔªµÄËðʧ£¬ÕûÄê×ܼÆÔì³É1.5ÍòÒÚÃÀÔªµÄËðʧ ¡£ÆäËüÊý¾ÝÔ̺¬£¬¼ÓÃÜÇ®±ÒÂòÂôËùÿ·ÖÖÓµÄËðʧ´ï1930ÃÀÔª£»´¹µö¹¥»÷ÿ·ÖÖÓÔì³ÉµÄËðʧ´ï17700ÃÀÔª£»2019ÄêÈ«ÇòÀÕË÷Èí¼þÊÂÎñµÄÔ¤¼Æ³É±¾ÎªÃ¿·ÖÖÓ22184ÃÀÔª£»Ã¿·ÖÖÓй¶µÄÉí·ÝÊý¾ÝÌõÊýΪ8100Ìõ£»Ã¿·ÖÖÓ¼ì²âµ½µÄ¶ñÒâ³Á¶¨ÏòΪ7¸öµÈ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/external-threat-management/2019-evil-internet-minute/


2¡¢ÃÀ¹ú·Ò×˹°²ÄÇÖÝÒòÔâÀÕË÷Èí¼þ¹¥»÷°ä·¢½øÈ봹Σ״̬


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹ú·Ò×˹°²ÄÇÖÝÖݳ¤John EdwardsÔÚÒ»²¨Õë¶Ô¸ÃÖÝÑ§ÇøµÄÀÕË÷Èí¼þ¹¥»÷º£³±ºó°ä·¢½øÈ봹Σ״̬£¬¸Ã´¹Î£ÉêÃ÷½«ÔÊÐí·Ò×˹°²ÄÇÖݵݲȫר¼ÒºÍÓйØ×ÊԴЭÖú±¾µØµ±¾Ö»ú¹¹±£»¤ÆäÍøÂç ¡£½öÔÚ7Ô·Ý£¬¸ÃÖݾÍÓÐËĸöÑ§ÇøÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäÍÆËã»úϵͳºÍµç»°ÏµÍ³ÖжÏ£¬ÕâËĸöѧ·Ö±æ±ðÊÇMorehouse¡¢Sabine¡¢Monroe CityºÍOuachita ¡£¸Ã´¹Î£ÉêÃ÷»¹ÒªÇóËùÓÐÊÜÀÕË÷Èí¼þ¹¥»÷Ó°ÏìÈ·µ±¾Ö»ú¹¹ÏòÖݹÙÔ±»ã±¨£¬²¢Ï޶Ȱ²È«¹«Ë¾ÔÚ´¹Î£Çé¿öÏÂÌá¼Û ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ransomware-attacks-prompt-louisiana-to-declare-state-of-emergency/


3¡¢Ó¢¹úµçÐŹ«Ë¾SkyÔÚÔâ·êײ¿â¹¥»÷ºó³ÁÖÃÓû§ÃÜÂë


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÔÚÉϸöÔÂÔ⵽ײ¿â¹¥»÷Ö®ºó£¬Ó¢¹úµçÐŹ«Ë¾SkyËø¶¨ÁËÓû§µÄÕË»§²¢ÒªÇóËûÃdzÁÖÃÃÜÂë ¡£¸Ã¹«Ë¾°µÊ¾´ËÏî´ëÊ©ÊÇÔ¤·À´ëÊ©£¬ÕâЩ±»Ëø¶¨µÄSky.comÓû§ÕË»§Ã»Óб»ºÚ¿ÍÈëÇÖ ¡£ÕâЩÓû§½«»áÊÕµ½¸Ã¹«Ë¾µÄµç×ÓÓʼþ֪ͨ£¬ÒªÇóËûÃǽӼû¹«Ë¾ÍøÕ¾»ò²¦´òµç»°ÒÔ½âËøËûÃǵÄÕË»§£¬²¢Í¨¹ýһϵÁв½Öè³ÁÖÃÕË»§ÃÜÂë ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/credentials-stuffing-attack-prompts-password-resets-for-sky-customers/


4¡¢ºÚ¿ÍÀÄÓÃÎļþ¹²Ïí·þÎñWeTransfer·Ö·¢À¬»øÓʼþ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Cofense°²È«×êÑÐÔ±Jake Longden·¢ÏÖ¹¥»÷ÕßÔÚÀÄÓÃÎļþ¹²Ïí·þÎñWeTransferÀ´·Ö·¢À¬»øÓʼþ£¬ÒÔÈÆ¹ý°²È«Íø¹ØµÄ¼ì²â ¡£Æ¾¾Ý×êÑÐÈËÔ±µÄ±íÊö£¬ºÚ¿Í½«³Á¶¨Ïòµ½´¹µöÒ³ÃæµÄHTM»òHTMLÎļþÉÏ´«ÖÁWeTransfer·þÎñ£¬²¢Í¨¹ýµç×ÓÓʼþ½«¸ÃÁ´½Ó¹²Ïí¸øÖ¸±êÓû§ ¡£¸Ã´¹µöÕ¾µãÓÃÓÚÇÔÈ¡Óû§µÄOffice365µÇ¼ʹ´¦ ¡£×êÑÐÈËÔ±¹Û²ìµ½ÀûÓøò½ÖèÕë¶ÔÒøÐÓ×¢µçÁ¦ºÍýÌåÐÐÒµµÄ¹¥»÷ÔÚÔö³¤ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/popular-file-sharing-service-wetransfer-used-in-malicious-spam-campaigns/146671/


5¡¢¶íÂÞ˹¹ú·À³Ð°üÉÌ¿ª·¢µÄ¶ñÒâÈí¼þMonokleÔÚÒ°±í´«²¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Lookout×êÑÐÈËÔ±·¢ÏÖÒ»¸öеÄÒÆ¶¯¼äµýÈí¼þMonokle£¬¸Ã¼äµýÈí¼þ¾Ý³ÆÊÇÓɶíÂÞ˹¹ú·À³Ð°üÉÌSpecial Technology Center Ltd.¿ª·¢µÄ£¬×Ô2016Äê3ÔÂÒÔÀ´¾ÍÔÚÒ°±í´«²¼ ¡£MonokleÖØÒª¶Ô×¼AndroidÊÖ»ú£¬µ«ºÏÓÃÓÚiOSµÄ°æ±¾Ò²ÔÚ¿ª·¢ÖÐ ¡£¸Ã¶ñÒâÈí¼þµÄÖ°Äܼ«¶È׳´ó£¬Ô̺¬78ÖÖ·ÖÆçµÄÔ¤Ô¼ÒåºÅÁî ¡£Æ¾¾ÝLookout×êÑÐÈËÔ±µÄ˵·¨£¬Monokle±»ÓÃÓÚÕë¶Ô¶«Å·¡¢ÐðÀûÑÇÒÔ¼°ÖÐÑǹú¶ÈµÄ¸ß¼ÛÖµÖ¸±ê ¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/russian-android-spying-apps.html


6¡¢WatchbogбäÖÖ¿ÉɨÃèÒ×ÊÜBlueKeep¹¥»÷µÄϵͳ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Intezer Labs×êÑÐÍŶӷ¢ÏÖWatchBogµÄбäÖÖʵÏÖÁËÒ»¸öBlueKeep·ì϶ɨÃèÄ£¿é£¬ÕâÒâζ×ÅWatchBogÔڳﱸһ·ÝÒ×Êܹ¥»÷µÄϵͳµÄÁбí£¬ÒÔ±ãÔÚ½«À´¶¨Î»»òÏúÊÛ¸øµÚÈý·½ÒÔ»ñÈ¡ÀûÈó ¡£¸ÃбäÖÖÔÚÏ°È¾ÍÆËã»úºó£¬½«´ÓC2·þÎñÆ÷ÌṩµÄÁбíÖÐɨÃèËùÓÐIPµØÖ·£¬ÊµÏÖɨÃè¹ý³Ìºó£¬ÔÙ½«É¨Ãèµ½µÄÒ×Êܹ¥»÷µÄÖ÷»úÁбíͨ¹ýRC4¼ÓÃܵÄÊ®Áù½øÔì×Ö·û´®·¢Ë͵½C2·þÎñÆ÷ ¡£µ±Ç°WatchBog»¹Î´±»ÓÃÓÚ·ÛËéÐÔµÄÖ÷ÕÅ£¬Æä×îÖÕÖ¸±êÊǽøÐÐÍÚ¿ó ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/