2019Ä깤¿ØÍþв»ã±¨£»2019ÄêQ2 APT¹¥»÷Ç÷Ïò»ã±¨£»ÃÀ¾ü²É°ìµÄµç×Ó²úÆ·´æÔÚ°²È«·çÏÕ
°ä²¼¹¦·ò 2019-08-05
ÔÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf
2¡¢¿¨°Í˹»ù°ä²¼2019ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ç÷Ïò»ã±¨
ÔÎÄÁ´½Ó£ºhttps://securelist.com/apt-trends-report-q2-2019/91897/
3¡¢±±ÃÀPoshmarkÔâºÚ¿ÍÈëÇÖ£¬¿Í»§ÐÅϢй¶
PoshmarkÊDZ±ÃÀµØÓòµÄÒ»¸ö·þ×°¡¢Ð¬×ÓºÍÅäÊεÄÂòÂôÊг¡£¬¸Ã¹«Ë¾ÓÚ8ÔÂ1ÈÕÅû¶ÁËÊý¾Ýй¶ÊÂÎñ¡£¸Ã¹«Ë¾°µÊ¾Æä·þÎñÆ÷ÔâµÚÈý·½Î´ÊÚȨ½Ó¼û£¬¿Í»§µÄÓû§Ãû¡¢¼ÓÑιþÏ£ÃÜÂë¡¢ÐÕÃû¡¢ÐÔ±ðºÍ¾Óס³ÇÊеÈÐÅϢй¶¡£´Ë±í£¬¹¥»÷Õß»¹ÇÔÈ¡ÁËÓû§µÄµç×ÓÓʼþ¡¢É罻ýÌå×ÊÁÏÒÔ¼°·þ×°³ß´çÆ«ºÃµÈÐÅÏ¢¡£PoshmarkûÓÐй©ÊÂÎñ²úÉúµÄ¹¦·òÒÔ¼°ÊÜÓ°ÏìµÄÈËÊý£¬²¢°µÊ¾Ö»ÓÐÃÀ¹úµÄÓû§ÊÜÓ°Ï죬¼ÓÄôóÓû§²»ÊÜÓ°Ïì¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/poshmark-clothing-marketplace-says-hacker-stole-customer-details/
4¡¢Ð¶ñÒâÈí¼þSystemBC£¬Í¨¹ýFalloutºÍRIG EK½øÐзַ¢
Proofpoint×êÑÐÈËÔ±·¢ÏÖÒ»¸öеĶñÒâ´úÀíÈí¼þSystemBC£¬¸Ã¶ñÒâÈí¼þÖØÒªÍ¨¹ýFalloutºÍRIG EK½øÐзַ¢¡£SystemBCͨ¹ýSOCKS5´úÀíÀ´°µ²ØÆä¶ñÒâÁ÷Á¿£¬ÓëC2·þÎñÆ÷ͨ¹ýHTTPs½øÐÐÏνӡ£ÓÉÓڸöñÒâÈí¼þ±»ÓÃÓÚ¶à¸ö·ÖÆçµÄ¹¥»÷»î¶¯£¬×êÑÐÈËÔ±ÒÔΪ¸Ã¶ñÒâÈí¼þºÜ¿ÉÄÜÔÚ°µÍøÊг¡ÉϽøÐÐÏúÊÛ¡£×êÑÐÈËÔ±Ôڻ㱨ÖÐÅû¶Á˾ßÌåIoCºÍ¸Ã¶ñÒâÈí¼þµÄ¸ü¶àϸ½Ú¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/89336/malware/systembc-proxy-malware.html
5¡¢PewDiePieºÚ¿Í¹éÀ´£¬ÀûÓÃSMSÍø¹Ø·ì϶·¢ËÍ´óÁ¿À¬»ø¶ÌÐÅ
Ôø½Ù³ÖÉÏÍǫ̀´òÓ¡»úÒÔÍÆ¹ãYouTubeƵ·PewDiePieµÄºÚ¿ÍÔٴιéÀ´£¬ËûÃÇÊÔͼͨ¹ýSMSÍø¹ØÏµÍ³ÏòÃÀ¹úµÄÿһ²¿ÊÖ»ú·¢ËÍÀ¬»ø¶ÌÐÅ¡£SMSÍø¹ØÍ¨³£ÓÃÓÚ¸¶·Ñ·¢ËͶÌÐÅ£¬²¢ÇÒÌṩһϵÁÐAPI£¬Ö§³Ö¾ç±¾»¯½»»¥¡£ÕâÐ©Íø¹ØµÄÿÌõÐÂÎżÛÖµ½ÏµÍ£¬Òâζ×Å´ó¹æÄ£·¢ËÍÀ¬»ø¶ÌÐŵijɱ¾Ò²½ÏµÍ¡£ÕâÖÖ¹¥»÷ÀàËÆÓÚDDoS¹¥»÷£¬ºÚ¿ÍÐû³ÆÒѾʹÓÃ·ÖÆçµÄÊÖ»úºÍÔËÓªÉ̽øÐÐÁ˲âÊÔ£¬ÀûÓÃÕâÖÖÎÞÏÞ¶È·¢ËÍ´óÁ¿Îı¾ÐÂÎŵķ½Ê½Ê¹µÃÖ¸±êAndroidºÍiPhoneËÀ»ú¡£
ÔÎÄÁ´½Ó£ºhttps://www.wired.co.uk/article/sms-hack-text-twitter-j3ws3r
6¡¢2018ÄêÃÀ¾ü²É°ìÁ˼ÛÖµ3280ÍòÃÀÔªµç×Ó²úÆ·´æÔÚ°²È«·çÏÕ
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/us-military-purchased-32-8m-worth-of-electronics-with-known-security-risks/


¾©¹«Íø°²±¸11010802024551ºÅ