2019Ä깤¿ØÍþв»ã±¨£»2019ÄêQ2 APT¹¥»÷Ç÷Ïò»ã±¨£»ÃÀ¾ü²É°ìµÄµç×Ó²úÆ·´æÔÚ°²È«·çÏÕ

°ä²¼¹¦·ò 2019-08-05
1¡¢×êÑÐÍŶӰ䲼2019Ä깤¿ØÍþв»ã±¨£¬¾Å´ó·¸×ïÍÅ»ïרһÓÚICS

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¹¤¿Ø°²È«³§ÉÌDragos°ä²¼2019Ä깤¿ØÍþв»ã±¨£¬»ã±¨ÖзÖÎöÁËרÃÅÕë¶ÔICSÍøÂçµÄ9¸ö·¸×ïÍŻÆäÖÐ5¸ö·¸×ïÍÅ»ïÖØÒªÕë¶ÔʯÓͺÍÌìÈ»Æø¹«Ë¾£¬Ô̺¬HEXANE¡¢MAGNALLIUM¡¢CHRYSENE¡¢XENOTIMEºÍDYMALLOY£¬ÆäÓà4¸ö·¸×ïÍÅ»ïÖØÒªÕë¶ÔÄÜÔ´²¿ÃÅ£¬Ô̺¬ELECTRUM¡¢RASPITE¡¢ALLANITEºÍCOVELLITE¡£¸Ã»ã±¨Ö¸³öÓÉÓÚ¿ÉÔì³É¸ß¶ÈÕðµ´µÄÕþÖκ;­¼ÃÓ°Ï죬ʯÓͺÍÌìÈ»Æø²¿ÃÅÒÀÈ»Ãæ¶Ô·ÛËéÐÔÍøÂç¹¥»÷µÄ·çÏÕ¡£


Ô­ÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf


2¡¢¿¨°Í˹»ù°ä²¼2019ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ç÷Ïò»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ù×êÑÐÍŶÓGReAT°ä²¼2019ÄêµÚ¶þ¼¾¶ÈµÄAPTÍþв»ã±¨¡£4Ô·Ý×êÑÐÍŶÓÅû¶ÁËÒ»¸öǰËùδ֪µÄAPT¿ò¼ÜTajMahal£¬TajMahalÔÚ´ÓǰÎåÄêÖÐÒ»Ïò»îÔ¾£¬Æä¼ÓÃܵÄÐé¹¹ÎļþϵͳÖд洢Á˶à´ï80¸ö¶ñÒâÄ£¿é¡£¶«ÄÏÑÇ´ÓÀ´ÊÇAPT¹¥»÷×îΪ»îÔ¾µÄµØÓò£¬µ«±¾¼¾¶ÈµÄ¹¥»÷»î¶¯ÖØÒªÓ뺫¹úÓйØ£¬¸ÃµØÓòµÄÆäËü¹ú¶È½ÏΪ³Á¾²¡£ÔÚÈ«ÇòËùÓеĵØÓò£¬µØÔµÕþÖÎÒÀÈ»ÊÇAPT¹¥»÷µÄÖØÒªÍÆ¶¯Á¦¡£


Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/apt-trends-report-q2-2019/91897/


3¡¢±±ÃÀPoshmarkÔâºÚ¿ÍÈëÇÖ£¬¿Í»§ÐÅϢй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

PoshmarkÊDZ±ÃÀµØÓòµÄÒ»¸ö·þ×°¡¢Ð¬×ÓºÍÅäÊεÄÂòÂôÊг¡£¬¸Ã¹«Ë¾ÓÚ8ÔÂ1ÈÕÅû¶ÁËÊý¾Ýй¶ÊÂÎñ¡£¸Ã¹«Ë¾°µÊ¾Æä·þÎñÆ÷ÔâµÚÈý·½Î´ÊÚȨ½Ó¼û£¬¿Í»§µÄÓû§Ãû¡¢¼ÓÑιþÏ£ÃÜÂë¡¢ÐÕÃû¡¢ÐÔ±ðºÍ¾Óס³ÇÊеÈÐÅϢй¶¡£´Ë±í£¬¹¥»÷Õß»¹ÇÔÈ¡ÁËÓû§µÄµç×ÓÓʼþ¡¢É罻ýÌå×ÊÁÏÒÔ¼°·þ×°³ß´çÆ«ºÃµÈÐÅÏ¢¡£PoshmarkûÓÐй©ÊÂÎñ²úÉúµÄ¹¦·òÒÔ¼°ÊÜÓ°ÏìµÄÈËÊý£¬²¢°µÊ¾Ö»ÓÐÃÀ¹úµÄÓû§ÊÜÓ°Ï죬¼ÓÄôóÓû§²»ÊÜÓ°Ïì¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/poshmark-clothing-marketplace-says-hacker-stole-customer-details/


4¡¢Ð¶ñÒâÈí¼þSystemBC£¬Í¨¹ýFalloutºÍRIG EK½øÐзַ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Proofpoint×êÑÐÈËÔ±·¢ÏÖÒ»¸öеĶñÒâ´úÀíÈí¼þSystemBC£¬¸Ã¶ñÒâÈí¼þÖØÒªÍ¨¹ýFalloutºÍRIG EK½øÐзַ¢¡£SystemBCͨ¹ýSOCKS5´úÀíÀ´°µ²ØÆä¶ñÒâÁ÷Á¿£¬ÓëC2·þÎñÆ÷ͨ¹ýHTTPs½øÐÐÏνÓ¡£ÓÉÓڸöñÒâÈí¼þ±»ÓÃÓÚ¶à¸ö·ÖÆçµÄ¹¥»÷»î¶¯£¬×êÑÐÈËÔ±ÒÔΪ¸Ã¶ñÒâÈí¼þºÜ¿ÉÄÜÔÚ°µÍøÊг¡ÉϽøÐÐÏúÊÛ¡£×êÑÐÈËÔ±Ôڻ㱨ÖÐÅû¶Á˾ßÌåIoCºÍ¸Ã¶ñÒâÈí¼þµÄ¸ü¶àϸ½Ú¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/89336/malware/systembc-proxy-malware.html


5¡¢PewDiePieºÚ¿Í¹éÀ´£¬ÀûÓÃSMSÍø¹Ø·ì϶·¢ËÍ´óÁ¿À¬»ø¶ÌÐÅ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ôø½Ù³ÖÉÏÍǫ̀´òÓ¡»úÒÔÍÆ¹ãYouTubeƵ·PewDiePieµÄºÚ¿ÍÔٴιéÀ´£¬ËûÃÇÊÔͼͨ¹ýSMSÍø¹ØÏµÍ³ÏòÃÀ¹úµÄÿһ²¿ÊÖ»ú·¢ËÍÀ¬»ø¶ÌÐÅ¡£SMSÍø¹ØÍ¨³£ÓÃÓÚ¸¶·Ñ·¢ËͶÌÐÅ£¬²¢ÇÒÌṩһϵÁÐAPI£¬Ö§³Ö¾ç±¾»¯½»»¥¡£ÕâÐ©Íø¹ØµÄÿÌõÐÂÎżÛÖµ½ÏµÍ£¬Òâζ×Å´ó¹æÄ£·¢ËÍÀ¬»ø¶ÌÐŵijɱ¾Ò²½ÏµÍ¡£ÕâÖÖ¹¥»÷ÀàËÆÓÚDDoS¹¥»÷£¬ºÚ¿ÍÐû³ÆÒѾ­Ê¹ÓÃ·ÖÆçµÄÊÖ»úºÍÔËÓªÉ̽øÐÐÁ˲âÊÔ£¬ÀûÓÃÕâÖÖÎÞÏÞ¶È·¢ËÍ´óÁ¿Îı¾ÐÂÎŵķ½Ê½Ê¹µÃÖ¸±êAndroidºÍiPhoneËÀ»ú¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.wired.co.uk/article/sms-hack-text-twitter-j3ws3r


6¡¢2018ÄêÃÀ¾ü²É°ìÁ˼ÛÖµ3280ÍòÃÀÔªµç×Ó²úÆ·´æÔÚ°²È«·çÏÕ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝÃÀ¹ú¹ú·À²¿¼à²ì³¤£¨DODIG£©»ã±¨£¬2018²ÆÄêÃÀ¹ú½¾üºÍ¿Õ¾üÔ±¹¤²É°ìÁ˼ÛÖµ³¬¹ý3280ÍòÃÀÔªµÄ´æÔÚÒÑÖª°²È«·ì϶µÄµç×Ó²úÆ·¡£ÕâЩ²úÆ·Ô̺¬Lexmark´òÓ¡»ú¡¢GoProÏà»úºÍåÚÏëÍÆËã»úµÈ¡£ÆäÖг¬¹ý8000̨Lexmark´òÓ¡»ú±»ÓÃÓÚ½¾üºÍ¿Õ¾üÍøÂ磬×ܼÛÖµ³¬¹ý3000ÍòÃÀÔª¡£DODIGÖ¸³öLexmark´òÓ¡»úÔøÊܵ½20¶à¸ö·ì϶µÄÓ°Ï죬Ô̺¬Ã÷ÎÄ´æ´¢ºÍ´«ÊäÍ´´¦ÒÔ¼°ÔÊÐí¶ñÒâ´úÂëÖ´ÐеÈ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/us-military-purchased-32-8m-worth-of-electronics-with-known-security-risks/