Upstream Security°ä²¼2020°æ¡¶Æû³µÍøÂ簲ȫ»ã±¨¡·£»Ó¢¹úµ±¾Ö³Áе÷²éÂ×¶ØÖ¤È¯ÂòÂôËùÈ¥Äêå´»úÊÂÎñ

°ä²¼¹¦·ò 2020-01-07


1.Upstream Security°ä²¼2020°æ¡¶Æû³µÍøÂ簲ȫ»ã±¨¡·


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Upstream Security2020°æ¡¶Æû³µÍøÂ簲ȫ»ã±¨¡·»ùÓÚ¶Ô´ÓǰʮÄêÖÐ367Æð¹«¿ª»ã±¨µÄÆû³µÍøÂ簲ȫÊÂÎñ½øÐзÖÎö£¬³ÁµãÇ¿µ÷ÁË2019ÄêÆÚ¼ä·¢Ïֵķì϶Óë¼û½â¡£¸Ã»ã±¨Ö¸³ö£¬»¥ÁªÍøÆû³µÒÑÔÚÊÕÊÜÆû³µÊг¡£¬Ä¿Ç°ÒÑÓÐ3.3ÒÚÁ¾»¥ÁªÍøÆû³µ£¬ÕâÒâζ×Åÿ´Î¹¥»÷µÄDZÔÚ·ÛËéÁ¦³É±¶Ôö³¤£¬´ó¹æÄ£µÄ¹¥»÷ÊÂÎñ¿ÉÄÜ»á·ÛËéÕû¸ö³ÇÊУ¬ÉõÖÁµ¼Ö¿àÄÑÐÔµÄÐÔÃüËðʧ¡£×Ô2016ÄêÒÔÀ´£¬Ã¿ÄêÆû³µÍøÂ簲ȫÊÂÎñµÄÊýÁ¿Ôö³¤ÁË605%£¬½ö2019ÄêÒ»Äê¾ÍÔö³¤ÁËÒ»±¶ÒÔÉÏ¡£ÔÚ2019Ä꣬ÓÐ57%µÄÊÂÎñÊÇÓÉÍøÂç×ï·¸½øÐеÄ£¬ÆäÖ÷ÕÅÊÇ·ÛËéÒµÎñ¡¢ÇÔÈ¡½ðÇ®»òË÷ÒªÊê½ð¡£½öÓÐ38%ÊÇ×êÑÐÈËÔ±µÄ»ã±¨£¬ÆäÖ÷ÕÅÏò¹«Ë¾ºÍÏû·ÑÕßÖÒÃܸæÏֵķì϶¡£


  Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/01/06/automotive-cybersecurity-incidents/


2.΢Èí°ä²¼RDP±©Á¦¹¥»÷·ÖÎö»ã±¨£¬¾ùÔȳÖÐø¹¦·òΪ2-3Ìì


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


΢Èí°ä²¼ÁËÒ»·ÝÕë¶ÔRDP±©Á¦¹¥»÷µÄ·ÖÎö»ã±¨£¬¸ÃÏî×êÑÐÊÇ»ùÓÚ´Ó³¬¹ý4.5Íò¸ö×°ÖÃÁËÃâ·ÑMicrosoft Defender ATPµÄ¹¤×÷Õ¾ÉÏÍøÂçµÄÊý¾Ý¡£ÕâЩÊý¾ÝÓëʧ°ÜºÍ³É¹¦µÄRDPµÇ¼ÊÂÎñÓйأ¨±ðÀëÊÇIDΪ4265ºÍ4264µÄWindowsÊÂÎñ£©£¬²¢ÇÒÉæ¼°Óû§/¹¥»÷Õß¿ÉÄÜʹÓõÄÓû§Ãû¾ßÌåÐÅÏ¢£¬Êý¾ÝÍøÂçÁ˼¸¸öԵŦ·ò¡£Î¢ÈíÔڻ㱨ÖаµÊ¾£¬×î½ü¹Û²ìµ½µÄRDP±©Á¦¹¥»÷¾ùÔȳÖÐø2-3Ì죬Լ90£¥µÄ°¸Àý³ÖÐø¹¦·òÔÚÒ»ÖÜÄÚ£¬Ö»Óв»µ½5£¥µÄ°¸Àý³ÖÐø¹¦·òÔÚÁ½ÖÜ»òÒÔÉÏ¡£Ô¼ÓÐ0.08£¥µÄRDP±©Á¦¹¥»÷³É¹¦½øÐÐÁ˵Ǽ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/


3.Ó¢¹úµ±¾Ö³Áе÷²éÂ×¶ØÖ¤È¯ÂòÂôËùÈ¥Äêå´»úÊÂÎñ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¢¹úµ±¾ÖÔÚ³ÁÐÂÉó²éÂ×¶ØÖ¤È¯ÂòÂôËùÈ¥ÄêµÄå´»úÊÂÎñ£¬ÒÔÈ·¶¨ÆäÊÇ·ñÓëÍøÂç¹¥»÷ÓйØ¡£¸ÃÊÂÎñ²úÉúÔÚ2019Äê8ÔÂ16ÈÕ£¬¡°Èí¼þ¹ÊÕÏ¡±µ¼ÖÂÐÇÆÚÎåµÄÔç¼äÂòÂôÕßÔÚÒ»¸ö°ëÓ×ʱÒÔÉϵŦ·òÄÚÎÞ·¨ÂòÂô¹ÉƱ¡£¸ÃÊÂÎñʹµÃ¸»Ê±100ºÍ¸»Ê±250Ö¸Êý¾ùÊܵ½Ó°Ïì¡£ÆäʱÂ×¶ØÖ¤½»ËùµÄ¹ÙÔ±°µÊ¾¡°Èí¼þ¼¼ÊõÎÊÌ⡱ÊÇÊÂÎñµÄµ××ÓÔ­Òò£¬µ«Ã»ÓÐÌṩÈκνøÒ»²½µÄϸ½Ú¡£µ«Æ¾¾Ý½üÆÚ¡¶»ª¶û½ÖÈÕ±¨¡·µÄ±¨Â·£¬ÔÚ½øÐеÄÒ»Ïîµ÷²éÅú×¢¸ÃÊÂÎñ¿ÉÄܲ»½ö½öÊÇÓÉÓÚÈí¼þÎÊÌâ¡£ÐÂÎÅÈËÊ¿³ÆÓ¢¹úµ±¾ÖͨѶ×ܲ¿£¨GCHQ£©µ«Ô¸Ïàʶ崻úÊÂÎñÊÇ·ñÊÇÓÉÓÚºÚ¿ÍÊÔͼ¡°·ÛËéÊг¡¡±µ¼ÖµÄ¡£ÔÚ´ÓǰÁ½¸öÔÂÖУ¬µý±¨»ú¹¹ÒÑÁªÏµ¸ÃÂòÂôËù»ñÈ¡¶î±íµÄÐÅÏ¢¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/uk-government-investigates-possible-cyberattack-link-to-london-stock-exchange-outage/


4.È¥ÄêϰȾSodinokibiµÄ¼ÓÖÝIT·þÎñÔËÓªÉÌSynoptek¾ö¶¨Ö§¸¶Êê½ð


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¼ÓÀû¸£ÄáÑÇÖݵÄIT·þÎñÉÌSynoptekÔÚϰȾÀÕË÷Èí¼þSodinokibiºó¾ö¶¨Ö§¸¶Êê½ðÒÔ½âÃÜÆäÎļþ¡£SynoptekÕ¼Óб鲼¶à¸öÐÐÒµµÄ1100¶à¼Ò¿Í»§£¬Ô̺¬´¦Ëùµ±¾Ö¡¢½ðÈÚ·þÎñ¡¢Ò½ÁƱ£½¡¡¢Ôì×÷Òµ¡¢Ã½Ìå¡¢ÁãÊÛºÍÈí¼þÐÐÒµ¡£Ï°È¾ÊÂÎñ²úÉúÔÚÈ¥Äê12ÔÂ23ÈÕ£¬ºÚ¿ÍÊ×ÏÈÈëÇÖÁ˹«Ë¾ÍøÂ磬¶øºó×°ÖÃÁËÀÕË÷Èí¼þ¡£ÆäʱSynoptek֤ʵÁËÕâ´Î¹¥»÷£¬µ«Ã»Óа䷢ÆÀÂÛ¡£SodiniokibiÍÅ»ïËÆºõרһÓÚÕë¶ÔÃÀ¹úIT·þÎñÉÌ£¬2019Äê8ÔÂPercSoft¹«Ë¾Êܵ½Ï°È¾£¬12Ô¸öñÒâÈí¼þϰȾÁËComplete Technology SolutionsµÄϵͳÒÔ¼°ÃÀ¹úÖØÒªÊý¾ÝÖÐÐÄÌṩÉÌÖ®Ò»CyrusOne¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/96017/malware/sodinokibi-ransomware-attack.html


5.ChromeÀ©´óLedge SecureÇÔÈ¡¼ÛÖµ1.6ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝDecryptµÄ»ã±¨£¬Chrome¶ñÒâÀ©´óLedge Secure½øÈëÁËChromeÀûÓÃÉ̵겢³É¹¦ÇÔÈ¡ÁËÖÁÉÙ¼ÛÖµ1.6ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¸ÃÀ©´óÐû³ÆÄܹ»³äÈÎChromeä¯ÀÀÆ÷ÖеļÓÃÜÇ®±ÒÇ®°ü£¬²¢ÒÔijÖÖ·½Ê½Éè·¨ÈÆ¹ýÁËGoogleµÄ¹ýÂËÆ÷£¬×îÖÕ½øÈëÁËÀûÓÃÉ̵깩Óû§ÏÂÔØ¡£·¨¹úLedger¹«Ë¾ÔÚTwitterÉÏÈ·ÈÏÁ˸ÃÀ©´ó²¢²»ÊǺϷ¨µÄ£¬²¢½¨ÒéÓû§Ô¤·ÀÔÚÆäÉ豸ÉÏ×°ÖøÃÀ©´ó¡£Ä¿Ç°GoogleÒѾ­´ÓChromeÀûÓÃÉ̵êÖÐɾ³ýÁ˸ÃÀ©´ó¡£


 Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/shady-google-chrome-extension-steals-16-000-worth-of-cryptocurrency-528762.shtml


6.ÀÕË÷Èí¼þREvil»ý¼«Õë¶Ôδ´ò²¹¶¡µÄPulse Secure VPN·þÎñÆ÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÈËÔ±¶½´ÙÔÚʹÓÃPulse Secure VPNµÄ×éÖ¯ÂíÉÏ×°Öý¨¸´²¹¶¡£¬²»È»ËüÃǽ«Ãæ¶ÔÀÕË÷Èí¼þREvilµÄ¹¥»÷¡£Ó¢¹ú°²È«×êÑÐÔ±¿­ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©Ìá¼°µÄ²¹¶¡ÊÇÃÀ¹úCISA¡¢¹ú¶È°²È«¾ÖºÍÓ¢¹ú¹ú¶ÈÍøÂ簲ȫÖÐÐÄÔÚÈ¥Äê10Ô·ݰ䲼µÄÖÒ¸æÖÐÌá¼°µÄ·ì϶²¹¶¡£¬Ô̺¬CVE-2019-11510ºÍCVE-2019-11539¡£BeaumontÖ¸³ö£¬Pulse Secure VPN·ì϶¡°¼«¶ÈÑϳÁ¡±£¬ÓÉÓÚËüÔÊÐíûÓÐÓÐЧʹ´¦µÄÔ¶³Ì¹¥»÷ÕßÔ¶³ÌÏνӵ½¹«Ë¾ÍøÂ磬½ûÓöà³É·ÖÉí·ÝÑéÖ¤ÒÔ¼°ÒÔ´¿Îı¾´ó¾ÖÔ¶³Ì²é¿´ÈÕÖ¾»ººÍ´æµÄÃÜÂ롣ƾ¾Ý°²È«¹«Ë¾Bad PacketsÓÚ1ÔÂ4ÈÕ½øÐеÄɨÃ裬ÓÐ3825¸öPulse Secure VPN·þÎñÆ÷ÉÐδÕë¶Ô·ì϶CVE-2019-11510½øÐн¨¸´£¬ÕâЩÒ×Êܹ¥»÷µÄVPN·þÎñÆ÷ÖÐÓÐ1300¶à¸öλÓÚÃÀ¹ú¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/