2019ÄêϰëÄêÍþвµý±¨»ã±¨£»2020ÄêÒ½ÁƱ£½¡ÐÐÒµ°²È«À¶Í¼»ã±¨£»Ã׸ß÷¾Æµê1070Íò¿Í»§ÐÅϢй¶

°ä²¼¹¦·ò 2020-02-20

1.NETSCOUT°ä²¼2019ÄêϰëÄêÍþвµý±¨»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Netscout°ä²¼ÁËÆä2019ÄêϰëÄêÍþвµý±¨»ã±¨ £¬»ã±¨µÄÖØÒª·¢ÏÖÔ̺¬£º¹¥»÷ÕßʹÓÃÁË7ÖÖеÄUDP·´Éä/·Å´ó¹¥»÷ £¬²¢½áºÏÒÑÖªµÄ¹¥»÷ÏòÁ¿ÌáÒéÕë¶ÔÐÔDDoS¹¥»÷£»Õë¶Ô´¹Ö±ÐÐÒµµÄ´ó¹æÄ£¹¥»÷±ä¶à £¬ÀýÈçÕë¶ÔÎÀÐǵçÐŵĹ¥»÷Ôö³¤ÁË295%£»¹¥»÷ÕßÀûÓÃÏȽøµÄ¿úËż¼Êõ½«Ö¸±êËø¶¨ÔÚÊÜÓÅÁ¼±£»¤µÄÖ¸±ê£¨ÈçISPºÍ½ðÈÚ»ú¹¹£©ÉÏ £¬ÒÔ·Å´óÕë¶ÔÌØ¶¨ÆóÒµºÍÍøÂçÔËÓªÉ̵Ĺ¥»÷£»´Ó2018 H2µ½2019 H2 £¬Õë¶ÔÎÞÏßͨѶ¹«Ë¾µÄDDoS¹¥»÷ƵÂÊÔö³¤ÁË64£¥£»»ùÓÚMiraiµÄ±äÌåÔÚ2019ÄêϰëÄêÕ¼¾ÝÖ÷µ¼Ö°Î»£¨Ôö³¤ÁË57£¥£© £¬¿ÉÕë¶Ô17ÖÖϵͳ¼Ü¹¹£»WISRµÄ·þÎñÌṩḚ́µÊ¾Õë¶Ô¹«¿ªÂ¶³öµÄ»ù´¡ÉèÊ©µÄDDoS¹¥»÷Ôö³¤ÁË52£¥ £¬¶øÉÏÒ»ÄêΪ38£¥¡£


Ô­ÎÄÁ´½Ó£º

https://www.netscout.com/press-releases/netscouts-threat-intelligence-report-2H2019


2.CyberMDX°ä²¼2020ÄêÒ½ÁƱ£½¡ÐÐÒµ°²È«À¶Í¼»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝCyberMDXµÄ2020ÄêÒ½ÁƱ£½¡ÐÐÒµ°²È«À¶Í¼»ã±¨ £¬µäÐ͵ÄÒ½ÔºÖÐËùÓÐWindowsÉ豸ÖÐÓÐ22£¥ÒÀȻûÓÐ×°ÖÃBlueKeep·ì϶µÄ½¨¸´²¹¶¡ £¬¶ø¶ÔÓÚÔÚWindowsÉÏÔËÐеÄÁªÍøÒ½ÁÆÉ豸¶øÑÔ £¬ÕâÒ»Êý×ÖÉÏÉýµ½ÁË45£¥ £¬ÕâÒâζ×ÅÏÕЩһ°ëµÄÁªÍøÒ½ÁÆÉ豸Ò×Êܹ¥»÷¡£ÕâЩÉ豸¿ÉÄÜÔ̺¬·ÅÉäÉ豸¡¢¼à¶½Æ÷¡¢XÉäÏߺͳ¬ÉùÉ豸ÒÔ¼°Âé×í»úµÈ¡£ÈôÊDz»ºÏÕâЩÉ豸½øÐн¨²¹ £¬¹¥»÷Õß¿ÉÄÜ»áËÑË÷µ½Ò×ÊÜBlueKeep¹¥»÷µÄ»úе £¬´Ó¶øÊ¹Ò½ÔºÍøÂçºÍ»¼Õß´¦ÓÚΣÏÕÖ®ÖС£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cybersecurity-warning-almost-half-of-connected-medical-devices-are-vulnerable-to-hackers-exploiting-bluekeep/


3.ÒÁÀÊAPTÍøÂç¼äµý»î¶¯Fox KittenµÄ·ÖÎö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÚ¿ÍÔÚÀûÓÃÓÉThemeREX¿ª·¢µÄWordPress²å¼þÖеÄ0dayÀ´ÈëÇÖWordPressÍøÕ¾¡£°²È«³§ÉÌWordfenceÓÚ2ÔÂ18ÈÕ¼ì²âµ½ÁË´ËÀ๥»÷¡£ThemeREX²å¼þԤװÁËËùÓÐThemeREXóÒ×Ö÷Ìâ £¬²¢ÇÒÔ®ÊÖÓû§ÉèÖÃÐÂÕ¾µãºÍ½ÚÔì¸÷ÀàÖ÷ÌâÖ°ÄÜ £¬Wordfence¹À¼Æ¸Ã²å¼þÒÑ×°ÖÃÔÚ³¬¹ý4.4Íò¸öÕ¾µãÉÏ¡£¸Ã²å¼þ¿Éͨ¹ýÉèÖÃWordPress REST-API¶ËµãÀ´¹¤×÷ £¬µ«²»»á²é³­·¢Ë͵½´ËREST APIµÄºÅÁîÊÇ·ñÀ´×ÔÊÚȨÓû§ £¬ÕâÒâζ×ÅÈκηÿͶ¼Äܹ»Ö´ÐÐÔ¶³Ì´úÂë £¬ÉõÖÁ´´½¨ÐµÄÖÎÀíÓû§ºÍÊÕÊÜÍøÕ¾¡£×êÑÐÈËÔ±°µÊ¾ÈôÊÇÓû§ÔËÐеIJå¼þ°æ±¾¸ßÓÚ1.6.50 £¬ÄÇôǿÁÒ½¨ÒéÓû§ÁÙʱɾ³ýThemeREX²å¼þ £¬Ö±µ½½¨¸´²¹¶¡°ä²¼ÎªÖ¹¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/iranian-apts-fox-kitten-global-spy-campaign/152974/


4.°²È«×êÑÐÈËÔ±Åû¶΢Èí¶à¸ö×ÓÓòÃû±»½Ù³ÖÎÊÌâ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


NIC.gp°²È«×êÑÐÔ±Michel GaschetÖ¸³ö΢Èí´æÔÚ¶à¸ö×ÓÓòÃû½Ù³ÖÎÊÌâ £¬ÕâЩ×ÓÓòÃû¿ÉÄܱ»½Ù³ÖºÍÓÃÓÚ¹¥»÷Óû§¡¢Ô±¹¤»òÏÔʾÀ¬»øÄÚÈÝ¡£ÔÚ´ÓǰÈýÄêÖÐ £¬GaschetÒ»ÏòÔÚÏò΢Èí»ã±¨´øÓÐÃýÎóÅäÖõÄDNS¼Í¼µÄ×ÓÓòÃû £¬ÀýÈç2017ÄêËû»ã±¨ÁË21¸öÒ×±»½Ù³ÖµÄmsn.com×ÓÓòÃû £¬2019ÄêËûÓֻ㱨ÁË142¸öÅäÖÃÃýÎóµÄmicrosoft.com×ÓÓòÃû £¬µ«Î¢Èí½ö½¨¸´ÁËÆäÖÐ5£¥µ½10£¥µÄ×ÓÓòÃû¡£Gaschet»¹Ö¸³öËûÖÁÉÙÔÚ4¸öºÏ·¨µÄ΢Èí×ÓÓòÖз¢ÏÖÁËÓ¡¶ÈÄáÎ÷ÑÇÆË¿Ë¶Ä³¡µÄ¸æ°× £¬Ô̺¬portal.ds.microsoft.com¡¢perfect10.microsoft.com¡¢ies.global.microsoft.comºÍblog-ambassadors.microsoft.com¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-has-a-subdomain-hijacking-problem/


5.ºÚ¿ÍÀûÓÃThemeREX²å¼þ0day¹¥»÷WordPressÍøÕ¾


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±°µÊ¾ÒÁÀÊAPT34/OilRigºÍAPT33/Elfin¿ÉÄÜÔÚ·¢Õ¹Ò»ÏîΪÆÚÈýÄêµÄ´ó¹æÄ£ÍøÂç¼äµý»î¶¯ £¬¸Ã»î¶¯±»³ÆÎªFox Kitten¡£¹¥»÷Õß³ÉÁ¢Á˸߶ȷ¢Õ¹ÇÒÓÆ¾ÃµÄ»ù´¡¼Ü¹¹ £¬ÓÃÓÚ½Ó¼û¹«Ë¾ÍøÂçºÍÖ´ÐпúËÅÓë¼äµý»î¶¯¡£×êÑÐÈËÔ±Ö¸³ö¹¥»÷ÕßÒ²Äܹ»ÀûÓÃÕâЩ»ù´¡ÉèÊ©²¿Êð·ÛËéÐԵĶñÒâÈí¼þ £¬ÀýÈçÓëAPT¹ØÁªµÄÊý¾Ý²Á³ýÆ÷ZeroCleareºÍDustman¡£¹¥»÷ÕßʹÓõijõʼϰȾý½éÔ̺¬Palo Alto NetworksÔÚ·ÖÆçVPN·þÎñ£¨ÀýÈçPulse Secure VPN¡¢Fortinet VPNºÍGlobal Protect£©ÖÐÅû¶µÄ·ì϶ £¬¹¥»÷ÕßʹÓõ͍Ô칤¾ß»¹Ô̺¬POWSSHNETºóÃÅ¡¢Êý¾Ý¿âºÍÊ¢ÅüÍ·¿ÚÓ³É乤¾ßSTSRCheck¡¢´ÓC2·þÎñÆ÷ÏÂÔØÎļþµÄVBScript¾ç±¾µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-exploit-zero-day-in-wordpress-plugin-to-create-rogue-admin-accounts/


6.Ã׸ß÷¾Æµê1070Íò¿Í»§ÐÅϢй¶ £¬ÒÑÔÚÂÛ̳°ä²¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ã׸ß÷¾ÆµêÈÏ¿ÉÔ¼1070ÍòסËÞ¿Í»§µÄÐÅÏ¢±»ºÚ¿ÍµÁÈ¡ £¬ÕâЩÊý¾ÝÒÑÔÚ±¾Öܱ»ÉÏ´«ÖÁºÚ¿ÍÂÛ̳ £¬³ýÁËͨÀýµÄÓοÍÖ®±í £¬ÊÜÓ°ÏìµÄ¿Í»§»¹º­¸ÇÃûÈË¡¢CEO¡¢¼ÇÕß¡¢µ±¾Ö¹ÙÔ±ºÍ¿Æ¼¼¹«Ë¾µÄÔ±¹¤µÈ¡£Éæ¼°µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·ºÍÉúÈյȡ£ÒÀÕÕÃ׸ß÷µÄ˵·¨ £¬ÕâЩÐÅÏ¢ÊÇÔÚ2019ÄêÏÄÌì¶ÔÆäÔÆ·þÎñÆ÷µÄδÊÚȨ½Ó¼ûÖб»µÁµÄ £¬±»µÁÐÅÏ¢²»Éæ¼°ÈκβÆÕþ¡¢ÒøÐп¨»òÃÜÂëÊý¾Ý¡£ÊÂÎñ²úÉúºóÃ׸ß÷ÒѾ­Í¨ÖªÁËËùÓÐÊܲ¨¼°µÄÓû§¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/exclusive-details-of-10-6-million-of-mgm-hotel-guests-posted-on-a-hacking-forum/