µ¤ÂóË®±ÃÔì×÷ÉÌDESMIÔâÍøÂç¹¥»÷£¬ÏµÍ³ÈÔδ¸´Ô£»³¬¹ý50ÍòZoomÕË»§Í´´¦ÔÚ°µÍøÂÛ̳ÏúÊÛ
°ä²¼¹¦·ò 2020-04-141.µ¤ÂóË®±ÃÔì×÷ÉÌDESMIÔâÍøÂç¹¥»÷£¬ÏµÍ³ÈÔδ¸´Ô
µ¤ÂóË®±ÃÔì×÷ÉÌDESMIÔâµ½ÍøÂç¹¥»÷£¬¸Ã¹¥»÷ÊÂÎñ²úÉúÔÚÉÏÖÜËĵÄÍíÉÏ£¬Ôâµ½¹¥»÷ºó¹«Ë¾µÄËùÓÐϵͳ¾ù±»¹Ø¹Ø¡£Æ¾¾Ý¸Ã¹«Ë¾ÔÚ¹ÙÍøÉϰ䲼µÄÖҸ棬¹«Ë¾µÄËùÓÐϵͳ¾ù±»¹Ø¹Ø£¬²¢ÇÒÔÚ»¹Ô¹ý³ÌÖУ¬Ê×Åú²¿ÃÅϵͳ½«ÔÚ¼¸ÌìÄÚÆô¶¯²¢ÔËÐУ¬ÆäÓàµÄϵͳ½«ÔÚ¼¸ÖÜÖ®ÄÚÔËÐС£Ä¿Ç°µ÷²éÈÔÔÚ½øÐÐÖ®ÖУ¬Éв»Ã÷ÏÔ¹¥»÷µÄˮƽ£¬DESMIÒѽ«ÊÂÎñ»ã±¨¸øµ¤Â󵱾ֺ;¯Ô±¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/101495/hacking/desmi-discloses-cyber-attack.html
2.ÒøÐÐľÂíGrandoreiroй¥»÷»î¶¯£¬ÖØÒªÕë¶ÔÎ÷°àÑÀ
IBM X-Force×êÑÐÈËÔ±¹Û²ìµ½ÒøÐÐľÂíGrandoreiroÒѾתÏòÕë¶ÔÎ÷°àÑÀµÄÒøÐÐÓû§¡£¸Ã¶ñÒâÈí¼þÖ®Ç°ÖØÒªÕë¶Ô°ÍÎ÷µÄÒøÐÐÓû§£¬×êÑÐÈËÔ±·ÖÎöÁËÐµĹ¥»÷»î¶¯ÖÐGrandoreiroÅú¸ÄºóµÄ´úÂ룬ȷ¶¨ÓëÔ´´úÂëÓµÓÐ80%-90%µÄÀàËÆ¶È£¬ÕâÖ¤ÁËÈ»À´×Ô°ÍÎ÷µÄ¶ñÒâÈí¼þ×÷ÕßÓ뵱ǰÕë¶ÔÎ÷°àÑÀµÄ¹¥»÷Õß´æÔڿ϶¨µÄ¹ØÁª¡£ÔÚ×î½üGrandoreiroµÄ¶ñÒâ·Ö·¢»î¶¯Öй¥»÷ÕßÀûÓÃÁËCOVID-19Ö÷ÌâÓйصÄÊÓÆÂ·´ÓÕʹÓû§ÔËÐаµ²ØµÄ¿ÉÖ´ÐÐÎļþ£¬²¢×îÖÕͨ¹ýRATÇÔÈ¡ÆäÒøÐÐÕË»§µÄ×ʽð¡£
ÔÎÄÁ´½Ó£º
https://securityintelligence.com/posts/grandoreiro-malware-now-targeting-banks-in-spain/
3.Operation Pinball¹¥»÷»î¶¯£¬Õë¶ÔÃÀ¹úºÍÅ·ÖÞµ±¾Ö»ú¹¹
Insikt Group·¢ÏÖÒ»¸öÔÚ½øÐÐÖеĶñÒâ»î¶¯Operation Pinball£¬¸Ã¶ñÒâ»î¶¯ÓëÕë¶ÔÃÀ¹úºÍÅ·ÖÞµ±¾ÖµÄOperation Secondary Infektion¹¥»÷»î¶¯ÓµÓÐÏÔÖøµÄ³Áµþ¡£Recorded Future¶ÔOperation PinballµÄµ÷²éÏÔʾ£¬¹¥»÷ÕßÊÔIJÀûÓóÖÐøµÄÅ·ÖÞÒÆÃñΣ»ú·ÛË鰮ɳÄáÑǵ±¾ÖÓëÅ·Ã˵ĹØÏµ¡£¸Ã¹¥»÷»î¶¯µÄµÚ¶þ¸öÊ·ýÊÔͼ·ÛËé¸ñ³¼ªÑÇÓë±±´óÎ÷ÑóÐÒé×éÖ¯£¨NATO£©µÄ¹ØÏµ¡£¶ÔÒ»¸ö×ÔÎÒ°ä²¼ÍøÕ¾µÄ½øÒ»´ëÊ©²éÏÔʾ£¬¹¥»÷ÕßÊÔIJÀûÓÃÐéαÎļþÕë¶ÔÃÀ¹ú¹ÙÔ±ÒÔ¼°ÃÀ¹úÕþÖÎ×éÖ¯Óë¹ú¼ÊÕþ²ßÔì¶©Õߺ͵±¾Ö»ú¹¹Ö®¼äµÄ¹ØÏµ£¬ÕâЩڲÆÐÔÎļþÊÔͼ·ÂÕÕ¶«Å·Ãô¸Ð¹ú¼ÊÎÊÌâÓйصĻúÃܺ¯¼þ£¬ÎļþµÄ¹¦·òÁìÓòΪ2019Äê1ÔÂÖÁ2019Äê6Ô£¬ÓëSecondary Infektion¹¥»÷»î¶¯µÄ¹¦·òÏàÒ»Ö¡£
ÔÎÄÁ´½Ó£º
https://www.recordedfuture.com/operation-pinball-tactics/
4.×êÑлú¹¹°ä²¼ÒÁÀʵý±¨»ú¹¹ÓëAPT¹¥»÷µÄ¸ú×ٻ㱨
Recorded FutureµÄInsikt GroupÍŶӰ䲼¹ØÓÚÒÁÀʽø¹¥ÐÔÍøÂç×éÖ¯½á¹¹µÄ·ÖÎö»ã±¨£¬¸Ã»ã±¨ÓÐÖúÓÚ¸üÉî¿ÌµØÏàʶ²Î¼ÓÒÁÀʽø¹¥ÐÔÍøÂç´òËãµÄÖØÒª¾üʺ͵ý±¨»ú¹¹¡£¸Ã»ã±¨×êÑÐÁËÔ̺¬°Í˹»ù£¨Basij£©ÔÚÄÚµÄÒÁ˹À¼¸ïÃüÎÀ¶Ó£¨IRGC£©¡¢µý±¨ºÍ°²È«Êý£¨MOIS£©ÒÔ¼°¹ú·ÀºÍÎä×°¶ÓÁкóÇÚ²¿£¨MODAFL£©¡£Ö»¹Ü¸Ã»ã±¨½¨ÒéÔڿ϶¨ÊýÁ¿µÄAPT×éÖ¯ÓëijЩµý±¨×éÖ¯Ö®¼ä³ÉÁ¢ÁªÏµ£¬µ«ÓÉÓÚ¶ÔijЩ×éÖ¯µÄÐÅÏ¢²»¼°£¬×êÑÐÈËÔ±ÎÞ·¨½«Æä¹éÒòµ½Ìض¨µÄ»ú¹¹¡£
ÔÎÄÁ´½Ó£º
https://www.recordedfuture.com/iran-cyber-operations-structure/
5.FireEye°ä²¼·ì϶ÀûÓÃÓë²¹¶¡ÖÎÀí·ÖÎö»ã±¨µÄµÚ¶þ²¿ÃÅ
FireEye MandiantÍþвµý±¨²¿ÃÅÕë¶Ô2018ÄêºÍ2019ÄêµÄ·ì϶ÀûÓýøÐеÄ×êÑÐÅú×¢£¬´óÎÞÊýÒ°±íÀûÓö¼²úÉúÔÚ²¹¶¡°ä²¼Ö®Ç°»ò²¹¶¡¿ÉÓúóµÄ¼¸ÌìÄÚ¡£×êÑÐÍŶӷÖÎöÁËÔÚ2018ÄêµÚÒ»¼¾¶Èµ½2019ÄêµÚÈý¼¾¶ÈÖ®¼äÒѱ»ÀûÓûò·ÖÅäÁËCVEºÅµÄ60¸ö·ì϶£¬´óÎÞÊý·ì϶ÀûÓö¼ÊÇ0day-ÔÚ²¹¶¡°ä²¼Ö®Ç°¡£ÔÚ²¹¶¡°ä²¼Ö®ºóµÄÒ»¸öÔÂÄÚ£¬Óг¬¹ýËÄ·ÖÖ®Ò»µÄ·ì϶±»ÀûÓ᣷ì϶Åû¶Óë²¹¶¡¿ÉÓÃÖ®¼äµÄ¾ùÔȹ¦·òԼΪ9Ìì¡£¶ÔÓÚ·Ç0day·ì϶£¬ÔÚ²¹¶¡°ä²¼µ½³õ´Î·¢ÏÖ¹¥»÷ÕßÀûÓÃÖ®¼äµÄ´°¿ÚºÜÓ×£¬Í¨³£Ö»Óм¸Ó×ʱµ½ÊýÌì¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2020/04/time-between-disclosure-patch-release-and-vulnerability-exploitation.html
6.³¬¹ý50ÍòZoomÕË»§Í´´¦ÔÚ°µÍøÂÛ̳ÏúÊÛ
Íþвµý±¨³§ÉÌCyble·¢ÏÖ³¬¹ý50Íò¸öZoomÕË»§ÔÚ°µÍøÂÛ̳ÉÏÏúÊÛ£¬¾ùÔÈÊÛ¼Û²»¼°1ÃÀ·Ö£¬ÔÚijЩÇé¿öÏÂÉõÖÁÊÇÃâ·ÑµÄ¡£×êÑÐÈËÔ±³ÆÔ¼ÄªÔÚ4ÔÂ1ÈÕËûÃÇÆðÍ·ÔÚºÚ¿ÍÂÛ̳ÉÏ¿´µ½Ãâ·ÑµÄZoomÕË»§£¬ÕâЩÕË»§µÄÍ´´¦ÊÇͨ¹ýײ¿â¹¥»÷ÍøÂçµÄ¡£Cyble¿ÉÄܲɰì´óÁ¿µÄÓû§ÕË»§£¬Ô̺¬Êܺ¦Õߵĵç×ÓÓʼþµØÖ·¡¢ÃÜÂë¡¢Ó×ÎÒ»áÒéURL¼°ÆäHostKey¡£²¿ÃÅÕË»§ÊôÓÚĦ¸ù´óͨ¡¢»¨ÆìÒøÐÓ×¢³ÛÃû½ÌÓý»ú¹¹µÈ×éÖ¯µÄÕË»§¡£Óû§Äܹ»Í¨¹ýÊý¾Ýй¶֪ͨ·þÎñHave I Been PwnedÍøÕ¾ºÍCybleµÄAmIBreached²é³×Ô¼ºµÄÓʼþµØÖ·ÊÇ·ñй¶¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/over-500-000-zoom-accounts-sold-on-hacker-forums-the-dark-web/


¾©¹«Íø°²±¸11010802024551ºÅ