2019Ä깤¿ØÍþв±¨¸æ£»£»£»£»2019ÄêQ2 APT¹¥»÷Ç÷ÊÆ±¨¸æ£»£»£»£»ÃÀ¾ü¹ºÖõĵç×Ó²úÆ·±£´æÇ徲Σº¦

Ðû²¼Ê±¼ä 2019-08-05
1¡¢Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬£¬£¬¾Å´ó·¸·¨ÍÅ»ïרעÓÚICS

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


¹¤¿ØÇå¾²³§ÉÌDragosÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬£¬£¬±¨¸æÖÐÆÊÎöÁËרÃÅÕë¶ÔICSÍøÂçµÄ9¸ö·¸·¨ÍŻ¡£¡£¡£¡£¡£ÆäÖÐ5¸ö·¸·¨ÍÅ»ïÖ÷ÒªÕë¶ÔʯÓͺÍ×ÔÈ»Æø¹«Ë¾£¬£¬£¬£¬°üÀ¨HEXANE¡¢MAGNALLIUM¡¢CHRYSENE¡¢XENOTIMEºÍDYMALLOY£¬£¬£¬£¬ÆäÓà4¸ö·¸·¨ÍÅ»ïÖ÷ÒªÕë¶ÔÄÜÔ´²¿·Ö£¬£¬£¬£¬°üÀ¨ELECTRUM¡¢RASPITE¡¢ALLANITEºÍCOVELLITE¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³öÓÉÓÚ¿ÉÔì³É¸ß¶ÈÕðµ´µÄÕþÖκ;­¼ÃÓ°Ï죬£¬£¬£¬Ê¯ÓͺÍ×ÔÈ»Æø²¿·ÖÈÔÈ»ÃæÁÙÆÆËðÐÔÍøÂç¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf


2¡¢¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ç÷ÊÆ±¨¸æ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


¿¨°Í˹»ùÑо¿ÍŶÓGReATÐû²¼2019ÄêµÚ¶þ¼¾¶ÈµÄAPTÍþв±¨¸æ¡£¡£¡£¡£¡£¡£4Ô·ÝÑо¿ÍŶÓÅû¶ÁËÒ»¸öǰËùδ֪µÄAPT¿ò¼ÜTajMahal£¬£¬£¬£¬TajMahalÔÚÒÑÍùÎåÄêÖÐÒ»Ö±»îÔ¾£¬£¬£¬£¬Æä¼ÓÃܵÄÐéÄâÎļþϵͳÖд洢Á˶à´ï80¸ö¶ñÒâÄ£¿£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£¶«ÄÏÑÇÏòÀ´ÊÇAPT¹¥»÷×îΪ»îÔ¾µÄµØÇø£¬£¬£¬£¬µ«±¾¼¾¶ÈµÄ¹¥»÷»î¶¯Ö÷ÒªÓ뺫¹úÓйأ¬£¬£¬£¬¸ÃµØÇøµÄÆäËü¹ú¼Ò½ÏΪÇå¾²¡£¡£¡£¡£¡£¡£ÔÚÈ«ÇòËùÓеĵØÇø£¬£¬£¬£¬µØÔµÕþÖÎÈÔÈ»ÊÇAPT¹¥»÷µÄÖ÷ÒªÍÆ¶¯Á¦¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/apt-trends-report-q2-2019/91897/


3¡¢±±ÃÀPoshmarkÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¿Í»§ÐÅϢй¶

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

PoshmarkÊDZ±ÃÀµØÇøµÄÒ»¸ö´ò°ç¡¢Ð¬×ÓºÍÅäÊεÄÉúÒâÊг¡£¡£¡£¡£¡£¡£¬£¬£¬£¬¸Ã¹«Ë¾ÓÚ8ÔÂ1ÈÕÅû¶ÁËÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÆäЧÀÍÆ÷ÔâµÚÈý·½Î´ÊÚȨ»á¼û£¬£¬£¬£¬¿Í»§µÄÓû§Ãû¡¢¼ÓÑιþÏ£ÃÜÂë¡¢ÐÕÃû¡¢ÐÔ±ðºÍÆÜÉí¶¼»áµÈÐÅϢй¶¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹¥»÷Õß»¹ÇÔÈ¡ÁËÓû§µÄµç×ÓÓʼþ¡¢É罻ýÌå×ÊÁÏÒÔ¼°´ò°ç³ß´çÆ«ºÃµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£PoshmarkûÓÐ͸¶ÊÂÎñ±¬·¢µÄʱ¼äÒÔ¼°ÊÜÓ°ÏìµÄÈËÊý£¬£¬£¬£¬²¢ÌåÏÖÖ»ÓÐÃÀ¹úµÄÓû§ÊÜÓ°Ï죬£¬£¬£¬¼ÓÄôóÓû§²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/poshmark-clothing-marketplace-says-hacker-stole-customer-details/


4¡¢Ð¶ñÒâÈí¼þSystemBC£¬£¬£¬£¬Í¨¹ýFalloutºÍRIG EK¾ÙÐзַ¢


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ProofpointÑо¿Ö°Ô±·¢Ã÷Ò»¸öеĶñÒâÊðÀíÈí¼þSystemBC£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÖ÷Ҫͨ¹ýFalloutºÍRIG EK¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£SystemBCͨ¹ýSOCKS5ÊðÀíÀ´Òþ²ØÆä¶ñÒâÁ÷Á¿£¬£¬£¬£¬ÓëC2ЧÀÍÆ÷ͨ¹ýHTTPs¾ÙÐÐÅþÁ¬¡£¡£¡£¡£¡£¡£ÓÉÓڸöñÒâÈí¼þ±»ÓÃÓÚ¶à¸ö²î±ðµÄ¹¥»÷»î¶¯£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪ¸Ã¶ñÒâÈí¼þºÜ¿ÉÄÜÔÚ°µÍøÊг¡ÉϾÙÐгöÊÛ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ±¨¸æÖÐÅû¶ÁËÏêϸIoCºÍ¸Ã¶ñÒâÈí¼þµÄ¸ü¶àϸ½Ú¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/89336/malware/systembc-proxy-malware.html


5¡¢PewDiePieºÚ¿Í¹éÀ´£¬£¬£¬£¬Ê¹ÓÃSMSÍø¹ØÎó²î·¢ËÍ´ó×ÚÀ¬»ø¶ÌÐÅ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÔøÐ®ÖÆÉÏÍǫ̀´òÓ¡»úÒÔÍÆ¹ãYouTubeƵµÀPewDiePieµÄºÚ¿ÍÔٴιéÀ´£¬£¬£¬£¬ËûÃÇÊÔͼͨ¹ýSMSÍø¹ØÏµÍ³ÏòÃÀ¹úµÄÿһ²¿ÊÖ»ú·¢ËÍÀ¬»ø¶ÌÐÅ¡£¡£¡£¡£¡£¡£SMSÍø¹ØÍ¨³£ÓÃÓÚ¸¶·Ñ·¢ËͶÌÐÅ£¬£¬£¬£¬²¢ÇÒÌṩһϵÁÐAPI£¬£¬£¬£¬Ö§³Ö¾ç±¾»¯½»»¥¡£¡£¡£¡£¡£¡£ÕâÐ©Íø¹ØµÄÿÌõÐÂÎżÛÇ®½ÏµÍ£¬£¬£¬£¬Òâζ×Å´ó¹æÄ£·¢ËÍÀ¬»ø¶ÌÐŵı¾Ç®Ò²½ÏµÍ¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷ÀàËÆÓÚDDoS¹¥»÷£¬£¬£¬£¬ºÚ¿ÍÉù³ÆÒѾ­Ê¹Óòî±ðµÄÊÖ»úºÍÔËÓªÉ̾ÙÐÐÁ˲âÊÔ£¬£¬£¬£¬Ê¹ÓÃÕâÖÖÎÞÏÞÖÆ·¢ËÍ´ó×ÚÎı¾ÐÂÎŵķ½·¨Ê¹µÃÄ¿µÄAndroidºÍiPhoneËÀ»ú¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.wired.co.uk/article/sms-hack-text-twitter-j3ws3r


6¡¢2018ÄêÃÀ¾ü¹ºÖÃÁ˼ÛÖµ3280ÍòÃÀÔªµç×Ó²úÆ·±£´æÇ徲Σº¦

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ƾ֤ÃÀ¹ú¹ú·À²¿¼à²ì³¤£¨DODIG£©±¨¸æ£¬£¬£¬£¬2018²ÆÄêÃÀ¹ú½¾üºÍ¿Õ¾üÔ±¹¤¹ºÖÃÁ˼ÛÖµÁè¼Ý3280ÍòÃÀÔªµÄ±£´æÒÑÖªÇå¾²Îó²îµÄµç×Ó²úÆ·¡£¡£¡£¡£¡£¡£ÕâЩ²úÆ·°üÀ¨Lexmark´òÓ¡»ú¡¢GoProÏà»úºÍåÚÏëÅÌËã»úµÈ¡£¡£¡£¡£¡£¡£ÆäÖÐÁè¼Ý8000̨Lexmark´òÓ¡»ú±»ÓÃÓÚ½¾üºÍ¿Õ¾üÍøÂ磬£¬£¬£¬×ܼÛÖµÁè¼Ý3000ÍòÃÀÔª¡£¡£¡£¡£¡£¡£DODIGÖ¸³öLexmark´òÓ¡»úÔøÊܵ½20¶à¸öÎó²îµÄÓ°Ï죬£¬£¬£¬°üÀ¨Ã÷ÎÄ´æ´¢ºÍ´«Ê䯾֤ÒÔ¼°ÔÊÐí¶ñÒâ´úÂëÖ´ÐеÈ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/us-military-purchased-32-8m-worth-of-electronics-with-known-security-risks/