Upstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·£»£»£»£»Ó¢¹úÕþ¸®ÖØÐÂÊÓ²ìÂ×¶ØÖ¤È¯ÉúÒâËùÈ¥Äêå´»úÊÂÎñ
Ðû²¼Ê±¼ä 2020-01-07
1.Upstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·
Upstream Security2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·»ùÓÚ¶ÔÒÑÍùÊ®ÄêÖÐ367Æð¹ûÕæ±¨¸æµÄÆû³µÍøÂçÇå¾²ÊÂÎñ¾ÙÐÐÆÊÎö£¬£¬£¬£¬£¬£¬ÖصãÇ¿µ÷ÁË2019Äêʱ´ú·¢Ã÷µÄÎó²îÓë¿´·¨¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬»¥ÁªÍøÆû³µÒÑÔÚ½ÓÊÜÆû³µÊг¡£¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓÐ3.3ÒÚÁ¾»¥ÁªÍøÆû³µ£¬£¬£¬£¬£¬£¬ÕâÒâζ×Åÿ´Î¹¥»÷µÄDZÔÚÆÆËðÁ¦³É±¶ÔöÌí£¬£¬£¬£¬£¬£¬´ó¹æÄ£µÄ¹¥»÷ÊÂÎñ¿ÉÄÜ»áÆÆËðÕû¸ö¶¼»á£¬£¬£¬£¬£¬£¬ÉõÖÁµ¼ÖÂÔÖÄÑÐÔµÄÉúÃüËðʧ¡£¡£¡£¡£¡£¡£¡£×Ô2016ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬Ã¿ÄêÆû³µÍøÂçÇå¾²ÊÂÎñµÄÊýÄ¿ÔöÌíÁË605%£¬£¬£¬£¬£¬£¬½ö2019ÄêÒ»Äê¾ÍÔöÌíÁËÒ»±¶ÒÔÉÏ¡£¡£¡£¡£¡£¡£¡£ÔÚ2019Ä꣬£¬£¬£¬£¬£¬ÓÐ57%µÄÊÂÎñÊÇÓÉÍøÂç×ï·¸¾ÙÐе쬣¬£¬£¬£¬£¬ÆäÄ¿µÄÊÇÆÆËðÓªÒµ¡¢ÇÔÈ¡¿î×Ó»òË÷ÒªÊê½ð¡£¡£¡£¡£¡£¡£¡£½öÓÐ38%ÊÇÑо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬£¬£¬£¬ÆäÄ¿µÄÏò¹«Ë¾ºÍÏûºÄÕß¾¯ÃܸæÏÖµÄÎó²î¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/01/06/automotive-cybersecurity-incidents/
2.΢ÈíÐû²¼RDP±©Á¦¹¥»÷ÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬Æ½¾ùÒ»Á¬Ê±¼äΪ2-3Ìì
΢ÈíÐû²¼ÁËÒ»·ÝÕë¶ÔRDP±©Á¦¹¥»÷µÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬¸ÃÏîÑо¿ÊÇ»ùÓÚ´ÓÁè¼Ý4.5Íò¸ö×°ÖÃÁËÃâ·ÑMicrosoft Defender ATPµÄÊÂÇéÕ¾ÉÏÍøÂçµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÓëʧ°ÜºÍÀֳɵÄRDPµÇ¼ÊÂÎñÓйأ¨»®·ÖÊÇIDΪ4265ºÍ4264µÄWindowsÊÂÎñ£©£¬£¬£¬£¬£¬£¬²¢ÇÒÉæ¼°Óû§/¹¥»÷Õß¿ÉÄÜʹÓõÄÓû§ÃûÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬Êý¾ÝÍøÂçÁ˼¸¸öÔµÄʱ¼ä¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÔÚ±¨¸æÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬×î½üÊӲ쵽µÄRDP±©Á¦¹¥»÷ƽ¾ùÒ»Á¬2-3Ì죬£¬£¬£¬£¬£¬Ô¼90£¥µÄ°¸ÀýÒ»Á¬Ê±¼äÔÚÒ»ÖÜÄÚ£¬£¬£¬£¬£¬£¬Ö»Óв»µ½5£¥µÄ°¸ÀýÒ»Á¬Ê±¼äÔÚÁ½ÖÜ»òÒÔÉÏ¡£¡£¡£¡£¡£¡£¡£Ô¼ÓÐ0.08£¥µÄRDP±©Á¦¹¥»÷ÀֳɾÙÐÐÁ˵Ǽ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/
3.Ó¢¹úÕþ¸®ÖØÐÂÊÓ²ìÂ×¶ØÖ¤È¯ÉúÒâËùÈ¥Äêå´»úÊÂÎñ
Ó¢¹úÕþ¸®ÕýÔÚÖØÐÂÉó²éÂ×¶ØÖ¤È¯ÉúÒâËùÈ¥ÄêµÄå´»úÊÂÎñ£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÆäÊÇ·ñÓëÍøÂç¹¥»÷Óйء£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê8ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬¡°Èí¼þ¹ÊÕÏ¡±µ¼ÖÂÐÇÆÚÎåµÄÔç¼äÉúÒâÕßÔÚÒ»¸ö°ëСʱÒÔÉϵÄʱ¼äÄÚÎÞ·¨ÉúÒâ¹ÉƱ¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñʹµÃ¸»Ê±100ºÍ¸»Ê±250Ö¸Êý¾ùÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£ÆäʱÂ×¶ØÖ¤½»ËùµÄ¹ÙÔ±ÌåÏÖ¡°Èí¼þÊÖÒÕÎÊÌ⡱ÊÇÊÂÎñµÄ»ù´¡Ôµ¹ÊÔÓÉ£¬£¬£¬£¬£¬£¬µ«Ã»ÓÐÌṩÈκνøÒ»²½µÄϸ½Ú¡£¡£¡£¡£¡£¡£¡£µ«Æ¾Ö¤½üÆÚ¡¶»ª¶û½ÖÈÕ±¨¡·µÄ±¨µÀ£¬£¬£¬£¬£¬£¬ÕýÔÚ¾ÙÐеÄÒ»ÏîÊÓ²ìÅú×¢¸ÃÊÂÎñ¿ÉÄܲ»µ«½öÊÇÓÉÓÚÈí¼þÎÊÌâ¡£¡£¡£¡£¡£¡£¡£ÐÂÎÅÈËÊ¿³ÆÓ¢¹úÕþ¸®Í¨Ñ¶×ܲ¿£¨GCHQ£©Ï£ÍûÏàʶ崻úÊÂÎñÊÇ·ñÊÇÓÉÓÚºÚ¿ÍÊÔͼ¡°ÆÆËðÊг¡¡±µ¼Öµġ£¡£¡£¡£¡£¡£¡£ÔÚÒÑÍùÁ½¸öÔÂÖУ¬£¬£¬£¬£¬£¬Ç鱨»ú¹¹ÒÑÁªÏµ¸ÃÉúÒâËù»ñÈ¡ÌØÁíÍâÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/uk-government-investigates-possible-cyberattack-link-to-london-stock-exchange-outage/
4.È¥ÄêѬȾSodinokibiµÄ¼ÓÖÝITЧÀÍÔËÓªÉÌSynoptek¾öÒéÖ§¸¶Êê½ð
¼ÓÀû¸£ÄáÑÇÖݵÄITЧÀÍÉÌSynoptekÔÚѬȾÀÕË÷Èí¼þSodinokibiºó¾öÒéÖ§¸¶Êê½ðÒÔ½âÃÜÆäÎļþ¡£¡£¡£¡£¡£¡£¡£SynoptekÓµÓб鲼¶à¸öÐÐÒµµÄ1100¶à¼Ò¿Í»§£¬£¬£¬£¬£¬£¬°üÀ¨µØ·½Õþ¸®¡¢½ðÈÚЧÀÍ¡¢Ò½ÁƱ£½¡¡¢ÖÆÔìÒµ¡¢Ã½Ìå¡¢ÁãÊÛºÍÈí¼þÐÐÒµ¡£¡£¡£¡£¡£¡£¡£Ñ¬È¾ÊÂÎñ±¬·¢ÔÚÈ¥Äê12ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÊ×ÏÈÈëÇÖÁ˹«Ë¾ÍøÂ磬£¬£¬£¬£¬£¬È»ºó×°ÖÃÁËÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£ÆäʱSynoptek֤ʵÁ˴˴ι¥»÷£¬£¬£¬£¬£¬£¬µ«Ã»ÓнÒÏþ̸ÂÛ¡£¡£¡£¡£¡£¡£¡£SodiniokibiÍÅ»ïËÆºõרעÓÚÕë¶ÔÃÀ¹úITЧÀÍÉÌ£¬£¬£¬£¬£¬£¬2019Äê8ÔÂPercSoft¹«Ë¾Êܵ½Ñ¬È¾£¬£¬£¬£¬£¬£¬12Ô¸öñÒâÈí¼þѬȾÁËComplete Technology SolutionsµÄϵͳÒÔ¼°ÃÀ¹úÖ÷ÒªÊý¾ÝÖÐÐÄÌṩÉÌÖ®Ò»CyrusOne¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/96017/malware/sodinokibi-ransomware-attack.html
5.ChromeÀ©Õ¹Ledge SecureÇÔÈ¡¼ÛÖµ1.6ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò
ƾ֤DecryptµÄ±¨¸æ£¬£¬£¬£¬£¬£¬Chrome¶ñÒâÀ©Õ¹Ledge Secure½øÈëÁËChromeÓ¦ÓÃÊÐËÁ²¢ÀÖ³ÉÇÔÈ¡ÁËÖÁÉÙ¼ÛÖµ1.6ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£¸ÃÀ©Õ¹Éù³Æ¿ÉÒԳ䵱Chromeä¯ÀÀÆ÷ÖеļÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬£¬£¬²¢ÒÔijÖÖ·½·¨Ïë·¨ÈÆ¹ýÁËGoogleµÄ¹ýÂËÆ÷£¬£¬£¬£¬£¬£¬×îÖÕ½øÈëÁËÓ¦ÓÃÊÐËÁ¹©Óû§ÏÂÔØ¡£¡£¡£¡£¡£¡£¡£·¨¹úLedger¹«Ë¾ÔÚTwitterÉÏÈ·ÈÏÁ˸ÃÀ©Õ¹²¢²»ÊÇÕýµ±µÄ£¬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§×èÖ¹ÔÚÆä×°±¸ÉÏ×°ÖøÃÀ©Õ¹¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚGoogleÒѾ´ÓChromeÓ¦ÓÃÊÐËÁÖÐɾ³ýÁ˸ÃÀ©Õ¹¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/shady-google-chrome-extension-steals-16-000-worth-of-cryptocurrency-528762.shtml
6.ÀÕË÷Èí¼þREvilÆð¾¢Õë¶Ôδ´ò²¹¶¡µÄPulse Secure VPNЧÀÍÆ÷
Çå¾²Ñо¿Ö°Ô±±Þ²ßÕýÔÚʹÓÃPulse Secure VPNµÄ×éÖ¯Á¬Ã¦×°ÖÃÐÞ¸´²¹¶¡£¬£¬£¬£¬£¬£¬²»È»ËüÃǽ«ÃæÁÙÀÕË÷Èí¼þREvilµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ó¢¹úÇå¾²Ñо¿Ô±¿ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©Ìá¼°µÄ²¹¶¡ÊÇÃÀ¹úCISA¡¢¹ú¼ÒÇå¾²¾ÖºÍÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄÔÚÈ¥Äê10Ô·ÝÐû²¼µÄÖÒÑÔÖÐÌá¼°µÄÎó²î²¹¶¡£¬£¬£¬£¬£¬£¬°üÀ¨CVE-2019-11510ºÍCVE-2019-11539¡£¡£¡£¡£¡£¡£¡£BeaumontÖ¸³ö£¬£¬£¬£¬£¬£¬Pulse Secure VPNÎó²î¡°ºÜÊÇÑÏÖØ¡±£¬£¬£¬£¬£¬£¬ÓÉÓÚËüÔÊÐíûÓÐÓÐÓÃÆ¾Ö¤µÄÔ¶³Ì¹¥»÷ÕßÔ¶³ÌÅþÁ¬µ½¹«Ë¾ÍøÂ磬£¬£¬£¬£¬£¬½ûÓöàÒòËØÉí·ÝÑéÖ¤ÒÔ¼°ÒÔ´¿Îı¾ÐÎʽԶ³ÌÉó²éÈÕÖ¾»ººÍ´æµÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Çå¾²¹«Ë¾Bad PacketsÓÚ1ÔÂ4ÈÕ¾ÙÐеÄɨÃ裬£¬£¬£¬£¬£¬ÓÐ3825¸öPulse Secure VPNЧÀÍÆ÷ÉÐδÕë¶ÔÎó²îCVE-2019-11510¾ÙÐÐÐÞ¸´£¬£¬£¬£¬£¬£¬ÕâЩÒ×Êܹ¥»÷µÄVPNЧÀÍÆ÷ÖÐÓÐ1300¶à¸öλÓÚÃÀ¹ú¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/


¾©¹«Íø°²±¸11010802024551ºÅ