RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£»ÃÀ¹ú·Ò×˹°²ÄÇÖÝÒòÔâÀÕË÷Èí¼þ¹¥»÷Ðû²¼½øÈë½ôÆÈ״̬

Ðû²¼Ê±¼ä 2019-07-26
1¡¢RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£¬Ã¿·ÖÖÓËðʧ290ÍòÃÀÔª


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ƾ֤RiskIQµÄÊý¾Ý£¬È¥ÄêÍøÂç·¸·¨·Ö×Óÿ·ÖÖÓ¸øÈ«Çò¾­¼ÃÔì³É290ÍòÃÀÔªµÄËðʧ£¬ÕûÄê×ܼÆÔì³É1.5ÍòÒÚÃÀÔªµÄËðʧ ¡£ÆäËüÊý¾Ý°üÀ¨£¬¼ÓÃÜÇ®±ÒÉúÒâËùÿ·ÖÖÓµÄËðʧ´ï1930ÃÀÔª£»´¹ÂÚ¹¥»÷ÿ·ÖÖÓÔì³ÉµÄËðʧ´ï17700ÃÀÔª£»2019ÄêÈ«ÇòÀÕË÷Èí¼þÊÂÎñµÄÔ¤¼Æ±¾Ç®ÎªÃ¿·ÖÖÓ22184ÃÀÔª£»Ã¿·ÖÖÓй¶µÄÉí·ÝÊý¾ÝÌõÊýΪ8100Ìõ£»Ã¿·ÖÖÓ¼ì²âµ½µÄ¶ñÒâÖØ¶¨ÏòΪ7¸öµÈ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/external-threat-management/2019-evil-internet-minute/


2¡¢ÃÀ¹ú·Ò×˹°²ÄÇÖÝÒòÔâÀÕË÷Èí¼þ¹¥»÷Ðû²¼½øÈë½ôÆÈ״̬


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÃÀ¹ú·Ò×˹°²ÄÇÖÝÖݳ¤John EdwardsÔÚÒ»²¨Õë¶Ô¸ÃÖÝÑ§ÇøµÄÀÕË÷Èí¼þ¹¥»÷À˳±ºóÐû²¼½øÈë½ôÆÈ״̬£¬¸Ã½ôÆÈÉùÃ÷½«ÔÊÐí·Ò×˹°²ÄÇÖݵÄÇ徲ר¼ÒºÍÏà¹Ø×ÊԴЭÖúÍâµØÕþ¸®»ú¹¹±£»¤ÆäÍøÂç ¡£½öÔÚ7Ô·Ý£¬¸ÃÖݾÍÓÐËĸöÑ§ÇøÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÆäÅÌËã»úϵͳºÍµç»°ÏµÍ³ÖÐÖ¹£¬ÕâËĸöÑ§Çø»®·ÖÊÇMorehouse¡¢Sabine¡¢Monroe CityºÍOuachita ¡£¸Ã½ôÆÈÉùÃ÷»¹ÒªÇóËùÓÐÊÜÀÕË÷Èí¼þ¹¥»÷Ó°ÏìµÄÕþ¸®»ú¹¹ÏòÖݹÙÔ±±¨¸æ£¬²¢ÏÞÖÆÇå¾²¹«Ë¾ÔÚ½ôÆÈÇéÐÎÏÂÌá¼Û ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ransomware-attacks-prompt-louisiana-to-declare-state-of-emergency/


3¡¢Ó¢¹úµçÐŹ«Ë¾SkyÔÚÔâÊÜײ¿â¹¥»÷ºóÖØÖÃÓû§ÃÜÂë


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÔÚÉϸöÔÂÔ⵽ײ¿â¹¥»÷Ö®ºó£¬Ó¢¹úµçÐŹ«Ë¾SkyËø¶¨ÁËÓû§µÄÕË»§²¢ÒªÇóËûÃÇÖØÖÃÃÜÂë ¡£¸Ã¹«Ë¾ÌåÏÖ´ËÏî²½·¥ÊÇÔ¤·À²½·¥£¬ÕâЩ±»Ëø¶¨µÄSky.comÓû§ÕË»§Ã»Óб»ºÚ¿ÍÈëÇÖ ¡£ÕâЩÓû§½«»áÊÕµ½¸Ã¹«Ë¾µÄµç×ÓÓʼþ֪ͨ£¬ÒªÇóËûÃÇ»á¼û¹«Ë¾ÍøÕ¾»ò²¦´òµç»°ÒÔ½âËøËûÃǵÄÕË»§£¬²¢Í¨¹ýһϵÁÐ°ì·¨ÖØÖÃÕË»§ÃÜÂë ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/credentials-stuffing-attack-prompts-password-resets-for-sky-customers/


4¡¢ºÚ¿ÍÀÄÓÃÎļþ¹²Ïí·þÎñWeTransfer·Ö·¢À¬»øÓʼþ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


CofenseÇå¾²Ñо¿Ô±Jake Longden·¢Ã÷¹¥»÷ÕßÕýÔÚÀÄÓÃÎļþ¹²Ïí·þÎñWeTransferÀ´·Ö·¢À¬»øÓʼþ£¬ÒÔÈÆ¹ýÇå¾²Íø¹ØµÄ¼ì²â ¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬ºÚ¿Í½«Öض¨Ïòµ½´¹ÂÚÒ³ÃæµÄHTM»òHTMLÎļþÉÏ´«ÖÁWeTransfer·þÎñ£¬²¢Í¨¹ýµç×ÓÓʼþ½«¸ÃÁ´½Ó¹²Ïí¸øÄ¿µÄÓû§ ¡£¸Ã´¹ÂÚÕ¾µãÓÃÓÚÇÔÈ¡Óû§µÄOffice365µÇ¼ƾ֤ ¡£Ñо¿Ö°Ô±ÊӲ쵽ʹÓøÃÒªÁìÕë¶ÔÒøÐС¢µçÁ¦ºÍýÌåÐÐÒµµÄ¹¥»÷ÕýÔÚÔöÌí ¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/popular-file-sharing-service-wetransfer-used-in-malicious-spam-campaigns/146671/


5¡¢¶íÂÞ˹¹ú·À³Ð°üÉÌ¿ª·¢µÄ¶ñÒâÈí¼þMonokleÔÚÒ°ÍâÈö²¥


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


LookoutÑо¿Ö°Ô±·¢Ã÷Ò»¸öеÄÒÆ¶¯Ìع¤Èí¼þMonokle£¬¸ÃÌØ¹¤Èí¼þ¾Ý³ÆÊÇÓɶíÂÞ˹¹ú·À³Ð°üÉÌSpecial Technology Center Ltd.¿ª·¢µÄ£¬×Ô2016Äê3ÔÂÒÔÀ´¾ÍÔÚÒ°ÍâÈö²¥ ¡£MonokleÖ÷ÒªÃé×¼AndroidÊÖ»ú£¬µ«ÊÊÓÃÓÚiOSµÄ°æ±¾Ò²ÔÚ¿ª·¢ÖÐ ¡£¸Ã¶ñÒâÈí¼þµÄ¹¦Ð§Ê®·Öǿʢ£¬°üÀ¨78ÖÖ²î±ðµÄÔ¤½ç˵ÏÂÁî ¡£Æ¾Ö¤LookoutÑо¿Ö°Ô±µÄ˵·¨£¬Monokle±»ÓÃÓÚÕë¶Ô¶«Å·¡¢ÐðÀûÑÇÒÔ¼°ÖÐÑǹú¼ÒµÄ¸ß¼ÛֵĿµÄ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/russian-android-spying-apps.html


6¡¢WatchbogбäÖÖ¿ÉɨÃèÒ×ÊÜBlueKeep¹¥»÷µÄϵͳ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Intezer LabsÑо¿ÍŶӷ¢Ã÷WatchBogµÄбäÖÖʵÏÖÁËÒ»¸öBlueKeepÎó²îɨÃèÄ£¿é£¬ÕâÒâζ×ÅWatchBogÕýÔÚ×¼±¸Ò»·ÝÒ×Êܹ¥»÷µÄϵͳµÄÁбí£¬ÒÔ±ãÔÚδÀ´¶¨Î»»ò³öÊÛ¸øµÚÈý·½ÒÔ»ñÈ¡ÀûÈó ¡£¸ÃбäÖÖÔÚѬȾÅÌËã»úºó£¬½«´ÓC2·þÎñÆ÷ÌṩµÄÁбíÖÐɨÃèËùÓÐIPµØµã£¬Íê³ÉɨÃèÀú³Ìºó£¬ÔÙ½«É¨Ãèµ½µÄÒ×Êܹ¥»÷µÄÖ÷»úÁбíͨ¹ýRC4¼ÓÃܵÄÊ®Áù½øÖÆ×Ö·û´®·¢Ë͵½C2·þÎñÆ÷ ¡£Ä¿½ñWatchBog»¹Î´±»ÓÃÓÚÆÆËðÐÔµÄÄ¿µÄ£¬Æä×îÖÕÄ¿µÄÊǾÙÐÐÍÚ¿ó ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/