RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£»£»£»ÃÀ¹ú·Ò×˹°²ÄÇÖÝÒòÔâÀÕË÷Èí¼þ¹¥»÷Ðû²¼½øÈë½ôÆÈ״̬

Ðû²¼Ê±¼ä 2019-07-26
1¡¢RiskIQÐû²¼2019»¥ÁªÍø·¸·¨±¨¸æ£¬ £¬£¬£¬Ã¿·ÖÖÓËðʧ290ÍòÃÀÔª


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤RiskIQµÄÊý¾Ý£¬ £¬£¬£¬È¥ÄêÍøÂç·¸·¨·Ö×Óÿ·ÖÖÓ¸øÈ«Çò¾­¼ÃÔì³É290ÍòÃÀÔªµÄËðʧ£¬ £¬£¬£¬ÕûÄê×ܼÆÔì³É1.5ÍòÒÚÃÀÔªµÄËðʧ¡£¡£¡£ÆäËüÊý¾Ý°üÀ¨£¬ £¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùÿ·ÖÖÓµÄËðʧ´ï1930ÃÀÔª£»£»£»´¹ÂÚ¹¥»÷ÿ·ÖÖÓÔì³ÉµÄËðʧ´ï17700ÃÀÔª£»£»£»2019ÄêÈ«ÇòÀÕË÷Èí¼þÊÂÎñµÄÔ¤¼Æ±¾Ç®ÎªÃ¿·ÖÖÓ22184ÃÀÔª£»£»£»Ã¿·ÖÖÓй¶µÄÉí·ÝÊý¾ÝÌõÊýΪ8100Ìõ£»£»£»Ã¿·ÖÖÓ¼ì²âµ½µÄ¶ñÒâÖØ¶¨ÏòΪ7¸öµÈ¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/external-threat-management/2019-evil-internet-minute/


2¡¢ÃÀ¹ú·Ò×˹°²ÄÇÖÝÒòÔâÀÕË÷Èí¼þ¹¥»÷Ðû²¼½øÈë½ôÆÈ״̬


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÃÀ¹ú·Ò×˹°²ÄÇÖÝÖݳ¤John EdwardsÔÚÒ»²¨Õë¶Ô¸ÃÖÝÑ§ÇøµÄÀÕË÷Èí¼þ¹¥»÷À˳±ºóÐû²¼½øÈë½ôÆÈ״̬£¬ £¬£¬£¬¸Ã½ôÆÈÉùÃ÷½«ÔÊÐí·Ò×˹°²ÄÇÖݵÄÇ徲ר¼ÒºÍÏà¹Ø×ÊԴЭÖúÍâµØÕþ¸®»ú¹¹±£»£»£»¤ÆäÍøÂç¡£¡£¡£½öÔÚ7Ô·ݣ¬ £¬£¬£¬¸ÃÖݾÍÓÐËĸöÑ§ÇøÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬µ¼ÖÂÆäÅÌËã»úϵͳºÍµç»°ÏµÍ³ÖÐÖ¹£¬ £¬£¬£¬ÕâËĸöÑ§Çø»®·ÖÊÇMorehouse¡¢Sabine¡¢Monroe CityºÍOuachita¡£¡£¡£¸Ã½ôÆÈÉùÃ÷»¹ÒªÇóËùÓÐÊÜÀÕË÷Èí¼þ¹¥»÷Ó°ÏìµÄÕþ¸®»ú¹¹ÏòÖݹÙÔ±±¨¸æ£¬ £¬£¬£¬²¢ÏÞÖÆÇå¾²¹«Ë¾ÔÚ½ôÆÈÇéÐÎÏÂÌá¼Û¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ransomware-attacks-prompt-louisiana-to-declare-state-of-emergency/


3¡¢Ó¢¹úµçÐŹ«Ë¾SkyÔÚÔâÊÜײ¿â¹¥»÷ºóÖØÖÃÓû§ÃÜÂë


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÔÚÉϸöÔÂÔ⵽ײ¿â¹¥»÷Ö®ºó£¬ £¬£¬£¬Ó¢¹úµçÐŹ«Ë¾SkyËø¶¨ÁËÓû§µÄÕË»§²¢ÒªÇóËûÃÇÖØÖÃÃÜÂë¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ´ËÏî²½·¥ÊÇÔ¤·À²½·¥£¬ £¬£¬£¬ÕâЩ±»Ëø¶¨µÄSky.comÓû§ÕË»§Ã»Óб»ºÚ¿ÍÈëÇÖ¡£¡£¡£ÕâЩÓû§½«»áÊÕµ½¸Ã¹«Ë¾µÄµç×ÓÓʼþ֪ͨ£¬ £¬£¬£¬ÒªÇóËûÃÇ»á¼û¹«Ë¾ÍøÕ¾»ò²¦´òµç»°ÒÔ½âËøËûÃǵÄÕË»§£¬ £¬£¬£¬²¢Í¨¹ýһϵÁÐ°ì·¨ÖØÖÃÕË»§ÃÜÂë¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/credentials-stuffing-attack-prompts-password-resets-for-sky-customers/


4¡¢ºÚ¿ÍÀÄÓÃÎļþ¹²ÏíЧÀÍWeTransfer·Ö·¢À¬»øÓʼþ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


CofenseÇå¾²Ñо¿Ô±Jake Longden·¢Ã÷¹¥»÷ÕßÕýÔÚÀÄÓÃÎļþ¹²ÏíЧÀÍWeTransferÀ´·Ö·¢À¬»øÓʼþ£¬ £¬£¬£¬ÒÔÈÆ¹ýÇå¾²Íø¹ØµÄ¼ì²â¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬ £¬£¬£¬ºÚ¿Í½«Öض¨Ïòµ½´¹ÂÚÒ³ÃæµÄHTM»òHTMLÎļþÉÏ´«ÖÁWeTransferЧÀÍ£¬ £¬£¬£¬²¢Í¨¹ýµç×ÓÓʼþ½«¸ÃÁ´½Ó¹²Ïí¸øÄ¿µÄÓû§¡£¡£¡£¸Ã´¹ÂÚÕ¾µãÓÃÓÚÇÔÈ¡Óû§µÄOffice365µÇ¼ƾ֤¡£¡£¡£Ñо¿Ö°Ô±ÊӲ쵽ʹÓøÃÒªÁìÕë¶ÔÒøÐС¢µçÁ¦ºÍýÌåÐÐÒµµÄ¹¥»÷ÕýÔÚÔöÌí¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/popular-file-sharing-service-wetransfer-used-in-malicious-spam-campaigns/146671/


5¡¢¶íÂÞ˹¹ú·À³Ð°üÉÌ¿ª·¢µÄ¶ñÒâÈí¼þMonokleÔÚÒ°ÍâÈö²¥


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


LookoutÑо¿Ö°Ô±·¢Ã÷Ò»¸öеÄÒÆ¶¯Ìع¤Èí¼þMonokle£¬ £¬£¬£¬¸ÃÌØ¹¤Èí¼þ¾Ý³ÆÊÇÓɶíÂÞ˹¹ú·À³Ð°üÉÌSpecial Technology Center Ltd.¿ª·¢µÄ£¬ £¬£¬£¬×Ô2016Äê3ÔÂÒÔÀ´¾ÍÔÚÒ°ÍâÈö²¥¡£¡£¡£MonokleÖ÷ÒªÃé×¼AndroidÊÖ»ú£¬ £¬£¬£¬µ«ÊÊÓÃÓÚiOSµÄ°æ±¾Ò²ÔÚ¿ª·¢ÖС£¡£¡£¸Ã¶ñÒâÈí¼þµÄ¹¦Ð§Ê®·Öǿʢ£¬ £¬£¬£¬°üÀ¨78ÖÖ²î±ðµÄÔ¤½ç˵ÏÂÁî¡£¡£¡£Æ¾Ö¤LookoutÑо¿Ö°Ô±µÄ˵·¨£¬ £¬£¬£¬Monokle±»ÓÃÓÚÕë¶Ô¶«Å·¡¢ÐðÀûÑÇÒÔ¼°ÖÐÑǹú¼ÒµÄ¸ß¼ÛֵĿµÄ¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/russian-android-spying-apps.html


6¡¢WatchbogбäÖÖ¿ÉɨÃèÒ×ÊÜBlueKeep¹¥»÷µÄϵͳ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Intezer LabsÑо¿ÍŶӷ¢Ã÷WatchBogµÄбäÖÖʵÏÖÁËÒ»¸öBlueKeepÎó²îɨÃèÄ£¿£¿£¿£¿£¿é£¬ £¬£¬£¬ÕâÒâζ×ÅWatchBogÕýÔÚ×¼±¸Ò»·ÝÒ×Êܹ¥»÷µÄϵͳµÄÁÐ±í£¬ £¬£¬£¬ÒÔ±ãÔÚδÀ´¶¨Î»»ò³öÊÛ¸øµÚÈý·½ÒÔ»ñÈ¡ÀûÈ󡣡£¡£¸ÃбäÖÖÔÚѬȾÅÌËã»úºó£¬ £¬£¬£¬½«´ÓC2ЧÀÍÆ÷ÌṩµÄÁбíÖÐɨÃèËùÓÐIPµØµã£¬ £¬£¬£¬Íê³ÉɨÃèÀú³Ìºó£¬ £¬£¬£¬ÔÙ½«É¨Ãèµ½µÄÒ×Êܹ¥»÷µÄÖ÷»úÁбíͨ¹ýRC4¼ÓÃܵÄÊ®Áù½øÖÆ×Ö·û´®·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£Ä¿½ñWatchBog»¹Î´±»ÓÃÓÚÆÆËðÐÔµÄÄ¿µÄ£¬ £¬£¬£¬Æä×îÖÕÄ¿µÄÊǾÙÐÐÍڿ󡣡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/