KasperskyÐû²¼2020ÄêµÚÒ»¼¾¶ÈDDoS¹¥»÷Ç÷ÊÆ±¨¸æ£»£»µÂÖÝ·¨ÔºÏµÍ³ÔâÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2020-05-12

1.KasperskyÐû²¼2020ÄêµÚÒ»¼¾¶ÈDDoS¹¥»÷Ç÷ÊÆ±¨¸æ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


KasperskyÐû²¼ÁË2020ÄêµÚÒ»¼¾¶ÈDDoS¹¥»÷Ç÷ÊÆ±¨¸æ¡£¡£¡£ ¡£¡£Æ¾Ö¤±¨¸æÐÎò£¬£¬£¬ £¬£¬£¬µÚÒ»¼¾¶ÈÊܵ½DDoS¹¥»÷×î¶àµÄÊÇÒ½ÁÆ×éÖ¯¡¢½»¸¶Ð§ÀÍÒÔ¼°ÓÎÏ·ºÍ½ÌÓýÆ½Ì¨ÍøÕ¾£¬£¬£¬ £¬£¬£¬ÀýÈ磬£¬£¬ £¬£¬£¬3ÔÂÖÐÑ®¹¥»÷ÕßÊÔͼ¹¥»÷ÃÀ¹úÎÀÉúÓ빫¹²Ð§ÀͲ¿£¨HHS£©ÍøÕ¾¡£¡£¡£ ¡£¡£²¢ÇÒ£¬£¬£¬ £¬£¬£¬Ïà±ÈÓÚÉÏÒ»¼¾¶È£¬£¬£¬ £¬£¬£¬±¾¼¾¶ÈDDoS¹¥»÷µÄÊýÄ¿ºÍÖÊÁ¿¾ùÏÔÖøÔöÌí£¬£¬£¬ £¬£¬£¬¹¥»÷Ò»Á¬Ê±¼äÒ²ÓÐËù¼Ó³¤¡£¡£¡£ ¡£¡£Õë¶Ô½ÌÓýºÍÐÐÕþÐÐÒµµÄDDoS¹¥»÷ÊýÄ¿Óë2019ÄêͬÆÚÏà±ÈÔöÌíÁËÁ½±¶£¬£¬£¬ £¬£¬£¬Îª19£¥¡£¡£¡£ ¡£¡£½©Ê¬ÍøÂçÂþÑÜ×î¶àµÄ¹ú¼ÒΪ°ÍÎ÷£¬£¬£¬ £¬£¬£¬ÆäIPµØµãÕ¼12.25£¥£¬£¬£¬ £¬£¬£¬Æä´ÎÊÇÖйú£¨11.51£¥£©ºÍ°£¼°£¨7.87£¥£©¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/ddos-attacks-in-q1-2020/96837/


2.µÂÖÝ·¨ÔºÏµÍ³ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬£¬ÍøÂç±»ÆÈ½ûÓÃ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


µÂ¿ËÈøË¹ÖÝ˾·¨²¿·ÖÓÚ5ÔÂ11ÈÕ½ÒÏþÉùÃ÷£¬£¬£¬ £¬£¬£¬ÆäÉÏËß·¨ÔººÍÖÝ˾·¨»ú¹¹µÄ·¨ÔºÖÎÀí°ì¹«ÊÒ£¨OCA£©ÔÚ·ÖÖ§»ú¹¹ÍøÂç·¢Ã÷ÁËÒ»´ÎÑÏÖØµÄÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬ £¬£¬£¬±¬·¢Ê±¼äΪ5ÔÂ8ÈÕÍíÉÏ£¬£¬£¬ £¬£¬£¬²¢È·ÒÔΪÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬£¬Êܵ½Ó°ÏìµÄÍøÕ¾ºÍЧÀÍÆ÷ËùÔڵķÖÖ§ÍøÂçÒѾ­±»½ûÓ㬣¬£¬ £¬£¬£¬ÒÔ±ÜÃâ¶ñÒâÈí¼þÈö²¥µ½ÆäËûϵͳ£¬£¬£¬ £¬£¬£¬¸ÃÍøÂç»áÒ»Ö±¼á³Ö½ûÓÃ״ֱ̬µ½ÎÊÌâ½â¾ö¡£¡£¡£ ¡£¡£OCAÌåÏÖÕýÔÚÊÓ²ì´ËÊ£¬£¬£¬ £¬£¬£¬²¢ÊÔͼ»Ö¸´ÊÜÓ°ÏìÊý¾Ý£¬£¬£¬ £¬£¬£¬¶øÓÉÓڱ༭ºÍ¹²ÏíÎļþµÄЭ×÷¹¤¾ßÒÔ¼°µç×ÓÓʼþÒÑǨáãÖÁÔÆÏµÍ³ÖУ¬£¬£¬ £¬£¬£¬Òò¶øÎ´Êܵ½Ó°Ï죬£¬£¬ £¬£¬£¬Ê¹²¿·Ö·ÖÖ§»ú¹¹ºÍ·¨ÔºÄܹ»¼ÌÐø¿ªÕ¹ÓªÒµºÍÈÕ³£»£»î¶¯¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/texas-courts-hit-by-ransomware-network-disabled-to-limit-spread/


3.ÀÕË÷Èí¼þSodinokibiй¦Ð§£¬£¬£¬ £¬£¬£¬¿É¼ÓÃÜËø¶¨µÄÎļþ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÀÕË÷Èí¼þSodinokibiÐÂÔöÁËÒ»ÏЧ£¬£¬£¬ £¬£¬£¬¼´¿ÉÒÔ¼ÓÃÜÕýÔÚ±»ÁíÒ»¸öÀú³Ì·­¿ª»òËø¶¨µÄÎļþ£¬£¬£¬ £¬£¬£¬¸Ã¹¦Ð§Ê¹Ëü¿ÉÒÔ¶ÔÊܺ¦Õߵĸü¶àÎļþ¾ÙÐмÓÃÜ¡£¡£¡£ ¡£¡£Êý¾Ý¿â»òÓʼþЧÀÍÆ÷ͨ³£»£»áËø¶¨ËüÃÇÒÑ·­¿ªµÄÎļþ£¬£¬£¬ £¬£¬£¬ÒÔ·ÀÊý¾ÝÒòÁ½¸öͬʱдÈëÎļþµÄÀú³Ì¶øÆÆË𣬣¬£¬ £¬£¬£¬Í¬Ê±»¹¿ÉÒÔ±ÜÃâÀÕË÷Èí¼þ¶ÔËüÃǾÙÐмÓÃÜ¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±·¢Ã÷SodinokibiÏÖÔÚÕýÔÚʹÓÃWindows Restart Manager  APIÀ´¹Ø±ÕÆäËûÀú³Ì£¬£¬£¬ £¬£¬£¬´Ó¶øÊÍ·ÅËø¶¨ÎļþÒÔ¾ÙÐмÓÃÜ¡£¡£¡£ ¡£¡£Òò´Ë£¬£¬£¬ £¬£¬£¬SodinokibiÏÖÔÚÄܹ»¼ÓÃܸü¶àÎļþ£¬£¬£¬ £¬£¬£¬ÓÈÆäÊÇÒªº¦Îļþ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sodinokibi-ransomware-can-now-encrypt-open-and-locked-files/


4.΢ÈíºÍÓ¢ÌØ¶ûÁªºÏÑо¿¼ì²â¶ñÒâÈí¼þµÄÐÂÒªÁìSTAMINA


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


΢ÈíºÍÓ¢ÌØ¶û×î½üÏàÖú¿ªÕ¹ÁËÃûΪSTAMINAµÄÑо¿ÏîÄ¿£¬£¬£¬ £¬£¬£¬Ö¼ÔÚ̽Ë÷¼ì²âºÍ·ÖÀà¶ñÒâÈí¼þµÄÐÂÒªÁì¡£¡£¡£ ¡£¡£¸ÃÏîÄ¿ÒÀÀµÓÚÒ»ÖÖÐÂÊÖÒÕ£¬£¬£¬ £¬£¬£¬½«¶ñÒâÈí¼þÑù±¾×ª»»³É»Ò¶ÈͼÏñ£¬£¬£¬ £¬£¬£¬È»ºóɨÃèͼÏñ£¬£¬£¬ £¬£¬£¬Ñ°ÕÒÌØ¶¨ÓÚ¶ñÒâÈí¼þÑù±¾µÄÎÆÀíºÍ½á¹¹Ä£Ê½¡£¡£¡£ ¡£¡£Ê×ÏÈ»ñÈ¡ÊäÈëÎļþ²¢½«Æä¶þ½øÖÆÐÎʽת»»ÎªÔ­Ê¼ÏñËØÊý¾ÝÁ÷£¬£¬£¬ £¬£¬£¬È»ºó½«¸ÃһάÏñËØÁ÷ת»»Îª2DÕÕÆ¬£¬£¬£¬ £¬£¬£¬ÒÔ±ãͼÏñÆÊÎöËã·¨¶ÔÆä¾ÙÐÐÆÊÎö¡£¡£¡£ ¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬ £¬£¬£¬ËüÌṩÁË220Íò¸öÊÜѬȾPEÎļþµÄ¹þÏ£Ñù±¾×÷Ϊ¸ÃÑо¿µÄ»ù´¡£¬£¬£¬ £¬£¬£¬ÏÖÔÚ£¬£¬£¬ £¬£¬£¬STAMINAÔÚʶ±ðºÍ·ÖÀà¶ñÒâÈí¼þÑù±¾·½Ãæ×¼È·ÐԸߴï99.07£¥£¬£¬£¬ £¬£¬£¬Îó±¨ÂÊΪ2.58£¥¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-and-intel-project-converts-malware-into-images-before-analyzing-it/


5.Õë¶Ô¶íÂÞ˹µÄ´¹ÂÚ¹¥»÷ÔöÌí10±¶£¬£¬£¬ £¬£¬£¬Ç±ÔÚËðʧΪ4050ÍòÃÀÔª


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤KasperskyʵÑéÊÒµÄÑо¿£¬£¬£¬ £¬£¬£¬Õë¶Ô¶íÂÞ˹µÄÍøÕ¾Õ©Æ­¹¥»÷´ÎÊýÔöÌíÁË10±¶£¬£¬£¬ £¬£¬£¬µÖ´ï1500Íò£¬£¬£¬ £¬£¬£¬²¢ÇÒ´ËÀàÍøÕ¾µÄÊýĿҲÔöÌíÁËÒ»±¶£¬£¬£¬ £¬£¬£¬µÖ´ï10000¡£¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬£¬×¨¼Ò²¢Ã»ÓÐ˵¶íÂÞ˹Òò´Ë¹¥»÷ËðʧÁ˼¸¶à£¬£¬£¬ £¬£¬£¬µ«¼ÙÉèÿ¸öÕ©Æ­ÍøÕ¾¶¼ÓÐÖÁÉÙÒ»¸öÓû§ÊÜÆ­£¬£¬£¬ £¬£¬£¬ÄÇô2020ÄêµÚÒ»¼¾¶ÈµÄDZÔÚËðʧ¿ÉÄÜ»áÁè¼Ý30ÒÚ¬²¼£¨4050ÍòÃÀÔª£©¡£¡£¡£ ¡£¡£ÊµÑéÊ񵀮ÊÎöʦTatyana SidorinaÌåÏÖ£¬£¬£¬ £¬£¬£¬Î±×°³É¹ú¼Ò²ÊƱµÄ¹¥»÷¾ÍÓÐ219ÖÖ£¬£¬£¬ £¬£¬£¬¶øÔÚÈ¥Äê»ù±¾ÉÏûÓдËÀ๥»÷¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/05/russians-began-to-click-on-scam-sites.html


6.ÒßÇéÔµ¹ÊÔ­ÓÉ£¬£¬£¬ £¬£¬£¬Black HatºÍDEF CON½«ÒÔÊÓÆµ¾Û»áÐÎʽ¾ÙÐÐ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÓÉÓÚCOVID-19£¬£¬£¬ £¬£¬£¬Ò»ÄêÖÐ×î´óµÄÁ½´ÎÍøÂçÇå¾²¾Û»áBlack HatºÍDEF CON×÷·ÏÁËÏßϵĻ£¬£¬£¬ £¬£¬£¬²¢Ðû²¼½ÓÄÉÊÓÆµ¾Û»áµÄÐÎʽ¾ÙÐС£¡£¡£ ¡£¡£ÔçÏÈ£¬£¬£¬ £¬£¬£¬Á½³¡¾Û»áÍýÏëÓÚ2020Äê8ÔÂÔÚÀ­Ë¹Î¬¼Ó˹¾ÙÐУ¬£¬£¬ £¬£¬£¬Black Hat 8ÔÂ1ÈÕÖÁ8ÔÂ6ÈÕ£¬£¬£¬ £¬£¬£¬DEF CON 8ÔÂ7ÈÕÖÁ8ÔÂ9ÈÕ¡£¡£¡£ ¡£¡£ØÊºóÓÉÓÚÒßÇé¸ÄΪÏßÉÏģʽ£¬£¬£¬ £¬£¬£¬µ«ÈÕÆÚÉÐδ¸ü¸Ä£¬£¬£¬ £¬£¬£¬Á½¸ö¾Û»áÍýÏ뽫ÔÚÆäÏÈǰÐû²¼µÄÈÕÆÚ¾ÙÐУ¬£¬£¬ £¬£¬£¬²¢»áʵʱֱ²¥Óë²Î»áÕߵĶԻ°¡£¡£¡£ ¡£¡£DEF CON˾ÀíJeff Moss ÌåÏÖ£¬£¬£¬ £¬£¬£¬Ã÷ÄêµÄ¾Û»áÍýÏëΪÏÖ³¡»î¶¯£¬£¬£¬ £¬£¬£¬ÓÚ2021Äê8ÔÂ5ÈÕÖÁ8ÈÕ¾ÙÐС£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/black-hat-and-def-con-security-conferences-to-take-place-in-a-virtual-format/