¡¾ÆÊÎö±¨¸æ¡¿°£ÉÕÜÐû²¼ÍøÂçÇå¾²Íþв±¨¸æ£¬£¬£¬£¬£¬Ç¿µ÷CNIºÍ¹©Ó¦Á´ÖеÄΣº¦
ƾ֤°£ÉÕÜ×îÐÂÐû²¼µÄÍøÂçÇå¾²Íþв±¨¸æ£¬£¬£¬£¬£¬¶ÔÒªº¦»ù´¡ÉèÊ©£¨CNI£©ºÍ¹©Ó¦Á´µÄ¹¥»÷ÒÔ¼°¶ñÒâÍÚ¿ó¹¥»÷Êǵ±½ñÆóÒµÃæÁÙµÄ×î´óÍþв¡£¡£¡£¡£¸Ã±¨¸æ³Æ¹ØÓÚÍøÂç·¸·¨·Ö×Ӻ͹ú¼Ò¼¶¹¥»÷ÕßÀ´ËµCNIÊÇÒ»¸ö¼ÛÖµÔ½À´Ô½¸ßµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬¶ø¹©Ó¦Á´Ôò±»¹¥»÷ÕßÊÓΪÆóÒµÇå¾²Á´Öеı¡Èõ»·½Ú¡£¡£¡£¡£±¨¸æ»¹Ö¸³öÕë¶ÔÃÅÂޱҵȼÓÃÜÇ®±ÒµÄ¶ñÒâÍÚ¿ó¹¥»÷À˳±ºÜÓпÉÄܽ«ÑÓÐøÖÁ2019Äê¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/accenture-cni-and-supply-chains-at/
¡¾ÆÊÎö±¨¸æ¡¿VectraÐû²¼2018¹¥»÷ÕßÐÐΪÇ÷ÊÆ±¨¸æ¼°2018ÖÆÔìÒµ¾Û½¹±¨¸æ
±¾ÖÜÈýVectraÐû²¼2018¹¥»÷ÕßÐÐΪÇ÷ÊÆ±¨¸æºÍ2018ÖÆÔìÒµ¾Û½¹±¨¸æ£¬£¬£¬£¬£¬±¨¸æÖк¸ÇÁ˾ŴóÐÐÒµÖеĹ¥»÷ÕßÐÐΪÇ÷ÊÆ£¬£¬£¬£¬£¬°üÀ¨¿Æ¼¼ÐÐÒµ¡¢Ð§ÀÍÒµ¡¢ÁãÊÛÒµ¡¢ÖÆÔìÒµ¡¢Ò½ÁÆÐÐÒµ¡¢Õþ¸®¡¢ÓéÀÖÒµ¡¢ÄÜÔ´ÒÔ¼°½ÌÓýÐÐÒµ¡£¡£¡£¡£ÆäÖнÌÓýÒµÃæÁÙµÄÍþв×î¶à£¬£¬£¬£¬£¬ÄÜÔ´ÒµÆä´Î£¬£¬£¬£¬£¬ÖÆÔìÒµÅÅÔÚµÚÈý¡£¡£¡£¡£VectraÔÚ¶à¸öÖÆÔ칫˾Öз¢Ã÷ÁË´ó×ÚÍþв£¬£¬£¬£¬£¬ÆäÖаüÀ¨´ó×ÚµÄÄÚ²¿¶ñÒâÐÐΪ£¬£¬£¬£¬£¬ÕâÅú×¢¹¥»÷ÕßÒѾÔÚÆäÍøÂçÄÚ²¿¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/reconnaissance-lateral-movement-soar-manufacturing-industry
¡¾ÆÊÎö±¨¸æ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚDarkHydrusµÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïDarkHydrusµÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£2018Äê6ÔÂ24ÈÕÑо¿ÍŶÓÊӲ쵽DarkHydrusÌᳫµÄÕë¶ÔÖж«Ò»¸ö½ÌÓý»ú¹¹µÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬¸Ã¹¥»÷Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄƾ֤¡£¡£¡£¡£DarkHydrusÔڸô¹ÂÚ¹¥»÷»î¶¯ÖÐʹÓÿªÔ´¹¤¾ßPhishery½¨Éè¶ñÒâµÄÎĵµ¸½¼þ£¬£¬£¬£¬£¬²¢Í¨¹ýC2ЧÀÍÆ÷ÍøÂçÓû§µÄƾ֤¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/08/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east/
¡¾Îó²î²¹¶¡¡¿ISCÐû²¼BINDµÄÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Ò»´¦¿Éµ¼ÖÂDoSµÄÎó²î
ISCÐû²¼DNSÈí¼þBINDµÄÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Ò»¸ö¿Éµ¼ÖÂDoSµÄÇå¾²Îó²î¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2018-5740£©ÊÇÓɽ£ÇÅ´óѧµÄÑо¿Ö°Ô±Tony Finch·¢Ã÷µÄ£¬£¬£¬£¬£¬Ó°ÏìÁ˾ßÓÐdeny-answer-aliases¹¦Ð§µÄЧÀÍÆ÷£¨´Ë¹¦Ð§Ä¬ÈÏ´¦ÓÚ½ûÓÃ״̬£©¡£¡£¡£¡£Àֳɴ¥·¢´ËÎó²îµÄ¹¥»÷Õß½«Ôì³Éname.cÖеÄINSIST¶ÏÑÔʧ°Ü£¬£¬£¬£¬£¬µ¼ÖÂÀú³Ì×èÖ¹ÔËÐк;ܾøÐ§ÀÍ¡£¡£¡£¡£¶à¸öBIND°æ±¾Êܵ½Ó°Ï죬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì¾ÙÐиüС£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75200/security/bind-dns-software-dos.html
¡¾Îó²î²¹¶¡¡¿Î÷ÃÅ×ÓÐû²¼TIA PortalµÄÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´2¸öÇå¾²Îó²î
¹¤¿ØÇå¾²³§ÉÌNozomi NetworksµÄÑо¿Ö°Ô±·¢Ã÷Î÷ÃÅ×ÓSIMATIC STEP7ºÍSIMATIC WinCCµÄTIA Portal±£´æ2¸öÇå¾²Îó²î£¬£¬£¬£¬£¬Ê¹µÃICSÇéÐÎÃæÁÙΣº¦¡£¡£¡£¡£µÚÒ»¸öÎó²î£¨CVE-2018-11453£©ÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâÎļþ´¥·¢¾Ü¾øÐ§ÀÍ»òí§Òâ´úÂëÖ´ÐУ¬£¬£¬£¬£¬µÚ¶þ¸öÎó²î£¨CVE-2018-11454£©ÓëÌØ¶¨TIA PortalĿ¼ÖеIJ»×¼È·ÎļþȨÏÞÉèÖÃÓйء£¡£¡£¡£Î÷ÃÅ×ÓÐû²¼ÁËÏà¹Ø²úÆ·µÄÇå¾²¸üÐÂÒÔÐÞ¸´Õâ2¸öÎó²î¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/flaws-siemens-tool-put-ics-environments-risk
¡¾¹¥»÷ÊÂÎñ¡¿ÃÀÖ°Òµ¸ß¶û·òлáPGAÒÉÔâÀÕË÷Èí¼þBitPaymer¹¥»÷
ƾ֤GolfWeekµÄ±¨µÀ£¬£¬£¬£¬£¬±¾ÖܶþÃÀ¹úÖ°Òµ¸ß¶û·òлᣨPGA£©ÒÉÔâÀÕË÷Èí¼þBitPaymerµÄ¹¥»÷¡£¡£¡£¡£ÓëÀÕË÷Èí¼þSamSamÒ»Ñù£¬£¬£¬£¬£¬BitPaymerÇãÏòÓÚͨ¹ýRDPЧÀÍÈëÇÖÄ¿µÄ×éÖ¯µÄÍøÂ磬£¬£¬£¬£¬²¢ºáÏòÈö²¥ÖÁÿһ̨ÅÌËã»ú¡£¡£¡£¡£¸Ã±äÖÖÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.lockedÀ©Õ¹Ãû£¬£¬£¬£¬£¬²¢ÀÕË÷½Ï¸ßµÄÊê½ð¡£¡£¡£¡£ÔÚÒÑÍùµÄ¼¸ÖÜÄÚBitpaymerÒѾ·ºÆðÁËÊý´ÎÕë¶ÔÆóÒµ¡¢Õþ¸®»ú¹¹ºÍÒ½ÔºµÄ¹¥»÷¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/the-pga-possibly-infected-with-the-bitpaymer-ransomware/