ά»ù°Ù¿ÆÔâDDoS¹¥»÷£¬£¬ £¬£¬£¬ÊýСʱºó»Ö¸´ £»£»£»£» £»£»ºÚ¿ÍʹÓÃDoSÎó²îµ¼ÖÂÃÀ¹úµçÍø·À»ðÇ½ÖØ¸´ÖØÆô

Ðû²¼Ê±¼ä 2019-09-10

1.ά»ù°Ù¿ÆÔâDDoS¹¥»÷£¬£¬ £¬£¬£¬ÊýСʱºó»Ö¸´


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ά»ù°Ù¿ÆÔâÊܶñÒâÍøÂç¹¥»÷µ¼Ö¶à¸ö¹ú¼ÒµÄÍøÕ¾å´»úÏÂÏߣ¬£¬ £¬£¬£¬±¾´Î¹¥»÷±¬·¢ÔÚ9ÔÂ8ÈÕÆÆÏþ2µã×óÓÒ£¬£¬ £¬£¬£¬Ö÷ÒªÊܵ½Ó°ÏìµÄÊÇÅ·ÖÞºÍÖж«Óû§¡£¡£¡£¡£¡£¡£ ¡£Î¬»ù°Ù¿Æ»ù½ð»á֤ʵÁ˴˴ι¥»÷²¢Í¨ÖªÓû§Æäר¼ÒÒѾ­ÔÚÆð¾¢»Ö¸´Õý³£ÔËÓª¡£¡£¡£¡£¡£¡£ ¡£Î¬»ù°Ù¿ÆÃ»Óн«¹¥»÷¹éÒòÓÚÌØ¶¨µÄ¹¥»÷Õߣ¬£¬ £¬£¬£¬²¢ÌåÏÖ²»¿Éɨ³ýËü¿ÉÄÜÊDzâÊԿɹ©³ö×âµÄDDoS½©Ê¬ÍøÂç¹¥»÷Á¦µÄÊ÷Ä£ÐÔ¹¥»÷¡£¡£¡£¡£¡£¡£ ¡£Æ¾Ö¤À´×Ô²î±ð¹ú¼ÒµÄÓû§µÄ˵·¨£¬£¬ £¬£¬£¬ÊýСʱºóÒÑ»ù±¾»Ö¸´ÁËÕý³£Ð§ÀÍ£¬£¬ £¬£¬£¬µ«Î¬»ù°Ù¿ÆÉÐδÕýʽȷÈÏÍêÈ«Ïû³ý¸ÃÎÊÌ⣬£¬ £¬£¬£¬ÊÂÎñËÆºõÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/90998/hacking/wikipedia-suffers-ddos-attack.html


2.ºÚ¿ÍʹÓÃDoSÎó²îµ¼ÖÂÃÀ¹úµçÍø·À»ðÇ½ÖØ¸´ÖØÆô


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


±±ÃÀµçÁ¦¿É¿¿ÐÔ¹«Ë¾£¨NERC£©ÉÏÖÜÌåÏÖ½ñÄêÔçЩʱ¼äÓ°ÏìÃÀ¹úµçÍøÊµÌåµÄÍøÂçÇå¾²ÊÂÎñ²¢Ã»ÓÐ×î³õÉèÏëµÄÄÇÑùΣÏÕ¡£¡£¡£¡£¡£¡£ ¡£NERCÔÚÒ»·Ý±¨¸æÖÐÖ¸³ö£¬£¬ £¬£¬£¬ºÚ¿ÍÔÚ2019Äê3ÔÂ5ÈÕʹÓÃDoSÎó²îµ¼ÖµçÍø·À»ðǽÔÚ10СʱÄÚÖØ¸´ÖØÆô£¬£¬ £¬£¬£¬¸ÃÊÂÎñÖ»Ó°ÏìÁËһЩµÍÓ°Ïì¼¶·¢µçÕ¾µãµÄÍøÂçÍâΧ·À»ðǽ£¬£¬ £¬£¬£¬²¢Ã»ÓÐÔì³ÉµçÁ¦¹©Ó¦µÄÈκÎÖÐÖ¹¡£¡£¡£¡£¡£¡£ ¡£ËæºóµÄÆÊÎöÈ·¶¨ÖØÆôÊÇÓÉʹÓÃÒÑÖª·À»ðǽÎó²îµÄÍⲿʵÌåÌᳫµÄ£¬£¬ £¬£¬£¬ÔËÓªÉÌ×îÖÕ·¢Ã÷ËûÃÇδÄÜΪÊܵ½¹¥»÷µÄ·À»ðǽӦÓù̼þ¸üУ¬£¬ £¬£¬£¬ÔÚ²Ù×÷Ô±°²ÅÅÊʵ±µÄ²¹¶¡ºó£¬£¬ £¬£¬£¬·À»ðǽ²»ÔÙÖØÆô¡£¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cyber-security-incident-at-us-power-grid-entity-linked-to-unpatched-firewalls/


3.Telestar±»ÆØTelnetºóÃÅÎó²îÓ°Ïì100¶àÍòIoT×°±¸


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


±¾ÖÜÒ»Vulnerability-LabÑо¿Ô±Benjamin KunzÅû¶Telestar Digital GmbHÎÞÏßµçIoT×°±¸ÖеÄÁ½¸öÑÏÖØÎó²î£¨CVE-2019-13473ºÍCVE-2019-13474£©£¬£¬ £¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÔ¶³ÌÐ®ÖÆÏµÍ³¡£¡£¡£¡£¡£¡£ ¡£ÊÜÓ°ÏìµÄ×°±¸°üÀ¨¸Ã¹«Ë¾µÄImperial£¦DabmanϵÁвúÆ·£¬£¬ £¬£¬£¬ÆäÖаüÀ¨±ãЯʽÊÕÒô»úºÍDABÁ¢ÌåÉùϵͳ¡£¡£¡£¡£¡£¡£ ¡£ÕâЩ²úÆ·Ö÷ÒªÔÚÅ·ÖÞÏúÊÛ£¬£¬ £¬£¬£¬»ùÓÚBusyBox Linux Debian²¢Ê¹ÓÃÀ¶ÑÀºÍ»¥ÁªÍøÅþÁ¬¡£¡£¡£¡£¡£¡£ ¡£Kunz·¢Ã÷ÕâЩװ±¸ÔÚ23¶Ë¿ÚÉÏÆôÓÃÁËTelnetЧÀÍ£¬£¬ £¬£¬£¬µ«Ã»ÓÐÎĵµ¼Í¼£¬£¬ £¬£¬£¬ÓÉÓÚ½ÓÄÉÁËÈõÃÜÂ룬£¬ £¬£¬£¬Ñо¿ÍŶӿÉÒÔÔÚ10·ÖÖÓÄÚ»ñÈ¡root»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±³Æ¿ÉÄÜÓÐÁè¼Ý100Íǫ̀װ±¸ÃæÁÙΣº¦¡£¡£¡£¡£¡£¡£ ¡£

  Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/critical-vulnerabilities-impact-over-a-million-iot-radio-devices/


4.FacebookÐÞ¸´HHVMЧÀÍÆ÷ÖеÄÐÅϢй¶/DoSÎó²î


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


FacebookÐÞ¸´ÆäЧÀÍÆ÷Ó¦ÓóÌÐòÖеÄÁ½¸ö¸ßΣÎó²î£¬£¬ £¬£¬£¬ÕâЩÎó²î¿ÉÄÜÔÊÐíÔ¶³Ì¹¥»÷Õß½öͨ¹ýÉÏ´«¶ñÒâ½á¹¹µÄJPEGͼÏñÎļþÀ´Î´ÊÚȨ»ñÈ¡Ãô¸ÐÐÅÏ¢»òµ¼Ö¾ܾøÐ§ÀÍ¡£¡£¡£¡£¡£¡£ ¡£Îó²î±£´æÓÚHHVM£¨HipHopÐéÄâ»ú£©ÖУ¬£¬ £¬£¬£¬ÓÉÓÚ¸ÃÓ¦ÓóÌÐòÊÇ¿ªÔ´ÇÒÃâ·ÑµÄ£¬£¬ £¬£¬£¬Òò´ËÆäËüʹÓÃHHVMµÄÍøÕ¾¿ÉÄÜÒ²ÊÜÓ°Ï죬£¬ £¬£¬£¬°üÀ¨Wikipedia¡¢BoxµÈ£¬£¬ £¬£¬£¬ÓÈÆäÊÇÄÇЩÔÊÐíÓû§ÔÚЧÀÍÆ÷ÉÏÉÏ´«Í¼ÏñµÄÍøÕ¾¡£¡£¡£¡£¡£¡£ ¡£ÕâÁ½¸öÎó²î°üÀ¨£ºCVE-2019-11925£¬£¬ £¬£¬£¬HHVMµÄGDÀ©Õ¹Öд¦Öóͷ£JPEG APP12¿é±ê¼Çʱ½çÏß¼ì²éȱ·¦£¬£¬ £¬£¬£¬¿Éµ¼Ö»á¼ûÔ½½çÄÚ´æ £»£»£»£» £»£»CVE-2019-11926£¬£¬ £¬£¬£¬ÔÚGDÀ©Õ¹Öд¦Öóͷ£À´×ÔJPEG±êÍ·µÄM_SOFx±ê¼Çʱ½çÏß¼ì²éȱ·¦£¬£¬ £¬£¬£¬¿Éµ¼Ö»á¼ûÔ½½çÄÚ´æ¡£¡£¡£¡£¡£¡£ ¡£½¨ÒéÓû§¾¡¿ì¸üе½×îа汾¡£¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/09/facebook-hhvm-vulnerability.html


5.ÃÀ¹úÍøÂç˾ÁÏòVirusTotalÉÏ´«11¸ö¶ñÒâÈí¼þÑù±¾


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÃÀ¹úÍøÂç˾Á£¨USCYBERCOM£©ÏòVirusTotalÉÏ´«ÁË11¸ö¶ñÒâÈí¼þÑù±¾£¬£¬ £¬£¬£¬ËùÓÐÕâЩÑù±¾¶¼Ó볯ÏÊAPT×éÖ¯LazarusÓйØ¡£¡£¡£¡£¡£¡£ ¡£½«¶ñÒâÑù±¾¹²Ïí¸øÐÅÏ¢Çå¾²ÉçÇøÊÇUSCYBERCOMÍøÂç¹ú¼ÒʹÃü²½¶Ó£¨CNMF£©¿ªÕ¹µÄÏîÄ¿µÄÒ»²¿·Ö£¬£¬ £¬£¬£¬¸ÃÏîÄ¿ÓÚ2018Äê11ÔÂÆô¶¯¡£¡£¡£¡£¡£¡£ ¡£Õâ11¸öÑù±¾Öдó´ó¶¼¶¼ÒÔ32λϵͳ×÷ΪĿµÄ£¬£¬ £¬£¬£¬Ñù±¾²¢²»ÊÇ×îеÄ£¬£¬ £¬£¬£¬ÆäÖÐ10¸öÊÇ2017Ä꽨ÉèµÄ£¬£¬ £¬£¬£¬µÚ11¸öÊÇÔÚ2018Äê2Ô½¨ÉèµÄ¡£¡£¡£¡£¡£¡£ ¡£´ó´ó¶¼Ñù±¾Ò²Óë¶ñÒâ»î¶¯Operation GhostSecretÓйØ£¬£¬ £¬£¬£¬ÕâÊÇÒ»¸öÐÅÏ¢ÇÔÈ¡¹¥»÷»î¶¯£¬£¬ £¬£¬£¬McAfeeÓÚ2018Äê4Ô½«Æä¹é×ïÓÚLazarus¡£¡£¡£¡£¡£¡£ ¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.cyberscoop.com/cyber-command-virus-total-north-korean-malware/


6.¶ñÒâ¹ã¸æÊ¹ÓÃ4¸öEKÏòWindowsÓû§·Ö·¢ÀÕË÷Èí¼þ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Çå¾²Ñо¿Ô±nao_secÔÚÖÜÄ©ÖÁÖÜһʱ´ú·¢Ã÷4¸ö²î±ðµÄ¶ñÒâ¹ã¸æ»î¶¯Ê¹ÓÃEKÏòÓû§·Ö·¢ÀÕË÷Èí¼þ¡¢Ä¾Âí¡¢¼ôÌù°åÐ®ÖÆÆ÷µÈ¡£¡£¡£¡£¡£¡£ ¡£ÖÜÁùnao_secÊӲ쵽GrandSoft EKÔÚ·Ö·¢ÒøÐÐľÂíRamnit£¬£¬ £¬£¬£¬ÖÜÈÕRig EKʹÓÃCVE-2018-15982£¨Flash Player£©¡¢CVE-2018-8174£¨Microsoft IE VBScriptÒýÇæ£©µÈÎó²î·Ö·¢¼ôÌù°åÐ®ÖÆÆ÷¼°AmadeyľÂí¡£¡£¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬ £¬£¬£¬ÖÜÒ»Fallout EKʹÓÃÏàͬµÄÎó²î·Ö·¢¼ôÌù°åÐ®ÖÆÆ÷£¬£¬ £¬£¬£¬¶øRadio EKÔòÔÚÍÆ¶¯×°ÖÃÀÕË÷Èí¼þNemty¡£¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/exploit-kits-target-windows-users-with-ransomware-and-trojans/