Upstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·£»£»£»£»Ó¢¹úÕþ¸®ÖØÐÂÊÓ²ìÂ×¶ØÖ¤È¯ÉúÒâËùÈ¥Äêå´»úÊÂÎñ

Ðû²¼Ê±¼ä 2020-01-07


1.Upstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Upstream Security2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·»ùÓÚ¶ÔÒÑÍùÊ®ÄêÖÐ367Æð¹ûÕæ±¨¸æµÄÆû³µÍøÂçÇå¾²ÊÂÎñ¾ÙÐÐÆÊÎö£¬£¬£¬£¬£¬£¬ÖصãÇ¿µ÷ÁË2019Äêʱ´ú·¢Ã÷µÄÎó²îÓë¿´·¨¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬»¥ÁªÍøÆû³µÒÑÔÚ½ÓÊÜÆû³µÊг¡£¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓÐ3.3ÒÚÁ¾»¥ÁªÍøÆû³µ£¬£¬£¬£¬£¬£¬ÕâÒâζ×Åÿ´Î¹¥»÷µÄDZÔÚÆÆËðÁ¦³É±¶ÔöÌí£¬£¬£¬£¬£¬£¬´ó¹æÄ£µÄ¹¥»÷ÊÂÎñ¿ÉÄÜ»áÆÆËðÕû¸ö¶¼»á£¬£¬£¬£¬£¬£¬ÉõÖÁµ¼ÖÂÔÖÄÑÐÔµÄÉúÃüËðʧ¡£¡£¡£¡£¡£¡£¡£×Ô2016ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬Ã¿ÄêÆû³µÍøÂçÇå¾²ÊÂÎñµÄÊýÄ¿ÔöÌíÁË605%£¬£¬£¬£¬£¬£¬½ö2019ÄêÒ»Äê¾ÍÔöÌíÁËÒ»±¶ÒÔÉÏ¡£¡£¡£¡£¡£¡£¡£ÔÚ2019Ä꣬£¬£¬£¬£¬£¬ÓÐ57%µÄÊÂÎñÊÇÓÉÍøÂç×ï·¸¾ÙÐеÄ£¬£¬£¬£¬£¬£¬ÆäÄ¿µÄÊÇÆÆËðÓªÒµ¡¢ÇÔÈ¡¿î×Ó»òË÷ÒªÊê½ð¡£¡£¡£¡£¡£¡£¡£½öÓÐ38%ÊÇÑо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬£¬£¬£¬ÆäÄ¿µÄÏò¹«Ë¾ºÍÏûºÄÕß¾¯ÃܸæÏÖµÄÎó²î¡£¡£¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/01/06/automotive-cybersecurity-incidents/


2.΢ÈíÐû²¼RDP±©Á¦¹¥»÷ÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬Æ½¾ùÒ»Á¬Ê±¼äΪ2-3Ìì


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


΢ÈíÐû²¼ÁËÒ»·ÝÕë¶ÔRDP±©Á¦¹¥»÷µÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬¸ÃÏîÑо¿ÊÇ»ùÓÚ´ÓÁè¼Ý4.5Íò¸ö×°ÖÃÁËÃâ·ÑMicrosoft Defender ATPµÄÊÂÇéÕ¾ÉÏÍøÂçµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÓëʧ°ÜºÍÀֳɵÄRDPµÇ¼ÊÂÎñÓйأ¨»®·ÖÊÇIDΪ4265ºÍ4264µÄWindowsÊÂÎñ£©£¬£¬£¬£¬£¬£¬²¢ÇÒÉæ¼°Óû§/¹¥»÷Õß¿ÉÄÜʹÓõÄÓû§ÃûÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬Êý¾ÝÍøÂçÁ˼¸¸öÔµÄʱ¼ä¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÔÚ±¨¸æÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬×î½üÊӲ쵽µÄRDP±©Á¦¹¥»÷ƽ¾ùÒ»Á¬2-3Ì죬£¬£¬£¬£¬£¬Ô¼90£¥µÄ°¸ÀýÒ»Á¬Ê±¼äÔÚÒ»ÖÜÄÚ£¬£¬£¬£¬£¬£¬Ö»Óв»µ½5£¥µÄ°¸ÀýÒ»Á¬Ê±¼äÔÚÁ½ÖÜ»òÒÔÉÏ¡£¡£¡£¡£¡£¡£¡£Ô¼ÓÐ0.08£¥µÄRDP±©Á¦¹¥»÷ÀֳɾÙÐÐÁ˵Ǽ¡£¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/


3.Ó¢¹úÕþ¸®ÖØÐÂÊÓ²ìÂ×¶ØÖ¤È¯ÉúÒâËùÈ¥Äêå´»úÊÂÎñ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ó¢¹úÕþ¸®ÕýÔÚÖØÐÂÉó²éÂ×¶ØÖ¤È¯ÉúÒâËùÈ¥ÄêµÄå´»úÊÂÎñ£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨ÆäÊÇ·ñÓëÍøÂç¹¥»÷ÓйØ¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê8ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬¡°Èí¼þ¹ÊÕÏ¡±µ¼ÖÂÐÇÆÚÎåµÄÔç¼äÉúÒâÕßÔÚÒ»¸ö°ëСʱÒÔÉϵÄʱ¼äÄÚÎÞ·¨ÉúÒâ¹ÉƱ¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñʹµÃ¸»Ê±100ºÍ¸»Ê±250Ö¸Êý¾ùÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£ÆäʱÂ×¶ØÖ¤½»ËùµÄ¹ÙÔ±ÌåÏÖ¡°Èí¼þÊÖÒÕÎÊÌ⡱ÊÇÊÂÎñµÄ»ù´¡Ôµ¹ÊÔ­ÓÉ£¬£¬£¬£¬£¬£¬µ«Ã»ÓÐÌṩÈκνøÒ»²½µÄϸ½Ú¡£¡£¡£¡£¡£¡£¡£µ«Æ¾Ö¤½üÆÚ¡¶»ª¶û½ÖÈÕ±¨¡·µÄ±¨µÀ£¬£¬£¬£¬£¬£¬ÕýÔÚ¾ÙÐеÄÒ»ÏîÊÓ²ìÅú×¢¸ÃÊÂÎñ¿ÉÄܲ»µ«½öÊÇÓÉÓÚÈí¼þÎÊÌâ¡£¡£¡£¡£¡£¡£¡£ÐÂÎÅÈËÊ¿³ÆÓ¢¹úÕþ¸®Í¨Ñ¶×ܲ¿£¨GCHQ£©Ï£ÍûÏàʶ崻úÊÂÎñÊÇ·ñÊÇÓÉÓÚºÚ¿ÍÊÔͼ¡°ÆÆËðÊг¡¡±µ¼ÖµÄ¡£¡£¡£¡£¡£¡£¡£ÔÚÒÑÍùÁ½¸öÔÂÖУ¬£¬£¬£¬£¬£¬Ç鱨»ú¹¹ÒÑÁªÏµ¸ÃÉúÒâËù»ñÈ¡ÌØÁíÍâÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/uk-government-investigates-possible-cyberattack-link-to-london-stock-exchange-outage/


4.È¥ÄêѬȾSodinokibiµÄ¼ÓÖÝITЧÀÍÔËÓªÉÌSynoptek¾öÒéÖ§¸¶Êê½ð


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


¼ÓÀû¸£ÄáÑÇÖݵÄITЧÀÍÉÌSynoptekÔÚѬȾÀÕË÷Èí¼þSodinokibiºó¾öÒéÖ§¸¶Êê½ðÒÔ½âÃÜÆäÎļþ¡£¡£¡£¡£¡£¡£¡£SynoptekÓµÓб鲼¶à¸öÐÐÒµµÄ1100¶à¼Ò¿Í»§£¬£¬£¬£¬£¬£¬°üÀ¨µØ·½Õþ¸®¡¢½ðÈÚЧÀÍ¡¢Ò½ÁƱ£½¡¡¢ÖÆÔìÒµ¡¢Ã½Ìå¡¢ÁãÊÛºÍÈí¼þÐÐÒµ¡£¡£¡£¡£¡£¡£¡£Ñ¬È¾ÊÂÎñ±¬·¢ÔÚÈ¥Äê12ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÊ×ÏÈÈëÇÖÁ˹«Ë¾ÍøÂ磬£¬£¬£¬£¬£¬È»ºó×°ÖÃÁËÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£ÆäʱSynoptek֤ʵÁ˴˴ι¥»÷£¬£¬£¬£¬£¬£¬µ«Ã»ÓнÒÏþ̸ÂÛ¡£¡£¡£¡£¡£¡£¡£SodiniokibiÍÅ»ïËÆºõרעÓÚÕë¶ÔÃÀ¹úITЧÀÍÉÌ£¬£¬£¬£¬£¬£¬2019Äê8ÔÂPercSoft¹«Ë¾Êܵ½Ñ¬È¾£¬£¬£¬£¬£¬£¬12Ô¸öñÒâÈí¼þѬȾÁËComplete Technology SolutionsµÄϵͳÒÔ¼°ÃÀ¹úÖ÷ÒªÊý¾ÝÖÐÐÄÌṩÉÌÖ®Ò»CyrusOne¡£¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/96017/malware/sodinokibi-ransomware-attack.html


5.ChromeÀ©Õ¹Ledge SecureÇÔÈ¡¼ÛÖµ1.6ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ƾ֤DecryptµÄ±¨¸æ£¬£¬£¬£¬£¬£¬Chrome¶ñÒâÀ©Õ¹Ledge Secure½øÈëÁËChromeÓ¦ÓÃÊÐËÁ²¢ÀÖ³ÉÇÔÈ¡ÁËÖÁÉÙ¼ÛÖµ1.6ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£¸ÃÀ©Õ¹Éù³Æ¿ÉÒԳ䵱Chromeä¯ÀÀÆ÷ÖеļÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬£¬£¬²¢ÒÔijÖÖ·½·¨Ïë·¨ÈÆ¹ýÁËGoogleµÄ¹ýÂËÆ÷£¬£¬£¬£¬£¬£¬×îÖÕ½øÈëÁËÓ¦ÓÃÊÐËÁ¹©Óû§ÏÂÔØ¡£¡£¡£¡£¡£¡£¡£·¨¹úLedger¹«Ë¾ÔÚTwitterÉÏÈ·ÈÏÁ˸ÃÀ©Õ¹²¢²»ÊÇÕýµ±µÄ£¬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§×èÖ¹ÔÚÆä×°±¸ÉÏ×°ÖøÃÀ©Õ¹¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚGoogleÒѾ­´ÓChromeÓ¦ÓÃÊÐËÁÖÐɾ³ýÁ˸ÃÀ©Õ¹¡£¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/shady-google-chrome-extension-steals-16-000-worth-of-cryptocurrency-528762.shtml


6.ÀÕË÷Èí¼þREvilÆð¾¢Õë¶Ôδ´ò²¹¶¡µÄPulse Secure VPNЧÀÍÆ÷


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±±Þ²ßÕýÔÚʹÓÃPulse Secure VPNµÄ×éÖ¯Á¬Ã¦×°ÖÃÐÞ¸´²¹¶¡£¬£¬£¬£¬£¬£¬²»È»ËüÃǽ«ÃæÁÙÀÕË÷Èí¼þREvilµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£Ó¢¹úÇå¾²Ñо¿Ô±¿­ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©Ìá¼°µÄ²¹¶¡ÊÇÃÀ¹úCISA¡¢¹ú¼ÒÇå¾²¾ÖºÍÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄÔÚÈ¥Äê10Ô·ÝÐû²¼µÄÖÒÑÔÖÐÌá¼°µÄÎó²î²¹¶¡£¬£¬£¬£¬£¬£¬°üÀ¨CVE-2019-11510ºÍCVE-2019-11539¡£¡£¡£¡£¡£¡£¡£BeaumontÖ¸³ö£¬£¬£¬£¬£¬£¬Pulse Secure VPNÎó²î¡°ºÜÊÇÑÏÖØ¡±£¬£¬£¬£¬£¬£¬ÓÉÓÚËüÔÊÐíûÓÐÓÐÓÃÆ¾Ö¤µÄÔ¶³Ì¹¥»÷ÕßÔ¶³ÌÅþÁ¬µ½¹«Ë¾ÍøÂ磬£¬£¬£¬£¬£¬½ûÓöàÒòËØÉí·ÝÑéÖ¤ÒÔ¼°ÒÔ´¿Îı¾ÐÎʽԶ³ÌÉó²éÈÕÖ¾»ººÍ´æµÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Çå¾²¹«Ë¾Bad PacketsÓÚ1ÔÂ4ÈÕ¾ÙÐеÄɨÃ裬£¬£¬£¬£¬£¬ÓÐ3825¸öPulse Secure VPNЧÀÍÆ÷ÉÐδÕë¶ÔÎó²îCVE-2019-11510¾ÙÐÐÐÞ¸´£¬£¬£¬£¬£¬£¬ÕâЩÒ×Êܹ¥»÷µÄVPNЧÀÍÆ÷ÖÐÓÐ1300¶à¸öλÓÚÃÀ¹ú¡£¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/