Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î£»£»£»£»£»£»£»ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ

Ðû²¼Ê±¼ä 2020-03-30

1.Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Positive TechnologiesµÄÒ»ÏîÐÂÑо¿Åú×¢ £¬£¬£¬£¬£¬ËùÓеÄ4GºÍ²¿·Ö5GµçÐÅÍøÂç¶¼Ò×Êܵ½Ê¹ÓÃDiameterÐÅÁîЭÒéÎó²îµÄDoS¹¥»÷¡£¡£¡£¡£ ¡£DiameterÐÅÁîЭÒéÓÃÓÚÔÚ4GÍøÂçÖÐÈÏÖ¤ºÍÊÚȨÐÂÎÅ·Ö·¢ £¬£¬£¬£¬£¬ËüÊÇLTEÖеÄÒªº¦×é³É²¿·Ö £¬£¬£¬£¬£¬ÓÐÖúÓÚ»¥ÁªÍøÐ­ÒéÍøÂçÔªËØÖ®¼äµÄת»»ºÍͨѶ¡£¡£¡£¡£ ¡£¸ÃЭÒéÖеÄÎó²îÔÊÐí¹¥»÷Õ߸ú×ÙÓû§µÄλÖò¢»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬ËæºóʹÓÃÕâЩÐÅÏ¢×èµ²ÓïÒôºô½ÐºÍÈÆ¹ý¶ÔÒÆ¶¯Ð§À͵ÄÏÞÖÆ¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±³ÆËûÃÇÔÚ2018ÄêÖÁ2019ÄêÖ®¼äÀÖ³ÉÉøÍ¸µ½ÄÏÃÀ¡¢ÑÇÖÞ¡¢Å·Ö޺ͷÇÖÞµÄ28¼ÒµçÐÅÔËÓªÉÌ¡£¡£¡£¡£ ¡£±ðµÄ £¬£¬£¬£¬£¬µ±5GÍøÂ罨ÉèÔÚÏÖÓмܹ¹ºÍЭÒéÖ®ÉÏʱ £¬£¬£¬£¬£¬ÕâЩÇå¾²Îó²î½«¼ÌÐø±£´æ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÌÐø¸ú×ÙÓû§µÄλÖᢻñÈ¡Ãô¸ÐÐÅÏ¢ÒÔ¼°½µ¼¶µ½3GÍøÂçµÈ¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/all-4g-networks-susceptible-to-dos/?&web_view=true


2.ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÉÏÖÜĩʱ´ú £¬£¬£¬£¬£¬ÀÕË÷Èí¼þDharmaµÄÔ´´úÂëÔÚÁ½¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉϳöÊÛ £¬£¬£¬£¬£¬ÆäÊÛ¼ÛµÍÖÁ2000ÃÀÔª¡£¡£¡£¡£ ¡£Æ¾Ö¤FBIÔÚ½ñÄêRSA¾Û»áÉϵÄÒ»´ÎÑݽ² £¬£¬£¬£¬£¬DharmaÊǽüÄêÀ´×¬Ç®µÚ¶þ¶àµÄÀÕË÷Èí¼þÓªÒµ £¬£¬£¬£¬£¬ÔÚ2016Äê11ÔÂÖÁ2019Äê11ÔÂÖ®¼ä»ñµÃÁËÁè¼Ý2400ÍòÃÀÔªµÄÊê½ðÖ§¸¶¡£¡£¡£¡£ ¡£ÆäÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉϳöÊۺܿÉÄܻᵼÖ¸üÆÕ±éµÄй¶ £¬£¬£¬£¬£¬½ø¶øÔÚ¶à¸ö·¸·¨¼¯ÍÅÖ®¼äÀ©É¢ £¬£¬£¬£¬£¬×îÖÕµ¼Ö¹¥»÷¼¤Ôö¡£¡£¡£¡£ ¡£DharmaµÄ¼ÓÃܼƻ®ºÜÊÇÏȽø £¬£¬£¬£¬£¬×Ô2017ÄêÒÔÀ´Ò»Ö±Ã»ÓÐÃâ·ÑµÄ½âÃܹ¤¾ß¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/


3.ºÚ¿ÍʹÓÃÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÇÔÈ¡Óû§µÄ±ÈÌØ±Ò


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


MyCryptoÇå¾²×ܼàHarry Denley·¢Ã÷ÓÐ9¸öÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÊÔͼÇÔÈ¡Óû§µÄ±ÈÌØ±Ò £¬£¬£¬£¬£¬ÔÚÒÑÍùµÄËĸöÐÇÆÚÖÐ £¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾ÒѾ­ÇÔÈ¡ÁËÁè¼Ý7¸ö±ÈÌØ±Ò£¨¼ÛֵԼΪ4.5ÍòÃÀÔª£©µÄ×ʽ𡣡£¡£¡£ ¡£ÕâÖÖÍøÕ¾Ð§ÀÍ×ÊÖúÓû§½«Æä±ÈÌØ±ÒµØµãת»»³É¶þάÂë £¬£¬£¬£¬£¬ÒÔ½»¸øÆäËüÓû§¾ÙÐÐÖ§¸¶¡£¡£¡£¡£ ¡£µ«Denley·¢Ã÷Õâ9¸öÍøÕ¾ÏÖʵÉÏÖ»ÌìÉúÁËÕ©Æ­ÕßÇ®°üµÄ¶þάÂë¡£¡£¡£¡£ ¡£±ðµÄ £¬£¬£¬£¬£¬ÍйÜÕâ9¸öÍøÕ¾µÄ3¸öWebЧÀÍÆ÷»¹ÍйÜ×Å450¶à¸öÆäËüµÄ¶ñÒâÍøÕ¾ £¬£¬£¬£¬£¬Ö»¹Ü´ó´ó¶¼ÍøÕ¾²¢²»»îÔ¾¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/network-of-fake-qr-code-generators-will-steal-your-bitcoin/


4.2004ÄêÖÁ2019Äê¶íÂÞ˹ºÚ¿Í»î¶¯ÆÊÎö±¨¸æ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÃÀ¹úÇ鱨ÉçÇøµÄ²¼×È¡¤°¬Âס¤ººÃܶû¶Ù£¨Booz Allen Hamilton£©Ðû²¼ÁËÒ»·ÝÖÜÈ«±¨¸æ £¬£¬£¬£¬£¬ÏêϸÏÈÈÝÁË2004ÄêÖÁ2019Äêʱ´ú¶íÂÞ˹µÄ¾üÊÂÍøÂç¹¥»÷»î¶¯¡£¡£¡£¡£ ¡£¸Ã±¨¸æÖØµã¹Ø×¢ÓɶíÂÞ˹¾ü¶ÓÁ¥ÊôµÄÇ鱨²¿·Ö¾ÙÐеÄÍøÂç¹¥»÷¡£¡£¡£¡£ ¡£ÏêϸÀ´Ëµ £¬£¬£¬£¬£¬Booz Allen½«ÒÑÍù15Äêʱ´úµÄ200¶à¸öGRUÍøÂç¹¥»÷»î¶¯¹éΪ23Àà £¬£¬£¬£¬£¬²¢Õ¹ÏÖÁËÿһ¸ö¹¥»÷»î¶¯Óë¶íÂÞ˹ÖܱßÕþÖÎÇéÐÎת±äµÄ¹ØÏµ¡£¡£¡£¡£ ¡£¸Ã±¨¸æµÄ×îÖÕ½áÂÛÊÇ¿ÉÒÔÕ¹ÍûGRUµÄÍøÂç¹¥»÷»î¶¯¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/booz-allen-analyzed-200-russian-hacking-operations-to-better-understand-their-tactics/?&web_view=true


5.WPvivid²å¼þȱÉÙÊÚȨ¼ì²é £¬£¬£¬£¬£¬¿ÉÓÃÓÚ»ñÈ¡ÍøÕ¾ËùÓÐÎļþ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


WebARXÇ徲ר¼ÒÖÒÑÔ³Æ £¬£¬£¬£¬£¬ÓÉÓÚWPvivid²å¼þÖÐȱÉÙÒ»¸öÊÚȨ¼ì²é £¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õ߿ɻñÈ¡WordPressÍøÕ¾µÄËùÓÐÎļþ¡£¡£¡£¡£ ¡£WPvividÊÇÒ»¸öÃâ·ÑµÄ¶àºÏÒ»±¸·Ý¡¢»¹Ô­ºÍǨáã²å¼þ £¬£¬£¬£¬£¬Ëü¾ßÓнü4Íò¸ö»îÔ¾×°Öᣡ£¡£¡£ ¡£¶ÔÆä´úÂëµÄÆÊÎöÏÔʾ £¬£¬£¬£¬£¬Ò»Ð©wp_ajax²Ù×÷δ¾ÙÐÐÊÚȨ¼ì²é £¬£¬£¬£¬£¬´Ó¶ø¿Éµ¼Ö¿çÕ¾µãÇëÇóαÔ죨CSRF£©¹¥»÷¡£¡£¡£¡£ ¡£ÊÜÓ°Ïì×î´óµÄ²Ù×÷ÊÇ¡°wp_ajax_wpvivid_add_remote¡± £¬£¬£¬£¬£¬ÕâÒâζמßÓÐÈκνÇÉ«µÄÓû§¶¼¿ÉÒÔÌí¼ÓеĴ洢λÖò¢½«ÆäÓÃ×÷ĬÈϱ¸·ÝλÖà £¬£¬£¬£¬£¬µ±Ï´α¸·ÝÔËÐÐʱ £¬£¬£¬£¬£¬Õû¸öÊý¾Ý¿â¼°Îļþ½«±»ÉÏ´«µ½¸Ã´æ´¢Î»Öà £¬£¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔ»á¼ûÈκÎÎļþ¡£¡£¡£¡£ ¡£WPvivid¿ª·¢ÍŶÓÒѾ­ÔÚа汾ÖÐÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/100567/hacking/wpvivid-backup-plugin-flaw.html


6.¹È¸èÈ¥Äê¹²·¢Ëͽü4Íò¸öÕþ¸®Ö§³ÖµÄ´¹ÂÚ¹¥»÷ÖÒÑÔ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÔÚ2019Äê £¬£¬£¬£¬£¬¹È¸è¹²·¢ËÍÁ˽ü4Íò¸öÕë¶ÔÕþ¸®Ö§³ÖµÄ´¹ÂÚ¹¥»÷»ò¶ñÒâÈí¼þ¹¥»÷µÄÖÒÑÔ £¬£¬£¬£¬£¬±È2018ÄêϽµÁ˽ü25£¥¡£¡£¡£¡£ ¡£Ï½µµÄÔµ¹ÊÔ­ÓÉÒ»·½ÃæÊDZ£»£»£»£»£»£»£»¤²½·¥Æðµ½ÁË×÷Óà £¬£¬£¬£¬£¬ÁíÒ»·½ÃæÊǹ¥»÷ƵÂÊÕýÔÚ½µµÍ¡£¡£¡£¡£ ¡£×î½ü¼¸¸öÔµÄһЩÐÂÐËÇ÷ÊÆ°üÀ¨£ºÃ°³äÐÂÎÅýÌåºÍ¼ÇÕßÉ¢²½ÐéαÐÅÏ¢µÄ¹¥»÷ÕýÔÚÔöÌí£»£»£»£»£»£»£»Õþ¸®Ö§³ÖµÄ¹¥»÷Õß¼ÌÐøÖ÷ÒªÕë¶ÔµØÔµÕþÖεÐÊÖ¡¢Õþ¸®¹ÙÔ±¡¢¼ÇÕß¡¢²î±ðÕþ¼ûÕߺͼ¤½ø·Ö×ӵȣ»£»£»£»£»£»£»¹¥»÷ÕßÖØ¸´¹¥»÷ͳһĿµÄ £¬£¬£¬£¬£¬2019ÄêÓÐÎå·ÖÖ®Ò»µÄÓû§Ôâµ½¹¥»÷ÕߵĶà´Î¹¥»÷£»£»£»£»£»£»£»¹¥»÷Õ߯ð¾¢Ê¹ÓÃ0day¾ÙÐй¥»÷¡£¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£º

https://blog.google/technology/safety-security/threat-analysis-group/identifying-vulnerabilities-and-protecting-you-phishing/