ºÚ¿Í¹ûÕæ¼ÓÃÜÇ®±ÒÉúÒâËùBuyucoinÓû§µÄÊý¾Ý£»£»£»£»£»Î±Ôì³É»ªÎªÒƶ¯Ó¦ÓõĶñÒâÈí¼þͨ¹ýWhatsApp·Ö·¢

Ðû²¼Ê±¼ä 2021-01-26

1.ºÚ¿Í¹ûÕæ¼ÓÃÜÇ®±ÒÉúÒâËùBuyucoinÓû§µÄÊý¾Ý


1.jpg


ShinyHuntersÔÚ°µÍøÉϹûÕæÓ¡¶È¼ÓÃÜÇ®±ÒÉúÒâËùBuyucoinÓû§µÄÊý¾Ý¡£¡£¡£´Ë´Î×ܹ²Ð¹Â¶ÁËÈý¸öMongoDBÊý¾Ý¿â£¬ £¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¿â¾ùÒÔʱ¼äÃüÃû£¬ £¬£¬£¬£¬£¬£¬»®·ÖΪ2020Äê6ÔÂ1ÈÕ¡¢2020Äê7ÔÂ14ÈÕºÍ2020Äê9ÔÂ5ÈÕ¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Óû§¼Í¼¡¢¼ÓÃÜÇ®±ÒÉÌÒµÉúÒâ¡¢Óû§Á´½ÓµÄÒøÐÐÕÊ»§ÐÅÏ¢ÒÔ¼°ÉúÒâËùÄÚ²¿Ê¹ÓÃµÄÆäËû±í£¬ £¬£¬£¬£¬£¬£¬ÆäÖÐÓû§¼Í¼±í´æ´¢ÁË161487¸ö³ÉÔ±µÄÐÅÏ¢£¬ £¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþµØµã¡¢¹ú¼Ò/µØÇø¡¢¹þÏ£ÃÜÂë¡¢ÊÖ»úºÅÂëºÍGoogleµÇ¼ÁîÅÆµÈ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/data-breach-at-buyucoin-crypto-exchange-leaks-user-info-trades/


2.IntelÈ·ÈÏÓÉÓÚÆäÄÚ²¿¹ýʧµ¼Ö²ÆÎñÐÅϢй¶


2.jpg


IntelÈ·ÈÏÓÉÓÚÆä¹«Ë¾ÍøÂçûÓÐÊܵ½¹¥»÷£¬ £¬£¬£¬£¬£¬£¬ÊÇÄÚ²¿¹ýʧµ¼Ö²ÆÎñÐÅϢй¶¡£¡£¡£²»¾Ãǰ£¬ £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾³ÆÐÂÎű༭ÊÒµÄÍøÕ¾Ôâµ½¹¥»÷£¬ £¬£¬£¬£¬£¬£¬ºÚ¿ÍÇÔÈ¡ÁËÆä¼¾¶ÈÊÕÒæ±¨¸æ¡£¡£¡£¸Ã±¨¸æÔ­¶¨ÓÚÖÜËÄÔÚ»ª¶û½ÖÉúÒâÊÕÅ̺󼸸öСʱÐû²¼£¬ £¬£¬£¬£¬£¬£¬ÏÖ²»µÃ²»ÔÚÊÕÅÌǰ¾ÙÐÐÐû²¼¡£¡£¡£Ö±µ½ÖÜÎ壬 £¬£¬£¬£¬£¬£¬Intel½ÒÏþÉùÃ÷ÌåÏÖ²¢Ã»ÓкڿÍÈëÇÖ£¬ £¬£¬£¬£¬£¬£¬´Ë´Îй¶ÊÇÓÉÓÚÄÚ²¿¹ýʧµ¼ÖÂURL±»ÎÞÒâ¼ä¹ûÕæ²¢±»µÚÈý·½»á¼û¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾¹É¼ÛÖÜÎåÊÕÅ̵ø·ùÁè¼Ý9£¥¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/113794/data-breach/intel-data-leak-2.html


3.Ñо¿ÍŶӷ¢Ã÷AvaddonʹÓÃDDoS¹¥»÷ÀÕË÷Êê½ð


3.png


Ñо¿ÍŶӷ¢Ã÷ÁíÒ»¸öÀÕË÷Èí¼þÍÅ»ïAvaddonÕýÔÚʹÓÃDDoS¹¥»÷À´ÀÕË÷Êê½ð¡£¡£¡£ÔÚ2020Äê10Ô£¬ £¬£¬£¬£¬£¬£¬SunCryptºÍRagnarLockerÍÅ»ï¾Í×îÏÈʹÓÃÒÔDDoS¹¥»÷ΪÍþвǿÆÈÊܺ¦ÕßÖ§¸¶Êê½ðµÄÐÂÕ½ÂÔ¡£¡£¡£µ±¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷ʱ£¬ £¬£¬£¬£¬£¬£¬Ðí¶àÊܺ¦Õß»á´Ó±¸·ÝÖлָ´²¢²»Óë¹¥»÷ÕßÁªÏµ¡£¡£¡£¶øAvaddonÔòʹÓÃDDoS¹¥»÷À´ÆÆËðÊܺ¦ÕßµÄÍøÕ¾»òÍøÂ磬 £¬£¬£¬£¬£¬£¬Ö±µ½Êܺ¦ÕßÓëËûÃÇÁªÏµ²¢×îÏȾÙÐÐ̸ÅС£¡£¡£ÆÊÎöʦBrett CallowÌåÏÖDDoS¼ÛÇ®×ÔÖÆÇÒ¼òÆÓ£¬ £¬£¬£¬£¬£¬£¬·¸·¨·Ö×Ó¶Ô¹«Ë¾Ê©¼ÓµÄѹÁ¦Ô½´ó£¬ £¬£¬£¬£¬£¬£¬Ô½ÈÝÒ×»ñµÃÊê½ð¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/


4.αÔì³É»ªÎªÒƶ¯Ó¦ÓõĶñÒâÈí¼þͨ¹ýWhatsApp·Ö·¢


4.png


ESETÑо¿Ö°Ô±Lukas Stefanko·¢Ã÷еÄαÔì³É»ªÎªÒƶ¯Ó¦ÓõĶñÒâÈí¼þ¿Éͨ¹ýWhatsApp·Ö·¢¡£¡£¡£¸Ã¶ñÒâÈí¼þ»áʹÓÃWhatsApp×Ô¶¯»Ø¸´¹¦Ð§·¢ËͶñÒâÁ´½Ó£¬ £¬£¬£¬£¬£¬£¬¸ÃÁ´½ÓÖ¸ÏòαÔìµÄ»ªÎªÒƶ¯Ó¦ÓóÌÐò£¬ £¬£¬£¬£¬£¬£¬Óû§ÔÚµã»÷ºó»á±»Öض¨Ïòµ½Î±ÔìGoogle PlayÊÐËÁÍøÕ¾¡£¡£¡£Óû§Ò»µ©×°ÖÃºó£¬ £¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹»áÌáÐÑÊܺ¦Õß·­¿ªÍ¨Öª»á¼ûȨÏÞ£¬ £¬£¬£¬£¬£¬£¬È»ºóÖ´ÐÐÈ䳿¹¥»÷¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬Ëü»¹ÄÜ»á¼û²¢ÁýÕÖºǫ́ÔËÐÐµÄÆäËûÓ¦Ó㬠£¬£¬£¬£¬£¬£¬ÕâÒâζןÃÓ¦ÓÿÉÒÔʹÓÃαÔìµÄ´°¿Ú¿ÉÀ´ÇÔȡƾ֤ÒÔ¼°ÆäËûÃô¸ÐÐÅÏ¢¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/01/beware-new-wormable-android-malware.html


5.CheckpointÐû²¼2020ÄêQ4Æ·ÅÆÍøÂç´¹Â򵀮ÊÎö±¨¸æ


5.png


CheckpointÐû²¼ÁË2020ÄêQ4Æ·ÅÆÍøÂç´¹Â򵀮ÊÎö±¨¸æ¡£¡£¡£±¨¸æÏÔʾ£¬ £¬£¬£¬£¬£¬£¬ÔÚ2020Äê×îºóÒ»¸ö¼¾¶ÈMicrosoftÈÔÕ¼ÓÐÊ®´óÆ·ÅÆµÄ°ñÊ×£¬ £¬£¬£¬£¬£¬£¬Ðí¶àÍøÕ¾¶¼Ã°³äMicrosoftµÇ¼½çÃæÇÔÈ¡Óû§Æ¾Ö¤£¬ £¬£¬£¬£¬£¬£¬ÆäռȫÇòËùÓÐÆ·ÅÆÍøÂç´¹ÂÚʵÑéµÄ43£¥¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬ÒÔDHL(18%)ºÍÑÇÂíÑ·µç×ÓÓʼþ(5%)´¹ÂÚΪÖ÷µÄÔËÊäºÍÁãÊÛÒµ½ñÄêÊ×´ÎõÒÉíǰÈýÃû£¬ £¬£¬£¬£¬£¬£¬²¢ÔÚ¼ÙÆÚºóÕ¼±ÈÔöÌíÁËÒ»±¶¶à¡£¡£¡£Æä´Î£¬ £¬£¬£¬£¬£¬£¬Ê®´óÆ·ÅÆ»¹°üÀ¨LinkedIn(6%)¡¢Rakuten (4%)¡¢IKEA (3%)¡¢Google (2%)¡¢Paypal (2%)¡¢Chase (2%)ºÍYahoo (1%)¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2021/01/14/brand-phishing-report-q4-2020/


6.ZscalerÐû²¼Óйؽ©Ê¬ÍøÂçDreamBusµÄÆÊÎö±¨¸æ


6.png


ZscalerÐû²¼ÁËÓйؽ©Ê¬ÍøÂçDreamBusµÄÆÊÎö±¨¸æ¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬ £¬£¬£¬£¬£¬£¬DreamBusΪ2019ÄêÍ·Ê״ηºÆðµÄSystemdMinerµÄ¾É½©Ê¬ÍøÂçµÄ±äÌ壬 £¬£¬£¬£¬£¬£¬ÔÚÔ­°æ±¾ÉϾÙÐÐÁËÈô¸ÉˢС£¡£¡£ÆäÕë¶ÔLinuxЧÀÍÆ÷ÉÏÔËÐÐµÄÆóÒµÓ¦ÓóÌÐò£¬ £¬£¬£¬£¬£¬£¬¿ÉʹÓÃÎó²îºÍ±©Á¦¹¥»÷PostgreSQL¡¢Redis¡¢SaltStack¡¢Hadoop YARN¡¢Apache Spark¡¢HashiCorp Consul¡¢SaltStackºÍSSHЧÀ͵È¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬DreamBus½ÓÄÉÁËÐí¶àÈÆ¹ý¼ì²âµÄÕ½ÂÔ£¬ £¬£¬£¬£¬£¬£¬Èçͨ¹ýеÄHTTP-over-HTTPS£¨DoH£©Ð­ÒéÓë½©Ê¬ÍøÂçµÄC£¦CЧÀÍÆ÷ͨѶ£¬ £¬£¬£¬£¬£¬£¬²¢½«C£¦CÍйÜÔÚTorÍøÂçÉÏÒÔ·À±»¹Ø±Õ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zscaler.com/blogs/security-research/dreambus-botnet-technical-analysis