2019Ä깤¿ØÍþв±¨¸æ£»£»£»2019ÄêQ2 APT¹¥»÷Ç÷ÊÆ±¨¸æ£»£»£»ÃÀ¾ü¹ºÖõĵç×Ó²úÆ·±£´æÇ徲Σº¦

Ðû²¼Ê±¼ä 2019-08-05
1¡¢Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬¾Å´ó·¸·¨ÍÅ»ïרעÓÚICS

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¹¤¿ØÇå¾²³§ÉÌDragosÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬±¨¸æÖÐÆÊÎöÁËרÃÅÕë¶ÔICSÍøÂçµÄ9¸ö·¸·¨ÍŻ¡£¡£ÆäÖÐ5¸ö·¸·¨ÍÅ»ïÖ÷ÒªÕë¶ÔʯÓͺÍ×ÔÈ»Æø¹«Ë¾£¬£¬°üÀ¨HEXANE¡¢MAGNALLIUM¡¢CHRYSENE¡¢XENOTIMEºÍDYMALLOY£¬£¬ÆäÓà4¸ö·¸·¨ÍÅ»ïÖ÷ÒªÕë¶ÔÄÜÔ´²¿·Ö£¬£¬°üÀ¨ELECTRUM¡¢RASPITE¡¢ALLANITEºÍCOVELLITE¡£¡£¡£¸Ã±¨¸æÖ¸³öÓÉÓÚ¿ÉÔì³É¸ß¶ÈÕðµ´µÄÕþÖκ;­¼ÃÓ°Ï죬£¬Ê¯ÓͺÍ×ÔÈ»Æø²¿·ÖÈÔÈ»ÃæÁÙÆÆËðÐÔÍøÂç¹¥»÷µÄΣº¦¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf


2¡¢¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈAPT¹¥»÷Ç÷ÊÆ±¨¸æ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¿¨°Í˹»ùÑо¿ÍŶÓGReATÐû²¼2019ÄêµÚ¶þ¼¾¶ÈµÄAPTÍþв±¨¸æ¡£¡£¡£4Ô·ÝÑо¿ÍŶÓÅû¶ÁËÒ»¸öǰËùδ֪µÄAPT¿ò¼ÜTajMahal£¬£¬TajMahalÔÚÒÑÍùÎåÄêÖÐÒ»Ö±»îÔ¾£¬£¬Æä¼ÓÃܵÄÐéÄâÎļþϵͳÖд洢Á˶à´ï80¸ö¶ñÒâÄ£¿£¿é¡£¡£¡£¶«ÄÏÑÇÏòÀ´ÊÇAPT¹¥»÷×îΪ»îÔ¾µÄµØÇø£¬£¬µ«±¾¼¾¶ÈµÄ¹¥»÷»î¶¯Ö÷ÒªÓ뺫¹úÓйØ£¬£¬¸ÃµØÇøµÄÆäËü¹ú¼Ò½ÏΪÇå¾²¡£¡£¡£ÔÚÈ«ÇòËùÓеĵØÇø£¬£¬µØÔµÕþÖÎÈÔÈ»ÊÇAPT¹¥»÷µÄÖ÷ÒªÍÆ¶¯Á¦¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/apt-trends-report-q2-2019/91897/


3¡¢±±ÃÀPoshmarkÔâºÚ¿ÍÈëÇÖ£¬£¬¿Í»§ÐÅϢй¶

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

PoshmarkÊDZ±ÃÀµØÇøµÄÒ»¸ö´ò°ç¡¢Ð¬×ÓºÍÅäÊεÄÉúÒâÊг¡£¬£¬¸Ã¹«Ë¾ÓÚ8ÔÂ1ÈÕÅû¶ÁËÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÆäЧÀÍÆ÷ÔâµÚÈý·½Î´ÊÚȨ»á¼û£¬£¬¿Í»§µÄÓû§Ãû¡¢¼ÓÑιþÏ£ÃÜÂë¡¢ÐÕÃû¡¢ÐÔ±ðºÍÆÜÉí¶¼»áµÈÐÅϢй¶¡£¡£¡£±ðµÄ£¬£¬¹¥»÷Õß»¹ÇÔÈ¡ÁËÓû§µÄµç×ÓÓʼþ¡¢É罻ýÌå×ÊÁÏÒÔ¼°´ò°ç³ß´çÆ«ºÃµÈÐÅÏ¢¡£¡£¡£PoshmarkûÓÐ͸¶ÊÂÎñ±¬·¢µÄʱ¼äÒÔ¼°ÊÜÓ°ÏìµÄÈËÊý£¬£¬²¢ÌåÏÖÖ»ÓÐÃÀ¹úµÄÓû§ÊÜÓ°Ï죬£¬¼ÓÄôóÓû§²»ÊÜÓ°Ïì¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/poshmark-clothing-marketplace-says-hacker-stole-customer-details/


4¡¢Ð¶ñÒâÈí¼þSystemBC£¬£¬Í¨¹ýFalloutºÍRIG EK¾ÙÐзַ¢


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ProofpointÑо¿Ö°Ô±·¢Ã÷Ò»¸öеĶñÒâÊðÀíÈí¼þSystemBC£¬£¬¸Ã¶ñÒâÈí¼þÖ÷Ҫͨ¹ýFalloutºÍRIG EK¾ÙÐзַ¢¡£¡£¡£SystemBCͨ¹ýSOCKS5ÊðÀíÀ´Òþ²ØÆä¶ñÒâÁ÷Á¿£¬£¬ÓëC2ЧÀÍÆ÷ͨ¹ýHTTPs¾ÙÐÐÅþÁ¬¡£¡£¡£ÓÉÓڸöñÒâÈí¼þ±»ÓÃÓÚ¶à¸ö²î±ðµÄ¹¥»÷»î¶¯£¬£¬Ñо¿Ö°Ô±ÒÔΪ¸Ã¶ñÒâÈí¼þºÜ¿ÉÄÜÔÚ°µÍøÊг¡ÉϾÙÐгöÊÛ¡£¡£¡£Ñо¿Ö°Ô±ÔÚ±¨¸æÖÐÅû¶ÁËÏêϸIoCºÍ¸Ã¶ñÒâÈí¼þµÄ¸ü¶àϸ½Ú¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/89336/malware/systembc-proxy-malware.html


5¡¢PewDiePieºÚ¿Í¹éÀ´£¬£¬Ê¹ÓÃSMSÍø¹ØÎó²î·¢ËÍ´ó×ÚÀ¬»ø¶ÌÐÅ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÔøÐ®ÖÆÉÏÍǫ̀´òÓ¡»úÒÔÍÆ¹ãYouTubeƵµÀPewDiePieµÄºÚ¿ÍÔٴιéÀ´£¬£¬ËûÃÇÊÔͼͨ¹ýSMSÍø¹ØÏµÍ³ÏòÃÀ¹úµÄÿһ²¿ÊÖ»ú·¢ËÍÀ¬»ø¶ÌÐÅ¡£¡£¡£SMSÍø¹ØÍ¨³£ÓÃÓÚ¸¶·Ñ·¢ËͶÌÐÅ£¬£¬²¢ÇÒÌṩһϵÁÐAPI£¬£¬Ö§³Ö¾ç±¾»¯½»»¥¡£¡£¡£ÕâÐ©Íø¹ØµÄÿÌõÐÂÎżÛÇ®½ÏµÍ£¬£¬Òâζ×Å´ó¹æÄ£·¢ËÍÀ¬»ø¶ÌÐŵı¾Ç®Ò²½ÏµÍ¡£¡£¡£ÕâÖÖ¹¥»÷ÀàËÆÓÚDDoS¹¥»÷£¬£¬ºÚ¿ÍÉù³ÆÒѾ­Ê¹Óòî±ðµÄÊÖ»úºÍÔËÓªÉ̾ÙÐÐÁ˲âÊÔ£¬£¬Ê¹ÓÃÕâÖÖÎÞÏÞÖÆ·¢ËÍ´ó×ÚÎı¾ÐÂÎŵķ½·¨Ê¹µÃÄ¿µÄAndroidºÍiPhoneËÀ»ú¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.wired.co.uk/article/sms-hack-text-twitter-j3ws3r


6¡¢2018ÄêÃÀ¾ü¹ºÖÃÁ˼ÛÖµ3280ÍòÃÀÔªµç×Ó²úÆ·±£´æÇ徲Σº¦

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤ÃÀ¹ú¹ú·À²¿¼à²ì³¤£¨DODIG£©±¨¸æ£¬£¬2018²ÆÄêÃÀ¹ú½¾üºÍ¿Õ¾üÔ±¹¤¹ºÖÃÁ˼ÛÖµÁè¼Ý3280ÍòÃÀÔªµÄ±£´æÒÑÖªÇå¾²Îó²îµÄµç×Ó²úÆ·¡£¡£¡£ÕâЩ²úÆ·°üÀ¨Lexmark´òÓ¡»ú¡¢GoProÏà»úºÍåÚÏëÅÌËã»úµÈ¡£¡£¡£ÆäÖÐÁè¼Ý8000̨Lexmark´òÓ¡»ú±»ÓÃÓÚ½¾üºÍ¿Õ¾üÍøÂ磬£¬×ܼÛÖµÁè¼Ý3000ÍòÃÀÔª¡£¡£¡£DODIGÖ¸³öLexmark´òÓ¡»úÔøÊܵ½20¶à¸öÎó²îµÄÓ°Ï죬£¬°üÀ¨Ã÷ÎÄ´æ´¢ºÍ´«Ê䯾֤ÒÔ¼°ÔÊÐí¶ñÒâ´úÂëÖ´Ðеȡ£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/us-military-purchased-32-8m-worth-of-electronics-with-known-security-risks/