µ¤ÂóË®±ÃÖÆÔìÉÌDESMIÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÏµÍ³ÈÔδ»Ö¸´£»£»£»£»£»£»Áè¼Ý50ÍòZoomÕË»§Æ¾Ö¤ÔÚ°µÍøÂÛ̳³öÊÛ
Ðû²¼Ê±¼ä 2020-04-141.µ¤ÂóË®±ÃÖÆÔìÉÌDESMIÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÏµÍ³ÈÔδ»Ö¸´
µ¤ÂóË®±ÃÖÆÔìÉÌDESMIÔâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚÉÏÖÜËĵÄÍíÉÏ£¬£¬£¬£¬£¬£¬Ôâµ½¹¥»÷ºó¹«Ë¾µÄËùÓÐϵͳ¾ù±»¹Ø±Õ¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã¹«Ë¾ÔÚ¹ÙÍøÉÏÐû²¼µÄÖÒÑÔ£¬£¬£¬£¬£¬£¬¹«Ë¾µÄËùÓÐϵͳ¾ù±»¹Ø±Õ£¬£¬£¬£¬£¬£¬²¢ÇÒÕýÔÚ»¹ÔÀú³ÌÖУ¬£¬£¬£¬£¬£¬Ê×Åú²¿·Öϵͳ½«ÔÚ¼¸ÌìÄÚÆô¶¯²¢ÔËÐУ¬£¬£¬£¬£¬£¬ÆäÓàµÄϵͳ½«ÔÚ¼¸ÖÜÖ®ÄÚÔËÐС£¡£¡£¡£¡£ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖ®ÖУ¬£¬£¬£¬£¬£¬Éв»ÇåÎú¹¥»÷µÄˮƽ£¬£¬£¬£¬£¬£¬DESMIÒѽ«ÊÂÎñ±¨¸æ¸øµ¤ÂóÕþ¸®ºÍ¾¯Ô±¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/101495/hacking/desmi-discloses-cyber-attack.html
2.ÒøÐÐľÂíGrandoreiroй¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÎ÷°àÑÀ
IBM X-ForceÑо¿Ö°Ô±ÊÓ²ìµ½ÒøÐÐľÂíGrandoreiroÒѾתÏòÕë¶ÔÎ÷°àÑÀµÄÒøÐÐÓû§¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ֮ǰÖ÷ÒªÕë¶Ô°ÍÎ÷µÄÒøÐÐÓû§£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÆÊÎöÁËÐµĹ¥»÷»î¶¯ÖÐGrandoreiroÐ޸ĺóµÄ´úÂ룬£¬£¬£¬£¬£¬È·¶¨ÓëÔ´´úÂë¾ßÓÐ80%-90%µÄÏàËÆ¶È£¬£¬£¬£¬£¬£¬Õâ֤ʵÎúÀ´×Ô°ÍÎ÷µÄ¶ñÒâÈí¼þ×÷ÕßÓëÄ¿½ñÕë¶ÔÎ÷°àÑÀµÄ¹¥»÷Õß±£´æÒ»¶¨µÄ¹ØÁª¡£¡£¡£¡£¡£ÔÚ×î½üGrandoreiroµÄ¶ñÒâ·Ö·¢»î¶¯Öй¥»÷ÕßʹÓÃÁËCOVID-19Ö÷ÌâÏà¹ØµÄÊÓÆµÀ´ÓÕʹÓû§ÔËÐÐÒþ²ØµÄ¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬²¢×îÖÕͨ¹ýRATÇÔÈ¡ÆäÒøÐÐÕË»§µÄ×ʽ𡣡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityintelligence.com/posts/grandoreiro-malware-now-targeting-banks-in-spain/
3.Operation Pinball¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Õë¶ÔÃÀ¹úºÍÅ·ÖÞÕþ¸®»ú¹¹
Insikt Group·¢Ã÷Ò»¸öÕýÔÚ¾ÙÐÐÖеĶñÒâ»î¶¯Operation Pinball£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâ»î¶¯ÓëÕë¶ÔÃÀ¹úºÍÅ·ÖÞÕþ¸®µÄOperation Secondary Infektion¹¥»÷»î¶¯¾ßÓÐÏÔ×ŵÄÖØµþ¡£¡£¡£¡£¡£Recorded Future¶ÔOperation PinballµÄÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊÔͼʹÓÃÒ»Á¬µÄÅ·ÖÞÒÆÃñΣ»£»£»£»£»£»úÆÆËð°®É³ÄáÑÇÕþ¸®ÓëÅ·Ã˵ĹØÏµ¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯µÄµÚ¶þ¸öʵÀýÊÔÍ¼ÆÆËð¸ñ³¼ªÑÇÓë±±´óÎ÷ÑóÌõÔ¼×éÖ¯£¨NATO£©µÄ¹ØÏµ¡£¡£¡£¡£¡£¶ÔÒ»¸ö×ÔÎÒÐû²¼ÍøÕ¾µÄ½øÒ»³ÌÐò²éÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊÔͼʹÓÃÐéαÎļþÕë¶ÔÃÀ¹ú¹ÙÔ±ÒÔ¼°ÃÀ¹úÕþÖÎ×éÖ¯Óë¹ú¼ÊÕþ²ßÖÆ¶©ÕߺÍÕþ¸®»ú¹¹Ö®¼äµÄ¹ØÏµ£¬£¬£¬£¬£¬£¬ÕâЩڲÆÐÔÎļþÊÔͼģÄâ¶«Å·Ãô¸Ð¹ú¼ÊÎÊÌâÓйصÄÉñÃØÐżþ£¬£¬£¬£¬£¬£¬ÎļþµÄʱ¼ä¹æÄ£Îª2019Äê1ÔÂÖÁ2019Äê6Ô£¬£¬£¬£¬£¬£¬ÓëSecondary Infektion¹¥»÷»î¶¯µÄʱ¼äÏàÒ»Ö¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.recordedfuture.com/operation-pinball-tactics/
4.Ñо¿»ú¹¹Ðû²¼ÒÁÀÊÇ鱨»ú¹¹ÓëAPT¹¥»÷µÄ¸ú×Ù±¨¸æ
Recorded FutureµÄInsikt GroupÍŶÓÐû²¼¹ØÓÚÒÁÀʽø¹¥ÐÔÍøÂç×éÖ¯½á¹¹µÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬¸Ã±¨¸æÓÐÖúÓÚ¸üÉîÈëµØÏàʶ¼ÓÈëÒÁÀʽø¹¥ÐÔÍøÂçÍýÏëµÄÖ÷Òª¾üʺÍÇ鱨»ú¹¹¡£¡£¡£¡£¡£¸Ã±¨¸æÑо¿Á˰üÀ¨°Í˹»ù£¨Basij£©ÔÚÄÚµÄÒÁ˹À¼¸ïÃüÎÀ¶Ó£¨IRGC£©¡¢Ç鱨ºÍÇå¾²²¿£¨MOIS£©ÒÔ¼°¹ú·ÀºÍÎä×°²½¶ÓºóÇÚ²¿£¨MODAFL£©¡£¡£¡£¡£¡£Ö»¹Ü¸Ã±¨¸æ½¨ÒéÔÚÒ»¶¨ÃüÄ¿µÄAPT×éÖ¯ÓëijЩÇ鱨×éÖ¯Ö®¼ä½¨ÉèÁªÏµ£¬£¬£¬£¬£¬£¬µ«ÓÉÓÚ¶ÔijЩ×éÖ¯µÄÐÅϢȱ·¦£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÎÞ·¨½«Æä¹éÒòµ½Ìض¨µÄ»ú¹¹¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.recordedfuture.com/iran-cyber-operations-structure/
5.FireEyeÐû²¼Îó²îʹÓÃÓë²¹¶¡ÖÎÀíÆÊÎö±¨¸æµÄµÚ¶þ²¿·Ö
FireEye MandiantÍþвÇ鱨²¿·ÖÕë¶Ô2018ÄêºÍ2019ÄêµÄÎó²îʹÓþÙÐеÄÑо¿Åú×¢£¬£¬£¬£¬£¬£¬´ó´ó¶¼Ò°ÍâʹÓö¼±¬·¢ÔÚ²¹¶¡Ðû²¼Ö®Ç°»ò²¹¶¡¿ÉÓúóµÄ¼¸ÌìÄÚ¡£¡£¡£¡£¡£Ñо¿ÍŶӯÊÎöÁËÔÚ2018ÄêµÚÒ»¼¾¶Èµ½2019ÄêµÚÈý¼¾¶ÈÖ®¼äÒѱ»Ê¹Óûò·ÖÅÉÁËCVEºÅµÄ60¸öÎó²î£¬£¬£¬£¬£¬£¬´ó´ó¶¼Îó²îʹÓö¼ÊÇ0day-ÔÚ²¹¶¡Ðû²¼Ö®Ç°¡£¡£¡£¡£¡£ÔÚ²¹¶¡Ðû²¼Ö®ºóµÄÒ»¸öÔÂÄÚ£¬£¬£¬£¬£¬£¬ÓÐÁè¼ÝËÄ·ÖÖ®Ò»µÄÎó²î±»Ê¹Óᣡ£¡£¡£¡£Îó²îÅû¶Óë²¹¶¡¿ÉÓÃÖ®¼äµÄƽ¾ùʱ¼äԼΪ9Ìì¡£¡£¡£¡£¡£¹ØÓÚ·Ç0dayÎó²î£¬£¬£¬£¬£¬£¬ÔÚ²¹¶¡Ðû²¼µ½Ê״η¢Ã÷¹¥»÷ÕßʹÓÃÖ®¼äµÄ´°¿ÚºÜС£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬Í¨³£Ö»Óм¸Ð¡Ê±µ½ÊýÌì¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2020/04/time-between-disclosure-patch-release-and-vulnerability-exploitation.html
6.Áè¼Ý50ÍòZoomÕË»§Æ¾Ö¤ÔÚ°µÍøÂÛ̳³öÊÛ
ÍþвÇ鱨³§ÉÌCyble·¢Ã÷Áè¼Ý50Íò¸öZoomÕË»§ÔÚ°µÍøÂÛ̳ÉϳöÊÛ£¬£¬£¬£¬£¬£¬Æ½¾ùÊÛ¼Ûȱ·¦1ÃÀ·Ö£¬£¬£¬£¬£¬£¬ÔÚijЩÇéÐÎÏÂÉõÖÁÊÇÃâ·ÑµÄ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÔ¼ÄªÔÚ4ÔÂ1ÈÕËûÃÇ×îÏÈÔÚºÚ¿ÍÂÛ̳ÉÏ¿´µ½Ãâ·ÑµÄZoomÕË»§£¬£¬£¬£¬£¬£¬ÕâЩÕË»§µÄƾ֤ÊÇͨ¹ýײ¿â¹¥»÷ÍøÂçµÄ¡£¡£¡£¡£¡£CybleÄܹ»¹ºÖôó×ÚµÄÓû§ÕË»§£¬£¬£¬£¬£¬£¬°üÀ¨Êܺ¦Õߵĵç×ÓÓʼþµØµã¡¢ÃÜÂ롢СÎÒ˽¼Ò¾Û»áURL¼°ÆäHostKey¡£¡£¡£¡£¡£²¿·ÖÕË»§ÊôÓÚĦ¸ù´óͨ¡¢»¨ÆìÒøÐС¢×ÅÃû½ÌÓý»ú¹¹µÈ×éÖ¯µÄÕË»§¡£¡£¡£¡£¡£Óû§¿ÉÒÔͨ¹ýÊý¾Ýй¶֪ͨЧÀÍHave I Been PwnedÍøÕ¾ºÍCybleµÄAmIBreached¼ì²é×Ô¼ºµÄÓʼþµØµãÊÇ·ñй¶¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/over-500-000-zoom-accounts-sold-on-hacker-forums-the-dark-web/


¾©¹«Íø°²±¸11010802024551ºÅ