Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î£»ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ

Ðû²¼Ê±¼ä 2020-03-30

1.Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


Positive TechnologiesµÄÒ»ÏîÐÂÑо¿Åú×¢  £¬ËùÓеÄ4GºÍ²¿·Ö5GµçÐÅÍøÂç¶¼Ò×Êܵ½Ê¹ÓÃDiameterÐÅÁîЭÒéÎó²îµÄDoS¹¥»÷ ¡£DiameterÐÅÁîЭÒéÓÃÓÚÔÚ4GÍøÂçÖÐÈÏÖ¤ºÍÊÚȨÐÂÎÅ·Ö·¢  £¬ËüÊÇLTEÖеÄÒªº¦×é³É²¿·Ö  £¬ÓÐÖúÓÚ»¥ÁªÍøÐ­ÒéÍøÂçÔªËØÖ®¼äµÄת»»ºÍͨѶ ¡£¸ÃЭÒéÖеÄÎó²îÔÊÐí¹¥»÷Õ߸ú×ÙÓû§µÄλÖò¢»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢  £¬ËæºóʹÓÃÕâЩÐÅÏ¢×èµ²ÓïÒôºô½ÐºÍÈÆ¹ý¶ÔÒÆ¶¯·þÎñµÄÏÞÖÆ ¡£Ñо¿Ö°Ô±³ÆËûÃÇÔÚ2018ÄêÖÁ2019ÄêÖ®¼äÀÖ³ÉÉøÍ¸µ½ÄÏÃÀ¡¢ÑÇÖÞ¡¢Å·Ö޺ͷÇÖÞµÄ28¼ÒµçÐÅÔËÓªÉÌ ¡£±ðµÄ  £¬µ±5GÍøÂ罨ÉèÔÚÏÖÓмܹ¹ºÍЭÒéÖ®ÉÏʱ  £¬ÕâЩÇå¾²Îó²î½«¼ÌÐø±£´æ  £¬¹¥»÷Õß¿ÉÒÔ¼ÌÐø¸ú×ÙÓû§µÄλÖᢻñÈ¡Ãô¸ÐÐÅÏ¢ÒÔ¼°½µ¼¶µ½3GÍøÂçµÈ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/all-4g-networks-susceptible-to-dos/?&web_view=true


2.ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


ÉÏÖÜĩʱ´ú  £¬ÀÕË÷Èí¼þDharmaµÄÔ´´úÂëÔÚÁ½¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉϳöÊÛ  £¬ÆäÊÛ¼ÛµÍÖÁ2000ÃÀÔª ¡£Æ¾Ö¤FBIÔÚ½ñÄêRSA¾Û»áÉϵÄÒ»´ÎÑݽ²  £¬DharmaÊǽüÄêÀ´×¬Ç®µÚ¶þ¶àµÄÀÕË÷Èí¼þÓªÒµ  £¬ÔÚ2016Äê11ÔÂÖÁ2019Äê11ÔÂÖ®¼ä»ñµÃÁËÁè¼Ý2400ÍòÃÀÔªµÄÊê½ðÖ§¸¶ ¡£ÆäÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉϳöÊۺܿÉÄܻᵼÖ¸üÆÕ±éµÄй¶  £¬½ø¶øÔÚ¶à¸ö·¸·¨¼¯ÍÅÖ®¼äÀ©É¢  £¬×îÖÕµ¼Ö¹¥»÷¼¤Ôö ¡£DharmaµÄ¼ÓÃܼƻ®ºÜÊÇÏȽø  £¬×Ô2017ÄêÒÔÀ´Ò»Ö±Ã»ÓÐÃâ·ÑµÄ½âÃܹ¤¾ß ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/


3.ºÚ¿ÍʹÓÃÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÇÔÈ¡Óû§µÄ±ÈÌØ±Ò


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


MyCryptoÇå¾²×ܼàHarry Denley·¢Ã÷ÓÐ9¸öÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÊÔͼÇÔÈ¡Óû§µÄ±ÈÌØ±Ò  £¬ÔÚÒÑÍùµÄËĸöÐÇÆÚÖÐ  £¬ÕâÐ©ÍøÕ¾ÒѾ­ÇÔÈ¡ÁËÁè¼Ý7¸ö±ÈÌØ±Ò£¨¼ÛֵԼΪ4.5ÍòÃÀÔª£©µÄ×ʽð ¡£ÕâÖÖÍøÕ¾·þÎñ×ÊÖúÓû§½«Æä±ÈÌØ±ÒµØÖ·×ª»»³É¶þάÂë  £¬ÒÔ½»¸øÆäËüÓû§¾ÙÐÐÖ§¸¶ ¡£µ«Denley·¢Ã÷Õâ9¸öÍøÕ¾ÏÖʵÉÏÖ»ÌìÉúÁËÕ©Æ­ÕßÇ®°üµÄ¶þάÂë ¡£±ðµÄ  £¬ÍйÜÕâ9¸öÍøÕ¾µÄ3¸öWeb·þÎñÆ÷»¹ÍйÜ×Å450¶à¸öÆäËüµÄ¶ñÒâÍøÕ¾  £¬Ö»¹Ü´ó´ó¶¼ÍøÕ¾²¢²»»îÔ¾ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/network-of-fake-qr-code-generators-will-steal-your-bitcoin/


4.2004ÄêÖÁ2019Äê¶íÂÞ˹ºÚ¿ÍÔ˶¯ÆÊÎö±¨¸æ


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


ÃÀ¹úÇ鱨ÉçÇøµÄ²¼×È¡¤°¬Âס¤ººÃܶû¶Ù£¨Booz Allen Hamilton£©Ðû²¼ÁËÒ»·ÝÖÜÈ«±¨¸æ  £¬ÏêϸÏÈÈÝÁË2004ÄêÖÁ2019Äêʱ´ú¶íÂÞ˹µÄ¾üÊÂÍøÂç¹¥»÷Ô˶¯ ¡£¸Ã±¨¸æÖØµã¹Ø×¢ÓɶíÂÞ˹¾ü¶ÓÁ¥ÊôµÄÇ鱨²¿·Ö¾ÙÐеÄÍøÂç¹¥»÷ ¡£ÏêϸÀ´Ëµ  £¬Booz Allen½«ÒÑÍù15Äêʱ´úµÄ200¶à¸öGRUÍøÂç¹¥»÷Ô˶¯¹éΪ23Àà  £¬²¢Õ¹ÏÖÁËÿһ¸ö¹¥»÷Ô˶¯Óë¶íÂÞ˹ÖܱßÕþÖÎÇéÐÎת±äµÄ¹ØÏµ ¡£¸Ã±¨¸æµÄ×îÖÕ½áÂÛÊÇ¿ÉÒÔÕ¹ÍûGRUµÄÍøÂç¹¥»÷Ô˶¯ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/booz-allen-analyzed-200-russian-hacking-operations-to-better-understand-their-tactics/?&web_view=true


5.WPvivid²å¼þȱÉÙÊÚȨ¼ì²é  £¬¿ÉÓÃÓÚ»ñÈ¡ÍøÕ¾ËùÓÐÎļþ


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


WebARXÇ徲ר¼ÒÖÒÑÔ³Æ  £¬ÓÉÓÚWPvivid²å¼þÖÐȱÉÙÒ»¸öÊÚȨ¼ì²é  £¬µ¼Ö¹¥»÷Õ߿ɻñÈ¡WordPressÍøÕ¾µÄËùÓÐÎļþ ¡£WPvividÊÇÒ»¸öÃâ·ÑµÄ¶àºÏÒ»±¸·Ý¡¢»¹Ô­ºÍǨáã²å¼þ  £¬Ëü¾ßÓнü4Íò¸ö»îÔ¾×°Öà ¡£¶ÔÆä´úÂëµÄÆÊÎöÏÔʾ  £¬Ò»Ð©wp_ajax²Ù×÷δ¾ÙÐÐÊÚȨ¼ì²é  £¬´Ó¶ø¿Éµ¼Ö¿çÕ¾µãÇëÇóαÔ죨CSRF£©¹¥»÷ ¡£ÊÜÓ°Ïì×î´óµÄ²Ù×÷ÊÇ¡°wp_ajax_wpvivid_add_remote¡±  £¬ÕâÒâζמßÓÐÈκνÇÉ«µÄÓû§¶¼¿ÉÒÔÌí¼ÓеĴ洢λÖò¢½«ÆäÓÃ×÷ĬÈϱ¸·ÝλÖà  £¬µ±Ï´α¸·ÝÔËÐÐʱ  £¬Õû¸öÊý¾Ý¿â¼°Îļþ½«±»ÉÏ´«µ½¸Ã´æ´¢Î»Öà  £¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔ»á¼ûÈκÎÎļþ ¡£WPvivid¿ª·¢ÍŶÓÒѾ­ÔÚа汾ÖÐÐÞ¸´Á˸ÃÎÊÌâ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/100567/hacking/wpvivid-backup-plugin-flaw.html


6.¹È¸èÈ¥Äê¹²·¢Ëͽü4Íò¸öÕþ¸®Ö§³ÖµÄ´¹ÂÚ¹¥»÷ÖÒÑÔ


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


ÔÚ2019Äê  £¬¹È¸è¹²·¢ËÍÁ˽ü4Íò¸öÕë¶ÔÕþ¸®Ö§³ÖµÄ´¹ÂÚ¹¥»÷»ò¶ñÒâÈí¼þ¹¥»÷µÄÖÒÑÔ  £¬±È2018ÄêϽµÁ˽ü25£¥ ¡£Ï½µµÄÔµ¹ÊÔ­ÓÉÒ»·½ÃæÊDZ£»¤²½·¥Æðµ½ÁË×÷Óà  £¬ÁíÒ»·½ÃæÊǹ¥»÷ƵÂÊÕýÔÚ½µµÍ ¡£×î½ü¼¸¸öÔµÄһЩÐÂÐËÇ÷ÊÆ°üÀ¨£ºÃ°³äÐÂÎÅýÌåºÍ¼ÇÕßÉ¢²½ÐéαÐÅÏ¢µÄ¹¥»÷ÕýÔÚÔöÌí£»Õþ¸®Ö§³ÖµÄ¹¥»÷Õß¼ÌÐøÖ÷ÒªÕë¶ÔµØÔµÕþÖεÐÊÖ¡¢Õþ¸®¹ÙÔ±¡¢¼ÇÕß¡¢²î±ðÕþ¼ûÕߺͼ¤½ø·Ö×ӵȣ»¹¥»÷ÕßÖØ¸´¹¥»÷ͳһĿµÄ  £¬2019ÄêÓÐÎå·ÖÖ®Ò»µÄÓû§Ôâµ½¹¥»÷ÕߵĶà´Î¹¥»÷£»¹¥»÷Õ߯ð¾¢Ê¹ÓÃ0day¾ÙÐй¥»÷ ¡£

 

Ô­ÎÄÁ´½Ó£º

https://blog.google/technology/safety-security/threat-analysis-group/identifying-vulnerabilities-and-protecting-you-phishing/