¶ñÒâÈí¼þAlina»Ø¹é£¬£¬£¬Ê¹ÓÃDNSËíµÀÇÔÊØÐÅÓÿ¨Êý¾Ý£»£»£»£»£»CiscoÖÒÑÔСÐÍÆóÒµ½»Á÷»ú±£´æÎó²î£¬£¬£¬¿É»á¼ûÖÎÀí½çÃæ
Ðû²¼Ê±¼ä 2020-07-031.¶ñÒâÈí¼þAlina»Ø¹é£¬£¬£¬Ê¹ÓÃDNSËíµÀÇÔÊØÐÅÓÿ¨Êý¾Ý
Black Lotus LabsÑо¿Ö°Ô±·¢Ã÷POS¶ñÒâÈí¼þAlina»Ø¹é£¬£¬£¬Ê¹ÓÃDNSËíµÀÇÔÊØÐÅÓÿ¨Êý¾Ý¡£¡£¡£¡£ÔÚÐÅÓÿ¨ÉúÒâʱ´ú£¬£¬£¬Êý¾Ýͨ³£»£»£»£»£»á±»½âÃÜ£¬£¬£¬²¢ÒÔδ¼ÓÃܵÄÐÎʽÔÝʱ´æ´¢ÔÚPOS´æ´¢Æ÷ÖС£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»áÔÚPOS×°±¸µÄRAMÖÐËÑË÷´Ëδ¼ÓÃܵÄÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬²¢½«Æä·¢ËÍ»ØC2ЧÀÍÆ÷¡£¡£¡£¡£ÎªÁËÈ·±£ÔÚÄÜÕÒµ½ÕæÊµµÄÐÅÓÿ¨Êý¾Ý£¬£¬£¬¶ñÒâÈí¼þ»¹»áʹÓÃLuhnУÑéºÍËã·¨ÑéÖ¤¿¨ºÅµÄ×îºóһλÊÇ·ñΪ׼ȷµÄУÑéλ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/alina-point-sale-malware-ongoing-campaign/157087/
2.ÃÀ¹úCISAÐû²¼·ÀÓùÀ´×ÔTorÄäÃûÍøÂçµÄ¹¥»÷µÄÖ¸ÄÏ
ÃÀ¹úCISAÐû²¼ÁËÆäÓëFBIÏàÖú±àдµÄÓйر£»£»£»£»£»¤ÍøÂçÃâÊÜÀ´×ÔTorÄäÃûÍøÂçÌᳫµÄÍøÂç¹¥»÷µÄÖ¸ÄÏ£¬£¬£¬ÏÈÈÝÁ˺ڿÍÔÚ¹¥»÷»î¶¯ÖÐʹÓÃTor¾ÙÐÐÄäÃûµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¸ÃÖ¸ÄÏÖеÄʾÀý°üÀ¨Ö´ÐÐÕì̽¡¢ÉøÍ¸ÏµÍ³¡¢ÇÔÈ¡ºÍʹÓÃÊý¾Ý¡¢ÒÔ¼°Í¨¹ý¾Ü¾øÐ§À͹¥»÷ºÍÀÕË÷Èí¼þÓÐÓÃÔØºÉµÄת´ïʹЧÀÍÍÑ»ú¡£¡£¡£¡£±ðµÄ£¬£¬£¬CISAºÍFBI½¨Ò鹫˾ºÍ×é֯ͨ¹ýÆÀ¹ÀËûÃÇÒòTorÔì³ÉµÄСÎÒ˽¼ÒΣº¦Î£º¦£¬£¬£¬À´½ÓÄÉÊʵ±µÄ»º½â²½·¥£¬£¬£¬ÒÔ×èÖ¹»ò¼àÊÓÀ´×ÔÒÑÖªTor½ÚµãµÄÈëÕ¾ºÍ³öÕ¾Á÷Á¿¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/us-govt-shares-tips-on-defending-against-cyberattacks-via-tor/
3.ÃÀ¹úNSAÐû²¼Óйر£»£»£»£»£»¤IPsecÐéÄâרÓÃÍøÂçµÄÖ¸ÄÏ
ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©Ðû²¼ÁËÓйØÔõÑù׼ȷ±£»£»£»£»£»¤IPÇå¾²£¨IPsec£©ÐéÄâרÓÃÍø£¨VPN£©ÃâÊÜDZÔÚ¹¥»÷µÄÖ¸ÄÏ¡£¡£¡£¡£¸ÃÖ¸ÄϳýÁËΪ×éÖ¯ÌṩÓйØÔõÑù±£»£»£»£»£»¤IPsecµÄ½¨ÒéÍ⣬£¬£¬»¹Ç¿µ÷ÁËʹÓÃǿʢµÄ¼ÓÃÜÊÖÒÕ±£»£»£»£»£»¤Á÷Á¿ÖаüÀ¨µÄÃô¸ÐÐÅÏ¢£¬£¬£¬ÒÔ¼°ÔÚÅþÁ¬µ½Ô¶³ÌЧÀÍÆ÷ʱ±éÀú²»ÊÜÐÅÈεÄÍøÂçµÄÖ÷ÒªÐÔ¡£¡£¡£¡£NSAÌåÏÖVPNÊÇÆôÓÃÔ¶³Ì»á¼ûºÍÇå¾²ÅþÁ¬Ô¶³ÌÕ¾µãËù±ØÐèµÄ£¬£¬£¬µ«Ã»ÓÐÊʵ±µÄÉèÖᢲ¹¶¡ÖÎÀí¡¢ºÍ¼Ó¹ÌµÄVPNÊÇÈÝÒ×Êܵ½¹¥»÷¡£¡£¡£¡£NSA½¨ÒéïÔÌVPNÍø¹ØµÄ¹¥»÷Ãæ£¬£¬£¬ÑéÖ¤¼ÓÃÜËã·¨ÊÇ·ñÇкϹú¼ÒÇ徲ϵͳÕþ²ßίԱ»á£¨CNSSP£©15µÄ»®¶¨£¬£¬£¬×èֹʹÓÃĬÈϵÄVPNÉèÖ㬣¬£¬É¾³ýδʹÓûò²»ÇкÏÒªÇóµÄ¼ÓÃÜÌ×¼þ£¬£¬£¬ÒÔ¼°ÊµÊ±¸üÐÂVPNÍø¹ØºÍ¿Í»§¶Ë¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/nsa-releases-guidance-on-securing-ipsec-virtual-private-networks/
4.ÃÀ¹úÊýÊ®¸öÐÂÎÅÍøÕ¾Ôâµ½ÀÕË÷Èí¼þWastedLocker¹¥»÷
SymantecÍþвÇ鱨Ñо¿Ö°Ô±Ö¤Êµ£¬£¬£¬Evil CorpÈëÇÖÁË30¶à¼ÒÃÀ¹ú´óÐÍ˽Ӫ¹«Ë¾£¬£¬£¬¶øÕâЩ¹«Ë¾ÆìϵÄÊýÊ®¼ÒÐÂÎÅÍøÕ¾Ò²Ôâµ½Á˹¥»÷¡£¡£¡£¡£ºÚ¿ÍʹÓÃÁË»ùÓÚJavaScriptµÄ¶ñÒâSocGholish¿ò¼Ü¾ÙÐй¥»÷£¬£¬£¬Ê×ÏÈͨ¹ý·¢ËÍαÔìµÄÈí¼þ¸üÐÂÌáÐÑ·Ö·¢¶ñÒâÈí¼þÓÐÓÃÔØºÉ¡£¡£¡£¡£Ò»µ©¹«Ë¾Ô±¹¤±»Ñ¬È¾ºó£¬£¬£¬ºÚ¿Í¾Í»áʹÓÃCobalt StrikeÍþв·ÂÕæÈí¼þºÍһЩԶ³Ì¹¤¾ßÇÔȡƾ֤¡¢ÌáÉýȨÏÞ²¢ÔÚÍøÂçÉÏÒÆ¶¯£¬£¬£¬×îÖÕ×°ÖÃÀÕË÷Èí¼þWastedLocker¡£¡£¡£¡£²¢ÇÒ£¬£¬£¬ÔÚ×°ÖÃÀÕË÷Èí¼þ֮ǰ£¬£¬£¬ËûÃÇ»¹Ê¹ÓÃPowerShell¾ç±¾ºÍÕýµ±¹¤¾ßÔÚÊܺ¦ÕßµÄÍøÂçÉϽûÓÃWindows Defender¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/dozens-of-us-news-sites-hacked-in-wastedlocker-ransomware-attacks/
5.CiscoÖÒÑÔÆäСÐÍÆóÒµ½»Á÷»ú±£´æÎó²î£¬£¬£¬¿É»á¼ûÖÎÀí½çÃæ
Cisco SystemsÖÒÑԳƣ¬£¬£¬Ò»¸öÑÏÖØµÄÎó²îÓ°ÏìÁËÆä7¿îСÐÍÆóÒµ½»Á÷»ú£¬£¬£¬¸ÃÎó²î¿Éʹδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»ñµÃCiscoСÐÍÆóÒµ½»Á÷»úµÄÖÎÀíȨÏÞ¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2020-3297£©±¬·¢µÄÔµ¹ÊÔÓÉÔÚÓÚʹÓÃÈõìØÌìÉú»á»°±êʶ·ûÖµ¡£¡£¡£¡£Ë¼¿ÆµÄת´ï³Æ£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý±©Á¦¹¥»÷ʹÓôËÎó²îÀ´È·¶¨Ä¿½ñ»á»°±êʶ·û£¬£¬£¬È»ºóÖØÓøûỰ±êʶ·ûÀ´½ÓÊÜÕýÔÚ¾ÙÐеĻỰ¡£¡£¡£¡£ÊÜ´ËÎó²îÓ°ÏìµÄ²úÆ·ÓУºCisco 250ϵÁÐÖÇÄܽ»Á÷»ú¡¢350ϵÁÐÖÎÀíÐͽ»Á÷»ú¡¢350XϵÁпɶѵþÖÎÀíÐͽ»Á÷»ú¡¢550XϵÁпɶѵþÖÎÀíÐͽ»Á÷»ú¡¢Small Business 200ϵÁÐÖÇÄܽ»Á÷»ú¡¢Small Business 300ϵÁÐÖÎÀíÐͽ»Á÷»úºÍSmall Business 500ϵÁпɶѵþÖÎÀíÐÍ¿ª¹Ø¡£¡£¡£¡£Ë¼¿ÆÔڹ̼þ°æ±¾2.5.5.47ÖÐÐÞ¸´ÁËÕâ¸öÎó²î¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/cisco-warns-high-severity-bug-small-business-switch/157090/
6.¾Ýͳ¼Æ£¬£¬£¬2020 Q1 DDoS¹¥»÷±ÈÈ¥Äêͬ±ÈÔöÌí278£¥
ƾ֤NexusguardµÄÊý¾Ý£¬£¬£¬2020ÄêµÚÒ»¼¾¶ÈµÄDDoS¹¥»÷ÊýÄ¿Óë2019ÄêµÚÒ»¼¾¶ÈÏà±ÈÔöÌíÁË278£¥ÒÔÉÏ£¬£¬£¬ÓëÉÏÒ»¼¾¶ÈÏà±ÈÔöÌíÁË542£¥ÒÔÉÏ¡£¡£¡£¡£ÊÓ²ìЧ¹ûÅú×¢£¬£¬£¬Ë鯬¹¥»÷ÔÚ¼ÌÐøÉøÍ¸¹Å°åµÄãÐÖµ¼ì²â£¬£¬£¬ÕâЩ¹¥»÷µÄЧ¹ûÊǽ«´ó×ÚÀ¬»øÁ÷Á¿»ãÈëÒ»¸ö´óµÄIP³Ø£¬£¬£¬µ±²î±ðIP×îÏÈÀÛ»ýʱ£¬£¬£¬ÕâЩÀ¬»øÁ÷Á¿»áÛÕ±ÕÄ¿µÄ¡£¡£¡£¡£¸Ã±¨¸æÅú×¢£¬£¬£¬90%µÄ¹¥»÷ʹÓõÄÊǵ¥Ê¸Á¿¹¥»÷£¬£¬£¬ÕâÓëÒÑÍùÊ¢ÐеĶàʸÁ¿¹¥»÷ÓÐËù²î±ð¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/07/02/q1-2020-ddos-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ