È«Çò×î´óÈâÀàÉú²úÉÌJBSÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬¶à¸ö·Ö¹«Ë¾Í£²ú£»£»£»Ñо¿ÍŶӷ¢Ã÷кóÃÅFacefish£¬£¬£¬£¬£¬£¬£¬¿ÉÇÔÈ¡LinuxϵͳÐÅÏ¢
Ðû²¼Ê±¼ä 2021-06-011.È«Çò×î´óÈâÀàÉú²úÉÌJBSÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬¶à¸ö·Ö¹«Ë¾Í£²ú

JBSʳÎ﹫˾ÓÚÉÏÖÜÄ©Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÃÀ¹ú¡¢°Ä´óÀûÑǺͼÓÄôóµÈµØµÄ·Ö¹«Ë¾¡£¡£¡£¡£¡£JBSÊÇÈ«Çò×î´óµÄÅ£ÈâºÍ¼ÒÇÝÉú²úÉÌ£¬£¬£¬£¬£¬£¬£¬Ò²ÊÇÈ«ÇòµÚ¶þ´óÖíÈâÉú²úÉÌ£¬£¬£¬£¬£¬£¬£¬ÔÚÁù´óÖÞµÄ190¸ö¹ú¼Ò/µØÇø¶¼ÓÐÓªÒµ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬°Ä´óÀûÑÇÕþ¸®ÒÑ»ñϤÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¢ÕýÔÚÓëJBSÏàÖúÊÔͼ»Ö¸´¾³ÄÚµÄÉú²ú»î¶¯¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷µÄÐÔ×ÓµÈÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ¹¥»÷±¬·¢ÓÚÖÜÄ©£¬£¬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±Íƶϼ«ÓпÉÄÜÓëÀÕË÷Èí¼þÓйء£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/food-giant-jbs-foods-shuts-down-production-after-cyberattack/
2.°Ä´óÀûÑÇBLK Sport³ÆÆäÔâµ½DarkSideÀÕË÷Èí¼þ¹¥»÷

°Ä´óÀûÑÇBLK SportÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬³ÆÆäÄÚ²¿Ð§ÀÍÆ÷ÓÚ2021Äê4ÔÂ21ÈÕÔâµ½DarkSideÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¿Í»§ÐÅÏ¢ÒѾй¶¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨¿Í»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÈçÃû³Æ¡¢µØµã¡¢ÁªÏµ·½·¨¡¢ÌõÔ¼ÐÅÏ¢ºÍ¶©µ¥ÐÅÏ¢µÈ£»£»£»ÒÔ¼°¹©Ó¦ÉÌÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬È繫˾ºÍЧÀÍÖ°Ô±Ãû³Æ¡¢µØµã¡¢ÁªÏµ·½·¨¡¢ÌõÔ¼ÐÅÏ¢¡¢¶©µ¥ÐÅÏ¢ºÍÒøÐÐÕÊ»§ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ç¿Å²Óû§µÄÕ˺źÍÃÜÂ룬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÐÅÓÿ¨ºÅµÈ²ÆÎñÐÅÏ¢²¢Î´Ð¹Â¶¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.databreaches.net/au-blk-sport-reveals-darkside-attack/
3.Ñо¿ÍŶӷ¢Ã÷кóÃÅFacefish£¬£¬£¬£¬£¬£¬£¬¿ÉÇÔÈ¡LinuxϵͳÐÅÏ¢

Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öеĺóÃÅFacefish£¬£¬£¬£¬£¬£¬£¬¿É¿ØÖÆLinuxϵͳ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£FacefishÓÉDropperºÍRootkitÁ½²¿·Ö×é³É£¬£¬£¬£¬£¬£¬£¬ÆäÖ÷Òª¹¦Ð§ÓÉRootkitÄ£¿£¿£¿£¿£¿£¿£¿éÈ·¶¨£¬£¬£¬£¬£¬£¬£¬¸ÃÄ£¿£¿£¿£¿£¿£¿£¿éÔÚRing3²ãÊÂÇ飬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃLD_PRELOAD¹¦Ð§¾ÙÐмÓÔØ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÖ§³Ö¶àÖÖ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬°üÀ¨:ÉÏ´«×°±¸ÐÅÏ¢¡¢ÇÔÈ¡Óû§Æ¾Ö¤¡¢µ¯»ØshellºÍÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖFacefish½ÓÄÉÁËÖØ´óµÄÍ¨Ñ¶ÐæÅºÍ¼ÓÃÜËã·¨£¬£¬£¬£¬£¬£¬£¬ËüʹÓÃÒÔ0x2XX¿ªÍ·µÄÖ¸ÁîÀ´½»Á÷¹«Ô¿£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃBlowFishÓëC2ЧÀÍÆ÷¼ÓÃÜͨѶÊý¾Ý¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118388/malware/facefish-backdoor.html
4.Ñо¿ÍŶӷ¢Ã÷¶à¸ö¿ÉѬȾPulse Secure VPNµÄ¶ñÒâÈí¼þ

FireeyeÑо¿ÍŶӷ¢Ã÷Á˶à¸ö¿ÉѬȾPulse Secure VPN×°±¸µÄ¶ñÒâÈí¼þ¼Ò×å¡£¡£¡£¡£¡£ÕâЩ¶ñÒâÈí¼þʹÓõÄÎó²îÖ÷ÒªÊÇÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2021-22893£©£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ10£¬£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔ¶³ÌÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÒÑ·¢Ã÷ÁË16¸ö´ËÀà¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÓÃÓÚÆÊÎöPSCÈÕÖ¾ÎļþµÄBloodmine¡¢ÇÔȡƾ֤µÄBloodbank¡¢ÄÚ´æ²¹¶¡¹¤¾ßCleanpulseºÍWeb shell RapidpulseµÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-find-four-new-malware-tools-created-to-exploit-pulse-secure-vpn-appliances/
5.ImpervaÐû²¼ÓйØ2020ÄêÍøÂçÍþв·ÀÓùµÄÆÊÎö±¨¸æ

ImpervaÐû²¼ÁËÓйØ2020ÄêÍøÂçÍþв·ÀÓùµÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬Éæ¼°17¸ö¹ú¼ÒµÄ19¸öÐÐÒµµÄ1200ÃûITÇ徲רҵְԱ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬È¥Ä꣬£¬£¬£¬£¬£¬£¬86£¥µÄ×éÖ¯Ôâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ69£¥µÄ×éÖ¯Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¶ø57£¥µÄÊܺ¦ÕßÖ§¸¶ÁËÊê½ð£»£»£»¹Å°åÐÐÒµµÄITÇå¾²Ô¤ËãÔöÌíÁË4£¥£¬£¬£¬£¬£¬£¬£¬87£¥µÄ×éÖ¯Óöµ½ÁËITÇ徲ְԱǷȱµÄÎÊÌ⣻£»£»ËÄ·ÖÖ®ÈýµÄ×éÖ¯½«ÔÚÃ÷ÄêʵÑéSD-WAN¡¢ÁãÐÅÈÎÍøÂç»á¼û£¨ZTNA£©ºÍÇå¾²»á¼ûЧÀͱßÑØ£¨SASE£©ÊÖÒÕ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.imperva.com/resources/resource-library/reports/2021-cyberthreat-defense-report/
6.PerimeterxÐû²¼2020ÄêµçÉÌڲƻµÄÆÊÎö±¨¸æ

PerimeterxÐû²¼ÁË2020ÄêµçÉÌڲƻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Õë¶Ôµç×ÓÉÌÎñÁãÊÛÉ̵Äڲƹ¥»÷ÔÚÊýÄ¿¡¢ÆµÂʺÍÅÓºéˮƽÉ϶¼ÓÐËùÔöÌí¡£¡£¡£¡£¡£2020Äê4Ô£¬£¬£¬£¬£¬£¬£¬ÌÂÈû¿îƽ̨µÄ¹¥»÷ÔöÌíÁË69%£»£»£»ÔÚÏÞÁ¿°æÔ˶¯Ð¬ÏúÊÛá¯Áëʱ´ú£¬£¬£¬£¬£¬£¬£¬»ÆÅ£botÌᳫÁËÁè¼Ý40%µÄ¹ºÎïÇëÇ󣻣»£»ÔÚ9Ô·ݣ¬£¬£¬£¬£¬£¬£¬85%µÄµÇ¼ÊÇATOʵÑ飬£¬£¬£¬£¬£¬£¬¶øÛÕ±ÕÁ÷Á¿µÄ·åֵˮƽÔÚËĸöÔÂÄÚÁè¼ÝÁË95£¥£»£»£»2020Ä꣬£¬£¬£¬£¬£¬£¬ÃÀ¹úÿ¸öÖ÷ÒªµÄ¼ÙÆÚ¶¼±¬·¢ÀñÎ│ڲÆÊÂÎñ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.perimeterx.com/resources/reports/automated-fraud-benchmark-report-e-commerce-edition/


¾©¹«Íø°²±¸11010802024551ºÅ