¶ñÒâÈí¼þAlina»Ø¹é£¬£¬ £¬£¬£¬£¬£¬Ê¹ÓÃDNSËíµÀÇÔÊØÐÅÓÿ¨Êý¾Ý£»£»£»CiscoÖÒÑÔСÐÍÆóÒµ½»Á÷»ú±£´æÎó²î£¬£¬ £¬£¬£¬£¬£¬¿É»á¼ûÖÎÀí½çÃæ

Ðû²¼Ê±¼ä 2020-07-03

1.¶ñÒâÈí¼þAlina»Ø¹é£¬£¬ £¬£¬£¬£¬£¬Ê¹ÓÃDNSËíµÀÇÔÊØÐÅÓÿ¨Êý¾Ý


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Black Lotus LabsÑо¿Ö°Ô±·¢Ã÷POS¶ñÒâÈí¼þAlina»Ø¹é£¬£¬ £¬£¬£¬£¬£¬Ê¹ÓÃDNSËíµÀÇÔÊØÐÅÓÿ¨Êý¾Ý¡£¡£¡£¡£¡£ÔÚÐÅÓÿ¨ÉúÒâʱ´ú£¬£¬ £¬£¬£¬£¬£¬Êý¾Ýͨ³£»£»£»á±»½âÃÜ£¬£¬ £¬£¬£¬£¬£¬²¢ÒÔδ¼ÓÃܵÄÐÎʽÔÝʱ´æ´¢ÔÚPOS´æ´¢Æ÷ÖС£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»áÔÚPOS×°±¸µÄRAMÖÐËÑË÷´Ëδ¼ÓÃܵÄÐÅÓÿ¨ÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬²¢½«Æä·¢ËÍ»ØC2ЧÀÍÆ÷¡£¡£¡£¡£¡£ÎªÁËÈ·±£ÔÚÄÜÕÒµ½ÕæÊµµÄÐÅÓÿ¨Êý¾Ý£¬£¬ £¬£¬£¬£¬£¬¶ñÒâÈí¼þ»¹»áʹÓÃLuhnУÑéºÍËã·¨ÑéÖ¤¿¨ºÅµÄ×îºóһλÊÇ·ñΪ׼ȷµÄУÑéλ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/alina-point-sale-malware-ongoing-campaign/157087/


2.ÃÀ¹úCISAÐû²¼·ÀÓùÀ´×ÔTorÄäÃûÍøÂçµÄ¹¥»÷µÄÖ¸ÄÏ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ÃÀ¹úCISAÐû²¼ÁËÆäÓëFBIÏàÖú±àдµÄÓйر£»£»£»¤ÍøÂçÃâÊÜÀ´×ÔTorÄäÃûÍøÂçÌᳫµÄÍøÂç¹¥»÷µÄÖ¸ÄÏ£¬£¬ £¬£¬£¬£¬£¬ÏÈÈÝÁ˺ڿÍÔÚ¹¥»÷»î¶¯ÖÐʹÓÃTor¾ÙÐÐÄäÃûµÄÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏÖеÄʾÀý°üÀ¨Ö´ÐÐÕì̽¡¢ÉøÍ¸ÏµÍ³¡¢ÇÔÈ¡ºÍʹÓÃÊý¾Ý¡¢ÒÔ¼°Í¨¹ý¾Ü¾øÐ§À͹¥»÷ºÍÀÕË÷Èí¼þÓÐÓÃÔØºÉµÄת´ïʹЧÀÍÍÑ»ú¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬£¬CISAºÍFBI½¨Ò鹫˾ºÍ×é֯ͨ¹ýÆÀ¹ÀËûÃÇÒòTorÔì³ÉµÄСÎÒ˽¼ÒΣº¦Î£º¦£¬£¬ £¬£¬£¬£¬£¬À´½ÓÄÉÊʵ±µÄ»º½â²½·¥£¬£¬ £¬£¬£¬£¬£¬ÒÔ×èÖ¹»ò¼àÊÓÀ´×ÔÒÑÖªTor½ÚµãµÄÈëÕ¾ºÍ³öÕ¾Á÷Á¿¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-govt-shares-tips-on-defending-against-cyberattacks-via-tor/


3.ÃÀ¹úNSAÐû²¼Óйر£»£»£»¤IPsecÐéÄâרÓÃÍøÂçµÄÖ¸ÄÏ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©Ðû²¼ÁËÓйØÔõÑù׼ȷ±£»£»£»¤IPÇå¾²£¨IPsec£©ÐéÄâרÓÃÍø£¨VPN£©ÃâÊÜDZÔÚ¹¥»÷µÄÖ¸ÄÏ¡£¡£¡£¡£¡£¸ÃÖ¸ÄϳýÁËΪ×éÖ¯ÌṩÓйØÔõÑù±£»£»£»¤IPsecµÄ½¨ÒéÍ⣬£¬ £¬£¬£¬£¬£¬»¹Ç¿µ÷ÁËʹÓÃǿʢµÄ¼ÓÃÜÊÖÒÕ±£»£»£»¤Á÷Á¿ÖаüÀ¨µÄÃô¸ÐÐÅÏ¢£¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°ÔÚÅþÁ¬µ½Ô¶³ÌЧÀÍÆ÷ʱ±éÀú²»ÊÜÐÅÈεÄÍøÂçµÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£NSAÌåÏÖVPNÊÇÆôÓÃÔ¶³Ì»á¼ûºÍÇå¾²ÅþÁ¬Ô¶³ÌÕ¾µãËù±ØÐèµÄ£¬£¬ £¬£¬£¬£¬£¬µ«Ã»ÓÐÊʵ±µÄÉèÖᢲ¹¶¡ÖÎÀí¡¢ºÍ¼Ó¹ÌµÄVPNÊÇÈÝÒ×Êܵ½¹¥»÷¡£¡£¡£¡£¡£NSA½¨ÒéïÔÌ­VPNÍø¹ØµÄ¹¥»÷Ãæ£¬£¬ £¬£¬£¬£¬£¬ÑéÖ¤¼ÓÃÜËã·¨ÊÇ·ñÇкϹú¼ÒÇ徲ϵͳÕþ²ßίԱ»á£¨CNSSP£©15µÄ»®¶¨£¬£¬ £¬£¬£¬£¬£¬×èֹʹÓÃĬÈϵÄVPNÉèÖ㬣¬ £¬£¬£¬£¬£¬É¾³ýδʹÓûò²»ÇкÏÒªÇóµÄ¼ÓÃÜÌ×¼þ£¬£¬ £¬£¬£¬£¬£¬ÒÔ¼°ÊµÊ±¸üÐÂVPNÍø¹ØºÍ¿Í»§¶Ë¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/nsa-releases-guidance-on-securing-ipsec-virtual-private-networks/


4.ÃÀ¹úÊýÊ®¸öÐÂÎÅÍøÕ¾Ôâµ½ÀÕË÷Èí¼þWastedLocker¹¥»÷


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


SymantecÍþвÇ鱨Ñо¿Ö°Ô±Ö¤Êµ£¬£¬ £¬£¬£¬£¬£¬Evil CorpÈëÇÖÁË30¶à¼ÒÃÀ¹ú´óÐÍ˽Ӫ¹«Ë¾£¬£¬ £¬£¬£¬£¬£¬¶øÕâЩ¹«Ë¾ÆìϵÄÊýÊ®¼ÒÐÂÎÅÍøÕ¾Ò²Ôâµ½Á˹¥»÷¡£¡£¡£¡£¡£ºÚ¿ÍʹÓÃÁË»ùÓÚJavaScriptµÄ¶ñÒâSocGholish¿ò¼Ü¾ÙÐй¥»÷£¬£¬ £¬£¬£¬£¬£¬Ê×ÏÈͨ¹ý·¢ËÍαÔìµÄÈí¼þ¸üÐÂÌáÐÑ·Ö·¢¶ñÒâÈí¼þÓÐÓÃÔØºÉ¡£¡£¡£¡£¡£Ò»µ©¹«Ë¾Ô±¹¤±»Ñ¬È¾ºó£¬£¬ £¬£¬£¬£¬£¬ºÚ¿Í¾Í»áʹÓÃCobalt StrikeÍþв·ÂÕæÈí¼þºÍһЩԶ³Ì¹¤¾ßÇÔȡƾ֤¡¢ÌáÉýȨÏÞ²¢ÔÚÍøÂçÉÏÒÆ¶¯£¬£¬ £¬£¬£¬£¬£¬×îÖÕ×°ÖÃÀÕË÷Èí¼þWastedLocker¡£¡£¡£¡£¡£²¢ÇÒ£¬£¬ £¬£¬£¬£¬£¬ÔÚ×°ÖÃÀÕË÷Èí¼þ֮ǰ£¬£¬ £¬£¬£¬£¬£¬ËûÃÇ»¹Ê¹ÓÃPowerShell¾ç±¾ºÍÕýµ±¹¤¾ßÔÚÊܺ¦ÕßµÄÍøÂçÉϽûÓÃWindows Defender¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dozens-of-us-news-sites-hacked-in-wastedlocker-ransomware-attacks/


5.CiscoÖÒÑÔÆäСÐÍÆóÒµ½»Á÷»ú±£´æÎó²î£¬£¬ £¬£¬£¬£¬£¬¿É»á¼ûÖÎÀí½çÃæ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Cisco SystemsÖÒÑԳƣ¬£¬ £¬£¬£¬£¬£¬Ò»¸öÑÏÖØµÄÎó²îÓ°ÏìÁËÆä7¿îСÐÍÆóÒµ½»Á÷»ú£¬£¬ £¬£¬£¬£¬£¬¸ÃÎó²î¿Éʹδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»ñµÃCiscoСÐÍÆóÒµ½»Á÷»úµÄÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2020-3297£©±¬·¢µÄÔµ¹ÊÔ­ÓÉÔÚÓÚʹÓÃÈõìØÌìÉú»á»°±êʶ·ûÖµ¡£¡£¡£¡£¡£Ë¼¿ÆµÄת´ï³Æ£¬£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý±©Á¦¹¥»÷ʹÓôËÎó²îÀ´È·¶¨Ä¿½ñ»á»°±êʶ·û£¬£¬ £¬£¬£¬£¬£¬È»ºóÖØÓøûỰ±êʶ·ûÀ´½ÓÊÜÕýÔÚ¾ÙÐеĻỰ¡£¡£¡£¡£¡£ÊÜ´ËÎó²îÓ°ÏìµÄ²úÆ·ÓУºCisco 250ϵÁÐÖÇÄܽ»Á÷»ú¡¢350ϵÁÐÖÎÀíÐͽ»Á÷»ú¡¢350XϵÁпɶѵþÖÎÀíÐͽ»Á÷»ú¡¢550XϵÁпɶѵþÖÎÀíÐͽ»Á÷»ú¡¢Small Business 200ϵÁÐÖÇÄܽ»Á÷»ú¡¢Small Business 300ϵÁÐÖÎÀíÐͽ»Á÷»úºÍSmall Business 500ϵÁпɶѵþÖÎÀíÐÍ¿ª¹Ø¡£¡£¡£¡£¡£Ë¼¿ÆÔڹ̼þ°æ±¾2.5.5.47ÖÐÐÞ¸´ÁËÕâ¸öÎó²î¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/cisco-warns-high-severity-bug-small-business-switch/157090/


6.¾Ýͳ¼Æ£¬£¬ £¬£¬£¬£¬£¬2020 Q1 DDoS¹¥»÷±ÈÈ¥Äêͬ±ÈÔöÌí278£¥


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ƾ֤NexusguardµÄÊý¾Ý£¬£¬ £¬£¬£¬£¬£¬2020ÄêµÚÒ»¼¾¶ÈµÄDDoS¹¥»÷ÊýÄ¿Óë2019ÄêµÚÒ»¼¾¶ÈÏà±ÈÔöÌíÁË278£¥ÒÔÉÏ£¬£¬ £¬£¬£¬£¬£¬ÓëÉÏÒ»¼¾¶ÈÏà±ÈÔöÌíÁË542£¥ÒÔÉÏ¡£¡£¡£¡£¡£ÊÓ²ìЧ¹ûÅú×¢£¬£¬ £¬£¬£¬£¬£¬Ë鯬¹¥»÷ÔÚ¼ÌÐøÉøÍ¸¹Å°åµÄãÐÖµ¼ì²â£¬£¬ £¬£¬£¬£¬£¬ÕâЩ¹¥»÷µÄЧ¹ûÊǽ«´ó×ÚÀ¬»øÁ÷Á¿»ãÈëÒ»¸ö´óµÄIP³Ø£¬£¬ £¬£¬£¬£¬£¬µ±²î±ðIP×îÏÈÀÛ»ýʱ£¬£¬ £¬£¬£¬£¬£¬ÕâЩÀ¬»øÁ÷Á¿»áÛÕ±ÕÄ¿µÄ¡£¡£¡£¡£¡£¸Ã±¨¸æÅú×¢£¬£¬ £¬£¬£¬£¬£¬90%µÄ¹¥»÷ʹÓõÄÊǵ¥Ê¸Á¿¹¥»÷£¬£¬ £¬£¬£¬£¬£¬ÕâÓëÒÑÍùÊ¢ÐеĶàʸÁ¿¹¥»÷ÓÐËù²î±ð¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/07/02/q1-2020-ddos-attacks/