ÃÀ¹ú²ÆÎñ²¿µÈ²¿·ÖÔâµ½ÓëFireEyeÏàͬµÄ¹©Ó¦Á´¹¥»÷£»£»£»£»£»£»£»GoogleÈ«ÇòЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬YouTubeºÍGmailµÈÓ¦ÓÃÊÜÓ°Ïì
Ðû²¼Ê±¼ä 2020-12-151.ÃÀ¹ú²ÆÎñ²¿µÈ²¿·ÖÔâµ½ÓëFireEyeÏàͬµÄ¹©Ó¦Á´¹¥»÷

ÃÀ¹ú²ÆÎñ²¿ºÍÉÌÎñ²¿¹ú¼ÒµçÐÅÓëÐÅÏ¢ÖÎÀí¾Ö£¨NTIA£©Ôâµ½ÓëFireEyeÏàͬµÄ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£Çå¾²¹«Ë¾FireEye½ñÌìÌåÏÖ£¬£¬£¬£¬£¬Õþ¸®Ö§³ÖµÄºÚ¿Í¹¥»÷ÁËÈí¼þÌṩÉÌSolarWinds£¬£¬£¬£¬£¬È»ºóΪÆäOrionÈí¼þ°²ÅÅÁ˶ñÒâ¸üгÌÐò£¬£¬£¬£¬£¬ÒÔѬȾ¶à¸öÃÀ¹ú¹«Ë¾ºÍÕþ¸®ÍøÂ磬£¬£¬£¬£¬FireEye֮ǰҲÔâµ½ÁËÐÎͬµÄ¹¥»÷¡£¡£¡£¡£SolarWindsÈ·ÈÏÆäÔÚ2020Äê3ÔÂÖÁ6ÔÂÖ®¼äÐû²¼µÄOrion¸üа汾2019.4ÖÁ2020.2.1Òѱ»¶ñÒâÈí¼þѬȾ¡£¡£¡£¡£¾ÝÐÅ£¬£¬£¬£¬£¬´Ë´Î¹¥»÷»î¶¯Óë¶íÂÞ˹Íâ¹úÇ鱨¾Ö£¨SVR£©Ïà¹ØµÄºÚ¿Í×éÖ¯APT29Óйء£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/
2.GoogleÈ«ÇòЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬YouTubeºÍGmailµÈÓ¦ÓÃÊÜÓ°Ïì

GoogleÈ«ÇòЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬Óû§ÎÞ·¨»á¼ûGmail¡¢YouTube¡¢GoogleÔÆ¶ËÓ²ÅÌ¡¢GoogleµØÍ¼ºÍGoogleÈÕÀúµÈGoogleЧÀÍ¡£¡£¡£¡£Æ¾Ö¤DownDetectorͳ¼Æ£¬£¬£¬£¬£¬´Ë´ÎÖÐÖ¹Ö÷Òª±¬·¢ÔÚÃÀ¹úºÍÅ·Ö޵ȵØÇø¡£¡£¡£¡£Óû§ÔÚʵÑé»á¼ûYouTubeʱ»á¿´µ½¼ÓÔØÆÁÄ»ºÍ¡°Ð§ÀÍÆ÷±£´æÎÊÌ⣨503£©-µã»÷ÒÔÖØÊÔ¡±µÄ¹ýʧÐÂÎÅ£¬£¬£¬£¬£¬Ò²ÎÞ·¨Ê¹ÓÃAndroidºÍiOSµÄGmail·¢ËÍ»ò»á¼ûµç×ÓÓʼþ¡£¡£¡£¡£GoogleËæºó½â¾öÁ˸ÃÎÊÌ⣬£¬£¬£¬£¬²¢³ÆÓÉÓÚÄÚ²¿´æ´¢Åä¶îÎÊÌ⣬£¬£¬£¬£¬µ¼ÖÂGoogleÉí·ÝÑé֤ϵͳÖÐÖ¹ÁËԼĪ45·ÖÖÓ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/google/google-outage-affecting-youtube-gmail-and-more/
3.CheckPointÅû¶SteamÖб£´æ¶à¸ö¿É½ÓÊÜÅÌËã»úµÄÎó²î

CheckPointµÄÑо¿Ö°Ô±Eyal ItkinÅû¶SteamÖб£´æ¶à¸öÎó²î£¬£¬£¬£¬£¬¿É±»ÓÃÀ´ÈëÇÖ²¢Ô¶³Ì¿ØÖÆÊýÊ®Íǫ̀ÅÌËã»ú¡£¡£¡£¡£Itkin³ÆÕâЩÎó²î¶¼±£´æÓÚʵÏÖÓÎÏ·ÍøÂçÌ×½Ó×Ö£¨GNS£©¿âµÄÀú³ÌÖУ¬£¬£¬£¬£¬»®·ÖΪ¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÄÚ´æËð»µÎó²î£¨CVE-2020-6016¡¢CVE-2020-6017ºÍCVE-2020-6018£©£¬£¬£¬£¬£¬ÒÔ¼°ÎÞ·¨×¼È·´¦Öóͷ£º¯Êýµ¼ÖµÄlibprotobufÒì³£ºÍÍ߽⣨CVE-2020-6019£©¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²îÔ¶³ÌÇÔÈ¡Êܺ¦ÕߵĵǼƾ֤µÈСÎÒ˽¼ÒÊý¾Ý¡¢ÆÆËðValveÓÎϷЧÀÍÆ÷¡¢ÆÆËðµÐÊÖµÄÓÎÏ·¿Í»§¶ËÒÔ¼°¶ÔµÚÈý·½ÓÎϷЧÀÍÆ÷Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/steam-vulnerabilities-remote-take-over-users-computers/
4.APT×éÖ¯MoleRatsʹÓÃFacebookºÍDropbox¾ÙÐÐÌØ¹¤»î¶¯

CybereasonÑо¿Ö°Ô±·¢Ã÷APT×éÖ¯MoleRats¿ª·¢ÁËÁ½¸öеÄSharpStageºóÃźÍDropBookºóÃÅ£¬£¬£¬£¬£¬Ê¹ÓÃFacebookºÍDropbox¾ÙÐÐÌØ¹¤»î¶¯¡£¡£¡£¡£MoleRatsÊǼÓɳµÄºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬×îÐµĹ¥»÷»î¶¯Ö÷ÒªÕë¶Ô°£¼°¡¢°ÍÀÕ˹̹ÁìÍÁ¡¢ÍÁ¶úÆäºÍ°¢ÁªÇõµÄ¸ß¼¶ÕþÖÎÈËÎïºÍÕþ¸®¹ÙÔ±¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬DropBookºóÃÅʹÓÃÁËαÔìµÄFacebookÕÊ»§ºÍSimplenote×÷ΪC2£¬£¬£¬£¬£¬²¢ÇÒÕâÁ½¸öºóÃŶ¼Ê¹ÓÃÁËDropbox¿Í»§¶ËÀ´ÇÔÈ¡±»µÁÊý¾Ý²¢´æ´¢ÆäÌØ¹¤¹¤¾ß¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/molerats-apt-espionage-facebook-dropbox/162162/
5.kasperskyÐû²¼ÓйØÚ²ÆÔ¤·ÀµÄÆÊÎö±¨¸æ

kasperskyÐû²¼ÓйØÚ²ÆÔ¤·ÀµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬µ½2020Ä꣬£¬£¬£¬£¬¹¥»÷Õß×ʹÓÃÊÜѬȾÕÊ»§£¨ÔÚ36£¥£©»òͨ¹ýÓöñÒâÈí¼þѬȾװ±¸£¨31£¥£©À´¾ÙÐÐδ¾ÊÚȨµÄ»ã¿î¡£¡£¡£¡£ÔÚ2019Ä꣬£¬£¬£¬£¬¶ñÒâÈí¼þ¹¥»÷ÊýÄ¿×î¶à£¬£¬£¬£¬£¬Îª¼Í¼µÄ×ÜÊýµÄ63£¥£¬£¬£¬£¬£¬ÏÖÔÚÄ꣬£¬£¬£¬£¬ÓëÏ´Ç®Ïà¹ØµÄ°¸ÀýÕ¼±ÈÀýÔöÌíÁËËı¶£¬£¬£¬£¬£¬µÖ´ï12£¥¡£¡£¡£¡£ºÚ¿ÍʹÓÃÖØ´óµÄ¶à½×¶ÎÏ´Ç®¼Æ»®£¬£¬£¬£¬£¬ËûÃǶà´Î¸ü¸ÄÕË»§¡¢¹«Ë¾¡¢±¨±í¡¢Ç®±ÒºÍ˾·¨Í³ÁìȨ¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬½ðÈÚ»ú¹¹ÐèÒª¹¹½¨ÍøÂçÇ徲ϵͳ£¬£¬£¬£¬£¬½«ºÚ¿Í¹¥»÷µÄ¿ÉÄÜÐÔ½µµ½×îµÍ£¬£¬£¬£¬£¬²¢ÊµÊ±¼à¿ØÈκβ»·¨ÐÐΪ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://media.kaspersky.com/en/business-security/enterprise/Kaspersky-fraud-prevention-automated-analytics-en.pdf
6.WatchGuardÐû²¼2020ÄêQ3»¥ÁªÍøÇå¾²µÄÆÊÎö±¨¸æ

WatchGuardÐû²¼2020ÄêQ3»¥ÁªÍøÇå¾²µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã±¨¸æÆÊÎöÁËCOVID-19ÍþвÇ÷ÊÆ¡¢Ò»Ö±ÔöÌíµÄÍøÂç¹¥»÷ÒÔ¼°Õë¶ÔÃÀ¹úSCADAϵͳµÄ¶ñÒâÈí¼þµÈ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬ÍøÂç¹¥»÷ºÍÆæÒì¼ì²â¾ùµÖ´ïÁ½ÄêÀ´µÄ×î¸ßˮƽ£¬£¬£¬£¬£¬µÚÈý¼¾¶ÈÍøÂç¹¥»÷ÊýÄ¿¼¤ÔöÖÁ330ÍòÒÔÉÏ£¬£¬£¬£¬£¬±ÈÉÏÒ»¼¾¶ÈÔöÌí90£¥£¬£¬£¬£¬£¬ÆæÒìµÄÍøÂç¹¥»÷ÌØÕ÷Ò²Ò»Á¬ÉÏÉý¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬COVID-19Õ©Æ·Å×Ý£¬£¬£¬£¬£¬ÆóÒµµã»÷ÁË´ó×ڵĴ¹ÂÚ¹¥»÷ºÍ¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬WatchGuardµÄDNSWatchЧÀÍ×ܹ²×èÖ¹ÁË2764736¸ö¶ñÒâÓòÃûÅþÁ¬¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.globenewswire.com/news-release/2020/12/09/2141868/0/en/WatchGuard-Report-Details-COVID-19-Impact-on-Security-Threat-Landscape.html


¾©¹«Íø°²±¸11010802024551ºÅ