ºÚ¿Í¹ûÕæ¼ÓÃÜÇ®±ÒÉúÒâËùBuyucoinÓû§µÄÊý¾Ý£»£»£»£»£»£»Î±Ôì³É»ªÎªÒƶ¯Ó¦ÓõĶñÒâÈí¼þͨ¹ýWhatsApp·Ö·¢

Ðû²¼Ê±¼ä 2021-01-26

1.ºÚ¿Í¹ûÕæ¼ÓÃÜÇ®±ÒÉúÒâËùBuyucoinÓû§µÄÊý¾Ý


1.jpg


ShinyHuntersÔÚ°µÍøÉϹûÕæÓ¡¶È¼ÓÃÜÇ®±ÒÉúÒâËùBuyucoinÓû§µÄÊý¾Ý¡£¡£ ¡£´Ë´Î×ܹ²Ð¹Â¶ÁËÈý¸öMongoDBÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¿â¾ùÒÔʱ¼äÃüÃû£¬£¬£¬£¬£¬£¬£¬»®·ÖΪ2020Äê6ÔÂ1ÈÕ¡¢2020Äê7ÔÂ14ÈÕºÍ2020Äê9ÔÂ5ÈÕ¡£¡£ ¡£Ð¹Â¶Êý¾Ý°üÀ¨Óû§¼Í¼¡¢¼ÓÃÜÇ®±ÒÉÌÒµÉúÒâ¡¢Óû§Á´½ÓµÄÒøÐÐÕÊ»§ÐÅÏ¢ÒÔ¼°ÉúÒâËùÄÚ²¿Ê¹ÓÃµÄÆäËû±í£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÓû§¼Í¼±í´æ´¢ÁË161487¸ö³ÉÔ±µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþµØµã¡¢¹ú¼Ò/µØÇø¡¢¹þÏ£ÃÜÂë¡¢ÊÖ»úºÅÂëºÍGoogleµÇ¼ÁîÅÆµÈ¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/data-breach-at-buyucoin-crypto-exchange-leaks-user-info-trades/


2.IntelÈ·ÈÏÓÉÓÚÆäÄÚ²¿¹ýʧµ¼Ö²ÆÎñÐÅϢй¶


2.jpg


IntelÈ·ÈÏÓÉÓÚÆä¹«Ë¾ÍøÂçûÓÐÊܵ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÊÇÄÚ²¿¹ýʧµ¼Ö²ÆÎñÐÅϢй¶¡£¡£ ¡£²»¾Ãǰ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾³ÆÐÂÎű༭ÊÒµÄÍøÕ¾Ôâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÇÔÈ¡ÁËÆä¼¾¶ÈÊÕÒæ±¨¸æ¡£¡£ ¡£¸Ã±¨¸æÔ­¶¨ÓÚÖÜËÄÔÚ»ª¶û½ÖÉúÒâÊÕÅ̺󼸸öСʱÐû²¼£¬£¬£¬£¬£¬£¬£¬ÏÖ²»µÃ²»ÔÚÊÕÅÌǰ¾ÙÐÐÐû²¼¡£¡£ ¡£Ö±µ½ÖÜÎ壬£¬£¬£¬£¬£¬£¬Intel½ÒÏþÉùÃ÷ÌåÏÖ²¢Ã»ÓкڿÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬´Ë´Îй¶ÊÇÓÉÓÚÄÚ²¿¹ýʧµ¼ÖÂURL±»ÎÞÒâ¼ä¹ûÕæ²¢±»µÚÈý·½»á¼û¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾¹É¼ÛÖÜÎåÊÕÅ̵ø·ùÁè¼Ý9£¥¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/113794/data-breach/intel-data-leak-2.html


3.Ñо¿ÍŶӷ¢Ã÷AvaddonʹÓÃDDoS¹¥»÷ÀÕË÷Êê½ð


3.png


Ñо¿ÍŶӷ¢Ã÷ÁíÒ»¸öÀÕË÷Èí¼þÍÅ»ïAvaddonÕýÔÚʹÓÃDDoS¹¥»÷À´ÀÕË÷Êê½ð¡£¡£ ¡£ÔÚ2020Äê10Ô£¬£¬£¬£¬£¬£¬£¬SunCryptºÍRagnarLockerÍÅ»ï¾Í×îÏÈʹÓÃÒÔDDoS¹¥»÷ΪÍþвǿÆÈÊܺ¦ÕßÖ§¸¶Êê½ðµÄÐÂÕ½ÂÔ¡£¡£ ¡£µ±¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷ʱ£¬£¬£¬£¬£¬£¬£¬Ðí¶àÊܺ¦Õß»á´Ó±¸·ÝÖлָ´²¢²»Óë¹¥»÷ÕßÁªÏµ¡£¡£ ¡£¶øAvaddonÔòʹÓÃDDoS¹¥»÷À´ÆÆËðÊܺ¦ÕßµÄÍøÕ¾»òÍøÂ磬£¬£¬£¬£¬£¬£¬Ö±µ½Êܺ¦ÕßÓëËûÃÇÁªÏµ²¢×îÏȾÙÐÐ̸ÅС£¡£ ¡£ÆÊÎöʦBrett CallowÌåÏÖDDoS¼ÛÇ®×ÔÖÆÇÒ¼òÆÓ£¬£¬£¬£¬£¬£¬£¬·¸·¨·Ö×Ó¶Ô¹«Ë¾Ê©¼ÓµÄѹÁ¦Ô½´ó£¬£¬£¬£¬£¬£¬£¬Ô½ÈÝÒ×»ñµÃÊê½ð¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/


4.αÔì³É»ªÎªÒƶ¯Ó¦ÓõĶñÒâÈí¼þͨ¹ýWhatsApp·Ö·¢


4.png


ESETÑо¿Ö°Ô±Lukas Stefanko·¢Ã÷еÄαÔì³É»ªÎªÒƶ¯Ó¦ÓõĶñÒâÈí¼þ¿Éͨ¹ýWhatsApp·Ö·¢¡£¡£ ¡£¸Ã¶ñÒâÈí¼þ»áʹÓÃWhatsApp×Ô¶¯»Ø¸´¹¦Ð§·¢ËͶñÒâÁ´½Ó£¬£¬£¬£¬£¬£¬£¬¸ÃÁ´½ÓÖ¸ÏòαÔìµÄ»ªÎªÒƶ¯Ó¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬Óû§ÔÚµã»÷ºó»á±»Öض¨Ïòµ½Î±ÔìGoogle PlayÊÐËÁÍøÕ¾¡£¡£ ¡£Óû§Ò»µ©×°Öú󣬣¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹»áÌáÐÑÊܺ¦Õß·­¿ªÍ¨Öª»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬È»ºóÖ´ÐÐÈ䳿¹¥»÷¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ëü»¹ÄÜ»á¼û²¢ÁýÕÖºǫ́ÔËÐÐµÄÆäËûÓ¦Ó㬣¬£¬£¬£¬£¬£¬ÕâÒâζןÃÓ¦ÓÿÉÒÔʹÓÃαÔìµÄ´°¿Ú¿ÉÀ´ÇÔȡƾ֤ÒÔ¼°ÆäËûÃô¸ÐÐÅÏ¢¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/01/beware-new-wormable-android-malware.html


5.CheckpointÐû²¼2020ÄêQ4Æ·ÅÆÍøÂç´¹Â򵀮ÊÎö±¨¸æ


5.png


CheckpointÐû²¼ÁË2020ÄêQ4Æ·ÅÆÍøÂç´¹Â򵀮ÊÎö±¨¸æ¡£¡£ ¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÔÚ2020Äê×îºóÒ»¸ö¼¾¶ÈMicrosoftÈÔÕ¼ÓÐÊ®´óÆ·ÅÆµÄ°ñÊ×£¬£¬£¬£¬£¬£¬£¬Ðí¶àÍøÕ¾¶¼Ã°³äMicrosoftµÇ¼½çÃæÇÔÈ¡Óû§Æ¾Ö¤£¬£¬£¬£¬£¬£¬£¬ÆäռȫÇòËùÓÐÆ·ÅÆÍøÂç´¹ÂÚʵÑéµÄ43£¥¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÒÔDHL(18%)ºÍÑÇÂíÑ·µç×ÓÓʼþ(5%)´¹ÂÚΪÖ÷µÄÔËÊäºÍÁãÊÛÒµ½ñÄêÊ×´ÎõÒÉíǰÈýÃû£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¼ÙÆÚºóÕ¼±ÈÔöÌíÁËÒ»±¶¶à¡£¡£ ¡£Æä´Î£¬£¬£¬£¬£¬£¬£¬Ê®´óÆ·ÅÆ»¹°üÀ¨LinkedIn(6%)¡¢Rakuten (4%)¡¢IKEA (3%)¡¢Google (2%)¡¢Paypal (2%)¡¢Chase (2%)ºÍYahoo (1%)¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2021/01/14/brand-phishing-report-q4-2020/


6.ZscalerÐû²¼Óйؽ©Ê¬ÍøÂçDreamBusµÄÆÊÎö±¨¸æ


6.png


ZscalerÐû²¼ÁËÓйؽ©Ê¬ÍøÂçDreamBusµÄÆÊÎö±¨¸æ¡£¡£ ¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬£¬DreamBusΪ2019ÄêÍ·Ê״ηºÆðµÄSystemdMinerµÄ¾É½©Ê¬ÍøÂçµÄ±äÌ壬£¬£¬£¬£¬£¬£¬ÔÚÔ­°æ±¾ÉϾÙÐÐÁËÈô¸ÉˢС£¡£ ¡£ÆäÕë¶ÔLinuxЧÀÍÆ÷ÉÏÔËÐÐµÄÆóÒµÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬¿ÉʹÓÃÎó²îºÍ±©Á¦¹¥»÷PostgreSQL¡¢Redis¡¢SaltStack¡¢Hadoop YARN¡¢Apache Spark¡¢HashiCorp Consul¡¢SaltStackºÍSSHЧÀ͵È¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬DreamBus½ÓÄÉÁËÐí¶àÈÆ¹ý¼ì²âµÄÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬Èçͨ¹ýеÄHTTP-over-HTTPS£¨DoH£©Ð­ÒéÓë½©Ê¬ÍøÂçµÄC£¦CЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬£¬²¢½«C£¦CÍйÜÔÚTorÍøÂçÉÏÒÔ·À±»¹Ø±Õ¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zscaler.com/blogs/security-research/dreambus-botnet-technical-analysis