Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î£»£»£»£»£»ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ
Ðû²¼Ê±¼ä 2020-03-301.Ñо¿Ö°Ô±Åû¶ӰÏì4G¼°5GµçÐÅÍøÂçµÄDoSÎó²î
Positive TechnologiesµÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬ËùÓеÄ4GºÍ²¿·Ö5GµçÐÅÍøÂç¶¼Ò×Êܵ½Ê¹ÓÃDiameterÐÅÁîÐÒéÎó²îµÄDoS¹¥»÷¡£¡£¡£¡£¡£DiameterÐÅÁîÐÒéÓÃÓÚÔÚ4GÍøÂçÖÐÈÏÖ¤ºÍÊÚȨÐÂÎÅ·Ö·¢£¬£¬£¬ËüÊÇLTEÖеÄÒªº¦×é³É²¿·Ö£¬£¬£¬ÓÐÖúÓÚ»¥ÁªÍøÐÒéÍøÂçÔªËØÖ®¼äµÄת»»ºÍͨѶ¡£¡£¡£¡£¡£¸ÃÐÒéÖеÄÎó²îÔÊÐí¹¥»÷Õ߸ú×ÙÓû§µÄλÖò¢»ñÈ¡Óû§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬ËæºóʹÓÃÕâЩÐÅÏ¢×èµ²ÓïÒôºô½ÐºÍÈÆ¹ý¶ÔÒÆ¶¯Ð§À͵ÄÏÞÖÆ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆËûÃÇÔÚ2018ÄêÖÁ2019ÄêÖ®¼äÀÖ³ÉÉøÍ¸µ½ÄÏÃÀ¡¢ÑÇÖÞ¡¢Å·Ö޺ͷÇÖÞµÄ28¼ÒµçÐÅÔËÓªÉÌ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬µ±5GÍøÂ罨ÉèÔÚÏÖÓмܹ¹ºÍÐÒéÖ®ÉÏʱ£¬£¬£¬ÕâЩÇå¾²Îó²î½«¼ÌÐø±£´æ£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÌÐø¸ú×ÙÓû§µÄλÖᢻñÈ¡Ãô¸ÐÐÅÏ¢ÒÔ¼°½µ¼¶µ½3GÍøÂçµÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/all-4g-networks-susceptible-to-dos/?&web_view=true
2.ÀÕË÷Èí¼þDharmaÔ´´úÂëÔÚ°µÍøÂÛ̳³öÊÛ
ÉÏÖÜĩʱ´ú£¬£¬£¬ÀÕË÷Èí¼þDharmaµÄÔ´´úÂëÔÚÁ½¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉϳöÊÛ£¬£¬£¬ÆäÊÛ¼ÛµÍÖÁ2000ÃÀÔª¡£¡£¡£¡£¡£Æ¾Ö¤FBIÔÚ½ñÄêRSA¾Û»áÉϵÄÒ»´ÎÑݽ²£¬£¬£¬DharmaÊǽüÄêÀ´×¬Ç®µÚ¶þ¶àµÄÀÕË÷Èí¼þÓªÒµ£¬£¬£¬ÔÚ2016Äê11ÔÂÖÁ2019Äê11ÔÂÖ®¼ä»ñµÃÁËÁè¼Ý2400ÍòÃÀÔªµÄÊê½ðÖ§¸¶¡£¡£¡£¡£¡£ÆäÔ´´úÂëÔÚºÚ¿ÍÂÛ̳ÉϳöÊۺܿÉÄܻᵼÖ¸üÆÕ±éµÄй¶£¬£¬£¬½ø¶øÔÚ¶à¸ö·¸·¨¼¯ÍÅÖ®¼äÀ©É¢£¬£¬£¬×îÖÕµ¼Ö¹¥»÷¼¤Ôö¡£¡£¡£¡£¡£DharmaµÄ¼ÓÃܼƻ®ºÜÊÇÏȽø£¬£¬£¬×Ô2017ÄêÒÔÀ´Ò»Ö±Ã»ÓÐÃâ·ÑµÄ½âÃܹ¤¾ß¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/source-code-of-dharma-ransomware-pops-up-for-sale-on-hacking-forums/
3.ºÚ¿ÍʹÓÃÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÇÔÈ¡Óû§µÄ±ÈÌØ±Ò
MyCryptoÇå¾²×ܼàHarry Denley·¢Ã÷ÓÐ9¸öÐéα¶þάÂëÌìÉúÆ÷ÍøÕ¾ÊÔͼÇÔÈ¡Óû§µÄ±ÈÌØ±Ò£¬£¬£¬ÔÚÒÑÍùµÄËĸöÐÇÆÚÖУ¬£¬£¬ÕâÐ©ÍøÕ¾ÒѾÇÔÈ¡ÁËÁè¼Ý7¸ö±ÈÌØ±Ò£¨¼ÛֵԼΪ4.5ÍòÃÀÔª£©µÄ×ʽ𡣡£¡£¡£¡£ÕâÖÖÍøÕ¾Ð§ÀÍ×ÊÖúÓû§½«Æä±ÈÌØ±ÒµØµãת»»³É¶þάÂ룬£¬£¬ÒÔ½»¸øÆäËüÓû§¾ÙÐÐÖ§¸¶¡£¡£¡£¡£¡£µ«Denley·¢Ã÷Õâ9¸öÍøÕ¾ÏÖʵÉÏÖ»ÌìÉúÁËÕ©ÆÕßÇ®°üµÄ¶þάÂë¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÍйÜÕâ9¸öÍøÕ¾µÄ3¸öWebЧÀÍÆ÷»¹ÍйÜ×Å450¶à¸öÆäËüµÄ¶ñÒâÍøÕ¾£¬£¬£¬Ö»¹Ü´ó´ó¶¼ÍøÕ¾²¢²»»îÔ¾¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/network-of-fake-qr-code-generators-will-steal-your-bitcoin/
4.2004ÄêÖÁ2019Äê¶íÂÞ˹ºÚ¿Í»î¶¯ÆÊÎö±¨¸æ
ÃÀ¹úÇ鱨ÉçÇøµÄ²¼×È¡¤°¬Âס¤ººÃܶû¶Ù£¨Booz Allen Hamilton£©Ðû²¼ÁËÒ»·ÝÖÜÈ«±¨¸æ£¬£¬£¬ÏêϸÏÈÈÝÁË2004ÄêÖÁ2019Äêʱ´ú¶íÂÞ˹µÄ¾üÊÂÍøÂç¹¥»÷»î¶¯¡£¡£¡£¡£¡£¸Ã±¨¸æÖØµã¹Ø×¢ÓɶíÂÞ˹¾ü¶ÓÁ¥ÊôµÄÇ鱨²¿·Ö¾ÙÐеÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬Booz Allen½«ÒÑÍù15Äêʱ´úµÄ200¶à¸öGRUÍøÂç¹¥»÷»î¶¯¹éΪ23À࣬£¬£¬²¢Õ¹ÏÖÁËÿһ¸ö¹¥»÷»î¶¯Óë¶íÂÞ˹ÖܱßÕþÖÎÇéÐÎת±äµÄ¹ØÏµ¡£¡£¡£¡£¡£¸Ã±¨¸æµÄ×îÖÕ½áÂÛÊÇ¿ÉÒÔÕ¹ÍûGRUµÄÍøÂç¹¥»÷»î¶¯¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/booz-allen-analyzed-200-russian-hacking-operations-to-better-understand-their-tactics/?&web_view=true
5.WPvivid²å¼þȱÉÙÊÚȨ¼ì²é£¬£¬£¬¿ÉÓÃÓÚ»ñÈ¡ÍøÕ¾ËùÓÐÎļþ
WebARXÇ徲ר¼ÒÖÒÑԳƣ¬£¬£¬ÓÉÓÚWPvivid²å¼þÖÐȱÉÙÒ»¸öÊÚȨ¼ì²é£¬£¬£¬µ¼Ö¹¥»÷Õ߿ɻñÈ¡WordPressÍøÕ¾µÄËùÓÐÎļþ¡£¡£¡£¡£¡£WPvividÊÇÒ»¸öÃâ·ÑµÄ¶àºÏÒ»±¸·Ý¡¢»¹ÔºÍǨáã²å¼þ£¬£¬£¬Ëü¾ßÓнü4Íò¸ö»îÔ¾×°Öᣡ£¡£¡£¡£¶ÔÆä´úÂëµÄÆÊÎöÏÔʾ£¬£¬£¬Ò»Ð©wp_ajax²Ù×÷δ¾ÙÐÐÊÚȨ¼ì²é£¬£¬£¬´Ó¶ø¿Éµ¼Ö¿çÕ¾µãÇëÇóαÔ죨CSRF£©¹¥»÷¡£¡£¡£¡£¡£ÊÜÓ°Ïì×î´óµÄ²Ù×÷ÊÇ¡°wp_ajax_wpvivid_add_remote¡±£¬£¬£¬ÕâÒâζמßÓÐÈκνÇÉ«µÄÓû§¶¼¿ÉÒÔÌí¼ÓеĴ洢λÖò¢½«ÆäÓÃ×÷ĬÈϱ¸·ÝλÖ㬣¬£¬µ±Ï´α¸·ÝÔËÐÐʱ£¬£¬£¬Õû¸öÊý¾Ý¿â¼°Îļþ½«±»ÉÏ´«µ½¸Ã´æ´¢Î»Ö㬣¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔ»á¼ûÈκÎÎļþ¡£¡£¡£¡£¡£WPvivid¿ª·¢ÍŶÓÒѾÔÚа汾ÖÐÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/100567/hacking/wpvivid-backup-plugin-flaw.html
6.¹È¸èÈ¥Äê¹²·¢Ëͽü4Íò¸öÕþ¸®Ö§³ÖµÄ´¹ÂÚ¹¥»÷ÖÒÑÔ
ÔÚ2019Ä꣬£¬£¬¹È¸è¹²·¢ËÍÁ˽ü4Íò¸öÕë¶ÔÕþ¸®Ö§³ÖµÄ´¹ÂÚ¹¥»÷»ò¶ñÒâÈí¼þ¹¥»÷µÄÖÒÑÔ£¬£¬£¬±È2018ÄêϽµÁ˽ü25£¥¡£¡£¡£¡£¡£Ï½µµÄÔµ¹ÊÔÓÉÒ»·½ÃæÊDZ£»£»£»£»£»¤²½·¥Æðµ½ÁË×÷Ó㬣¬£¬ÁíÒ»·½ÃæÊǹ¥»÷ƵÂÊÕýÔÚ½µµÍ¡£¡£¡£¡£¡£×î½ü¼¸¸öÔµÄһЩÐÂÐËÇ÷ÊÆ°üÀ¨£ºÃ°³äÐÂÎÅýÌåºÍ¼ÇÕßÉ¢²½ÐéαÐÅÏ¢µÄ¹¥»÷ÕýÔÚÔöÌí£»£»£»£»£»Õþ¸®Ö§³ÖµÄ¹¥»÷Õß¼ÌÐøÖ÷ÒªÕë¶ÔµØÔµÕþÖεÐÊÖ¡¢Õþ¸®¹ÙÔ±¡¢¼ÇÕß¡¢²î±ðÕþ¼ûÕߺͼ¤½ø·Ö×ӵȣ»£»£»£»£»¹¥»÷ÕßÖØ¸´¹¥»÷ͳһĿµÄ£¬£¬£¬2019ÄêÓÐÎå·ÖÖ®Ò»µÄÓû§Ôâµ½¹¥»÷ÕߵĶà´Î¹¥»÷£»£»£»£»£»¹¥»÷Õ߯ð¾¢Ê¹ÓÃ0day¾ÙÐй¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.google/technology/safety-security/threat-analysis-group/identifying-vulnerabilities-and-protecting-you-phishing/


¾©¹«Íø°²±¸11010802024551ºÅ