AG¹«Ë¾

AG¹«Ë¾

AG¹«Ë¾¿Æ¼¼

  • »ù´¡ÉèÊ©Çå¾²

    »ù´¡ÉèÊ©Çå¾²
  • Êý¾ÝÇå¾²

    Êý¾ÝÇå¾²
  • ÔÆÅÌËãÇå¾²

    ÔÆÅÌËãÇå¾²
  • ¹¤Òµ»¥ÁªÍøÇå¾²

    ¹¤Òµ»¥ÁªÍøÇå¾²
  • ÎïÁªÍøÇå¾²

    ÎïÁªÍøÇå¾²
  • ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì

    ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì
  • ËùÓвúÆ·

    ËùÓвúÆ·
  • ËùÓнâ¾ö¼Æ»®

    ËùÓнâ¾ö¼Æ»®

»ù´¡ÉèÊ©Çå¾²


  • Õþ¸®

    Õþ¸®
  • ÔËÓªÉÌ

    ÔËÓªÉÌ
  • ½ðÈÚ

    ½ðÈÚ
  • ÄÜÔ´

    ÄÜÔ´
  • ½»Í¨

    ½»Í¨
  • ÆóÒµ

    ÆóÒµ
  • ¿Æ½ÌÎÄÎÀ

    ¿Æ½ÌÎÄÎÀ

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÏàÖúͬ°éÉó²é¸ü¶à >

ÏàÖúͬ°é¶¯Ì¬

³ÉΪÏàÖúͬ°é

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÊÖÒÕÖ§³ÖÉó²é¸ü¶à >

²úÆ·Ö§³Ö

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

·µ»ØÁбí

AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.06.22-2020.06.28£©

2020-06-29

Ò»¡¢ Íþвͨ¸æ

Apache Dubbo ProviderĬÈÏ·´ÐòÁл¯Ô¶³Ì´úÂëÖ´ÐÐÎó²î

¡¾Ðû²¼Ê±¼ä¡¿2020-06-23 17:00:00 GMT

¡¾¸ÅÊö¡¿

2020Äê6ÔÂ23ÈÕ£¬Apache DubboÐû²¼Ç徲ͨ¸æÅû¶ProviderĬÈÏ·´ÐòÁл¯µ¼ÖµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-1948£©£¬¹¥»÷Õß¿ÉÒÔ·¢ËÍ´øÓÐÎÞ·¨Ê¶±ðµÄ·þÎñÃû»òÒªÁìÃû¼°Ä³Ð©¶ñÒâ²ÎÊý¸ºÔصÄRPCÇëÇ󣬵±¶ñÒâ²ÎÊý±»·´ÐòÁл¯Ê±½«µ¼Ö´úÂëÖ´ÐС£

¡¾Á´½Ó¡¿

http://blog.nsfocus.net/apache-dubbo-0623/

¶þ¡¢ ÈÈÃÅ×ÊѶ

1. ¹¥»÷ÕßʹÓÃIndigoDropÕë¶ÔÄÏÑǾüʺÍÕþ¸®×éÖ¯

¡¾¸ÅÊö¡¿

½üÆÚÒÔ¾üÊÂÖ÷ÌâΪÓÕ¶üµÄ¹¥»÷Ô˶¯£¬Í¨¹ý¶ñÒâMicrosoft OfficeÎĵµÈö²¥°üÀ¨ÍêÕûRAT¹¦Ð§µÄCobalt Strike£¬ÕâЩ¶ñÒâÎĵµÊ¹ÓöñÒâºêÀ´¾ÙÐжà½×¶ÎºÍ¸ß¶ÈÄ£¿é»¯µÄѬȾ£¬²¢ÇÒʹÓù«¹²·þÎñÆ÷ºÍ˽ÓзþÎñÆ÷µÄ×éºÏÀ´ÍÐ¹ÜÆä¶ñÒâÓÐÓøºÔØ£¬IndigoDropÈÏÕæ´ÓÏÂÔØURL»ñÈ¡×îÖÕµÄÓÐÓøºÔØÒÔ¾ÙÐа²ÅÅ£¬´Ë´Î¹¥»÷Õë¶ÔÄÏÑǵľüʺÍÕþ¸®×éÖ¯¡£

¡¾²Î¿¼Á´½Ó¡¿

https://blog.talosintelligence.com/2020/06/indigodrop-maldocs-cobalt-strike.html

2. XORDDoSºÍKaiji½©Ê¬ÍøÂç±äÖÖÕë¶ÔDocker·þÎñÆ÷

¡¾¸ÅÊö¡¿

XORDDoSºÍKaijiÊÇLinux½©Ê¬ÍøÂç¶ñÒâÈí¼þÀàÐ͵ıäÌ壬´Ë´Î¹¥»÷ÊÇXORDDoSÊ״ν«Docker·þÎñÆ÷×÷ΪĿµÄ¡£¹¥»÷ÕßɨÃè̻¶µÄDocker·þÎñÆ÷ͨѶ¶Ë¿Ú2375ºóʹÓý©Ê¬ÍøÂçÖ´Ðб©Á¦¹¥»÷ £»Kaiji½©Ê¬ÍøÂçͬÑùɨÃè¶Ë¿Ú2375̻¶µÄÖ÷»ú£¬¶ÔDocker·þÎñÆ÷Ö´ÐÐping²Ù×÷£¬È»ºó°²ÅÅÖ´ÐÐKaiji¶þ½øÖÆÎļþµÄ¶ñÒâARMÈÝÆ÷¡£

¡¾²Î¿¼Á´½Ó¡¿

https://blog.trendmicro.com/trendlabs-security-intelligence/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers/

 

3. BRONZE VINEWOOD×éÖ¯Ãé×¼¹©Ó¦Á´»ú¹¹

¡¾¸ÅÊö¡¿

BRONZE VINEWOOD£¬Ò²±»³ÆÎªAPT31¡¢ZIRCONIUM£¬ÊÇÒ»¸öÖÁÉÙ´Ó2016Äê»îÔ¾ÖÁ½ñµÄÍþв×éÖ¯£¬¸Ã×éÖ¯ÓëÖйúÓйØ¡£½üÆÚBRONZE VINEWOOD×é֯ʵÑéÇÔȡƾ֤²¢Ê¹ÓÃÕýµ±µÄÔ¶³Ì»á¿´·¨¾ö¼Æ»®ºÍЭÒéµÈ¶àÖÖ¹¤¾ßºÍÊÖÒÕÀ´»á¼ûÇéÐΣ¬¶ÔÈí¼þÌṩÉÌºÍÆäËû¹©Ó¦Á´×éÖ¯µÄ¹¥»÷Ö¼ÔÚ»á¼û¿Í»§µÄÊý¾Ý»òÍøÂç¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.secureworks.com/research/bronze-vinewood-targets-supply-chains

 

4. Õë¶ÔÃåµéµÄÍøÂçÌØ¹¤¹¥»÷Ô˶¯

¡¾¸ÅÊö¡¿

¹¥»÷ÕßÕë¶ÔÃåµéÌᳫÓã²æÊ½´¹ÂÚ¹¥»÷£¬ÏòÄ¿µÄÓû§·Ö·¢´øÓжñÒâLNKÎļþµÄµç×ÓÓʼþ£¬¶ñÒâÎļþÍйÜÔÚGoogleÔÆ¶ËÓ²ÅÌÖÐÒÔÌӱܷÀ²¡¶¾ºÍÇ徲ɨÃè³ÌÐòʶ±ð£¬¸ÃÎļþÒ»µ©Ö´ÐУ¬½«ÔÚºǫ́ÍϷŲ¢ÔËÐпÉÖ´ÐÐÎļþ£¬²¢Ê¹Óù¤¾ßOctopus¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©Í¨Ñ¶¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.anomali.com/blog/unknown-china-based-apt-targeting-myanmarese-entities

 

5. Lucifer¶ñÒâÈí¼þʹÓÃÎó²îѬȾWindows×°±¸

¡¾¸ÅÊö¡¿

LuciferÊǼÓÃÜÐ®ÖÆºÍDDoS¶ñÒâÈí¼þ±äÌåµÄ͎ᣬËüʹÓþÉÎó²îÔÚWindowsƽ̨ÉÏÈö²¥ºÍÖ´ÐжñÒâÔ˶¯£¬¸Ã¶ñÒâÈí¼þ¿ÉÒÔ¾ÙÐÐMoneroµÄÃÜÂëÐ®ÖÆ£¬Äܹ»Ê¹Óöà¸öÎó²îºÍƾ֤¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©²Ù×÷ÒÔ¼°×ÔÎÒÈö²¥£¬²¢ÇÒÕë¶ÔÄÚ²¿Ò×Êܹ¥»÷µÄÄ¿µÄѬȾ²¢ÔËÐÐEternalBlue£¬EternalRomanceºÍDoublePulsarºóÃÅ¡£

¡¾²Î¿¼Á´½Ó¡¿

https://unit42.paloaltonetworks.com/lucifer-new-cryptojacking-and-ddos-hybrid-malware/

 

6. FIN7×é֯ʹÓÃPillowmint¶ñÒâÈí¼þÕë¶ÔÁãÊÛÖÕ¶Ëϵͳ

¡¾¸ÅÊö¡¿

FIN7£¬ÊÇÒ»¸öÓвÆÎñÄîÍ·µÄÍþв×éÖ¯£¬×Ô2015ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬Ö÷ÒªÕë¶ÔÂùݺͲÍÒûÒµ¡£½üÆÚFIN7×é֯ʹÓÃPillowmint¶ñÒâÈí¼þÕë¶ÔÁãÊÛÖÕ¶Ëϵͳ£¬Í¨¹ý¶ñÒâµÄshimÊý¾Ý¿â·Ö·¢£¬Äܹ»²¶»ñTrack1ºÍTrack2ÐÅÓÿ¨Êý¾Ý¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pillowmint-fin7s-monkey-thief/

 

7. ÀÕË÷Èí¼þCryCryptorαװ³ÉCOVID-19×·×ÙÓ¦ÓÃÈö²¥

¡¾¸ÅÊö¡¿

½üÆÚ¹¥»÷ÕßÔÚ¹¥»÷Ô˶¯Öн«ÀÕË÷Èí¼þCryCryptorαװ³É¹Ù·½COVID-19ÁªÏµÈË×·×ÙÓ¦ÓóÌÐò£¬Í¨¹ýÁ½¸ö¶ñÒâ·Ö·¢ÍøÕ¾·Ö·¢¸øÎ»ÓÚ¼ÓÄôóµÄAndroid×°±¸Óû§£¬²¢¶ÔÉè±¹ØÁ¬ÄÎļþ¾ÙÐмÓÃÜ¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.welivesecurity.com/2020/06/24/new-ransomware-uses-covid19-tracing-guise-target-canada-eset-decryptor/

 

8. Hidden Cobra×éÖ¯µÄжñÒ⹤¾ß

¡¾¸ÅÊö¡¿

Hidden Cobra×éÖ¯ÔÚÒÑÍùµÄÊ®ÄêÖÐÒ»Ö±ºÜ»îÔ¾£¬½ñÄê5ÔÂÃÀ¹úÕþ¸®»ú¹¹Ðû²¼µÄ±¨¸æÖÐÐÎòHidden Cobra×éÖ¯µÄÈý¸öжñÒ⹤¾ßCOPPERHEDGE¡¢TAINTEDSCRIBEºÍPEBBLEDASH¡£

¡¾²Î¿¼Á´½Ó¡¿

https://blog.reversinglabs.com/blog/hidden-cobra

9. Ê¹ÓÃGoogle Analytics·þÎñÇÔÈ¡Óû§Êý¾Ý

¡¾¸ÅÊö¡¿

¹¥»÷ÕßʹÓÃGoogle AnalyticsÖеÄÐÅÍÐÀ´Ê¹ÓÃGoogle Analytics APIÈÆ¹ýÄÚÈÝÇå¾²Õ½ÂÔ£¨CSP£©£¬ÔÚÏßÊÐËÁÍøÕ¾Ê¹ÓÃGoogle Analytics·þÎñ¸ú×Ù»á¼ûÕߣ¬Òò´Ë£¬Google AnalyticsÓòÔÚÆäCSPÉèÖÃÖÐÁÐÈëÁ˰×Ãûµ¥£¬¹¥»÷Õß¿ÉÒÔ»á¼ûGoogle AnalyticsÕÊ»§Öеı»µÁÊý¾Ý¡£

¡¾²Î¿¼Á´½Ó¡¿

https://securityaffairs.co/wordpress/105086/cyber-crime/google-analytics-e-skimming.html

 

10. DarkVision RATÄ£¿é»¯¶ñÒâÈí¼þÕýÔÚ±»Æð¾¢ÏúÊÛ

¡¾¸ÅÊö¡¿

DarkVision RATÊÇÒ»¸öÔ¶³Ì»á¼û¹¤¾ß(RAT)£¬½ÓÄÉÄ£¿é»¯²å¼þ½á¹¹£¬ÊÇÒ»ÖÖ¼òÆÓ¡¢Ò×ÓúÍÓû§ÓѺõŤ¾ß°ü£¬¾ßÓÐϵͳ¿ØÖÆ£¬Àú³ÌÖÎÀíÆ÷£¬×¢²á±í±à¼­ºÍÎļþÖÎÀíÆ÷µÈ¹¦Ð§¡£¿ËÈÕDarkVision RATÔÚÍøÂç·¸·¨ºÍºÚ¿ÍÂÛ̳Öб»Æð¾¢ÏúÊÛ£¬ÉÐÓÐרÃŵÄÏúÊÛÍøÕ¾¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.deepinstinct.com/2020/06/23/new-on-the-scene-darkvision-rat/

 

11. IcedIDÒøÐÐľÂí±äÖÖʹÓÃCOVID-19ÓÕ¶üÈö²¥

¡¾¸ÅÊö¡¿

IcedIDÒøÐÐľÂíÓÚ2017ÄêÊ״ηºÆðÔÚÍþвÁìÓò£¬ÀàËÆÓÚÆäËû½ðÈÚľÂí£¬IcedID¿ÉÌᳫä¯ÀÀÆ÷ÖеĹ¥»÷£¬ÒÔ¼°×èµ²ºÍÇÔÈ¡Êܺ¦ÕߵĽðÈÚÐÅÏ¢¡£½üÆÚIcedIDÒøÐÐľÂíбäÖÖÒÔCOVID-19Ö÷ÌâÀ¬»øÓʼþÈö²¥£¬Ð±äÖÖ¿ÉÇÔÌýÊܺ¦ÕßµÄÍøÂçÔ˶¯£¬´Ë´Î¹¥»÷Ö÷ÒªÕë¶ÔÃÀ¹úÓû§¡£

¡¾²Î¿¼Á´½Ó¡¿

https://securityaffairs.co/wordpress/105049/malware/icedid-banking-trojan-steganography.html

 

12. TrickbotʹÓÃCobalt Strike¹¥»÷·þÎñÆ÷

¡¾¸ÅÊö¡¿

TrickbotÔËÓªÉÌʹÓ÷þÎñÆ÷ÄÚ²¿µÄPowerTrickºÍCobalt Strike°²ÅÅAnchorºóÃųÌÐòºÍRYUKÀÕË÷Èí¼þ£¬Ê¹ÓÃÐí¶à¿ªÔ´¾ç±¾ºÍ¹¤¾ßÀ´ÍøÂçÐÅÏ¢£¬²¢Ñ¬È¾×ªÒƵ½ÆäËûϵͳ£¬TrickBotÄ£¿éÔÚÊÜѬȾµÄϵͳÉÏÍøÂç´ó×ÚÊý¾Ý£¬²¢ÊµÑéתµ½Óò¿ØÖÆÆ÷¡£

¡¾²Î¿¼Á´½Ó¡¿

https://labs.sentinelone.com/inside-a-trickbot-cobaltstrike-attack-server/

 

13. Ê¹ÓÃEXIFÔªÊý¾ÝÒþ²ØÐÅÓÿ¨ÊèÉ¢Æ÷

¡¾¸ÅÊö¡¿

¹¥»÷ÕßʹÓÃͼÏñµÄ“°æÈ¨ÔªÊý¾Ý”×Ö¶ÎÀ´¼ÓÔØÆäWebÊèÉ¢Æ÷£¬ÓÉÊܵ½ÆÆËðµÄÔÚÏßÊÐËÁÉñÃØ¼ÓÔØ£¬²¢ÇÒʹÓÃͼÏñÎļþ×÷Ϊαװ¾ÙÐÐÈö²¥¡£´ËÊèÉ¢Æ÷½«²¶»ñÊäÈë×ֶεÄÄÚÈÝ£¬ÈçÔÚÏß¹ºÎïÕßµÄÐÕÃû£¬Õ˵¥µØµãºÍÐÅÓÿ¨ÏêϸÐÅÏ¢µÈÊý¾Ý¡£

¡¾²Î¿¼Á´½Ó¡¿

https://blog.malwarebytes.com/threat-analysis/2020/06/web-skimmer-hides-within-exif-metadata-exfiltrates-credit-cards-via-image-files/

?

ÄúµÄÁªÏµ·½·¨

*ÐÕÃû
*µ¥Î»Ãû³Æ
*ÁªÏµ·½·¨
*ÑéÖ¤Âë AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
Ìá½»µ½ÓÊÏä

¹ºÖÃÈÈÏß

  • ¹ºÖÃ×Éѯ:

    400-818-6868-1

Ìá½»ÏîÄ¿ÐèÇó

½Ó´ý¼ÓÈëAG¹«Ë¾¿Æ¼¼£¬³ÉΪÎÒÃǵÄÏàÖúͬ°é£¡
  • *ÇëÐÎòÄúµÄÐèÇó
  • *×îÖÕ¿Í»§Ãû³Æ
  • *ÏîÄ¿Ãû³Æ
  • Äú¸ÐÐËȤµÄ²úÆ·
  • ÏîĿԤËã
ÄúµÄÁªÏµ·½·¨
  • *ÐÕÃû
  • *ÁªÏµµç»°
  • *ÓÊÏä
  • *Ö°Îñ
  • *¹«Ë¾
  • *¶¼»á
  • *ÐÐÒµ
  • *ÑéÖ¤Âë AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
  • Ìá½»µ½ÓÊÏä
AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø

·þÎñÖ§³Ö

ÖÇÄܿͷþ
ÖÇÄܿͷþ
¹ºÖÃ/ÊÛºóÊÖÒÕÎÊÌâ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
ÔÚÏßÌáµ¥|ÖÇÄÜÎÊ´ð|֪ʶ¿â
Ö§³ÖÈÈÏß
Ö§³ÖÈÈÏß
400-818-6868
AG¹«Ë¾¿Æ¼¼ÉçÇø
AG¹«Ë¾¿Æ¼¼ÉçÇø
×ÊÁÏÏÂÔØ|ÔÚÏßÎÊ´ð|ÊÖÒÕ½»Á÷

? 2025 NSFOCUS AG¹«Ë¾¿Æ¼¼ www.nsfocus.com All Rights Reserved . ¾©¹«Íø°²±¸ 11010802021605ºÅ ¾©ICP±¸14004349ºÅ ¾©ICPÖ¤110355ºÅ

ÍøÕ¾µØÍ¼