¡¾ÆÊÎö±¨¸æ¡¿°£ÉÕÜÐû²¼ÍøÂçÇå¾²Íþв±¨¸æ£¬£¬£¬£¬£¬£¬Ç¿µ÷CNIºÍ¹©Ó¦Á´ÖеÄΣº¦
ƾ֤°£ÉÕÜ×îÐÂÐû²¼µÄÍøÂçÇå¾²Íþв±¨¸æ£¬£¬£¬£¬£¬£¬¶ÔÒªº¦»ù´¡ÉèÊ©£¨CNI£©ºÍ¹©Ó¦Á´µÄ¹¥»÷ÒÔ¼°¶ñÒâÍÚ¿ó¹¥»÷Êǵ±½ñÆóÒµÃæÁÙµÄ×î´óÍþв¡£¡£¸Ã±¨¸æ³Æ¹ØÓÚÍøÂç·¸·¨·Ö×Ӻ͹ú¼Ò¼¶¹¥»÷ÕßÀ´ËµCNIÊÇÒ»¸ö¼ÛÖµÔ½À´Ô½¸ßµÄ¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬¶ø¹©Ó¦Á´Ôò±»¹¥»÷ÕßÊÓΪÆóÒµÇå¾²Á´Öеı¡Èõ»·½Ú¡£¡£±¨¸æ»¹Ö¸³öÕë¶ÔÃÅÂޱҵȼÓÃÜÇ®±ÒµÄ¶ñÒâÍÚ¿ó¹¥»÷À˳±ºÜÓпÉÄܽ«ÑÓÐøÖÁ2019Äê¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/accenture-cni-and-supply-chains-at/
¡¾ÆÊÎö±¨¸æ¡¿VectraÐû²¼2018¹¥»÷ÕßÐÐΪÇ÷ÊÆ±¨¸æ¼°2018ÖÆÔìÒµ¾Û½¹±¨¸æ
±¾ÖÜÈýVectraÐû²¼2018¹¥»÷ÕßÐÐΪÇ÷ÊÆ±¨¸æºÍ2018ÖÆÔìÒµ¾Û½¹±¨¸æ£¬£¬£¬£¬£¬£¬±¨¸æÖк¸ÇÁ˾ŴóÐÐÒµÖеĹ¥»÷ÕßÐÐΪÇ÷ÊÆ£¬£¬£¬£¬£¬£¬°üÀ¨¿Æ¼¼ÐÐÒµ¡¢Ð§ÀÍÒµ¡¢ÁãÊÛÒµ¡¢ÖÆÔìÒµ¡¢Ò½ÁÆÐÐÒµ¡¢Õþ¸®¡¢ÓéÀÖÒµ¡¢ÄÜÔ´ÒÔ¼°½ÌÓýÐÐÒµ¡£¡£ÆäÖнÌÓýÒµÃæÁÙµÄÍþв×î¶à£¬£¬£¬£¬£¬£¬ÄÜÔ´ÒµÆä´Î£¬£¬£¬£¬£¬£¬ÖÆÔìÒµÅÅÔÚµÚÈý¡£¡£VectraÔÚ¶à¸öÖÆÔ칫˾Öз¢Ã÷ÁË´ó×ÚÍþв£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨´ó×ÚµÄÄÚ²¿¶ñÒâÐÐΪ£¬£¬£¬£¬£¬£¬ÕâÅú×¢¹¥»÷ÕßÒѾÔÚÆäÍøÂçÄÚ²¿¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/reconnaissance-lateral-movement-soar-manufacturing-industry
¡¾ÆÊÎö±¨¸æ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚDarkHydrusµÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÐû²¼¹ØÓÚ·¸·¨ÍÅ»ïDarkHydrusµÄ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£2018Äê6ÔÂ24ÈÕÑо¿ÍŶÓÊӲ쵽DarkHydrusÌᳫµÄÕë¶ÔÖж«Ò»¸ö½ÌÓý»ú¹¹µÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷Ö÷ÒªÓÃÓÚÇÔÈ¡Óû§µÄƾ֤¡£¡£DarkHydrusÔڸô¹ÂÚ¹¥»÷»î¶¯ÖÐʹÓÿªÔ´¹¤¾ßPhishery½¨Éè¶ñÒâµÄÎĵµ¸½¼þ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýC2ЧÀÍÆ÷ÍøÂçÓû§µÄƾ֤¡£¡£
ÔÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/08/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east/
¡¾Îó²î²¹¶¡¡¿ISCÐû²¼BINDµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Ò»´¦¿Éµ¼ÖÂDoSµÄÎó²î
ISCÐû²¼DNSÈí¼þBINDµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Ò»¸ö¿Éµ¼ÖÂDoSµÄÇå¾²Îó²î¡£¡£¸ÃÎó²î£¨CVE-2018-5740£©ÊÇÓɽ£ÇÅ´óѧµÄÑо¿Ö°Ô±Tony Finch·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˾ßÓÐdeny-answer-aliases¹¦Ð§µÄЧÀÍÆ÷£¨´Ë¹¦Ð§Ä¬ÈÏ´¦ÓÚ½ûÓÃ״̬£©¡£¡£Àֳɴ¥·¢´ËÎó²îµÄ¹¥»÷Õß½«Ôì³Éname.cÖеÄINSIST¶ÏÑÔʧ°Ü£¬£¬£¬£¬£¬£¬µ¼ÖÂÀú³Ì×èÖ¹ÔËÐк;ܾøÐ§ÀÍ¡£¡£¶à¸öBIND°æ±¾Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì¾ÙÐиüС£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75200/security/bind-dns-software-dos.html
¡¾Îó²î²¹¶¡¡¿Î÷ÃÅ×ÓÐû²¼TIA PortalµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´2¸öÇå¾²Îó²î
¹¤¿ØÇå¾²³§ÉÌNozomi NetworksµÄÑо¿Ö°Ô±·¢Ã÷Î÷ÃÅ×ÓSIMATIC STEP7ºÍSIMATIC WinCCµÄTIA Portal±£´æ2¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬Ê¹µÃICSÇéÐÎÃæÁÙΣº¦¡£¡£µÚÒ»¸öÎó²î£¨CVE-2018-11453£©ÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâÎļþ´¥·¢¾Ü¾øÐ§ÀÍ»òí§Òâ´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬µÚ¶þ¸öÎó²î£¨CVE-2018-11454£©ÓëÌØ¶¨TIA PortalĿ¼ÖеIJ»×¼È·ÎļþȨÏÞÉèÖÃÓйء£¡£Î÷ÃÅ×ÓÐû²¼ÁËÏà¹Ø²úÆ·µÄÇå¾²¸üÐÂÒÔÐÞ¸´Õâ2¸öÎó²î¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/flaws-siemens-tool-put-ics-environments-risk
¡¾¹¥»÷ÊÂÎñ¡¿ÃÀÖ°Òµ¸ß¶û·òлáPGAÒÉÔâÀÕË÷Èí¼þBitPaymer¹¥»÷
ƾ֤GolfWeekµÄ±¨µÀ£¬£¬£¬£¬£¬£¬±¾ÖܶþÃÀ¹úÖ°Òµ¸ß¶û·òлᣨPGA£©ÒÉÔâÀÕË÷Èí¼þBitPaymerµÄ¹¥»÷¡£¡£ÓëÀÕË÷Èí¼þSamSamÒ»Ñù£¬£¬£¬£¬£¬£¬BitPaymerÇãÏòÓÚͨ¹ýRDPЧÀÍÈëÇÖÄ¿µÄ×éÖ¯µÄÍøÂ磬£¬£¬£¬£¬£¬²¢ºáÏòÈö²¥ÖÁÿһ̨ÅÌËã»ú¡£¡£¸Ã±äÖÖÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.lockedÀ©Õ¹Ãû£¬£¬£¬£¬£¬£¬²¢ÀÕË÷½Ï¸ßµÄÊê½ð¡£¡£ÔÚÒÑÍùµÄ¼¸ÖÜÄÚBitpaymerÒѾ·ºÆðÁËÊý´ÎÕë¶ÔÆóÒµ¡¢Õþ¸®»ú¹¹ºÍÒ½ÔºµÄ¹¥»÷¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/the-pga-possibly-infected-with-the-bitpaymer-ransomware/