2019ÄêÀ¬»øÓʼþºÍ´¹ÂÚ¹¥»÷±¨¸æ£» £» £»Ñо¿Ö°Ô±ÑÝʾÕë¶ÔPowerPointµÄÊó±êÐüÍ£¹¥»÷

Ðû²¼Ê±¼ä 2020-04-10

1.FireEyeÅû¶COVID-19µ¼ÖµÄÍþвµÄÃûÌÃת±ä

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ƾ֤FireEyeµÄÒ»·ÝÍþвÑо¿²©¿Í£¬£¬£¬£¬Ö»¹ÜCOVID-19¶ÔÄϹ¬NGÓéÀÖÉç»áºÍ¾­¼Ã±¬·¢ÁËÖØ´óÓ°Ï죬£¬£¬£¬µ«Æä¶ÔÍøÂçÍþвÃûÌõÄÓ°ÏìÈÔÈ»ÓÐÏÞ¡£¡£¡£ÔÚ´ó´ó¶¼ÇéÐÎÏ£¬£¬£¬£¬ÍøÂç¹¥»÷ÕßµÄÐÐΪ·½·¨ÓëÒÔǰÏàͬ£¬£¬£¬£¬µ«¸ü¶àµØÊ¹ÓÃCOVID-19Σ» £» £»ú×÷ΪһÖÖÉç»á¹¤³ÌÊÖ¶ÎÀ´ÎüÒýÓû§¡£¡£¡£Ö»¹ÜÔÆÔÆ£¬£¬£¬£¬COVID-19ÈÔÖ»Õ¼°Ù·ÖÖ®¶þµÄ¶ñÒâµç×ÓÓʼþÁ÷Á¿¡£¡£¡£FireEyeÏÖÔÚÕýÔÚ×·×ÙµÄÍþвÃûÌõÄÖØ´óת±ä°üÀ¨£ºÔ¶³ÌÀͶ¯Á¦µÄͻȻ´ó×ÚÔöÌí¸Ä±äÁËÆóÒµÍøÂçµÄÐÔ×ÓºÍųÈõÐÔ£» £» £»¹¥»÷ÕßÕýÔÚʹÓÃCOVID-19¼°Ïà¹ØÖ÷Ìâ×÷ΪÉç»á¹¤³ÌѧսÂÔ£» £» £»Ò½ÁƱ£½¡ÔËÓª£¬£¬£¬£¬Ïà¹ØµÄÖÆÔì¡¢ÎïÁ÷ºÍÖÎÀí×éÖ¯ÒÔ¼°¼ÓÈëÓ¦¶ÔΣ» £» £»úµÄÕþ¸®²¿·Ö±äµÃÔ½À´Ô½Ö÷Òª£¬£¬£¬£¬²¢ÇÒÈÝÒ×ÔâÊÜÖîÈçÀÕË÷Èí¼þÖ®ÀàµÄÆÆËðÐÔ¹¥»÷µÈ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2020/04/limited-shifts-in-cyber-threat-landscape-driven-by-covid-19.html


2.¿¨°Í˹»ùÐû²¼2019ÄêÀ¬»øÓʼþºÍ´¹ÂÚ¹¥»÷±¨¸æ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¿¨°Í˹»ùÐû²¼2019ÄêÀ¬»øÓʼþºÍ´¹ÂÚ¹¥»÷±¨¸æ£¬£¬£¬£¬±¨¸æÖ¸³ö2019ÄêÀ¬»øÓʼþռȫÇòÓʼþÁ÷Á¿ÖеıÈÀýΪ56.51%£¬£¬£¬£¬±È2018ÄêÔöÌí4.03¸ö°Ù·Öµã¡£¡£¡£2019ÄêÀ¬»øÓʼþµÄ×î´óȪԴ¹úÊÇÖйú£¨21.26%£©¡£¡£¡£44%µÄÀ¬»øÓʼþ¾Þϸ²»µ½2KB¡£¡£¡£À¬»øÓʼþÖÐ×î³£¼ì²âµ½µÄÎó²îʹÓÃÊÇExploit.MSOffice.CVE-2017-11882¡£¡£¡£2019Ä꿨°Í˹»ùµÄ·´´¹ÂÚϵͳ±»´¥·¢ÁË467188119´Î£¬£¬£¬£¬¹²ÓÐ17%µÄÓû§Ôâµ½´¹ÂÚ¹¥»÷¡£¡£¡£±ðµÄ£¬£¬£¬£¬2019ÄêµÄÖ÷ÒªÇ÷ÊÆÊÇ¶ÔÆóÒµ²¿·ÖµÄ¹¥»÷ÊýÄ¿ÔöÌí¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/spam-report-2019/96527/


3.Äá²´¶ûISP VianetÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬170Íò¿Í»§Êý¾Ýй¶


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Äá²´¶û»¥ÁªÍøÐ§ÀÍÌṩÉÌVianet CommunicationsÈ·ÈÏÆäÐÅϢϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔ¡£¡£¡£ºÚ¿ÍÔÚTwitterÕÊ»§ÉÏÉù³ÆÇÔÈ¡ÁË170ÍòVianet¿Í»§µÄÊý¾Ý£¬£¬£¬£¬°üÀ¨ËûÃǵÄÐÕÃû¡¢ÊÖ»úºÅÂë¡¢µØµãºÍµç×ÓÓʼþµØµã¡£¡£¡£ºÚ¿ÍµÄÍÆÎÄÖл¹°üÀ¨ÍйÜÔÚÑó´ÐÍøÂçÉϵÄй¶Êý¾ÝÁ´½Ó¡£¡£¡£VianetÔÚÆä¹Ù·½ÉùÃ÷ÖÐÈ·ÈÏÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬²¢ÌåÏÖÒѾ­È·¶¨ÁËй¶µÄȪԴºÍ½ÓÄÉÊʵ±µÄ²½·¥À´ÔöÇ¿Çå¾²ÐÔ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.nepalitelecom.com/2020/04/vianet-customer-data-leaks-hack.html


4.ºÚ¿ÍÔÚ°µÍøÂÛ̳³öÊÛ5.2ÍòÒÁÀʹ«ÃñµÄÉí·ÝÖ¤ÕÕÆ¬


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ºÚ¿ÍÕýÔÚ°µÍøÉϳöÊÛ5.2ÍòÒÁÀʹ«ÃñµÄÉí·ÝÐÅÏ¢£¬£¬£¬£¬Æ¾Ö¤Hackread.com¿´µ½µÄÑù±¾Êý¾Ý£¬£¬£¬£¬¿ÉÒÔÈ·ÈϺڿÍÕýÔÚ³öÊÛ8.17GBµÄÊý¾Ý£¨°üÀ¨4.5Íò¸öÎļþ£©£¬£¬£¬£¬ÕâЩÎļþ°üÀ¨ÒÁÀʹ«ÃñµÄÉí·ÝÖ¤¡¢³öÉú֤ʵ¡¢»¤Õպͽè¼Ç¿¨µÈµÄ¸±±¾¡£¡£¡£¸üÔã¸âµÄÊÇ£¬£¬£¬£¬Éí·ÝÖ¤³ÖÓÐÈ˵Ä×ÔÕÕÏàÒ²°üÀ¨ÔÚ³öÊÛµÄÊý¾ÝÖС£¡£¡£Çå¾²Ñо¿Ô±Mohammad Jorjandi³ÆÕâЩÐÅÏ¢ÊÇ´Ó¼¸¸ö²î±ðµÄÍøÕ¾ÍøÂçµÄ£¬£¬£¬£¬°üÀ¨ÔÚÏß¹ã¸æºÍÊÊÓóÌÐòƽ̨Niazpardaz[.]irºÍ±ÈÌØ±ÒÉúÒâÍøÕ¾Arzi24[.]com¡£¡£¡£ÕâЩÊý¾ÝµÄÊÛ¼ÛΪ0.2¸ö±ÈÌØ±Ò£¬£¬£¬£¬Ô¼ºÏ1463ÃÀÔª¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/iranian-id-cards-selfies-sold-dark-web-hacking-forum/


5.Ñо¿Ö°Ô±ÑÝʾÕë¶ÔPowerPointµÄÊó±êÐüÍ£¹¥»÷


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±Mandar SatamÕë¶ÔÒ»ÖÖÐµĹ¥»÷ǰÑÔ·¢³öÖÒÑÔ£¬£¬£¬£¬¸Ã¹¥»÷ǰÑÔʹºÚ¿ÍÖ»Ð轫Êó±êÐüÍ£ÔÚ³¬Îı¾Á´½ÓÉϼ´¿ÉʹÓÃPowerPointÏÂÔØ²¢×îÏÈ×°ÖöñÒâÈí¼þ¡£¡£¡£¸Ã¹¥»÷ÊÖÒÕȷʵÐèÒªÊܺ¦Õßµã»÷Ò»¸öµ¯³ö¶Ô»°¿òÀ´ÔËÐлò×°ÖóÌÐò£¬£¬£¬£¬ÓÉÓÚÕâ¸öÔµ¹ÊÔ­ÓÉ£¬£¬£¬£¬Î¢Èí²»»á½«ÆäÊÓΪÎó²î¡£¡£¡£SatamÌåÏÖÎó²î±£´æÓÚPowerPointµÄOpen XML Slide ShowÎļþ£¨³ÆÎªPPSX£©ÖУ¬£¬£¬£¬SatamÔÚPoCÖÐÈÆ¹ýÁË΢ÈíÓÚ2017ÄêʵÑéµÄPowerPointÏÞÖÆ¡£¡£¡£Í¨¹ý½«¡°ÔËÐгÌÐò¡±½»Á÷Ϊ¡°HyperLink To¡±£¬£¬£¬£¬¸ÃPoC¿ÉÒÔ´ÓÔ¶³ÌЧÀÍÆ÷ÖÐÔËÐпÉÖ´ÐÐÎļþ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/powerpoint-weakness-mouse-over-attack/154589/


6.Android¶ñÒâÈí¼þxHelper£¬£¬£¬£¬ÒÑѬȾ4.5Íǫ̀װ±¸


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Android¶ñÒâÈí¼þxHelperÓÚ2019Äê3ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬Ëü¾­³£Î±×°³ÉϵͳÇå½à¹¤¾ßͨ¹ýµÚÈý·½¾ÙÐÐÏÂÔØºÍ×°Öᣡ£¡£¸Ã¶ñÒâÈí¼þ¿ÉÒÔ¼àÊÓÓû§¡¢ÇÔÈ¡Êý¾ÝÒÔ¼°ÏÂÔØºÍÖ´ÐÐÆäËü¶ñÒâ³ÌÐò£¬£¬£¬£¬°üÀ¨¹ã¸æºÍTrojan-Dropper.AndroidOS.Necro.z¡£¡£¡£xHelperÖÁÉÙÒѾ­Ñ¬È¾ÁË4.5Íǫ̀װ±¸£¬£¬£¬£¬ÆäÖдó´ó¶¼Ñ¬È¾±¬·¢ÔÚ¶íÂÞ˹¡£¡£¡£¸Ã¶ñÒâÈí¼þÎÞ·¨Í¨¹ýɾ³ý»ò»Ö¸´³ö³§ÉèÖÃÀ´É¨³ý¡£¡£¡£¿£¿£¿¨°Í˹»ùÑо¿Ö°Ô±Igor GolovinÔÚÒ»·Ý²©¿ÍÎÄÕÂÖнÒÏþÁ˶ԸöñÒâÈí¼þ³¤ÆÚÐÔ»úÖÆµÄÆÊÎö¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/this-is-why-the-vicious-xhelper-malware-resists-factory-wipes-and-reboots/