CNCERTÐû²¼¡¶2020ÄêÉϰëÄêÎÒ¹ú»¥ÁªÍøÍøÂçÇå¾²¼à²âÊý¾ÝÆÊÎö±¨¸æ¡·£»£»ÐÙÑÀÀûÒøÐк͵çÐÅÒµÔâµ½DDoS¹¥»÷µ¼ÖÂЧÀÍÔÝʱÖÐÖ¹
Ðû²¼Ê±¼ä 2020-09-281.CNCERTÐû²¼¡¶2020ÄêÉϰëÄêÎÒ¹ú»¥ÁªÍøÍøÂçÇå¾²¼à²âÊý¾ÝÆÊÎö±¨¸æ¡·

ΪÖÜÈ«·´Ó¦2020ÄêÉϰëÄêÎÒ¹ú»¥ÁªÍøÔÚ¶ñÒâ³ÌÐòÈö²¥¡¢Îó²îΣº¦¡¢DDoS¹¥»÷¡¢ÍøÕ¾Çå¾²µÈ·½ÃæµÄÇéÐΣ¬£¬CNCERT¶ÔÉϰëÄê¼à²âÊý¾Ý¾ÙÐÐÁËÊáÀí£¬£¬²¢Ðγɼà²âÊý¾ÝÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬2020ÄêÉϰëÄ꣬£¬²¶»ñÅÌËã»ú¶ñÒâ³ÌÐòÑù±¾ÊýĿԼ1815Íò¸ö£¬£¬ÈÕ¾ùÈö²¥´ÎÊý´ï483ÍòÓà´Î£¬£¬Éæ¼°ÅÌËã»ú¶ñÒâ³ÌÐò¼Ò×åÔ¼1.1ÍòÓà¸ö¡£¡£¡£¡£¡£Æ¾Ö¤Èö²¥ÈªÔ´Í³¼Æ£¬£¬¾³Íâ¶ñÒâ³ÌÐòÖ÷ÒªÀ´×ÔÃÀ¹ú¡¢ÈûÉà¶ûºÍ¼ÓÄôóµÈ£¬£¬£»£»¾³ÄڵĶñÒâ³ÌÐòÖ÷ÒªÀ´×ÔÕã½Ê¡¡¢¹ã¶«Ê¡ºÍ±±¾©Êеȡ£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.cert.org.cn/publish/main/46/2020/20200926085042652505447/20200926085042652505447_.html
2.ÐÙÑÀÀûÒøÐк͵çÐÅÒµÔâµ½DDoS¹¥»÷µ¼ÖÂЧÀÍÔÝʱÖÐÖ¹

Ò»³¡Ç¿Ê¢µÄDDoS¹¥»÷Ï®»÷ÁËÐÙÑÀÀûµÄÒ»Ð©ÒøÐк͵çÐÅЧÀÍ£¬£¬µ¼ÖÂÆäЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¾ÝMagyarµçÐŹ«Ë¾³Æ£¬£¬´Ë´Î¹¥»÷±¬·¢ÔÚÖÜËÄ£¬£¬¶íÂÞ˹ºÍÔ½ÄϵȹúµÄºÚ¿ÍÊÔͼ¶ÔÐÙÑÀÀû½ðÈÚ»ú¹¹ÌᳫDDoS¹¥»÷£¬£¬ËûÃÇͬʱҲ´Ý»ÙÁËMagyarµçÐŹ«Ë¾µÄÍøÂç¡£¡£¡£¡£¡£±ðµÄ£¬£¬´Ë´Î¹¥»÷ÖеÄÊý¾ÝÁ÷Á¿±Èͨ³£ÔÚDDoSÊÂÎñÖп´µ½µÄÁ÷Á¿¸ß10±¶£¬£¬ÕâÒâζ×Å¾ÍÆä¹æÄ£ºÍÖØ´óÐÔ¶øÑÔ£¬£¬ÕâÊÇÐÙÑÀÀûÓÐÊ·ÒÔÀ´×î´óµÄºÚ¿Í¹¥»÷Ö®Ò»¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108788/hacking/ddos-attack-hungarian-orgs.html
3.Tesorion·¢Ã÷ThunderXÖÐÎó²î£¬£¬¿ÉÃâ·Ñ»Ö¸´±»ËøÎļþ

ÍøÂçÇå¾²¹«Ë¾Tesorion·¢Ã÷ThunderXÖÐÎó²î£¬£¬ÒÔ´Ë¿ª·¢²¢Ðû²¼ÁËThunderXÀÕË÷Èí¼þµÄ½âÃܳÌÐò£¬£¬Ê¹Êܺ¦Õß¿ÉÒÔÃâ·Ñ»Ö¸´ÆäÎļþ¡£¡£¡£¡£¡£¸Ã½âÃÜÆ÷¿ÉÒÔ½âÃܾßÓÐ.tx_lockedÀ©Õ¹ÃûµÄ±»¼ÓÃܵÄÎļþ£¬£¬Ö»ÐèÉÏ´«Ò»·Ýreadme.txtÊê½ð˵Ã÷µÄ¸±±¾ºÍÒ»¸ö¼ÓÃܵÄÎļþ£¬£¬±ã¿ÉÒÔÌìÉú½âÃÜÃÜÔ¿¡£¡£¡£¡£¡£Ö®ºó£¬£¬ÏÂÔØTesorionµÄThunderX Ransomware½âÃܳÌÐò±ã¿ÉÒÔ¾ÙÐнâÃܲÙ×÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/thunderx-ransomware-silenced-with-release-of-a-free-decryptor/
4.Áè¼Ý20Íò¸öʹÓÃFortinet VPNµÄÆóÒµÒ×ÊÜMitM¹¥»÷

ÍøÂçÇ徲ƽ̨ÌṩÉÌ SAM Seamless Network³Æ£¬£¬Áè¼Ý20Íò¸öʹÓÃFortinet VPNµÄÆóÒµÒ×ÊÜMitM¹¥»÷¡£¡£¡£¡£¡£ÔÚFortigate VPNµÄĬÈÏÉèÖÃÖУ¬£¬Fortigate SSL-VPN¿Í»§¶Ë½öÑéÖ¤CAÊÇÓÉFortigateÕÕ¾ÉÓÉÁíÒ»¸öÊÜÐÅÈεÄCA½ÒÏþµÄ£¬£¬Õâʹ¹¥»÷Õß¿ÉÒÔ³öʾ½ÒÏþ¸øÆäËûFortigate·ÓÉÆ÷µÄÖ¤ÊéÀ´Ö´ÐÐÖÐÐÄÈ˹¥»÷¡£¡£¡£¡£¡£²»ÐÒµÄÊÇ£¬£¬ÏÖÔÚFortinet²¢Ã»ÓÐÍýÏë½â¾ö¸ÃÎó²î£¬£¬Ëü½¨ÒéÓû§ÊÖ¶¯Ì滻ĬÈÏÖ¤Ê飬£¬ÒÔÔ¤·ÀMitM¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108737/hacking/fortigate-vpn-attacks.html
5.TylerÖÒÑÔÆäÓû§Ô¶³Ì»á¼ûÃÜÂë»òÒѱ»Ê¹Ó㬣¬½¨ÒéÁ¬Ã¦ÐÞ¸Ä

Õþ¸®ÊÖÒÕЧÀÍÌṩÉÌTyler TechnologiesÖÒÑÔÆäÓû§Ô¶³Ì»á¼ûÃÜÂë»òÒѱ»ºÚ¿ÍʹÓ㬣¬½¨ÒéÁ¬Ã¦Ð޸ġ£¡£¡£¡£¡£¸Ã¹«Ë¾µÄCIO Matt BieriÌåÏÖ£¬£¬Æä×î½ü·¢Ã÷ÓÐÁ½¸ö¿Í»§¶Ë±¨¸æÁËʹÓÃTylerÔ¶³Ì»á¼ûƾ֤¾ÙÐеĿÉÒɵǼ¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÕâЩ¿ÉÒɻÊÇ·ñÓëÆäÉÏÖÜÈÕÔâµ½µÄÀÕË÷Èí¼þ¹¥»÷Óйأ¬£¬¿ÉÊÇΪÁËÇå¾²Æð¼û£¬£¬ËûÃǽ¨ÒéÆä¿Í»§¸ü¸ÄTyler TechnologiesʹÓõÄÕÊ»§µÄËùÓÐÃÜÂë¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/tyler-technologies-warns-clients-to-change-remote-support-passwords/
6.Google´ÓPlayÊÐËÁÖÐɾ³ý17ÖÖѬȾJokerµÄAndroidÓ¦ÓÃ

Google±¾ÖÜ´Ó¹Ù·½PlayÊÐËÁÖÐɾ³ýÁË17ÖÖѬȾÁËJokerµÄAndroidÓ¦ÓóÌÐò¡£¡£¡£¡£¡£Ìع¤Èí¼þJokerÖ¼ÔÚÇÔÈ¡SMSÐÂÎÅ¡¢ÁªÏµÁбíºÍ×°±¸ÐÅÏ¢£¬£¬²¢ÒÔ¾²Ä¬·½·¨Ç©ÊðÊܺ¦Õߵĸ߼¶ÎÞÏßÓ¦ÓÃÐÒ飨WAP£©Ð§ÀÍ¡£¡£¡£¡£¡£Õâ17¸ö¶ñÒâÓ¦ÓÃÓÚ±¾ÔÂÔÚPlayÊÐËÁÉϼܣ¬£¬ÔÚ±»·¢Ã÷֮ǰÒÑÏÂÔØÁË12Íò´ÎÒÔÉÏ¡£¡£¡£¡£¡£ÕâÒÑÊǽü¼¸¸öÔÂÄڹȸèÇå¾²ÍŶӾÙÐеĵÚÈý´ÎÕë¶ÔѬȾJokerµÄÓ¦ÓõÄɨ³ý»î¶¯£¬£¬ÔÚ±¾Ô³õ£¬£¬¹È¸è¾Íɾ³ýÁË6¸ö´ËÀàÓ¦ÓóÌÐò¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/google-removes-17-android-apps-doing-wap-billing-fraud-from-the-play-store/


¾©¹«Íø°²±¸11010802024551ºÅ