AG¹«Ë¾

AG¹«Ë¾

AG¹«Ë¾¿Æ¼¼

  • »ù´¡ÉèÊ©Çå¾²

    »ù´¡ÉèÊ©Çå¾²
  • Êý¾ÝÇå¾²

    Êý¾ÝÇå¾²
  • ÔÆÅÌËãÇå¾²

    ÔÆÅÌËãÇå¾²
  • ¹¤Òµ»¥ÁªÍøÇå¾²

    ¹¤Òµ»¥ÁªÍøÇå¾²
  • ÎïÁªÍøÇå¾²

    ÎïÁªÍøÇå¾²
  • ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì

    ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì
  • ËùÓвúÆ·

    ËùÓвúÆ·
  • ËùÓнâ¾ö¼Æ»®

    ËùÓнâ¾ö¼Æ»®

»ù´¡ÉèÊ©Çå¾²


  • Õþ¸®

    Õþ¸®
  • ÔËÓªÉÌ

    ÔËÓªÉÌ
  • ½ðÈÚ

    ½ðÈÚ
  • ÄÜÔ´

    ÄÜÔ´
  • ½»Í¨

    ½»Í¨
  • ÆóÒµ

    ÆóÒµ
  • ¿Æ½ÌÎÄÎÀ

    ¿Æ½ÌÎÄÎÀ

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÏàÖúͬ°éÉó²é¸ü¶à >

ÏàÖúͬ°é¶¯Ì¬

³ÉΪÏàÖúͬ°é

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÊÖÒÕÖ§³ÖÉó²é¸ü¶à >

²úÆ·Ö§³Ö

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

·µ»ØÁбí

AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.06.15-2020.06.21£©

2020-06-22

Ò»¡¢ ÈÈÃÅ×ÊѶ

1. Operation In(ter)ceptionÕë¶Ô×ÅÃûº½¿Õº½ÌìºÍ¾üʹ«Ë¾µÄ¹¥»÷

¡¾¸ÅÊö¡¿

Operation In(ter)ceptionÐж¯Öй¥»÷Õß½¨ÉèαÔìµÄLinkedInÕÊ»§£¬Ã°³äº½¿Õº½ÌìºÍ¹ú·À¹¤ÒµÖÐ×ÅÃû¹«Ë¾µÄHR´ú±í£¬ÒÔ×ÅÃûְλµÄн×ÊÐÅϢΪÓÕ¶üÏòÄ¿µÄ¹«Ë¾Ô±¹¤·Ö·¢¶ñÒâÈí¼þ£¬²¢ÇÒÊÔͼͨ¹ýÉÌÒµµç×ÓÓʼþй¶£¨BEC£©¹¥»÷À´Í¨¹ýÊܺ¦Õߵĵç×ÓÓʼþÕÊ»§×¬Ç®¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.welivesecurity.com/2020/06/17/operation-interception-aerospace-military-companies-cyberspies/

 

2. ¹¥»÷ÕßÕë¶ÔÃÀ¹ú¿¹ÒéÔ˶¯·Ö·¢À¬»øÓʼþ

¡¾¸ÅÊö¡¿

¹¥»÷ÕßʹÓÃÒ»Á¬µÄCOVID-19´óÊ¢ÐÐÒÔ¼°ÃÀ¹úºÍÆäËûµØ·½µÄÖڶ࿹ÒéÔ˶¯µÄÈ«ÇòÐÂÎÅÏòÄ¿µÄÓû§·¢ËÍÀ¬»øÓʼþ£¬²¢Ê¹ÓÃÖ÷ÌâºÍ·¢¼þÈËÃû³ÆµÄ±äÌåÀ´ÈƹýÀ¬»øÓʼþ¹ýÂËÆ÷£¬ÓÕʹÏÂÔØ²¢·­¿ª¶ñÒ⸽¼þÒÔÈö²¥Trickbot¶ñÒâÈí¼þ£¬´Ë´Î¹¥»÷Ô˶¯µÄÄ¿µÄȺÌå¶Ô“ÃÀ¹úºÚÈËÖ®ËÀ”ÊÂÎñÌåÏÖͬÇéµÄÈË¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.fortinet.com/blog/threat-research/global-malicious-spam-campaign-using-black-lives-matter-as-a-lure

 

3. InvisiMole×éÖ¯Õë¶Ô¶«Å·¾üʲ¿·ÖºÍÍ⽻ʹÍÅ

¡¾¸ÅÊö¡¿

InvisiMole×é֯ͨ¹ýÓã²æÊ½µç×ÓÓʼþ¾ÙÐзַ¢¶ñÒâÈí¼þ£¬Ê¹ÓÃRDPЭÒéÖÐBlueKeepÎó²î£¬SMBЭÒéÖÐEternalBlueÎó²îºÍʹÓÃľÂíÎļþºÍÈí¼þ×°ÖóÌÐòÈýÖÖ·½·¨¾ÙÐÐÈö²¥£¬²¢Ê¹ÓÃDNSËíµÀÊÖÒÕÌӱܼì²â£¬´Ë´Î¹¥»÷Õë¶Ô¶«Å·µÄ¾üʲ¿·ÖºÍÍ⽻ʹÍÅ¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.welivesecurity.com/2020/06/18/digging-up-invisimole-hidden-arsenal/

 

4. Ê¹ÓÃÖÐÓ¡ÁìÍÁÕù¶ËÒýÓÕÊܺ¦Õߵ͍Ïò¹¥»÷

¡¾¸ÅÊö¡¿

¹¥»÷ÕßʹÓÃÄ¿½ñµÄÓ¡ÖÐÁìÍÁÕù¶Ë£¬Í¨¹ýµç×ÓÓʼþ¸½¼þÏò¶«ÄÏÑǵÄÇå¾²ÆÊÎöʦ·¢ËÍÁËÎļþÃûΪ“ Ó¡ÖÐÁìÍÁÕÅÁ¦.doc”µÄ¶ñÒâÓÕ¶üÎļþ¡£´Ë´Î¹¥»÷ÊÇÎÞÎļþµÄ£¬Ã»ÓÐÔÚ´ÅÅÌÉÏдÈëÈκÎÓÐÓÃÔØºÉ£¬Ò²Ã»Óн¨É賤ÆÚÐÔ£¬²¢ÇÒʹÓÃDKMC¿ò¼ÜÒþ²ØÍ¨Ñ¶¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.zscaler.com/blogs/research/targeted-attack-leverages-india-china-border-dispute-lure-victims

 

5. BITTER×é֯ʹÓÃGoogle Play·Ö·¢¶ñÒâ³ÌÐòÕë¶Ô×Ú½ÌÕûÌå

¡¾¸ÅÊö¡¿

BITTERÊÇÒ»¸öºã¾ÃÕë¶ÔÖйú¡¢°Í»ù˹̹µÈ¹ú¼Ò¾ÙÐй¥»÷Ô˶¯µÄAPT×éÖ¯£¬½üÆÚ¸Ã×éÖ¯ÒÔ×Ú½ÌȺÌåΪĿµÄ£¬Í¨¹ýαװ³ÉÕæÕýµÄÒÁ˹À¼½Ì»òÓëÕ«Âí½ÚÏà¹ØµÄÓ¦ÓóÌÐò£¬ÒÔ¼°³£¼ûÓ¦ÓóÌÐòµÄͨÓñäÌå·Ö·¢¶ñÒâÈí¼þ¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.bitdefender.com/files/News/CaseStudies/study/352/Bitdefender-PR-Whitepaper-BitterAPT-creat4571-en-EN-GenericUse.pdf

 

6. Office 365ÍøÂç´¹ÂÚÔ˶¯ÀÄÓÃAdobe CampaignÖØ¶¨Ïò»úÖÆ

¡¾¸ÅÊö¡¿

¹¥»÷ÕßʹÓÃÅ£½òµÄµç×ÓÓʼþ·þÎñÆ÷·¢ËÍÀ¬»øÓʼþ£¬Óû§µ¥»÷µç×ÓÓʼþÌáÐѵÄÒ»¸ö°´Å¥ºó£¬Í¨¹ýÈýÐÇÓò±»Öض¨Ïòµ½Î±×°³ÉOffice 365µÇÂ¼Ò³ÃæµÄÍøÂç´¹ÂÚÒ³Ãæ¡£¹¥»÷ÕßÀÄÓÃAdobe CampaignÖØ¶¨Ïò»úÖÆ£¬Ê¹ÆäÌÓ±ÜÇå¾²Èí¼þµÄ¼ì²â£¬´Ë´Î¹¥»÷Õë¶ÔÅ·ÖÞ¡¢ÑÇÖÞºÍÖж«¡£

¡¾²Î¿¼Á´½Ó¡¿

https://research.checkpoint.com/2020/phishing-campaign-exploits-samsung-adobe-and-oxford-servers/

 

7. ¶à½×¶ÎAPT¹¥»÷ʹÓÃCobalt StrikµÄMalleable C2¹¦Ð§

¡¾¸ÅÊö¡¿

¹¥»÷Õßͨ¹ýÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ·Ö·¢Î±×°³É¼òÀúµÄ¶ñÒâWordÎĵµ£¬¸ÃÎĵµÊ¹ÓÃÄ£°å×¢Èëɾ³ýÁË.Net Loader£¬²¢ÇÒʹÓÃÁËCobalt StrikeµÄMalleable C2¹¦Ð§À´ÏÂÔØ×îÖÕµÄÓÐÓÃÔØºÉ²¢Ö´ÐÐC2ͨѶ¡£

¡¾²Î¿¼Á´½Ó¡¿

https://blog.malwarebytes.com/threat-analysis/2020/06/multi-stage-apt-attack-drops-cobalt-strike-using-malleable-c2-feature/

 

8. AcidBox¶ñÒâÈí¼þʹÓÃVirtualBoxÇý¶¯³ÌÐòÎó²îÕë¶Ô¶íÂÞ˹

¡¾¸ÅÊö¡¿

AcidBoxÊÇÒ»¸öÖØ´óµÄÄ£¿é»¯¹¤¾ß°ü£¬±»ÓÃÓÚ¶¨Ïò¹¥»÷Ô˶¯¡£ÔÚ½üÆÚµÄ¹¥»÷Ô˶¯ÖÐAcidBox¶ñÒâÈí¼þʹÓÃÒÑÖªVirtualBoxÇý¶¯³ÌÐòÎó²îCVE-2008-3431À´½ûÓÃWindowsÖеÄÇý¶¯³ÌÐòÊðÃûÖ´ÐУ¬Ä¿µÄÊÇλÓÚ¶íÂÞ˹µÄ×éÖ¯¡£

¡¾²Î¿¼Á´½Ó¡¿

https://unit42.paloaltonetworks.com/acidbox-rare-malware/

 

9. Õë¶Ô°Ä´óÀûÑÇÕþ¸®ºÍÆóÒµµÄÍøÂç¹¥»÷Ô˶¯

¡¾¸ÅÊö¡¿

¹¥»÷ÕßʹÓÃÐí¶à³õʼ»á¼ûǰÑÔ£¬Í¨¹ýÔÚδÐÞ²¹°æ±¾µÄTelerik UIÖÐʹÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬ÌᳫÕë¶Ô°Ä´óÀûÑÇÕþ¸®ºÍÆóÒµµÄÍøÂç¹¥»÷Ô˶¯¡£¹¥»÷Õß´ó×ÚʹÓÿ´·¨ÑéÖ¤Îó²îʹÓôúÂ룬Web ShellºÍÆäËûÔ´´úÂëÏÕЩ¿ª·ÅµÄ¹¤¾ß¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.cyber.gov.au/threats/advisory-2020-008-copy-paste-compromises-tactics-techniques-and-procedures-used-target-multiple-australian-networks

 

 

10. ¹¥»÷ÕßʹÓÃNetWireÌØ¹¤Èí¼þÕë¶ÔÓ¡¶ÈÈËȨº´ÎÀÕß

¡¾¸ÅÊö¡¿

½üÆÚÓй¥»÷ÕßÕë¶ÔÓ¡¶ÈάȨÈËÊ¿¡¢×´Ê¦¡¢Ñ§ÕߺÍÐÂÎÅÊÂÇéÕß·¢¶¯Óã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬Í¨¹ý·¢ËͰüÀ¨¶ñÒâÁ´½ÓµÄµç×ÓÓʼþ·Ö·¢¿ÉÉÌҵʹÓõÄÌØ¹¤Èí¼þNetWire£¬Ò»µ©Óû§µ¥»÷ÕâЩÁ´½Ó£¬½«±»°²ÅÅÌØ¹¤Èí¼þNetWire£¬ÒÔÆÆËðÄ¿µÄÅÌËã»úÀ´¼àÊÓÆäÐÐΪºÍͨѶ¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.amnesty.org/en/latest/research/2020/06/india-human-rights-defenders-targeted-by-a-coordinated-spyware-operation/

 

11. ÀÄÓÃÕýµ±Èí¼þ¾ÙÐÐdllÐ®ÖÆµÄ¹¥»÷Ô˶¯

¡¾¸ÅÊö¡¿

ÔÚ½üÆÚµÄ¹¥»÷Ô˶¯Öй¥»÷ÕßÀÄÓÃÁ½¸öÕýµ±µÄÓ¦ÓóÌÐòCrystalBitºÍApple×÷ΪdllË«ÖØÐ®ÖÆ¹¥»÷Á´µÄÒ»²¿·Ö£¬Óë¹ã¸æÈí¼þºÍڲƭÐÔÈí¼þ¾ÙÐÐÀ¦°ó£¬²¢ÇÒ°²ÅÅÁËÓ¦ÓóÌÐòµÄÕýµ±ÇÒ¾­ÓÉÊðÃûµÄ¸±±¾£¬×îÖÕÏòÊܺ¦Õß·Ö·¢ÍÚ¿ó³ÌÐò¡£

¡¾²Î¿¼Á´½Ó¡¿

https://blog.morphisec.com/crystalbit-apple-double-dll-hijack

 

12. ¹¥»÷ÕßʹÓÃFabulaTechÎó²îαÔìUSB×°±¸

¡¾¸ÅÊö¡¿

FabulaTechÔÊÐíÆóҵʹÓÃÓ¦ÓóÌÐòUSB×°±¸Öض¨Ïòµ½Ô¶³Ì»á»°µÄ¶Ëµã£¬µ«ÆäÖеÄ×ÜÏßÇý¶¯³ÌÐòÔÊÐíµÍÌØÈ¨Óû§Ìí¼ÓÍêÈ«¿ØÖƵÄÈí¼þUSB×°±¸¡£¹¥»÷Õß»áʹÓøÃÎó²îÔÚijЩ³£¼ûÇéÐÎÏÂÌáÉýÌØÈ¨£¬Èç¿ÉÒÔÌí¼ÓαÔìµÄÊó±êÖ¸Õë»ò¼üÅ̾ÙÐвÙ×÷¡£

¡¾²Î¿¼Á´½Ó¡¿

https://labs.sentinelone.com/click-from-the-backyard-cve-2020-9332/

 

13. FTCode¶ñÒâÈí¼þͨ¹ýÀ¬»øÓʼþÈö²¥

¡¾¸ÅÊö¡¿

FTCode¶ñÒâÈí¼þͨ¹ýÀ¬»øÓʼþ¾ÙÐÐÈö²¥£¬À¬»øÓʼþ´øÓжñÒâÁ´½Ó£¬Óû§µã»÷Á´½ÓºóÖØ¶¨Ïòµ½¶ñÒâ×ÊÔ´¡£FTCode¿ÉÒÔ»ñÈ¡ThunderbirdºÍOutlookµç×ÓÓʼþ¿Í»§¶ËºÍChrome¡¢Internet ExplorerºÍFireFoxä¯ÀÀÆ÷µÄƾ֤¡£

¡¾²Î¿¼Á´½Ó¡¿

https://cert-agid.gov.it/news/campagna-massiva-jasperloader-veicola-ftcode-via-pec/

?

ÄúµÄÁªÏµ·½·¨

*ÐÕÃû
*µ¥Î»Ãû³Æ
*ÁªÏµ·½·¨
*ÑéÖ¤Âë AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
Ìá½»µ½ÓÊÏä

¹ºÖÃÈÈÏß

  • ¹ºÖÃ×Éѯ:

    400-818-6868-1

Ìá½»ÏîÄ¿ÐèÇó

½Ó´ý¼ÓÈëAG¹«Ë¾¿Æ¼¼£¬³ÉΪÎÒÃǵÄÏàÖúͬ°é£¡
  • *ÇëÐÎòÄúµÄÐèÇó
  • *×îÖÕ¿Í»§Ãû³Æ
  • *ÏîÄ¿Ãû³Æ
  • Äú¸ÐÐËȤµÄ²úÆ·
  • ÏîĿԤËã
ÄúµÄÁªÏµ·½·¨
  • *ÐÕÃû
  • *ÁªÏµµç»°
  • *ÓÊÏä
  • *Ö°Îñ
  • *¹«Ë¾
  • *¶¼»á
  • *ÐÐÒµ
  • *ÑéÖ¤Âë AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
  • Ìá½»µ½ÓÊÏä
AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø

·þÎñÖ§³Ö

ÖÇÄܿͷþ
ÖÇÄܿͷþ
¹ºÖÃ/ÊÛºóÊÖÒÕÎÊÌâ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
ÔÚÏßÌáµ¥|ÖÇÄÜÎÊ´ð|֪ʶ¿â
Ö§³ÖÈÈÏß
Ö§³ÖÈÈÏß
400-818-6868
AG¹«Ë¾¿Æ¼¼ÉçÇø
AG¹«Ë¾¿Æ¼¼ÉçÇø
×ÊÁÏÏÂÔØ|ÔÚÏßÎÊ´ð|ÊÖÒÕ½»Á÷

? 2025 NSFOCUS AG¹«Ë¾¿Æ¼¼ www.nsfocus.com All Rights Reserved . ¾©¹«Íø°²±¸ 11010802021605ºÅ ¾©ICP±¸14004349ºÅ ¾©ICPÖ¤110355ºÅ

ÍøÕ¾µØÍ¼