AG¹«Ë¾

AG¹«Ë¾

AG¹«Ë¾¿Æ¼¼

  • »ù´¡ÉèÊ©Çå¾²

    »ù´¡ÉèÊ©Çå¾²
  • Êý¾ÝÇå¾²

    Êý¾ÝÇå¾²
  • ÔÆÅÌËãÇå¾²

    ÔÆÅÌËãÇå¾²
  • AIÇå¾²

    AIÇå¾²
  • ¹¤Òµ»¥ÁªÍøÇå¾²

    ¹¤Òµ»¥ÁªÍøÇå¾²
  • ÎïÁªÍøÇå¾²

    ÎïÁªÍøÇå¾²
  • ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì

    ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì
  • ËùÓвúÆ·

    ËùÓвúÆ·
  • ËùÓнâ¾ö¼Æ»®

    ËùÓнâ¾ö¼Æ»®

»ù´¡ÉèÊ©Çå¾²


  • Õþ¸®

    Õþ¸®
  • ÔËÓªÉÌ

    ÔËÓªÉÌ
  • ½ðÈÚ

    ½ðÈÚ
  • ÄÜÔ´

    ÄÜÔ´
  • ½»Í¨

    ½»Í¨
  • ÆóÒµ

    ÆóÒµ
  • ¿Æ½ÌÎÄÎÀ

    ¿Æ½ÌÎÄÎÀ

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÏàÖúͬ°éÉó²é¸ü¶à >

ÏàÖúͬ°é¶¯Ì¬

³ÉΪÏàÖúͬ°é

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÊÖÒÕÖ§³ÖÉó²é¸ü¶à >

²úÆ·Ö§³Ö

  • AG¹«Ë¾ÔÆ AG¹«Ë¾ÔÆ
  • AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI AG¹«Ë¾ÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á ±±¾©AG¹«Ë¾¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

·µ»ØÁбí

AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.06.22-2020.06.28£©

2020-06-29

Ò»¡¢ Íþвͨ¸æ

Apache Dubbo ProviderĬÈÏ·´ÐòÁл¯Ô¶³Ì´úÂëÖ´ÐÐÎó²î

¡¾Ðû²¼Ê±¼ä¡¿2020-06-23 17:00:00 GMT

¡¾¸ÅÊö¡¿

2020Äê6ÔÂ23ÈÕ £¬Apache DubboÐû²¼Ç徲ͨ¸æÅû¶ProviderĬÈÏ·´ÐòÁл¯µ¼ÖµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-1948£© £¬¹¥»÷Õß¿ÉÒÔ·¢ËÍ´øÓÐÎÞ·¨Ê¶±ðµÄ·þÎñÃû»òÒªÁìÃû¼°Ä³Ð©¶ñÒâ²ÎÊý¸ºÔصÄRPCÇëÇó £¬µ±¶ñÒâ²ÎÊý±»·´ÐòÁл¯Ê±½«µ¼Ö´úÂëÖ´ÐС£

¡¾Á´½Ó¡¿

http://blog.nsfocus.net/apache-dubbo-0623/

¶þ¡¢ ÈÈÃÅ×ÊѶ

1. ¹¥»÷ÕßʹÓÃIndigoDropÕë¶ÔÄÏÑǾüʺÍÕþ¸®×éÖ¯

¡¾¸ÅÊö¡¿

½üÆÚÒÔ¾üÊÂÖ÷ÌâΪÓÕ¶üµÄ¹¥»÷Ô˶¯ £¬Í¨¹ý¶ñÒâMicrosoft OfficeÎĵµÈö²¥°üÀ¨ÍêÕûRAT¹¦Ð§µÄCobalt Strike £¬ÕâЩ¶ñÒâÎĵµÊ¹ÓöñÒâºêÀ´¾ÙÐжà½×¶ÎºÍ¸ß¶ÈÄ£¿é»¯µÄѬȾ £¬²¢ÇÒʹÓù«¹²·þÎñÆ÷ºÍ˽ÓзþÎñÆ÷µÄ×éºÏÀ´ÍÐ¹ÜÆä¶ñÒâÓÐÓøºÔØ £¬IndigoDropÈÏÕæ´ÓÏÂÔØURL»ñÈ¡×îÖÕµÄÓÐÓøºÔØÒÔ¾ÙÐа²ÅÅ £¬´Ë´Î¹¥»÷Õë¶ÔÄÏÑǵľüʺÍÕþ¸®×éÖ¯¡£

¡¾²Î¿¼Á´½Ó¡¿

https://blog.talosintelligence.com/2020/06/indigodrop-maldocs-cobalt-strike.html

2. XORDDoSºÍKaiji½©Ê¬ÍøÂç±äÖÖÕë¶ÔDocker·þÎñÆ÷

¡¾¸ÅÊö¡¿

XORDDoSºÍKaijiÊÇLinux½©Ê¬ÍøÂç¶ñÒâÈí¼þÀàÐ͵ıäÌå £¬´Ë´Î¹¥»÷ÊÇXORDDoSÊ״ν«Docker·þÎñÆ÷×÷ΪĿµÄ¡£¹¥»÷ÕßɨÃè̻¶µÄDocker·þÎñÆ÷ͨѶ¶Ë¿Ú2375ºóʹÓý©Ê¬ÍøÂçÖ´Ðб©Á¦¹¥»÷£»Kaiji½©Ê¬ÍøÂçͬÑùɨÃè¶Ë¿Ú2375̻¶µÄÖ÷»ú £¬¶ÔDocker·þÎñÆ÷Ö´ÐÐping²Ù×÷ £¬È»ºó°²ÅÅÖ´ÐÐKaiji¶þ½øÖÆÎļþµÄ¶ñÒâARMÈÝÆ÷¡£

¡¾²Î¿¼Á´½Ó¡¿

https://blog.trendmicro.com/trendlabs-security-intelligence/xorddos-kaiji-botnet-malware-variants-target-exposed-docker-servers/

 

3. BRONZE VINEWOOD×éÖ¯Ãé×¼¹©Ó¦Á´»ú¹¹

¡¾¸ÅÊö¡¿

BRONZE VINEWOOD £¬Ò²±»³ÆÎªAPT31¡¢ZIRCONIUM £¬ÊÇÒ»¸öÖÁÉÙ´Ó2016Äê»îÔ¾ÖÁ½ñµÄÍþв×éÖ¯ £¬¸Ã×éÖ¯ÓëÖйúÓйØ¡£½üÆÚBRONZE VINEWOOD×é֯ʵÑéÇÔȡƾ֤²¢Ê¹ÓÃÕýµ±µÄÔ¶³Ì»á¿´·¨¾ö¼Æ»®ºÍЭÒéµÈ¶àÖÖ¹¤¾ßºÍÊÖÒÕÀ´»á¼ûÇéÐÎ £¬¶ÔÈí¼þÌṩÉÌºÍÆäËû¹©Ó¦Á´×éÖ¯µÄ¹¥»÷Ö¼ÔÚ»á¼û¿Í»§µÄÊý¾Ý»òÍøÂç¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.secureworks.com/research/bronze-vinewood-targets-supply-chains

 

4. Õë¶ÔÃåµéµÄÍøÂçÌØ¹¤¹¥»÷Ô˶¯

¡¾¸ÅÊö¡¿

¹¥»÷ÕßÕë¶ÔÃåµéÌᳫÓã²æÊ½´¹ÂÚ¹¥»÷ £¬ÏòÄ¿µÄÓû§·Ö·¢´øÓжñÒâLNKÎļþµÄµç×ÓÓʼþ £¬¶ñÒâÎļþÍйÜÔÚGoogleÔÆ¶ËÓ²ÅÌÖÐÒÔÌӱܷÀ²¡¶¾ºÍÇ徲ɨÃè³ÌÐòʶ±ð £¬¸ÃÎļþÒ»µ©Ö´ÐÐ £¬½«ÔÚºǫ́ÍϷŲ¢ÔËÐпÉÖ´ÐÐÎļþ £¬²¢Ê¹Óù¤¾ßOctopus¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©Í¨Ñ¶¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.anomali.com/blog/unknown-china-based-apt-targeting-myanmarese-entities

 

5. Lucifer¶ñÒâÈí¼þʹÓÃÎó²îѬȾWindows×°±¸

¡¾¸ÅÊö¡¿

LuciferÊǼÓÃÜÐ®ÖÆºÍDDoS¶ñÒâÈí¼þ±äÌåµÄÍŽá £¬ËüʹÓþÉÎó²îÔÚWindowsƽ̨ÉÏÈö²¥ºÍÖ´ÐжñÒâÔ˶¯ £¬¸Ã¶ñÒâÈí¼þ¿ÉÒÔ¾ÙÐÐMoneroµÄÃÜÂëÐ®ÖÆ £¬Äܹ»Ê¹Óöà¸öÎó²îºÍƾ֤¾ÙÐÐÏÂÁîºÍ¿ØÖÆ£¨C2£©²Ù×÷ÒÔ¼°×ÔÎÒÈö²¥ £¬²¢ÇÒÕë¶ÔÄÚ²¿Ò×Êܹ¥»÷µÄÄ¿µÄѬȾ²¢ÔËÐÐEternalBlue £¬EternalRomanceºÍDoublePulsarºóÃÅ¡£

¡¾²Î¿¼Á´½Ó¡¿

https://unit42.paloaltonetworks.com/lucifer-new-cryptojacking-and-ddos-hybrid-malware/

 

6. FIN7×é֯ʹÓÃPillowmint¶ñÒâÈí¼þÕë¶ÔÁãÊÛÖÕ¶Ëϵͳ

¡¾¸ÅÊö¡¿

FIN7 £¬ÊÇÒ»¸öÓвÆÎñÄîÍ·µÄÍþв×éÖ¯ £¬×Ô2015ÄêÒÔÀ´Ò»Ö±»îÔ¾ £¬Ö÷ÒªÕë¶ÔÂùݺͲÍÒûÒµ¡£½üÆÚFIN7×é֯ʹÓÃPillowmint¶ñÒâÈí¼þÕë¶ÔÁãÊÛÖÕ¶Ëϵͳ £¬Í¨¹ý¶ñÒâµÄshimÊý¾Ý¿â·Ö·¢ £¬Äܹ»²¶»ñTrack1ºÍTrack2ÐÅÓÿ¨Êý¾Ý¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pillowmint-fin7s-monkey-thief/

 

7. ÀÕË÷Èí¼þCryCryptorαװ³ÉCOVID-19×·×ÙÓ¦ÓÃÈö²¥

¡¾¸ÅÊö¡¿

½üÆÚ¹¥»÷ÕßÔÚ¹¥»÷Ô˶¯Öн«ÀÕË÷Èí¼þCryCryptorαװ³É¹Ù·½COVID-19ÁªÏµÈË×·×ÙÓ¦ÓóÌÐò £¬Í¨¹ýÁ½¸ö¶ñÒâ·Ö·¢ÍøÕ¾·Ö·¢¸øÎ»ÓÚ¼ÓÄôóµÄAndroid×°±¸Óû§ £¬²¢¶ÔÉè±¹ØÁ¬ÄÎļþ¾ÙÐмÓÃÜ¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.welivesecurity.com/2020/06/24/new-ransomware-uses-covid19-tracing-guise-target-canada-eset-decryptor/

 

8. Hidden Cobra×éÖ¯µÄжñÒ⹤¾ß

¡¾¸ÅÊö¡¿

Hidden Cobra×éÖ¯ÔÚÒÑÍùµÄÊ®ÄêÖÐÒ»Ö±ºÜ»îÔ¾ £¬½ñÄê5ÔÂÃÀ¹úÕþ¸®»ú¹¹Ðû²¼µÄ±¨¸æÖÐÐÎòHidden Cobra×éÖ¯µÄÈý¸öжñÒ⹤¾ßCOPPERHEDGE¡¢TAINTEDSCRIBEºÍPEBBLEDASH¡£

¡¾²Î¿¼Á´½Ó¡¿

https://blog.reversinglabs.com/blog/hidden-cobra

9. Ê¹ÓÃGoogle Analytics·þÎñÇÔÈ¡Óû§Êý¾Ý

¡¾¸ÅÊö¡¿

¹¥»÷ÕßʹÓÃGoogle AnalyticsÖеÄÐÅÍÐÀ´Ê¹ÓÃGoogle Analytics APIÈÆ¹ýÄÚÈÝÇå¾²Õ½ÂÔ£¨CSP£© £¬ÔÚÏßÊÐËÁÍøÕ¾Ê¹ÓÃGoogle Analytics·þÎñ¸ú×Ù»á¼ûÕß £¬Òò´Ë £¬Google AnalyticsÓòÔÚÆäCSPÉèÖÃÖÐÁÐÈëÁ˰×Ãûµ¥ £¬¹¥»÷Õß¿ÉÒÔ»á¼ûGoogle AnalyticsÕÊ»§Öеı»µÁÊý¾Ý¡£

¡¾²Î¿¼Á´½Ó¡¿

https://securityaffairs.co/wordpress/105086/cyber-crime/google-analytics-e-skimming.html

 

10. DarkVision RATÄ£¿é»¯¶ñÒâÈí¼þÕýÔÚ±»Æð¾¢ÏúÊÛ

¡¾¸ÅÊö¡¿

DarkVision RATÊÇÒ»¸öÔ¶³Ì»á¼û¹¤¾ß(RAT) £¬½ÓÄÉÄ£¿é»¯²å¼þ½á¹¹ £¬ÊÇÒ»ÖÖ¼òÆÓ¡¢Ò×ÓúÍÓû§ÓѺõŤ¾ß°ü £¬¾ßÓÐϵͳ¿ØÖÆ £¬Àú³ÌÖÎÀíÆ÷ £¬×¢²á±í±à¼­ºÍÎļþÖÎÀíÆ÷µÈ¹¦Ð§¡£¿ËÈÕDarkVision RATÔÚÍøÂç·¸·¨ºÍºÚ¿ÍÂÛ̳Öб»Æð¾¢ÏúÊÛ £¬ÉÐÓÐרÃŵÄÏúÊÛÍøÕ¾¡£

¡¾²Î¿¼Á´½Ó¡¿

https://www.deepinstinct.com/2020/06/23/new-on-the-scene-darkvision-rat/

 

11. IcedIDÒøÐÐľÂí±äÖÖʹÓÃCOVID-19ÓÕ¶üÈö²¥

¡¾¸ÅÊö¡¿

IcedIDÒøÐÐľÂíÓÚ2017ÄêÊ״ηºÆðÔÚÍþвÁìÓò £¬ÀàËÆÓÚÆäËû½ðÈÚľÂí £¬IcedID¿ÉÌᳫä¯ÀÀÆ÷ÖеĹ¥»÷ £¬ÒÔ¼°×èµ²ºÍÇÔÈ¡Êܺ¦ÕߵĽðÈÚÐÅÏ¢¡£½üÆÚIcedIDÒøÐÐľÂíбäÖÖÒÔCOVID-19Ö÷ÌâÀ¬»øÓʼþÈö²¥ £¬Ð±äÖÖ¿ÉÇÔÌýÊܺ¦ÕßµÄÍøÂçÔ˶¯ £¬´Ë´Î¹¥»÷Ö÷ÒªÕë¶ÔÃÀ¹úÓû§¡£

¡¾²Î¿¼Á´½Ó¡¿

https://securityaffairs.co/wordpress/105049/malware/icedid-banking-trojan-steganography.html

 

12. TrickbotʹÓÃCobalt Strike¹¥»÷·þÎñÆ÷

¡¾¸ÅÊö¡¿

TrickbotÔËÓªÉÌʹÓ÷þÎñÆ÷ÄÚ²¿µÄPowerTrickºÍCobalt Strike°²ÅÅAnchorºóÃųÌÐòºÍRYUKÀÕË÷Èí¼þ £¬Ê¹ÓÃÐí¶à¿ªÔ´¾ç±¾ºÍ¹¤¾ßÀ´ÍøÂçÐÅÏ¢ £¬²¢Ñ¬È¾×ªÒƵ½ÆäËûϵͳ £¬TrickBotÄ£¿éÔÚÊÜѬȾµÄϵͳÉÏÍøÂç´ó×ÚÊý¾Ý £¬²¢ÊµÑéתµ½Óò¿ØÖÆÆ÷¡£

¡¾²Î¿¼Á´½Ó¡¿

https://labs.sentinelone.com/inside-a-trickbot-cobaltstrike-attack-server/

 

13. Ê¹ÓÃEXIFÔªÊý¾ÝÒþ²ØÐÅÓÿ¨ÊèÉ¢Æ÷

¡¾¸ÅÊö¡¿

¹¥»÷ÕßʹÓÃͼÏñµÄ“°æÈ¨ÔªÊý¾Ý”×Ö¶ÎÀ´¼ÓÔØÆäWebÊèÉ¢Æ÷ £¬ÓÉÊܵ½ÆÆËðµÄÔÚÏßÊÐËÁÉñÃØ¼ÓÔØ £¬²¢ÇÒʹÓÃͼÏñÎļþ×÷Ϊαװ¾ÙÐÐÈö²¥¡£´ËÊèÉ¢Æ÷½«²¶»ñÊäÈë×ֶεÄÄÚÈÝ £¬ÈçÔÚÏß¹ºÎïÕßµÄÐÕÃû £¬Õ˵¥µØµãºÍÐÅÓÿ¨ÏêϸÐÅÏ¢µÈÊý¾Ý¡£

¡¾²Î¿¼Á´½Ó¡¿

https://blog.malwarebytes.com/threat-analysis/2020/06/web-skimmer-hides-within-exif-metadata-exfiltrates-credit-cards-via-image-files/

?

ÄúµÄÁªÏµ·½·¨

*ÐÕÃû
*µ¥Î»Ãû³Æ
*ÁªÏµ·½·¨
*ÑéÖ¤Âë AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
Ìá½»µ½ÓÊÏä

¹ºÖÃÈÈÏß

  • ¹ºÖÃ×Éѯ:

    400-818-6868-1

Ìá½»ÏîÄ¿ÐèÇó

½Ó´ý¼ÓÈëAG¹«Ë¾¿Æ¼¼ £¬³ÉΪÎÒÃǵÄÏàÖúͬ°é£¡
  • *ÇëÐÎòÄúµÄÐèÇó
  • *×îÖÕ¿Í»§Ãû³Æ
  • *ÏîÄ¿Ãû³Æ
  • Äú¸ÐÐËȤµÄ²úÆ·
  • ÏîĿԤËã
ÄúµÄÁªÏµ·½·¨
  • *ÐÕÃû
  • *ÁªÏµµç»°
  • *ÓÊÏä
  • *Ö°Îñ
  • *¹«Ë¾
  • *¶¼»á
  • *ÐÐÒµ
  • *ÑéÖ¤Âë AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
  • Ìá½»µ½ÓÊÏä
AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø
AG¹«Ë¾(Öйú¼¯ÍÅ)¡¤ÓÐÏÞ¹«Ë¾¹ÙÍø

·þÎñÖ§³Ö

ÖÇÄܿͷþ
ÖÇÄܿͷþ
¹ºÖÃ/ÊÛºóÊÖÒÕÎÊÌâ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
ÔÚÏßÌáµ¥|ÖÇÄÜÎÊ´ð|֪ʶ¿â
Ö§³ÖÈÈÏß
Ö§³ÖÈÈÏß
400-818-6868
AG¹«Ë¾¿Æ¼¼ÉçÇø
AG¹«Ë¾¿Æ¼¼ÉçÇø
×ÊÁÏÏÂÔØ|ÔÚÏßÎÊ´ð|ÊÖÒÕ½»Á÷
΢²©
΢²©

΢²©

΢ÐÅ
΢ÐÅ

΢ÐÅ

BÕ¾
BÕ¾

BÕ¾

¶¶Òô
¶¶Òô

¶¶Òô

ÊÓÆµºÅ
ÊÓÆµºÅ

ÊÓÆµºÅ

·þÎñÈÈÏß

400-818-6868

·þÎñʱ¼ä

7*24Сʱ

? 2026 NSFOCUS AG¹«Ë¾¿Æ¼¼ www.nsfocus.com All Rights Reserved . ¾©¹«Íø°²±¸ 11010802021605ºÅ ¾©ICP±¸14004349ºÅ ¾©ICPÖ¤110355ºÅ

ÍøÕ¾µØÍ¼