找回密码
 注册创意安天

每日安全简讯(20161210)

[复制链接]
发表于 2016-12-9 22:49 | 显示全部楼层 |阅读模式
发表于 2016-12-10 12:29 | 显示全部楼层
1、德国重工业巨头发现东南亚黑客窃密迹象
标题:ThyssenKrupp Hit by Hackers Eyeing Industrial Secrets

作者信息:December 08, 2016 By AFP

//BEGIN
German heavy industry giant ThyssenKrupp said Thursday it fell victim to a hacking attack in which the perpetrators sought to steal company secrets.
为德国和以色列海军建造潜艇的德国工业巨头ThyssenKrupp本周四声称遭受到了网络攻击,这些黑客成功盗取了该公司的部分零散技术资料和研究成果。该攻击是由其自身的IT部门发现并及时处置的。其高度机密的设施包括潜艇系统以及控制高温炉以及电站的系统未受到影响,黑客本次的攻击对象是一些工业设备的订单以及钢材组件的位于分布于欧洲的部门。目前还不能预计由于这次攻击是否能导致一些钢材等的遗失。

//END
Berlin has also ramped up its warning of a rise in cyber attacks orchestrated by Russia aimed at disrupting next year's general election.
Chancellor Angela Merkel said such assaults are now so common that Germany must learn to cope with them as part of daily life.
德国官方早些时候已经发出警告,声称俄罗斯黑客正蓄谋从网络上破坏其预定与明年举行的全国大选。总理默克尔更是说德国必须习惯于处理这种网络攻击事件,因为它们可能以后每天都会发生。

点评:大国的网络空间的较量正全面铺开。
回复

使用道具 举报

发表于 2016-12-10 12:31 | 显示全部楼层
2、黑客控制以色列新闻频道播放穆斯林宣礼
标题:Israeli TV broadcast hacked, attackers played Muslim call to prayer

作者信息:December 8, 2016  By Pierluigi Paganini

//BEGIN
On Tuesday night, a group of unknown hackers took control of the Israeli TV broadcast Channel 2 and played Muslim call to prayer.
本周二晚上,一家以色列的电视台被不明黑客攻击,黑客播放了召唤穆斯林朝拜的音乐。这其实事出有因:以色列当局为了避免穆斯林清真寺礼拜时发出的巨大“噪音”,最近通过了一项具有争议法案:限制朝拜的声音的音量。该法案上月由以色列议会表决通过。
法案的主要目的是限制“噪音污染”,在保护宗教自由的同时也不能影响正常人的日常生活,同时宗教活动不能传递极端和国粹思想以及一些煽动性言辞。当然这些说法都是针对穆斯林。
根据以色列媒体的推测:黑客攻击者很可能来自沙特。

//END
The bill has received the Israeli Prime Minister Benjamin Netanyahu’s support.
“I cannot count the times – they are simply too numerous – that citizens have turned to me from all parts of Israeli society, from all religions, with
complaints about the noise and suffering caused them by the excessive noise coming to them from the public address systems of houses of prayer,” Mr
Netanyahu told a cabinet meeting.
以色列总理内塔尼亚胡支持这项法案。他在议会上说:不知道有多少人来抱怨,这些朝拜声音简直太大了,影响到了社会各个阶层的生活,超出了一般人的忍受范围。

点评:不管是楼上的军事,还是本文的宗教,都与网络攻击相关!网络空间安全已经渗透到各个领域和方面。
回复

使用道具 举报

发表于 2016-12-10 12:33 | 显示全部楼层
3、安全厂商称外来的PS脚本是企业主要威胁
标题:PowerShell threats surge: 95.4 percent of analyzed scripts were malicious
Symantec analyzed 111 threat families that use PowerShell, finding that they leverage the framework to download payloads and traverse through networks.

作者信息: 08 Dec 2016 By Candid Wueest

//BEGIN
Malicious PowerShell scripts are on the rise, as attackers are using the framework’s flexibility to download their payloads, traverse through a compromised network, and carry out reconnaissance. Symantec analyzed PowerShell malware samples to find out how much of a danger they posed.
Of all of the PowerShell scripts analyzed through the BlueCoat Malware Analysis sandbox, 95.4 percent were malicious. This shows that externally sourced PowerShell scripts are a major threat to enterprises.
安全公司Symantec宣称通过其沙盒分析PowerShell脚本统计分析发现,恶意PowerShell脚本占95.4%。这个惊人的数字显示采用外包方式的PowerShell脚本正给企业安全造成严重的威胁。PowerShell脚本本来只是Windows下使用的,它非常灵活、多变,可是恶意代码却利用它来下载恶意组件、在被感染网络中进行横向移动并在感染的网络中寻找其有价值信息。

//END
However, out of the 111 analyzed threat families that use PowerShell, only eight percent used any obfuscation such as mixed-case letters. None of the
analyzed threats randomized the order of the command arguments. The most commonly used PowerShell command-line argument was “NoProfile” (34 percent), followed by “WindowStyle” (24 percent), and “ExecutionPolicy” (23 percent).
在111个被分析的PowerShell恶意脚本中,只有8%的采用一些大小写混淆技术;没有一个脚本采用将命令行随机分配的方式。三个最流行的命令行参数是NoProfile、WindowStyle和ExecutionPolicy,占比分别为34%,24%和23%。

//下载: increased-use-of-powershell-in-attacks-16-en.pdf (3.09 MB, 下载次数: 1097)
文件名:increased-use-of-powershell-in-attacks-16-en.pdf
文件大小:3,237,482 bytes
MD5     : A7A45D9DCDC738F5D4DDB6F7D105D49D

点评:PS的确正大行其道。
回复

使用道具 举报

发表于 2016-12-10 12:36 | 显示全部楼层
4、斯诺登文档显示NSA监视飞机上的GSM服务
标题:Thieving Magpie allows NSA spies to snoop on in-flight mobile calls

作者信息:December 8, 2016  By Pierluigi Paganini

//BEGIN
The Thieving Magpie programme allows the NSA and the GCHQ to intercept data from passengers traveling on board commercial aircrafts.
在飞机上打电话已经不是新闻了。
不过NSA和GCHQ以安全为由早已启动了一项名为Thieving Magpie(鹦鹉学舌)的计划,利用该计划可以窃听用户在飞机上的任何通话。这个计划是由最近斯诺登的披露的文档曝光的。目前世界上主要的航空公司已经推出这项GSM手机通话服务,该GSM移动通话系统由英国公司设计制造:乘客可以直接与飞机上的GSM服务器连接,而这台服务器会与由英国公司运营的卫星进行通讯,从而完成用户的通话过程。NSA监控的就是这个卫星与地面接收站之间的通信信息的。监控范围目标是全球所有的航行飞机,但是目前主要是航行于欧洲、中东以及非洲的飞机。 即使用户不通话,只要开机也能实现监听。而且监听几乎是实时的:只有10分钟的延迟。而监控计划的数据搜集也几乎是实时进行的,每2分钟会与飞机联络一次,进行数据传输。搜集的数据内容包括使用者的邮件地址、Facebook的ID、Skype地址、Twitter账户、Google Maps地图、BT以及VoIP等。

//END
According to Le Monde, the CIA was especially interested in Air France and Air Mexico flights, because they are potential targets for terrorists.
“We can read that, as from the end of 2003, ‘the CIA considered that Air France and Air Mexico flights were potential targets for terrorists’.” states
the article published by Le Monde “The legal department of the NSA stated at this point ‘there is absolutely no legal problem in targeting aircraft from
these two companies abroad’ and ‘they should be kept under strict surveillance from the point at which they enter American air space’.”
CIA对法航和墨航高度关注,因为这些航空公司很可能是恐怖主义的潜在目标。并称本监控项目没有任何法律问题,一旦进入美国领空,就需要严密监视。

点评:今日新闻特重磅!继重工业、宗教后,这里又是重要的航空业,网络战正以各种形式粉墨登场。
回复

使用道具 举报

发表于 2016-12-10 12:38 | 显示全部楼层
5、研究者发现雅虎邮件服务任意读邮件漏洞
标题:A flaw in the Yahoo Email service allowed hackers to access target’s emails

作者信息:December 8, 2016  By Pierluigi Paganini

//BEGIN
The Finnish security expert Jouko Pynnönen discovered a vulnerability in the Yahoo email service that allowed hackers to read anyone messages.
一个芬兰的安全公司的安全专家发现了Yahoo的邮件系统的一个漏洞,成功利用该漏洞,能让其读取任意账户的邮件信息。它所需要的只是接受邮件的人打开特定的含有漏洞的邮件即可,并不需要用户点击URL或者打开附件等操作。还是非常严重的。目前Yahoo应修补了该漏洞。

//END
This isn’t the first time that the expert reported a flaw to Yahoo, he discovered a similar vulnerability in the web version of the Yahoo! Mail service
earlier this year, when he was awarded a $10,000 bounty too.
这不是第一次Yahoo的邮件系统被发现漏洞,今年早些时候,还是这个专家在Yahoo的WEB邮件中也发现了一个严重漏洞。碰巧的是,这两个报告事件,该安全专家都获得了1万美金的奖励。

点评:Yahoo的邮件前些年使用极其广泛呀。
回复

使用道具 举报

发表于 2016-12-10 12:39 | 显示全部楼层
6、印度UAN网站发现严重漏洞,影响百万用户
标题:Employee’s Provident Fund organisation, India website found INSECURE

作者信息:December 8, 2016  By Pierluigi Paganini

//BEGIN
Security firm’ Eioneus Systems’ claims to have found a serious security flaw in Universal Account Number(UAN) website (India).
一个来自印度的安全公司发现了该国的国民的公积金网站系统存在严重安全漏洞,作为证据,该公司还安全地披露了部分账户信息。为了负责任的披露这些信息,该安全公司及时报告了该国CERT部门,并得到了及时的反馈。

//END
According to Eioneus systems , the issue came to their knowledge on 3rd Dec 2016 while browsing the website for usual UAN related features that website offers. The issue was reported immediately to CERT-IN (Computer emergency response team) and was acknowledged by CERT-IN in no time.
该安全公司声称,其是在上周六正常使用该网站的过程中发现该漏洞的。文章的最后还披露了安全公司与CERT机构的邮件通信记录。

点评:这个漏洞好像还没补好?
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册创意安天

本版积分规则

Archiver|手机版|小黑屋|创意安天 ( 京ICP备09068574,ICP证100468号。 )

GMT+8, 2026-5-2 16:10

Powered by Discuz! X3.5

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表