¿À´ÃÀÇ Å°¿öµå : µðµµ½º °ø°Ý ÁøÈ, Á¤º¸ º¸¾ÈÀÇ °øÁߺ¸°ÇÈ
[º¸¾È´º½º ¹®°¡¿ë] ¿ù¿äÀÏÀÇ Çìµå¶óÀÎ Å°¿öµå¸¦ µü Çϳª ²ÅÀÚ¸é ¡®ÁøÈ¡¯ÀÔ´Ï´Ù. µðµµ½ºµµ ÁøÈÇÏ°í µ¿¿µ»ó ÆÄÀÏÀ» ÀÌ¿ëÇÏ´Â ¼ö¹ýµµ ÁøÈÇÏ°í ¸Ö¹öŸÀÌ¡µµ ÁøÈÇÏ°í ÀÖ½À´Ï´Ù. ¾Æ¹«¸® °ø°ÝÀÚ°¡ ¼öºñÀÚ¿¡ ºñÇØ ´Ã ÇÑ ¹ß ¾Õ¼±â ¸¶·ÃÀ̶óÁö¸¸, Âü ºÎÁö·±È÷ Àßµµ º¯ÇÏ°í ÀÖ½À´Ï´Ù. ±×·¯´Ï ÀÌÁ¦ Á¤ºÎ°¡ ´ë´ëÀûÀ¸·Î ³ª¼¾ß ÇÑ´Ù´Â ¸ñ¼Ò¸®µµ ²÷ÀÓ¾øÀÌ ³ª¿À°í ÀÖÁÒ. Èï¹ÌÁøÁøÇÑ ¶§ÀÔ´Ï´Ù.
1. ¶ó¿ìÅÍ, À¥Ä·, ÇÁ¸°ÅÍ µî UPnP ±â±â ´ë´Ù¼ö µðµµ½º °ø°Ý¿¡ ³ëÃâ(Security Week)
http://www.securityweek.com/attackers-abuse-upnp-devices-ddos-attacks-akamai-warns
ÇÁ·Ñ·º½Ä º¸¾È ¹× ¿£Áö´Ï¾î¸µ ÆÀ(PLXert)¿¡¼´Â 4¹é¸¸ ´ë°¡ ³Ñ´Â UPnP ±â±â¿¡¼ µðµµ½º Ãë¾àÁ¡À» ã¾Æ³Â´Ù°í ÇÕ´Ï´Ù. ¹®Á¦´Â ÀÌ ±â±âÀÇ ¼ýÀÚ°¡ ¾Æ´Ï¶ó(»ç½Ç ¼¼°èÀûÀ¸·Î º¸¸é ±â±â 4¹é¸¸ ´ë´Â ¹Ì¹ÌÇÑ ¼ýÀÚÁÒ) µðµµ½º °ø°ÝÀÇ ¹üÀ§°¡ È®ÀåÇÏ°í ÀÖ´Ù´Â °ÍÀ̶ó°í Àü¹®°¡µéÀº ¸»ÇÕ´Ï´Ù. ½ÇÁ¦ ´ë´ÜÇÑ ÀÓÆÑÆ®°¡ ÀÖ´Â ´º½º¶ó±âº¸´Ù ¶Ç ´Ù¸¥ °æ°è°Å¸®°¡ »ý°å´Ù´Â »ó¡¼ºÀÖ´Â ±â»çÀÔ´Ï´Ù.
2. ¸Æ¾ÆÇÇ, ¡°Á¤ºÎ¿Í ´ëÁßÀÌ º¸¾ÈÀÇ ÁüÀ» °°ÀÌ Áû¾îÁ®¾ß¡±(Infosecurity Magazine)
http://www.infosecurity-magazine.com/news/mcafee-government-public-share/
ÀÌÁ¦ »çÀ̹ö º¸¾È ȤÀº Å×·¯¸¦ °øÁߺ¸°ÇÀÇ Â÷¿ø¿¡¼ ´Ù·ç¾î¾ß ÇÑ´Ù´Â ÁÖÀåÀÔ´Ï´Ù. ÀÇ·á°è ¹× °¢ º´¿øÀ» ÅëÇØ ¾àÀ» ¹è±ÞÇѴٰųª ÇÏ´Â Á¤ºÎÀÇ ¿ªÇÒ°ú ó¹æÀ» ÇØÁشٴ º´¿øÀ¸·Î °É¾î°¡¼ ÆÈÀ̳ª ¾ûµ¢À̸¦ °È¾îºÙÀÌ´Â °³°³ÀÎÀÇ ¹ß°ÉÀ½ÀÌ ´Ù ÀÖ¾î¾ß ÇÑ´Ù´Â ¼Ò¸®ÁÒ.
3. È£ÁÖ º¸¾ÈÁ¤º¸±¹, ¡°¼¿ÇÁ µµÃ»¡± ºñ¿ôÀ½(The Register)
http://www.theregister.co.uk/2014/10/17/australian_spookhaus_busted_for_warrantless_tap_of_own_phones/
È£ÁÖ º¸¾ÈÁ¤º¸±¹ÀÌ ½º½º·Î¸¦ µµÃ»Çß´Ù´Â »ç½ÇÀÌ ¹àÇôÁ® ¿ôÀ½À» »ç°í ÀÖ½À´Ï´Ù. È£ÁÖ ³» ¿©·¯ Áö¿ª¿¡ »ç¹«±¹À» µÎ°í Àִµ¥, ÇÏÇÊ µµÃ»À» Çصµ ÀÚ±â Áö¹æ »ç¹«±¹À» µµÃ»ÇÏ´Ù´Ï... ´öºÐ¿¡ µµÃ»Çß´Ù´Â »ç½ÇÀÌ µ¤¿©Áö°í ÀÖ´Â ¸ð¾çÀÔ´Ï´Ù. ¹°·Ð ÀϺη¯ ±×·± °Ç ¾Æ´Ï°í ȯ°æ¼³Á¤¿¡ ¹®Á¦°¡ ÀÖ¾ú´Ù°í´Â Çϴµ¥¿ä, ¾Æ¸¶ ±×·¸±â ¶§¹®¿¡ Å« ¿©·ÐÀÌ ÀÏ°í ÀÖÁö ¾Ê±âµµ ÇÏ°ÚÁö¿ä.
4. ¸Ö¹öŸÀÌ¡ °ø°Ý, Á¤±³ÇÏ°Ô ÁøÈ ÈÄ ¹Ì±¹ ±¹¹æ ³ë·Á(Dark Reading)
http://www.darkreading.com/attacks-breaches/sophisticated-malvertising-campaign-targets-us-defense-industry-/d/d-id/1316753?
¸Ö¹öŸÀÌ¡ÀÌ º¯ÈÇÏ°í ÀÖ´Ù´Â ¼Ò½ÄÀÔ´Ï´Ù. ÀÚ¼¼ÇÑ À̾߱â´Â º¸¾È´º½º Çìµå¶óÀο¡ ÀÌ¹Ì ¿Ã¶ó¿ÍÀÖÀ¸´Ï Âü°íÇϽñ⠹ٶø´Ï´Ù.
5. µ¿¿µ»ó ÆÄÀÏÀ» ÀÌ¿ëÇÑ ÇØÄ¿µéÀÇ Á¤º¸ »©³»±â(Dark Reading)
http://www.darkreading.com/attacks-breaches/in-plain-sight-how-cyber-criminals-exfiltrate-data-via-video-/a/d-id/1316725?
µ¿¿µ»ó °ü·Ã Ŭ¶ó¿ìµå ¼ºñ½º°¡ ¿äÁò ÇØÄ¿µé »çÀÌ¿¡¼ ¶°¿À¸£°í ÀÖ½À´Ï´Ù. µ¿¿µ»ó ÆÄÀÏÀÌ ´ëºÎºÐ ´ëÇüÀÌ°í, ´ëºÎºÐ Á¶Á÷¿¡¼ µ¿¿µ»ó ÄÜÅÙÃ÷¸¦ º¸À¯ÇÏ°í Àֱ⠶§¹®¿¡ ÈÉÃij»´Â Á¤º¸¸¦ µ¿¿µ»ó ÆÄÀÏ ¾ÈÀ¸·Î ¾ÐÃàÇؼ »©µ¹¸®°í ÀÖ´ä´Ï´Ù. ¿À´Ã ÀÚ¼¼ÇÑ ±â»ç¸¦ ³»º¸³»°Ú½À´Ï´Ù.
[±¹Á¦ºÎ ¹®°¡¿ë ±âÀÚ(globoan@boannews.com)]
<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(http://www.boannews.com/) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>