Jiangxi special equipment safety regulations (Amendment) Legislative Research Forum held in Jiujiang

元月4日上午,江西省法制办副主任凌云、江西省质监局副局长黄富华一行来到九江市,就《江西省特种设备安全条例(修改)》进行立法调研。九江市委常委、副市长赵兵及九江市各相关行业主管部门、有关特种设备生产、经营、检验单位负责人参加了调研座谈会。

话题:印度经济型智能手机竞争愈发激烈 联想也去凑热闹

On 4 January morning, Jiangxi Province, deputy director of the Legislative Affairs Office Lingyun, Jiangxi Provincial Quality Supervision Bureau deputy director Huang Fuhua line to Jiujiang, on the Jiangxi special equipment Safety Ordinance (Amendment) legislative research. Jiujiang Municipal Committee, vice mayor of Jiujiang Zhao Bing and the relevant industry authorities and special equipment production, operation, inspection units attended the symposium.
会上,赵兵介绍了九江市特种设备基本情况和特种设备安全监管的经验和做法。各相关部门及特种设备生产、经营、检验单位负责人围绕各自职责踊跃发言,提出了具体的修改意见。调研组在认真听取了各有关单位的具体修改意见后指出,九江市就此次立法调研作了充足的准备,提出了许多好的建议和修改意见,调研组会认真进行整理归纳,逐条研究,对合理的意见和建议尽量采纳,力争制定出既有利于管理、又具有可操作性的地方法规,切实保护好人民群众的生命财产安全。

At the meeting, Zhao Bing introduced the basic situation of Jiujiang safety supervision of special equipment and special equipment, experience and practice. The relevant departments and special equipment production, operation, inspection units responsible for the people around their duty to speak, put forward specific amendments. The research group noted that after listening to the specific amendments to the relevant units of Jiujiang, made adequate preparations for the legislative research, put forward many good suggestions and comments, the research group will carefully summarize, one by one study, the reasonable opinions and suggestions will be adopted, and strive to make not only conducive to management and also has the local regulations of operation, and effectively protect people’s lives and property safety.
信息来自 江西省质量技术监督局
Jiangxi Provincial Bureau of quality and technical supervision
责任编辑 王仁刚
Editor in charge of Wang Rengang
该文章作者已设置需关注才可以留言
网络安全宣传动漫个人信息保护基础
The author of the article has set up the need to be able to leave a message

检测报警系统

坏家伙们在利用小网站中的虚假病毒弹窗进行诈骗,但是很多用户安全意识和技术水平太差,需要接受普世安全教育。
微信扫一扫关注该公众号
Sweep the concern of the public, WeChat

中国是发展中大国,虽然拥有全球最多的网民和全球最具潜力的互联网市场,但无论是在信息技术和互联网产业水平,还是在对网络空间的认识上都落后于美国。

猜您喜欢

Asia RV Checkpoint
移动金融服务中的信息安全问题实录
网络安全公益短片差旅无线网络安全
唐嫣自创“鸡窝头”简直就是2017最减龄发型!
SENSOR THEVIEWFROMTHECORNER
网络信息安全政策能给官员带来什么政绩

33,000 Databases Fall in MongoDB Massacre

更新终端计算设备的系统和应用软件已经成为一种基本的生存技能,而关注新使用的系统的安全更新问题也是很必要的安全觉悟。
Nearly 33,000 MongoDB databases have been hijacked as of today, the latest numbers associated with a series of attack campaigns that have been picking up pace over the past couple of weeks show.
What started as a seemingly isolated incident in December turned out to be a massacre targeting insecure, Internet exposed MongoDB databases worldwide. Now, multiple actors are attempting to cash in on organizations’ failure to properly secure their web-based databases.
Initially, a single hacker was observed hijacking MongoDB databases, stealing their content, and holding it for ransom. The actor was asking for a 0.2 Bitcoin ransom, and tens of organizations paid it within the first two weeks alone.
Soon after the initial round of attacks made it to the headlines at the beginning of the year, things escalated as more hackers decided to join the campaign. Currently, MongoDB databases are being attacked by nearly two dozen hackers, and the pace at which databases have been hacked has increased dramatically.
Within days, tens of thousands of MongoDB databases fell to the massacre, as the number rose from only 10,000 on Friday to nearly 33,000 as of this morning. According to a tweet from Cap Gemini’s Niall Merrigan, the system database names are no longer at the top of the stats, as the ransomed database name managed to climb to the leading position on Tuesday.
These attacks are easy to perform because the exposed databases can be discovered using online tools, and installations aren’t secured by default. In fact, while other databases require some form of credentials and are local installations, MongoDB databases are exposed to the Internet right from the start and require no credentials whatsoever.
Ethical hacker Victor Gevers, who was the first to discover the attack, told SecurityWeek that some companies in fact fail to secure their databases even after they’ve been hacked. “But do not underestimate how unwise some organizations respond when they find out their database was stolen. They remove the note and just restore the database, but leave the server still open,” he said.
Dubbed “MongoDB ransack,” the campaign is closely monitored by Merrigan and Gevers. The latter has been long searching for insecure databases to warn companies of the risk they pose. However, many of his responsible disclosures remained unanswered, with 138 of last year’s reports suffering such a fate.
More recently, attackers began looking to cash in on the hype surrounding the campaign, and one of them decided to sell the software used for hijacking the databases. The tool is called Kraken Mongodb ransomware, and its C# source code is offered for only $200 in Bitcoin.
One of the effects of this entire campaign is that the amount of data stored in MongoDB databases has decreased significantly over the past weeks. According to Morrigan, 114.5 Terabytes of data was lost in less than three days as a result of these attacks.
In fact, the security researchers monitoring the situation have already warned that most of the attackers are no longer holding the databases for ransom, but are simply deleting them and pretending they still have the data.
In some cases, the same database is hit multiple times, as the attackers are going for the same pool of targets, meaning that organizations could end up paying the ransom to the wrong attacker. Victims should not only refrain from paying the ransom, but should also ask for “proof-of-life” when contacting the attackers, to ensure their data still exists.

As long as an organization has the proper network monitoring tools in place, it is possible to tell whether the database has been copied or deleted, Gevers says. This, however, requires matching tracked outbound traffic with the number of simultaneous connections in the log file and the duration of these connections. This allows researchers to estimate how much data was exfiltrated.
There are over 50,000 publicly accessible MongoDB databases on the Internet at the moment, and it might not be too long before all of those that haven’t been properly secured are hijacked. According to Gevers, all of the insecure databases could be ransacked in a couple of weeks, maybe even faster.
As it turns out, one of the MongoDB databases hit in the ongoing ransack belongs to the Princeton University, yet it’s uncertain whether it would be able to recover the data or not. According to DataBreaches.net, which discovered the attack, the University hasn’t commented on the incident as of now, and there’s no info on what kind of information the affected database included.
互联网金融您不知道的肮胀交易
While he wouldn’t name any of the affected organizations that asked for help so far, Gevers did confirm once again that they are from various industries, including IP, healthcare, online gambling, financial services, trading, and travel/booking. Many online services were also hit in the attack, the researcher said.
In the meantime, organizations with MongoDB databases are advised to take the proper steps to secure their installations and ensure they don’t fall victim to this attack. Last week, MongoDB published a blog post providing details on how admins can secure the databases.
Related: Multiple Attackers Hijacking MongoDB Databases for Ransom
多家网站拒绝承认出售用户资料,个人用户对个人资料的外泄维权艰难,隐私保护需从源头抓起。

猜您喜欢

《经修正的 1974年国际海上人命安全公约 》等十二项修正案生效
SOC不只是监控和分析日志,MSS不是一日变成的
公共场所的信息安全意识保护信息资产
为了6岁孩子北京夫妻砸钱爆改30㎡胡同"监狱房"走红网络
EHOWSTUFF INSURANCE-OFFERS-UNSUBSCRIBE
国家安全委员会与信息安全

FBI网站被黑致数据泄露,Plone官方回应:我们的系统没有0day漏洞!

【新朋友】点击标题下面蓝字「皮鲁安全之家」关注
【老朋友】点击右上角,分享或收藏本页精彩内容
【公众号】搜索公众号:皮鲁安全之家,或者ID :piluwill
著名黑客CyberZeist最近入侵了FBI网站(FBI.gov),并将几个备份文件(acc_102016.bck,acc_112016.bck,old_acc16.bck等)公布在了Pastebin,数据内容包括姓名、SHA1加密密码、SHA1盐和电子邮件等。
CyberZeist这名黑客颇有名气,他曾是Anonymous的一员,2011年有过黑入FBI的经历。除此之外,巴克莱、特易购银行和MI5都曾是他手下的受害者。

入侵的具体时间是在2016年12月22日——CyberZeist利用Plone内容管理系统(CMS)的0-day漏洞侵入了FBI.gov。Plone的内容管理系统被认为是迄今为止最安全的CMS,很多高级部门使用这个CMS,其中就包括FBI。
CyberZeist解释说,他所利用的这个0-day不是他发现的,他只是想用FBI的网站测试一下这个漏洞,结果就成了。其他网站同样可能遭受相同的0-day攻击,比如说知识产权协调中心以及欧盟网络信息安全机构。
德国和俄罗斯的媒体相继报道了此次黑客入侵事件,而美国的许多主流媒体却刻意忽视了这件事。
FBI在得知了CyberZeist的入侵后,就立即指派安全专家展开修复工作,但是仍未修复Plone内容管理系统的0-day漏洞。CyberZeist发现了FBI的修复工作后,并发了一条具有嘲讽性质的的推特。
他对这条推特进行了补充:
我当然没有得到root权限(这明显嘛),但是我就是能知道他们在跑6.2版本的FreeBSD,这份数据最早可以追溯到2007年。他们最后的重启时间是2016年12月15日晚上6:32。
CyberZeist透露说:
这个0-day漏洞是他从tor网络上买到的,而卖家不敢侵入FBI.gov这种网站。现在已经停止出售,我会在推特上亲自放出这个0-day漏洞。
该漏洞目前仍存在于CMS的某些python模块中。
点击这里可以看到CyberZeist在Pastebin之上的动态。
后续更新Plone安全团队看到CyberZeist这样黑Plone的CMS系统,他们当然坐不住了。于是Plone发了一篇博客全盘否认了CyberZeist的“发现”。
“Plone的安全团队已经看到了CyberZeist的犯罪声明,并对此Plone进行了检测,事实证明‘FBI被黑’是一个骗局。无论是Plone还是在基于Plone的系统都不存在0-day漏洞。”
小编看到这篇博客的时候表情是这样的。哇,好足的底气。你这不光打了CyberZeist的脸,还留下一个懵逼的小编。让我们继续往下看。
Matthew Wilkes(Plone安全团队的成员)解释了为什么他们的团队认为‘FBI被黑’和‘Plone存在0-day漏洞’是骗局的原因。
原因一 ——版本不对Plone是用python语言写的且运行在Zone的上层。Zone是一个基于python的网页应用服务器。而在CyberZeist的推特中,他是这么写的“我当然没有得到root权限(这明显嘛),但是我就是能知道他们在跑6.2版本的FreeBSD”。你们造吗,FreeBSD 6.2只支持Python2.4和2.5版本,但是Plone并不能在这种老版本上跑。
原因二——哈希值、盐值不一致CyberZeist所泄露的数据的密码哈希值、盐值与Plone将生成的值不一致。这表明这些泄露的数据使在另一台服务器上批量生成的。值得一提的是,CyberZeist泄露的这些FBI邮箱在几年前就曾公之于众。(嘿嘿,就算FBI真的被黑了,也不是Plone的锅)
原因三——文件名称不符CyberZeist声称他在含有.bck扩展文件的网页服务器的中发现了备份文件里的登录信息。但是,Plone数据库备份系统不会生成含有.bck扩展名的文件,而且Plone生成的备份存储在web服务器目录之外。
Wilkes说:
“修改这种行为方式很难,而且对于他来说没有任何好处。”

被指性骚扰遭遇网络暴力后 星河创服COO选择辞职

原因四-截图有破绽CyberZeist在推特上上传的某些截图迫使FBI.gov暴露部分源代码。然而此类攻击通常是针对PHP应用程序的,对于没使用cgi-bin扩展类型的Python网站是不可能成功。
有一张截图显示的是邮件信息,这些信息很有可能是从FBI服务器的邮箱日志里提取的。
涉密网络通常与互联网进行了物理隔绝,针对涉密网络的攻击需要跳板,技术上得注意U盘,手机等移动设备接入涉密网络,更重要的是加强人员的安全意识教育。
“这很有可能是他自己的服务器日志,他虽然把这个服务器日志名称改得和FBI一样,但是却忘记把邮件显示的时区从印度标准时间到东部标准时间”
原因五-CyberZeist有“造假”前科没错,CyberZeist在这之前曾有“造假”记录。而伪造这次攻击的目的,可能是为了捞钱。FBI.gov作为一个使用Plone的知名网站,成功侵入它对于其他黑客来说具有很大的吸引力,很多黑客自然会到Tor网络上去买这个实际上不存在的0-day漏洞。要知道这个0-day的售价是8比特币,约9000美金。
在CyberZeist的“谣言”传出之前,Plone已经宣布了将在1月17日之前发布新的安全补丁,新的补丁与此次的0-day无关,旨在修复次要,低危的安全问题。
参看来源:http://securityaffairs.co/wordpress/55042/data-breach/fbi-hacked.html、http://www.networkworld.com/article/3155104/security/plone-dismisses-claim-that-flaw-in-its-cms-was-used-to-hack-fbi.html#tk.rss_all 来自Freebuf
之前的报道: FBI 网站被入侵,数据被公开后遭黑客嘲讽
近日,FBI 遭遇黑客打脸,不仅网站被黑,网站数据被直接公布在网上,而且入侵者还通过社交网络公开表达了自己略带嘲讽的“新年问候”。
据雷锋网了解,泄露出来的数据为网站的几个备份文件,目前已经被公布在Pastebin 网站上,其中包括FBI网站的用户名、电子邮件地址、经过SHA1算法加密后的密码以及加密用的盐值。
此次入侵者 CyberZeist 入侵的手法主要是利用了FBI 网站 所使用的 CMS 内容管理系统的一个零日漏洞,而这个名为 Plone 的系统被公认为有史以来最安全的CMS内容管理系统。
据悉,入侵者 CyberZeist 曾经是“匿名者”黑客组织 Anonymous 的一员,其本人在业界也可谓“臭名昭著”。2011年,他就曾经入侵过FBI的相关机构,除此之外,还黑过巴克莱、特易购银行以及 MI5(没错,就是 你在 特工007电影里看到的那个“军情五处”)
如何防范假冒WiFi热点
当雷锋网编辑尝试访问 CyberZeist 的推特时,他正在发起一个公开投票,让所有人来帮他确定下一个网络入侵的目标,里面有四个选项:政府组织、银行机构、军方、其他。
看到该页面,雷锋网编辑仿佛听到了 黑客 CyberZeist 内心的嘶吼:“还有谁!?”
然而,虽然 CyberZeist 是入侵者,但其入侵 FBI 时利用的零日漏洞并不是他自己发现的。CyberZeist 对外表示:
我并不是这个漏洞的发现者,只是拿着这个漏洞去FBI的网站试了一下,没想到居然成了!
CyberZeist 透露,该漏洞是他从匿名网络 Tor 上买来的,漏洞存在于 Plone 内容管理系统的某些 python 模块中,卖家并不敢利用该漏洞来入侵 FBI 的网站(但是他敢),目前已经停止出售。但 CyberZeist 表示自己之后会在推特上公布该漏洞。
FBI 在得知了 CyberZeist 的入侵消息后,立即指派安全专家展开修复工作,但目前 Plone 内容管理系统的 0-day 漏洞仍未被修复,对此 CyberZeist 还发布过一条具有嘲讽性质的的推特。
除此之外,CyberZeist 还对 FBI 在安全方面的疏忽表达了强烈不满,他表示,自己原本就是担心黑客利用该漏洞对FBI进行攻击,出于安全测试的目的才将在FBI网站上尝试,结果发现 FBI 的网站管理员犯下了一些低级错误,他们将大量备份文件直接暴露在同一台服务器上,最终导致CyberZeist 成功访问到这些文件。
此后,CyberZeist 又发布了一条消息,表示国际特赦组织的网站也收到此漏洞的影响,该消息得到了对方的证实。

银湖网接入“无忧存证” 全面升级数据安全

据雷锋网了解,只要该漏洞仍未被修复,所有使用该系统的网站都可能面临相同风险,其中包括欧盟网络信息与安全机构以及知识产权协调中心等等。
来自:雷锋网

国家互联网金融安全技术联盟在爱投资进行网络安全监测试点

回复
获得以下图文等信息
论坛
可进入微论坛畅谈
任意
官方机器人陪聊
首页
查看技术文档(逐步更新中)
留言
进入留言板
相册
国内外大牛真容
该文章作者已设置需关注才可以留言
微信扫一扫关注该公众号

搞信息化时,首先要问问:是内部开发、外部采购,还是使用开源系统?它们各有利弊,除了根据现状做出最佳选择外,在后期的工作中如何扬长补短也是认真需要考虑和实践的。

猜您喜欢

安全人,这八个危机意识帮你绷紧弦!
再谈信息安全意识推广计划
企业安全意识之歌
河北邢台一对夫妻在拆迁工地纵火被抓
PIENSOYJUEGO JKLASKQW
年度安全会议上的老问题与新战略