Workflow
An Heng Xin Xi
icon
Search documents
2025年1月网络安全行业月报-20250319
An Heng Xin Xi· 2025-02-20 01:06
Investment Rating - The report does not explicitly provide an investment rating for the industry Core Insights - The report highlights the active APT organizations such as Lazarus, APT28, Andariel, Donot, OceanLotus, and Sticky Werewolf, with Lazarus being the most frequently recorded [7] - A total of 196,120 organizations/individuals' websites were found to have dark chain implants, with new dark chain data of 21,407 sites detected this month [13][20] - The report indicates that the majority of ransomware attacks targeted government, information technology, services, electronics, and financial sectors [10][20] - Vulnerability data shows that the most common types of vulnerabilities include cross-site scripting (XSS), cross-site request forgery (CSRF), and unauthorized access [16][21] - The black and gray industry data indicates that service provision accounts for 82% of new black market websites, while pornographic content accounts for 9% [22] Summary by Sections APT Threat Intelligence - The report provides a comprehensive overview of APT threat intelligence, analyzing advanced threat attacks and cybercriminal activities throughout 2024 [6] - Active APT organizations and their targeted sectors are discussed, emphasizing the need for vigilance and enhanced cybersecurity measures [6][7] Ransomware Threat Intelligence - Ransomware incidents are reported across various sectors, with a focus on the impact on government and technology industries [10][20] Dark Chain Intelligence - The report details the prevalence of dark chain implants across numerous websites, highlighting the significant increase in newly detected cases [13][20] Vulnerability Intelligence - A thorough analysis of vulnerability data from 2024 is presented, identifying key trends and potential risk points in network security [15][16] Black and Gray Industry Intelligence - The report monitors various forms of cybercrime, with a significant focus on phishing, fraud, and gambling activities [18][22]
2025年1月网络安全月报
An Heng Xin Xi· 2025-02-19 11:15
Investment Rating - The report does not explicitly provide an investment rating for the industry Core Insights - The report highlights the active APT organizations such as Lazarus, APT28, Andariel, Donot, OceanLotus, and Sticky Werewolf, with Lazarus being the most frequently recorded [7] - A total of 196,120 organizations/individuals' websites were found to have dark chain implants, with new detections of 21,407 previously undetected dark chains [13] - The report indicates that the majority of ransomware attacks targeted government, information technology, services, electronics, and financial sectors [10] - Vulnerability data shows that the most common types of vulnerabilities include Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and unauthorized access [16][21] - The black and gray industry data indicates that service provision accounts for 82% of new black market websites, while pornographic content accounts for 9% [22] Summary by Sections APT Threat Intelligence - The report provides a comprehensive overview of APT threat intelligence, analyzing advanced threat attacks and cybercriminal activities throughout 2024 [6] - Active APT organizations and their targeted sectors are discussed, emphasizing the need for vigilance and enhanced cybersecurity measures [6][20] Ransomware Threat Intelligence - Ransomware attacks are reported to have affected various industries, with a focus on government and technology sectors [10] - The report includes insights into active ransomware groups and their operational dynamics [12] Dark Chain Intelligence - The analysis reveals significant dark chain implant activity across various organizations, highlighting the vulnerability of both enterprises and individuals [13] Vulnerability Intelligence - A detailed analysis of vulnerabilities from 2024 is presented, identifying key trends and potential risk points [15] - The report emphasizes the importance of addressing common vulnerabilities to enhance cybersecurity [21] Black and Gray Industry Intelligence - The report monitors various forms of cybercrime, with a focus on phishing, fraud, and gambling activities [18] - The distribution of black market activities is analyzed, revealing the prevalence of service-related crimes [22]
2024年度漏洞态势分析报告
An Heng Xin Xi· 2025-02-18 01:50
Investment Rating - The report does not explicitly provide an investment rating for the industry Core Insights - The 2024 Vulnerability Situation Analysis Report aims to comprehensively review and summarize the vulnerability data of the year, analyzing and revealing the development trends, key characteristics, and potential risk points of network vulnerabilities [8] - The report highlights a significant increase in the number of disclosed vulnerabilities, with a total of 21,831 vulnerabilities reported from January 1, 2024, to December 17, 2024, representing a year-on-year growth of 22.08% compared to 2023 [9][10] - The report emphasizes the need for enhanced vulnerability monitoring, protection system construction, and increased security awareness to build a solid cybersecurity defense [8] Summary by Sections 1. Vulnerability Data Statistics and Analysis - The report indicates that the number of vulnerabilities disclosed in the NVD has shown a significant upward trend over the past decade, with a growth rate exceeding 30% annually since 2020 [9] - Vulnerability distribution by severity shows that low-risk vulnerabilities increased by 0.18%, medium-risk vulnerabilities by 40.01%, high-risk vulnerabilities by 20.28%, and critical vulnerabilities by 41.89% in 2024 compared to 2023 [10] - The primary cause of vulnerabilities is design errors, accounting for approximately 60% of the total, followed by input validation errors (20%) and boundary condition errors (10%) [12][17] 2. CWE Rankings Interpretation - The CWE Top 25 list identifies the most common software vulnerabilities, with notable increases in code injection and sensitive information leakage vulnerabilities [39][42] - The report highlights that the vulnerabilities with the most significant ranking changes include code injection (CWE-94) and sensitive information leakage (CWE-200), which have become more prominent issues in 2024 [42][46] 3. Vulnerability Warning Review - The report states that a total of 39,226 vulnerabilities were monitored in 2024, with 2,484 classified as high-risk, leading to the issuance of 103 high-risk vulnerability alerts [51] - The analysis of vulnerability types indicates that remote code execution and command injection vulnerabilities are prevalent, with 57% of alerts related to these types [66] 4. High-Risk Vulnerabilities During Attack and Defense Drills - The report emphasizes the importance of monitoring high-risk vulnerabilities during attack and defense drills, providing data support for security protection measures [70]