SambaÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á½¸ö¿Éµ¼ÖÂDoSµÄÎó²î£»£»£»£»£» £»£»¼ÓÄôó½ðÈÚ»ú¹¹Desjardinsй¶Լ290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢

Ðû²¼Ê±¼ä 2019-06-21
1.SambaÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á½¸ö¿Éµ¼ÖÂDoSµÄÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


SambaÍŶÓÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á½¸öÎó²î¡£¡£¡£µÚÒ»¸öÎó²î£¨CVE-2019-12435£©ÊÇÒ»¸ö¿ÕÖ¸Õë½âÒýÓÃÎÊÌ⣬£¬£¬£¬£¬£¬£¬Ó°ÏìSamba°æ±¾4.9ºÍ4.10£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉʹÓôËÎó²î¿Éµ¼ÖÂDNSÖÎÀíЧÀÍÆ÷·ºÆð¾Ü¾øÐ§ÀÍ¡£¡£¡£µÚ¶þ¸öÎó²î£¨CVE-2019-12436£©Ó°ÏìÁËv4.10×îÏȵÄËùÓÐSamba°æ±¾£¬£¬£¬£¬£¬£¬£¬¾­ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔÚ·ÖÒ³ËÑË÷¿Ø¼þÖÐͨ¹ý¿ÕÖ¸Õë½âÒýÓÃÀ´Íß½âLDAPЧÀÍÆ÷Àú³Ì¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/samba-releases-security-updates-to-address-two-vulnerabilities-0f9c2ad6

2.˼¿ÆÐÞ¸´SD-WAN¡¢RV·ÓÉÆ÷µÈ¶à¸ö²úÆ·ÖеÄÇå¾²Îó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


˼¿ÆÕë¶ÔSD-WAN¡¢Êý×ÖÍøÂç¼Ü¹¹£¨DNA£©ÖÐÐÄ¡¢TelePresence¡¢StarOS¡¢RV·ÓÉÆ÷¡¢Prime Service CatalogºÍMeeting ServerµÈ²úÆ·Ðû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î¡£¡£¡£ÑÏÖØµÄÎó²î°üÀ¨DNAÖÐÐÄÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2019-1848£¬£¬£¬£¬£¬£¬£¬CVSS 9.3·Ö£©¡¢SD-WANÏÂÁîÐнçÃæÖеÄÍâµØÌáȨÎó²î£¨CVE-2019-1625£¬£¬£¬£¬£¬£¬£¬CVSS 7.8·Ö£©ÒÔ¼°¶à¸öRV·ÓÉÆ÷ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-1663£¬£¬£¬£¬£¬£¬£¬CVSS 9.8·Ö£©µÈ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/critical-vulnerabilities-patched-cisco-sd-wan-dna-center-products

3.APT¼¶ºÚ³ÔºÚ£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹Turla APT¹¥»÷ÒÁÀÊAPT34

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ƾ֤ÈüÃÅÌú¿ËµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹Turla APTÔÚ2017ÄêÈëÇÖÁËÒÁÀÊAPT34µÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÆäC£¦CЧÀÍÆ÷ʹÓÃ×Ô¼ºµÄ¶ñÒâÈí¼þ¶þ´ÎѬȾAPT34µÄÊܺ¦Õß¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2018Äê1ÔÂ11ÈÕÊӲ쵽¸ÃÈëÇֻµÄÊ׸öÖ¤¾Ý£¬£¬£¬£¬£¬£¬£¬ÆäʱTurlaÏòAPT34µÄÊܺ¦ÕßÊÍ·ÅÁËÒ»¸ö¶ñÒ⹤¾ß£¨ÃûΪmsfgi.exeµÄʹÃüµ÷Àí³ÌÐò£©¡£¡£¡£TurlaÔÚ¸ÃÍøÂçÉϵĻһֱһÁ¬µ½2018Äê9Ô£¬£¬£¬£¬£¬£¬£¬µ«APT34ËÆºõûÓз¢Ã÷¸ÃÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Ã»ÓÐÖ¤¾ÝÅú×¢APT34×ö³öÁËÈκη´Ó¦¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russian-apt-hacked-iranian-apts-infrastructure-back-in-2017/

4.Õë¶ÔµÂ¹úµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ö÷Òª·Ö·¢Ô¶¿ØÄ¾ÂíRemcos

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Check PointÑо¿Ö°Ô±·¢Ã÷Ò»¸öÕë¶ÔµÂ¹úËùÓÐÐÐÒµµÄдó¹æÄ£ÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßµÄÄ¿µÄÊÇÔÚÊܺ¦ÕßµÄÅÌËã»úÉÏ×°ÖÃÔ¶¿ØÄ¾ÂíRemcos¡£¡£¡£¸Ã»î¶¯µÄ³õʼ¹¥»÷ÏòÁ¿ÊÇ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßαװ³ÉµÂ¹ú¸÷µØµÄÕýµ±¹«Ë¾£¬£¬£¬£¬£¬£¬£¬ÏòÄ¿µÄÆóÒµ·¢ËͰüÀ¨·¢Æ±»ò½ôÆÈ¶©µ¥µÄ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬×îÖÕ·Ö·¢Remcos¡£¡£¡£ÔÚÓëC&CµÄͨѶÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃDDNS£¨¶¯Ì¬DNS£©ÊÖÒÕÀ´Òþ²ØÆä×Ù¼£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2019/06/19/sandblast-agent-phishing-germany-campaign-security-hack-ransomware/

5.жñÒâÍÚ¿óÈí¼þ£¬£¬£¬£¬£¬£¬£¬Ìí¼ÓcronÍýÏëʹÃüʵÏÖ³¤ÆÚÐÔ»úÖÆ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


SucuriÇå¾²Ñо¿Ö°Ô±Luke Leal·¢Ã÷Ò»¸öеĶñÒâÍÚ¿óÈí¼þͨ¹ýÌí¼ÓcronÍýÏëʹÃüÀ´ÊµÏÖ³¤ÆÚÐÔ»úÖÆ£¬£¬£¬£¬£¬£¬£¬ÒÔ±ãÔÚ±»É¾³ýºóÖØÐÂѬȾĿµÄ»úе¡£¡£¡£¹¥»÷Õßͨ¹ýÃûΪcr2.shµÄ¶ñÒâBash½ÅÔ­À´Ñ¬È¾WebЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷»î¶¯µÄ³õʼѬȾÊÖ¶Îδ֪¡£¡£¡£cr2.sh»áɱËÀÓëÍÚ¿óÓйصÄÀú³Ì£¬£¬£¬£¬£¬£¬£¬ÀýÈçxmrigºÍcryptonight£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýC&CÏÂÔØÍÚ¿ópayload¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý½¨Éèÿ·ÖÖÓÔËÐÐÒ»´ÎµÄcron×÷ÒµÀ´»ñµÃ³¤ÆÚÐÔ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cryptominer-uses-cron-to-reinfect-linux-host-after-removal/

6.¼ÓÄôó½ðÈÚ»ú¹¹Desjardinsй¶Լ290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


DesjardinsÊDZ±ÃÀµØÇø×î´óµÄÐÅÓÃÉ磬£¬£¬£¬£¬£¬£¬Ò²ÊǼÓÄôó×î´óµÄÏàÖú½ðÈÚ¼¯ÍÅ¡£¡£¡£Æ¾Ö¤¸Ã¹«Ë¾µÄÐÂΟ壬£¬£¬£¬£¬£¬£¬Ô¼290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢ÔÚÔ±¹¤Î´¾­ÊÚȨÏò¹«Ë¾ÍⲿְԱÅû¶ºóй¶£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨270ÍòÃûСÎÒ˽¼Ò»áÔ±ºÍ17.3ÍòÆóÒµ»áÔ±¡£¡£¡£DesjardinsÓÚ2019Äê6ÔÂ14ÈÕ·¢Ã÷й¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Ð¡ÎÒ˽¼Ò»áÔ±µÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅÂë¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãÒÔ¼°ÒøÐкÍDesjardins²úÆ·µÄÏêϸÐÅÏ¢£»£»£»£»£» £»£»ÆóÒµ»áÔ±µÄ¹«Ë¾Ãû³Æ¡¢µØµã¡¢µç»°ºÅÂë¡¢ËùÓÐÕßÐÕÃûºÍAcc¨¨sDAffairesÕÊ»§Ãû³ÆÒÔ¼°ÓëAcc¨¨sDAffairesÕÊ»§Ïà¹ØµÄһЩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/desjardins-group-data-leak-exposes-info-of-29-million-members/