΢ÈíÐû²¼Îó²î²¹¶¡ÐÞ¸´111¸öÎó²î£»£»£»Thunderbolt±£´æÎó²îÓ°ÏìÊý°ÙÍò×°±¸

Ðû²¼Ê±¼ä 2020-05-13

1.΢ÈíÐû²¼Îó²î²¹¶¡£¬£¬£¬£¬£¬ÐÞ¸´12¿î²úÆ·ÖÐ111¸öÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


5ÔÂ12ÈÕ£¬£¬£¬£¬£¬Î¢ÈíÐû²¼ÁË5Ô·ÝÎó²î²¹¶¡£¬£¬£¬£¬£¬ÐÞ¸´ÁËEdge¡¢Windows¡¢Visual StudioÒÔ¼°.NET FrameworkϵÄ12¿î²úÆ·ÖеÄ111¸öÎó²î¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪMicrosoft SharePointÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1023¡¢CVE-2020-1024ºÍCVE-2020-1102£©¡¢Windows OSÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1067£©¡¢MSHTMLÒýÇæÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1064£©¡¢Microsoft Edge PDFÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-109£©ºÍJetÊý¾Ý¿âÒýÇæÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1051£¬£¬£¬£¬£¬CVE-2020-1174£¬£¬£¬£¬£¬CVE-2020-1175ºÍCVE-2020-1176£©¡£¡£¡£¡£¡£±¾ÔÂÐû²¼µÄÊÇ΢ÈíÀúÊ·ÉϵÚÈý´óµÄ²¹¶¡³ÌÐò£¬£¬£¬£¬£¬ÁíÍâÁ½´Î»®·ÖÊÇÔÚ2020Äê3ÔºÍ2020Äê4Ô£¬£¬£¬£¬£¬ÐÞ¸´ÁË115ºÍ113¸ö¹ýʧ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-may-2020-patch-tuesday-fixes-111-vulnerabilities/


2.Thunderbolt±£´æÎó²î£¬£¬£¬£¬£¬»ò½«Ó°ÏìÊý°ÙÍò×°±¸


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


°£Òò»ôοƼ¼´óѧµÄÑо¿ÍŶÓÔÚÓ¢ÌØ¶ûµÄThunderbolt¶Ë¿ÚÖз¢Ã÷ÁË7¸öÎó²î£¬£¬£¬£¬£¬²¢Ä£ÄâÁË9ÖÖ¹¥»÷³¡¾°£¬£¬£¬£¬£¬¾ßÓÐÎïÆÊÎö¼ûȨÏ޵Ĺ¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²î»á¼ûºÍ͵ȡÊý¾Ý¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬¹¥»÷Õß½öÐèÒªÎïÆÊÎö¼ûÆôÓÃÁËThunderboltµÄWindows»òLinuxϵͳ±ã¿ÉÒÔʵÏÖ¹¥»÷£¬£¬£¬£¬£¬²¢ÇÒ²»»áÁôÏ»ºÛ¼£Ò²²»ÐèÒªÓëÓû§½»»¥¡£¡£¡£¡£¡£×ÝÈ»Óû§ÔÚÍÑÀëʱÒѾ­Ëø¶¨»ò¹ÒÆðÅÌËã»ú£¬£¬£¬£¬£¬²¢ÇÒÆôÓÃÁËÇå¾²Æô¶¯ºÍͨÅ̼ÓÃÜ£¬£¬£¬£¬£¬¸Ã¹¥»÷ÒÀÈ»¿ÉÒÔʵÏÖ¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁË2019ÄêÖ®Ç°ÖÆÔìµÄÊý°ÙÍòWindowsºÍLinux×°±¸¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/endpoint/thunderbolt-vulnerabilities-could-threaten-millions-of-pcs/d/d-id/1337789


3.ATMÖÆÔìÉÌDiebold NixdorfѬȾÀÕË÷²¡¶¾£¬£¬£¬£¬£¬ÏµÍ³ÖÐÖ¹


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¶íÖÝATMÖÆÔìÉÌDiebold NixdorfÓÚ4ÔÂ25ÈÕÍíÉÏ·¢Ã÷Æä¹«Ë¾ÍøÂçÒì³££¬£¬£¬£¬£¬²¢ÏÓÒÉÊÇÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬Á¬Ã¦¶Ï¿ªÁ˸ÃÍøÂçÉϵÄϵͳÒÔ×èÖ¹¶ñÒâÈí¼þµÄÈö²¥¡£¡£¡£¡£¡£DieboldÌåÏָô˹¥»÷Ö»ÊÇÓ°ÏìÁËÍøÂçºÍITϵͳ£¬£¬£¬£¬£¬µ«²¢Î´Ó°Ïì¿Í»§»ò¹«ÖÚ¡£¡£¡£¡£¡£Æ¾Ö¤ÉîÈëÊӲ죬£¬£¬£¬£¬¸ÃÀÕË÷²¡¶¾ÎªProLock£¬£¬£¬£¬£¬ÔÚ3Ô·ÝҲѬȾÁËÒÁÀûŵÒÁÖÝÀ­Èø¶ûÏØµÄϵͳ¡£¡£¡£¡£¡£BleepingComputerµÄLawrence Abrams˵£¬£¬£¬£¬£¬ProLockÒªÇóµÄÊê½ðͨ³£ÔÚ6λÊý£¬£¬£¬£¬£¬´Ó17.5ÍòÃÀÔªµ½66ÍòÃÀÔª²»µÈ¡£¡£¡£¡£¡£¶øDieboldÌåÏÖËü²¢Ã»ÓÐÖ§¸¶Êê½ð£¬£¬£¬£¬£¬²¢ÇÒ²»»áÌÖÂÛÊê½ð½ð¶î¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://krebsonsecurity.com/2020/05/ransomware-hit-atm-giant-diebold-nixdorf/


4.ÃÀ¹ú¹«Ë¾Pitney BowesÔÙÔâÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬£¬ÎªMazeÌᳫ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹ú¹«Ë¾Pitney BowesÔÚ7¸öÔÂÄÚÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ΪMazeÍÅ»ïÌᳫ¡£¡£¡£¡£¡£MazeÍÅ»ïÔÚÍøÉÏÐû²¼ÁË11ÕŸù«Ë¾ÅÌËã»úÍøÂçÄÚ²¿Ä¿Â¼ÁбíµÄ½ØÍ¼£¬£¬£¬£¬£¬ÒÔ֤ʵËûÃǹ¥»÷Àֳɡ£¡£¡£¡£¡£Pitney Bowes½²»°ÈËÌåÏÖÏÖÔÚÕýÔÚÊÓ²ì´Ë´Î¹¥»÷µÄ¹æÄ££¬£¬£¬£¬£¬ÌØÊâÊDZ»µÁÊý¾ÝÀàÐÍ¡£¡£¡£¡£¡£2019Äê10ÔÂPitney BowesÊ×´ÎÔâµ½RyukÍÅ»ïÌᳫµÄÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬£¬¸ÃÊÂÎñµ¼ÖÂijЩ°ü¹ü¸ú×Ùϵͳͣ»£»£»ú¡£¡£¡£¡£¡£RyukºÍMazeÍŻﶼÊÇʹÓÃÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬µ«²î±ðµÄÊÇMazeÉÐÓÐÒ»¸öÍøÕ¾£¬£¬£¬£¬£¬²¢»áÔÚÊܺ¦Õ߾ܸ¶Êê½ðºóÔÚ¸ÃÍøÕ¾Ð¹Â¶Æä±»µÁÊý¾Ý¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/package-delivery-giant-pitney-bowes-confirms-second-ransomware-attack-in-7-months/


5.ºÚ¿ÍÂÛ̳WeLeakData.comÊý¾Ý¿â±»µÁ£¬£¬£¬£¬£¬ÂÛ̳ÐÅϢй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿ÍÂÛ̳WeLeakData.comµÄÊý¾Ý¿â±»µÁÇÒ±»·ÅÔÚ°µÍø³öÊÛ£¬£¬£¬£¬£¬Ê¹¸ÃÍøÕ¾ºÚ¿ÍµÄÐÅÏ¢ºÍ˽϶Ի°Ð¹Â¶¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂçÇ鱨¹«Ë¾CybleÐû²¼µÄ±¨¸æ£¬£¬£¬£¬£¬WeLeakData.comµÄvBulletinÂÛ̳Êý¾Ý¿âй¶ÊÇÔÚ2020Äê1ÔÂ9ÈÕ×îÏȵÄ£¬£¬£¬£¬£¬ÏÖÒÑÔÚ°µÍøÊг¡ÉϳöÊÛ¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Óû§µÇ¼Ãû¡¢µç×ÓÓʼþµØµã¡¢¹þÏ£ÃÜÂëÒÔ¼°ËûÃǵÄIPµØµãÒÔ¼°Ë½ÈËÐÂÎÅ¡£¡£¡£¡£¡£¹ØÓÚ¸ÃÍøÕ¾Óû§À´Ëµ´Ë´ÎÊÂÎñÖÁ¹ØÖ÷Òª£¬£¬£¬£¬£¬ÓÉÓÚÖ´·¨²¿·Ö¿ÉÒÔʹÓÃ×ß©µÄIPµØµãºÍµç×ÓÓʼþµØµãÀ´×·×ÙËûÃDz¢½«ÆäÓëÆäËû¹¥»÷Ïà¹ØÁª¡£¡£¡£¡£¡£´Ë´Îй¶»¹¿ÉÒÔÈÃÑо¿Ö°Ô±ÏàʶÔõÑù¾ÙÐй¥»÷¡£¡£¡£¡£¡£CybleÏÖÔÚÒѽ«Ð¹Â¶Êý¾ÝÌí¼Óµ½ÆäÊý¾Ýй¶²éÕÒЧÀÍamibreached.comÖУ¬£¬£¬£¬£¬ÒÔ±ãÓû§¿ÉÒÔ¼ì²éÆäÐÅÏ¢ÊÇ·ñ×ß©¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-private-chats-leaked-in-stolen-weleakdata-database/


6.ÒøÐÐľÂíSphinx»Ø¹éÉý¼¶£¬£¬£¬£¬£¬ÒÔCOVID-19ΪÖ÷ÌâÕë¶ÔÃÀ¹ú


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÒøÐÐľÂíSphinxÉý¼¶²¢»Ø¹é£¬£¬£¬£¬£¬Ê¹ÓÃCOVID-19À¬»øÓʼþ×÷ΪÓÕ¶üÕë¶ÔÃÀ¹úÓû§£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÆäÔÚÏßÒøÐлỰÖлñÈ¡Óû§Æ¾Ö¤ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£Ð°汾µÄSphinxµÄ¸Ä±äÖ÷ÒªÔÚ¶ñÒâ´úÂë×¢Èë·½·¨ºÍBotÉèÖÃÁ½·½Ãæ¡£¡£¡£¡£¡£Sphinxͨ¹ýŲÓÃä¯ÀÀÆ÷º¯ÊýÖ²Èë´úÂ룬£¬£¬£¬£¬Ê×ÏÈËüŲÓÃCreateProcessAº¯ÊýÀ´½¨ÉèÒ»¸öÐÂÀú³Ì¼°ÆäÖ÷Ị̈߳¬£¬£¬£¬£¬È»ºóŲÓÃWriteProcessMemoryº¯ÊýÒÔ½«ÓÐÓøºÔØ×¢Èëmsiexec.exeÀú³Ì£¬£¬£¬£¬£¬×îºóʹÓÃGetThreadContextºÍSetThreadContextº¯Êý½«Ä¿µÄÀú³ÌµÄÖ´Ðеã¸ü¸ÄΪ´Ó×¢ÈëµÄÓÐÓøºÔØ¡£¡£¡£¡£¡£¶øBotÉèÖÃÖиü¸ÄÁËC2µØµãºÍRC4ÃÜÔ¿£¬£¬£¬£¬£¬½ÓÄÉÖ¸ÎÆÊ¶±ðÒÔ±ãËæÊ±ÏòÆäÍÆË͸üС£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/sphinx-riddle-us-targets-modifications/155621/