F5 BIG-IPÎó²îCVE-2020-5902Òѱ»Ê¹Ó㬣¬ £¬£¬½¨Ò龡¿ìÉý¼¶£»£»£».NET Core¿âÖÐÎó²î¿É±»Ê¹ÓñܿªÉ±¶¾Èí¼þ¼ì²â

Ðû²¼Ê±¼ä 2020-07-06

1.F5 BIG-IPÎó²îCVE-2020-5902ÒÑÔ⵽ʹÓ㬣¬ £¬£¬½¨ÒéÓû§¾¡¿ìÉý¼¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


NCCµÄÇå¾²Ñо¿Ô±·¢Ã÷£¬£¬ £¬£¬ºÚ¿ÍÒѾ­×îÏÈʹÓÃF5 BIG-IPÖеÄÎó²î£¨CVE-2020-5902£©Ìᳫ¹¥»÷£¬£¬ £¬£¬Ö¼ÔÚ´Ó±»ÈëÇÖµÄ×°±¸ÖÐÇÔÈ¡ÖÎÀíÔ±ÃÜÂë¡£¡£ ¡£¡£¡£ÉÏÖÜÈý¸ÃÎó²î¹ûÕæºó£¬£¬ £¬£¬ÍøÂçÇ徲ר¼ÒÁ¬Ã¦·¢³öÓйؽôÆÈÐÞ²¹´ËÎó²îµÄ¾¯±¨£¬£¬ £¬£¬ÓÉÓÚÈκÎÀֳɵĹ¥»÷¶¼½«Ê¹¹¥»÷ÕßÍêÈ«»á¼ûÌìÏÂÉÏ×îÖ÷ÒªµÄITÍøÂç¡£¡£ ¡£¡£¡£Warren³Æ£¬£¬ £¬£¬ÔÚÃÀ¹úÍøÂç˾ÁµÄÖÒÑÔÍÆÎÄÐû²¼¼¸Ð¡Ê±ºó£¬£¬ £¬£¬ËûÔÚBIG-IPÃÛ¹ÞÖмì²âµ½À´×ÔÎå¸ö²î±ðIPµØµãµÄ¶ñÒâ¹¥»÷¡£¡£ ¡£¡£¡£ÔÚ¹²ÏíµÄÈÕÖ¾ÖУ¬£¬ £¬£¬WarrenÖ¸³öÁËÕâЩ¹¥»÷µÄȪԴ£¬£¬ £¬£¬²¢¿ÉÒÔÈ·ÈÏËüÃÇÊǶñÒâµÄ¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-are-trying-to-steal-admin-passwords-from-f5-big-ip-devices/


2..NET Core¿âÖб£´æÎó²î£¬£¬ £¬£¬¿É±»Ê¹ÓñܿªÉ±¶¾Èí¼þµÄ¼ì²â


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Context Information SecurityµÄPaulLa?n¨¦·¢Ã÷.NET Core¿âÖб£´æÎó²î£¬£¬ £¬£¬ÔÊÐí¹¥»÷Õ߱ܿªÉ±¶¾Èí¼þµÄ¼ì²âÀ´Ö´ÐжñÒâ´úÂë¡£¡£ ¡£¡£¡£¸ÃÎó²îÓ°ÏìÁË.NET Core µÄ×îÐÂÎȹ̰汾£¨3.1.x°æ±¾£©£¬£¬ £¬£¬ÊÇÓÉMicrosoft .NET Core¿âÖеÄ·¾¶±éÀúÎó²îÒýÆðµÄ£¬£¬ £¬£¬ÆäÔÊÐí¾ßÓеÍÌØÈ¨µÄÓû§¼ÓÔØ¶ñÒâÀ¬»ø½ÓÄÉDLL¡£¡£ ¡£¡£¡£¿ÉÊÇ£¬£¬ £¬£¬¹¥»÷ÕßÐèÒª¾ßÓÐÒ»¶¨µÄ»á¼ûȨÏ޲ŻªÉèÖÃÇéÐαäÁ¿À´Ê¹ÓôËÎó²î£¬£¬ £¬£¬ÕâÒâζןÃÎó²îÐèÒªÓëÏÖÓÐÎó²îÁ¬ÏµÊ¹Óᣡ£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/net-core-vulnerability-lets-attackers-evade-malware-detection/


3.KELA·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁè¼Ý38ÍòÓ¢¹ú±¦Âí³µÖ÷ÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


°µÍøÍþвÇ鱨¹«Ë¾KELAÌåÏÖ£¬£¬ £¬£¬ºÚ¿Í×éÖ¯KelvinSecurity TeamÕýÔÚ°µÍøÉϳöÊÛÓ¢¹ú384319Ãû±¦Âí³µÖ÷µÄÊý¾Ý£¬£¬ £¬£¬°üÀ¨ÐÕÃûµÄÊ××ÖĸºÍÐÕÊÏ¡¢µç×ÓÓʼþ¡¢µØµã¡¢³µÁ¾±àºÅ¡¢¾­ÏúÉÌÃû³ÆÒÔ¼°ÆäËûÐÅÏ¢¡£¡£ ¡£¡£¡£ºÚ¿ÍÉù³ÆÕâЩÊý¾ÝÀ´×ÔÓÃÓÚÖÎÀí²î±ðÆû³µ¹©Ó¦É̿ͻ§µÄºô½ÐÖÐÐÄ£¬£¬ £¬£¬¸ÃÊý¾Ý¿â°üÀ¨ÁË2016ÄêÖÁ2018ÄêµÄ½ü50Íò·Ý¿Í»§¼Í¼£¬£¬ £¬£¬Ò²Ó°ÏìÁËÆäËûÆ·ÅÆµÄÓ¢¹ú³µÖ÷£¬£¬ £¬£¬°üÀ¨Ã·ÈüµÂ˹¡¢Î÷ÑÅÌØ¡¢±¾ÌïºÍÏÖ´úµÈ¡£¡£ ¡£¡£¡£KELAÌåÏָúڿÍ×éÖ¯ÔÚ°µÍøÉϷdz£»£»£»îÔ¾£¬£¬ £¬£¬½öÔÚ2020Äê6Ô¾ͳöÊÛÁË16¸öÊý¾Ý¿â£¬£¬ £¬£¬ÆäÖаüÀ¨ÓëÃÀ¹úÕþ¸®³Ð°üÉ̺ͶíÂÞ˹¾üÊÂÎäÆ÷¿ª·¢ÓйصÄÊý¾Ý¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.scmagazine.com/home/security-news/bmw-customer-database-for-sale-on-dark-web/?web_view=true


4.DuckDuckGoδ¾­Ô޳ɼ´¸ú×ÙÍøÂçÓû§ä¯ÀÀÊý¾Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


TwitterÉϵÄÒ»ÃûÆ·µÂºÚ¿ÍÌåÏÖ£¬£¬ £¬£¬DuckDuckGoδ¾­Ô޳ɼ´¸ú×ÙÍøÂçÓû§ä¯ÀÀÊý¾Ý¡£¡£ ¡£¡£¡£¸ÃÎÊÌâʼÓÚËÑËØÒýÇæÔÚicons.duckduckgo.comµÄÒ»¸öЧÀÍÆ÷ÉÏ´æ´¢ÁËÍøÕ¾µÄͼ±ê¡£¡£ ¡£¡£¡£Òò´Ë£¬£¬ £¬£¬¼ÙÉèÓû§Ç¡ÇÉ»á¼ûÁ˸ÃÍøÕ¾£¬£¬ £¬£¬DuckDuckGoµÄAndroidä¯ÀÀÆ÷»áÇëÇóÆäЧÀÍÆ÷½«Óû§µÄä¯ÀÀÊý¾Ý´«Ë͵½¸ÃЧÀÍÆ÷£¬£¬ £¬£¬¶øÎÞÐèѯÎÊÓû§¡£¡£ ¡£¡£¡£ÕâÒâζ×ÅÓû§¿ÉÒÔ±»È·ÈÏÆä»á¼ûÁËij¸öÌØ¶¨ÍøÕ¾£¬£¬ £¬£¬´Ó¶øÓ°ÏìÁËËûÃǵÄÄäÃûÐÔ¡£¡£ ¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬ DuckDuckGoÒѽâ¾ö´ËÎÊÌ⣬£¬ £¬£¬ÏÖÔÚ¿ÉÒÔÖ±½Ó´ÓÍøÕ¾ÉÏ»ñȡͼ±ê¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/duckduckgo-collects-user-without-browsing-data/


5.ÐÂÀÕË÷Èí¼þTry2Cryͨ¹ýѬȾUSBÉÁ´æÇý¶¯Æ÷Èö²¥


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


G2 DATA¶ñÒâÈí¼þÆÊÎöʦKarsten Hahn·¢Ã÷ÁËÐÂÀÕË÷Èí¼þTry2Cry£¬£¬ £¬£¬ÆäÕýÊÔͼͨ¹ýѬȾUSBÉÁ´æÇý¶¯Æ÷ÔÚWindowsÅÌËã»úÉÏÈö²¥¡£¡£ ¡£¡£¡£Try2CryÊÇ.NETÀÕË÷Èí¼þ£¬£¬ £¬£¬ÊÇHannÔÚÆÊÎöÁËDNGuard´úÂë±£»£»£»¤¹¤¾ß»ìÏýµÄÑù±¾ºó·¢Ã÷µÄ¿ªÔ´ÀÕË÷Èí¼þStupid¼Ò×åµÄÁíÒ»¸ö±äÖÖ¡£¡£ ¡£¡£¡£¸ÃÀÕË÷Èí¼þѬȾװ±¸ºó£¬£¬ £¬£¬½«Ê¹ÓöԳÆÃÜÔ¿¼ÓÃÜËã·¨RijndaelºÍÓ²±àÂë¼ÓÃÜÃÜÔ¿£¬£¬ £¬£¬¶Ô.doc¡¢.ppt¡¢.jpg¡¢.xls¡¢.pdf¡¢.docx¡¢.pptx¡¢.xlsºÍ.xlsxÎļþ¾ÙÐмÓÃÜ£¬£¬ £¬£¬²¢ÔÚËùÓмÓÃÜÎļþºó¸½¼Ó.Try2CryÀ©Õ¹Ãû¡£¡£ ¡£¡£¡£¸ÃÀÕË÷Èí¼þ»¹¾ßÓйÊÕϱ£»£»£»¤¹¦Ð§£¬£¬ £¬£¬ÔÚÅÌËã»úÃû³ÆÎªDESKTOP-PQ6NSM4»òIK-PC2µÄϵͳÉÏÌø¹ý¼ÓÃܳÌÐò£¬£¬ £¬£¬ÒÔ°ü¹Ü¿ª·¢ÕßÔÚ×Ô¼ºµÄ×°±¸ÉϲâÊÔÀÕË÷Èí¼þʱ²»»áÎÞÒâÖÐËø¶¨×Ô¼ºµÄÎļþ¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/try2cry-ransomware-tries-to-worm-its-way-to-other-windows-systems/


6.SodinokibiѬȾ°ÍÎ÷µçÁ¦¹«Ë¾Light SA£¬£¬ £¬£¬Ë÷Òª1400ÍòÃÀÔªÊê½ð


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÀÕË÷Èí¼þSodinokibiѬȾÁ˰ÍÎ÷µçÁ¦¹«Ë¾Light SA£¬£¬ £¬£¬²¢Ë÷Òª1400ÍòÃÀÔªÊê½ð¡£¡£ ¡£¡£¡£AppGateµÄÑо¿Ö°Ô±ÆÊÎöÁ˶ñÒâÈí¼þµÄÑù±¾£¬£¬ £¬£¬È·ÈϸÃÑùÔ­À´×ÔÒ»¸öÃûΪSodinokibi£¨ÓÖÃûREvil£©µÄ¼Ò×å¡£¡£ ¡£¡£¡£¸¶¿îÒ³ÃæÍйÜÔÚTorÍøÂçÉÏ£¬£¬ £¬£¬ºÚ¿ÍÒªÇóÊܺ¦ÕßÔÚ6ÔÂ19ÈÕ֮ǰ֧¸¶106870.19 XMR£¨Monero£©µÄÊê½ð£¬£¬ £¬£¬ÏÞÆÚÒѵ½£¬£¬ £¬£¬Êê½ð½ð¶î·­ÁËÒ»·¬(215882.8 XMR)£¬£¬ £¬£¬Ô¼ÄªÎª1400ÍòÃÀÔª¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬ £¬£¬Õû¸ö¹¥»÷¿´ÆðÀ´ºÜÊÇרҵ£¬£¬ £¬£¬ÍøÒ³ÉõÖÁ°üÀ¨Ì¸ÌìÖ§³Ö£¬£¬ £¬£¬Êܺ¦Õß¿ÉÒÔÖ±½ÓÓë¹¥»÷ÕßÅÊ̸¡£¡£ ¡£¡£¡£SodinokibiµÄÔË×÷ģʽÊÇRaaS£¬£¬ £¬£¬¶ø¸ÃÐж¯±³ºóµÄ×éÖ¯ËÆºõÁ¥ÊôÓÚPinchy Spider¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/105477/cyber-crime/sodinokibi-ransomware-light-s-a.html