F5 BIG-IPÎó²îCVE-2020-5902Òѱ»Ê¹Ó㬣¬£¬£¬£¬£¬½¨Ò龡¿ìÉý¼¶£»£»£»£»£».NET Core¿âÖÐÎó²î¿É±»Ê¹ÓñܿªÉ±¶¾Èí¼þ¼ì²â

Ðû²¼Ê±¼ä 2020-07-06

1.F5 BIG-IPÎó²îCVE-2020-5902ÒÑÔ⵽ʹÓ㬣¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ìÉý¼¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


NCCµÄÇå¾²Ñо¿Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ºÚ¿ÍÒѾ­×îÏÈʹÓÃF5 BIG-IPÖеÄÎó²î£¨CVE-2020-5902£©Ìᳫ¹¥»÷£¬£¬£¬£¬£¬£¬Ö¼ÔÚ´Ó±»ÈëÇÖµÄ×°±¸ÖÐÇÔÈ¡ÖÎÀíÔ±ÃÜÂë¡£¡£¡£ÉÏÖÜÈý¸ÃÎó²î¹ûÕæºó£¬£¬£¬£¬£¬£¬ÍøÂçÇ徲ר¼ÒÁ¬Ã¦·¢³öÓйؽôÆÈÐÞ²¹´ËÎó²îµÄ¾¯±¨£¬£¬£¬£¬£¬£¬ÓÉÓÚÈκÎÀֳɵĹ¥»÷¶¼½«Ê¹¹¥»÷ÕßÍêÈ«»á¼ûÌìÏÂÉÏ×îÖ÷ÒªµÄITÍøÂç¡£¡£¡£Warren³Æ£¬£¬£¬£¬£¬£¬ÔÚÃÀ¹úÍøÂç˾ÁµÄÖÒÑÔÍÆÎÄÐû²¼¼¸Ð¡Ê±ºó£¬£¬£¬£¬£¬£¬ËûÔÚBIG-IPÃÛ¹ÞÖмì²âµ½À´×ÔÎå¸ö²î±ðIPµØµãµÄ¶ñÒâ¹¥»÷¡£¡£¡£ÔÚ¹²ÏíµÄÈÕÖ¾ÖУ¬£¬£¬£¬£¬£¬WarrenÖ¸³öÁËÕâЩ¹¥»÷µÄȪԴ£¬£¬£¬£¬£¬£¬²¢¿ÉÒÔÈ·ÈÏËüÃÇÊǶñÒâµÄ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-are-trying-to-steal-admin-passwords-from-f5-big-ip-devices/


2..NET Core¿âÖб£´æÎó²î£¬£¬£¬£¬£¬£¬¿É±»Ê¹ÓñܿªÉ±¶¾Èí¼þµÄ¼ì²â


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Context Information SecurityµÄPaulLa?n¨¦·¢Ã÷.NET Core¿âÖб£´æÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õ߱ܿªÉ±¶¾Èí¼þµÄ¼ì²âÀ´Ö´ÐжñÒâ´úÂë¡£¡£¡£¸ÃÎó²îÓ°ÏìÁË.NET Core µÄ×îÐÂÎȹ̰汾£¨3.1.x°æ±¾£©£¬£¬£¬£¬£¬£¬ÊÇÓÉMicrosoft .NET Core¿âÖеÄ·¾¶±éÀúÎó²îÒýÆðµÄ£¬£¬£¬£¬£¬£¬ÆäÔÊÐí¾ßÓеÍÌØÈ¨µÄÓû§¼ÓÔØ¶ñÒâÀ¬»ø½ÓÄÉDLL¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐèÒª¾ßÓÐÒ»¶¨µÄ»á¼ûȨÏ޲ŻªÉèÖÃÇéÐαäÁ¿À´Ê¹ÓôËÎó²î£¬£¬£¬£¬£¬£¬ÕâÒâζןÃÎó²îÐèÒªÓëÏÖÓÐÎó²îÁ¬ÏµÊ¹Óᣡ£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/net-core-vulnerability-lets-attackers-evade-malware-detection/


3.KELA·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁè¼Ý38ÍòÓ¢¹ú±¦Âí³µÖ÷ÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


°µÍøÍþвÇ鱨¹«Ë¾KELAÌåÏÖ£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯KelvinSecurity TeamÕýÔÚ°µÍøÉϳöÊÛÓ¢¹ú384319Ãû±¦Âí³µÖ÷µÄÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃûµÄÊ××ÖĸºÍÐÕÊÏ¡¢µç×ÓÓʼþ¡¢µØµã¡¢³µÁ¾±àºÅ¡¢¾­ÏúÉÌÃû³ÆÒÔ¼°ÆäËûÐÅÏ¢¡£¡£¡£ºÚ¿ÍÉù³ÆÕâЩÊý¾ÝÀ´×ÔÓÃÓÚÖÎÀí²î±ðÆû³µ¹©Ó¦É̿ͻ§µÄºô½ÐÖÐÐÄ£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨ÁË2016ÄêÖÁ2018ÄêµÄ½ü50Íò·Ý¿Í»§¼Í¼£¬£¬£¬£¬£¬£¬Ò²Ó°ÏìÁËÆäËûÆ·ÅÆµÄÓ¢¹ú³µÖ÷£¬£¬£¬£¬£¬£¬°üÀ¨Ã·ÈüµÂ˹¡¢Î÷ÑÅÌØ¡¢±¾ÌïºÍÏÖ´úµÈ¡£¡£¡£KELAÌåÏָúڿÍ×éÖ¯ÔÚ°µÍøÉϺÜÊÇ»£»£»£»£»îÔ¾£¬£¬£¬£¬£¬£¬½öÔÚ2020Äê6Ô¾ͳöÊÛÁË16¸öÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÓëÃÀ¹úÕþ¸®³Ð°üÉ̺ͶíÂÞ˹¾üÊÂÎäÆ÷¿ª·¢ÓйصÄÊý¾Ý¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.scmagazine.com/home/security-news/bmw-customer-database-for-sale-on-dark-web/?web_view=true


4.DuckDuckGoδ¾­Ô޳ɼ´¸ú×ÙÍøÂçÓû§ä¯ÀÀÊý¾Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


TwitterÉϵÄÒ»ÃûÆ·µÂºÚ¿ÍÌåÏÖ£¬£¬£¬£¬£¬£¬DuckDuckGoδ¾­Ô޳ɼ´¸ú×ÙÍøÂçÓû§ä¯ÀÀÊý¾Ý¡£¡£¡£¸ÃÎÊÌâʼÓÚËÑËØÒýÇæÔÚicons.duckduckgo.comµÄÒ»¸öЧÀÍÆ÷ÉÏ´æ´¢ÁËÍøÕ¾µÄͼ±ê¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬¼ÙÉèÓû§Ç¡ÇÉ»á¼ûÁ˸ÃÍøÕ¾£¬£¬£¬£¬£¬£¬DuckDuckGoµÄAndroidä¯ÀÀÆ÷»áÇëÇóÆäЧÀÍÆ÷½«Óû§µÄä¯ÀÀÊý¾Ý´«Ë͵½¸ÃЧÀÍÆ÷£¬£¬£¬£¬£¬£¬¶øÎÞÐèѯÎÊÓû§¡£¡£¡£ÕâÒâζ×ÅÓû§¿ÉÒÔ±»È·ÈÏÆä»á¼ûÁËij¸öÌØ¶¨ÍøÕ¾£¬£¬£¬£¬£¬£¬´Ó¶øÓ°ÏìÁËËûÃǵÄÄäÃûÐÔ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ DuckDuckGoÒѽâ¾ö´ËÎÊÌ⣬£¬£¬£¬£¬£¬ÏÖÔÚ¿ÉÒÔÖ±½Ó´ÓÍøÕ¾ÉÏ»ñȡͼ±ê¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/duckduckgo-collects-user-without-browsing-data/


5.ÐÂÀÕË÷Èí¼þTry2Cryͨ¹ýѬȾUSBÉÁ´æÇý¶¯Æ÷Èö²¥


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


G2 DATA¶ñÒâÈí¼þÆÊÎöʦKarsten Hahn·¢Ã÷ÁËÐÂÀÕË÷Èí¼þTry2Cry£¬£¬£¬£¬£¬£¬ÆäÕýÊÔͼͨ¹ýѬȾUSBÉÁ´æÇý¶¯Æ÷ÔÚWindowsÅÌËã»úÉÏÈö²¥¡£¡£¡£Try2CryÊÇ.NETÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬ÊÇHannÔÚÆÊÎöÁËDNGuard´úÂë±£»£»£»£»£»¤¹¤¾ß»ìÏýµÄÑù±¾ºó·¢Ã÷µÄ¿ªÔ´ÀÕË÷Èí¼þStupid¼Ò×åµÄÁíÒ»¸ö±äÖÖ¡£¡£¡£¸ÃÀÕË÷Èí¼þѬȾװ±¸ºó£¬£¬£¬£¬£¬£¬½«Ê¹ÓöԳÆÃÜÔ¿¼ÓÃÜËã·¨RijndaelºÍÓ²±àÂë¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬£¬¶Ô.doc¡¢.ppt¡¢.jpg¡¢.xls¡¢.pdf¡¢.docx¡¢.pptx¡¢.xlsºÍ.xlsxÎļþ¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬£¬²¢ÔÚËùÓмÓÃÜÎļþºó¸½¼Ó.Try2CryÀ©Õ¹Ãû¡£¡£¡£¸ÃÀÕË÷Èí¼þ»¹¾ßÓйÊÕϱ£»£»£»£»£»¤¹¦Ð§£¬£¬£¬£¬£¬£¬ÔÚÅÌËã»úÃû³ÆÎªDESKTOP-PQ6NSM4»òIK-PC2µÄϵͳÉÏÌø¹ý¼ÓÃܳÌÐò£¬£¬£¬£¬£¬£¬ÒÔ°ü¹Ü¿ª·¢ÕßÔÚ×Ô¼ºµÄ×°±¸ÉϲâÊÔÀÕË÷Èí¼þʱ²»»áÎÞÒâÖÐËø¶¨×Ô¼ºµÄÎļþ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/try2cry-ransomware-tries-to-worm-its-way-to-other-windows-systems/


6.SodinokibiѬȾ°ÍÎ÷µçÁ¦¹«Ë¾Light SA£¬£¬£¬£¬£¬£¬Ë÷Òª1400ÍòÃÀÔªÊê½ð


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÀÕË÷Èí¼þSodinokibiѬȾÁ˰ÍÎ÷µçÁ¦¹«Ë¾Light SA£¬£¬£¬£¬£¬£¬²¢Ë÷Òª1400ÍòÃÀÔªÊê½ð¡£¡£¡£AppGateµÄÑо¿Ö°Ô±ÆÊÎöÁ˶ñÒâÈí¼þµÄÑù±¾£¬£¬£¬£¬£¬£¬È·ÈϸÃÑùÔ­À´×ÔÒ»¸öÃûΪSodinokibi£¨ÓÖÃûREvil£©µÄ¼Ò×å¡£¡£¡£¸¶¿îÒ³ÃæÍйÜÔÚTorÍøÂçÉÏ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÒªÇóÊܺ¦ÕßÔÚ6ÔÂ19ÈÕ֮ǰ֧¸¶106870.19 XMR£¨Monero£©µÄÊê½ð£¬£¬£¬£¬£¬£¬ÏÞÆÚÒѵ½£¬£¬£¬£¬£¬£¬Êê½ð½ð¶î·­ÁËÒ»·¬(215882.8 XMR)£¬£¬£¬£¬£¬£¬Ô¼ÄªÎª1400ÍòÃÀÔª¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬Õû¸ö¹¥»÷¿´ÆðÀ´ºÜÊÇרҵ£¬£¬£¬£¬£¬£¬ÍøÒ³ÉõÖÁ°üÀ¨Ì¸ÌìÖ§³Ö£¬£¬£¬£¬£¬£¬Êܺ¦Õß¿ÉÒÔÖ±½ÓÓë¹¥»÷ÕßÅÊ̸¡£¡£¡£SodinokibiµÄÔË×÷ģʽÊÇRaaS£¬£¬£¬£¬£¬£¬¶ø¸ÃÐж¯±³ºóµÄ×éÖ¯ËÆºõÁ¥ÊôÓÚPinchy Spider¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/105477/cyber-crime/sodinokibi-ransomware-light-s-a.html