Sophos·¢Ã÷LockBitʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßʶ±ð¿ÉÒÉÄ¿µÄ£»£»£»DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡Õþ¸®Êý¾Ý

Ðû²¼Ê±¼ä 2020-10-23

1.Sophos·¢Ã÷LockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿µÄ


1.jpg


SophosÐû²¼±¨¸æ£¬£¬£¬³ÆLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿µÄ¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±Í¨Ì«¹ýÎöÒ»Äêǰ·ºÆðµÄÑù±¾£¬£¬£¬·¢Ã÷LockBitÒѾ­Ñ¸ËÙ³ÉÊ죬£¬£¬²¢½ÓÄÉÁËһЩеÄÒªÁìÀ´ÈƹýWindowsÓû§ÕÊ»§¿ØÖÆ£¨UAC£©À´ÌáÉýÌØÈ¨¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬LockBit¿ÉʹÓÃPowerShellºÍWindowsµÄVBscriptÖ÷»úµÄÖØÃüÃû¸±±¾ÒÔ¼°»ùÓÚPowerShellÉøÍ¸²âÊÔ¹¤¾ßµÄ¾ç±¾£¬£¬£¬À´ËÑË÷°üÀ¨ÓмÛÖµÊý¾ÝµÄϵͳ£¬£¬£¬ÒÔ¹¥»÷СÐÍ×éÖ¯¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://news.sophos.com/en-us/2020/10/21/lockbit-attackers-uses-automated-attack-tools-to-identify-tasty-targets/


2.ÃÀ¹ú³ÆÒÁÀʺڿÍð³äProud BoysÏòÑ¡Ãñ·¢ËÍÏÅ»£Óʼþ


2.jpg


ÃÀ¹úÕþ¸®³ÆÒÁÀʺڿÍð³ä¼«ÓÒÒí×éÖ¯Proud Boys£¬£¬£¬¸øÃñÖ÷µ³Ñ¡Ãñ·¢ËÍÏÅ»£Óʼþ¡£¡£ ¡£¡£¡£ÕâЩµç×ÓÓʼþÒÔ¡°Í¶Æ±¸øÌØÀÊÆÕ»òÆäËûÈË¡±ÎªÖ÷Ì⣬£¬£¬²¢ÖÒÑÔÃñÖ÷µ³Ñ¡Ãñ±ØÐ轫Õþµ³¸ÄΪ¹²ºÍµ³²¢Í¶Æ±¸øÌØÀÊÆÕ×Üͳ£¬£¬£¬²»È»Proud Boys½«²»»á·Å¹ýËûÃÇ¡£¡£ ¡£¡£¡£ÓʼþÖеÄÊÕ¼þÈËÐÕÃûºÍµØµãÌåÏÖÕâЩÐÅÏ¢ÊǺڿÍͨ¹ý¹¥»÷Ñ¡Ãñ×¢²áÍøÕ¾»ñµÃµÄ¡£¡£ ¡£¡£¡£¶øÃÀ¹úÕþ¸®³ÆÒÁÀʺͶíÂÞ˹ÒѾ­»ñµÃÁËÑ¡Ãñ¹ÒºÅÐÅÏ¢£¬£¬£¬²¢ÇÒÒÁÀÊÕýÔÚʹÓøÃÐÅÏ¢·¢ËÍÕâЩÍþвÓʼþ¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/government/us-govt-iran-behind-fake-proud-boys-voter-intimidation-emails/


3.ºÚ¿Íð³äÓ¢¹úM£¦SµÄCEOÆ­È¡Óû§ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢


3.jpg


ºÚ¿Íð³äÓ¢¹ú´óÐÍ¿ç¹úÁãÊÛÉÌMarks£¦SpencerµÄCEOÆ­È¡Óû§ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢¡£¡£ ¡£¡£¡£ºÚ¿ÍÊ×ÏÈÔÚÍøÉÏÐû²¼Ú²Æ­ÐÔ¹ã¸æ£¬£¬£¬²¢Ðû´«Êܺ¦Õßͨ¹ýÐéÄâ³é½±½«ÓÐʱ»ú»ñµÃÀñÎïȯ¡£¡£ ¡£¡£¡£µ±Êܺ¦Õßµã»÷¹ã¸æÖеÄÁ´½Óʱ£¬£¬£¬»á±»Öض¨Ïòµ½M£¦SµÄÃÅ»§ÍøÕ¾£¬£¬£¬²¢ÒªÇóÌṩÆäÐÕÃû¡¢µØµã¡¢ÊÖ»úºÅÂëÒÔ¼°ÒøÐÐÏêϸÐÅÏ¢£¬£¬£¬°üÀ¨SORT´úÂëºÍÕʺŵÈ¡£¡£ ¡£¡£¡£Ò»µ©Óû§ÊäÈëÐÅÏ¢ºó£¬£¬£¬ÆäÐÅÏ¢±ã»á±»ºÚ¿ÍÇÔÈ¡¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/ms-boss-spoofed-in-gift-voucher/


4.DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡ÃÀ¹úÕþ¸®Êý¾Ý


4.jpg


ÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©ÍøÂçÇå¾²¡¢»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ºÍÁª°îÊÓ²ì¾Ö£¨FBI£©ÖÒÑÔ£¬£¬£¬¶íÂÞ˹APT×éÖ¯Energetic BearÈëÇÖ²¢ÇÔÈ¡ÁËÃÀ¹úÕþ¸®ÍøÂçµÄÊý¾Ý¡£¡£ ¡£¡£¡£ÕâЩ»ú¹¹ÌåÏÖ£¬£¬£¬¶íÂÞ˹APT×éÖ¯ÒÑÃé×¼ÊýÊ®¸öSLTTÕþ¸®ºÍº½¿ÕÍøÂ磬£¬£¬²¢ÀֳɯÆËðÁËÍøÂç»ù´¡ÉèÊ©¡£¡£ ¡£¡£¡£×èÖ¹2020Äê10ÔÂ1ÈÕ£¬£¬£¬ÆäÖÁÉÙ´ÓÁ½¸öЧÀÍÆ÷ÖÐÇÔÈ¡ÁËÊý¾Ý¡£¡£ ¡£¡£¡£Ð¹Â¶µÄÃô¸ÐÊý¾Ý°üÀ¨ÍøÂçÉèÖúÍÃÜÂë¡¢±ê×¼²Ù×÷³ÌÐò£¨SOP£©£¨ÀýÈç×¢²á¶àÒòËØÉí·ÝÑéÖ¤£©¡¢ITÖ¸ÁÀýÈçÇëÇóÃÜÂëÖØÖã©¡¢¹©Ó¦É̺͹ºÖÃÐÅÏ¢¡¢´òÓ¡»á¼ûÁîÅÆµÈ¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/russian-state-hackers-stole-data-from-us-government-networks/ 


5.MozillaÐû²¼¸üУ¬£¬£¬ÐÞ¸´FirefoxÖеĶà¸öÎó²î


5.jpg


MozillÐÞ¸´ÁËFirefoxÖеĶà¸öÎó²î£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜÔÊÐíí§Òâ´úÂëÖ´ÐС£¡£ ¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î°üÀ¨usersctp¿âÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15969£©¡¢ÄÚ´æ·ÖÅÉÎÊÌ⣨CVE-2020-15254£©¡¢Í¼Ïñ±êÇ©ÖÐÎó²î£¨CVE-2020-15680£©¡¢WASMÏß³ÌÖÐÎó²î£¨CVE-2020-15681£©¡¢¿Éµ¼ÖÂÓÕÆ­ÐÔ¹¥»÷µÄÎó²î£¨CVE-2020-15682£©ºÍÄÚ´æÇå¾²¹ýʧ£¨CVE-2020-15683ºÍCVE-2020-15684£©¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-mozilla-firefox-could-allow-for-arbitrary-code-execution_2020-146/


6.CiscoÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄÎó²î


6.jpg


2020Äê10ÔÂ21ÈÕ£¬£¬£¬CiscoÐû²¼Ç徲ͨ¸æ£¬£¬£¬Åû¶Æä¶à¸ö²úÆ·Öб£´æµÄ36¸öÇå¾²Îó²î¡£¡£ ¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪCisco FXOS FCM¿çÕ¾ÇëÇóαÔìÎó²î£¨CVE-2020-3456£©£¬£¬£¬ÓÉÓÚFCM½Ó¿ÚµÄCSRF±£»£»£»¤È±·¦µ¼Ö£¬£¬£¬ÀÖ³ÉʹÓôËÎó²î¿É·¢ËÍí§ÒâÇëÇ󣻣»£»Cisco FMC¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3499£©£¬£¬£¬ÓÉÓÚϵͳ¶Ô×ÊÔ´ÖµµÄ´¦Öóͷ£²»µ±µ¼Ö£¬£¬£¬¿ÉʹÓôËÎó²îÔì³É¾Ü¾øÐ§ÀÍ£¨DoS£©£»£»£»Cisco FTD TCP Flood¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3563£©£¬£¬£¬ÓÉÓÚÄÚ´æÖÎÀíЧÂʵÍÏÂÔì³É£¬£¬£¬¿Éµ¼Ö¾ܾøÐ§ÀÍ£¨DoS£©¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/cisco-dos-flaws-network-security-software/160414/