Sophos·¢Ã÷LockBitʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßʶ±ð¿ÉÒÉÄ¿µÄ£»£»£»DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡Õþ¸®Êý¾Ý
Ðû²¼Ê±¼ä 2020-10-231.Sophos·¢Ã÷LockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿µÄ
SophosÐû²¼±¨¸æ£¬£¬£¬³ÆLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿µÄ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨Ì«¹ýÎöÒ»Äêǰ·ºÆðµÄÑù±¾£¬£¬£¬·¢Ã÷LockBitÒѾѸËÙ³ÉÊ죬£¬£¬²¢½ÓÄÉÁËһЩеÄÒªÁìÀ´ÈƹýWindowsÓû§ÕÊ»§¿ØÖÆ£¨UAC£©À´ÌáÉýÌØÈ¨¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬LockBit¿ÉʹÓÃPowerShellºÍWindowsµÄVBscriptÖ÷»úµÄÖØÃüÃû¸±±¾ÒÔ¼°»ùÓÚPowerShellÉøÍ¸²âÊÔ¹¤¾ßµÄ¾ç±¾£¬£¬£¬À´ËÑË÷°üÀ¨ÓмÛÖµÊý¾ÝµÄϵͳ£¬£¬£¬ÒÔ¹¥»÷СÐÍ×éÖ¯¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.sophos.com/en-us/2020/10/21/lockbit-attackers-uses-automated-attack-tools-to-identify-tasty-targets/
2.ÃÀ¹ú³ÆÒÁÀʺڿÍð³äProud BoysÏòÑ¡Ãñ·¢ËÍÏÅ»£Óʼþ
ÃÀ¹úÕþ¸®³ÆÒÁÀʺڿÍð³ä¼«ÓÒÒí×éÖ¯Proud Boys£¬£¬£¬¸øÃñÖ÷µ³Ñ¡Ãñ·¢ËÍÏÅ»£Óʼþ¡£¡£¡£¡£¡£ÕâЩµç×ÓÓʼþÒÔ¡°Í¶Æ±¸øÌØÀÊÆÕ»òÆäËûÈË¡±ÎªÖ÷Ì⣬£¬£¬²¢ÖÒÑÔÃñÖ÷µ³Ñ¡Ãñ±ØÐ轫Õþµ³¸ÄΪ¹²ºÍµ³²¢Í¶Æ±¸øÌØÀÊÆÕ×Üͳ£¬£¬£¬²»È»Proud Boys½«²»»á·Å¹ýËûÃÇ¡£¡£¡£¡£¡£ÓʼþÖеÄÊÕ¼þÈËÐÕÃûºÍµØµãÌåÏÖÕâЩÐÅÏ¢ÊǺڿÍͨ¹ý¹¥»÷Ñ¡Ãñ×¢²áÍøÕ¾»ñµÃµÄ¡£¡£¡£¡£¡£¶øÃÀ¹úÕþ¸®³ÆÒÁÀʺͶíÂÞ˹ÒѾ»ñµÃÁËÑ¡Ãñ¹ÒºÅÐÅÏ¢£¬£¬£¬²¢ÇÒÒÁÀÊÕýÔÚʹÓøÃÐÅÏ¢·¢ËÍÕâЩÍþвÓʼþ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/government/us-govt-iran-behind-fake-proud-boys-voter-intimidation-emails/
3.ºÚ¿Íð³äÓ¢¹úM£¦SµÄCEOÆÈ¡Óû§ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢
ºÚ¿Íð³äÓ¢¹ú´óÐÍ¿ç¹úÁãÊÛÉÌMarks£¦SpencerµÄCEOÆÈ¡Óû§ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢¡£¡£¡£¡£¡£ºÚ¿ÍÊ×ÏÈÔÚÍøÉÏÐû²¼Ú²ÆÐÔ¹ã¸æ£¬£¬£¬²¢Ðû´«Êܺ¦Õßͨ¹ýÐéÄâ³é½±½«ÓÐʱ»ú»ñµÃÀñÎïȯ¡£¡£¡£¡£¡£µ±Êܺ¦Õßµã»÷¹ã¸æÖеÄÁ´½Óʱ£¬£¬£¬»á±»Öض¨Ïòµ½M£¦SµÄÃÅ»§ÍøÕ¾£¬£¬£¬²¢ÒªÇóÌṩÆäÐÕÃû¡¢µØµã¡¢ÊÖ»úºÅÂëÒÔ¼°ÒøÐÐÏêϸÐÅÏ¢£¬£¬£¬°üÀ¨SORT´úÂëºÍÕʺŵȡ£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈëÐÅÏ¢ºó£¬£¬£¬ÆäÐÅÏ¢±ã»á±»ºÚ¿ÍÇÔÈ¡¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ms-boss-spoofed-in-gift-voucher/
4.DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡ÃÀ¹úÕþ¸®Êý¾Ý
ÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©ÍøÂçÇå¾²¡¢»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ºÍÁª°îÊÓ²ì¾Ö£¨FBI£©ÖÒÑÔ£¬£¬£¬¶íÂÞ˹APT×éÖ¯Energetic BearÈëÇÖ²¢ÇÔÈ¡ÁËÃÀ¹úÕþ¸®ÍøÂçµÄÊý¾Ý¡£¡£¡£¡£¡£ÕâЩ»ú¹¹ÌåÏÖ£¬£¬£¬¶íÂÞ˹APT×éÖ¯ÒÑÃé×¼ÊýÊ®¸öSLTTÕþ¸®ºÍº½¿ÕÍøÂ磬£¬£¬²¢ÀֳɯÆËðÁËÍøÂç»ù´¡ÉèÊ©¡£¡£¡£¡£¡£×èÖ¹2020Äê10ÔÂ1ÈÕ£¬£¬£¬ÆäÖÁÉÙ´ÓÁ½¸öЧÀÍÆ÷ÖÐÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£¡£Ð¹Â¶µÄÃô¸ÐÊý¾Ý°üÀ¨ÍøÂçÉèÖúÍÃÜÂë¡¢±ê×¼²Ù×÷³ÌÐò£¨SOP£©£¨ÀýÈç×¢²á¶àÒòËØÉí·ÝÑéÖ¤£©¡¢ITÖ¸ÁÀýÈçÇëÇóÃÜÂëÖØÖã©¡¢¹©Ó¦É̺͹ºÖÃÐÅÏ¢¡¢´òÓ¡»á¼ûÁîÅÆµÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/russian-state-hackers-stole-data-from-us-government-networks/
5.MozillaÐû²¼¸üУ¬£¬£¬ÐÞ¸´FirefoxÖеĶà¸öÎó²î
MozillÐÞ¸´ÁËFirefoxÖеĶà¸öÎó²î£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜÔÊÐíí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î°üÀ¨usersctp¿âÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15969£©¡¢ÄÚ´æ·ÖÅÉÎÊÌ⣨CVE-2020-15254£©¡¢Í¼Ïñ±êÇ©ÖÐÎó²î£¨CVE-2020-15680£©¡¢WASMÏß³ÌÖÐÎó²î£¨CVE-2020-15681£©¡¢¿Éµ¼ÖÂÓÕÆÐÔ¹¥»÷µÄÎó²î£¨CVE-2020-15682£©ºÍÄÚ´æÇå¾²¹ýʧ£¨CVE-2020-15683ºÍCVE-2020-15684£©¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-mozilla-firefox-could-allow-for-arbitrary-code-execution_2020-146/
6.CiscoÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄÎó²î
2020Äê10ÔÂ21ÈÕ£¬£¬£¬CiscoÐû²¼Ç徲ͨ¸æ£¬£¬£¬Åû¶Æä¶à¸ö²úÆ·Öб£´æµÄ36¸öÇå¾²Îó²î¡£¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪCisco FXOS FCM¿çÕ¾ÇëÇóαÔìÎó²î£¨CVE-2020-3456£©£¬£¬£¬ÓÉÓÚFCM½Ó¿ÚµÄCSRF±£»£»£»¤È±·¦µ¼Ö£¬£¬£¬ÀÖ³ÉʹÓôËÎó²î¿É·¢ËÍí§ÒâÇëÇ󣻣»£»Cisco FMC¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3499£©£¬£¬£¬ÓÉÓÚϵͳ¶Ô×ÊÔ´ÖµµÄ´¦Öóͷ£²»µ±µ¼Ö£¬£¬£¬¿ÉʹÓôËÎó²îÔì³É¾Ü¾øÐ§ÀÍ£¨DoS£©£»£»£»Cisco FTD TCP Flood¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3563£©£¬£¬£¬ÓÉÓÚÄÚ´æÖÎÀíЧÂʵÍÏÂÔì³É£¬£¬£¬¿Éµ¼Ö¾ܾøÐ§ÀÍ£¨DoS£©¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/cisco-dos-flaws-network-security-software/160414/