CISAºÍCNMFÐû²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄÆÊÎö±¨¸æ£»£»£»Î¢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35ÀÖ³ÉÈëÇÖ¶à¸ö×ÅÃûÈËÊ¿ÓÊÏä

Ðû²¼Ê±¼ä 2020-10-30

1.CISAºÍCNMFÐû²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄÆÊÎö±¨¸æ


1.jpg


ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ºÍ¹ú·À²¿£¨DOD£©ÍøÂç¹ú¼ÒÐû½Ì²½¶Ó£¨CNMF£©·¢Ã÷еĶñÒâÈí¼þ±äÌåZebrocy¡£¡£¡£ ¡£¡£¡£¸Ã±äÌåÊÇÒ»¸ö32λµÄWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬Ê¹ÓÃGolang±à³ÌÓïÑÔ±àд£¬£¬£¬£¬£¬½ÓÄɵIJÎÊýӦΪÒì»ò£¨XOR£©ºÍÊ®Áù½øÖƱàÂëµÄͳһ×ÊÔ´±êʶ·û£¨URI£©£¬£¬£¬£¬£¬»òÕß¿ÉÒÔʹÓô¿Îı¾URIÔËÐС£¡£¡£ ¡£¡£¡£Ö´ÐÐʱ£¬£¬£¬£¬£¬Ëü½«Ê¹Óø߼¶¼ÓÃܱê×¼£¨AES£©-128µç×ÓÃÜÂë²¾£¨ECB£©Ëã·¨¶ÔURI¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬²¢Ê¹ÓôÓÊܺ¦ÕßµÄÖ÷»úÃûÌìÉúµÄÃÜÔ¿£¬£¬£¬£¬£¬±ðµÄ»¹»áÍøÂçÓйØÊÜÄ¿µÄϵͳµÄÐÅÏ¢¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/cisa-and-cnmf-identify-new-malware-variant-zebrocy


2.Netscout·¢Ã÷TrickBotʹÓÃбäÌåÖ÷ÒªÕë¶ÔLinuxϵͳ


2.jpg


Çå¾²¹«Ë¾Netscout·¢Ã÷TrickBotʹÓÃбäÌåÖ÷ÒªÕë¶ÔLinuxϵͳ¡£¡£¡£ ¡£¡£¡£ÔÚ΢ÈíDefenderÍŶÓÁªºÏ¶à¼ÒÇå¾²¹«Ë¾²ð³ýÁËTrickBot´ó²¿·ÖЧÀÍÆ÷ºó£¬£¬£¬£¬£¬Æä×îÏÈʹÓöñÒâÈí¼þµÄбäÖÖ£¬£¬£¬£¬£¬ÒÔʵÑ齫ÆäÓÃÓÚLinuxϵͳ¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±Waylon GrangeÓÚ7ÔÂÊ״η¢Ã÷ÁËAnchor_DNSµÄÐÂLinux±äÖÖ£¬£¬£¬£¬£¬²¢½«Æä³ÆÎªAnchor_Linux¡£¡£¡£ ¡£¡£¡£ÕâÊÇÒ»¸öÇáÁ¿¼¶µÄLinuxºóÃÅ£¬£¬£¬£¬£¬Ö´Ðк󣬣¬£¬£¬£¬Ëü½«×Ô¼º×°ÖÃΪcron£¬£¬£¬£¬£¬È·¶¨Ö÷»úµÄ¹«¹²IPµØµã£¬£¬£¬£¬£¬È»ºó×îÏÈͨ¹ýDNSÅÌÎÊÖ¸ÏòËüµÄC2ЧÀÍÆ÷¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110092/cyber-crime/trickbot-linux-variant.html


3.΢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35ÀÖ³ÉÈëÇÖ¶à¸ö×ÅÃûÈËÊ¿ÓÊÏä


3.jpg


MicrosoftµÄÍþвÇ鱨ÖÐÐÄ£¨MSTIC£©Åû¶£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯APT35ÀÖ³ÉÈëÇÖ¼ÓÈë½ñÄêĽÄáºÚÇå¾²¾Û»áºÍThink 20£¨T20£©·å»áµÄ¶à¸ö×ÅÃûÈËÊ¿µÄµç×ÓÓʼþÕÊ»§¡£¡£¡£ ¡£¡£¡£´Ë´ÎÊÂÎñµÄÊܺ¦Õß°üÀ¨Îª¹ú¼ÒÖ¸¶¨È«ÇòÒé³ÌºÍÍâ½»Õþ²ßµÄǰ´óʹºÍÆäËû¸ß¼¶Õþ²ßר¼Ò¡£¡£¡£ ¡£¡£¡£Æ¾Ö¤MSTICµÄÆÊÎö£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÎªÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬£¬Ö¼ÔÚͨ¹ýÇÔÈ¡Êܺ¦ÕßµÄÓÊÏäÄÚÈݺÍÁªÏµ·½·¨À´ÍøÂçÇ鱨£¬£¬£¬£¬£¬²¢ÌåÏָûÓëÃÀ¹ú´óÑ¡²¢ÎÞ¹ØÏµ¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-iranian-attackers-hacked-security-conference-attendees/


4.ºÚ¿Í¿ÉʹÓÃH?rmannÍø¹Ø×°±¸ÖÐÎó²îÔ¶³Ì¿ØÖƳµ¿âÃÅ


4.jpg


SEC ConsultÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬ºÚ¿Í¿ÉʹÓÃH?rmannÍø¹Ø×°±¸ÖÐÎó²îÔ¶³Ì¿ØÖƳµ¿âÃÅ¡£¡£¡£ ¡£¡£¡£H?rmannÊÇÒ»¼ÒµÂ¹ú¹«Ë¾£¬£¬£¬£¬£¬×¨ÃÅ´ÓʼÒÓú͹¤ÒµÃÅ£¬£¬£¬£¬£¬ÊÇÌìϵÚËÄ´óÃÅÀàÖÆÔìÉÌ¡£¡£¡£ ¡£¡£¡£Çå¾²¹«Ë¾·¢Ã÷¸ÃÍø¹Ø×°±¸¹²ÓÐ15¸öÎó²î£¬£¬£¬£¬£¬°üÀ¨Óë¼ÓÃÜÓйصÄÎÊÌ⡢ͨѶ±£»£»£»¤²»Á¦ÒÔ¼°Ïà¹ØµÄÒÆ¶¯Ó¦ÓÃÖÐÎó²î¡£¡£¡£ ¡£¡£¡£ÕâЩÎó²î¿É±»ÓÃÀ´¾ÙÐÐÁ½ÖÖ¹¥»÷£¬£¬£¬£¬£¬Ò»ÖÖÊÇÐèÒª»á¼ûÍâµØÍøÂçµÄ¹¥»÷£¬£¬£¬£¬£¬ÁíÒ»ÖÖÊÇ´Ó»¥ÁªÍøÔ¶³ÌÌᳫµÄ¹¥»÷¡£¡£¡£ ¡£¡£¡£ÅþÁ¬µ½ÍâµØÍøÂçµÄ¹¥»÷Õß¿ÉÒÔͨ¹ýÊÖ»úÖ´ÐÐÒ»¸öС¾ç±¾·­¿ªH?rmannÃÅ£¬£¬£¬£¬£¬¶øÎÞÐèÒªÉí·ÝÑéÖ¤¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/hackers-can-open-doors-exploiting-vulnerabilities-h%C3%B6rmann-device


5.FireEye³Æ¶«Å·ÍÅ»ïUNC1878ʹÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº


5.jpg


ÍøÂçÇå¾²¹«Ë¾FireEye³Æ¶«Å·ÍÅ»ïUNC1878ʹÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº¡£¡£¡£ ¡£¡£¡£FireEye¸±×ܲÃCharles CarmakalÌåÏÖ¸Ã×éÖ¯¶ÔÃÀ¹ú¶à¼ÒÒ½Ôº¾ÙÐÐÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ÕâÊÇÒ½ÁÆÐÐÒµÔÚÒßÇéʱ´úÔâµ½µÄ×î¾ßÆÆËðÐÔµÄÍøÂç»î¶¯¡£¡£¡£ ¡£¡£¡£ÆäÖаüÀ¨±¾ÖܶԶíÀÕ¸ÔÖݵÄSky Lakes Medical CenterµÄ¹¥»÷£¬£¬£¬£¬£¬¶ÔŦԼÖÝÒ½ÔºµÄITÍøÂç¹¥»÷ÆÈʹCanton-Potsdam¡¢MassenaºÍGouverneurÒ½Ôº»Ö¸´Ê¹Óñ¸·Ý³ÌÐò¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.cyberscoop.com/ransomware-hospitals-ryuk-fireeye/


6.ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öÏÂÁî×¢ÈëÎó²î


6.jpg


ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2020-2490ºÍCVE-2020-2492£©¡£¡£¡£ ¡£¡£¡£QTSÊÇÍøÂ總¼Ó´æ´¢×°±¸µÄ²Ù×÷ϵͳ£¬£¬£¬£¬£¬Ê¹ÓøÃÎó²î¿ÉÔÊÐíí§ÒâÏÂÁîÖ´ÐС£¡£¡£ ¡£¡£¡£NAS×°±¸¹©Ó¦ÉÌδÌṩÓйØÕâÁ½¸öÎÊÌâµÄÌ«¶àÏêϸÐÅÏ¢£¬£¬£¬£¬£¬µ«ÌåÏÖ×îа汾µÄQTS°üÀ¨±ØÐèµÄ²¹¶¡³ÌÐò£¬£¬£¬£¬£¬Óû§Ö»Òª½«QTS²Ù×÷ϵͳ¸üе½°æ±¾QTS 4.4.3.1421 build 20200907¾Í²»±Øµ£ÐÄ¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/qnap-warns-of-new-qts-bugs-that-allow-take-over-of-devices/