CISAÐû²¼SolarWinds Orion¹¥»÷ÊÂÎñµÄÔö²¹Ö¸ÄÏ£»£»£»Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄ¸ùÖ¤Êé
Ðû²¼Ê±¼ä 2020-12-22
CISA×î³õÓÚ12ÔÂ17ÈÕÐû²¼ÁËÓйØÕþ¸®»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ºÍ¹«Ë¾×éÖ¯µÄAPT¹¥»÷»î¶¯µÄ¾¯±¨£¬£¬£¬£¬£¬Ö®ºóÕë¶Ô¸Ã½ôÆÈÖ¸ÁîÐû²¼ÁËÔö²¹Ö¸ÄÏ¡£¡£¡£¡£¡£¡£Ôö²¹Ö¸ÄϰüÀ¨ÊÜÓ°Ïì°æ±¾µÄ¸üС¢Õë¶ÔʹÓõÚÈý·½Ð§ÀÍÌṩÉ̵ÄÊðÀíµÄÖ¸ÄÏÒÔ¼°¶ÔËùÐè²½·¥µÄ½øÒ»²½ËµÃ÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬CISA»¹¸üÐÂÁ˸þ¯±¨£¬£¬£¬£¬£¬ÌṩÁËÐµĻº½â¼Æ»®²¢ÐÞ¶©ÁËIOC±í¸ñ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/12/19/cisa-updates-alert-and-releases-supplemental-guidance-emergency
2.ÏãÁϹ«Ë¾SymriseѬȾClop£¬£¬£¬£¬£¬500GBδ¼ÓÃܵÄÎļþ±»µÁ

Ï㾫ÏãÁϹ«Ë¾SymriseѬȾÀÕË÷Èí¼þClop£¬£¬£¬£¬£¬500GBδ¼ÓÃܵÄÎļþ±»µÁ£¬£¬£¬£¬£¬½ü1000̨װ±¸±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£SymriseÊÇÈ«ÇòÁè¼Ý3ÍòÖÖ²úÆ·£¨°üÀ¨È¸³²ºÍÊʿڿÉÀÖ£©ÖÐʹÓõÄÏ㾫ÏãÁϵÄÖ÷Òª¿ª·¢ÉÌ£¬£¬£¬£¬£¬ÓÚÉÏÖÜÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬²¢¹Ø±ÕÁËËùÓÐÐëÒªµÄϵͳÒÔ±ÜÃâ¹¥»÷ÉìÕÅ¡£¡£¡£¡£¡£¡£ClopÍÅ»ïÉù³ÆÆäͨ¹ý´¹ÂÚ¹¥»÷ÈëÇÖÁËSymriseµÄÍøÂç²¢ÇÔÈ¡ÁË500 GBµÄδ¼ÓÃÜÎļþ£¬£¬£¬£¬£¬ÆäÔÚÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû²¼µÄ½ØÍ¼ÏÔʾ±»µÁÊý¾Ý°üÀ¨»¤ÕÕ¡¢»á¼ÆÆ¾Ö¤¡¢É󼯱¨¸æ¡¢»¯×±Æ·ÒòËØºÍµç×ÓÓʼþµÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/flavors-designer-symrise-halts-production-after-clop-ransomware-attack/
3.ClearSky³ÆÒÁÀʺڿÍʹÓÃPay2KeyÃé×¼ÒÔÉ«ÁеĹ«Ë¾

ÍþвÇ鱨¹«Ë¾ClearSky³ÆÒÁÀʺڿÍʹÓÃPay2KeyÃé×¼ÒÔÉ«ÁеĹ«Ë¾¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯±¬·¢ÓÚ2020Äê11Ôµ½12Ô£¬£¬£¬£¬£¬»òÓëÒÁÀʺڿÍ×éÖ¯Fox KittenÓйء£¡£¡£¡£¡£¡£Fox KittenÉÆÓÚʹÓÃÖÖÖÖ¿ªÔ´ºÍ×ÔÖ÷¿ª·¢µÄ¹¥»÷¹¤¾ß£¬£¬£¬£¬£¬Í¨¹ýÄ¿µÄÆóÒµµÄvpnÒÔ¼°F5 NetworksµÄBIG-IPÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷(ADC)ÈëÇÖ¡£¡£¡£¡£¡£¡£ClearSky³ÆºÚ¿ÍÕë¶ÔÒÔÉ«ÁÐÊýÊ®¼Ò¹¤Òµ¡¢°ü¹ÜºÍÎïÁ÷¹«Ë¾£¬£¬£¬£¬£¬À´×°ÖÃÀÕË÷Èí¼þÀ´¼ÓÃÜЧÀÍÆ÷ºÍÊÂÇéÕ¾£¬£¬£¬£¬£¬ÒÔ¼°Ìᳫ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/iranian-hackers-target-israeli-companies-pay2key-ransomware
4.Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄ¸ùÖ¤Êé

Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄMitM HTTPSÖ¤Êé¡£¡£¡£¡£¡£¡£¸ÃÖ¤Êé×Ô2020Äê12ÔÂ6ÈÕ×îÏÈʹÓ㬣¬£¬£¬£¬¹þÈø¿Ë˹̹Õþ¸®Ç¿ÖÆ×°Öô˸ùÖ¤ÊéÒÔ×èµ²ºÍ¼àÊӸùúÊ×¶¼Å¬¶ûËÕµ¤×¡ÃñµÄHTTPSÁ÷Á¿¡£¡£¡£¡£¡£¡£´Ë½ûÁîÐû²¼ºó£¬£¬£¬£¬£¬×ÝÈ»Óû§ÒÑ×°ÖÃÖ¤Ê飬£¬£¬£¬£¬ÈÔÎÞ·¨»á¼ûChrome¡¢Edge¡¢MozillaºÍSafariµÈä¯ÀÀÆ÷£¬£¬£¬£¬£¬´Ó¶ø×èÖ¹¹þÈø¿Ë˹̹¹ÙÔ±×èµ²Óû§Êý¾Ý¡£¡£¡£¡£¡£¡£ÕâÊÇËļҳ§É̵ڶþ´Î½ûÓùþÈø¿Ë˹̹Õþ¸®Ç¿ÖÆ×°ÖõÄMitM HTTPSÖ¤Êé¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/apple-google-microsoft-and-mozilla-ban-kazakhstans-mitm-https-certificate/
5.Dell Wyse Thin¿Í»§¶Ë±£´æÁ½¸ö´úÂëÖ´ÐÐÎó²î

Dell Wyse Thin¿Í»§¶Ë±£´æÁ½¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬CVSSÑÏÖØÐÔÆÀ·Ö¾ùΪ10¡£¡£¡£¡£¡£¡£ÆäÖÐÒ»¸öÎó²î±»×·×ÙΪCVE-2020-29491£¬£¬£¬£¬£¬ÓÉÓÚ°´ÆÚpingЧÀÍÆ÷ÒÔ»ñÈ¡×îÐÂÉèÖ㬣¬£¬£¬£¬²¢ÎÞÐèÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬Òò´ËËùÓÐÈ˶¼¿É»á¼ûÕâЩ¿ÉÄܰüÀ¨Ô¶³Ì»á¼ûƾ֤µÄÉèÖÃÎļþ¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²î±»×·×ÙΪCVE-2020-29492£¬£¬£¬£¬£¬ÓÉÓÚ´æ´¢ÕâЩÉèÖõÄЧÀÍÆ÷ÔÊÐí¶ÔÆäÉèÖÃÎļþ¾ÙÐжÁд»á¼û£¬£¬£¬£¬£¬Òò´ËÈκÎÈ˶¼¿ÉÒÔʹÓÃFTP¶ÁÈ¡ºÍ¸ü¸ÄËüÃÇ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²îÒѾ±»ÐÞ¸´¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-bugs-dell-wyse-thin-clients/162452/
6.VerizonÐû²¼2020ÄêÊý¾Ýй¶µÄÊÓ²ìÆÊÎö±¨¸æ

VerizonÐû²¼ÁË2020ÄêÊý¾Ýй¶µÄÊÓ²ìÆÊÎö±¨¸æ£¬£¬£¬£¬£¬×ܹ²ÆÊÎöÁË157525ÆðÊÂÎñ£¬£¬£¬£¬£¬Éæ¼°µ½16¸ö±ÊÖ±ÐÐÒµ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬ÔÚµ¼ÖÂÊý¾Ýй¶µÄ¹¥»÷·½·¨ÖУ¬£¬£¬£¬£¬ÍøÂç´¹ÂÚ¡¢Ê¹Óñ»µÁƾ֤ºÍÉèÖùýʧµÄÕ¼±È×î´ó£¬£¬£¬£¬£¬¶øµ¼ÖÂÊý¾Ýй¶×î¶àµÄ¶ñÒâÈí¼þÀàÐÍΪÃÜÂëת´¢³ÌÐò¡¢´¹ÂÚµç×ÓÓʼþºÍÖ±½Ó×°ÖÃÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬2020ÄêÓÐÁè¼Ý80%µÄºÚ¿ÍÈëÇÖ»î¶¯Éæ¼°µ½±©Á¦¹¥»÷»òʹÓÃɥʧºÍ±»µÁµÄƾ֤¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/


¾©¹«Íø°²±¸11010802024551ºÅ