NCC·¢Ã÷ClopʹÓÃSolarWinds Serv-UÖÐRCEµÄ»î¶¯

Ðû²¼Ê±¼ä 2021-11-12

ESET·¢Ã÷LazarusʹÓõÁ°æµÄIDA Pro·Ö·¢¶ñÒâÈí¼þ


ESET·¢Ã÷LazarusʹÓõÁ°æµÄIDA Pro·Ö·¢¶ñÒâÈí¼þ.png


ESETÍŶÓÓÚ11ÔÂ10ÈÕ·¢Ã÷³¯ÏʺڿÍÍÅ»ïLazarusʹÓõÁ°æIDA Pro¹¥»÷Çå¾²Ñо¿Ö°Ô±µÄ»î¶¯¡£¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨³£Ê¹ÓÃÄæÏò¹¤³ÌÓ¦ÓÃIDA ProÀ´ÆÊÎöÎó²îºÍ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬¶ø´Ë´Î·¢Ã÷µÄIDA Pro 7.5°æ±¾°üÀ¨ÁËÁ½¸öÃûΪidahelp.dllºÍwin_fw.dllµÄ¶ñÒâDLL¡£¡£ ¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬win_fw.dll½«ÔÚWindowsʹÃüµ÷Àí³ÌÐòÖн¨ÉèÒ»¸öÐÂʹÃü£¬£¬£¬£¬£¬£¬£¬¸ÃʹÃü½«Æô¶¯idahelper.dll£¬£¬£¬£¬£¬£¬£¬È»ºóidahelper.dll½«ÅþÁ¬µ½devguardmap[.]orgÍøÕ¾²¢ÏÂÔØÔ¶³Ì»á¼ûľÂíNukeSpedµÄpayload¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-researchers-with-trojanized-ida-pro/


ͳ³ÆÎªNUCLEUS:13µÄ¶à¸öÎó²îÓ°ÏìÎ÷ÃÅ×ÓRTOS


ͳ³ÆÎªNUCLEUS13µÄ¶à¸öÎó²îÓ°ÏìÎ÷ÃÅ×ÓRTOS.png


ForescoutºÍMedigateµÄÑо¿Ö°Ô±ÔÚ11ÔÂ9ÈÕÅû¶ÁËNucleusÖÐ13¸öÎó²îµÄϸ½Ú¡£¡£ ¡£¡£¡£¡£NucleusÊÇÎ÷ÃÅ×ÓµÄʵʱ²Ù×÷ϵͳ(RTOS)£¬£¬£¬£¬£¬£¬£¬Í¨³£ÔËÐÐÔÚÒ½ÁÆ×°±¸¡¢Æû³µ¡¢ÖÇÄÜÊÖ»ú¡¢ÎïÁªÍø×°±¸¡¢¹¤ÒµplcµÈ×°±¸µÄƬÉÏϵͳ(SoC)¡£¡£ ¡£¡£¡£¡£ÕâЩÎó²îͳ³ÆÎªNUCLEUS:13£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËNucleus TCP/IP¿ÍÕ»¡£¡£ ¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬×îÑÏÖØµÄÊÇÓ°ÏìÁËFTPЧÀÍÆ÷×é¼þµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-31886£©£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬£¬£¬ÊÇÓÉÓÚ¶ÔUSERÏÂÁ¶ÈµÄÑéÖ¤²»×¼È·µ¼ÖµÄ¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/nucleus13-vulnerabilities-impact-siemens-medical-industrial-equipment/


SAPÐû²¼11Ô·ÝÖܶþ²¹¶¡£¡£ ¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÇå¾²Îó²î


SAPÐû²¼11Ô·ÝÖܶþ²¹¶¡ÐÞ¸´¶à¸öÇå¾²Îó²î.png


SAPÔÚ11ÔÂ9ÈÕÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¡£ ¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á˶à¸öÇå¾²Îó²î¡£¡£ ¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ×îÑÏÖØµÄÎó²îÊÇABAPƽ̨ÄÚºËÖÐÓÉÓÚȱʧÊÚȨ¼ì²éµ¼ÖµÄÌáȨÎó²î£¨CVE-2021-40501£©£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.6¡£¡£ ¡£¡£¡£¡£Çå¾²¹«Ë¾Onapsis³Æ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÒÔͨ¹ýRFCºÍHTTPͨѶӰÏìÆäËüϵͳµÄ¿ÉÐÅÅþÁ¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÆäÔÚÆäËüϵͳÖÐÖ´ÐÐÌØ¶¨µÄÂß¼­¡£¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËCommerceÖеÄÌáȨÎó²î£¨CVE-2021-40502£©¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/sap-patches-critical-vulnerability-abap-platform-kernel


NCC·¢Ã÷ClopʹÓÃSolarWinds Serv-UÖÐRCEµÄ»î¶¯


NCC·¢Ã÷ClopʹÓÃSolarWinds Serv-UÖÐRCEµÄ»î¶¯.png


NCC GroupÓÚ11ÔÂ8Èճƣ¬£¬£¬£¬£¬£¬£¬ÔÚÒÑÍù¼¸ÖÜÖÐÀÕË÷Èí¼þClopµÄѬȾÁ¿ÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ´ó´ó¶¼¶¼Ê¹ÓÃÁËÎó²îCVE-2021-35211¡£¡£ ¡£¡£¡£¡£¸ÃÎó²îÊÇServ-U Managed File TransferºÍServ-U Secure FTPÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬£¬SolarWindsÔÚ2021Äê7Ô·ÝÐû²¼Á˽ôÆÈ¸üÐÂÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬²¢³Æ½öÓ°ÏìÁËÆôÓÃSSH¹¦Ð§µÄ¿Í»§¡£¡£ ¡£¡£¡£¡£Ôڴ˴λÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃServ-UÌìÉúÁËÒ»¸öÓÉÆä¿ØÖÆµÄ×ÓÀú³Ì£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÄ¿µÄϵͳÉÏÖ´ÐÐÏÂÁî¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://research.nccgroup.com/2021/11/08/ta505-exploits-solarwinds-serv-u-vulnerability-cve-2021-35211-for-initial-access/


µÂ¹úÒ½ÁÆÈí¼þ¹«Ë¾MedatixxÈ·ÈÏÆäÔâµ½ÀÕË÷¹¥»÷


µÂ¹úÒ½ÁÆÈí¼þ¹«Ë¾MedatixxÈ·ÈÏÆäÔâµ½ÀÕË÷¹¥»÷.png


Medatixx¹«Ë¾11ÔÂ9ÈÕÈ·ÈÏÆäÔÚÉÏÖÜÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£ ¡£¡£¡£¡£MedatixxÊÇÒ»¼ÒµÂ¹úµÄÒ½ÁÆÈí¼þ¹«Ë¾£¬£¬£¬£¬£¬£¬£¬ËüµÄ²úÆ·±»ÓÃÓÚ21000¶à¼ÒÒ½ÁÆ»ú¹¹¡£¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬£¬£¬¹¥»÷½öÓ°ÏìÁËËûÃǵÄÄÚ²¿ITϵͳ£¬£¬£¬£¬£¬£¬£¬Ã»ÓÐÓ°Ïì¿Í»§µÄPVS£¨Êµ¼ùÖÎÀíϵͳ£©¡£¡£ ¡£¡£¡£¡£ÏÖÔÚÉÐδȷ¶¨¹¥»÷ÕßÇÔÈ¡ÁËÄÄЩÊý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«¿ÉÄÜÒѾ­»ñÈ¡ÁËMedatixx¿Í»§µÄÃÜÂ룬£¬£¬£¬£¬£¬£¬Òò´ËMedatixx½¨Òé¿Í»§Á¬Ã¦¸ü¸ÄÆäÓ¦ÓóÌÐòµÄÃÜÂë¡£¡£ ¡£¡£¡£¡£¹«Ë¾ÈÔÔÚ»Ö¸´ÖУ¬£¬£¬£¬£¬£¬£¬×èÖ¹ÏÖÔÚÖ»»Ö¸´ÁËÓʼþºÍµç»°ÏµÍ³¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/medical-software-firm-urges-password-resets-after-ransomware-attack/


ACTIºÍPACTÐû²¼¹ØÓÚLyceum½üÆÚ»î¶¯µÄÆÊÎö±¨¸æ


ACTIºÍPACTÐû²¼¹ØÓÚLyceum½üÆÚ»î¶¯µÄÆÊÎö±¨¸æ.png


11ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬AccentureµÄACTIÍŶӺÍPrevailionµÄPACTÍŶÓÁªºÏÐû²¼Á˹ØÓÚLyceum½üÆÚ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£ ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÒÁÀʺڿÍÍÅ»ïLyceumÖ÷ҪרעÓÚÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬£¬ÔÚ2021Äê7ÔÂÖÁ10ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬Ôø¹¥»÷ÁËÒÔÉ«ÁС¢Ä¦Âå¸ç¡¢Í»Äá˹ºÍÉ³ÌØ°¢À­²®µÄISPºÍµçÐÅÔËÓªÉÌ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°·ÇÖÞµÄÍâ½»²¿(MFA)¡£¡£ ¡£¡£¡£¡£LyceumµÄ³õʼ¹¥»÷ǰÑÔΪƾ֤Ìî³ä¹¥»÷ºÍ±©Á¦¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÔÚÈëÇÖÀֳɺó»á×°ÖúóÃÅSharkºÍMilan£¨Í³³ÆÎªJames£©¡£¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.accenture.com/us-en/blogs/cyber-defense/iran-based-lyceum-campaigns