ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ42ÖÜ
Ðû²¼Ê±¼ä 2020-10-19> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2020Äê10ÔÂ12ÈÕÖÁ10ÔÂ18ÈÕ¹²ÊÕ¼Çå¾²Îó²î62¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Flash Player¿ÕÖ¸ÕëÒýÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»Microsoft Windows Hyper-V CVE-2020-1047ȨÏÞÌáÉýÎó²î£»£»£»£»SAP Solution Manager OSÏÂÁî×¢ÈëÎó²î£»£»£»£»Microhard Bullet-LTE PingÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î£»£»£»£»Veritas APTAREÊÚȨ¼ì²é´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇBlackBerryÐû²¼¹ØÓÚBAHAMUT×éÖ¯µÄÆÊÎö±¨¸æ£»£»£»£»LumuÐû²¼2020Äê¶ÈÀÕË÷Èí¼þÓ°ÏìÆÊÎöµÄÐÅϢͼ£»£»£»£»AdobeÐÞ¸´Flash PlayerÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î£»£»£»£»AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£»£»£»£»CNSAÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Adobe Flash Player¿ÕÖ¸ÕëÒýÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î
Adobe Flash Player´¦Öóͷ£SWF±£´æ¿ÕÖ¸ÕëÒýÓÃÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://helpx.adobe.com/security/products/flash-player/apsb20-58.html
2.Microsoft Windows Hyper-V CVE-2020-1047ȨÏÞÌáÉýÎó²î
Microsoft Windows Hyper-V´¦Öóͷ£Äڴ湤¾ß±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1047
3.SAP Solution Manager OSÏÂÁî×¢ÈëÎó²î
SAP Solution ManagerµÄCA Introscope Enterprise Manager±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£¡£¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196
4.Microhard Bullet-LTE PingÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î
Microhard Bullet-LTE tools.sh´¦Öóͷ£ping²ÎÊý±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-20-1205/
5.Veritas APTAREÊÚȨ¼ì²é´úÂëÖ´ÐÐÎó²î
Veritas APTAREÊÚȨ¼ì²é±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://www.veritas.com/content/support/en_US/security/VTS20-006#issue1
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢BlackBerryÐû²¼¹ØÓÚBAHAMUT×éÖ¯µÄÆÊÎö±¨¸æ
BlackBerryÐû²¼Á˹ØÓÚBAHAMUTÍøÂçÌØ¹¤×éÖ¯µÄÆÊÎö±¨¸æ£¬£¬£¬£¬·¢Ã÷Æä¶ÔÕþ¸®¹ÙÔ±ºÍÖ÷ÒªÐÐÒµÌᳫÁË´ó×ڸ߶ÈÖØ´óµÄ¹¥»÷¡£¡£¡£¡£¡£¡£Ñо¿Åú×¢£¬£¬£¬£¬¸ÃÍÅ»ïµÄ»î¶¯¹æÄ£±ÈÒÔǰÒÔΪµÄÒªÆÕ±éµÃ¶à£¬£¬£¬£¬°üÀ¨ÁËGoogle PlayÊÐËÁºÍApp StoreÖеÄÊ®¼¸¸ö¶ñÒâÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬BlackBerry»¹ÒÔΪ£¬£¬£¬£¬BAHAMUT¿ÉÒÔÓëÖÁÉÙÒ»Ãû0day¿ª·¢Ö°Ô±½Ó´¥£¬£¬£¬£¬²¢Ê¹ÓÃ0day¹¥»÷¶à¸öÄ¿µÄ£¬£¬£¬£¬ÕâÔ¶Ô¶Áè¼ÝÁË´ó´ó¶¼ÆäËûºÚ¿Í×éÖ¯µÄ¹¥»÷ˮƽ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/cyber-espionage-bahamut-staggering/
2¡¢LumuÐû²¼2020Äê¶ÈÀÕË÷Èí¼þÓ°ÏìÆÊÎöµÄÐÅϢͼ
LumuÐû²¼ÁËÒ»ÕÅÐÅϢͼ£¬£¬£¬£¬Ïêϸ˵Ã÷ÎúÀÕË÷Èí¼þµÄ±¾Ç®ºÍ¹æÄ££¬£¬£¬£¬ÒÔ×ÊÖúÆóҵȨºâËûÃǵÄÊܺ¦Î£º¦¡£¡£¡£¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬½ñÄêÈ«ÇòÀÕË÷Èí¼þµÄ±¾Ç®Îª200ÒÚÃÀÔª£¬£¬£¬£¬Æ½¾ùÿ´ÎµÄ¹¥»÷±¾Ç®Áè¼Ý400ÍòÃÀÔª£¬£¬£¬£¬²¢ÇÒÓÐ36£¥µÄÊܺ¦ÕßÖ§¸¶ÁËÊê½ð£¬£¬£¬£¬ÆäÖÐ17£¥»¹Ã»ÄÜÍì»ØËûÃǵÄÊý¾Ý¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÔÚ±±ÃÀÓÐ69%µÄ¹«Ë¾±¨¸æ³ÆÊܵ½ÁËÀÕË÷Èí¼þµÄÓ°Ï죬£¬£¬£¬¶øÔÚÅ·ÖÞÓÐ57%¡£¡£¡£¡£¡£¡£Ïà½Ï¶øÑÔ£¬£¬£¬£¬±±ÃÀµÄÕþ¸®»ú¹¹Êܵ½µÄ¹¥»÷×îΪÑÏÖØ£¬£¬£¬£¬Æä´ÎÊÇÖÆÔìÒµºÍÐÞ½¨Òµ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://lumu.io/resources/2020-ransomware-flashcard/
3¡¢AdobeÐÞ¸´Flash PlayerÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î
AdobeÐÞ¸´ÁËFlash PlayerÖÐÑÏÖØµÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¨³ÆÎªCVE-2020-9746£©¡£¡£¡£¡£¡£¡£AdobeÖ¸³ö£¬£¬£¬£¬ÔÚĬÈÏÇéÐÎÏ£¬£¬£¬£¬ºÚ¿Í¿ÉÒÔͨ¹ýÔÚÓû§»á¼ûÍøÕ¾Ê±ÔÚTLS / SSLת´ïµÄHTTPÏìÓ¦ÖвåÈë¶ñÒâ×Ö·û´®À´Ê¹ÓôËÎó²î¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²îºó£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÓ¦ÓÃÍ߽⣬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔÔÚ»á¼ûÕßµÄÅÌËã»úÉÏÔ¶³ÌÖ´ÐÐÏÂÁî¡£¡£¡£¡£¡£¡£ÕâЩÏÂÁÔÚÓû§µÄÇå¾²ÇéÐÎÖÐÖ´ÐУ¬£¬£¬£¬²¢²»ÐèÒªÖÎÀíԱȨÏÞ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerability-in-flash-player/
4¡¢AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ
AgariÍøÂçÇ鱨²¿£¨ACID£©Ðû²¼ÁËBECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£¬£¬£¬£¬ÒÔ¸üºÃµØÏàʶBEC¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£±¨¸æ°üÀ¨ÁË2019Äê5ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ9000¶à´Î·ÀÓù»î¶¯µÄÊý¾Ý£¬£¬£¬£¬·¢Ã÷ÓÐ60£¥µÄ¹¥»÷ÕßÀ´×Ô·ÇÖÞµÄ11¸ö¹ú¼Ò£¬£¬£¬£¬ÆäÖÐ83£¥Î»ÓÚÄáÈÕÀûÑÇ¡£¡£¡£¡£¡£¡£½ü30£¥µÄ¹¥»÷ÕßÀ´×ÔÃÀÖÞ£¬£¬£¬£¬ÆäÖеÄ89£¥À´×ÔÃÀ¹ú£¬£¬£¬£¬²¢ÇÒ¹¥»÷ÕßÖ÷ҪȺ¼¯ÔÚһЩ´ó¶¼ÊУ¬£¬£¬£¬°üÀ¨ÑÇÌØÀ¼´ó¡¢Å¦Ô¼¡¢ÂåÉ¼í¶¡¢ÐÝ˹¶ØºÍÂõ°¢ÃÜ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.agari.com/email-security-blog/business-email-compromise-geography/
5¡¢CNSAÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·
10ÔÂ12ÈÕ£¬£¬£¬£¬ÖйúÍøÂçÊÓÌý½ÚĿЧÀÍлáÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·£¬£¬£¬£¬Ê׶ȹûÕæÎÒ¹úÍøÂçÊÓÌýÓû§¹æÄ£ºÍ¹¤Òµ¹æÄ£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ»ùÓÚÊý¾ÝÍÚ¾ò¡¢µ÷ÑÐÒÔ¼°µÚÈý·½Êý¾Ý£¬£¬£¬£¬¶Ô2019-2020ÄêµÄÍøÂçÊÓÌýÐÐÒµÏÖ×´ºÍÉú³¤Ç÷ÊÆ¾ÙÐÐȨÍþ¡¢ÖÜÈ«µÄÑÐÅС£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬×èÖ¹2020Äê6Ô£¬£¬£¬£¬ÎÒ¹úÍøÂçÊÓÌýÓû§¹æÄ£´ï9.01ÒÚ£¬£¬£¬£¬ 2019ÄêÍøÂçÊÓÌý¹¤Òµ¹æÄ£´ï4541.3ÒÚ¡£¡£¡£¡£¡£¡£ÆäÖжÌÊÓÆµµÄÓû§Ê¹ÓÃÂÊ×î¸ß£¬£¬£¬£¬´ï87.0%£¬£¬£¬£¬Óû§¹æÄ£8.18ÒÚ£»£»£»£»×ÛºÏÊÓÆµµÄÓû§Ê¹ÓÃÂÊΪ77.1%£¬£¬£¬£¬Óû§¹æÄ£7.24ÒÚ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
http://www.xinhuanet.com/info/2020-10/13/c_139436283.htm