SambaÇå¾²¸üУ¬ÐÞ¸´Á½¸ö¿Éµ¼ÖÂDoSµÄÎó²î £»¼ÓÄôó½ðÈÚ»ú¹¹Desjardinsй¶Լ290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢

Ðû²¼Ê±¼ä 2019-06-21
1.SambaÇå¾²¸üУ¬ÐÞ¸´Á½¸ö¿Éµ¼ÖÂDoSµÄÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


SambaÍŶÓÐû²¼Çå¾²¸üУ¬ÐÞ¸´Á½¸öÎó²î ¡£µÚÒ»¸öÎó²î£¨CVE-2019-12435£©ÊÇÒ»¸ö¿ÕÖ¸Õë½âÒýÓÃÎÊÌ⣬ӰÏìSamba°æ±¾4.9ºÍ4.10£¬ÀÖ³ÉʹÓôËÎó²î¿Éµ¼ÖÂDNSÖÎÀí·þÎñÆ÷·ºÆð¾Ü¾ø·þÎñ ¡£µÚ¶þ¸öÎó²î£¨CVE-2019-12436£©Ó°ÏìÁËv4.10×îÏȵÄËùÓÐSamba°æ±¾£¬¾­ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔÚ·ÖÒ³ËÑË÷¿Ø¼þÖÐͨ¹ý¿ÕÖ¸Õë½âÒýÓÃÀ´Íß½âLDAP·þÎñÆ÷Àú³Ì ¡£

   

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/samba-releases-security-updates-to-address-two-vulnerabilities-0f9c2ad6

2.˼¿ÆÐÞ¸´SD-WAN¡¢RV·ÓÉÆ÷µÈ¶à¸ö²úÆ·ÖеÄÇå¾²Îó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


˼¿ÆÕë¶ÔSD-WAN¡¢Êý×ÖÍøÂç¼Ü¹¹£¨DNA£©ÖÐÐÄ¡¢TelePresence¡¢StarOS¡¢RV·ÓÉÆ÷¡¢Prime Service CatalogºÍMeeting ServerµÈ²úÆ·Ðû²¼Çå¾²¸üУ¬ÐÞ¸´¶à¸öÎó²î ¡£ÑÏÖØµÄÎó²î°üÀ¨DNAÖÐÐÄÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2019-1848£¬CVSS 9.3·Ö£©¡¢SD-WANÏÂÁîÐнçÃæÖеÄÍâµØÌáȨÎó²î£¨CVE-2019-1625£¬CVSS 7.8·Ö£©ÒÔ¼°¶à¸öRV·ÓÉÆ÷ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-1663£¬CVSS 9.8·Ö£©µÈ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/critical-vulnerabilities-patched-cisco-sd-wan-dna-center-products

3.APT¼¶ºÚ³ÔºÚ£¬¶íÂÞ˹Turla APT¹¥»÷ÒÁÀÊAPT34

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

ƾ֤ÈüÃÅÌú¿ËµÄ±¨¸æ£¬¶íÂÞ˹Turla APTÔÚ2017ÄêÈëÇÖÁËÒÁÀÊAPT34µÄ»ù´¡ÉèÊ©£¬²¢Ê¹ÓÃÆäC£¦C·þÎñÆ÷ʹÓÃ×Ô¼ºµÄ¶ñÒâÈí¼þ¶þ´ÎѬȾAPT34µÄÊܺ¦Õß ¡£Ñо¿Ö°Ô±ÓÚ2018Äê1ÔÂ11ÈÕÊӲ쵽¸ÃÈëÇÖÔ˶¯µÄÊ׸öÖ¤¾Ý£¬ÆäʱTurlaÏòAPT34µÄÊܺ¦ÕßÊÍ·ÅÁËÒ»¸ö¶ñÒ⹤¾ß£¨ÃûΪmsfgi.exeµÄʹÃüµ÷Àí³ÌÐò£© ¡£TurlaÔÚ¸ÃÍøÂçÉϵÄÔ˶¯Ò»Ö±Ò»Á¬µ½2018Äê9Ô£¬µ«APT34ËÆºõûÓз¢Ã÷¸ÃÈëÇÖ£¬Ã»ÓÐÖ¤¾ÝÅú×¢APT34×ö³öÁËÈκη´Ó¦ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russian-apt-hacked-iranian-apts-infrastructure-back-in-2017/

4.Õë¶ÔµÂ¹úµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷£¬Ö÷Òª·Ö·¢Ô¶¿ØÄ¾ÂíRemcos

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Check PointÑо¿Ö°Ô±·¢Ã÷Ò»¸öÕë¶ÔµÂ¹úËùÓÐÐÐÒµµÄдó¹æÄ£ÍøÂç´¹ÂÚÔ˶¯£¬¹¥»÷ÕßµÄÄ¿µÄÊÇÔÚÊܺ¦ÕßµÄÅÌËã»úÉÏ×°ÖÃÔ¶¿ØÄ¾ÂíRemcos ¡£¸ÃÔ˶¯µÄ³õʼ¹¥»÷ÏòÁ¿ÊÇ´¹ÂÚÓʼþ£¬¹¥»÷Õßαװ³ÉµÂ¹ú¸÷µØµÄÕýµ±¹«Ë¾£¬ÏòÄ¿µÄÆóÒµ·¢ËͰüÀ¨·¢Æ±»ò½ôÆÈ¶©µ¥µÄ´¹ÂÚÓʼþ£¬×îÖÕ·Ö·¢Remcos ¡£ÔÚÓëC&CµÄͨѶÖУ¬¹¥»÷Õß»¹Ê¹ÓÃDDNS£¨¶¯Ì¬DNS£©ÊÖÒÕÀ´Òþ²ØÆä×Ù¼£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2019/06/19/sandblast-agent-phishing-germany-campaign-security-hack-ransomware/

5.жñÒâÍÚ¿óÈí¼þ£¬Ìí¼ÓcronÍýÏëʹÃüʵÏÖ³¤ÆÚÐÔ»úÖÆ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


SucuriÇå¾²Ñо¿Ö°Ô±Luke Leal·¢Ã÷Ò»¸öеĶñÒâÍÚ¿óÈí¼þͨ¹ýÌí¼ÓcronÍýÏëʹÃüÀ´ÊµÏÖ³¤ÆÚÐÔ»úÖÆ£¬ÒÔ±ãÔÚ±»É¾³ýºóÖØÐÂѬȾĿµÄ»úе ¡£¹¥»÷Õßͨ¹ýÃûΪcr2.shµÄ¶ñÒâBash½ÅÔ­À´Ñ¬È¾Web·þÎñÆ÷£¬¸Ã¹¥»÷Ô˶¯µÄ³õʼѬȾÊÖ¶Îδ֪ ¡£cr2.sh»áɱËÀÓëÍÚ¿óÓйصÄÀú³Ì£¬ÀýÈçxmrigºÍcryptonight£¬²¢Í¨¹ýC&CÏÂÔØÍÚ¿ópayload ¡£¸Ã¶ñÒâÈí¼þͨ¹ý½¨Éèÿ·ÖÖÓÔËÐÐÒ»´ÎµÄcron×÷ÒµÀ´»ñµÃ³¤ÆÚÐÔ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cryptominer-uses-cron-to-reinfect-linux-host-after-removal/

6.¼ÓÄôó½ðÈÚ»ú¹¹Desjardinsй¶Լ290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


DesjardinsÊDZ±ÃÀµØÇø×î´óµÄÐÅÓÃÉ磬ҲÊǼÓÄôó×î´óµÄÏàÖú½ðÈÚ¼¯ÍÅ ¡£Æ¾Ö¤¸Ã¹«Ë¾µÄÐÂΟ壬Լ290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢ÔÚÔ±¹¤Î´¾­ÊÚȨÏò¹«Ë¾ÍⲿְԱÅû¶ºóй¶£¬ÆäÖаüÀ¨270ÍòÃûСÎÒ˽¼Ò»áÔ±ºÍ17.3ÍòÆóÒµ»áÔ± ¡£DesjardinsÓÚ2019Äê6ÔÂ14ÈÕ·¢Ã÷й¶ÊÂÎñ£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Ð¡ÎÒ˽¼Ò»áÔ±µÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅÂë¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãÒÔ¼°ÒøÐкÍDesjardins²úÆ·µÄÏêϸÐÅÏ¢ £»ÆóÒµ»áÔ±µÄ¹«Ë¾Ãû³Æ¡¢µØµã¡¢µç»°ºÅÂë¡¢ËùÓÐÕßÐÕÃûºÍAcc¨¨sDAffairesÕÊ»§Ãû³ÆÒÔ¼°ÓëAcc¨¨sDAffairesÕÊ»§Ïà¹ØµÄһЩСÎÒ˽¼ÒÐÅÏ¢ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/desjardins-group-data-leak-exposes-info-of-29-million-members/