MalwarebytesÐû²¼2020Äê¶ñÒâÈí¼þ״̬±¨¸æ£»Ë¼¿ÆTalosÅû¶ImageGear¿âÖжà¸ö´úÂëÖ´ÐÐÎó²î
Ðû²¼Ê±¼ä 2020-02-121.΢ÈíÐû²¼2ÔÂWindowsÇå¾²¸üУ¬ÐÞ¸´99¸öÎó²î
΢ÈíÐû²¼2ÔÂWindowsÇå¾²¸üУ¬ÕâÒ²ÊÇWindows 7Óû§µÚÒ»´Î²»»á»ñµÃÃâ·ÑµÄÇå¾²¸üС£ÔÚ±¾ÔµÄÇå¾²¸üÐÂÖУ¬Î¢ÈíÐÞ¸´ÁË99¸öÎó²î£¬ÆäÖаüÀ¨IE 0day£¨CVE-2020-0674£©£¬¸ÃÎó²îÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Ó㬽¨ÒéÓû§¾¡¿ì×°ÖøüС£³ý´ËÖ®Í⣬΢Èí»¹³ÆÓÐ3¸öÎó²îÒѹûÕæÅû¶£¬µ«Î´ÔÚÒ°ÍⱻʹÓ㬰üÀ¨Windows InstallerÌáȨÎó²î£¨CVE-2020-0683ºÍCVE-2020-0686£©ÒÔ¼°Î¢Èíä¯ÀÀÆ÷ÐÅϢй¶Îó²î£¨CVE-2020-0706£©¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsofts-february-2020-patch-tuesday-fixes-99-flaws-ie-0day/
2.˼¿ÆTalosÅû¶ImageGear¿âÖжà¸ö´úÂëÖ´ÐÐÎó²î

˼¿ÆTalosÅû¶Accusoft ImageGear¿âÖз¢Ã÷µÄ¶à¸ö´úÂëÖ´ÐÐÎó²î¡£ImageGear¿âÊÇÒ»¸öÎĵµ-ͼÏñ¿ª·¢Ö°Ô±¹¤¾ß°ü£¬¿É×ÊÖúÓû§¾ÙÐÐͼÏñת»»¡¢½¨Éè¡¢±à¼µÈ²Ù×÷¡£Ñо¿Ö°Ô±·¢Ã÷ImageGear 19.5.0°æ±¾µÄigcore19d.dll±£´æ¶à¸ö´úÂëÖ´ÐÐÎó²î£¬°üÀ¨CVE-2019-5187¡¢CVE-2020-6063~CVE-2020-6067¼°CVE-2020-6069¡£AccusoftÒѾÔÚImageGear 19.6ÖÐÐÞ¸´ÁËÕâЩÎó²î¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2020/02/accusoft-imagegear-code-execution-feb-2020.html
3.MalwarebytesÐû²¼2020Äê¶ñÒâÈí¼þ״̬±¨¸æ
Malwarebytes LabsÐû²¼2020Äê¶ñÒâÈí¼þ״̬±¨¸æ£¬±¨¸æÖ¸³öÓëÕë¶ÔWindows PCµÄÍþвÏà±È£¬MacÍþв³ÊÖ¸Êý¼¶ÔöÌí¡£MacÍþвµÄ×ÜÊýĿͬ±ÈÔöÌíÁË400£¥ÒÔÉÏ£¬µ«ÕâÒ»Êý×ÖÒ»¶¨Ë®Æ½ÉÏ¿ÉÄÜÊܵ½2019ÄêMalwarebytes MacÓû§ÈºÔöÌíµÄÓ°Ïì¡£¶Ôµ¥¸öÖն˶øÑÔ£¬MacÍþвÈÔÈ»±ÈWindows¸ß£¬ÏÕЩΪ2£º1¡£±¨¸æ»¹Ö¸³ö¹¥»÷ÐÔ¹ã¸æÈí¼þ¡¢Ä¾ÂíºÍHackToolsÖ÷µ¼ÁËÕë¶ÔÓªÒµ¶ËµãµÄÈ«ÇòÍþв£¬±ÈÈ¥ÄêͬÆÚÔöÌíÁË13£¥¡£¹¥»÷ÆóÒµµÄÀÕË÷Èí¼þÔ˶¯µÖ´ïÀúÊ·×î¸ßˮƽ£¬RyukºÍSodinokibiµÈ¼Ò×å»®·ÖÔöÌíÁË543£¥ºÍ820£¥¡£EmotetºÍTrickBotÈÔÈ»ÊÇÕë¶ÔÆóÒµµÄÖ÷ÒªÍþв֮һ¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/reports/2020/02/malwarebytes-labs-releases-2020-state-of-malware-report/
4.FBIÖÒÑÔÕë¶ÔÃÀ¹úICSÄÜÔ´²¿·ÖµÄÈí¼þ¹©Ó¦Á´¹¥»÷
¾ÝZDNet±¨µÀ£¬FBIÒÑÏòÃÀ¹ú˽Ӫ²¿·Ö·¢³öÇå¾²¾¯±¨£¬ÖÒÑÔÕýÔÚ¾ÙÐеÄÕë¶ÔÈí¼þÌṩÉ̵ũӦÁ´¹¥»÷Ô˶¯¡£¹¥»÷ÕßÊÔͼʹÓÃÔ¶¿ØÄ¾ÂíKwampirsѬȾÆóÒµ¡£FBIÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬¹¥»÷ÕßÕë¶ÔÈí¼þ¹©Ó¦Á´¹«Ë¾ÊÇΪÁË»á¼ûÊܺ¦ÕßµÄÕ½ÂÔÏàÖúͬ°éºÍ¿Í»§£¬ÆäÖаüÀ¨ÎªÈ«ÇòÄÜÔ´Éú²ú¡¢´«ÊäºÍ·ÖÅÉICSϵͳÌṩ֧³ÖµÄʵÌå¡£¸Ã¶ñÒâÈí¼þ»¹°²ÅÅÔÚÕë¶ÔÒ½ÁÆ¡¢ÄÜÔ´ºÍ½ðÈÚÁìÓò¹«Ë¾µÄ¹¥»÷ÖС£FBI²¢Î´ÔÚ¾¯±¨ÖбêʶĿµÄÈí¼þ¹©Ó¦ÉÌ£¬Ò²Ã»ÓбêʶÈÎºÎÆäËüÊܺ¦Õߣ¬µ«ÌṩÁËIOCºÍYARA¹æÔò¡£×éÖ¯¿ÉÒÔʹÓÃËüÃÇÀ´É¨ÃèÄÚ²¿ÍøÂ磬²éÕÒKwampirs RATµÄºÛ¼£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fbi-warns-about-ongoing-attacks-against-software-supply-chain-companies/
5.Êý°Ù¸öDocker×¢²á±íÒòÉèÖùýʧй¶¹«Ë¾Ãô¸ÐÐÅÏ¢
Palo Alto Networks±¨¸æ³ÆÔÚÊý°Ù¸ö¿É´Ó»¥ÁªÍø¹ûÕæ»á¼ûµÄDocker×¢²á±íÖз¢Ã÷ÁËÊýÒÔǧ¼ÆµÄ̻¶´úÂë´æ´¢¿â¡£ÕâЩDocker×¢²á±í°üÀ¨Ó¦ÓóÌÐòÔ´´úÂëºÍÀúÊ·°æ±¾µÈÒªº¦ÓªÒµÊý¾Ý£¬¿ÉÄÜ»áʹ×éÖ¯µÄÕû¸öÔÆ»ù´¡¼Ü¹¹ÃæÁÙΣº¦¡£Ì»Â¶»¹¿ÉÄܵ¼ÖÂרÓÐ֪ʶ²úȨ±»µÁ¡¢Òªº¦ÔËÓªÊý¾Ý±»Ð®ÖÆ»ò¶ñÒâ´úÂë±»×¢Èë¡£Ñо¿Ö°Ô±Ï뷨ͨ¹ý·´ÏòDNS²éÕÒ¼°TLSÖ¤ÊéÖеÄcname½«ËÄ·ÖÖ®Ò»µÄ̻¶Docker×¢²á±í¹éÒòÓÚÑо¿»ú¹¹¡¢ÁãÊÛÉÌ¡¢ÐÂÎÅýÌå×éÖ¯ºÍÊÖÒÕ¹«Ë¾¡£ÓÉÓÚÿ¸ö×¢²á±íͨ³£¶¼±»¶à¸ö¿Í»§¶Ë»á¼û£¬ÕâÒâζ×ÅËùÓÐÀÈ¡²¢ÔËÐоµÏñµÄ¿Í»§¶Ë¶¼ÈÝÒ×Êܵ½Ë𺦡£ÕâÖÖÉèÖùýʧµÄµ÷Ï¢±øÂԺܼòÆÓ£¬¿ÉÒÔͨ¹ýÌí¼Ó·À»ðǽ¹æÔòÒÔ±ÜÃâ´ÓInternet»á¼û×¢²á±í£¬ÒÔ¼°ÔÚËùÓÐAPIÇëÇóÖÐÇ¿ÖÆÖ´ÐÐÉí·ÝÑéÖ¤±êÍ·À´Íê³É¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/misconfigured-docker-registries-expose-thousands-repositories
6.Ê¥µØÑǸçѧǰ½ÌÓý»ú¹¹EESй¶ѧÁäǰ¶ùͯÊý¾Ý
¹¥»÷Õß²»·¨»á¼ûÁËλÓÚ¼ÓÀû¸£ÄáÑÇÖÝÊ¥µØÑǸçµÄѧǰ½ÌÓý»ú¹¹Enrichment Systems£¬Inc£¨EES£©µÄÔ±¹¤µç×ÓÓʼþÕÊ»§£¬²¢ÇÒ¿ÉÄÜÒѾÉó²éÁËâïÊѺÍѧÉúµÄÃô¸ÐÐÅÏ¢¡£¸Ã·ÇÓªÀû×éÖ¯ÖÂÁ¦ÓÚΪµÍÊÕÈë¼ÒÍ¥µÄ18¸öÔÂÖÁ5ËêµÄ¶ùͯÌṩ·þÎñ£¬¸Ã×éÖ¯ÔÚÍøÕ¾ÉϵÄÊý¾Ýй¶֪ͨÖÐÌåÏÖ£¬ÆäÔ±¹¤ÕË»§ÔÚ2019Äê5ÔÂ27ÈÕÖÁ2019Äê7ÔÂ15ÈÕÖ®¼äÊܵ½Î´¾ÊÚȨµÄ»á¼û£¬¿ÉÄÜÔÚ¸ÃÊÂÎñÖÐй¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢²ÆÎñÐÅÏ¢¡¢Ò½Áưü¹ÜÐÅÏ¢¡¢Ñ§Éú½ÌÓýµµ°¸ÒÔ¼°²¡ÀúºÍÖÎÁÆÐÅÏ¢¡£EESÔÊÐíΪÊÜÓ°ÏìµÄÈËÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØºÍÉí·Ý±£»¤·þÎñ¡£
ÔÎÄÁ´½Ó£º
https://hotforsecurity.bitdefender.com/blog/data-breach-hits-san-diego-low-income-preschool-provider-22261.html


¾©¹«Íø°²±¸11010802024551ºÅ