FBIºÍNSAÍŽáÅû¶¶íÂÞ˹Õë¶ÔLinuxµÄ¶ñÒâÈí¼þDrovorub£»ºÚ¿ÍʹÓÃWindowsºÍIE11ÖеÄ0day¹¥»÷º«¹ú¹«Ë¾

Ðû²¼Ê±¼ä 2020-08-14

1.FBIºÍNSAÍŽáÅû¶¶íÂÞ˹Õë¶ÔLinuxµÄ¶ñÒâÈí¼þDrovorub


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


FBIºÍNSAÍŽáÐû²¼Çå¾²¾¯±¨£¬Åû¶Á˶íÂÞ˹ºÚ¿ÍʹÓõĶñÒâÈí¼þDrovorub£¬ÆäÕë¶ÔLinuxϵͳֲÈëºóÃųÌÐò¡£Æ¾Ö¤FBIºÍNSAÍøÂçµÄÖ¤¾Ý£¬¸Ã¶ñÒâÈí¼þ¿ÉÄÜÊôÓÚ¶íÂÞ˹ºÚ¿Í×éÖ¯APT28£¨Fancy Bear£¬Sednit£©¡£NSAÌåÏÖ£¬DrovorubÊÇÒ»¸ö¶à×é¼þϵͳ£¬¾ßÓÐÖ²È벿·Ö¡¢ÄÚºËÄ£¿érootkit¡¢Îļþ´«Ê乤¾ß¡¢¶Ë¿Úת·¢Ä£¿éºÍÏÂÁîÓë¿ØÖÆ£¨C2£©·þÎñÆ÷£¬²¢ÇÒÓÐǿʢµÄ¹¦Ð§£¬Ê¹¹¥»÷ÕßÄܹ»Ö´ÐÐÐí¶à²î±ðµÄ¶ñÒâ²Ù×÷£¬ÀýÈçÇÔÈ¡ÎļþºÍÔ¶³Ì¿ØÖÆÊܺ¦ÕßµÄÅÌËã»ú¡£ÏÖÔڸöñÒâÈí¼þµÄÄ¿µÄÉÐδ¿ÉÖª£¬»ò½«¾ÙÐÐÉÌÒµÌØ¹¤Ô˶¯ÉõÖÁÊǸÉÔ¤ÃÀ¹ú´óÑ¡¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-and-nsa-expose-new-linux-malware-drovorub-used-by-russian-state-hackers/


2.CISAÖÒÑÔÒÔCOVID-19´û¿î¼õÃâΪÖ÷ÌâµÄÍøÂç´¹ÂÚÔ˶¯


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÍøÂçÇå¾²ºÍ»ù´¡½á¹¹Çå¾²¾Ö£¨CISA£©Ðû²¼¾¯±¨£¬ÓкڿÍÒÔCOVID-19´û¿î¼õÃâΪÖ÷ÌâÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬ÒÔ¾ÙÐжñÒâÖØ¶¨ÏòºÍƾ֤ÇÔÈ¡¡£CISAÆÊÎöʦ·¢Ã÷Ò»¸öδ֪ºÚ¿ÍÏò¸÷¸öÁª°îÃñÕþÖ´Ðв¿·ÖÒÔ¼°ÖÝ¡¢µØ·½¡¢²¿ÂäºÍµØÇøÕþ¸®µÄÊÕ¼þÈË·¢ËÍÁËÍøÂç´¹ÂÚµç×ÓÓʼþ£¬¸ÃÓʼþÖ÷ÌâΪSBAÉêÇë¨CÉóºË²¢¼ÌÐø£¬°üÀ¨ÓÐÒ»¸öÖ¸ÏòÐéαSBA¹ÙÍøµÄ¶ñÒâÁ´½Ó¡£Ò»µ©Óû§µã»÷¸ÃÁ´½Ó£¬¾Í»á±»Öض¨Ïòµ½Î±Ôì³ÉSBA¹ÙÍøµÄ´¹ÂÚÍøÒ³£¬²¢±»ÇÔÈ¡µÇ¼ƾ֤¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/alerts/aa20-225a


3.ÃÀ¹úFINRAÖÒÑÔ£¬ÓкڿÍð³äÆä¹ÙÍøÌᳫ´¹ÂÚ¹¥»÷


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÃÀ¹ú½ðÈÚÒµî¿Ïµ¾Ö£¨FINRA£©ÖÒÑÔ£¬ÓкڿÍð³äÆä¹ÙÍøÌᳫ´¹ÂÚ¹¥»÷¡£ÔÚºÚ¿ÍαÔìµÄÍøÕ¾ÖУ¬ÆäURLΪfinnra[.]org £¨ÕæÕýµÄ¹ÙÍøÎªfinra.org£©£¬»¹°üÀ¨¿ÉÓÃÓÚÍøÂçÃô¸ÐÐÅÏ¢µÄ×¢²á±í£¬ÕâЩÄÚÈݶ¼¿ÉÓÃÓÚÕë¶ÔFINRA³ÉÔ±µÄÍøÂç´¹ÂÚ¹¥»÷¡£±ðµÄ£¬BleepingComputer·¢Ã÷¸ÃÐéÎ±ÍøÕ¾Óëx32team.websiteÆÊÎöµ½ÁËͳһ¸öIPµØµã£¬´ËºóÕßÊôÓÚÒ»¸öÔÚ2018Äê»îÔ¾µÄºÚ¿Í×éÖ¯£¬ÏÖÔÚÉÐÎÞ·¨ÕÒµ½Óë¸Ã×éÖ¯Ïà¹ØµÄÆäËûÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-stock-broker-regulator-finra-warns-of-copycat-phishing-site/


4.ºÚ¿ÍʹÓÃWindowsºÍIE11ÖеÄ0day¹¥»÷Ò»¼Òº«¹ú¹«Ë¾


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¿¨°Í˹»ùµÄÑо¿Ö°Ô±·¢Ã÷£¬ºÚ¿ÍʹÓÃWindowsºÍIE11ÖеÄ0day¹¥»÷ÁËÒ»¼Òº«¹ú¹«Ë¾¡£¸Ã¹¥»÷±»³ÆÎªOperation PowerFall£¬ÆäʹÓÃÁËInternet Explorer 11ÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-1380£©ºÍWindows GDI Print / Print Spooler APIÖеÄÒ»¸öÌáȨÎó²î£¨CVE-2020-0986£©¡£ºÚ¿ÍÔÚÔÚÔ¶³Ì»á¼ûÄ¿µÄÅÌËã»úÖ®ºó£¬Ê¹ÓÃÁËÒ»¸öÄ£¿é½¨ÉèÁËÃûΪok.exeµÄÎļþ£¬²¢Ê¹ÓÃCVE-2020-0986ÒÔ¸ü¸ßµÄȨÏÞÔËÐиÃÎļþÖеĶñÒâ´úÂë¡£¿¨°Í˹»ùÆÊÎö·¢Ã÷£¬ ÕâЩÎó²îʹÓóÌÐòÓëÒÑÍùµÄÓÐһЩÏàËÆÖ®´¦£¬²¢ÒÔΪºÚ¿Í×éÖ¯DarkHotel»òÒ²¼ÓÈëÆäÖС£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/windows-ie11-zero-day-vulnerabilities-chained-in-targeted-attack/


5.ºÚ¿ÍÔÚ°µÍø³öÊÛÓ¡¶ÈÁè¼Ý2.1ÍòÃûѧÉúµÄСÎÒ˽¼ÒÐÅÏ¢


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÍøÂçÇå¾²¹«Ë¾ Cyble·¢Ã÷£¬ºÚ¿ÍÔÚ°µÍø³öÊÛÓ¡¶ÈÁè¼Ý2.1ÍòÃûѧÉúµÄСÎÒ˽¼ÒÐÅÏ¢¡£´Ë´ÎÊÂÎñй¶µÄÐÅÏ¢°üÀ¨Ñ§ÉúµÄAadhar¿¨¡¢Ñ§ÉúÖ¤¡¢ÕÕÆ¬¡¢ÍêÕûÊðÃû¡¢ÐÕÃû¡¢µç»°¡¢µç×ÓÓʼþ¡¢ÉúÈÕ¡¢ÐÔ±ð¡¢ÍêÕûµØµã¡¢´óѧ¡¢¿Î³Ì¡¢½áÒµÈÕÆÚ¡¢ÅóÙ­µÄÃû×ÖºÍÅóÙ­µÄºÅÂëµÈÐÅÏ¢¡£Ñо¿Ö°Ô±ÌåÏÖ£¬´Ë´Îй¶¿ÉÄÜÔ´ÓÚÒ»¼Ò½ðÈÚÊÖÒÕ¹«Ë¾¡£ÓÉÓÚÇå¾²²½·¥È±·¦£¬Ó¡¶ÈµÄ¸ß¿Æ¼¼¹«Ë¾Ò»Ö±±¸Êܺڿ͵ĹØ×¢£¬¸ÃÊÂÎñÖкڿͿÉÄÜʹÓÃÁ˽ðÈÚÊÖÒÕ¹«Ë¾ÓÃÓÚ´æ´¢Óû§Êý¾ÝµÄÔÆÏµÍ³ÖеÄÎó²îÌᳫÁ˹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://ciso.economictimes.indiatimes.com/news/data-of-21k-indian-students-on-sale-on-dark-web/77455110


6.Sonatype·¢Ã÷Õë¶Ô¿ªÔ´Èí¼þ¹©Ó¦Á´µÄ¹¥»÷¼¤Ôö430£¥


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


SonatypeÐû²¼±¨¸æ£¬·¢Ã÷Õë¶Ô¿ªÔ´Èí¼þ¹©Ó¦Á´µÄ¹¥»÷¼¤Ôö430£¥¡£Æ¾Ö¤¸Ã±¨¸æ£¬´Ó2019Äê7Ôµ½2020Äê5Ô£¬¹²±¬·¢ÁË929´ÎÈí¼þ¹©Ó¦Á´¹¥»÷£¬Ïà±È֮ϣ¬ÔÚ2015Äê2ÔÂÖÁ2019Äê6ÔµÄËÄÄêÖУ¬Ö»±¬·¢ÁË216Æð´ËÀ๥»÷ÊÂÎñ¡£±ðµÄ£¬¸Ã±¨¸æ»¹Ö¸³ö£¬ÆóÒµÈí¼þ¿ª·¢ÍŶӶԿªÔ´Èí¼þ×é¼þÎó²îµÄÏìӦʱ¼ä²»¾¡Ïàͬ£¬47%µÄ×éÖ¯ÔÚÒ»ÖܺóÒâʶµ½ÁËеĿªÔ´Îó²î£¬51%µÄ×éÖ¯»¨ÁËÒ»¸ö¶àÐÇÆÚµÄʱ¼äÀ´ÐÞ¸´¿ªÔ´Îó²î¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/08/13/surge-in-cyber-attacks-targeting-open-source-software-projects/