ThalesµÄ²úÆ·±£´æÎó²î£¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸£»LuciferµÄбäÌåÕë¶ÔLinuxϵͳ£¬ÓëWindows°æ±¾¹¦Ð§ÏàËÆ
Ðû²¼Ê±¼ä 2020-08-211.ThalesµÄ²úÆ·±£´æÎó²î£¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸

IBMµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷ThalesµÄ²úÆ·µÄͨѶģ¿éÖб£´æÑÏÖØÎó²î£¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-15858£¬ÓÚ2019Äê9ÔÂÊ×´ÎÔÚThalesµÄCinterion EHS8 M2MÄ£¿éÖб»·¢Ã÷£¬²¢ÓÚ2020Äê2Ô±»ÐÞ¸´¡£ØÊºó»¹·¢Ã÷Ëü»¹»áÓ°ÏìÆäËûÊ®¸öÄ£¿é¡£¸ÃÎó²îÓë°üÀ¨ÓмÓÃÜÃÜÔ¿¡¢ÃÜÂëºÍÖ¤ÊéÖ®ÀàÐÅÏ¢µÄJava´úÂëÓйأ¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÈÆ¹ýÇå¾²»úÖÆ²¢»á¼ûÕâЩÐÅÏ¢£¬È»ºóʹÓøÃÐÅÏ¢À´¿ØÖÆ×°±¸»ò»á¼û°üÀ¨¸Ã×°±¸µÄÍøÂç¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/vulnerability-thales-product-could-expose-millions-iot-devices-attacks
2.LuciferµÄбäÌåÕë¶ÔLinuxϵͳ£¬ÓëWindows°æ±¾¹¦Ð§ÏàËÆ

NETSCOUT ATLASÑо¿Ö°Ô±·¢Ã÷ÁËLuciferµÄбäÌ壬¿ÉÕë¶ÔLinuxϵͳ£¬ÓëWindows°æ±¾¹¦Ð§ÏàËÆ¡£Lucifer¿ÉÒÔ½«Windows×°±¸×ª±äΪMonero¼ÓÃÜ»úеÈË£¬²¢³ÉΪÆä½©Ê¬ÍøÂçµÄÒ»²¿·Ö¡£Õë¶ÔLinuxϵͳµÄбäÌåÓëWindows°æ±¾¹¦Ð§ÏàËÆ£¬°üÀ¨ÓÃÓÚ¼ÓÃÜÐ®ÖÆºÍÆô¶¯»ùÓÚTCP¡¢UCPºÍ»ùÓÚICMPµÄ·ººé¹¥»÷µÄÄ£¿é£¬²¢ÇÒÊÜѬȾµÄLinux×°±¸Ò²¿ÉÒÔ±»ÓÃÓÚ»ùÓÚHTTPµÄDDoS¹¥»÷¡£³ý´ËÖ®Í⣬´Ë´ÎÉý¼¶»¹À©Õ¹ÁËWindows°æ±¾µÄ¹¦Ð§£¬ÒÔʹÓÃMimikatz¹¤¾ßÇÔȡƾ֤²¢ÌáÉýȨÏÞ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/lucifer-cryptomining-ddos-malware-now-targets-linux-systems/
3.P2P½©Ê¬ÍøÂçFritzFrogͨ¹ýSSH¹¥»÷Linux·þÎñÆ÷

ÍøÂçÇå¾²¹«Ë¾Guardicore·¢Ã÷P2P½©Ê¬ÍøÂçFritzFrog¿Éͨ¹ýSSH¹¥»÷Linux·þÎñÆ÷¡£ÔÚ2020Äê֮ǰ£¬FritzFrogÒѹ¥»÷ÁËÖÁÉÙ500̨Õþ¸®ºÍÆóÒµSSH·þÎñÆ÷£¬Õë¶ÔÈ«ÇòÕþ¸®¡¢½ÌÓý¡¢½ðÈÚ¡¢Ò½Áƺ͵çÐÅÐÐÒµ¡£FritzFrogÊÇÓÉGolang±àдµÄ£¬ËüÒÔifconfigºÍnginxµÄÃûÒå½â°ü¶ñÒâÈí¼þ£¬²¢Í¨¹ý1234¶Ë¿ÚÀ´¼àÌý·¢Ë͵ÄÏÂÁî¡£FritzFrogµÄÖ÷ҪĿµÄÊÇÍÚ¾ò¼ÓÃÜÇ®±Ò£¬ÈôÊÇ·þÎñÆ÷ÉϵÄÀú³ÌÕ¼ÓÃÁËCPU×ÊÔ´£¬Ôò¿ÉÄܻᱻɱËÀ£¬´Ó¶øÎª¿ó¹¤Ìṩ¾¡¿ÉÄܶàµÄ¹¦Ð§¡£ÏÖÔÚÒÑÔÚÒ°Íâ·¢Ã÷ÁË20¶àÖÖ±äÌå¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-fritzfrog-p2p-botnet-has-breached-at-least-500-enterprise-government-servers/
4.Êý¾Ý¿âÉèÖùýʧµ¼ÖÂ2.35ÒÚÓû§Ð¡ÎÒ˽¼ÒÐÅϢй¶

Ñо¿Ö°Ô±³Æ£¬É罻ýÌåÊý¾Ý¾¼ÍÈËÒòÔÚÏßÊý¾Ý¿âÉèÖùýʧ£¬µ¼ÖÂ2.35ÒÚÓû§Ð¡ÎÒ˽¼ÒÐÅϢй¶£¬ÕâЩÄÚÈÝÎÞÐèÈκÎÃÜÂë»òÆäËûÉí·ÝÑéÖ¤¼´¿ÉÔÚÏß»á¼û¡£Ð¹Â¶ÐÅϢΪInstagramÖеÄ1.92ÒÚСÎÒ˽¼Ò×ÊÁÏ£¬TikTokÖеÄ4200ÍòСÎÒ˽¼Ò×ÊÁÏÒÔ¼°YouTubeÖеÄ400ÍòСÎÒ˽¼Ò×ÊÁÏ£¬°üÀ¨ÕæÊµÐÕÃû¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬ¡¢ÕÊ»§ËµÃ÷¡¢ÄêËê¡¢ÐÔ±ðµÈ£¬²¿·Ö»¹°üÀ¨µç»°ºÅÂë»òµç×ÓÓʼþµØµã¡£Ö»¹Ü¸ÃÊý¾Ý¿âÔÚÊ״ιûÕæºóÈý¸öСʱ¾Í±»¹Ø±ÕÁË£¬µ«Éв»ÇåÎúûÓÐÃÜÂëµÄÐÅÏ¢ÔÚÍøÉϱ£´æÁ˶೤ʱ¼ä¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/data-firm-exposes-235m-social/
5.MITERÐû²¼ÒÑÍùÁ½Äê×î³£¼ûµÄ25¸öÎó²îÁбí

MITERÐû²¼ÁËÒÑÍùÁ½ÄêÄÚ×î³£¼ûµÄ25¸öÎó²îÁÐ±í¡£ÎªÁËÁгö¸ÃÎó²î£¬MITERƾ֤¹ú¼ÒÎó²îÊý¾Ý¿â£¨NVD£©2018ÄêºÍ2019Äê³£¼ûÎó²îºÍ̻¶£¨CVE£©Êý¾Ý£¬»ùÓÚÑÏÖØÐÔºÍÆÕ±éÐÔ¶Ôÿ¸öÎó²î¾ÙÐÐÁËÆÀ·Ö£¬ÒԿ͹۵ØÏàʶĿ½ñÔÚÏÖʵÌìÏÂÖп´µ½µÄÎó²î¡£MITRE 2020 CWE Top 25ÖÐÅÅÃûµÚÒ»µÄΪ¿çÕ¾µã¾ç±¾£¨XSS£©£¬ÓÉÓÚÆä³ýÁËÒ×ÓÚ±»Ê¹ÓÃÖ®Í⣬»¹¿ÉÒÔ±»¹¥»÷ÕßÓÃÀ´ÍêÈ«¿ØÖÆÏµÍ³¡¢ÇÔÈ¡Ãô¸ÐÊý¾Ý»ò´¥·¢¾Ü¾ø·þÎñ£¨DoS£©¡£³ý´ËÖ®Í⣬ÉÐÓÐÔ½½çдÎó²î¡¢ÊäÈëÑéÖ¤²»×¼È·ºÍÔ½½ç¶ÁÈ¡µÈÎó²î¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/mitre-shares-this-years-top-25-most-dangerous-software-bugs/
6.CISAºÍFBIÖÒÑÔ³¯ÏÊRAT BLINDINGCANÕë¶ÔÃÀ¹ú¹ú·Àµ¥Î»

CISAºÍFBIÍŽáÐû²¼¾¯±¨£¬Åû¶Á˳¯ÏʺڿÍÔÚÕë¶ÔÃÀ¹ú¹ú·ÀºÍº½¿ÕÁìÓòµÄµÄ¹¥»÷ÖÐʹÓõÄÔ¶³Ì»á¼ûľÂíBLINDINGCAN¡£´Ë´Î¹¥»÷ʹÓÃÁËÓëÍù³£ÏàͬµÄģʽ£¬³¯ÏʺڿÍð³ä×ÅÃû¹«Ë¾µÄÕÐÆ¸Ö°Ô±£¬ÒÔ¿¿½üËùÐ蹫˾µÄÔ±¹¤¡£ÔÚÃæÊÔÀú³ÌÖУ¬ºÚ¿Í»á¸øÊܺ¦Õß·¢ËͶñÒâPDFÎĵµÒÔ°²ÅŶñÒâÈí¼þ¡£CISAר¼ÒÌåÏÖ£¬³¯ÏʺڿͻáʹÓøöñÒâÈí¼þ»á¼ûÊܺ¦Õßϵͳ£¬¾ÙÐÐÕì̽£¬È»ºóÍøÂçÓйØÒªº¦¾üʺÍÄÜÔ´ÊÖÒÕµÄÇ鱨¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/us-govt-exposes-new-north-korean-blindingcan-backdoor-malware/


¾©¹«Íø°²±¸11010802024551ºÅ