SymantecÐû²¼2020ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆ±¨¸æ£»Î¢ÈíÐÞ¸´Azure Sphere IoTƽ̨ÖеÄ4¸öÎó²î

Ðû²¼Ê±¼ä 2020-08-27

1.SymantecÐû²¼2020ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆ±¨¸æ


1.jpg


ÃÀ¹úÍøÂçÇå¾²³§ÉÌSymantecÐû²¼2020ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆ±¨¸æ¡£±¨¸æÏÔʾ £¬Óëǰ¼¸¸ö¼¾¶ÈÏà±È £¬2020ÄêµÚ¶þ¼¾¶È¼ÓÃÜÐ®ÖÆµÄÊýÄ¿ÔöÌíÁË163£¥¡£¾ÝÐÂÎÅÈËÊ¿³Æ £¬¼ÓÃÜÐ®ÖÆÔ˶¯ÊýÄ¿µÄ¼¤ÔöºÜ¿ÉÄÜÊÇÓÉ·ÓÉÆ÷½©Ê¬ÍøÂçÒýÆðµÄ £¬¶ø´ËÀàÊÂÎñÒÔÇ°Ò²ÔøÔÚÀ­¶¡ÃÀÖÞ±¬·¢¹ý¡£ºÚ¿Í×éÖ¯»áÈëÇÖ¼ÒÓ÷ÓÉÆ÷ £¬²¢¸ü¸ÄDNSÉèÖÃÒÔÐ®ÖÆÕýµ±µÄÍøÂçÁ÷Á¿ £¬½«±»ÈëÇֵķÓÉÆ÷ÓÃ×÷ÊðÀí»òÀÄÓÃËüÃÇÀ´ÌᳫDDoS¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/browser-based-cryptojacking-sees-sudden-spike-in-activity-in-q2-2020/


2.΢ÈíÐÞ¸´Azure Sphere IoTƽ̨ÖеÄ4¸öÎó²î


2.jpg


΢ÈíÐû²¼Îó²î²¹¶¡ £¬ÐÞ¸´Azure Sphere IoTƽ̨ÖеÄ4¸öÎó²î¡£´Ë´ÎÐû²¼µÄ²¹¶¡³ÌÐòÐÞ¸´ÁË2¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²îºÍ2¸öÌáȨÎó²î £¬ÕâЩÎó²î¶¼ÊÇÓÉCisco TalosµÄÇå¾²Ñо¿Ö°Ô±ÓÚ7Ô·ݷ¢Ã÷¡£µÚÒ»¸öΪREAD_IMPLIES_EXEC personalityδÊðÃû´úÂëÖ´ÐÐÎó²î £¬µÚ¶þ¸öRCEÎó²î±£´æÓÚ/proc/thread-self/ memÖС£±ðµÄ £¬È¨ÏÞ»á¼û¿ØÖƹ¦Ð§Öб£´æÒ»¸öÌáȨÎó²î £¬¶øµÚ¶þ¸öÌáȨÎó²î±£´æÓÚAzure Sphere 20.06µÄuid_map¹¦Ð§ÖС£Î¢ÈíÌåÏÖ»áÈ·±£½â¾öÕâЩÎÊÌⲢΪ¿Í»§Ìṩ¸üР£¬¿ÉÊǾܾøÐû²¼ÈκÎCVEs¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/four-more-bugs-patched-in-microsofts-azure-sphere-iot-platform/158643/


3.CISAµÈ4¼Ò»ú¹¹ÖÒÑÔ³¯ÏÊBeagleBoyzÃé׼ȫÇòÒøÐÐ


3.jpg


CISA¡¢²ÆÎñ²¿¡¢FBIºÍUSCYBERCOMÍŽáÐû²¼ÖÒÑÔ £¬³¯ÏʺڿÍ×éÖ¯BeagleBoyzÃé׼ȫÇòÒøÐС£¾Ý¼¸¼Ò»ú¹¹Ðû²¼µÄÍŽá×Éѯ±¨¸æ £¬×Ô2020Äê2ÔÂÒÔÀ´ £¬BeagleBoyzÒ»Ö±ÔÚʹÓöñÒâÔ¶³Ì»á¼û¹¤¾ßͨ¹ý»¥ÁªÍøÇÀ½ÙÒøÐÐ £¬ÏÖÔÚÒÑ´ÓÈ«ÇòÒøÐÐÇÔÈ¡ÁËÊý°ÙÍòÃÀÔª¡£¾ÝÃÀ¹úÍøÂç˾ÁµÄÍÆÎÄ £¬BeagleBoyzÏÖÔÚÕýÔÚ¾ÙÐÐÒ»ÏîÒ»Á¬µÄÒøÐÐÇÀ½ÙÍýÏë £¬Õë¶Ô30¶à¸ö¹ú¼ÒµÄÒøÐÐ £¬ÊÔͼÇÀ½Ù20ÒÚÃÀÔª¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/alerts/aa20-239a


4.FBIÏßÈËÅû¶ÊÖÒÕÖ§³ÖÕ©Æ­ÍÅ»ïµÄÄÚ²¿ÔË×÷ÇéÐÎ


4.jpg


FBIÏßÈËÅû¶ÊÖÒÕÖ§³ÖÕ©Æ­ÍÅ»ïµÄÄÚ²¿ÔË×÷ÇéÐΡ£¸ÃÃûÏßÈ˵ĽÇɫΪ¾­¼ÍÈË £¬Ö÷ÒªÈÏÕæ³öÊÛºô½ÐÁ÷Á¿ £¬Îª¸Ã´ËÀàȦÌ׵ĵڶþ½×¶ÎÈÏÕæÈË¡£µÚÒ»½×¶ÎΪÐû²¼ÉÌ £¬ÆäÊ×ÏÈ»áÔÚFacebookÖ®ÀàµÄƽ̨ÉÏÕë¶ÔÖÖÖÖÖ÷Ì⣨ÀýÈçÂÃÐеȣ©Í¶·ÅÔÚÏß¹ã¸æ £¬²¢ÓÕʹÊܺ¦Õßµã»÷¸Ã¹ã¸æÒÔ½«ÆäÖØ¶¨Ïòµ½¶ñÒâÍøÕ¾¡£¾­¼ÍÈËÔòÊdz䵱Ðû²¼É̺ͺô½ÐÖÐÐÄÖ®¼äÖнé £¬½«ºô½ÐÁ÷Á¿³öÊÛ¸øÔ¸Ò⹺ÖÃËüµÄºô½ÐÖÐÐÄ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-informant-provides-a-glimpse-into-the-inner-workings-of-tech-support-scams/


5.¶íÂÞ˹ÖÊÁ¿ÏµÍ³Åû¶WhatsAppÖеÄÐÂÐÍÕ©Æ­·½·¨


5.jpg

¶íÂÞ˹ÖÊÁ¿ÏµÍ³£¨Roskachestvo£©Åû¶WhatsAppÖеÄÐÂÐÍÕ©Æ­·½·¨¡£Roskachestvo¸±Ö÷¹ÜIlya LoevskyÌåÏÖ £¬WhatsAppÖеľø´ó´ó¶¼Ú²Æ­ÐÐΪ¶¼ÊÇͨ¹ýÉç»á¹¤³Ì±¬·¢µÄ £¬ºÚ¿Í»áͨ³£ÒÔGoogle¡¢Æ»¹û¡¢FacebookµÈ¹«Ë¾µÄÃûÒå £¬Ê¹ÓÃCOVID-19Ö®ÀàµÄÈÈÃÅ»°Ìâ»òÓÐÀû¿ÉͼµÄ²úÆ· £¬ÓÕʹÓû§µã»÷ÊÜѬȾµÄÁ´½Ó»òÏÂÔØ¿ÉÒÉÎļþ¡£Êܺ¦ÕßÒ»µ©µã»÷¶ñÒâÁ´½Óºó £¬Ôò¿ÉÄܻᱬ·¢ÈκÎÊÂÇé £¬´ÓÇÔȡСÎÒ˽¼ÒÊý¾Ýµ½ÇÔÈ¡ÆäÐÅÓÿ¨ÖÐ×ʽð¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/08/the-russian-quality-system-roskachestvo.html


6.Conti´î½¨¹ûÕæÊý¾Ý¿â £¬½ÓÄÉË«ÏòÀÕË÷Õ½ÂÔ


6.jpg

ÀÕË÷Èí¼þ×éÖ¯Conti´î½¨¹ûÕæÊý¾Ý¿â £¬²¢½ÓÄÉË«ÏòÀÕË÷Õ½ÂÔ¡£ÏÖÔÚ £¬Ðí¶à´óÐÍÀÕË÷Èí¼þ×éÖ¯½ÓÄÉÁË´ËÀàÕ½ÂÔ £¬ÈôÊÇÊܺ¦Õß²î±ðÒâÖ§¸¶Êê½ð £¬ÎÞÂÛËûÃÇÊÇ·ñ»Ö¸´Á˱»¼ÓÃܵÄԭʼÎļþ £¬¸Ã×éÖ¯¶¼½«×ß©°üÀ¨ÆäÎļþ¡£ÐµĺڿÍ×éÖ¯ContiÔڴÊý¾Ý¿âºó £¬ÒѾ­ÁгöÁË26¼ÒÔâµ½¹¥»÷ÇҾܾøÖ§¸¶Êê½ðµÄ¹«Ë¾ £¬²¢ÒѾ­×ß©ÁËÕâЩ¹«Ë¾µÄÎļþ¡£¾Ý³Æ £¬ContiÓë×ÅÃûµÄRyukÊÇÓÉͳһ×éÖ¯ÔËÓªµÄ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/conti-ryuk-joins-the-ranks-of-ransomware-gangs-operating-data-leak-sites/