±ÈÀûʱBelnetÔâµ½DDoS¹¥»÷£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û£»DellÐû²¼Çå¾²¸üУ¬ÐÞ¸´¶à¸öÒѾ±£´æ12ÄêµÄÎó²î
Ðû²¼Ê±¼ä 2021-05-061.±ÈÀûʱBelnetÔâµ½DDoS¹¥»÷£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û

±ÈÀûʱBelnetÓÚÖܶþÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨»á¼û¡£Belnet£¨±ÈÀûʱ ¹ú¼ÒÑо¿ºÍ½ÌÓýÍøÂ磩ÊÇΪ±ÈÀûʱ½ÌÓý»ú¹¹¡¢Ñо¿ÖÐÐÄ¡¢¿ÆÑ§Ñо¿ËùºÍÕþ¸®·þÎñÌṩ·þÎñµÄ»¥ÁªÍøÌṩÉÌ¡£¾ÝÔ¤¼Æ£¬Õâ´Î¹¥»÷Ó°ÏìÁ˱ÈÀûʱµÄ200¶à¸ö×éÖ¯£¬°üÀ¨Õþ¸®¡¢¾¯Ô±¾ÖºÍCOVID-19ÒßÃçÔ¤¶©µÈÍøÕ¾¡£ÏÖÔÚ£¬±ÈÀûʱÕþ¸®ÕýÔÚÊÓ²ì´ËÊÂÎñ£¬Éв»ÇåÎú·¢¶¯´Ë´Î¹¥»÷µÄ¹¥»÷Õß¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/belgium-was-hit-by-a-massive-cyberattack-532812.shtml
2.DellÐû²¼Çå¾²¸üУ¬ÐÞ¸´¶à¸öÒѾ±£´æ12ÄêµÄÎó²î

DellÐû²¼Çå¾²¸üУ¬ÐÞ¸´DBUtil BIOSÇý¶¯³ÌÐòÖÐÒѾ±£´æ12ÄêµÄ5¸öÎó²î¡£SentinelLabsÌåÏÖ£¬ÕâЩÎó²î×Ô2009ÄêÒÔÀ´Ò»Ö±±£´æ£¬Ó°ÏìÁËDellËùÓеĄ̈ʽ»ú¡¢Ìõ¼Ç±¾µçÄÔÇå¾²°åµçÄÔ¡£Õâ5¸öÎó²î±»×·×ÙΪCVE-2021-21551£¬CVSSÆÀ·ÖΪ8.8£¬»®·ÖΪ2¸öÄÚ´æË𻵵¼ÖµÄÌáȨÎó²î£¬2¸öȱ·¦ÊäÈëÑéÖ¤µ¼ÖµÄÌáȨÎó²îºÍ1¸ö´úÂëÂß¼ÎÊÌâµ¼Öµľܾø·þÎñÎó²î¡£ÏÖÔÚ£¬ÕâЩÎó²îÉÐδ±»ÔÚҰʹÓá£
ÔÎÄÁ´½Ó£º
https://threatpost.com/dell-kernel-privilege-bugs/165843/
3.CiscoÐû²¼Çå¾²¸üУ¬ÐÞ¸´¶à¿î²úÆ·ÖÐÑÏÖØµÄÎó²î

CiscoÐû²¼Çå¾²¸üУ¬ÐÞ¸´Á˶à¿î²úÆ·ÖÐÑÏÖØµÄÎó²î¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪSD-WAN vManageÖÐδÊÚȨµÄÐÂÎÅ´¦Öóͷ£Îó²î£¨CVE-2021-1468£©¡¢ÌáȨÎó²îËÈË£¨CVE-2021-1505£©ÒÔ¼°HyperFlex HXÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2021-1497£©¡£±ðµÄ£¬¸üл¹ÐÞ¸´ÁËÆäËû²úÆ·ÖеĶà¸öÎó²î£¬°üÀ¨í§Òâ´úÂëÖ´ÐÐÎó²î¡¢ÌáȨÎó²îºÍ¾Ü¾ø·þÎñÎó²îµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-bugs-allow-creating-admin-accounts-executing-commands-as-root/
4.QualysÅû¶EximÖÐÓ°ÏìÊý°ÙÍǫ̀·þÎñÆ÷µÄÎó²î21Nails

QualysÅû¶EximÓʼþ´«ÊäÊðÀí£¨MTA£©Èí¼þÓ°ÏìÊý°ÙÍǫ̀·þÎñÆ÷µÄ21¸öÎó²î£¬Í³³ÆÎª21Nails¡£ÕâЩÎó²îÓÐ10¸ö¿É±»Ô¶³ÌʹÓã¬ÁíÍâ11¸öΪÍâµØÎó²î£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿É×éºÏʹÓÃÕâЩÎó²î£¬À´Ô¶³ÌÖ´ÐдúÂ룬²¢ÔÚExim ServerÉÏ»ñµÃrootȨÏÞ¡£ÕâЩÎó²î»®·ÖΪqueue_run£¨£©ÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2020-28011£©¡¢tls-openssl.cÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-28018£©µÈ¡£Ñо¿Ö°Ô±½¨ÒéÓû§Á¬Ã¦Éý¼¶µ½×îеĿÉÓÃExim°æ±¾¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-21nails-exim-bugs-expose-millions-of-servers-to-attacks/
5.ºÚ¿Íͨ¹ýDiscord·Ö·¢Panda StealerÀ´ÇÔÈ¡¼ÓÃÜÇ®±Ò

Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷£¬ºÚ¿Íͨ¹ýDiscord·Ö·¢Panda StealerÀ´ÇÔÈ¡¼ÓÃÜÇ®±Ò£¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢ÈÕ±¾ºÍµÂ¹úµÈ¹ú¼ÒºÍµØÇø¡£´Ë´Î¹¥»÷Ô˶¯µÄʹÓÃÁËαװ³ÉÆóÒµ±¨¼ÛÇëÇóµÄ´¹ÂÚÓʼþ£¬Í¨¹ýÆôÓöñÒâºêµÄ.XLSMÎĵµºÍ°üÀ¨¶ñÒâExcel¹«Ê½µÄ.XLSMÁ½ÖÖ·½·¨£¬À´·Ö·¢Panda Stealer¡£¸Ã¶ñÒâÈí¼þÊÇCollector StealerµÄ±äÖÖ£¬ÒÑÍùÔøÔÚ°µÍøºÍTelegramÉϳöÊÛ£¬¿ÉÇÔÈ¡ETH¡¢LTC¡¢BCN¡¢DASHµÈ¼ÓÃÜÇ®±Ò£¬ä¯ÀÀÆ÷CookieÒÔ¼°NordVPN¡¢Telegram¡¢DiscordºÍSteamµÈÕÊ»§Æ¾Ö¤¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/panda-stealer-dropped-in-discord-to-steal-user-cryptocurrency/
6.FireEyeÐû²¼ÓйØUNC2529´¹ÂÚÔ˶¯µÄÆÊÎö±¨¸æ

FireEyeÐû²¼ÁËÓйØUNC2529´¹ÂÚÔ˶¯µÄÆÊÎö±¨¸æ¡£FireEyeµÄMandiantÍŶӷ¢Ã÷2020Äê12ÔÂ2ÈÕ£¬ºÍ2020Äê12ÔÂ11ÈÕÖÁ12ÔÂ18ÈÕÖ®¼ä±¬·¢µÄÁ½ÂÖ´¹ÂÚÔ˶¯£¬Ö÷ÒªÒÔÃÀ¹ú¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑǵĹ«Ë¾ÎªÄ¿µÄ¡£¹¥»÷Õß×ܹ²Ê¹ÓÃÁËÁè¼Ý50¸öÓò£¬Ê¹Óö¨ÖƵĴ¹ÂÚÓʼþ£¬Õë¶Ô°üÀ¨¹ú·À¡¢Ò½Ò©¡¢ÔËÊä¡¢¾üʺ͵ç×ӵȲî±ðµÄÐÐÒµ¡£ÔÚÒ»´Î¹¥»÷Ô˶¯ÖУ¬UNC2529ÀÖ³ÉÈëÇÖÁËÃÀ¹úÒ»¼Ò¹©ÎÂŝ֯Àä·þÎñ¹«Ë¾µÄÓò²¢¸Ä¶¯ÁËÆäDNS¼Í¼¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2021/05/unc2529-triple-double-trifecta-phishing-campaign.html


¾©¹«Íø°²±¸11010802024551ºÅ