AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.07.27-2020.08.02£©
2020-08-03
Ò»¡¢ ÍþвԤ¾¯
¹¥»÷ÕßʹÓÃÐÂÎó²îѬȾTVT DVR×°±¸
¡¾Ðû²¼Ê±¼ä¡¿2020-07-28 09:00:00 GMT
¡¾¸ÅÊö¡¿
½üÆÚ£¬Ñо¿Ö°Ô±ÔÚÅŲéAG¹«Ë¾Íþв²¶»ñϵͳÏà¹ØÈÕÖ¾µÄÀú³ÌÖз¢Ã÷£¬¹¥»÷Õß×îÏÈʹÓÃеÄÎó²î£¨ÒÑÔÚgithubÉϹûÕæ£¬²¢ÎÞCVE±àºÅ£©Ñ¬È¾TVT DVR×°±¸£¬¸ÃÎó²î¾ßÓнÏÖØ´óµÄ¹¥»÷Á÷³Ì£¬¶Ô²¶»ñϵͳ½»»¥ÒªÇ󼫸ߣ»¶ñÒâÔØºÉ¾ÓÉbase64±àÂ룬ºÜÈÝÒ×±»Çå¾²ÍŶÓÒÅ©£»Ê¹ÓÃncÏÂÁÉèÒ»¸ö·´ÏòshellµÄ¹¥»÷ÐÐΪҲºÜÊÇÉÙ¼û¡£
¡¾Á´½Ó¡¿
https://nti.nsfocus.com/threatWarning
¶þ¡¢ ÈÈÃÅ×ÊѶ
1. WebSphere Application Server¸ßΣԶ³Ì´úÂëÖ´ÐÐÎó²î
¡¾¸ÅÊö¡¿
±±¾©Ê±¼ä2020Äê6ÔÂ5ÈÕ£¬IBM¹Ù·½Ðû²¼Í¨¸æÐÞ¸´ÁËWebSphere Application Server£¨WAS£©ÖеÄÒ»¸ö¸ßΣԶ³Ì´úÂëÖ´ÐÐÎó²î£¬Îó²îÐÎòΪIIOPÐÒéÉϵķ´ÐòÁл¯Îó²î£¬·ÖÅɱàºÅCVE-2020-4450£¬Îó²îÆÀ·ÖΪ9.8·Ö£¬Îó²îΣº¦½Ï¸ß£¬Ó°ÏìÃæ½Ï´ó¡£
¡¾²Î¿¼Á´½Ó¡¿
http://blog.nsfocus.net/ibm-was-cve-2020-4450-0730/
2. Cisco SD-WAN¸ßΣÎó²î
¡¾¸ÅÊö¡¿
¿ËÈÕ£¬Ë¼¿Æ£¨Cisco£©¹Ù·½Ðû²¼Í¨¸æ³ÆÐÞ¸´ÁËCisco SD-WAN vManager Software£¨CVE-2020-3374£©ºÍSD-WAN Solution Software(CVE-2020-3375)µÄ2¸ö¸ßΣÎó²î¡£Cisco SD-WANÊÇÒ»ÖÖÇå¾²µÄÔÆ¹æÄ£¼Ü¹¹£¬¾ßÓпª·ÅÐÔ£¬¿É±à³ÌÐԺͿÉÀ©Õ¹ÐÔ¡£ ͨ¹ýCisco vManage¿ØÖÆÌ¨£¬Äú¿ÉÒÔ¿ìËÙ½¨ÉèSD-WANÁýÕֽṹÒÔÅþÁ¬Êý¾ÝÖÐÐÄ£¬·ÖÖ§»ú¹¹£¬Ô°ÇøºÍÖ÷»úÍйÜÉèÊ©£¬ÒÔÌá¸ßÍøÂçËÙÂÊ£¬Çå¾²ÐÔºÍЧÂÊ¡£
¡¾²Î¿¼Á´½Ó¡¿
http://blog.nsfocus.net/cisco-sdwan-0731/
3. EmotetÒøÐÐľÂí
¡¾¸ÅÊö¡¿
Emotet¾ßÓÐÓÃÓÚ¾ÙÐÐÒøÐÐڲƵÄÄ£¿é£¬Ö÷ÒªÕë¶ÔÅ·ÖÞ¡¢ÃÀÖ޵ȹú¼ÒµÄÒøÐоÙÐй¥»÷£¬¶àÄêÀ´£¬¸Ã¶ñÒâÈí¼þ±»È«ÇòÇå¾²³§É̹éÀàÎªÒøÐÐľÂí¡£½üÆÚAG¹«Ë¾¸ñÎïʵÑéÊÒ¸ú×Ùµ½EmotetÒøÐÐľÂíµÄÐÂÑù±¾£¬¸ÃľÂíÒÔÆäÄ£¿é»¯¼Ü¹¹ºÍ³¤ÆÚÐÔÊÖÒÕ×ÅÃû£¬Ö÷Ҫͨ¹ý´¹ÂÚÓʼþµÄÒªÁìÈö²¥¡£
¡¾²Î¿¼Á´½Ó¡¿
https://nti.nsfocus.com/
4. North StarÔ˶¯Õë¶Ôº½¿Õº½ÌìºÍ¹ú·ÀÐÐÒµ
¡¾¸ÅÊö¡¿
North StarÔ˶¯ÊÇÕë¶Ôº½¿Õº½ÌìºÍ¹ú·ÀÐÐÒµµÄ¶ñÒâÍøÂçÔ˶¯£¬ÒÔ¹ú·À³Ð°üÉ̵ÄְλÐû²¼×÷ΪÓÕ¶ü£¬Ê¹ÓÃÓã²æÊ½ÍøÂç´¹ÂÚÓʼþ¾ÙÐÐÕë¶ÔÐÔ¹¥»÷£¬Ö¼ÔÚÈö²¥¶ñÒâÈí¼þ£¬ÍøÂçÓйؾüʺ͹ú·ÀÊÖÒÕµÄÒªº¦Ç鱨¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.mcafee.com//blogs/other-blogs/mcafee-labs/operation-north-star-a-job-offer-thats-too-good-to-be-true/
5. Lazarus×é֯ʹÓÃVHDÀÕË÷Èí¼þµÄ¶ñÒâÔ˶¯
¡¾¸ÅÊö¡¿
½üÆÚLazarus×é֯ʹÓÃVHDÀÕË÷Èí¼þ¾ÙÐжñÒâÔ˶¯£¬¸ÃÀÕË÷Èí¼þͨ¹ýMATA¿ò¼Ü¾ÙÐа²ÅÅ¡£¹¥»÷ÕßʹÓñ£´æÎó²îµÄVPNÍøÂç¾ÙÐÐÈëÇÖ£¬»ñÈ¡ÖÎÀíԱȨÏÞ£¬²¢°²ÅÅVHDÀÕË÷Èí¼þ£¬¸ÃÀÕË÷Èí¼þ¿É»ñÈ¡ËùÓÐÅþÁ¬µÄ´ÅÅÌÒÔ¼ÓÃÜÎļþ¡£Lazarus Group£¨ÓÖÃûHIDDEN COBRA¡¢Guardians of Peace¡¢ZINCºÍNICKEL ACADEMY£©ÊÇÒ»¸öÍþв×éÖ¯£¬¹éÊôÓÚ³¯ÏÊÕþ¸®£¬¸Ã×éÖ¯ÖÁÉÙ´Ó2009ÄêÒÔÀ´Ò»Ö±»îÔ¾¡£
¡¾²Î¿¼Á´½Ó¡¿
https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
6. EnsikoÓÐÀÕË÷Èí¼þ¹¦Ð§µÄWebshell
¡¾¸ÅÊö¡¿
EnsikoÊǾßÓÐÀÕË÷Èí¼þ¹¦Ð§µÄPHP Web Shell£¬ÆäÄ¿µÄÊÇ×°ÖÃÁËPHPµÄÈÎºÎÆ½Ì¨£¬¸Ã¶ñÒâÈí¼þ¿ÉÒÔÔ¶³Ì¿ØÖÆÏµÍ³²¢½ÓÊÜshellÏÂÁîÒÔÔÚÊÜѬȾ»úеÉÏÖ´ÐжñÒâÔ˶¯£¬Í¨¹ýPHP·´Ïòshell½«Ð§¹û·¢Ëͻع¥»÷Õߣ¬ËüÄܹ»É¨Ãè·þÎñÆ÷ÉÏÊÇ·ñ±£´æÆäËûWebÍâ¿Ç£¬ÆÆËðÍøÕ¾£¬·¢ËÍ´ó×Úµç×ÓÓʼþ£¬ÏÂÔØÔ¶³ÌÎļþ£¬Åû¶ÓйØÊÜÓ°Ïì·þÎñÆ÷µÄÐÅÏ¢£¬Õë¶ÔÎļþ´«ÊäÐÒ飨FTP£©£¬cPanelºÍTelnetµÄ±©Á¦¹¥»÷£¬ÁýÕÖÎļþ¾ßÓÐÖ¸¶¨µÄÀ©Õ¹ÃûµÈ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.trendmicro.com/trendlabs-security-intelligence/ensiko-a-webshell-with-ransomware-capabilities/
7. Blue Mockingbird×é֯ʹÓÃÓ¡¶È·þÎñÆ÷¾ÙÐÐÍÚ¿óÔ˶¯
¡¾¸ÅÊö¡¿
Blue Mockingbird×éÖ¯½üÆÚÔÚÃæÏò¹«ÖڵķþÎñÆ÷ÉÏʹÓÃÎó²îÀ´ÔËÐжà×é¼þ¶ñÒâÈí¼þ£¬ÆäÖÐÓй¥»÷ÕßʹÓÃProgress Telerik UI CVE-2019-18935ʵÏÖ³õʼ»á¼û£¬Ö´ÐÐPowerShellµÄÓÐÓøºÔØ£¬´Ó¶øÌṩ¼ÓÃÜÇ®±Ò¶ñÒâÈí¼þ£¬Ó°ÏìϵͳÐÔÄÜ¡¢Ëðº¦ÓªÒµÔËÓª£¬»¹¿ÉÒÔ¾ÙÐÐÊý¾Ý͵ÇÔ¡¢ÀÕË÷Èí¼þ¡¢ÒøÐÐľÂí¹¥»÷µÈÔ˶¯£¬Ó¡¶ÈÊý°ÙÍò·þÎñÆ÷Êܵ½´Ë´Î¹¥»÷Ô˶¯µÄÓ°Ïì¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.seqrite.com/blog/blue-mockingbird-threat-group-targets-servers-in-india-for-cryptomining/
8. AndroidÌØ¹¤Èí¼þÕë¶Ô̹ɣÄáÑdz¬µÈÁªÈü
¡¾¸ÅÊö¡¿
½üÆÚ·¢Ã÷еÄAndroidÌØ¹¤Èí¼þ£¬¹¥»÷ÕßʹÓøÃÌØ¹¤Èí¼þαװ³ÉGoogle PlayÖÐÁ½¸ö×îÖøÃû×ãÇò¾ãÀÖ²¿Simba SCºÍYanga SCµÄ¹Ù·½AndroidÓ¦ÓóÌÐòÎóµ¼Óû§ÏÂÔØÊ¹Ó㬸ÃÌØ¹¤Èí¼þ¾ßÓÐÔĶÁ¶ÌÐÅ¡¢»ñÈ¡ÁªÏµÈË¡¢Â¼ÖÆÒôƵ¡¢Í¨»°¹¦Ð§¡¢»á¼ûʵʱλÖà ¡¢¶Á/дÍⲿ´æ´¢ ¡¢ÇÔÈ¡ÕÕÆ¬¡¢´æÈ¡Ïà»úµÈ¹¦Ð§¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.zscaler.com/blogs/research/android-spyware-targeting-tanzania-premier-league
9. RedDelta×éÖ¯Õë¶ÔèóµÙ¸ÔºÍÌìÖ÷½Ì»ú¹¹
¡¾¸ÅÊö¡¿
RedDeltaÊÇÒ»¸öÕë¶ÔÓëÖйúÕ½ÂÔÀûÒæÏà¹ØÊµÌåµÄ»îÔ¾Íþв×éÖ¯£¬¸Ã×éÖ¯ÒÔ×Ú½ÌÕûÌåΪÃ÷È·Ä¿µÄ£¬Ê¹ÓÃÒÔèóµÙ¸ÔºÍÑÇÖÞÌìÖ÷½ÌÐÂÎÅͬÃËÓйØÎªÖ÷ÌâµÄÍøÂç´¹ÂÚÓÕ¶ü£¬Ê¹ÓÃPlugXºÍCobalt StrikeµÈ×ÅÃû¹¤¾ß»ñÈ¡Ç鱨¡£
¡¾²Î¿¼Á´½Ó¡¿
https://go.recordedfuture.com/hubfs/reports/cta-2020-0728.pdf
10. H2Miner½©Ê¬ÍøÂçʹÓÃÎó²îÈëÇÖLinuxϵͳ
¡¾¸ÅÊö¡¿
H2MinerÊÇÒ»¸öLinuxϵĴóÐÍÍÚ¿ó½©Ê¬ÍøÂ磬ͨ¹ý¶à¸ö¸ßΣÎó²îÈëÇÖLinuxϵͳ£¬²¢Ê¹ÓÃÎó²îÔÚÆóÒµÄÚÍø»òÔÆ·þÎñÆ÷ÖкáÏòÀ©É¢£¬²¢ÇÒÏÂÔØ¶ñÒâ¾ç±¾¼°¶ñÒâ³ÌÐò¾ÙÐÐÍÚ¿óIJÀû£¬Í¬Ê±¾ßÓÐÐ¶ÔØÔÆ·þÎñÆ÷Çå¾²Èí¼þ¡¢É¾³ýÔÆ·þÎñÆ÷¾µÏñµÄÄÜÁ¦¡£
¡¾²Î¿¼Á´½Ó¡¿
https://s.tencent.com//research/report/1062.html
11. GuLoaderͨ¹ý¶ñÒâÀ¬»øÓʼþÔ˶¯·Ö·¢
¡¾¸ÅÊö¡¿
GuLoaderÊÇÍþв¼ÓÈëÕßÓÃÀ´´ó¹æÄ£·Ö·¢¶ñÒâÈí¼þµÄÏÂÔØ³ÌÐò£¬Ê¹ÓôøÓÐISOÎļþÀàÐ͸½¼þµÄÀ¬»øÓʼþ·Ö·¢£¬¸½¼þ°üÀ¨ÓÃVisual Basic±àдµÄGuLoader¿ÉÖ´ÐÐÎļþ£¬Í¨¹ýÇý¶¯Æ÷·¿ª²¢Ö´ÐС£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.malwarebytes.com/threat-analysis/2020/07/malspam-campaign-caught-using-guloader-after-service-relaunch/
12. ʹÓÃWordPress²å¼þÎó²î¾ÙÐÐÍøÂç¹¥»÷
¡¾¸ÅÊö¡¿
WordPressÊÇÓÃÓÚ¹¹½¨ºÍÍйÜÍøÕ¾µÄ×îÊ¢ÐеĿªÔ´Èí¼þ£¬¹¥»÷ÕßÕë¶ÔWordPress²å¼þÖеĶà¸öÎó²î£¬ÈçWooCommerce²å¼þ¡¢Yoast SEO²å¼þºÍAll in One SEO Pack²å¼þ¾ÙÐÐÍøÂç´¹ÂÚºÍÚ²ÆÔ˶¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.zscaler.com/blogs/research/cybercriminals-targeting-multiple-vulnerabilities-wordpress-plugins
13. NgrokÍÚ¿ó½©Ê¬ÍøÂçÕë¶ÔDocker·þÎñÆ÷
¡¾¸ÅÊö¡¿
Ngrok½©Ê¬ÍøÂçʹÓÃDocker API¶Ë¿Ú¾ÙÐй¥»÷£¬¹¥»÷ÕßÀÄÓÃDockerÉèÖù¦Ð§ÒÔÌӱܱê×¼ÈÝÆ÷ÏÞÖÆ²¢´ÓÖ÷»úÖ´ÐÐÖÖÖÖ¶ñÒâ¸ºÔØ£¬»¹°²ÅÅÁËÍøÂçɨÃèÒÇÒÔ²éÕÒÆäËûDZÔÚµÄÒ×Êܹ¥»÷Ä¿µÄ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.intezer.com/container-security/watch-your-containers-doki-infecting-docker-servers-in-the-cloud/

AG¹«Ë¾ÔÆ







