AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.09.21-2020.09.27£©
2020-09-27
Ò»¡¢ Íþвͨ¸æ
LinuxÄÚºËȨÏÞÌáÉýÎó²îͨ¸æ£¨CVE-2020-14386£©
¡¾Ðû²¼Ê±¼ä¡¿2020-09-24 18:00:00 GMT
¡¾¸ÅÊö¡¿
¿ËÈÕ£¬AG¹«Ë¾¿Æ¼¼¼à²â·¢Ã÷Linux kernel ±£´æÒ»¸öȨÏÞÌáÉýÎó²î£¨CVE-2020-14386£©£¬ÓÉÓÚnet/packet/af_packet.cÔÚ´¦Öóͷ£AF_PACKETʱ±£´æÕûÊýÒç³ö£¬µ¼Ö¿ɾÙÐÐÔ½½çд´Ó¶øÊµÏÖȨÏÞÌáÉý£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²î´Ó·ÇÌØÈ¨Àú³Ì»ñµÃϵͳrootȨÏÞ¡£Ê¹ÓÃÁËLinux KernelµÄopenshift/docker/kubernetesµÈÐéÄ⻯²úÆ·¿ÉÄÜ»áÊܵ½¸ÃÎó²îÓ°Ï죬µ¼ÖÂÐéÄ⻯ÌÓÒÝ£¬ÇëÏà¹ØÓû§½ÓÄɲ½·¥¾ÙÐзÀ»¤¡£
¡¾Á´½Ó¡¿
https://nti.nsfocus.com/threatWarning
WebSphere XMLÍⲿʵÌå×¢È루XXE£©Îó²î´¦Öóͷ£ÊֲᣨCVE-2020-4643£©
¡¾Ðû²¼Ê±¼ä¡¿2020-09-24 17:00:00 GMT
¡¾¸ÅÊö¡¿
¿ËÈÕ£¬IBM¹Ù·½Ðû²¼Í¨¸æÐÞ¸´ÁËWebSphere Application Server£¨WAS£©ÖеÄÒ»¸öXMLÍⲿʵÌå×¢È루XXE£©Îó²î£¨CVE-2020-4643£©£¬ÓÉÓÚWASδ׼ȷ´¦Öóͷ£XMLÊý¾Ý£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÔ¶³Ì»ñÈ¡·þÎñÆ÷ÉϵÄÃô¸ÐÐÅÏ¢¡£CVE-2020-4643ÓÉAG¹«Ë¾¿Æ¼¼Çå¾²Ñо¿ÍŶӱ¨¸æ¸øIBM£¬¿ÉÒÔÓëCVE-2020-4450×éºÏʹÓõִïÎÞÐèÉí·ÝÈÏÖ¤µÄXXEÎó²î£¬Ôì³É·þÎñÆ÷Ãô¸ÐÐÅϢй¶£¬Ê¹ÓÃÖØÆ¯ºó½ÏµÍ£¬Î£º¦½Ï¸ß¡£ÇëÏà¹ØÓû§¾¡¿ì½ÓÄɲ½·¥¾ÙÐзÀ»¤¡£
¡¾Á´½Ó¡¿
https://nti.nsfocus.com/threatWarning
¶þ¡¢ ÈÈÃÅ×ÊѶ
1. ÑÏÖØÎó²îÔÊÐíºÚ¿ÍÐ®ÖÆFirefox Androidä¯ÀÀÆ÷
¡¾¸ÅÊö¡¿
MozillaÐÞ¸´ÁËÒ»¸öÎó²î£¬¸ÃÎó²î¿ÉÄÜʹ¹¥»÷ÕßÐ®ÖÆ¹²ÏíͳһWi-FiÍøÂçµÄÈκÎFirefox Androidä¯ÀÀÆ÷¡£Firefox Android Webä¯ÀÀÆ÷Óû§±ØÐèÉý¼¶µ½Firefox AndroidÓ¦ÓóÌÐòµÄ×îпÉÓð汾£¬ÒÔ±ÜÃâÆä×°±¸±»Ð®ÖÆ¡£Ôµ¹ÊÔÓÉÊǹ¥»÷Õß¿ÉÒÔʹÓôËÎó²îÐ®ÖÆÍ³Ò»ÍøÂçÉϵÄËùÓÐFirefox Webä¯ÀÀÆ÷¡£ÓëGitLabÏà¹ØµÄ°Ä´óÀûÑÇÇå¾²Ñо¿Ö°Ô±Chris Moberly ÔڽϾɰ汾µÄAndroidÊÖ»úFirefox Webä¯ÀÀÆ÷µÄSSDP£¨¼òÆÓ·þÎñ·¢Ã÷ÐÒ飩ÒýÇæÖз¢Ã÷ÁËÒ»¸öÔ¶³ÌÏÂÁîÖ´ÐÐÎó²î¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.hackread.com/vulnerability-allowed-hackers-hijack-firefox-android-browser/
2. °¸ÀýÑо¿£ºEmotetÏß³ÌÐ®ÖÆ£¬Ò»ÖÖµç×ÓÓʼþ¹¥»÷ÊÖÒÕ
¡¾¸ÅÊö¡¿
ÍÆ¶¯Emotet¶ñÒâÈí¼þµÄ¶ñÒâÀ¬»øÓʼþ£¨malspam£©ÊÇ×î³£¼ûµÄ»ùÓÚµç×ÓÓʼþµÄÍþв£¬Ô¶Ô¶Áè¼ÝÁËÆäËû¶ñÒâÈí¼þ¼Ò×壬ֻÓÐÉÙÊýÆäËûÍþвÕýÔÚ¿¿½ü¡£½ü¼¸ÖÜÀ´£¬ÎÒÃÇ·¢Ã÷ʹÓÓÏß³ÌÐ®ÖÆ”ÊÖÒÕµÄEmotetÀ¬»øÓʼþÊýÄ¿ÏÔ×ÅÔöÌí£¬¸ÃÊÖÒÕʹÓÃÁË´ÓÊÜѬȾÅÌËã»úµÄµç×ÓÓʼþ¿Í»§¶ËÇÔÈ¡µÄÕýµ±ÐÂÎÅ¡£´ËÀ¬»øÓʼþÓÕÆÁËÕýµ±Óû§£¬²¢Ã°³äÁ˶Ա»µÁµç×ÓÓʼþµÄ»Ø¸´¡£Ï̱߳»Ð®ÖƵÄÀ¬»øÓʼþ½«´ÓÔʼÓʼþ·¢Ë͵½µØµã¡£ÕâÖÖÊÖÒÕ±ÈÐí¶àÈËÏÖÒÑ·¢Ã÷µÄ²»Ì«ÖØ´óµÄÒªÁìÓÐÓõöࡣÕâÖÖÒªÁìÔÚ˵·þDZÔÚµÄÊܺ¦Õßµ¥»÷¸½¼þÎļþ»òµ¥»÷Á´½ÓÒÔÏÂÔØ´øÓÐÉè¼ÆÎªÓÃEmotetѬȾÓû§µÄºêµÄ¶ñÒâWordÎĵµ·½Ãæ¸üΪÀֳɡ£ÔÚÕâÀÎÒÃÇ»ØÊ×Ò»¸öEmotetµÄÏß³ÌÐ®ÖÆÀú³ÌµÄ°¸ÀýÑо¿£¬ÒÔ±ãÎÒÃÇ¿ÉÒÔ¸üºÃµØÊìϤºÍÃ÷È·ÕâÖÖÊÖÒÕ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/emotet-thread-hijacking/
3. TikTokΣº¦¹ú¼ÒÇå¾²£¿ÃÀ¹úÍøÂçÇ徲ר¼ÒÌåÏÖ“¿´²»¶®”
¡¾¸ÅÊö¡¿
ÌØÀÊÆÕÓÚ8ÔÂ6ÈÕÐû²¼Õ¥È¡ÁîµÄÀíÓÉÖ»ÓÐÒ»¸ö£º»ùÓÚÖйúµÄÓ¦ÓóÌÐò±£´æ“¹ú¼ÒÇå¾²ÎÊÌ┡£¶øÉÌÎñ²¿³¤Íþ¶û²®·ÂÞ˹£¨Wilbur Ross£©ÔÚÐÂΟåÖл¹Ôö²¹ÁËÒ»Ìõ“Òþ˽ÇÖÕ¼”£¬ÓÉÓÚÕâЩӦÓóÌÐòÔÊÐí“Öйú¶ñÒâÍøÂçÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý¡£”Õâ¸öÎÊÌ⣬´ÓÊÖÒÕ²ãÃæÀ´Ëµ£¬Ö»ÓÐÍøÂçÇå¾²ºÍÒþ˽±£»¤µÄרҵÈËÊ¿²Å×îÓн²»°È¨¡£¿ËÈÕ£¬Threatpost¸ãÁ˸öÃÀ¹úÍøÂçÇ徲ר¼Ò×êÑлᣬԼÇëÁ˶àλ´ó¿§·¢Éù£¬ÊÇÏÖÔÚΪֹ´ÓÊÖÒÕ²ãÃæÁÙTikTokºÍWechatÏà¹ØµÄÇå¾²ºÍÒþ˽»°Ìâ×îΪרҵµÄ̽ÌÖ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.aqniu.com/industry/70308.html
4. Fort McCoyÏòµ¼ÈËÉó²éÁËÉèÊ©µÄ´óÊ¢ÐÐÓ¦¶Ô²½·¥
¡¾¸ÅÊö¡¿
µ½2020Äê6ÔÂ10ÈÕ£¬Â½¾üÉÏУMichael D. PossÖ¸»ÓFort McCoy£¨Íþ˹¿µÐÇÖÝ£©×¤¾üʱ£¬ËûºÜ¿ÉÄÜÊǵÚÒ»¸öÔڸùúÓ¦¶ÔÈ«ÇòÊ¢Ðв¡Ê±µ£µ±ÕâÒ»Ö°ÎñµÄÈË¡£²¨Ë¹Ë¹Ëµ£º“½ñÄê´ºÌ죬ÎÒºÍÆäËûÈËÒ»Ñù¶¼ÔÚÂÄÀúÕâÖÖ´óÊ¢ÐС£”ÔÚÀ´µ½Âó¿¼ÒÁ±¤Ö®Ç°£¬ËûÊÇ¿°ÈøË¹ÖÝÍþÆæÍн¾üºó±¸ÖÐÐĵÚ451Ô¶Õ÷ά³Ö˾ÁµÄÕÕÁϳ¤¡£“ÎÒÃÇ¿ÉÄÜÕýÔÚÂÄÀúÓëÆäËûËùÓÐÈËÕýÔÚ´¦Öóͷ£µÄÏàͬµÄÊÂÇé¡£ÎÒÃÇÕýÔÚÊÔͼŪÇåÎúÔõÑùÔÚÕâÖÖÐÂÇéÐÎÖоÙÐвÙ×÷¡£”
¡¾²Î¿¼Á´½Ó¡¿
https://www.defense.gov/Explore/Features/Story/Article/2357161/fort-mccoy-leader-reviews-installations-pandemic-response/
5. µç×ÓÓʼþת´ïµÄMoDi RAT¹¥»÷»áÕ³ÌùPowerShellÏÂÁî
¡¾¸ÅÊö¡¿
SophosLabsµÄÑо¿Ö°Ô±Fraser HowardºÍAndrew O'Donnell ÉϸöÔÂÔÚͨ¹ýÍþвң²â¾ÙÐÐÕ÷²ÉʱÎÞÒâ·¢Ã÷ÁËÒ»ÖÖ²»Ñ°³£µÄ·´ÉäÊ½×°ÔØ»ú¹¥»÷ÒªÁì¡£¹¥»÷Á´Ê¼ÓÚ°üÀ¨Ò»Ð©³ðÊÓµÄVB¾ç±¾´úÂëµÄ¶ñÒâµç×ÓÓʼþ£¬×îºóÒÔ½»¸¶ÃûΪMoDi RATµÄÉÌÆ·Ô¶³Ì»á¼ûľÂíΪ×îºó¡£
¡¾²Î¿¼Á´½Ó¡¿
https://news.sophos.com/en-us/2020/09/24/email-delivered-modi-rat-attack-pastes-powershell-commands/
6. Cardbleed£º´ó¹æÄ£µÄMagento1ÆÆ½â
¡¾¸ÅÊö¡¿
´ÓÉÏÖÜÄ©µ½ÏÖÔÚΪֹ£¬¹æÄ£×î´óµÄÓоݿɲéµÄ¹ã¸æÔ˶¯ÒÑÆÆËðÁËÈ«Çò½ü2000¼ÒMagento 1ÊÐËÁ¡£ÕâÊÇÒ»Öֵ䷶µÄMagecart¹¥»÷£º×¢ÈëµÄ¶ñÒâ´úÂ뽫×èµ²ºÁÎÞÒÉÎʵÄÊÐËÁ¿Í»§µÄ¸¶¿îÐÅÏ¢¡£±»¼ì²éÊÐËÁÔËÐеÄÊÇMagento°æ±¾1£¬¸Ã°æ±¾ÓÚÈ¥Äê6ÔÂÐû²¼ÖÕÖ¹¡£
¡¾²Î¿¼Á´½Ó¡¿
https://sansec.io/research/cardbleed
7. Taidoor-ÕæÕý³¤ÆÚµÄÍþв
¡¾¸ÅÊö¡¿
Õþ¸®Ö§³ÖµÄÐÐΪÕßͨ³£ÔÚÍøÂç¿Õ¼äÖоÙÐкã¾ÃµÄÔ˶¯£¬²¢ÇÒΪÁ˼ò»¯ÕâÖÖÒ»Á¬µÄÀú³Ì£¬ËûÃǾ³£¿ª·¢¶ñÒ⹤¾ß£¬ÒÔÆÚºã¾ÃʹÓÃËüÃÇ¡£ÏñÈÎºÎÆäËû¶ñÒ⹤¾ßÒ»Ñù£¬ËüÃÇÐèÒªÒþÉí£¬²¢ÇÒÔÚ±»¼ì²âµ½Ê±£¬ÐèÒª¾ÙÐÐһЩÐ޸IJŻªÔٴμì²â²»µ½¡£ÕâÖÖ¹¤¾ßµÄÒ»¸öʾÀýÊÇTaidoor RAT£¨Ô¶³Ì»á¼ûľÂí£©£¬ÆäÀúÊ·¿ÉÒÔ×·Ëݵ½2008Ä꣬×î½ü·¢Ã÷ÁËÆäа汾£¬²¢ÔÚÃÀ¹úÕþ¸®»ú¹¹Ðû²¼µÄÊÖÒÕ±¨¸æÖоÙÐÐÁËÏÈÈÝ¡£Taidoor±»ÐÎòΪÓÉÖйúÕþ¸®Ö§³ÖµÄÍøÂç¼ÓÈëÕß¿ª·¢ºÍʹÓõÄÔ¶³Ì»á¼ûľÂí¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.reversinglabs.com/blog/taidoor-a-truly-persistent-threat
8. MTR°¸Àý£º×èÖ¹1500ÍòÃÀÔªµÄMazeÀÕË÷Èí¼þ¹¥»÷
¡¾¸ÅÊö¡¿
SophosÍйÜÍþвÏìÓ¦£¨MTR£©ÍŶÓÓ¦Ñû×ÊÖúÒÔMazeÀÕË÷Èí¼þΪĿµÄµÄ×éÖ¯¡£¹¥»÷Õß·¢³öÁË1500ÍòÃÀÔªµÄÊê½ðÒªÇó-ÈôÊÇËûÃÇÀÖ³ÉÁË£¬Õ⽫ÊÇÆù½ñΪֹ֧³ö×î¶àµÄÀÕË÷Èí¼þÖ®Ò»¡£
¡¾²Î¿¼Á´½Ó¡¿
https://news.sophos.com/en-us/2020/09/22/mtr-casebook-blocking-a-15-million-maze-ransomware-attack/
9. Æ»¹û¸ßΣÎó²îÔÊÐí¹¥»÷ÕßÔÚiPhone¡¢iPad¡¢iPodÉÏÖ´ÐÐí§Òâ´úÂë
¡¾¸ÅÊö¡¿
Æ»¹ûÐû²¼ÁËiOSºÍiPadOS²Ù×÷ϵͳµÄ¸üУ¬ÐÞ¸´Á˶à¸öÇå¾²ÐÔÎÊÌ⡣ͨ¹ý´ËÇå¾²¸üУ¬Apple ½â¾öÁË AppleAVD£¬Apple Keyboard£¬WebKitºÍSiriµÈÖݪֲúÆ·ºÍ×é¼þÖеÄ11¸öÎó²î¡£ÔÚÒÑÐÞ¸´µÄÎó²îÖУ¬ÑÏÖØÐÔ×î¸ßµÄÊÇCVE-2020-9992£¬ËüÔÊÐí¹¥»÷ÕßÔÚϵͳÉÏÖ´ÐÐí§Òâ´úÂë¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.4hou.com/posts/Jlpl
10. µÂ¹úÊÓ²ìÖ°Ô±Ö¸Ôð¶íÂÞ˹µÄDoppelPaymerÍÅ»ïÖÆÔìÁËÖÂÃüµÄҽԺϮ»÷
¡¾¸ÅÊö¡¿
µÂ¹úÕþ¸®¶Ô×î½ü¶Ô¶ÅÈû¶û¶à·òÒ½ÔºµÄÏ®»÷¾ÙÐеÄÊÓ²ìÏÔʾ£¬¶íÂÞ˹ºÚ¿Í¿ÉÄܼÓÈëÆäÖС£
¡¾²Î¿¼Á´½Ó¡¿
https://securityaffairs.co/wordpress/108620/malware/doppelpaymer-german-hospital-attack.htm

AG¹«Ë¾ÔÆ







