°®¶ûÀ¼°ä²¼¡¶2019-2024¹ú¶ÈÍøÂ簲ȫսÊõ¡·£»×êÑÐÍŶӳÆAPT20¿ÉÈÆ¹ýÁ½²½ÑéÖ¤²¢ÈëÇÖ¶à¸ö¹ú¶ÈºÍÐÐÒµ

°ä²¼¹¦·ò 2020-01-02


1.ÐǰͿËÔ±¹¤ÉÏ´«APIÃÜÔ¿µ½GitHubÉÏ £¬¿É½Ó¼ûÄÚ²¿ÏµÍ³


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×¨¼ÒVinoth KumarÔÚÒ»¸ö¹«¿ª¿ÉÓõÄGithub´æ´¢¿âÖз¢ÏÖÐǰͿ˵ÄÒ»¸öAPIÃÜÔ¿ÔÚÏß¶³ö £¬¹¥»÷ÕßÄܹ»ÀûÓøÃÃÜÔ¿À´½Ó¼û¹«Ë¾µÄÄÚ²¿ÏµÍ³²¢´Û¸ÄÊÚȨÓû§Áбí¡£¸ÃÃÜÔ¿¿ÉÓÃÓÚ½Ó¼ûÐǰͿËJumpCloud API £¬JumpCloudÊÇÒ»¸öActive DirectoryÖÎÀíÆ½Ì¨ £¬ÌṩÓû§ÖÎÀí¡¢WebÀûÓ÷¨Ê½µ¥µãµÇ¼£¨SSO£©½Ó¼û½ÚÔìºÍÇáÐÍĿ¼½Ó¼ûºÍ̸£¨LDAP£©·þÎñ¡£Kumar»¹ÌṩÁ˸ÃÎÊÌâµÄPoC´úÂë £¬ÑÝʾÁËÈôºÎÁгöϵͳºÍÓû§¡¢½ÚÔìAWSÕÊ»§¡¢ÔÚϵͳÉÏÖ´ÐкÅÁîÒÔ¼°Ôö³¤»òɾ³ýÓÐȨ½Ó¼ûÄÚ²¿ÏµÍ³µÄÓû§¡£ÐǰͿËÈ·ÈÏÁËÕâÒ»ÎÊÌⲢѸ¿ì³·ÏúÁ˸ÃÃÜÔ¿¡£


  Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95826/security/starbucks-api-key-exposed-online.html


2.ChromeÀ©´óShitcoin WalletÇÔÈ¡¼ÓÃÜÇ®°ü˽Կ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ò»¸öChromeÀ©´ó·¨Ê½±»·¢´Ë¿ÌÍøÒ³ÉÏ×¢ÈëJavaScript´úÂëÒÔ´Ó¼ÓÃÜÇ®±ÒÇ®°üºÍ¼ÓÃÜÇ®±ÒÃÅ»§ÍøÕ¾ÇÔÈ¡ÃÜÂëºÍ˽Կ¡£¸ÃÀ©´óÃûΪShitcoin Wallet£¨ChromeÀ©´óID£ºckkgmccefffnbbalkmbbgebbojjogffn£© £¬ÓÚ12ÔÂ9ÈÕ°ä²¼¡£¸ÃÀ©´óÐû³ÆÄܹ»Ô®ÊÖÓû§ÖÎÀíETHºÍERC20 £¬µ«×êÑÐÈËÔ±·¢ÏÖ¸ÃÀ©´ó»á½«Í¨¹ýÆä½Ó¿Ú´´½¨»òÖÎÀíµÄËùÓÐÇ®°üµÄ˽Կ·¢Ë͵½µÚÈý·½ÍøÕ¾erc20wallet[.]tk £¬Æä´Î £¬µ±Óû§½Ó¼ûÖ÷Á÷µÄ5¸ö¼ÓÃÜÇ®±ÒÖÎÀíÆ½Ì¨Ê± £¬¸ÃÀ©´ó»¹Äܹ»×Ô¶¯×¢Èë¶ñÒâJavaScript´úÂë £¬ÒÔÇÔÈ¡µÇ¼ʹ´¦ºÍ˽Կ²¢·¢ËÍÖÁÍ³Ò»ÍøÕ¾¡£Ä¿Ç°¸ÃÀ©´óÈÔ¿Éͨ¹ý¹Ù·½Chrome Web StoreÏÂÔØ £¬ÆäÏÂÔØÁ¿Îª625´Î¡£Ä¿Ç°Éв»Ã÷ÏÔShitcoin WalletÍŶÓÊÇ·ñÓ¦¶Ô¶ñÒâ´úÂëÕÆ¹Ü £¬»òÊǸÃÀ©´óÔâµ½µÚÈý·½ÉøÈëºÍ·ÛËé¡£Shitcoin WalletÍŶÓÉÐδ¶Ô´Ë½øÐлØÓ¦¡£


 Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/chrome-extension-caught-stealing-crypto-wallet-private-keys/


3.ÀÕË÷Èí¼þZeppelinÀûÓÃÔ¶¿Ø¹¤¾ßScreenConnect½øÐд«²¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÚ¿ÍÔÚÀûÓÃÔ¶³ÌÖÎÀíÈí¼þScreenConnectÇÔÈ¡Êý¾Ý²¢´«²¼ÀÕË÷Èí¼þZeppelin¡£Ò»¼Ò´óÐÍ·¿µØ²ú¹«Ë¾µÄ¹¤×÷Õ¾±»×°ÖÃÁËScreenConnect¿Í»§¶Ë £¬¸ÃScreenConnect.ClientService.exeÒ»ÏòÔÚºó¶ÜÔËÐв¢ÆÚ´ýÔ¶³ÌÖÎÀíÏνÓ¡£¸Ã¶ñÒâÈí¼þÄܹ»Ö´ÐкܶàºÅÁî £¬Ô̺¬´Ó±¸·ÝϵͳÖÐÍøÂçÊý¾Ý²¢×°ÖöñÒâÈí¼þ¡¢Í¨¹ý½ûÓü¸ÖÖ°²È«»úÔìÀ´×èÖ¹Windows Defender¡¢Ö´ÐÐPowerShellºÅÁîÒÔÎļþ´ó¾ÖÏÂÔØZeppelinµÈ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2019/12/zeppelin-is-back-ransomware-stealing.html


4.±±¿¨ÂÞÀ³ÄÉÖÝͶƱϵͳ2016ÄêÖжϲ¢·ÇÍøÂç¹¥»÷ÒýÆð


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý½üÆÚÃÀ¹úDHS°ä²¼µÄÒ»·Ýµ÷²é»ã±¨ £¬2016Äê±±¿¨ÂÞÀ´ÄÉÖÝͶƱϵͳµÄÖжÏÊÂÎñ²¢·ÇÓÉÍøÂç¹¥»÷µ¼Ö¡£¶Ô´ïÀÕÄ·¿¤Ä³Ð©µØÓòÃñÆø¿¼ÊÔÈËÔ±µÄ±Ê¼Ç±¾µçÄÔ½øÐзÖÎöÏÔʾ £¬2016Äê11ÔÂÑ¡¾ÙÈÕµÄÑ¡¾ÙÊý¾Ý³öÏÖÁËһЩÒì³£ £¬ÔÚijЩÇé¿öÏÂÑ¡ÃñûÓеõ½ÕýÈ·µÄ¼ø±ð £¬Ò»Ð©±»¼ø±ðΪÒÑͶƱ £¬¶øÁíһЩ±»¼ø±ðΪδע²á¡£Ó°ÏìVR Systemsµç×ÓͶƱ²¾µÄÃýÎóÆÈʹ¹ÙÔ±¸ÄÓÃÖ½ÕŽøÐÐ×¢²áµÇ¼Ç £¬Õû¸öͶƱµÄ³ÖÐø¹¦·ò±»µ¢¸é¡£¸Ãµ÷²é¶Ô21̨ÓÃÓÚÑ¡ÃñÑéÖ¤ºÍר¼ÒʹÓõÄÍÆËã»ú½øÐÐÁ˲鳭 £¬µ«Ã»ÓÐÕÒµ½ÈκζñÒâÈí¼þ»òÔ¶³Ì½Ó¼ûµÄÖ¤¾Ý¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95805/hacking/north-carolina-voting-systems-investigation.html


5.×êÑÐÍŶӳÆAPT20¿ÉÈÆ¹ýÁ½²½ÑéÖ¤²¢ÈëÇÖ¶à¸ö¹ú¶ÈºÍÐÐÒµ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÉÀ¼°²È«³§ÉÌFox-IT³ÆAPT20ÔÚ×î½üµÄ¹¥»÷ÖÐÄÜÈÆ¹ýÁ½²½ÑéÖ¤²¢ÈëÇÖ¶à¸ö¹ú¶ÈºÍÐÐÒµ¡£¾Ýµ÷²éÔâ·ê¹¥»÷µÄÆóÒµ±é²¼10¸ö·ÖÆçµÄ¹ú¶ÈºÍÐÐÒµ £¬ÆäÖÐÔ̺¬µÂ¹ú¡¢Ó¢¹ú¡¢·¨¹ú¡¢ÃÀ¹úºÍÖйú¡£ÊÜÓ°ÏìµÄÐÐÒµÔ̺¬º½¿Õ¡¢¹¹Öþ¡¢ÒøÐÓ×¢µçÁ¦¡¢°²È«¡¢ÔËÊäºÍÈËÁ¦×ÊÔ´·þÎñµÈ¡£µ«¹¥»÷²¢Î´Ó°Ïìͨ³£¹«¹² £¬ÓÉÓÚÆäÖ¸±êÖØÒªÊÇÆóÒµ¡£Ôڳɹ¦Í»ÆÆÑéÖ¤¹ý³ÌÖ®ºó £¬APT20Äܹ»½Ó¼ûһЩµ±¾Ö»ú¹¹¡¢¹«Ë¾Êý¾Ý¿âºÍ¸÷¸öÐÐÒµµÄ·þÎñÆ÷Êý¾Ý¡£


 Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2019/12/hackers-bypass-2-step-verification-to.html


6.°®¶ûÀ¼µ±¾Ö°ä²¼2019-2024¹ú¶ÈÍøÂ簲ȫսÊõ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°®¶ûÀ¼µ±¾Ö°ä²¼ÁË¡¶2019-2024¹ú¶ÈÍøÂ簲ȫսÊõ¡· £¬ÕâÊǸùúÓÚ2015Äê°ä²¼µÄÊ׸ö°²È«Õ½ÊõµÄ¸üа汾¡£¸ÃÕ½Êõ»ã±¨¸ÅÊöÁ˵±¾Ö½«ÈôºÎ³ÖÐøÍÆ½ø¸Ã¹úÍÆËã»úÍøÂçºÍÓйػù´¡ÉèÊ©µÄ°²È«¡£»ã±¨ÖвûÁËÈ»µ±¾Ö¶Ô°²È«ºÍ¿¿µÃסµÄÍøÂç¿Õ¼äµÄÔ¸¾°ÒÔ¼°½«²ÉÈ¡µÄÐж¯ £¬Ô̺¬³ÖÐøÌá¸ß¹Ø¼ü»ù´¡¼Ü¹¹ºÍ¹«¹²·þÎñÖеÄÍøÂ絯ÐÔ£»Ìá¸ßÆóÒµºÍ¹«Ãñ¶ÔÍøÂ簲ȫ³ÁÒªÐÔµÄÒâʶ£»Í¨¹ýÓë½ÌÓýϵͳ¡¢ÐÐÒµºÍѧÊõ½çµÄºÏ×÷ £¬½øÒ»²½·¢Õ¹È«Éç»áµÄÍøÂ簲ȫÎÄ»¯£»³ÖÐø¼áÈͰ®¶ûÀ¼×÷Ϊ¼¼ÊõºÍÐÅÏ¢°²È«ÖÐÐĵÄÈ«ÇòÃûÓþ £¬²¢Ô®ÊÖÍÆ½ø°®¶ûÀ¼³ÉΪICTÆóÒµµÄÊ×Ñ¡µØÖ·¡£¸Ã»ã±¨»¹¶½ÍƽøÐж¦ÐÂÒÔ±£»¤¹Ø¼ü»ù´¡¼Ü¹¹ÃâÊܳÁ´óÍøÂçÍþвµÄÓ°Ïì £¬Í¬Ê±»¹ÖÒ¸æ³Æ±í¹ú¿ÉÄÜ»á¹ýÎʰ®¶ûÀ¼µÄÑ¡¾Ù¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95825/laws-and-regulations/irish-national-cyber-security-strategy.html