ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂ簲ȫ³ß¶È£»Realtek½¨¸´Windows HDÒôƵÇý¶¯·¨Ê½ÖеÄDLL½Ù³Ö·ì϶
°ä²¼¹¦·ò 2020-02-051.ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂ簲ȫ³ß¶È
ÃÀ¹ú·À²¿1ÔÂ31ÈÕÕýʽ°ä²¼ÍøÂ簲ȫ³ÉÊì¶ÈÄ£ÐÍÈÏÖ¤£¨CMMC£©¿ò¼Ü1.0°æ±¾¡£¹ú·À²¿°ä·¢£¬µ½2026Äê¹ú·À³Ð°üÉÌÔڻظõ±¾Ö²É¹º´òËãµÄÌá°¸ÒªÇóʱ£¬±ØÐëÂú×ã¸ù»ùµÄÍøÂ簲ȫ³ß¶È¡£Ëæ×ÅCMMCµÄÍÆ³ö£¬¹ú·À²¿µ«Ô¸Í¨¹ýÌá¸ß¹ú·À¹¤Òµ»ù´¡£¨DIB£©·Ö°üÉ̵ÄÍøÂ簲ȫ³ï±¸Ë®Æ½£¬À´¼ÓÇ¿¶Ô¹©¸øÁ´Î´·ÖÀàÐÅÏ¢£¨Áª¹úºÏͬÐÅÏ¢£¨FCI£©ºÍÊÜ¿ØÎ´·ÖÀàÐÅÏ¢£¨CUI£©£©µÄ±£»¤¡£CMMCÖ¼ÔÚͨ¹ýʹÓÃ5ÖÖ¼¶´ËÍâÈÏÖ¤À´¼ò»¯´óÐͺÍÓ×Ð͹ú·À³Ð°üÉ̵ÄÍøÂç¾ÍÐ÷ÐÔÈÏÖ¤£¬³ÁµãÊÇÍøÂ簲ȫʵ¼ÊºÍÁ÷³Ì¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/dod-to-require-cybersecurity-certification-from-defense-contractors/
2.°Ä´óÀûÑÇ»õÔ˹«Ë¾Toll GroupÔâµ½ÀÕË÷Èí¼þ¹¥»÷

ΪӦ¶ÔÀÕË÷Èí¼þ¹¥»÷£¬°Ä´óÀûÑÇÔËÊäºÍÎïÁ÷¾ÞÍ·Toll Group±»ÆÈ¹Ø¹Ø²¿ÃÅÔÚÏß·þÎñ£¬²¿Ãſͻ§¶Ô¸Ã¹«Ë¾µÄ´¦Ö÷½Ê½°µÊ¾²»ÖÐÒâ¡£¸Ã¹«Ë¾°µÊ¾£¬ËüÓÚ1ÔÂ31ÈÕÐÇÆÚÎåÔÚÆäϵͳÉÏ·¢ÏÖÁËÒ»¸öÀÕË÷Èí¼þ£¬²¢½ûÓÃÁËijЩϵͳÀ´¶ôÔì´ËÊÂÎñ¡£Ò»Ð©¿Í»§ÔÚÉ罻ýÌåÉϱ§Ô¹ËûÃÇÎÞ·¨ÔÙ¸ú×Ù°ü¹ü£¬²¢Ðû³Æ¸Ã¹«Ë¾µÄÔ±¹¤Ò²ÎÞ·¨½Ó¼û¸ú×ÙÊý¾Ý¿â¡£ÓÐÐÂÎÅÈËÊ¿³Æ¸ÃÊÂÎñÓ°ÏìÁ˰ĴóÀûÑÇ¡¢Ó¡¶ÈºÍ·ÆÂɱöµÄÒµÎñ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÖÐʹÓõÄÊÇÄÄÖÖÀÕË÷Èí¼þ£¬¸Ã¹«Ë¾ÒÑ֪ͨÓйز¿ÃÅ£¬µ«Ðû³ÆÉÐδÕÒµ½ÈκÎÖ¤¾ÝÅú×¢Ó×ÎÒÊý¾ÝÒѱ»Ð¹Â¶¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/australian-shipping-giant-toll-hit-ransomware
3.ÀÕË÷Èí¼þDoppelPaymer½«ÔÚ°µÍøÏúÊÛδ¸¶¿îÊܺ¦ÕßµÄÊý¾Ý
ÀÕË÷Èí¼þDoppelPaymerÍþв³ÆÈôÊÇÊܺ¦Õß²»Ö§¸¶Êê½ð£¬ËûÃǽ«ÔÚ°µÍøÏúÊÛ»ò°ä²¼µÁÈ¡µÄÊܺ¦ÕßÎļþ¡£ÕâÖÖÐµĹ¥»÷Õ½ÊõʼÓÚ2019Äê11Ô£¬ÓÉÀÕË÷Èí¼þMazeÌáÒé£¬ËæºóÓÉSodinokibi/REvilºÍNemty¸ú½ø£¬´Ë¿ÌÂÖµ½DoppelPaymerÁË¡£DoppelPaymer¹¥»÷Õ߳ƽüÒ»ÄêÀ´ËûÃÇÒ»Ïò´ÓÊܺ¦ÕßÄÇÀïÇÔÈ¡Êý¾Ý£¬²¢ÇÒÐû³Æµ±Êܺ¦Õß²»Ö§¸¶Êê½ðʱ£¬ËûÃÇ´Óǰ¾ÍÔøÔÚ°µÍøÉÏÄäÃûÏúÊÛÕâЩÊý¾Ý¡£ÎªÁËÖ¤Ã÷ÕâÒ»µã£¬¹¥»÷Õß»¹°ä²¼ÁËÁ½¸öExcel±í¸ñ£¬ÆäÖÐÔ̺¬ËûÃÇÔøÈëÇÖµÄÁ½¸öÍøÂçµÄWindows DomainÓû§ÁÐ±í£¬µ«Ã»ÓзÖÏí¾Ý³Æ´ÓÊܺ¦ÕßÄÇÀïµÁÈ¡µÄÈκÎÎļþ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/
4.ºÚ¿ÍÀûÓÃSharePoint·ì϶(CVE-2019-0604)¹¥»÷Öж«µØÓò
Palo Alto Networks µÄ Unit 42·¢ÏÖºÚ¿ÍÈÔÔÚÀûÓÃSharePoint·ì϶£¨CVE-2019-0604£©¹¥»÷Öж«µ±¾Ö×éÖ¯¡£ÔÚ2019Äê9ÔÂ10ÈÕ£¬×êÑÐÈËÔ±¹Û²ìµ½¹¥»÷ÕßÀûÓø÷ì϶ÔÚÖж«µ±¾Ö×éÖ¯µÄÍøÕ¾ÉÏ×°ÖÃÁ˶à¸öWeb Shell£¬ÆäÖÐÒ»¸öÊÇGithubÉÏÃâ·ÑÌṩµÄ¿ªÔ´AntSword Web Shell¡£¹¥»÷ÕßÀûÓÃÕâЩWeb ShellºáÏòÒÆ¶¯ÍøÂç½Ó¼ûÆäËüϵͳ£¬²¢Ê¹Óö¨ÔìµÄMimikatz±äÖÖ´ÓÄÚ´æÖÐת´¢Í´´¦ºÍʹÓÃImpacketµÄatexec¹¤¾ßÔÚÕû¸öÍøÂçµÄÆäËüϵͳÉÏÔËÐкÅÁî¡£9ÔÂÏÂÑ®£¬Unit 42¹Û²ìµ½Ò»ÑùµÄMimikatz±äÖÖ±»ÉÏÔØµ½ÁíÒ»¸öÖж«¹ú¶ÈµÄÁíÒ»¸öµ±¾Ö×éÖ¯µÄWeb ShellÖС£2020Äê1ÔÂÉÏÑ®£¬×êÑÐÈËԱʹÓÃShodanËÑË÷Á˶³öµÄSharePoint·þÎñÆ÷£¬·¢ÏÖÈÔÓÐ28881¸ö·þÎñÆ÷ʹÓôæÔÚ·ì϶µÄ°æ±¾¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/actors-still-exploiting-sharepoint-vulnerability/
5.×êÑÐÈËÔ±·¢ÏÖÐÂÀÕË÷Èí¼þEKANSÖØÒªÕë¶Ô¹¤Òµ½ÚÔìϵͳ
2ÔÂ3ÈÕ°²È«³§ÉÌDragos°ä²¼Ò»·Ý»ã±¨³Æ£¬ÐÂÀÕË÷Èí¼þEKANSÒýÆðÁ˰²È«×êÑÐÈËԱȷ°ÑÎÈ£¬ÓÉÓÚ¸ÃÀÕË÷Èí¼þÓµÓÐÆÈÊ¹ÍÆËã»úÖÕ³¡Ó빤ҵ½ÚÔìϵͳÓйصÄÌØ¶¨»î¶¯»ò¹ý³ÌµÄÄÜÁ¦¡£×êÑÐÈËÔ±Joe Slowik°µÊ¾£¬Ö»¹ÜÆä¹¥»÷Ïà¶ÔÔʼ£¬µ«EKANS»¹ÊÇ×Ô¶¯Õë¶ÔICS»·¾³ÖеÄÄ³Ð©ÌØ¶¨²úÆ·£¬Ô̺¬ÓëGE ProficyµÄÊý¾Ýº¹Çà·þÎñ¡¢GE Fanuc licensing serverµÄ·þÎñÒÔ¼°HoneywellµÄHMIWebÀûÓÃÓйصĹý³Ì¡£Ä¿Ç°¸ÃÀÕË÷Èí¼þËÆºõ»¹²»ÊÇÒ»¸öºÜ´óµÄΣÏÕ£¬×êÑÐÈËÔ±ÒÔΪEKANS¿ÉÄÜÓëÁíÒ»¸öÕë¶ÔICSµÄÀÕË÷Èí¼þMegaCortex´æÔÚ¹ØÁª¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/attacks-breaches/ekans-ransomware-raises-industrial-control-worries/d/d-id/1336950
6.Realtek½¨¸´Windows HDÒôƵÇý¶¯·¨Ê½ÖеÄDLL½Ù³Ö·ì϶
Realtek½¨¸´ÁËWindows HDÒôƵÇý¶¯·¨Ê½°üÖеÄÒ»¸öDLL½Ù³Ö·ì϶£¬¸Ã·ì϶£¨CVE-2019-19705£©¿ÉÄÜÔÊÐíDZÔڵĹ¥»÷Õß»ñµÃÓÆ¾ÃÐÔ¡¢Ö²Èë¶ñÒâÈí¼þ²¢Ìӱܼì²â¡£SafeBreach Labs°²È«×êÑÐÔ±Peleg Hadar·¢ÏÖÁ˸÷ì϶£¬Hadar°µÊ¾¸Ã·ì϶ÊÇÓÉÒÑÊðÃûµÄHDÒôƵ²¼¾°£¨RAVBg64.exe£©¹ý³Ìµ¼Öµģ¬¸Ã¹ý³ÌÊÔͼ´ÓÆäµ±Ç°¹¤×÷Ŀ¼£¨CWD£©¶ø²»ÊÇDLLµÄÏÖʵµØÎ»¼ÓÔØDLL£¬²¢ÇÒûÓÐÑéÖ¤DLLµÄÊðÃûÖ¤Êé¡£ÕâÒ»ÎÊÌâµÄµ××ÓÔÒòÊÇÔÚÇý¶¯·¨Ê½°ü£¨°æ±¾1.0.0.8855£©ÖÐʹÓÃÁËMicrosoft Visual Studio 2005 MFC£¬µ¼Ö¸÷¨Ê½°ü»á×Ô¶¯¼ÓÔØ×ÊÔ´DLL¡£Realtekͨ¹ý8857¼°¸ü¸ß°æ±¾µÄHD AudioÇý¶¯·¨Ê½°ü½¨¸´Á˸ÃÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/realtek-fixes-dll-hijacking-flaw-in-hd-audio-driver-for-windows/


¾©¹«Íø°²±¸11010802024551ºÅ