ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂ簲ȫ³ß¶È£»Realtek½¨¸´Windows HDÒôƵÇý¶¯·¨Ê½ÖеÄDLL½Ù³Ö·ì϶

°ä²¼¹¦·ò 2020-02-05

1.ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂ簲ȫ³ß¶È


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹ú·À²¿1ÔÂ31ÈÕÕýʽ°ä²¼ÍøÂ簲ȫ³ÉÊì¶ÈÄ£ÐÍÈÏÖ¤£¨CMMC£©¿ò¼Ü1.0°æ±¾ ¡£¹ú·À²¿°ä·¢£¬µ½2026Äê¹ú·À³Ð°üÉÌÔڻظõ±¾Ö²É¹º´òËãµÄÌá°¸ÒªÇóʱ£¬±ØÐëÂú×ã¸ù»ùµÄÍøÂ簲ȫ³ß¶È ¡£Ëæ×ÅCMMCµÄÍÆ³ö£¬¹ú·À²¿µ«Ô¸Í¨¹ýÌá¸ß¹ú·À¹¤Òµ»ù´ ¡£¨DIB£©·Ö°üÉ̵ÄÍøÂ簲ȫ³ï±¸Ë®Æ½£¬À´¼ÓÇ¿¶Ô¹©¸øÁ´Î´·ÖÀàÐÅÏ¢£¨Áª¹úºÏͬÐÅÏ¢£¨FCI£©ºÍÊÜ¿ØÎ´·ÖÀàÐÅÏ¢£¨CUI£©£©µÄ±£»¤ ¡£CMMCÖ¼ÔÚͨ¹ýʹÓÃ5ÖÖ¼¶´ËÍâÈÏÖ¤À´¼ò»¯´óÐͺÍÓ×Ð͹ú·À³Ð°üÉ̵ÄÍøÂç¾ÍÐ÷ÐÔÈÏÖ¤£¬³ÁµãÊÇÍøÂ簲ȫʵ¼ÊºÍÁ÷³Ì ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dod-to-require-cybersecurity-certification-from-defense-contractors/


2.°Ä´óÀûÑÇ»õÔ˹«Ë¾Toll GroupÔâµ½ÀÕË÷Èí¼þ¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ΪӦ¶ÔÀÕË÷Èí¼þ¹¥»÷£¬°Ä´óÀûÑÇÔËÊäºÍÎïÁ÷¾ÞÍ·Toll Group±»ÆÈ¹Ø¹Ø²¿ÃÅÔÚÏß·þÎñ£¬²¿Ãſͻ§¶Ô¸Ã¹«Ë¾µÄ´¦Ö÷½Ê½°µÊ¾²»ÖÐÒâ ¡£¸Ã¹«Ë¾°µÊ¾£¬ËüÓÚ1ÔÂ31ÈÕÐÇÆÚÎåÔÚÆäϵͳÉÏ·¢ÏÖÁËÒ»¸öÀÕË÷Èí¼þ£¬²¢½ûÓÃÁËijЩϵͳÀ´¶ôÔì´ËÊÂÎñ ¡£Ò»Ð©¿Í»§ÔÚÉ罻ýÌåÉϱ§Ô¹ËûÃÇÎÞ·¨ÔÙ¸ú×Ù°ü¹ü£¬²¢Ðû³Æ¸Ã¹«Ë¾µÄÔ±¹¤Ò²ÎÞ·¨½Ó¼û¸ú×ÙÊý¾Ý¿â ¡£ÓÐÐÂÎÅÈËÊ¿³Æ¸ÃÊÂÎñÓ°ÏìÁ˰ĴóÀûÑÇ¡¢Ó¡¶ÈºÍ·ÆÂɱöµÄÒµÎñ ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÖÐʹÓõÄÊÇÄÄÖÖÀÕË÷Èí¼þ£¬¸Ã¹«Ë¾ÒÑ֪ͨÓйز¿ÃÅ£¬µ«Ðû³ÆÉÐδÕÒµ½ÈκÎÖ¤¾ÝÅú×¢Ó×ÎÒÊý¾ÝÒѱ»Ð¹Â¶ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/australian-shipping-giant-toll-hit-ransomware


3.ÀÕË÷Èí¼þDoppelPaymer½«ÔÚ°µÍøÏúÊÛδ¸¶¿îÊܺ¦ÕßµÄÊý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÀÕË÷Èí¼þDoppelPaymerÍþв³ÆÈôÊÇÊܺ¦Õß²»Ö§¸¶Êê½ð£¬ËûÃǽ«ÔÚ°µÍøÏúÊÛ»ò°ä²¼µÁÈ¡µÄÊܺ¦ÕßÎļþ ¡£ÕâÖÖÐµĹ¥»÷Õ½ÊõʼÓÚ2019Äê11Ô£¬ÓÉÀÕË÷Èí¼þMazeÌáÒé£¬ËæºóÓÉSodinokibi/REvilºÍNemty¸ú½ø£¬´Ë¿ÌÂÖµ½DoppelPaymerÁË ¡£DoppelPaymer¹¥»÷Õ߳ƽüÒ»ÄêÀ´ËûÃÇÒ»Ïò´ÓÊܺ¦ÕßÄÇÀïÇÔÈ¡Êý¾Ý£¬²¢ÇÒÐû³Æµ±Êܺ¦Õß²»Ö§¸¶Êê½ðʱ£¬ËûÃÇ´Óǰ¾ÍÔøÔÚ°µÍøÉÏÄäÃûÏúÊÛÕâЩÊý¾Ý ¡£ÎªÁËÖ¤Ã÷ÕâÒ»µã£¬¹¥»÷Õß»¹°ä²¼ÁËÁ½¸öExcel±í¸ñ£¬ÆäÖÐÔ̺¬ËûÃÇÔøÈëÇÖµÄÁ½¸öÍøÂçµÄWindows DomainÓû§ÁÐ±í£¬µ«Ã»ÓзÖÏí¾Ý³Æ´ÓÊܺ¦ÕßÄÇÀïµÁÈ¡µÄÈκÎÎļþ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/


4.ºÚ¿ÍÀûÓÃSharePoint·ì϶(CVE-2019-0604)¹¥»÷Öж«µØÓò


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Palo Alto Networks µÄ Unit 42·¢ÏÖºÚ¿ÍÈÔÔÚÀûÓÃSharePoint·ì϶£¨CVE-2019-0604£©¹¥»÷Öж«µ±¾Ö×éÖ¯ ¡£ÔÚ2019Äê9ÔÂ10ÈÕ£¬×êÑÐÈËÔ±¹Û²ìµ½¹¥»÷ÕßÀûÓø÷ì϶ÔÚÖж«µ±¾Ö×éÖ¯µÄÍøÕ¾ÉÏ×°ÖÃÁ˶à¸öWeb Shell£¬ÆäÖÐÒ»¸öÊÇGithubÉÏÃâ·ÑÌṩµÄ¿ªÔ´AntSword Web Shell ¡£¹¥»÷ÕßÀûÓÃÕâЩWeb ShellºáÏòÒÆ¶¯ÍøÂç½Ó¼ûÆäËüϵͳ£¬²¢Ê¹Óö¨ÔìµÄMimikatz±äÖÖ´ÓÄÚ´æÖÐת´¢Í´´¦ºÍʹÓÃImpacketµÄatexec¹¤¾ßÔÚÕû¸öÍøÂçµÄÆäËüϵͳÉÏÔËÐкÅÁî ¡£9ÔÂÏÂÑ®£¬Unit 42¹Û²ìµ½Ò»ÑùµÄMimikatz±äÖÖ±»ÉÏÔØµ½ÁíÒ»¸öÖж«¹ú¶ÈµÄÁíÒ»¸öµ±¾Ö×éÖ¯µÄWeb ShellÖÐ ¡£2020Äê1ÔÂÉÏÑ®£¬×êÑÐÈËԱʹÓÃShodanËÑË÷Á˶³öµÄSharePoint·þÎñÆ÷£¬·¢ÏÖÈÔÓÐ28881¸ö·þÎñÆ÷ʹÓôæÔÚ·ì϶µÄ°æ±¾ ¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/actors-still-exploiting-sharepoint-vulnerability/


5.×êÑÐÈËÔ±·¢ÏÖÐÂÀÕË÷Èí¼þEKANSÖØÒªÕë¶Ô¹¤Òµ½ÚÔìϵͳ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


2ÔÂ3ÈÕ°²È«³§ÉÌDragos°ä²¼Ò»·Ý»ã±¨³Æ£¬ÐÂÀÕË÷Èí¼þEKANSÒýÆðÁ˰²È«×êÑÐÈËԱȷ°ÑÎÈ£¬ÓÉÓÚ¸ÃÀÕË÷Èí¼þÓµÓÐÆÈÊ¹ÍÆËã»úÖÕ³¡Ó빤ҵ½ÚÔìϵͳÓйصÄÌØ¶¨»î¶¯»ò¹ý³ÌµÄÄÜÁ¦ ¡£×êÑÐÈËÔ±Joe Slowik°µÊ¾£¬Ö»¹ÜÆä¹¥»÷Ïà¶Ôԭʼ£¬µ«EKANS»¹ÊÇ×Ô¶¯Õë¶ÔICS»·¾³ÖеÄÄ³Ð©ÌØ¶¨²úÆ·£¬Ô̺¬ÓëGE ProficyµÄÊý¾Ýº¹Çà·þÎñ¡¢GE Fanuc licensing serverµÄ·þÎñÒÔ¼°HoneywellµÄHMIWebÀûÓÃÓйصĹý³Ì ¡£Ä¿Ç°¸ÃÀÕË÷Èí¼þËÆºõ»¹²»ÊÇÒ»¸öºÜ´óµÄΣÏÕ£¬×êÑÐÈËÔ±ÒÔΪEKANS¿ÉÄÜÓëÁíÒ»¸öÕë¶ÔICSµÄÀÕË÷Èí¼þMegaCortex´æÔÚ¹ØÁª ¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/attacks-breaches/ekans-ransomware-raises-industrial-control-worries/d/d-id/1336950


6.Realtek½¨¸´Windows HDÒôƵÇý¶¯·¨Ê½ÖеÄDLL½Ù³Ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Realtek½¨¸´ÁËWindows HDÒôƵÇý¶¯·¨Ê½°üÖеÄÒ»¸öDLL½Ù³Ö·ì϶£¬¸Ã·ì϶£¨CVE-2019-19705£©¿ÉÄÜÔÊÐíDZÔڵĹ¥»÷Õß»ñµÃÓÆ¾ÃÐÔ¡¢Ö²Èë¶ñÒâÈí¼þ²¢Ìӱܼì²â ¡£SafeBreach Labs°²È«×êÑÐÔ±Peleg Hadar·¢ÏÖÁ˸÷ì϶£¬Hadar°µÊ¾¸Ã·ì϶ÊÇÓÉÒÑÊðÃûµÄHDÒôƵ²¼¾°£¨RAVBg64.exe£©¹ý³Ìµ¼Öµģ¬¸Ã¹ý³ÌÊÔͼ´ÓÆäµ±Ç°¹¤×÷Ŀ¼£¨CWD£©¶ø²»ÊÇDLLµÄÏÖʵµØÎ»¼ÓÔØDLL£¬²¢ÇÒûÓÐÑéÖ¤DLLµÄÊðÃûÖ¤Êé ¡£ÕâÒ»ÎÊÌâµÄµ××ÓÔ­ÒòÊÇÔÚÇý¶¯·¨Ê½°ü£¨°æ±¾1.0.0.8855£©ÖÐʹÓÃÁËMicrosoft Visual Studio 2005 MFC£¬µ¼Ö¸÷¨Ê½°ü»á×Ô¶¯¼ÓÔØ×ÊÔ´DLL ¡£Realtekͨ¹ý8857¼°¸ü¸ß°æ±¾µÄHD AudioÇý¶¯·¨Ê½°ü½¨¸´Á˸ÃÎÊÌâ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/realtek-fixes-dll-hijacking-flaw-in-hd-audio-driver-for-windows/