Malwarebytes°ä²¼2020Äê¶ñÒâÈí¼þÇé¿ö»ã±¨£»Ë¼¿ÆTalosÅû¶ImageGear¿âÖжà¸ö´úÂëÖ´Ðзì϶
°ä²¼¹¦·ò 2020-02-121.΢Èí°ä²¼2ÔÂWindows°²È«¸üУ¬½¨¸´99¸ö·ì϶
΢Èí°ä²¼2ÔÂWindows°²È«¸üУ¬ÕâÒ²ÊÇWindows 7Óû§µÚÒ»´Î²»»á»ñµÃÃâ·ÑµÄ°²È«¸üС£ÔÚ±¾Ôµİ²È«¸üÐÂÖУ¬Î¢Èí½¨¸´ÁË99¸ö·ì϶£¬ÆäÖÐÔ̺¬IE 0day£¨CVE-2020-0674£©£¬¸Ã·ì϶ÒÑÔÚÒ°±í±»»ý¼«ÀûÓ㬽¨ÒéÓû§¾¡¿ì×°ÖøüС£³ý´ËÖ®±í£¬Î¢Èí»¹³ÆÓÐ3¸ö·ì϶Òѹ«¿ªÅû¶£¬µ«Î´ÔÚÒ°±í±»ÀûÓã¬Ô̺¬Windows InstallerÌáȨ·ì϶£¨CVE-2020-0683ºÍCVE-2020-0686£©ÒÔ¼°Î¢Èíä¯ÀÀÆ÷ÐÅϢй¶·ì϶£¨CVE-2020-0706£©¡£ÆëÈ«·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsofts-february-2020-patch-tuesday-fixes-99-flaws-ie-0day/
2.˼¿ÆTalosÅû¶ImageGear¿âÖжà¸ö´úÂëÖ´Ðзì϶

˼¿ÆTalosÅû¶Accusoft ImageGear¿âÖз¢ÏֵĶà¸ö´úÂëÖ´Ðзì϶¡£ImageGear¿âÊÇÒ»¸öÎĵµ-ͼÏñ¿ª·¢ÈËÔ±¹¤¾ß°ü£¬¿ÉÔ®ÊÖÓû§½øÐÐͼÏñת»»¡¢´´½¨¡¢±à×ëµÈ²Ù×÷¡£×êÑÐÈËÔ±·¢ÏÖImageGear 19.5.0°æ±¾µÄigcore19d.dll´æÔÚ¶à¸ö´úÂëÖ´Ðзì϶£¬Ô̺¬CVE-2019-5187¡¢CVE-2020-6063~CVE-2020-6067¼°CVE-2020-6069¡£AccusoftÒѾÔÚImageGear 19.6Öн¨¸´ÁËÕâЩ·ì϶¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2020/02/accusoft-imagegear-code-execution-feb-2020.html
3.Malwarebytes°ä²¼2020Äê¶ñÒâÈí¼þÇé¿ö»ã±¨
Malwarebytes Labs°ä²¼2020Äê¶ñÒâÈí¼þÇé¿ö»ã±¨£¬»ã±¨Ö¸³öÓëÕë¶ÔWindows PCµÄÍþвÏà±È£¬MacÍþв³ÊÖ¸Êý¼¶Ôö³¤¡£MacÍþвµÄ×ÜÊýÁ¿Í¬±ÈÔö³¤ÁË400£¥ÒÔÉÏ£¬µ«ÕâÒ»Êý×ֿ϶¨Ë®Æ½ÉÏ¿ÉÄÜÊܵ½2019ÄêMalwarebytes MacÓû§ÈºÔö³¤µÄÓ°Ïì¡£¶Ôµ¥¸öÖն˶øÑÔ£¬MacÍþвÒÀÈ»±ÈWindows¸ß£¬ÏÕЩΪ2£º1¡£»ã±¨»¹Ö¸³ö¹¥»÷ÐÔ¸æ°×Èí¼þ¡¢Ä¾ÂíºÍHackToolsÖ÷µ¼ÁËÕë¶ÔÒµÎñ¶ËµãµÄÈ«ÇòÍþв£¬±ÈÈ¥ÄêͬÆÚÔö³¤ÁË13£¥¡£¹¥»÷ÆóÒµµÄÀÕË÷Èí¼þ»î¶¯´ïµ½º¹Çà×î¸ßˮƽ£¬RyukºÍSodinokibiµÈ¼Ò×å±ðÀëÔö³¤ÁË543£¥ºÍ820£¥¡£EmotetºÍTrickBotÒÀÈ»ÊÇÕë¶ÔÆóÒµµÄÖØÒªÍþв֮һ¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/reports/2020/02/malwarebytes-labs-releases-2020-state-of-malware-report/
4.FBIÖÒ¸æÕë¶ÔÃÀ¹úICSÄÜÔ´²¿ÃŵÄÈí¼þ¹©¸øÁ´¹¥»÷
¾ÝZDNet±¨Â·£¬FBIÒÑÏòÃÀ¹ú˽Ӫ²¿ÃÅ·¢³ö°²È«¾¯±¨£¬ÖÒ¸æÔÚ½øÐеÄÕë¶ÔÈí¼þÌṩÉ̵Ĺ©¸øÁ´¹¥»÷»î¶¯¡£¹¥»÷ÕßÊÔIJÀûÓÃÔ¶¿ØÄ¾ÂíKwampirsϰȾÆóÒµ¡£FBIÔÚÒ»·ÝÉêÃ÷ÖаµÊ¾£¬¹¥»÷ÕßÕë¶ÔÈí¼þ¹©¸øÁ´¹«Ë¾ÊÇΪÁ˽ӼûÊܺ¦ÕßµÄÕ½ÊõºÏ×÷ͬ°éºÍ¿Í»§£¬ÆäÖÐÔ̺¬ÎªÈ«ÇòÄÜÔ´³ö²ú¡¢´«ÊäºÍ·ÖÅäICSϵͳÌṩ֧³ÖµÄʵÌå¡£¸Ã¶ñÒâÈí¼þ»¹²¿ÊðÔÚÕë¶ÔÒ½ÁÆ¡¢ÄÜÔ´ºÍ½ðÈÚÁìÓò¹«Ë¾µÄ¹¥»÷ÖС£FBI²¢Î´ÔÚ¾¯±¨Öбêʶָ±êÈí¼þ¹©¸øÉÌ£¬Ò²Ã»ÓбêʶÈÎºÎÆäËüÊܺ¦Õߣ¬µ«ÌṩÁËIOCºÍYARA¹æ¶¨¡£×éÖ¯Äܹ»ÀûÓÃËüÃÇÀ´É¨ÃèÄÚ²¿ÍøÂ磬²éÕÒKwampirs RATµÄºÛ¼£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fbi-warns-about-ongoing-attacks-against-software-supply-chain-companies/
5.Êý°Ù¸öDocker×¢²á±íÒòÅäÖÃÃýÎóй¶¹«Ë¾Ãô¸ÐÐÅÏ¢
Palo Alto Networks»ã±¨³ÆÔÚÊý°Ù¸ö¿É´Ó»¥ÁªÍø¹«¿ª½Ó¼ûµÄDocker×¢²á±íÖз¢ÏÖÁËÊýÒÔǧ¼ÆµÄ¶³ö´úÂë´æ´¢¿â¡£ÕâЩDocker×¢²á±íÔ̺¬ÀûÓ÷¨Ê½Ô´´úÂëºÍº¹Çà°æ±¾µÈ¹Ø¼üÒµÎñÊý¾Ý£¬¿ÉÄÜ»áʹ×éÖ¯µÄÕû¸öÔÆ»ù´¡¼Ü¹¹Ãæ¶Ô·çÏÕ¡£Â¶³ö»¹¿ÉÄܵ¼ÖÂרÓÐ֪ʶ²úȨ±»µÁ¡¢¹Ø¼üÔËÓªÊý¾Ý±»½Ù³Ö»ò¶ñÒâ´úÂë±»×¢Èë¡£×êÑÐÈËÔ±É跨ͨ¹ý·´ÏòDNS²éÕÒ¼°TLSÖ¤ÊéÖеÄcname½«ËÄ·ÖÖ®Ò»µÄ¶³öDocker×¢²á±í¹éÒòÓÚ×êÑлú¹¹¡¢ÁãÊÛÉÌ¡¢ÐÂÎÅýÌå×éÖ¯ºÍ¼¼Êõ¹«Ë¾¡£ÓÉÓÚÿ¸ö×¢²á±íͨ³£¶¼±»¶à¸ö¿Í»§¶Ë½Ó¼û£¬ÕâÒâζ×ÅËùÓÐÀÈ¡²¢ÔËÐоµÏñµÄ¿Í»§¶Ë¶¼ÈÝÒ×Êܵ½ÇÖº¦¡£ÕâÖÖÅäÖÃÃýÎóµÄ²¹¾ÈÕ½ÊõºÜµ¥Ò»£¬Äܹ»Í¨¹ýÔö³¤·À»ðǽ¹æ¶¨ÒÔÔ¤·À´ÓInternet½Ó¼û×¢²á±í£¬ÒÔ¼°ÔÚËùÓÐAPIÒªÇóÖÐÇ¿ÔìÖ´ÐÐÉí·ÝÑéÖ¤±êÍ·À´ÊµÏÖ¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/misconfigured-docker-registries-expose-thousands-repositories
6.Ê¥µØÑǸçѧǰ½ÌÓý»ú¹¹EESй¶ѧÁäǰ¶ùͯÊý¾Ý
¹¥»÷Õß·¸·¨½Ó¼ûÁËλÓÚ¼ÓÀû¸£ÄáÑÇÖÝÊ¥µØÑǸçµÄѧǰ½ÌÓý»ú¹¹Enrichment Systems£¬Inc£¨EES£©µÄÔ±¹¤µç×ÓÓʼþÕÊ»§£¬²¢ÇÒ¿ÉÄÜÒѾ²é¿´Á˸¸Ä¸ºÍѧÉúµÄÃô¸ÐÐÅÏ¢¡£¸Ã·ÇͶ»ú×éÖ¯ÖÂÁ¦ÓÚΪµÍÊÕÈë¼ÒÍ¥µÄ18¸öÔÂÖÁ5ËêµÄ¶ùͯÌṩ·þÎñ£¬¸Ã×éÖ¯ÔÚÍøÕ¾ÉϵÄÊý¾Ýй¶֪ͨÖаµÊ¾£¬ÆäÔ±¹¤ÕË»§ÔÚ2019Äê5ÔÂ27ÈÕÖÁ2019Äê7ÔÂ15ÈÕÖ®¼äÊܵ½Î´¾ÊÚȨµÄ½Ó¼û£¬¿ÉÄÜÔÚ¸ÃÊÂÎñÖÐй¶µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢µØÖ·¡¢Éç»á°²È«ºÅÂë¡¢²ÆÕþÐÅÏ¢¡¢Ò½ÁƱ£ÏÕÐÅÏ¢¡¢Ñ§Éú½ÌÓýµµ°¸ÒÔ¼°²¡ÀúºÍÒ½ÖÎÐÅÏ¢¡£EES³ÐŵΪÊÜÓ°ÏìµÄÈËÌṩÃâ·ÑµÄÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ¡£
ÔÎÄÁ´½Ó£º
https://hotforsecurity.bitdefender.com/blog/data-breach-hits-san-diego-low-income-preschool-provider-22261.html


¾©¹«Íø°²±¸11010802024551ºÅ