΢Èí°ä²¼·ì϶²¹¶¡½¨¸´111¸ö·ì϶£»Thunderbolt´æÔÚ·ì϶ӰÏìÊý°ÙÍòÉ豸
°ä²¼¹¦·ò 2020-05-131.΢Èí°ä²¼·ì϶²¹¶¡£¬½¨¸´12¿î²úÆ·ÖÐ111¸ö·ì϶
5ÔÂ12ÈÕ£¬Î¢Èí°ä²¼ÁË5Ô·ݷì϶²¹¶¡£¬½¨¸´ÁËEdge¡¢Windows¡¢Visual StudioÒÔ¼°.NET FrameworkϵÄ12¿î²úÆ·ÖеÄ111¸ö·ì϶¡£Õâ´Î½¨¸´µÄ½ÏΪÑϳÁµÄ·ì϶ΪMicrosoft SharePointÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2020-1023¡¢CVE-2020-1024ºÍCVE-2020-1102£©¡¢Windows OSÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2020-1067£©¡¢MSHTMLÒýÇæÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2020-1064£©¡¢Microsoft Edge PDFÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2020-109£©ºÍJetÊý¾Ý¿âÒýÇæÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2020-1051£¬CVE-2020-1174£¬CVE-2020-1175ºÍCVE-2020-1176£©¡£±¾Ô°䲼µÄÊÇ΢Èíº¹ÇàÉϵÚÈý´óµÄ²¹¶¡·¨Ê½£¬Áí±íÁ½´Î±ðÀëÊÇÔÚ2020Äê3ÔºÍ2020Äê4Ô£¬½¨¸´ÁË115ºÍ113¸öÃýÎó¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-may-2020-patch-tuesday-fixes-111-vulnerabilities/
2.Thunderbolt´æÔÚ·ì϶£¬»ò½«Ó°ÏìÊý°ÙÍòÉ豸
°£Òò»ôοƼ¼´óѧµÄ×êÑÐÍŶÓÔÚÓ¢ÌØ¶ûµÄThunderbolt¶Ë¿ÚÖз¢ÏÖÁË7¸ö·ì϶£¬²¢·ÂÕÕÁË9ÖÖ¹¥»÷³¡¾°£¬ÓµÓÐÎïÀí½Ó¼ûȨÏ޵Ĺ¥»÷ÕßÄܹ»ÀûÓÃÕâЩ·ì϶½Ó¼ûºÍµÁÈ¡Êý¾Ý¡£×êÑз¢ÏÖ£¬¹¥»÷Õß½ö±ØÒªÎïÀí½Ó¼ûÆôÓÃÁËThunderboltµÄWindows»òLinuxϵͳ±ãÄܹ»ÊµÏÖ¹¥»÷£¬²¢ÇÒ²»»áÁôÏ»ºÛ¼£Ò²²»±ØÒªÓëÓû§½»»¥¡£¼´±ãÓû§ÔÚÍÑÀëʱÒÑ¾Ëø¶¨»ò¹ÒÆðÍÆËã»ú£¬²¢ÇÒÆôÓÃÁ˰²È«Æô¶¯ºÍÈ«Å̼ÓÃÜ£¬¸Ã¹¥»÷ÒÀÈ»Äܹ»ÊµÏÖ¡£¸Ã·ì϶ӰÏìÁË2019Äê֮ǰÔì×÷µÄÊý°ÙÍòWindowsºÍLinuxÉ豸¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/endpoint/thunderbolt-vulnerabilities-could-threaten-millions-of-pcs/d/d-id/1337789
3.ATMÔì×÷ÉÌDiebold NixdorfϰȾÀÕË÷²¡¶¾£¬ÏµÍ³ÖжÏ
¶íÖÝATMÔì×÷ÉÌDiebold NixdorfÓÚ4ÔÂ25ÈÕÍíÉÏ·¢ÏÔìä¹«Ë¾ÍøÂçÒì³££¬²¢ÒÉ»óÊÇÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬µ±¼´¶Ï¿ªÁ˸ÃÍøÂçÉϵÄϵͳÒÔ¶ôÔì¶ñÒâÈí¼þµÄ´«²¼¡£Diebold°µÊ¾¸Ã´Ë¹¥»÷Ö»ÊÇÓ°ÏìÁËÍøÂçºÍITϵͳ£¬µ«²¢Î´Ó°Ïì¿Í»§»ò¹«¼Ò¡£Æ¾¾ÝÉî¿Ìµ÷²é£¬¸ÃÀÕË÷²¡¶¾ÎªProLock£¬ÔÚ3Ô·ÝҲϰȾÁËÒÁÀûŵÒÁÖÝÀÈø¶ûÏØµÄϵͳ¡£BleepingComputerµÄLawrence Abrams˵£¬ProLockÒªÇóµÄÊê½ðͨ³£ÔÚ6λÊý£¬´Ó17.5ÍòÃÀÔªµ½66ÍòÃÀÔª²»µÈ¡£¶øDiebold°µÊ¾Ëü²¢Ã»ÓÐÖ§¸¶Êê½ð£¬²¢ÇÒ²»»á»áÉÌÊê½ð½ð¶î¡£
ÔÎÄÁ´½Ó£º
https://krebsonsecurity.com/2020/05/ransomware-hit-atm-giant-diebold-nixdorf/
4.ÃÀ¹ú¹«Ë¾Pitney BowesÔÙÔâÀÕË÷²¡¶¾¹¥»÷£¬ÎªMazeÌáÒé
ÃÀ¹ú¹«Ë¾Pitney BowesÔÚ7¸öÔÂÄÚÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷²¡¶¾¹¥»÷£¬Õâ´Î¹¥»÷ΪMazeÍÅ»ïÌáÒé¡£MazeÍÅ»ïÔÚÍøÉϰ䲼ÁË11ÕŸù«Ë¾ÍÆËã»úÍøÂçÄÚ²¿Ä¿Â¼ÁбíµÄ½ØÍ¼£¬ÒÔÖ¤Ã÷ËûÃǹ¥»÷³É¹¦¡£Pitney Bowes½²»°È˰µÊ¾Ä¿Ç°ÔÚµ÷²éÕâ´Î¹¥»÷µÄÁìÓò£¬³ö¸ñÊDZ»µÁÊý¾ÝÀàÐÍ¡£2019Äê10ÔÂPitney Bowes³õ´ÎÔâµ½RyukÍÅ»ïÌáÒéµÄÀÕË÷²¡¶¾¹¥»÷£¬¸ÃÊÂÎñµ¼ÖÂijЩ°ü¹ü¸ú×Ùϵͳͣ»ú¡£RyukºÍMazeÍŻﶼÊÇÀûÓÃÀÕË÷Èí¼þ¹¥»÷£¬µ«·ÖÆçµÄÊÇMaze»¹ÓÐÒ»¸öÍøÕ¾£¬²¢»áÔÚÊܺ¦Õ߾ܸ¶Êê½ðºóÔÚ¸ÃÍøÕ¾Ð¹Â¶Æä±»µÁÊý¾Ý¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/package-delivery-giant-pitney-bowes-confirms-second-ransomware-attack-in-7-months/
5.ºÚ¿ÍÂÛ̳WeLeakData.comÊý¾Ý¿â±»µÁ£¬ÂÛ̳ÐÅϢй¶
ºÚ¿ÍÂÛ̳WeLeakData.comµÄÊý¾Ý¿â±»µÁÇÒ±»·ÅÔÚ°µÍøÏúÊÛ£¬Ê¹¸ÃÍøÕ¾ºÚ¿ÍµÄÐÅÏ¢ºÍ°µÀï¶Ô»°Ð¹Â¶¡£Æ¾¾ÝÍøÂçµý±¨¹«Ë¾Cyble°ä²¼µÄ»ã±¨£¬WeLeakData.comµÄvBulletinÂÛ̳Êý¾Ý¿âй¶ÊÇÔÚ2020Äê1ÔÂ9ÈÕÆðÍ·µÄ£¬ÏÖÒÑÔÚ°µÍøÊг¡ÉÏÏúÊÛ¡£Ð¹Â¶Êý¾ÝÔ̺¬Óû§µÇ¼Ãû¡¢µç×ÓÓʼþµØÖ·¡¢¹þÏ£ÃÜÂëÒÔ¼°ËûÃǵÄIPµØÖ·ÒÔ¼°¸öÈËÐÂÎÅ¡£¶ÔÓÚ¸ÃÍøÕ¾Óû§À´ËµÕâ´ÎÊÂÎñÖÁ¹Ø³ÁÒª£¬ÓÉÓÚ·¨Âɲ¿ÃÅÄܹ»Ê¹ÓÃй©µÄIPµØÖ·ºÍµç×ÓÓʼþµØÖ·À´×·×ÙËûÃDz¢½«ÆäÓëÆäËû¹¥»÷ÓйØÁª¡£Õâ´Îй¶»¹Äܹ»ÈÃ×êÑÐÈËÔ±ÏàʶÈôºÎ½øÐй¥»÷¡£CybleĿǰÒѽ«Ð¹Â¶Êý¾ÝÔö³¤µ½ÆäÊý¾Ýй¶²éÕÒ·þÎñamibreached.comÖУ¬ÒÔ±ãÓû§Äܹ»²é³ÆäÐÅÏ¢ÊÇ·ñй©¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-private-chats-leaked-in-stolen-weleakdata-database/
6.ÒøÐÐľÂíSphinx»Ø¹éÉý¼¶£¬ÒÔCOVID-19ΪÖ÷ÌâÕë¶ÔÃÀ¹ú
ÒøÐÐľÂíSphinxÉý¼¶²¢»Ø¹é£¬Ê¹ÓÃCOVID-19À¬»øÓʼþ×÷Ϊµö¶üÕë¶ÔÃÀ¹úÓû§£¬Ö¼ÔÚ´ÓÆäÔÚÏßÒøÐлỰÖлñÈ¡Óû§Æ¾Ö¤ºÍÆäËûÓ×ÎÒÐÅÏ¢¡£Ð°汾µÄSphinxµÄÅ¤×ªÖØÒªÔÚ¶ñÒâ´úÂë×¢È뷽ʽºÍBotÅäÖÃÁ½·½Ãæ¡£Sphinxͨ¹ýŲÓÃä¯ÀÀÆ÷º¯ÊýÖ²Èë´úÂ룬Ê×ÏÈËüŲÓÃCreateProcessAº¯ÊýÀ´´´½¨Ò»¸öйý³Ì¼°ÆäÖ÷Ị̈߳¬¶øºóŲÓÃWriteProcessMemoryº¯ÊýÒÔ½«ÓÐЧ¸ºÔØ×¢Èëmsiexec.exe¹ý³Ì£¬×îºóʹÓÃGetThreadContextºÍSetThreadContextº¯Êý½«Ö¸±ê¹ý³ÌµÄÖ´Ðеã¸ü¸ÄΪ´Ó×¢ÈëµÄÓÐЧ¸ºÔØ¡£¶øBotÅäÖÃÖиü¸ÄÁËC2µØÖ·ºÍRC4ÃÜÔ¿£¬Ñ¡È¡Ö¸ÎƼø±ðÒÔ±ãËæÊ±ÏòÆäÍÆË͸üС£
ÔÎÄÁ´½Ó£º
https://threatpost.com/sphinx-riddle-us-targets-modifications/155621/


¾©¹«Íø°²±¸11010802024551ºÅ