˼¿Æ°ä²¼°²È«¸üУ¬½¨¸´ASAºÍFTDÖеÄõè¾¶±éÀú·ì϶£»D-Link·ÓÉÆ÷¹Ì¼þδ¼ÓÃܵľµÏñ¿Éй¶¼ÓÃÜÃÜÔ¿ Ô´´ άËûÃü άËûÃü°²È« ½ñÌì
°ä²¼¹¦·ò 2020-07-241.˼¿Æ°ä²¼°²È«¸üУ¬½¨¸´ASAºÍFTDÖеÄõè¾¶±éÀú·ì϶
˼¿ÆÒѰ䲼°²È«¸üУ¬½¨¸´×ÔÊÊÓ¦°²È«É豸£¨ASA£©Èí¼þºÍFirepowerÍþв·ÀÓù£¨FTD£©Èí¼þWeb·þÎñÖеÄõè¾¶±éÀú·ì϶£¨CVE-2020-3452£©¡£¸Ã·ì϶ÊÇÓÉÓÚÊÜÓ°ÏìÉ豸´¦ÖõÄHTTPÒªÇóÖеÄURL²»×ãÕýÈ·µÄÊäÈëÑéÖ¤ËùÖ£¬¹¥»÷ÕßÄܹ»Í¨¹ý·¢ËÍÔ̺¬Ä¿Â¼±éÀú×Ö·ûÐòÁеÄÌØÔìHTTPÒªÇóÀ´ÀûÓô˷ì϶¡£³É¹¦µÄÀûÓú󣬹¥»÷ÕßÄܹ»ÔÚÖ¸±êÉ豸Éϲ鿴Web·þÎñÎļþϵͳÄÚµÄËÁÒâÎļþ¡£¸Ã·ì϶ӰÏìÁËAnyConnect»òWebVPNÅäÖõÄASAºÍFTDÈí¼þ¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/07/23/cisco-releases-security-updates-asa-and-ftd-software
2.¿¨°Í˹»ù·¢ÏÖLazarusÀûÓöñÒâÈí¼þMATAÇÔÈ¡Êý¾Ý
¿¨°Í˹»ù×î½ü·¢ÏÖ³¯ÏÊ¿Í×éÖ¯LazarusÀûÓöñÒâÈí¼þ¿ò¼ÜMATA½øÐÐÀÕË÷Èí¼þ¹¥»÷ºÍÊý¾Ý͵ÇÔ£¬Õë¶Ô¶à¸ö¹ú¶ÈºÍµØÓòµÄ¹«Ë¾£¬Ô̺¬²¨À¼¡¢µÂ¹ú¡¢ÍÁ¶úÆä¡¢º«¹ú¡¢ÈÕ±¾ºÍÓ¡¶È¡£LazarusµÄÖ¸±êÔ̺¬µ«²»ÏÞÓÚÈí¼þ¿ª·¢¹«Ë¾¡¢»¥ÁªÍø·þÎñÌṩÉ̺͵ç×ÓÉÌÎñ¹«Ë¾¡£MATAÊÇÒ»¸öÄ£¿é»¯¿ò¼Ü£¬¿ÉÓÃÓÚϰȾWindows¡¢LinuxºÍmacOSϵͳ¡£ÔÚ¹¥»÷¹ý³ÌÖУ¬ºÚ¿ÍʹÓÃMATA½«¶à¸ö²å¼þ¼ÓÔØµ½ÊÜϰȾϵͳµÄÄÚ´æÖУ¬ÔËÐкÅÁ°Ñ³ÖÎļþºÍ¹ý³Ì£¬×¢ÈëDLL£¬ÔÚWindowsÉ豸ÉÏ´´½¨HTTP´úÀíºÍËí·¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/lazarus-hackers-deploy-ransomware-steal-data-using-mata-malware/
3.D-Link·ÓÉÆ÷¹Ì¼þδ¼ÓÃܵľµÏñ¿Éй¶¼ÓÃÜÃÜÔ¿
°²È«×êÑÐÈËÔ±·¢ÏÖ£¬D-Link·ÓÉÆ÷¹Ì¼þδ¼ÓÃܵľµÏñ¿Éй¶¼ÓÃÜÃÜÔ¿¡£ÔÚÆðÍ··ÖÎöʱ£¬×êÑÐÈËÔ±´ÓÍøÕ¾ÏÂÔØÁËD-Link¹Ì¼þ£¨ 1.02B03°æ±¾£©£¬¶øºóʹÓÃBinwalk½øÐзÖÎö£¬·¢ÏÖÁËÁ½¸ö¹Ì¼þÎļþDIR3040A1_FW102B03.binºÍDIR3040A1_FW102B03_uncrypted.bin¡£ÔÚÔËÐÐÒÔuncrypted½áβµÄÎļþʱ·¢ÏÖ£¬¸Ã¾µÏñÔ̺¬Î´¼ÓÃܵĹ̼þ¶þ½øÔìÎļþ £¬¶øºóËûÃÇÄܹ»ÌáÈ¡²¢·ÖÎö´æ´¢µÄ½âÃÜÃÜÔ¿¡£¾¹ý½øÒ»²½·ÖÎö£¬×êÑÐÈËÔ±·¢ÏÖ½âÃܺͼÓÃÜÃÜÔ¿¾ù±»Ç¶Èë¶þ½øÔìÎļþÖС£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/d-link-blunder-firmware-encryption-key-exposed-in-unencrypted-image/
4.еĽ©Ê¬ÍøÂçPrometeiÀûÓÃWindows SMBÍÚ¾ò¼ÓÃÜÇ®±Ò
˼¿ÆTalosÔÚÒ°±í·¢ÏÖÁËÒ»¸öеĽ©Ê¬ÍøÂçPrometei£¬ÆäÀûÓÃMicrosoft Windows SMBºÍ̸ºáÏòÒÆ¶¯£¬Í¬Ê±°ÂÃØµØÍÚ¾ò¼ÓÃÜÇ®±Ò¡£¸Ã½©Ê¬ÍøÂç×ܹ²ÓÐ15¸ö¿ÉÖ´ÐÐÄ£¿é£¬ÕâЩģ¿éÓÉÒ»¸öÖ÷Ä£¿é½ÚÔ죬ÓÐÁ½¸öÖØÒªÖ°ÄÜ·ÖÖ§£ºÒ»¸öÊÇC ++·ÖÖ§£¬×¨ÃÅÓÃÓÚ¼ÓÃÜÇ®±ÒÍÚ¾ò²Ù×÷£»ÁíÒ»¸öÊÇ»ùÓÚ.NETµÄ·ÖÖ§£¬×¨ÃÅÓÃÓÚÆ¾Ö¤ÍµÇÔ£¬ÀÄÓÃSMBºÍ»ìºÏ¡£PrometeiÊ×ÏÈͨ¹ýÀûÓÃEternal BlueµÈSMB·ì϶·ÛËéÍÆËã»úµÄWindows ServerÐÂÎſ飨SMB£©ºÍ̸¡£¶øºóÀûÓÃMimikatzºÍ±©Á¦¹¥»÷À´É¨Ãè¡¢´æ´¢ºÍµÁȡƾ֤£¬²¢½«·¢ÏÖµÄËùÓÐÃÜÂë·¢Ë͵½ºÅÁîºÍ½ÚÔ죨C2£©·þÎñÆ÷£¬ÒÔ¹©ÆäËûÄ£¿éʹÓ᣸úڿÍ×éÖ¯µÄһ̨C2·þÎñÆ÷ÔÚ6Ô±»²é·â£¬µ«ÕâËÆºõ¶ÔPrometeiµÄ»î¶¯Ã»ÓÐÈκÎÄÚÈÝÐÔÓ°Ïì¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/prometei-botnet-is-infecting-machines-to-mine-for-cryptocurrency/#ftag=RSSbaffb68
5.½©Ê¬ÍøÂçEmotetÆðÍ·´óÁ¿·Ö·¢¶ñÒâÈí¼þQakBot
×êÑÐÈËÔ±·¢ÏÖ£¬½©Ê¬ÍøÂçEmotetÆðÍ·¸ß¿ìµØ·Ö·¢¶ñÒâÈí¼þQakBot£¬È¡´úÁË֮ǰ³Ö¾ÃʹÓõÄTrickBot¡£°²È«×êÑÐÔ±Bom·¢ÏÖÁËÒ»¸öQakBotÑù±¾£¬²¢ÀûÓÃAny.Run½øÐзÖÎö£¬·¢ÏÖÁËÆäºÅÁîºÍ½ÚÔì·þÎñÆ÷£¨C2£©µØÖ·µÄÁÐ±í¡£ÍøÂç·¸×ïµý±¨¹«Ë¾Intel 471½øÒ»²½·ÖÎöÏÔʾ£¬´ËQBotÑù±¾ÖеÄ×Ö·û´®partner01Åú×¢£¬EmotetÕâ´Î»î¶¯ÓкÜÇ¿µÄÁªÏµ¡£Ä¿Ç°£¬Éв»Ã÷ÏÔQakBot»áÔÚÊÜϰȾµÄϵͳÉϲ¿Êðʲô£¬µ«Ò»Ð©Êܺ¦Õß¿ÉÄÜ»áϰȾÀÕË÷Èí¼þ£¬ÓÈÆäÊÇProLock¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/emotet-botnet-is-now-heavily-spreading-qakbot-malware/
6.Ô¼¿Ë´óѧÔâÊý¾Ýй¶£¬»òÒòBlackbaudϰȾÀÕË÷Èí¼þ
Ô¼¿Ë´óѧÅû¶ÆäÔâµ½ÁËÊý¾Ýй¶£¬Ô±¹¤ºÍѧÉúÊý¾Ý±»µÁ£¬ÓëÆäµÚÈý·½ÔÆÍÆËãÌṩÉÌBlackbaudÓÚ2020Äê5ÔÂÔâµ½µÄÀÕË÷Èí¼þ¹¥»÷Óйء£¸Ã´óѧÉÐδÅû¶¿ÉÄÜÊܵ½Ó°ÏìµÄÓ×ÎÒÊýÁ¿£¬µ«°µÊ¾Õâ´Îй¶µÄÊý¾Ý¿ÉÄÜÔ̺¬ÁËÐÕÃû¡¢Ö°³Æ¡¢ÐԱ𡢵®ÉúÈÕÆÚ¡¢Ñ§Éú±àºÅ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢ÏÖʵµØÖ·ºÍLinkedInÓ×ÎÒ×ÊÁϼͼ¡¢¿Î³ÌÐÅÏ¢¡¢Ëù»ñµÃµÄ×ʸñ¡¢Óйؿαí»î¶¯µÄ¾ßÌåÐÅÏ¢¡¢Ö°Òµ¡¢¹ÍÖ÷¡¢µ÷²é»Ø´ðÒÔ¼°ÒѼͼµÄУÓѻºÍ³ï¿î»î¶¯¡£Ö»¹ÜBlackbaudÒѾ֧¸¶Êê½ð£¬µ«²»Äܱ£ÕÏÊý¾ÝÒѰ´ºÍ̸Ïú»Ù£¬Òò¶ø¸Ã´óѧ»¹·¢Õ¹ÁË×Ô¼ºµÄµ÷²é£¬²¢½«´ËÊÂÎñ·î¸æ¹¤×÷ÈËÔ±¡¢Ñ§ÉúºÍÓ¢¹úÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/university-of-york-discloses-data-breach-staff-and-student-records-stolen/#ftag=RSSbaffb68


¾©¹«Íø°²±¸11010802024551ºÅ