˼¿Æ°ä²¼°²È«¸üУ¬½¨¸´ASAºÍFTDÖеÄõè¾¶±éÀú·ì϶£»D-Link·ÓÉÆ÷¹Ì¼þδ¼ÓÃܵľµÏñ¿Éй¶¼ÓÃÜÃÜÔ¿ Ô­´´ άËûÃü άËûÃü°²È« ½ñÌì

°ä²¼¹¦·ò 2020-07-24

1.˼¿Æ°ä²¼°²È«¸üУ¬½¨¸´ASAºÍFTDÖеÄõè¾¶±éÀú·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆÒѰ䲼°²È«¸üУ¬½¨¸´×ÔÊÊÓ¦°²È«É豸£¨ASA£©Èí¼þºÍFirepowerÍþв·ÀÓù£¨FTD£©Èí¼þWeb·þÎñÖеÄõè¾¶±éÀú·ì϶£¨CVE-2020-3452£© ¡£¸Ã·ì϶ÊÇÓÉÓÚÊÜÓ°ÏìÉ豸´¦ÖõÄHTTPÒªÇóÖеÄURL²»×ãÕýÈ·µÄÊäÈëÑéÖ¤ËùÖ£¬¹¥»÷ÕßÄܹ»Í¨¹ý·¢ËÍÔ̺¬Ä¿Â¼±éÀú×Ö·ûÐòÁеÄÌØÔìHTTPÒªÇóÀ´ÀûÓô˷ì϶ ¡£³É¹¦µÄÀûÓú󣬹¥»÷ÕßÄܹ»ÔÚÖ¸±êÉ豸Éϲ鿴Web·þÎñÎļþϵͳÄÚµÄËÁÒâÎļþ ¡£¸Ã·ì϶ӰÏìÁËAnyConnect»òWebVPNÅäÖõÄASAºÍFTDÈí¼þ ¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/07/23/cisco-releases-security-updates-asa-and-ftd-software


2.¿¨°Í˹»ù·¢ÏÖLazarusÀûÓöñÒâÈí¼þMATAÇÔÈ¡Êý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ù×î½ü·¢ÏÖ³¯ÏÊ¿Í×éÖ¯LazarusÀûÓöñÒâÈí¼þ¿ò¼ÜMATA½øÐÐÀÕË÷Èí¼þ¹¥»÷ºÍÊý¾Ý͵ÇÔ£¬Õë¶Ô¶à¸ö¹ú¶ÈºÍµØÓòµÄ¹«Ë¾£¬Ô̺¬²¨À¼¡¢µÂ¹ú¡¢ÍÁ¶úÆä¡¢º«¹ú¡¢ÈÕ±¾ºÍÓ¡¶È ¡£LazarusµÄÖ¸±êÔ̺¬µ«²»ÏÞÓÚÈí¼þ¿ª·¢¹«Ë¾¡¢»¥ÁªÍø·þÎñÌṩÉ̺͵ç×ÓÉÌÎñ¹«Ë¾ ¡£MATAÊÇÒ»¸öÄ£¿é»¯¿ò¼Ü£¬¿ÉÓÃÓÚϰȾWindows¡¢LinuxºÍmacOSϵͳ ¡£ÔÚ¹¥»÷¹ý³ÌÖУ¬ºÚ¿ÍʹÓÃMATA½«¶à¸ö²å¼þ¼ÓÔØµ½ÊÜϰȾϵͳµÄÄÚ´æÖУ¬ÔËÐкÅÁ°Ñ³ÖÎļþºÍ¹ý³Ì£¬×¢ÈëDLL£¬ÔÚWindowsÉ豸ÉÏ´´½¨HTTP´úÀíºÍËí· ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/lazarus-hackers-deploy-ransomware-steal-data-using-mata-malware/


3.D-Link·ÓÉÆ÷¹Ì¼þδ¼ÓÃܵľµÏñ¿Éй¶¼ÓÃÜÃÜÔ¿


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÈËÔ±·¢ÏÖ£¬D-Link·ÓÉÆ÷¹Ì¼þδ¼ÓÃܵľµÏñ¿Éй¶¼ÓÃÜÃÜÔ¿ ¡£ÔÚÆðÍ··ÖÎöʱ£¬×êÑÐÈËÔ±´ÓÍøÕ¾ÏÂÔØÁËD-Link¹Ì¼þ£¨ 1.02B03°æ±¾£©£¬¶øºóʹÓÃBinwalk½øÐзÖÎö£¬·¢ÏÖÁËÁ½¸ö¹Ì¼þÎļþDIR3040A1_FW102B03.binºÍDIR3040A1_FW102B03_uncrypted.bin ¡£ÔÚÔËÐÐÒÔuncrypted½áβµÄÎļþʱ·¢ÏÖ£¬¸Ã¾µÏñÔ̺¬Î´¼ÓÃܵĹ̼þ¶þ½øÔìÎļþ £¬¶øºóËûÃÇÄܹ»ÌáÈ¡²¢·ÖÎö´æ´¢µÄ½âÃÜÃÜÔ¿ ¡£¾­¹ý½øÒ»²½·ÖÎö£¬×êÑÐÈËÔ±·¢ÏÖ½âÃܺͼÓÃÜÃÜÔ¿¾ù±»Ç¶Èë¶þ½øÔìÎļþÖÐ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/d-link-blunder-firmware-encryption-key-exposed-in-unencrypted-image/


4.еĽ©Ê¬ÍøÂçPrometeiÀûÓÃWindows SMBÍÚ¾ò¼ÓÃÜÇ®±Ò


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalosÔÚÒ°±í·¢ÏÖÁËÒ»¸öеĽ©Ê¬ÍøÂçPrometei£¬ÆäÀûÓÃMicrosoft Windows SMBºÍ̸ºáÏòÒÆ¶¯£¬Í¬Ê±°ÂÃØµØÍÚ¾ò¼ÓÃÜÇ®±Ò ¡£¸Ã½©Ê¬ÍøÂç×ܹ²ÓÐ15¸ö¿ÉÖ´ÐÐÄ£¿é£¬ÕâЩÄ£¿éÓÉÒ»¸öÖ÷Ä£¿é½ÚÔ죬ÓÐÁ½¸öÖØÒªÖ°ÄÜ·ÖÖ§£ºÒ»¸öÊÇC ++·ÖÖ§£¬×¨ÃÅÓÃÓÚ¼ÓÃÜÇ®±ÒÍÚ¾ò²Ù×÷£»ÁíÒ»¸öÊÇ»ùÓÚ.NETµÄ·ÖÖ§£¬×¨ÃÅÓÃÓÚÆ¾Ö¤ÍµÇÔ£¬ÀÄÓÃSMBºÍ»ìºÏ ¡£PrometeiÊ×ÏÈͨ¹ýÀûÓÃEternal BlueµÈSMB·ì϶·ÛËéÍÆËã»úµÄWindows ServerÐÂÎſ飨SMB£©ºÍ̸ ¡£¶øºóÀûÓÃMimikatzºÍ±©Á¦¹¥»÷À´É¨Ãè¡¢´æ´¢ºÍµÁȡƾ֤£¬²¢½«·¢ÏÖµÄËùÓÐÃÜÂë·¢Ë͵½ºÅÁîºÍ½ÚÔ죨C2£©·þÎñÆ÷£¬ÒÔ¹©ÆäËûÄ£¿éʹÓà ¡£¸ÃºÚ¿Í×éÖ¯µÄһ̨C2·þÎñÆ÷ÔÚ6Ô±»²é·â£¬µ«ÕâËÆºõ¶ÔPrometeiµÄ»î¶¯Ã»ÓÐÈκÎÄÚÈÝÐÔÓ°Ïì ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/prometei-botnet-is-infecting-machines-to-mine-for-cryptocurrency/#ftag=RSSbaffb68


5.½©Ê¬ÍøÂçEmotetÆðÍ·´óÁ¿·Ö·¢¶ñÒâÈí¼þQakBot


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖ£¬½©Ê¬ÍøÂçEmotetÆðÍ·¸ß¿ìµØ·Ö·¢¶ñÒâÈí¼þQakBot£¬È¡´úÁË֮ǰ³Ö¾ÃʹÓõÄTrickBot ¡£°²È«×êÑÐÔ±Bom·¢ÏÖÁËÒ»¸öQakBotÑù±¾£¬²¢ÀûÓÃAny.Run½øÐзÖÎö£¬·¢ÏÖÁËÆäºÅÁîºÍ½ÚÔì·þÎñÆ÷£¨C2£©µØÖ·µÄÁбí ¡£ÍøÂç·¸×ïµý±¨¹«Ë¾Intel 471½øÒ»²½·ÖÎöÏÔʾ£¬´ËQBotÑù±¾ÖеÄ×Ö·û´®partner01Åú×¢£¬EmotetÕâ´Î»î¶¯ÓкÜÇ¿µÄÁªÏµ ¡£Ä¿Ç°£¬Éв»Ã÷ÏÔQakBot»áÔÚÊÜϰȾµÄϵͳÉϲ¿Êðʲô£¬µ«Ò»Ð©Êܺ¦Õß¿ÉÄÜ»áϰȾÀÕË÷Èí¼þ£¬ÓÈÆäÊÇProLock ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/emotet-botnet-is-now-heavily-spreading-qakbot-malware/


6.Ô¼¿Ë´óѧÔâÊý¾Ýй¶£¬»òÒòBlackbaudϰȾÀÕË÷Èí¼þ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô¼¿Ë´óѧÅû¶ÆäÔâµ½ÁËÊý¾Ýй¶£¬Ô±¹¤ºÍѧÉúÊý¾Ý±»µÁ£¬ÓëÆäµÚÈý·½ÔÆÍÆËãÌṩÉÌBlackbaudÓÚ2020Äê5ÔÂÔâµ½µÄÀÕË÷Èí¼þ¹¥»÷ÓйØ ¡£¸Ã´óѧÉÐδÅû¶¿ÉÄÜÊܵ½Ó°ÏìµÄÓ×ÎÒÊýÁ¿£¬µ«°µÊ¾Õâ´Îй¶µÄÊý¾Ý¿ÉÄÜÔ̺¬ÁËÐÕÃû¡¢Ö°³Æ¡¢ÐԱ𡢵®ÉúÈÕÆÚ¡¢Ñ§Éú±àºÅ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢ÏÖʵµØÖ·ºÍLinkedInÓ×ÎÒ×ÊÁϼͼ¡¢¿Î³ÌÐÅÏ¢¡¢Ëù»ñµÃµÄ×ʸñ¡¢Óйؿαí»î¶¯µÄ¾ßÌåÐÅÏ¢¡¢Ö°Òµ¡¢¹ÍÖ÷¡¢µ÷²é»Ø´ðÒÔ¼°ÒѼͼµÄУÓѻºÍ³ï¿î»î¶¯ ¡£Ö»¹ÜBlackbaudÒѾ­Ö§¸¶Êê½ð£¬µ«²»Äܱ£ÕÏÊý¾ÝÒѰ´ºÍ̸Ïú»Ù£¬Òò¶ø¸Ã´óѧ»¹·¢Õ¹ÁË×Ô¼ºµÄµ÷²é£¬²¢½«´ËÊÂÎñ·î¸æ¹¤×÷ÈËÔ±¡¢Ñ§ÉúºÍÓ¢¹úÐÅϢרԱ°ì¹«ÊÒ£¨ICO£© ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/university-of-york-discloses-data-breach-staff-and-student-records-stolen/#ftag=RSSbaffb68