ThalesµÄ²úÆ·´æÔÚ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸£»LuciferµÄбäÌåÕë¶ÔLinuxϵͳ£¬ÓëWindows°æÐÔ×ÓÄÜÀàËÆ
°ä²¼¹¦·ò 2020-08-211.ThalesµÄ²úÆ·´æÔÚ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸

IBMµÄ°²È«×êÑÐÈËÔ±·¢ÏÖThalesµÄ²úÆ·µÄͨѶģ¿éÖдæÔÚÑϳÁ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-15858£¬ÓÚ2019Äê9Ô³õ´ÎÔÚThalesµÄCinterion EHS8 M2MÄ£¿éÖб»·¢ÏÖ£¬²¢ÓÚ2020Äê2Ô±»½¨¸´¡£ºóÀ´»¹·¢ÏÖËü»¹»áÓ°ÏìÆäËûÊ®¸öÄ£¿é¡£¸Ã·ì϶ÓëÔ̺¬ÓмÓÃÜÃÜÔ¿¡¢ÃÜÂëºÍÖ¤ÊéÖ®ÀàÐÅÏ¢µÄJava´úÂëÓйأ¬¹¥»÷ÕßÄܹ»ÀûÓô˷ìÏ¶ÈÆ¹ý°²È«»úÔì²¢½Ó¼ûÕâЩÐÅÏ¢£¬¶øºóÀûÓøÃÐÅÏ¢À´½ÚÔìÉ豸»ò½Ó¼ûÔ̺¬¸ÃÉ豸µÄÍøÂç¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/vulnerability-thales-product-could-expose-millions-iot-devices-attacks
2.LuciferµÄбäÌåÕë¶ÔLinuxϵͳ£¬ÓëWindows°æÐÔ×ÓÄÜÀàËÆ

NETSCOUT ATLAS×êÑÐÈËÔ±·¢ÏÖÁËLuciferµÄбäÌ壬¿ÉÕë¶ÔLinuxϵͳ£¬ÓëWindows°æÐÔ×ÓÄÜÀàËÆ¡£LuciferÄܹ»½«WindowsÉ豸ת±äΪMonero¼ÓÃÜ»úеÈË£¬²¢³ÉΪÆä½©Ê¬ÍøÂçµÄÒ»²¿ÃÅ¡£Õë¶ÔLinuxϵͳµÄбäÌåÓëWindows°æÐÔ×ÓÄÜÀàËÆ£¬Ô̺¬ÓÃÓÚ¼ÓÃÜ½Ù³ÖºÍÆô¶¯»ùÓÚTCP¡¢UCPºÍ»ùÓÚICMPµÄ·ººé¹¥»÷µÄÄ£¿é£¬²¢ÇÒÊÜϰȾµÄLinuxÉ豸ҲÄܹ»±»ÓÃÓÚ»ùÓÚHTTPµÄDDoS¹¥»÷¡£³ý´ËÖ®±í£¬Õâ´ÎÉý¼¶»¹À©´óÁËWindows°æ±¾µÄÖ°ÄÜ£¬ÒÔʹÓÃMimikatz¹¤¾ßÇÔȡʹ´¦²¢ÌáÉýȨÏÞ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/lucifer-cryptomining-ddos-malware-now-targets-linux-systems/
3.P2P½©Ê¬ÍøÂçFritzFrogͨ¹ýSSH¹¥»÷Linux·þÎñÆ÷

ÍøÂ簲ȫ¹«Ë¾Guardicore·¢ÏÖP2P½©Ê¬ÍøÂçFritzFrog¿Éͨ¹ýSSH¹¥»÷Linux·þÎñÆ÷¡£ÔÚ2020Äê֮ǰ£¬FritzFrogÒѹ¥»÷ÁËÖÁÉÙ500̨µ±¾ÖºÍÆóÒµSSH·þÎñÆ÷£¬Õë¶ÔÈ«Çòµ±¾Ö¡¢½ÌÓý¡¢½ðÈÚ¡¢Ò½Áƺ͵çÐÅÐÐÒµ¡£FritzFrogÊÇÓÉGolang±àдµÄ£¬ËüÒÔifconfigºÍnginxµÄÃûÒå½â°ü¶ñÒâÈí¼þ£¬²¢Í¨¹ý1234¶Ë¿ÚÀ´¼àÌý·¢Ë͵ĺÅÁî¡£FritzFrogµÄÖØÒªÖ¸±êÊÇÍÚ¾ò¼ÓÃÜÇ®±Ò£¬ÈôÊÇ·þÎñÆ÷ÉϵĹý³ÌÕ¼ÓÃÁËCPU×ÊÔ´£¬Ôò¿ÉÄܻᱻɱËÀ£¬´Ó¶øÎª¿ó¹¤Ìṩ¾¡¿ÉÄܶàµÄÖ°ÄÜ¡£Ä¿Ç°ÒÑÔÚÒ°±í·¢ÏÖÁË20¶àÖÖ±äÌå¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-fritzfrog-p2p-botnet-has-breached-at-least-500-enterprise-government-servers/
4.Êý¾Ý¿âÅäÖÃÃýÎóµ¼ÖÂ2.35ÒÚÓû§Ó×ÎÒÐÅϢй¶

×êÑÐÈËÔ±³Æ£¬É罻ýÌåÊý¾Ý¾¼ÍÈËÒòÔÚÏßÊý¾Ý¿âÅäÖÃÃýÎ󣬵¼ÖÂ2.35ÒÚÓû§Ó×ÎÒÐÅϢй¶£¬ÕâЩÄÚÈÝÎÞÐèÈκÎÃÜÂë»òÆäËûÉí·ÝÑéÖ¤¼´¿ÉÔÚÏß½Ó¼û¡£Ð¹Â¶ÐÅϢΪInstagramÖеÄ1.92ÒÚÓ×ÎÒ×ÊÁÏ£¬TikTokÖеÄ4200ÍòÓ×ÎÒ×ÊÁÏÒÔ¼°YouTubeÖеÄ400ÍòÓ×ÎÒ×ÊÁÏ£¬Ô̺¬ÕæÊµÐÕÃû¡¢Ó×ÎÒ×ÊÁÏͼƬ¡¢ÕÊ»§×¢Ã÷¡¢´ºÇï¡¢ÐÔ±ðµÈ£¬²¿ÃÅ»¹Ô̺¬µç»°ºÅÂë»òµç×ÓÓʼþµØÖ·¡£Ö»¹Ü¸ÃÊý¾Ý¿âÔÚ³õ´Î¹«¿ªºóÈý¸öÓ±¾Ç®Í±»¹Ø¹ØÁË£¬µ«Éв»Ã÷ÏÔûÓÐÃÜÂëµÄÐÅÏ¢ÔÚÍøÉϱ£ÁôÁ˶೤¹¦·ò¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/data-firm-exposes-235m-social/
5.MITER°ä²¼´ÓǰÁ½Äê×î³£¼ûµÄ25¸ö·ì϶Áбí

MITER°ä²¼ÁË´ÓǰÁ½ÄêÄÚ×î³£¼ûµÄ25¸ö·ì϶ÁÐ±í¡£ÎªÁËÁгö¸Ã·ì϶£¬MITERƾ¾Ý¹ú¶È·ì϶Êý¾Ý¿â£¨NVD£©2018ÄêºÍ2019Äê³£¼û·ì϶ºÍ¶³ö£¨CVE£©Êý¾Ý£¬»ùÓÚÑϳÁÐÔºÍÆÕ±éÐÔ¶Ôÿ¸ö·ì϶½øÐÐÁËÆÀ·Ö£¬ÒԿ͹۵ØÏàʶµ±Ç°ÔÚÏÖʵÊÀ½çÖп´µ½µÄ·ì϶¡£MITRE 2020 CWE Top 25ÖÐÅÅÃûµÚÒ»µÄΪ¿çÕ¾µã¾ç±¾£¨XSS£©£¬ÓÉÓÚÆä³ýÁËÒ×ÓÚ±»ÀûÓÃÖ®±í£¬»¹Äܹ»±»¹¥»÷ÕßÓÃÀ´ÆëÈ«½ÚÔìϵͳ¡¢ÇÔÈ¡Ãô¸ÐÊý¾Ý»ò´¥·¢»Ø¾ø·þÎñ£¨DoS£©¡£³ý´ËÖ®±í£¬»¹ÓÐÔ½½çд·ì϶¡¢ÊäÈëÑéÖ¤²»ÕýÈ·ºÍÔ½½ç¶ÁÈ¡µÈ·ì϶¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/mitre-shares-this-years-top-25-most-dangerous-software-bugs/
6.CISAºÍFBIÖҸ泯ÏÊRAT BLINDINGCANÕë¶ÔÃÀ¹ú¹ú·Àµ¥Ôª

CISAºÍFBI½áºÏ°ä²¼¾¯±¨£¬Åû¶Á˳¯ÏʺڿÍÔÚÕë¶ÔÃÀ¹ú¹ú·ÀºÍº½¿ÕÁìÓòµÄµÄ¹¥»÷ÖÐʹÓõÄÔ¶³Ì½Ó¼ûľÂíBLINDINGCAN¡£Õâ´Î¹¥»÷ʹÓÃÁËÓëÆ½·²Ò»ÑùµÄģʽ£¬³¯ÏʺڿͼÙÒâ³ÛÃû¹«Ë¾µÄÕÐÆ¸ÈËÔ±£¬ÒÔ¿¿½üËùÐ蹫˾µÄÔ±¹¤¡£ÔÚ¿ÚÊÔ¹ý³ÌÖУ¬ºÚ¿Í»á¸øÊܺ¦Õß·¢ËͶñÒâPDFÎĵµÒÔ²¿Êð¶ñÒâÈí¼þ¡£CISAר¼Ò°µÊ¾£¬³¯ÏʺڿͻáÀûÓøöñÒâÈí¼þ½Ó¼ûÊܺ¦Õßϵͳ£¬½øÐпúËÅ£¬¶øºóÍøÂçÓйعؼü¾üʺÍÄÜÔ´¼¼ÊõµÄµý±¨¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/us-govt-exposes-new-north-korean-blindingcan-backdoor-malware/


¾©¹«Íø°²±¸11010802024551ºÅ