ThalesµÄ²úÆ·´æÔÚ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸£»LuciferµÄбäÌåÕë¶ÔLinuxϵͳ£¬ÓëWindows°æÐÔ×ÓÄÜÀàËÆ

°ä²¼¹¦·ò 2020-08-21

1.ThalesµÄ²úÆ·´æÔÚ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸


1.png


IBMµÄ°²È«×êÑÐÈËÔ±·¢ÏÖThalesµÄ²úÆ·µÄͨѶÄ£¿éÖдæÔÚÑϳÁ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸  ¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-15858£¬ÓÚ2019Äê9Ô³õ´ÎÔÚThalesµÄCinterion EHS8 M2MÄ£¿éÖб»·¢ÏÖ£¬²¢ÓÚ2020Äê2Ô±»½¨¸´  ¡£ºóÀ´»¹·¢ÏÖËü»¹»áÓ°ÏìÆäËûÊ®¸öÄ£¿é  ¡£¸Ã·ì϶ÓëÔ̺¬ÓмÓÃÜÃÜÔ¿¡¢ÃÜÂëºÍÖ¤ÊéÖ®ÀàÐÅÏ¢µÄJava´úÂëÓйØ£¬¹¥»÷ÕßÄܹ»ÀûÓô˷ìÏ¶ÈÆ¹ý°²È«»úÔì²¢½Ó¼ûÕâЩÐÅÏ¢£¬¶øºóÀûÓøÃÐÅÏ¢À´½ÚÔìÉ豸»ò½Ó¼ûÔ̺¬¸ÃÉ豸µÄÍøÂç  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/vulnerability-thales-product-could-expose-millions-iot-devices-attacks


2.LuciferµÄбäÌåÕë¶ÔLinuxϵͳ£¬ÓëWindows°æÐÔ×ÓÄÜÀàËÆ


2.png


NETSCOUT ATLAS×êÑÐÈËÔ±·¢ÏÖÁËLuciferµÄбäÌ壬¿ÉÕë¶ÔLinuxϵͳ£¬ÓëWindows°æÐÔ×ÓÄÜÀàËÆ  ¡£LuciferÄܹ»½«WindowsÉ豸ת±äΪMonero¼ÓÃÜ»úеÈË£¬²¢³ÉΪÆä½©Ê¬ÍøÂçµÄÒ»²¿ÃÅ  ¡£Õë¶ÔLinuxϵͳµÄбäÌåÓëWindows°æÐÔ×ÓÄÜÀàËÆ£¬Ô̺¬ÓÃÓÚ¼ÓÃÜ½Ù³ÖºÍÆô¶¯»ùÓÚTCP¡¢UCPºÍ»ùÓÚICMPµÄ·ººé¹¥»÷µÄÄ£¿é£¬²¢ÇÒÊÜϰȾµÄLinuxÉ豸ҲÄܹ»±»ÓÃÓÚ»ùÓÚHTTPµÄDDoS¹¥»÷  ¡£³ý´ËÖ®±í£¬Õâ´ÎÉý¼¶»¹À©´óÁËWindows°æ±¾µÄÖ°ÄÜ£¬ÒÔʹÓÃMimikatz¹¤¾ßÇÔȡʹ´¦²¢ÌáÉýȨÏÞ  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/lucifer-cryptomining-ddos-malware-now-targets-linux-systems/


3.P2P½©Ê¬ÍøÂçFritzFrogͨ¹ýSSH¹¥»÷Linux·þÎñÆ÷


3.png


ÍøÂ簲ȫ¹«Ë¾Guardicore·¢ÏÖP2P½©Ê¬ÍøÂçFritzFrog¿Éͨ¹ýSSH¹¥»÷Linux·þÎñÆ÷  ¡£ÔÚ2020Äê֮ǰ£¬FritzFrogÒѹ¥»÷ÁËÖÁÉÙ500̨µ±¾ÖºÍÆóÒµSSH·þÎñÆ÷£¬Õë¶ÔÈ«Çòµ±¾Ö¡¢½ÌÓý¡¢½ðÈÚ¡¢Ò½Áƺ͵çÐÅÐÐÒµ  ¡£FritzFrogÊÇÓÉGolang±àдµÄ£¬ËüÒÔifconfigºÍnginxµÄÃûÒå½â°ü¶ñÒâÈí¼þ£¬²¢Í¨¹ý1234¶Ë¿ÚÀ´¼àÌý·¢Ë͵ĺÅÁî  ¡£FritzFrogµÄÖØÒªÖ¸±êÊÇÍÚ¾ò¼ÓÃÜÇ®±Ò£¬ÈôÊÇ·þÎñÆ÷ÉϵĹý³ÌÕ¼ÓÃÁËCPU×ÊÔ´£¬Ôò¿ÉÄܻᱻɱËÀ£¬´Ó¶øÎª¿ó¹¤Ìṩ¾¡¿ÉÄܶàµÄÖ°ÄÜ  ¡£Ä¿Ç°ÒÑÔÚÒ°±í·¢ÏÖÁË20¶àÖÖ±äÌå  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-fritzfrog-p2p-botnet-has-breached-at-least-500-enterprise-government-servers/


4.Êý¾Ý¿âÅäÖÃÃýÎóµ¼ÖÂ2.35ÒÚÓû§Ó×ÎÒÐÅϢй¶


4.png


×êÑÐÈËÔ±³Æ£¬É罻ýÌåÊý¾Ý¾­¼ÍÈËÒòÔÚÏßÊý¾Ý¿âÅäÖÃÃýÎ󣬵¼ÖÂ2.35ÒÚÓû§Ó×ÎÒÐÅϢй¶£¬ÕâЩÄÚÈÝÎÞÐèÈκÎÃÜÂë»òÆäËûÉí·ÝÑéÖ¤¼´¿ÉÔÚÏß½Ó¼û  ¡£Ð¹Â¶ÐÅϢΪInstagramÖеÄ1.92ÒÚÓ×ÎÒ×ÊÁÏ£¬TikTokÖеÄ4200ÍòÓ×ÎÒ×ÊÁÏÒÔ¼°YouTubeÖеÄ400ÍòÓ×ÎÒ×ÊÁÏ£¬Ô̺¬ÕæÊµÐÕÃû¡¢Ó×ÎÒ×ÊÁÏͼƬ¡¢ÕÊ»§×¢Ã÷¡¢´ºÇï¡¢ÐÔ±ðµÈ£¬²¿ÃÅ»¹Ô̺¬µç»°ºÅÂë»òµç×ÓÓʼþµØÖ·  ¡£Ö»¹Ü¸ÃÊý¾Ý¿âÔÚ³õ´Î¹«¿ªºóÈý¸öÓ±¾Ç®Í±»¹Ø¹ØÁË£¬µ«Éв»Ã÷ÏÔûÓÐÃÜÂëµÄÐÅÏ¢ÔÚÍøÉϱ£ÁôÁ˶೤¹¦·ò  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/data-firm-exposes-235m-social/


5.MITER°ä²¼´ÓǰÁ½Äê×î³£¼ûµÄ25¸ö·ì϶Áбí


5.png


MITER°ä²¼ÁË´ÓǰÁ½ÄêÄÚ×î³£¼ûµÄ25¸ö·ì϶Áбí  ¡£ÎªÁËÁгö¸Ã·ì϶£¬MITERƾ¾Ý¹ú¶È·ì϶Êý¾Ý¿â£¨NVD£©2018ÄêºÍ2019Äê³£¼û·ì϶ºÍ¶³ö£¨CVE£©Êý¾Ý£¬»ùÓÚÑϳÁÐÔºÍÆÕ±éÐÔ¶Ôÿ¸ö·ì϶½øÐÐÁËÆÀ·Ö£¬ÒԿ͹۵ØÏàʶµ±Ç°ÔÚÏÖʵÊÀ½çÖп´µ½µÄ·ì϶  ¡£MITRE 2020 CWE Top 25ÖÐÅÅÃûµÚÒ»µÄΪ¿çÕ¾µã¾ç±¾£¨XSS£©£¬ÓÉÓÚÆä³ýÁËÒ×ÓÚ±»ÀûÓÃÖ®±í£¬»¹Äܹ»±»¹¥»÷ÕßÓÃÀ´ÆëÈ«½ÚÔìϵͳ¡¢ÇÔÈ¡Ãô¸ÐÊý¾Ý»ò´¥·¢»Ø¾ø·þÎñ£¨DoS£©  ¡£³ý´ËÖ®±í£¬»¹ÓÐÔ½½çд·ì϶¡¢ÊäÈëÑéÖ¤²»ÕýÈ·ºÍÔ½½ç¶ÁÈ¡µÈ·ì϶  ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/mitre-shares-this-years-top-25-most-dangerous-software-bugs/


6.CISAºÍFBIÖҸ泯ÏÊRAT BLINDINGCANÕë¶ÔÃÀ¹ú¹ú·Àµ¥Ôª


6.png


CISAºÍFBI½áºÏ°ä²¼¾¯±¨£¬Åû¶Á˳¯ÏʺڿÍÔÚÕë¶ÔÃÀ¹ú¹ú·ÀºÍº½¿ÕÁìÓòµÄµÄ¹¥»÷ÖÐʹÓõÄÔ¶³Ì½Ó¼ûľÂíBLINDINGCAN  ¡£Õâ´Î¹¥»÷ʹÓÃÁËÓëÆ½·²Ò»ÑùµÄģʽ£¬³¯ÏʺڿͼÙÒâ³ÛÃû¹«Ë¾µÄÕÐÆ¸ÈËÔ±£¬ÒÔ¿¿½üËùÐ蹫˾µÄÔ±¹¤  ¡£ÔÚ¿ÚÊÔ¹ý³ÌÖУ¬ºÚ¿Í»á¸øÊܺ¦Õß·¢ËͶñÒâPDFÎĵµÒÔ²¿Êð¶ñÒâÈí¼þ  ¡£CISAר¼Ò°µÊ¾£¬³¯ÏʺڿͻáÀûÓøöñÒâÈí¼þ½Ó¼ûÊܺ¦Õßϵͳ£¬½øÐпúËÅ£¬¶øºóÍøÂçÓйعؼü¾üʺÍÄÜÔ´¼¼ÊõµÄµý±¨  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-govt-exposes-new-north-korean-blindingcan-backdoor-malware/