·É»úÔì×÷ÉÌBombardier³ÆÆäÊý¾ÝÒÑÔÚClopÍøÕ¾ÉϹ«¿ª£»ÃÀÁª´¢µÄITϵͳ¹ÊÕϵ¼ÖÂÂòÂô·þÎñÁÙʱÖжÏ£¬Ô­Òòδ֪

°ä²¼¹¦·ò 2021-02-25

1.·É»úÔì×÷ÉÌBombardier³ÆÆäÊý¾ÝÒÑÔÚClopÍøÕ¾ÉϹ«¿ª


1.jpg


¼ÓÄôó·É»úÔì×÷ÉÌBombardier³ÆÆäÊý¾ÝÒÑÔÚClopÍøÕ¾ÉϹ«¿ª¡£¸Ã¹«Ë¾ÔÚ¹«¸æÖаµÊ¾£¬¾­³õ´ëÊ©²é£¬ºÚ¿ÍÀûÓÃÁ˵ÚÈý·½Îļþ´«ÊäÀûÓÃÖеķì϶À´½Ó¼ûºÍÇÔÈ¡Êý¾Ý¡£Ö»¹Ü²¢Ã»ÓоßÌåÖ¸³ö¸ÃÉ豸µÄÃû³Æ£¬µ«¾Ý´§Ä¦ºÜ¿ÉÄÜÊÇÖ¸µÄAccellion FTA¡£±»µÁÊý¾ÝÒÑÔÚÀÕË÷ÍÅ»ïClopµÄÊý¾ÝÐ¹Â¶ÍøÕ¾¹«¿ª£¬Ô̺¬Bombardier¸÷Àà·É»úºÍ·É»úÁã¼þµÄÉè¼ÆÎļþ£¬²¢Ã»ÓÐÈκÎÓ×ÎÒÊý¾Ýй¶¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/airplane-maker-bombardier-data-posted-on-ransomware-leak-site-following-fta-hack/


2.ÃÀÁª´¢µÄITϵͳ¹ÊÕϵ¼ÖÂÂòÂô·þÎñÁÙʱÖжÏ£¬Ô­Òòδ֪


2.jpg


2ÔÂ24ÈÕÃÀÁª´¢£¨Fed£©µÄITϵͳ²úÉúÑϳÁµÄ¹ÊÕÏ£¬µ¼Öµç»ãµÈÂòÂô·þÎñÖжÏ£¬Ä¿Ç°Ô­ÒòÒÀȻδ֪¡£ÆäÖжÏÓ°ÏìÁ˸ÃÒøÐÐÏÕЩËùÓеĵç×Ó·þÎñ£¬Ô̺¬ÕÊ»§·þÎñ¡¢ÖÐÑëÒøÐÓ×¢Check 21¡¢FedACH¡¢FedCash¡¢FedLine AdvantageµÈ¡£´Ë±í£¬ºÜ¶à¼ÓÃÜÇ®±ÒÂòÂôËù£¨ÀýÈçBinance£©Ò²°µÊ¾·þÎñÖжϵ¼ÖÂÆäÎÞ·¨Ö´ÐÐACH´æ¿î»òÌá¿î¡£Fed³ÆÊÇÓÉÓÚÆä²Ù×÷ÃýÎóµ¼ÖÂÕâ´ÎÖжÏ£¬µ«²¢Î´Ð¹Â©¸ü¶àϸ½Ú£¬¸ÃÎÊÌâÓÚÃÀ¹ú¶«²¿¹¦·ò2ÔÂ24ÈÕÏÂÎç2:32±»½â¾ö¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/government/federal-reserve-nationwide-outage-impacts-us-banking-system/


3.·ÒÀ¼TietoEVRYÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬¿Í»§·þÎñÁÙʱÖжÏ


3.jpg


·ÒÀ¼IT·þÎñ¹«Ë¾TietoEVRYÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬¿Í»§·þÎñÁÙʱÖжÏ¡£TietoEVRYÊÇÒ»¼ÒÈí¼þ¿ª·¢ºÍIT·þÎñ¹«Ë¾£¬ÔÚ80¸ö¹ú¶ÈºÍµØÓòÕ¼ÓÐ24000ÃûÔ±¹¤£¬2019ÄêµÄÊÕÈëΪ29.5ÒÚÅ·Ôª¡£±¾ÖÜÒ»£¬TietoEVRYµÄÁãÊÛ¡¢Ôì×÷ºÍ·þÎñÓйØÐÐÒµµÄ25¸ö¿Í»§°µÊ¾ÆäÓöµ½Á˼¼ÊõÎÊÌ⣬ºóÀ´µÃÖªÕâЩÎÊÌâÊÇÓÉÀÕË÷Èí¼þ¹¥»÷ÒýÆðµÄ¡£TietoEVRY·¢ÏÖ¹¥»÷ºóµ±¼´¹Ø¹ØÁËÊÜÓ°ÏìµÄϵͳºÍ·þÎñ£¬²¢Óë´¦Ëùµ±¾Ö¶Ô´ËÊ·¢Õ¹µ÷²é¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/finnish-it-services-giant-tietoevry-discloses-ransomware-attack/


4.IBM°ä²¼°²È«¸üУ¬½¨¸´Ó°Ïì¶à¸ö²úÆ·µÄ·ì϶


4.jpg


IBM°ä²¼°²È«¸üУ¬½¨¸´ÁËJava Runtime¡¢Planning Analytics WorkspaceºÍKenexa LMSÖеķì϶¡£Õâ´Î½¨¸´µÄ×îΪÑϳÁµÄ·ì϶ÊÇEclipse OpenJ9ÖеĻùÓÚ²Ö¿âµÄ»º³åÇøÒç¶Âí½Å£¨CVE-2020-27221£©£¬CVSSµÃ·ÖΪ9.8£¬¿É±»ÓÃÀ´Ö´ÐÐËÁÒâ´úÂë»òµ¼ÖÂÀûÓñÀÀ£¡£Æä´ÎΪJava SE¿âµÄ×é¼þÖеÄCVE-2020-14782¡£´Ë±í£¬»¹½¨¸´ÁËNode.jsÖеĻؾø·þÎñ·ì϶£¨CVE-2020-8251£©»ººÍ³åÇøÒç¶Âí½Å£¨CVE-2020-8252£©µÈ·ì϶¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/114942/security/ibm-security-flaws.html


5.Talos°ä²¼ÓйغڿÍ×éÖ¯GamaredonµÄ·ÖÎö»ã±¨


5.jpg


Cisco Talos°ä²¼ÁËÓйغڿÍ×éÖ¯GamaredonµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬GamaredonÖÁÉÙ´Ó2013ÄêÆðÍ·»îÔ¾£¬¶àÄêÀ´Ò»ÏòÔÚÓëÇ×¶íÂÞ˹µÄ»î¶¯ÓйØ¡£ËüÒ»Ïò±»ÒÔΪÊÇAPT£¬µ«ÊÇÆä¸öÐÔÓëAPT²»·û¡£GamaredonÍ»ÆÆÁËAPTģʽ£¬Ê¹ÓÃÁË´óÁ¿µÄÓòÃû£¬½ÚÔì×Å600¶à¸öÓò£¬ºÜÉÙÓÐÈç´ËÖØ´ó»ù´¡¼Ü¹¹µÄAPTÓ××é³Ö¾Ã»îÔ¾¡£´Ë±í£¬Gamaredon²»ÏñÆäËûAPT×éÖ¯Ò»Ñù°µ²Ø×ã¼££¬Ò²Ã»ÓÐÕë¶ÔÐÔµÄÖ¸±ê£¬Òò¶øÆä¸üÏñÊÇΪAPTÌṩ·þÎñµÄ·¸×ïÍŻ


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/02/gamaredonactivities.html


6.Trend Micro°ä²¼2020ÄêÍøÂç°²È«Ì¬ÊÆµÄ»ØÊ׻㱨


6.jpg


Trend Micro°ä²¼ÁË2020ÄêÍøÂç°²È«Ì¬ÊÆµÄ»ØÊ׻㱨¡£»ã±¨µ÷²éÁË2020Äê³öÏÖ²¢³ÖÐø´æÔÚµÄ×îÏÔן͹ؼüµÄ°²È«ÎÊÌ⣬²¢ÎªÓû§ºÍ×éÖ¯ÌṩÁËÓ¦¶Ô¼±¾ç±ä¶¯µÄÍþвµÄ½¨Òé¡£ÐÂÀÕË÷Èí¼þ¼Ò×åµÄÊýÁ¿ÓÉ2019ÄêµÄ¸öÔö³¤µ½2020ÄêµÄ127¸ö£¬ÆäÖØÒªÕë¶Ôµ±¾Ö¡¢ÒøÐÓ×¢Ôì×÷ÒµºÍÒ½ÁƱ£½¡ÐÐÒµ¡£´Ë±í£¬2020Äê¼ì²âµ½³¬¹ý1600Íò¸öÓëCovid-19ÓйصÄÍþв£¬ÆäÖÐÓÐ60£¥ÒÔÉÏÀ´×ÔÃÀ¹ú¡¢µÂ¹úºÍ·¨¹ú¡£


Ô­ÎÄÁ´½Ó£º

https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/a-constant-state-of-flux-trend-micro-2020-annual-cybersecurity-report