ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂçÇå¾²±ê×¼£»£»£»£»£»£»£»£»RealtekÐÞ¸´Windows HDÒôƵÇý¶¯³ÌÐòÖеÄDLLÐ®ÖÆÎó²î
Ðû²¼Ê±¼ä 2020-02-051.ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂçÇå¾²±ê×¼
ÃÀ¹ú·À²¿1ÔÂ31ÈÕÕýʽÐû²¼ÍøÂçÇå¾²³ÉÊì¶ÈÄ£×ÓÈÏÖ¤£¨CMMC£©¿ò¼Ü1.0°æ±¾¡£¡£¡£¡£¡£¡£¡£¹ú·À²¿Ðû²¼£¬£¬£¬£¬£¬£¬£¬£¬µ½2026Äê¹ú·À³Ð°üÉÌÔÚ»ØÓ¦Õþ¸®²É¹ºÍýÏëµÄÌá°¸ÇëÇóʱ£¬£¬£¬£¬£¬£¬£¬£¬±ØÐèÖª×ã»ù±¾µÄÍøÂçÇå¾²±ê×¼¡£¡£¡£¡£¡£¡£¡£Ëæ×ÅCMMCµÄÍÆ³ö£¬£¬£¬£¬£¬£¬£¬£¬¹ú·À²¿Ï£Íûͨ¹ýÌá¸ß¹ú·À¹¤Òµ»ù´¡£¡£¡£¡£¡£¡£¡£¨DIB£©·Ö°üÉ̵ÄÍøÂçÇå¾²×¼±¸Ë®Æ½£¬£¬£¬£¬£¬£¬£¬£¬À´ÔöÇ¿¶Ô¹©Ó¦Á´Î´·ÖÀàÐÅÏ¢£¨Áª°îÌõÔ¼ÐÅÏ¢£¨FCI£©ºÍÊÜ¿ØÎ´·ÖÀàÐÅÏ¢£¨CUI£©£©µÄ±£»£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£¡£CMMCÖ¼ÔÚͨ¹ýʹÓÃ5ÖÖ¼¶±ðµÄÈÏÖ¤À´¼ò»¯´óÐͺÍСÐ͹ú·À³Ð°üÉ̵ÄÍøÂçÍ£µ±ÐÔÈÏÖ¤£¬£¬£¬£¬£¬£¬£¬£¬ÖصãÊÇÍøÂçÇ徲ʵ¼ùºÍÁ÷³Ì¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/dod-to-require-cybersecurity-certification-from-defense-contractors/
2.°Ä´óÀûÑÇ»õÔ˹«Ë¾Toll GroupÔâµ½ÀÕË÷Èí¼þ¹¥»÷

ΪӦ¶ÔÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬°Ä´óÀûÑÇÔËÊäºÍÎïÁ÷¾ÞÍ·Toll Group±»ÆÈ¹Ø±Õ²¿·ÖÔÚÏßЧÀÍ£¬£¬£¬£¬£¬£¬£¬£¬²¿·Ö¿Í»§¶Ô¸Ã¹«Ë¾µÄ´¦Öóͷ£·½·¨ÌåÏÖ²»Öª×ã¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ËüÓÚ1ÔÂ31ÈÕÐÇÆÚÎåÔÚÆäϵͳÉÏ·¢Ã÷ÁËÒ»¸öÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬£¬²¢½ûÓÃÁËijЩϵͳÀ´×èÖ¹´ËÊÂÎñ¡£¡£¡£¡£¡£¡£¡£Ò»Ð©¿Í»§ÔÚÉ罻ýÌåÉÏËß¿àËûÃÇÎÞ·¨ÔÙ¸ú×Ù°ü¹ü£¬£¬£¬£¬£¬£¬£¬£¬²¢Éù³Æ¸Ã¹«Ë¾µÄÔ±¹¤Ò²ÎÞ·¨»á¼û¸ú×ÙÊý¾Ý¿â¡£¡£¡£¡£¡£¡£¡£ÓÐÐÂÎÅÈËÊ¿³Æ¸ÃÊÂÎñÓ°ÏìÁ˰ĴóÀûÑÇ¡¢Ó¡¶ÈºÍ·ÆÂɱöµÄÓªÒµ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÖÐʹÓõÄÊÇÄÄÖÖÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒÑ֪ͨÓйز¿·Ö£¬£¬£¬£¬£¬£¬£¬£¬µ«Éù³ÆÉÐδÕÒµ½ÈκÎÖ¤¾ÝÅúעСÎÒ˽¼ÒÊý¾ÝÒѱ»Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/australian-shipping-giant-toll-hit-ransomware
3.ÀÕË÷Èí¼þDoppelPaymer½«ÔÚ°µÍø³öÊÛδ¸¶¿îÊܺ¦ÕßµÄÊý¾Ý
ÀÕË÷Èí¼þDoppelPaymerÍþв³ÆÈôÊÇÊܺ¦Õß²»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬£¬ËûÃǽ«ÔÚ°µÍø³öÊÛ»òÐû²¼ÍµÈ¡µÄÊܺ¦ÕßÎļþ¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÐµĹ¥»÷Õ½ÂÔʼÓÚ2019Äê11Ô£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÀÕË÷Èí¼þMazeÌᳫ£¬£¬£¬£¬£¬£¬£¬£¬ËæºóÓÉSodinokibi/REvilºÍNemty¸ú½ø£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÂÖµ½DoppelPaymerÁË¡£¡£¡£¡£¡£¡£¡£DoppelPaymer¹¥»÷Õ߳ƽüÒ»ÄêÀ´ËûÃÇÒ»Ö±´ÓÊܺ¦ÕßÄÇÀïÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÉù³Æµ±Êܺ¦Õß²»Ö§¸¶Êê½ðʱ£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÒÑÍù¾ÍÔøÔÚ°µÍøÉÏÄäÃû³öÊÛÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÎªÁË֤ʵÕâÒ»µã£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ðû²¼ÁËÁ½¸öExcel±í¸ñ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ËûÃÇÔøÈëÇÖµÄÁ½¸öÍøÂçµÄWindows DomainÓû§ÁÐ±í£¬£¬£¬£¬£¬£¬£¬£¬µ«Ã»ÓзÖÏí¾Ý³Æ´ÓÊܺ¦ÕßÄÇÀï͵ȡµÄÈκÎÎļþ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/
4.ºÚ¿ÍʹÓÃSharePointÎó²î(CVE-2019-0604)¹¥»÷Öж«µØÇø
Palo Alto Networks µÄ Unit 42·¢Ã÷ºÚ¿ÍÈÔÔÚʹÓÃSharePointÎó²î£¨CVE-2019-0604£©¹¥»÷Öж«Õþ¸®×éÖ¯¡£¡£¡£¡£¡£¡£¡£ÔÚ2019Äê9ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽¹¥»÷ÕßʹÓøÃÎó²îÔÚÖж«Õþ¸®×éÖ¯µÄÍøÕ¾ÉÏ×°ÖÃÁ˶à¸öWeb Shell£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»¸öÊÇGithubÉÏÃâ·ÑÌṩµÄ¿ªÔ´AntSword Web Shell¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÕâЩWeb ShellºáÏòÒÆ¶¯ÍøÂç»á¼ûÆäËüϵͳ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óö¨ÖƵÄMimikatz±äÖÖ´ÓÄÚ´æÖÐת´¢Æ¾Ö¤ºÍʹÓÃImpacketµÄatexec¹¤¾ßÔÚÕû¸öÍøÂçµÄÆäËüϵͳÉÏÔËÐÐÏÂÁî¡£¡£¡£¡£¡£¡£¡£9ÔÂÏÂÑ®£¬£¬£¬£¬£¬£¬£¬£¬Unit 42ÊӲ쵽ÏàͬµÄMimikatz±äÖÖ±»ÉÏÔØµ½ÁíÒ»ÆäÖж«¹ú¼ÒµÄÁíÒ»¸öÕþ¸®×éÖ¯µÄWeb ShellÖС£¡£¡£¡£¡£¡£¡£2020Äê1ÔÂÉÏÑ®£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ê¹ÓÃShodanËÑË÷ÁË̻¶µÄSharePointЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÈÔÓÐ28881¸öЧÀÍÆ÷ʹÓñ£´æÎó²îµÄ°æ±¾¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/actors-still-exploiting-sharepoint-vulnerability/
5.Ñо¿Ö°Ô±·¢Ã÷ÐÂÀÕË÷Èí¼þEKANSÖ÷ÒªÕë¶Ô¹¤Òµ¿ØÖÆÏµÍ³
2ÔÂ3ÈÕÇå¾²³§ÉÌDragosÐû²¼Ò»·Ý±¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬£¬ÐÂÀÕË÷Èí¼þEKANSÒýÆðÁËÇå¾²Ñо¿Ö°Ô±µÄ×¢ÖØ£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ¸ÃÀÕË÷Èí¼þ¾ßÓÐÆÈʹÅÌËã»ú×èÖ¹Ó빤ҵ¿ØÖÆÏµÍ³ÓйصÄÌØ¶¨»î¶¯»òÀú³ÌµÄÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Joe SlowikÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜÆä¹¥»÷Ïà¶ÔÔʼ£¬£¬£¬£¬£¬£¬£¬£¬µ«EKANSÕÕ¾É×Ô¶¯Õë¶ÔICSÇéÐÎÖеÄÄ³Ð©ÌØ¶¨²úÆ·£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÓëGE ProficyµÄÊý¾ÝÀúʷЧÀÍ¡¢GE Fanuc licensing serverµÄЧÀÍÒÔ¼°HoneywellµÄHMIWebÓ¦ÓÃÓйصÄÀú³Ì¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ¸ÃÀÕË÷Èí¼þËÆºõ»¹²»ÊÇÒ»¸öºÜ´óµÄΣÏÕ£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪEKANS¿ÉÄÜÓëÁíÒ»¸öÕë¶ÔICSµÄÀÕË÷Èí¼þMegaCortex±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/attacks-breaches/ekans-ransomware-raises-industrial-control-worries/d/d-id/1336950
6.RealtekÐÞ¸´Windows HDÒôƵÇý¶¯³ÌÐòÖеÄDLLÐ®ÖÆÎó²î
RealtekÐÞ¸´ÁËWindows HDÒôƵÇý¶¯³ÌÐò°üÖеÄÒ»¸öDLLÐ®ÖÆÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-19705£©¿ÉÄÜÔÊÐíDZÔڵĹ¥»÷Õß»ñµÃ³¤ÆÚÐÔ¡¢Ö²Èë¶ñÒâÈí¼þ²¢Ìӱܼì²â¡£¡£¡£¡£¡£¡£¡£SafeBreach LabsÇå¾²Ñо¿Ô±Peleg Hadar·¢Ã÷Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬£¬HadarÌåÏÖ¸ÃÎó²îÊÇÓÉÒÑÊðÃûµÄHDÒôƵÅä¾°£¨RAVBg64.exe£©Àú³Ìµ¼Öµģ¬£¬£¬£¬£¬£¬£¬£¬¸ÃÀú³ÌÊÔͼ´ÓÆäÄ¿½ñÊÂÇéĿ¼£¨CWD£©¶ø²»ÊÇDLLµÄÏÖʵλÖüÓÔØDLL£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒûÓÐÑéÖ¤DLLµÄÊðÃûÖ¤Êé¡£¡£¡£¡£¡£¡£¡£ÕâÒ»ÎÊÌâµÄ»ù´¡Ôµ¹ÊÔÓÉÊÇÔÚÇý¶¯³ÌÐò°ü£¨°æ±¾1.0.0.8855£©ÖÐʹÓÃÁËMicrosoft Visual Studio 2005 MFC£¬£¬£¬£¬£¬£¬£¬£¬µ¼Ö¸óÌÐò°ü»á×Ô¶¯¼ÓÔØ×ÊÔ´DLL¡£¡£¡£¡£¡£¡£¡£Realtekͨ¹ý8857¼°¸ü¸ß°æ±¾µÄHD AudioÇý¶¯³ÌÐò°üÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/realtek-fixes-dll-hijacking-flaw-in-hd-audio-driver-for-windows/


¾©¹«Íø°²±¸11010802024551ºÅ