΢ÈíÐû²¼Õë¶ÔSMBv3Îó²îµÄKB4551762Çå¾²¸üУ»£»£»£»£»£»£»?ºÉÀ¼Õþ¸®É¥Ê§Áè¼Ý690ÍòÆ÷¹Ùļ¾èÕßÊý¾Ý
Ðû²¼Ê±¼ä 2020-03-131.΢ÈíÐû²¼Õë¶ÔSMBv3Îó²îµÄKB4551762Çå¾²¸üÐÂ
΢Èí½ñÌìÔçЩʱ¼äÐû²¼ÁËÕë¶ÔSMBv3 RCEÎó²î£¨CVE-2020-0796£©µÄ²¹¶¡¸üУ¨KB4551762£©£¬£¬£¬£¬£¬£¬Óû§¿ÉÒÔͨ¹ýWindows Update¼ì²é¸üлò´Ó΢Èí²¹¶¡Ä¿Â¼£¨https://www.catalog.update.microsoft.com/Search.aspx?q=KB4551762£©ÉÏÊÖ¶¯ÏÂÔØÊʺÏ×Ô¼ºWindows°æ±¾µÄKB4551762¡£¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖËäȻûÓз¢Ã÷ʹÓôËÎó²îµÄ¹¥»÷£¬£¬£¬£¬£¬£¬µ«½¨ÒéÓû§ÓÅÏÈ×°Öô˸üС£¡£¡£¡£¡£¡£¡£¡£´ËÎó²îÒ²±»³ÆÎªSMBGhost»òEternalDarkness£¬£¬£¬£¬£¬£¬½öÓ°ÏìÔËÐÐWindows 10°æ±¾1903ºÍ1909ÒÔ¼°Windows Server Server Core×°Öð汾1903ºÍ1909µÄ×°±¸¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-releases-kb4551762-security-update-for-smbv3-vulnerability/
2.Turla APTÐÂË®¿Ó¹¥»÷£¬£¬£¬£¬£¬£¬Ê¹ÓÃкóÃÅÕë¶ÔÑÇÃÀÄáÑÇ
ESETÑо¿Ö°Ô±·¢Ã÷¶íÂÞ˹ºÚ¿ÍÍÅ»ïTurla APTµÄÐÂË®¿Ó¹¥»÷£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÖÁÉÙ´Ó2019ÄêÍ·×îÏÈ£¬£¬£¬£¬£¬£¬ÖÁÉÙÓÐËĸöÑÇÃÀÄáÑÇÍøÕ¾Êܵ½Ñ¬È¾£¬£¬£¬£¬£¬£¬°üÀ¨¶íÂÞ˹ÑÇÃÀÄáÑÇ´óʹ¹ÝÁìÊ´¦£¨armconsul[.]ru£©¡¢Artsakh¹²ºÍ¹ú×ÔÈ»±£»£»£»£»£»£»£»¤ºÍ×ÔÈ»×ÊÔ´²¿£¨mnp.nkr[.]am£©¡¢ÑÇÃÀÄáÑǹú¼ÊºÍÇå¾²ÊÂÎñÑо¿Ëù£¨aiisa[.]am£©ºÍÑÇÃÀÄáÑÇ´æ¿îµ£±£»£»£»£»£»£»£»ù½ð£¨adgf[.]am£©¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÐéαµÄAdobe Flash¸üзַ¢Á½¸öеĶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬°üÀ¨¶ñÒâÈí¼þÊÍ·ÅÆ÷NetFlashºÍľÂíPyFlash¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.welivesecurity.com/2020/03/12/tracking-turla-new-backdoor-armenian-watering-holes/
3.Operation Overtrap¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Õë¶ÔÈÕ±¾ÒøÐÐÓû§
Ç÷ÊÆ¿Æ¼¼·¢Ã÷Õë¶ÔÈÕ±¾ÒøÐÐÓû§µÄй¥»÷»î¶¯¡°Operation Overtrap¡±£¬£¬£¬£¬£¬£¬¸Ã»î¶¯×Ô2019Äê4ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬²¢ÇÒʹÓÃÈýÖÖ²î±ðµÄ¹¥»÷ǰÑÔÀ´ÇÔÈ¡Êܺ¦ÕßµÄÒøÐÐÆ¾Ö¤£ºÍ¨¹ýÀ¬»øÓʼþ·¢ËÍαװ³ÉÒøÐÐÍøÕ¾µÄ´¹ÂÚÁ´½Ó£»£»£»£»£»£»£»Í¨¹ýÀ¬»øÓʼþÒªÇóÊܺ¦Õß´ÓÁ´½ÓµÄÍøÕ¾ÉÏÏÂÔØ¶ñÒâÈí¼þµÄ¿ÉÖ´ÐÐÎļþ£»£»£»£»£»£»£»Í¨¹ý¶¨ÖƵÄÎó²îʹÓù¤¾ß°ü£¨BottleEK£©Èö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÖ÷ҪʹÓõĶñÒâÈí¼þÊÇÐÂÒøÐÐľÂíCinobi¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/operation-overtrap-targets-japanese-online-banking-users-via-bottle-exploit-kit-and-brand-new-cinobi-banking-trojan/
4.ºÏÇڿƼ¼ÍøÂçÖÎÀíÈí¼þ16¸öÎó²î£¬£¬£¬£¬£¬£¬³§ÉÌÉÐδÐÞ¸´
Ñо¿Ö°Ô±ÔÚºÏÇڿƼ¼£¨Zyxel£©µÄÍøÂçÖÎÀíÈí¼þCloudCNM SecuManagerÖз¢Ã÷16¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÕâЩÎó²î°üÀ¨¶à¸öºóÃźÍÓ²±àÂëµÄĬÈÏÆ¾Ö¤¡¢ÃÜÔ¿µÈ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÊÜÓ°ÏìµÄ°æ±¾°üÀ¨CloudCNM SecuManager 3.1.0ºÍ3.1.1£¬£¬£¬£¬£¬£¬¶øËüÃǵÄ×îиüÐÂÈÕÆÚΪ2018Äê11Ô¡£¡£¡£¡£¡£¡£¡£¡£Zyxel Gateway SBUµÄ¸ß¼¶¸±×ܲÃNathan YenÌåÏָù«Ë¾ÏÖÔÚÒÑÒâʶµ½ÎÊÌ⣬£¬£¬£¬£¬£¬²¢ÕýÔÚÆð¾¢Ñ¸ËÙÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/flaws-zyxels-network-management-software/153554/
5.AvastɱÈíÔÚÆØ³öÑÏÖØÎó²îºó½ûÓÃJavaScriptɨÃèÒýÇæ
¹È¸èÇå¾²Ñо¿Ö°Ô±Ëþά˹¡¤°ÂÂüµÏ£¨Tavis Ormandy£©·¢Ã÷Avastɱ¶¾Èí¼þ±£´æÎó²î£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíºÚ¿ÍÔÚÓû§ÅÌËã»úÉÏÔ¶³ÌÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£AvastÔÚÒ»ÖÜǰ¾Í½Óµ½Á˸ÃÎó²îµÄ±¨¸æ£¬£¬£¬£¬£¬£¬µ«ÈÔδ½â¾ö¸ÃÎÊÌ⣬£¬£¬£¬£¬£¬¸Ã¹«Ë¾¾öÒéÔÝʱ½ûÓÃɱÈíÖеÄJavaScriptɨÃèÒýÇæ¡£¡£¡£¡£¡£¡£¡£¡£OrmandyÌåÏÖ¸ÃÎó²îºÜÈÝÒ×±»Ê¹Ó㬣¬£¬£¬£¬£¬¹¥»÷ÕßÖ»Ðèͨ¹ýµç×ÓÓʼþ·¢ËͶñÒâJavaScript»òWSHÎļþ£¬£¬£¬£¬£¬£¬»òÓÕʹÓû§·¿ª°üÀ¨¶ñÒâJavaScriptµÄÎļþ£¬£¬£¬£¬£¬£¬¼´¿ÉÒÔϵͳ¼¶»á¼ûȨÏÞÖ´ÐжñÒâ²Ù×÷£¬£¬£¬£¬£¬£¬ÀýÈç×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/avast-disables-javascript-engine-in-its-antivirus-following-major-bug/
6.ºÉÀ¼Õþ¸®É¥Ê§Áè¼Ý690ÍòÆ÷¹Ùļ¾èÕßÊý¾Ý£¬£¬£¬£¬£¬£¬Õ¼×ÜÉú³Ý½üÒ»°ë
ºÉÀ¼Õþ¸®ÌåÏÖɥʧÁËÁ½¸ö´æÓÐ690ÍòÆ÷¹Ù¾èÔùÕßÊý¾ÝµÄÓ²ÅÌ£¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÊÇ1998Äê2ÔÂÖÁ2010Äê6ÔÂʱ´úÏòºÉÀ¼¾èÔùÕ߹ҺŴ¦Ìá½»µÄËùÓоèÔùÕß±í¸ñµÄ±¸·Ý¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩӲÅ̵Ä×îºóʹÓÃʱ¼äÊÇ2016Ä꣬£¬£¬£¬£¬£¬ËæºóËüÃDZ»°²ÅÅÔÚÒ»¸öÇå¾²µÄ±£¹Ü¿âÖС£¡£¡£¡£¡£¡£¡£¡£µ«ÔÚ½ñÄêÔçЩʱ¼äÕþ¸®·¢Ã÷Ó²ÅÌɥʧ£¬£¬£¬£¬£¬£¬²¢ÇÒÏÖÔÚÈÔÈ»ÎÞ·¨ÕÒµ½¡£¡£¡£¡£¡£¡£¡£¡£Ó²ÅÌÖд洢µÄÐÅÏ¢°üÀ¨×¢²á¾èÔùÕßµÄÐÕÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢µØµã¡¢Æ÷¹Ù¾èÔùµÄÑ¡Ôñ¡¢IDÒÔ¼°ÊðÃû¡£¡£¡£¡£¡£¡£¡£¡£ºÉÀ¼µÄ×ÜÉú³ÝΪ1740Íò×óÓÒ£¬£¬£¬£¬£¬£¬ÆäÖнüÒ»°ë±»ÒÔΪÊÇ×¢²á¾èÔùÕß¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/dutch-government-loses-hard-drives-with-data-of-6-9-million-registered-donors/


¾©¹«Íø°²±¸11010802024551ºÅ