΢ÈíÐû²¼Îó²î²¹¶¡ÐÞ¸´111¸öÎó²î£»£»£»£»£»£»£»Thunderbolt±£´æÎó²îÓ°ÏìÊý°ÙÍò×°±¸

Ðû²¼Ê±¼ä 2020-05-13

1.΢ÈíÐû²¼Îó²î²¹¶¡£ ¡£¡£¡£¬£¬£¬£¬£¬£¬ÐÞ¸´12¿î²úÆ·ÖÐ111¸öÎó²î


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


5ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼ÁË5Ô·ÝÎó²î²¹¶¡£ ¡£¡£¡£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËEdge¡¢Windows¡¢Visual StudioÒÔ¼°.NET FrameworkϵÄ12¿î²úÆ·ÖеÄ111¸öÎó²î¡£ ¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪMicrosoft SharePointÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1023¡¢CVE-2020-1024ºÍCVE-2020-1102£©¡¢Windows OSÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1067£©¡¢MSHTMLÒýÇæÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1064£©¡¢Microsoft Edge PDFÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-109£©ºÍJetÊý¾Ý¿âÒýÇæÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1051£¬£¬£¬£¬£¬£¬CVE-2020-1174£¬£¬£¬£¬£¬£¬CVE-2020-1175ºÍCVE-2020-1176£©¡£ ¡£¡£¡£±¾ÔÂÐû²¼µÄÊÇ΢ÈíÀúÊ·ÉϵÚÈý´óµÄ²¹¶¡³ÌÐò£¬£¬£¬£¬£¬£¬ÁíÍâÁ½´Î»®·ÖÊÇÔÚ2020Äê3ÔºÍ2020Äê4Ô£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁË115ºÍ113¸ö¹ýʧ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-may-2020-patch-tuesday-fixes-111-vulnerabilities/


2.Thunderbolt±£´æÎó²î£¬£¬£¬£¬£¬£¬»ò½«Ó°ÏìÊý°ÙÍò×°±¸


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


°£Òò»ôοƼ¼´óѧµÄÑо¿ÍŶÓÔÚÓ¢ÌØ¶ûµÄThunderbolt¶Ë¿ÚÖз¢Ã÷ÁË7¸öÎó²î£¬£¬£¬£¬£¬£¬²¢Ä£ÄâÁË9ÖÖ¹¥»÷³¡¾°£¬£¬£¬£¬£¬£¬¾ßÓÐÎïÆÊÎö¼ûȨÏ޵Ĺ¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²î»á¼ûºÍ͵ȡÊý¾Ý¡£ ¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷Õß½öÐèÒªÎïÆÊÎö¼ûÆôÓÃÁËThunderboltµÄWindows»òLinuxϵͳ±ã¿ÉÒÔʵÏÖ¹¥»÷£¬£¬£¬£¬£¬£¬²¢ÇÒ²»»áÁôÏ»ºÛ¼£Ò²²»ÐèÒªÓëÓû§½»»¥¡£ ¡£¡£¡£×ÝÈ»Óû§ÔÚÍÑÀëʱÒѾ­Ëø¶¨»ò¹ÒÆðÅÌËã»ú£¬£¬£¬£¬£¬£¬²¢ÇÒÆôÓÃÁËÇå¾²Æô¶¯ºÍͨÅ̼ÓÃÜ£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÒÀÈ»¿ÉÒÔʵÏÖ¡£ ¡£¡£¡£¸ÃÎó²îÓ°ÏìÁË2019ÄêÖ®Ç°ÖÆÔìµÄÊý°ÙÍòWindowsºÍLinux×°±¸¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/endpoint/thunderbolt-vulnerabilities-could-threaten-millions-of-pcs/d/d-id/1337789


3.ATMÖÆÔìÉÌDiebold NixdorfѬȾÀÕË÷²¡¶¾£¬£¬£¬£¬£¬£¬ÏµÍ³ÖÐÖ¹


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¶íÖÝATMÖÆÔìÉÌDiebold NixdorfÓÚ4ÔÂ25ÈÕÍíÉÏ·¢Ã÷Æä¹«Ë¾ÍøÂçÒì³££¬£¬£¬£¬£¬£¬²¢ÏÓÒÉÊÇÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Á¬Ã¦¶Ï¿ªÁ˸ÃÍøÂçÉϵÄϵͳÒÔ×èÖ¹¶ñÒâÈí¼þµÄÈö²¥¡£ ¡£¡£¡£DieboldÌåÏָô˹¥»÷Ö»ÊÇÓ°ÏìÁËÍøÂçºÍITϵͳ£¬£¬£¬£¬£¬£¬µ«²¢Î´Ó°Ïì¿Í»§»ò¹«ÖÚ¡£ ¡£¡£¡£Æ¾Ö¤ÉîÈëÊӲ죬£¬£¬£¬£¬£¬¸ÃÀÕË÷²¡¶¾ÎªProLock£¬£¬£¬£¬£¬£¬ÔÚ3Ô·ÝҲѬȾÁËÒÁÀûŵÒÁÖÝÀ­Èø¶ûÏØµÄϵͳ¡£ ¡£¡£¡£BleepingComputerµÄLawrence Abrams˵£¬£¬£¬£¬£¬£¬ProLockÒªÇóµÄÊê½ðͨ³£ÔÚ6λÊý£¬£¬£¬£¬£¬£¬´Ó17.5ÍòÃÀÔªµ½66ÍòÃÀÔª²»µÈ¡£ ¡£¡£¡£¶øDieboldÌåÏÖËü²¢Ã»ÓÐÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬²¢ÇÒ²»»áÌÖÂÛÊê½ð½ð¶î¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://krebsonsecurity.com/2020/05/ransomware-hit-atm-giant-diebold-nixdorf/


4.ÃÀ¹ú¹«Ë¾Pitney BowesÔÙÔâÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬£¬£¬ÎªMazeÌᳫ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÃÀ¹ú¹«Ë¾Pitney BowesÔÚ7¸öÔÂÄÚÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ΪMazeÍÅ»ïÌᳫ¡£ ¡£¡£¡£MazeÍÅ»ïÔÚÍøÉÏÐû²¼ÁË11ÕŸù«Ë¾ÅÌËã»úÍøÂçÄÚ²¿Ä¿Â¼ÁбíµÄ½ØÍ¼£¬£¬£¬£¬£¬£¬ÒÔ֤ʵËûÃǹ¥»÷Àֳɡ£ ¡£¡£¡£Pitney Bowes½²»°ÈËÌåÏÖÏÖÔÚÕýÔÚÊÓ²ì´Ë´Î¹¥»÷µÄ¹æÄ££¬£¬£¬£¬£¬£¬ÌØÊâÊDZ»µÁÊý¾ÝÀàÐÍ¡£ ¡£¡£¡£2019Äê10ÔÂPitney BowesÊ×´ÎÔâµ½RyukÍÅ»ïÌᳫµÄÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñµ¼ÖÂijЩ°ü¹ü¸ú×ÙϵͳÍ£»£»£»£»£»£»£»ú¡£ ¡£¡£¡£RyukºÍMazeÍŻﶼÊÇʹÓÃÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ«²î±ðµÄÊÇMazeÉÐÓÐÒ»¸öÍøÕ¾£¬£¬£¬£¬£¬£¬²¢»áÔÚÊܺ¦Õ߾ܸ¶Êê½ðºóÔÚ¸ÃÍøÕ¾Ð¹Â¶Æä±»µÁÊý¾Ý¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/package-delivery-giant-pitney-bowes-confirms-second-ransomware-attack-in-7-months/


5.ºÚ¿ÍÂÛ̳WeLeakData.comÊý¾Ý¿â±»µÁ£¬£¬£¬£¬£¬£¬ÂÛ̳ÐÅϢй¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ºÚ¿ÍÂÛ̳WeLeakData.comµÄÊý¾Ý¿â±»µÁÇÒ±»·ÅÔÚ°µÍø³öÊÛ£¬£¬£¬£¬£¬£¬Ê¹¸ÃÍøÕ¾ºÚ¿ÍµÄÐÅÏ¢ºÍ˽϶Ի°Ð¹Â¶¡£ ¡£¡£¡£Æ¾Ö¤ÍøÂçÇ鱨¹«Ë¾CybleÐû²¼µÄ±¨¸æ£¬£¬£¬£¬£¬£¬WeLeakData.comµÄvBulletinÂÛ̳Êý¾Ý¿âй¶ÊÇÔÚ2020Äê1ÔÂ9ÈÕ×îÏȵ쬣¬£¬£¬£¬£¬ÏÖÒÑÔÚ°µÍøÊг¡ÉϳöÊÛ¡£ ¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Óû§µÇ¼Ãû¡¢µç×ÓÓʼþµØµã¡¢¹þÏ£ÃÜÂëÒÔ¼°ËûÃǵÄIPµØµãÒÔ¼°Ë½ÈËÐÂÎÅ¡£ ¡£¡£¡£¹ØÓÚ¸ÃÍøÕ¾Óû§À´Ëµ´Ë´ÎÊÂÎñÖÁ¹ØÖ÷Òª£¬£¬£¬£¬£¬£¬ÓÉÓÚÖ´·¨²¿·Ö¿ÉÒÔʹÓÃ×ß©µÄIPµØµãºÍµç×ÓÓʼþµØµãÀ´×·×ÙËûÃDz¢½«ÆäÓëÆäËû¹¥»÷Ïà¹ØÁª¡£ ¡£¡£¡£´Ë´Îй¶»¹¿ÉÒÔÈÃÑо¿Ö°Ô±ÏàʶÔõÑù¾ÙÐй¥»÷¡£ ¡£¡£¡£CybleÏÖÔÚÒѽ«Ð¹Â¶Êý¾ÝÌí¼Óµ½ÆäÊý¾Ýй¶²éÕÒЧÀÍamibreached.comÖУ¬£¬£¬£¬£¬£¬ÒÔ±ãÓû§¿ÉÒÔ¼ì²éÆäÐÅÏ¢ÊÇ·ñ×ß©¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-private-chats-leaked-in-stolen-weleakdata-database/


6.ÒøÐÐľÂíSphinx»Ø¹éÉý¼¶£¬£¬£¬£¬£¬£¬ÒÔCOVID-19ΪÖ÷ÌâÕë¶ÔÃÀ¹ú


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÒøÐÐľÂíSphinxÉý¼¶²¢»Ø¹é£¬£¬£¬£¬£¬£¬Ê¹ÓÃCOVID-19À¬»øÓʼþ×÷ΪÓÕ¶üÕë¶ÔÃÀ¹úÓû§£¬£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÆäÔÚÏßÒøÐлỰÖлñÈ¡Óû§Æ¾Ö¤ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢¡£ ¡£¡£¡£Ð°汾µÄSphinxµÄ¸Ä±äÖ÷ÒªÔÚ¶ñÒâ´úÂë×¢Èë·½·¨ºÍBotÉèÖÃÁ½·½Ãæ¡£ ¡£¡£¡£Sphinxͨ¹ýŲÓÃä¯ÀÀÆ÷º¯ÊýÖ²Èë´úÂ룬£¬£¬£¬£¬£¬Ê×ÏÈËüŲÓÃCreateProcessAº¯ÊýÀ´½¨ÉèÒ»¸öÐÂÀú³Ì¼°ÆäÖ÷Ị̈߳¬£¬£¬£¬£¬£¬È»ºóŲÓÃWriteProcessMemoryº¯ÊýÒÔ½«ÓÐÓøºÔØ×¢Èëmsiexec.exeÀú³Ì£¬£¬£¬£¬£¬£¬×îºóʹÓÃGetThreadContextºÍSetThreadContextº¯Êý½«Ä¿µÄÀú³ÌµÄÖ´Ðеã¸ü¸ÄΪ´Ó×¢ÈëµÄÓÐÓøºÔØ¡£ ¡£¡£¡£¶øBotÉèÖÃÖиü¸ÄÁËC2µØµãºÍRC4ÃÜÔ¿£¬£¬£¬£¬£¬£¬½ÓÄÉÖ¸ÎÆÊ¶±ðÒÔ±ãËæÊ±ÏòÆäÍÆË͸üС£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/sphinx-riddle-us-targets-modifications/155621/