FBIºÍNSAÁªºÏÅû¶¶íÂÞ˹Õë¶ÔLinuxµÄ¶ñÒâÈí¼þDrovorub£» £»£»£»£»£»£»ºÚ¿ÍʹÓÃWindowsºÍIE11ÖеÄ0day¹¥»÷º«¹ú¹«Ë¾

Ðû²¼Ê±¼ä 2020-08-14

1.FBIºÍNSAÁªºÏÅû¶¶íÂÞ˹Õë¶ÔLinuxµÄ¶ñÒâÈí¼þDrovorub


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


FBIºÍNSAÁªºÏÐû²¼Çå¾²¾¯±¨£¬£¬£¬ £¬£¬£¬£¬£¬Åû¶Á˶íÂÞ˹ºÚ¿ÍʹÓõĶñÒâÈí¼þDrovorub£¬£¬£¬ £¬£¬£¬£¬£¬ÆäÕë¶ÔLinuxϵͳֲÈëºóÃųÌÐò¡£¡£¡£¡£¡£¡£Æ¾Ö¤FBIºÍNSAÍøÂçµÄÖ¤¾Ý£¬£¬£¬ £¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ¿ÉÄÜÊôÓÚ¶íÂÞ˹ºÚ¿Í×éÖ¯APT28£¨Fancy Bear£¬£¬£¬ £¬£¬£¬£¬£¬Sednit£©¡£¡£¡£¡£¡£¡£NSAÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬£¬DrovorubÊÇÒ»¸ö¶à×é¼þϵͳ£¬£¬£¬ £¬£¬£¬£¬£¬¾ßÓÐÖ²È벿·Ö¡¢ÄÚºËÄ£¿£¿£¿érootkit¡¢Îļþ´«Ê乤¾ß¡¢¶Ë¿Úת·¢Ä£¿£¿£¿éºÍÏÂÁîÓë¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷£¬£¬£¬ £¬£¬£¬£¬£¬²¢ÇÒÓÐǿʢµÄ¹¦Ð§£¬£¬£¬ £¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»Ö´ÐÐÐí¶à²î±ðµÄ¶ñÒâ²Ù×÷£¬£¬£¬ £¬£¬£¬£¬£¬ÀýÈçÇÔÈ¡ÎļþºÍÔ¶³Ì¿ØÖÆÊܺ¦ÕßµÄÅÌËã»ú¡£¡£¡£¡£¡£¡£ÏÖÔڸöñÒâÈí¼þµÄÄ¿µÄÉÐδ¿ÉÖª£¬£¬£¬ £¬£¬£¬£¬£¬»ò½«¾ÙÐÐÉÌÒµÌØ¹¤»î¶¯ÉõÖÁÊǸÉÔ¤ÃÀ¹ú´óÑ¡¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-and-nsa-expose-new-linux-malware-drovorub-used-by-russian-state-hackers/


2.CISAÖÒÑÔÒÔCOVID-19´û¿î¼õÃâΪÖ÷ÌâµÄÍøÂç´¹Âڻ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÍøÂçÇå¾²ºÍ»ù´¡½á¹¹Çå¾²¾Ö£¨CISA£©Ðû²¼¾¯±¨£¬£¬£¬ £¬£¬£¬£¬£¬ÓкڿÍÒÔCOVID-19´û¿î¼õÃâΪÖ÷ÌâÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬ £¬£¬£¬£¬£¬ÒÔ¾ÙÐжñÒâÖØ¶¨ÏòºÍƾ֤ÇÔÈ¡¡£¡£¡£¡£¡£¡£CISAÆÊÎöʦ·¢Ã÷Ò»¸öδ֪ºÚ¿ÍÏò¸÷¸öÁª°îÃñÕþÖ´Ðв¿·ÖÒÔ¼°ÖÝ¡¢µØ·½¡¢²¿ÂäºÍµØÇøÕþ¸®µÄÊÕ¼þÈË·¢ËÍÁËÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬ £¬£¬£¬£¬£¬¸ÃÓʼþÖ÷ÌâΪSBAÉêÇë¨CÉóºË²¢¼ÌÐø£¬£¬£¬ £¬£¬£¬£¬£¬°üÀ¨ÓÐÒ»¸öÖ¸ÏòÐéαSBA¹ÙÍøµÄ¶ñÒâÁ´½Ó¡£¡£¡£¡£¡£¡£Ò»µ©Óû§µã»÷¸ÃÁ´½Ó£¬£¬£¬ £¬£¬£¬£¬£¬¾Í»á±»Öض¨Ïòµ½Î±Ôì³ÉSBA¹ÙÍøµÄ´¹ÂÚÍøÒ³£¬£¬£¬ £¬£¬£¬£¬£¬²¢±»ÇÔÈ¡µÇ¼ƾ֤¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/alerts/aa20-225a


3.ÃÀ¹úFINRAÖÒÑÔ£¬£¬£¬ £¬£¬£¬£¬£¬ÓкڿÍð³äÆä¹ÙÍøÌᳫ´¹ÂÚ¹¥»÷


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÃÀ¹ú½ðÈÚÒµî¿Ïµ¾Ö£¨FINRA£©ÖÒÑÔ£¬£¬£¬ £¬£¬£¬£¬£¬ÓкڿÍð³äÆä¹ÙÍøÌᳫ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£ÔÚºÚ¿ÍαÔìµÄÍøÕ¾ÖУ¬£¬£¬ £¬£¬£¬£¬£¬ÆäURLΪfinnra[.]org £¨ÕæÕýµÄ¹ÙÍøÎªfinra.org£©£¬£¬£¬ £¬£¬£¬£¬£¬»¹°üÀ¨¿ÉÓÃÓÚÍøÂçÃô¸ÐÐÅÏ¢µÄ×¢²á±í£¬£¬£¬ £¬£¬£¬£¬£¬ÕâЩÄÚÈݶ¼¿ÉÓÃÓÚÕë¶ÔFINRA³ÉÔ±µÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬£¬BleepingComputer·¢Ã÷¸ÃÐéÎ±ÍøÕ¾Óëx32team.websiteÆÊÎöµ½ÁËͳһ¸öIPµØµã£¬£¬£¬ £¬£¬£¬£¬£¬´ËºóÕßÊôÓÚÒ»¸öÔÚ2018Äê»îÔ¾µÄºÚ¿Í×éÖ¯£¬£¬£¬ £¬£¬£¬£¬£¬ÏÖÔÚÉÐÎÞ·¨ÕÒµ½Óë¸Ã×éÖ¯Ïà¹ØµÄÆäËûÐÅÏ¢¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-stock-broker-regulator-finra-warns-of-copycat-phishing-site/


4.ºÚ¿ÍʹÓÃWindowsºÍIE11ÖеÄ0day¹¥»÷Ò»¼Òº«¹ú¹«Ë¾


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¿¨°Í˹»ùµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ £¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃWindowsºÍIE11ÖеÄ0day¹¥»÷ÁËÒ»¼Òº«¹ú¹«Ë¾¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷±»³ÆÎªOperation PowerFall£¬£¬£¬ £¬£¬£¬£¬£¬ÆäʹÓÃÁËInternet Explorer 11ÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-1380£©ºÍWindows GDI Print / Print Spooler APIÖеÄÒ»¸öÌáȨÎó²î£¨CVE-2020-0986£©¡£¡£¡£¡£¡£¡£ºÚ¿ÍÔÚÔÚÔ¶³Ì»á¼ûÄ¿µÄÅÌËã»úÖ®ºó£¬£¬£¬ £¬£¬£¬£¬£¬Ê¹ÓÃÁËÒ»¸öÄ£¿£¿£¿é½¨ÉèÁËÃûΪok.exeµÄÎļþ£¬£¬£¬ £¬£¬£¬£¬£¬²¢Ê¹ÓÃCVE-2020-0986ÒÔ¸ü¸ßµÄȨÏÞÔËÐиÃÎļþÖеĶñÒâ´úÂë¡£¡£¡£¡£¡£¡£¿£¿£¿¨°Í˹»ùÆÊÎö·¢Ã÷£¬£¬£¬ £¬£¬£¬£¬£¬ ÕâЩÎó²îʹÓóÌÐòÓëÒÑÍùµÄÓÐһЩÏàËÆÖ®´¦£¬£¬£¬ £¬£¬£¬£¬£¬²¢ÒÔΪºÚ¿Í×éÖ¯DarkHotel»òÒ²¼ÓÈëÆäÖС£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/windows-ie11-zero-day-vulnerabilities-chained-in-targeted-attack/


5.ºÚ¿ÍÔÚ°µÍø³öÊÛÓ¡¶ÈÁè¼Ý2.1ÍòÃûѧÉúµÄСÎÒ˽¼ÒÐÅÏ¢


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÍøÂçÇå¾²¹«Ë¾ Cyble·¢Ã÷£¬£¬£¬ £¬£¬£¬£¬£¬ºÚ¿ÍÔÚ°µÍø³öÊÛÓ¡¶ÈÁè¼Ý2.1ÍòÃûѧÉúµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñй¶µÄÐÅÏ¢°üÀ¨Ñ§ÉúµÄAadhar¿¨¡¢Ñ§ÉúÖ¤¡¢ÕÕÆ¬¡¢ÍêÕûÊðÃû¡¢ÐÕÃû¡¢µç»°¡¢µç×ÓÓʼþ¡¢ÉúÈÕ¡¢ÐÔ±ð¡¢ÍêÕûµØµã¡¢´óѧ¡¢¿Î³Ì¡¢½áÒµÈÕÆÚ¡¢ÅóÙ­µÄÃû×ÖºÍÅóÙ­µÄºÅÂëµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬£¬´Ë´Îй¶¿ÉÄÜÔ´ÓÚÒ»¼Ò½ðÈÚÊÖÒÕ¹«Ë¾¡£¡£¡£¡£¡£¡£ÓÉÓÚÇå¾²²½·¥È±·¦£¬£¬£¬ £¬£¬£¬£¬£¬Ó¡¶ÈµÄ¸ß¿Æ¼¼¹«Ë¾Ò»Ö±±¸Êܺڿ͵ĹØ×¢£¬£¬£¬ £¬£¬£¬£¬£¬¸ÃÊÂÎñÖкڿͿÉÄÜʹÓÃÁ˽ðÈÚÊÖÒÕ¹«Ë¾ÓÃÓÚ´æ´¢Óû§Êý¾ÝµÄÔÆÏµÍ³ÖеÄÎó²îÌᳫÁ˹¥»÷¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://ciso.economictimes.indiatimes.com/news/data-of-21k-indian-students-on-sale-on-dark-web/77455110


6.Sonatype·¢Ã÷Õë¶Ô¿ªÔ´Èí¼þ¹©Ó¦Á´µÄ¹¥»÷¼¤Ôö430£¥


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


SonatypeÐû²¼±¨¸æ£¬£¬£¬ £¬£¬£¬£¬£¬·¢Ã÷Õë¶Ô¿ªÔ´Èí¼þ¹©Ó¦Á´µÄ¹¥»÷¼¤Ôö430£¥¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æ£¬£¬£¬ £¬£¬£¬£¬£¬´Ó2019Äê7Ôµ½2020Äê5Ô£¬£¬£¬ £¬£¬£¬£¬£¬¹²±¬·¢ÁË929´ÎÈí¼þ¹©Ó¦Á´¹¥»÷£¬£¬£¬ £¬£¬£¬£¬£¬Ïà±È֮ϣ¬£¬£¬ £¬£¬£¬£¬£¬ÔÚ2015Äê2ÔÂÖÁ2019Äê6ÔµÄËÄÄêÖУ¬£¬£¬ £¬£¬£¬£¬£¬Ö»±¬·¢ÁË216Æð´ËÀ๥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬£¬¸Ã±¨¸æ»¹Ö¸³ö£¬£¬£¬ £¬£¬£¬£¬£¬ÆóÒµÈí¼þ¿ª·¢ÍŶӶԿªÔ´Èí¼þ×é¼þÎó²îµÄÏìӦʱ¼ä²»¾¡Ïàͬ£¬£¬£¬ £¬£¬£¬£¬£¬47%µÄ×éÖ¯ÔÚÒ»ÖܺóÒâʶµ½ÁËеĿªÔ´Îó²î£¬£¬£¬ £¬£¬£¬£¬£¬51%µÄ×éÖ¯»¨ÁËÒ»¸ö¶àÐÇÆÚµÄʱ¼äÀ´ÐÞ¸´¿ªÔ´Îó²î¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/08/13/surge-in-cyber-attacks-targeting-open-source-software-projects/