ThalesµÄ²úÆ·±£´æÎó²î £¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸£»LuciferµÄбäÌåÕë¶ÔLinuxϵͳ £¬ÓëWindows°æ±¾¹¦Ð§ÏàËÆ

Ðû²¼Ê±¼ä 2020-08-21

1.ThalesµÄ²úÆ·±£´æÎó²î £¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸


1.png


IBMµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷ThalesµÄ²úÆ·µÄͨѶÄ£¿éÖб£´æÑÏÖØÎó²î £¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-15858 £¬ÓÚ2019Äê9ÔÂÊ×´ÎÔÚThalesµÄCinterion EHS8 M2MÄ£¿éÖб»·¢Ã÷ £¬²¢ÓÚ2020Äê2Ô±»ÐÞ¸´¡£ØÊºó»¹·¢Ã÷Ëü»¹»áÓ°ÏìÆäËûÊ®¸öÄ£¿é¡£¸ÃÎó²îÓë°üÀ¨ÓмÓÃÜÃÜÔ¿¡¢ÃÜÂëºÍÖ¤ÊéÖ®ÀàÐÅÏ¢µÄJava´úÂëÓÐ¹Ø £¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÈÆ¹ýÇå¾²»úÖÆ²¢»á¼ûÕâЩÐÅÏ¢ £¬È»ºóʹÓøÃÐÅÏ¢À´¿ØÖÆ×°±¸»ò»á¼û°üÀ¨¸Ã×°±¸µÄÍøÂç¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/vulnerability-thales-product-could-expose-millions-iot-devices-attacks


2.LuciferµÄбäÌåÕë¶ÔLinuxϵͳ £¬ÓëWindows°æ±¾¹¦Ð§ÏàËÆ


2.png


NETSCOUT ATLASÑо¿Ö°Ô±·¢Ã÷ÁËLuciferµÄбäÌå £¬¿ÉÕë¶ÔLinuxϵͳ £¬ÓëWindows°æ±¾¹¦Ð§ÏàËÆ¡£Lucifer¿ÉÒÔ½«Windows×°±¸×ª±äΪMonero¼ÓÃÜ»úеÈË £¬²¢³ÉΪÆä½©Ê¬ÍøÂçµÄÒ»²¿·Ö¡£Õë¶ÔLinuxϵͳµÄбäÌåÓëWindows°æ±¾¹¦Ð§ÏàËÆ £¬°üÀ¨ÓÃÓÚ¼ÓÃÜÐ®ÖÆºÍÆô¶¯»ùÓÚTCP¡¢UCPºÍ»ùÓÚICMPµÄ·ººé¹¥»÷µÄÄ£¿é £¬²¢ÇÒÊÜѬȾµÄLinux×°±¸Ò²¿ÉÒÔ±»ÓÃÓÚ»ùÓÚHTTPµÄDDoS¹¥»÷¡£³ý´ËÖ®Íâ £¬´Ë´ÎÉý¼¶»¹À©Õ¹ÁËWindows°æ±¾µÄ¹¦Ð§ £¬ÒÔʹÓÃMimikatz¹¤¾ßÇÔȡƾ֤²¢ÌáÉýȨÏÞ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/lucifer-cryptomining-ddos-malware-now-targets-linux-systems/


3.P2P½©Ê¬ÍøÂçFritzFrogͨ¹ýSSH¹¥»÷Linux·þÎñÆ÷


3.png


ÍøÂçÇå¾²¹«Ë¾Guardicore·¢Ã÷P2P½©Ê¬ÍøÂçFritzFrog¿Éͨ¹ýSSH¹¥»÷Linux·þÎñÆ÷¡£ÔÚ2020Äê֮ǰ £¬FritzFrogÒѹ¥»÷ÁËÖÁÉÙ500̨Õþ¸®ºÍÆóÒµSSH·þÎñÆ÷ £¬Õë¶ÔÈ«ÇòÕþ¸®¡¢½ÌÓý¡¢½ðÈÚ¡¢Ò½Áƺ͵çÐÅÐÐÒµ¡£FritzFrogÊÇÓÉGolang±àдµÄ £¬ËüÒÔifconfigºÍnginxµÄÃûÒå½â°ü¶ñÒâÈí¼þ £¬²¢Í¨¹ý1234¶Ë¿ÚÀ´¼àÌý·¢Ë͵ÄÏÂÁî¡£FritzFrogµÄÖ÷ҪĿµÄÊÇÍÚ¾ò¼ÓÃÜÇ®±Ò £¬ÈôÊÇ·þÎñÆ÷ÉϵÄÀú³ÌÕ¼ÓÃÁËCPU×ÊÔ´ £¬Ôò¿ÉÄܻᱻɱËÀ £¬´Ó¶øÎª¿ó¹¤Ìṩ¾¡¿ÉÄܶàµÄ¹¦Ð§¡£ÏÖÔÚÒÑÔÚÒ°Íâ·¢Ã÷ÁË20¶àÖÖ±äÌå¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-fritzfrog-p2p-botnet-has-breached-at-least-500-enterprise-government-servers/


4.Êý¾Ý¿âÉèÖùýʧµ¼ÖÂ2.35ÒÚÓû§Ð¡ÎÒ˽¼ÒÐÅϢй¶


4.png


Ñо¿Ö°Ô±³Æ £¬É罻ýÌåÊý¾Ý¾­¼ÍÈËÒòÔÚÏßÊý¾Ý¿âÉèÖùýʧ £¬µ¼ÖÂ2.35ÒÚÓû§Ð¡ÎÒ˽¼ÒÐÅϢй¶ £¬ÕâЩÄÚÈÝÎÞÐèÈκÎÃÜÂë»òÆäËûÉí·ÝÑéÖ¤¼´¿ÉÔÚÏß»á¼û¡£Ð¹Â¶ÐÅϢΪInstagramÖеÄ1.92ÒÚСÎÒ˽¼Ò×ÊÁÏ £¬TikTokÖеÄ4200ÍòСÎÒ˽¼Ò×ÊÁÏÒÔ¼°YouTubeÖеÄ400ÍòСÎÒ˽¼Ò×ÊÁÏ £¬°üÀ¨ÕæÊµÐÕÃû¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬ¡¢ÕÊ»§ËµÃ÷¡¢ÄêËê¡¢ÐÔ±ðµÈ £¬²¿·Ö»¹°üÀ¨µç»°ºÅÂë»òµç×ÓÓʼþµØÖ·¡£Ö»¹Ü¸ÃÊý¾Ý¿âÔÚÊ״ιûÕæºóÈý¸öСʱ¾Í±»¹Ø±ÕÁË £¬µ«Éв»ÇåÎúûÓÐÃÜÂëµÄÐÅÏ¢ÔÚÍøÉϱ£´æÁ˶೤ʱ¼ä¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/data-firm-exposes-235m-social/


5.MITERÐû²¼ÒÑÍùÁ½Äê×î³£¼ûµÄ25¸öÎó²îÁбí


5.png


MITERÐû²¼ÁËÒÑÍùÁ½ÄêÄÚ×î³£¼ûµÄ25¸öÎó²îÁбí¡£ÎªÁËÁгö¸ÃÎó²î £¬MITERƾ֤¹ú¼ÒÎó²îÊý¾Ý¿â£¨NVD£©2018ÄêºÍ2019Äê³£¼ûÎó²îºÍ̻¶£¨CVE£©Êý¾Ý £¬»ùÓÚÑÏÖØÐÔºÍÆÕ±éÐÔ¶Ôÿ¸öÎó²î¾ÙÐÐÁËÆÀ·Ö £¬ÒԿ͹۵ØÏàʶĿ½ñÔÚÏÖʵÌìÏÂÖп´µ½µÄÎó²î¡£MITRE 2020 CWE Top 25ÖÐÅÅÃûµÚÒ»µÄΪ¿çÕ¾µã¾ç±¾£¨XSS£© £¬ÓÉÓÚÆä³ýÁËÒ×ÓÚ±»Ê¹ÓÃÖ®Íâ £¬»¹¿ÉÒÔ±»¹¥»÷ÕßÓÃÀ´ÍêÈ«¿ØÖÆÏµÍ³¡¢ÇÔÈ¡Ãô¸ÐÊý¾Ý»ò´¥·¢¾Ü¾ø·þÎñ£¨DoS£©¡£³ý´ËÖ®Íâ £¬ÉÐÓÐÔ½½çдÎó²î¡¢ÊäÈëÑéÖ¤²»×¼È·ºÍÔ½½ç¶ÁÈ¡µÈÎó²î¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/mitre-shares-this-years-top-25-most-dangerous-software-bugs/


6.CISAºÍFBIÖÒÑÔ³¯ÏÊRAT BLINDINGCANÕë¶ÔÃÀ¹ú¹ú·Àµ¥Î»


6.png


CISAºÍFBIÍŽáÐû²¼¾¯±¨ £¬Åû¶Á˳¯ÏʺڿÍÔÚÕë¶ÔÃÀ¹ú¹ú·ÀºÍº½¿ÕÁìÓòµÄµÄ¹¥»÷ÖÐʹÓõÄÔ¶³Ì»á¼ûľÂíBLINDINGCAN¡£´Ë´Î¹¥»÷ʹÓÃÁËÓëÍù³£ÏàͬµÄģʽ £¬³¯ÏʺڿÍð³ä×ÅÃû¹«Ë¾µÄÕÐÆ¸Ö°Ô± £¬ÒÔ¿¿½üËùÐ蹫˾µÄÔ±¹¤¡£ÔÚÃæÊÔÀú³ÌÖÐ £¬ºÚ¿Í»á¸øÊܺ¦Õß·¢ËͶñÒâPDFÎĵµÒÔ°²ÅŶñÒâÈí¼þ¡£CISAר¼ÒÌåÏÖ £¬³¯ÏʺڿͻáʹÓøöñÒâÈí¼þ»á¼ûÊܺ¦Õßϵͳ £¬¾ÙÐÐÕì̽ £¬È»ºóÍøÂçÓйØÒªº¦¾üʺÍÄÜÔ´ÊÖÒÕµÄÇ鱨¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-govt-exposes-new-north-korean-blindingcan-backdoor-malware/