Sophos·¢Ã÷LockBitʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßʶ±ð¿ÉÒÉÄ¿µÄ£»£»£»£»£»£»DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡Õþ¸®Êý¾Ý
Ðû²¼Ê±¼ä 2020-10-231.Sophos·¢Ã÷LockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿µÄ

SophosÐû²¼±¨¸æ£¬£¬£¬£¬£¬³ÆLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨Ì«¹ýÎöÒ»Äêǰ·ºÆðµÄÑù±¾£¬£¬£¬£¬£¬·¢Ã÷LockBitÒѾѸËÙ³ÉÊ죬£¬£¬£¬£¬²¢½ÓÄÉÁËһЩеÄÒªÁìÀ´ÈƹýWindowsÓû§ÕÊ»§¿ØÖÆ£¨UAC£©À´ÌáÉýÌØÈ¨¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬LockBit¿ÉʹÓÃPowerShellºÍWindowsµÄVBscriptÖ÷»úµÄÖØÃüÃû¸±±¾ÒÔ¼°»ùÓÚPowerShellÉøÍ¸²âÊÔ¹¤¾ßµÄ¾ç±¾£¬£¬£¬£¬£¬À´ËÑË÷°üÀ¨ÓмÛÖµÊý¾ÝµÄϵͳ£¬£¬£¬£¬£¬ÒÔ¹¥»÷СÐÍ×éÖ¯¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.sophos.com/en-us/2020/10/21/lockbit-attackers-uses-automated-attack-tools-to-identify-tasty-targets/
2.ÃÀ¹ú³ÆÒÁÀʺڿÍð³äProud BoysÏòÑ¡Ãñ·¢ËÍÏÅ»£Óʼþ

ÃÀ¹úÕþ¸®³ÆÒÁÀʺڿÍð³ä¼«ÓÒÒí×éÖ¯Proud Boys£¬£¬£¬£¬£¬¸øÃñÖ÷µ³Ñ¡Ãñ·¢ËÍÏÅ»£Óʼþ¡£¡£¡£¡£¡£¡£¡£ÕâЩµç×ÓÓʼþÒÔ¡°Í¶Æ±¸øÌØÀÊÆÕ»òÆäËûÈË¡±ÎªÖ÷Ì⣬£¬£¬£¬£¬²¢ÖÒÑÔÃñÖ÷µ³Ñ¡Ãñ±ØÐ轫Õþµ³¸ÄΪ¹²ºÍµ³²¢Í¶Æ±¸øÌØÀÊÆÕ×Üͳ£¬£¬£¬£¬£¬²»È»Proud Boys½«²»»á·Å¹ýËûÃÇ¡£¡£¡£¡£¡£¡£¡£ÓʼþÖеÄÊÕ¼þÈËÐÕÃûºÍµØµãÌåÏÖÕâЩÐÅÏ¢ÊǺڿÍͨ¹ý¹¥»÷Ñ¡Ãñ×¢²áÍøÕ¾»ñµÃµÄ¡£¡£¡£¡£¡£¡£¡£¶øÃÀ¹úÕþ¸®³ÆÒÁÀʺͶíÂÞ˹ÒѾ»ñµÃÁËÑ¡Ãñ¹ÒºÅÐÅÏ¢£¬£¬£¬£¬£¬²¢ÇÒÒÁÀÊÕýÔÚʹÓøÃÐÅÏ¢·¢ËÍÕâЩÍþвÓʼþ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/government/us-govt-iran-behind-fake-proud-boys-voter-intimidation-emails/
3.ºÚ¿Íð³äÓ¢¹úM£¦SµÄCEOÆÈ¡Óû§ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢

ºÚ¿Íð³äÓ¢¹ú´óÐÍ¿ç¹úÁãÊÛÉÌMarks£¦SpencerµÄCEOÆÈ¡Óû§ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍÊ×ÏÈÔÚÍøÉÏÐû²¼Ú²ÆÐÔ¹ã¸æ£¬£¬£¬£¬£¬²¢Ðû´«Êܺ¦Õßͨ¹ýÐéÄâ³é½±½«ÓÐʱ»ú»ñµÃÀñÎïȯ¡£¡£¡£¡£¡£¡£¡£µ±Êܺ¦Õßµã»÷¹ã¸æÖеÄÁ´½Óʱ£¬£¬£¬£¬£¬»á±»Öض¨Ïòµ½M£¦SµÄÃÅ»§ÍøÕ¾£¬£¬£¬£¬£¬²¢ÒªÇóÌṩÆäÐÕÃû¡¢µØµã¡¢ÊÖ»úºÅÂëÒÔ¼°ÒøÐÐÏêϸÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨SORT´úÂëºÍÕʺŵȡ£¡£¡£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈëÐÅÏ¢ºó£¬£¬£¬£¬£¬ÆäÐÅÏ¢±ã»á±»ºÚ¿ÍÇÔÈ¡¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ms-boss-spoofed-in-gift-voucher/
4.DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡ÃÀ¹úÕþ¸®Êý¾Ý

ÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©ÍøÂçÇå¾²¡¢»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ºÍÁª°îÊÓ²ì¾Ö£¨FBI£©ÖÒÑÔ£¬£¬£¬£¬£¬¶íÂÞ˹APT×éÖ¯Energetic BearÈëÇÖ²¢ÇÔÈ¡ÁËÃÀ¹úÕþ¸®ÍøÂçµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÕâЩ»ú¹¹ÌåÏÖ£¬£¬£¬£¬£¬¶íÂÞ˹APT×éÖ¯ÒÑÃé×¼ÊýÊ®¸öSLTTÕþ¸®ºÍº½¿ÕÍøÂ磬£¬£¬£¬£¬²¢ÀֳɯÆËðÁËÍøÂç»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£×èÖ¹2020Äê10ÔÂ1ÈÕ£¬£¬£¬£¬£¬ÆäÖÁÉÙ´ÓÁ½¸öЧÀÍÆ÷ÖÐÇÔÈ¡ÁËÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÃô¸ÐÊý¾Ý°üÀ¨ÍøÂçÉèÖúÍÃÜÂë¡¢±ê×¼²Ù×÷³ÌÐò£¨SOP£©£¨ÀýÈç×¢²á¶àÒòËØÉí·ÝÑéÖ¤£©¡¢ITÖ¸ÁÀýÈçÇëÇóÃÜÂëÖØÖã©¡¢¹©Ó¦É̺͹ºÖÃÐÅÏ¢¡¢´òÓ¡»á¼ûÁîÅÆµÈ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/russian-state-hackers-stole-data-from-us-government-networks/
5.MozillaÐû²¼¸üУ¬£¬£¬£¬£¬ÐÞ¸´FirefoxÖеĶà¸öÎó²î

MozillÐÞ¸´ÁËFirefoxÖеĶà¸öÎó²î£¬£¬£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜÔÊÐíí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î°üÀ¨usersctp¿âÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15969£©¡¢ÄÚ´æ·ÖÅÉÎÊÌ⣨CVE-2020-15254£©¡¢Í¼Ïñ±êÇ©ÖÐÎó²î£¨CVE-2020-15680£©¡¢WASMÏß³ÌÖÐÎó²î£¨CVE-2020-15681£©¡¢¿Éµ¼ÖÂÓÕÆÐÔ¹¥»÷µÄÎó²î£¨CVE-2020-15682£©ºÍÄÚ´æÇå¾²¹ýʧ£¨CVE-2020-15683ºÍCVE-2020-15684£©¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-mozilla-firefox-could-allow-for-arbitrary-code-execution_2020-146/
6.CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄÎó²î

2020Äê10ÔÂ21ÈÕ£¬£¬£¬£¬£¬CiscoÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬Åû¶Æä¶à¸ö²úÆ·Öб£´æµÄ36¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪCisco FXOS FCM¿çÕ¾ÇëÇóαÔìÎó²î£¨CVE-2020-3456£©£¬£¬£¬£¬£¬ÓÉÓÚFCM½Ó¿ÚµÄCSRF±£»£»£»£»£»£»¤È±·¦µ¼Ö£¬£¬£¬£¬£¬ÀÖ³ÉʹÓôËÎó²î¿É·¢ËÍí§ÒâÇëÇ󣻣»£»£»£»£»Cisco FMC¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3499£©£¬£¬£¬£¬£¬ÓÉÓÚϵͳ¶Ô×ÊÔ´ÖµµÄ´¦Öóͷ£²»µ±µ¼Ö£¬£¬£¬£¬£¬¿ÉʹÓôËÎó²îÔì³É¾Ü¾øÐ§ÀÍ£¨DoS£©£»£»£»£»£»£»Cisco FTD TCP Flood¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3563£©£¬£¬£¬£¬£¬ÓÉÓÚÄÚ´æÖÎÀíЧÂʵÍÏÂÔì³É£¬£¬£¬£¬£¬¿Éµ¼Ö¾ܾøÐ§ÀÍ£¨DoS£©¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/cisco-dos-flaws-network-security-software/160414/


¾©¹«Íø°²±¸11010802024551ºÅ