CISAºÍCNMFÐû²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄÆÊÎö±¨¸æ£»£»£»£»£»£»Î¢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35ÀÖ³ÉÈëÇÖ¶à¸ö×ÅÃûÈËÊ¿ÓÊÏä

Ðû²¼Ê±¼ä 2020-10-30

1.CISAºÍCNMFÐû²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄÆÊÎö±¨¸æ


1.jpg


ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ºÍ¹ú·À²¿£¨DOD£©ÍøÂç¹ú¼ÒÐû½Ì²½¶Ó£¨CNMF£©·¢Ã÷еĶñÒâÈí¼þ±äÌåZebrocy¡£¡£¡£¡£¸Ã±äÌåÊÇÒ»¸ö32λµÄWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬Ê¹ÓÃGolang±à³ÌÓïÑÔ±àд£¬£¬£¬½ÓÄɵIJÎÊýӦΪÒì»ò£¨XOR£©ºÍÊ®Áù½øÖƱàÂëµÄͳһ×ÊÔ´±êʶ·û£¨URI£©£¬£¬£¬»òÕß¿ÉÒÔʹÓô¿Îı¾URIÔËÐС£¡£¡£¡£Ö´ÐÐʱ£¬£¬£¬Ëü½«Ê¹Óø߼¶¼ÓÃܱê×¼£¨AES£©-128µç×ÓÃÜÂë²¾£¨ECB£©Ëã·¨¶ÔURI¾ÙÐмÓÃÜ£¬£¬£¬²¢Ê¹ÓôÓÊܺ¦ÕßµÄÖ÷»úÃûÌìÉúµÄÃÜÔ¿£¬£¬£¬±ðµÄ»¹»áÍøÂçÓйØÊÜÄ¿µÄϵͳµÄÐÅÏ¢¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/cisa-and-cnmf-identify-new-malware-variant-zebrocy


2.Netscout·¢Ã÷TrickBotʹÓÃбäÌåÖ÷ÒªÕë¶ÔLinuxϵͳ


2.jpg


Çå¾²¹«Ë¾Netscout·¢Ã÷TrickBotʹÓÃбäÌåÖ÷ÒªÕë¶ÔLinuxϵͳ¡£¡£¡£¡£ÔÚ΢ÈíDefenderÍŶÓÁªºÏ¶à¼ÒÇå¾²¹«Ë¾²ð³ýÁËTrickBot´ó²¿·ÖЧÀÍÆ÷ºó£¬£¬£¬Æä×îÏÈʹÓöñÒâÈí¼þµÄбäÖÖ£¬£¬£¬ÒÔʵÑ齫ÆäÓÃÓÚLinuxϵͳ¡£¡£¡£¡£Ñо¿Ö°Ô±Waylon GrangeÓÚ7ÔÂÊ״η¢Ã÷ÁËAnchor_DNSµÄÐÂLinux±äÖÖ£¬£¬£¬²¢½«Æä³ÆÎªAnchor_Linux¡£¡£¡£¡£ÕâÊÇÒ»¸öÇáÁ¿¼¶µÄLinuxºóÃÅ£¬£¬£¬Ö´Ðк󣬣¬£¬Ëü½«×Ô¼º×°ÖÃΪcron£¬£¬£¬È·¶¨Ö÷»úµÄ¹«¹²IPµØµã£¬£¬£¬È»ºó×îÏÈͨ¹ýDNSÅÌÎÊÖ¸ÏòËüµÄC2ЧÀÍÆ÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110092/cyber-crime/trickbot-linux-variant.html


3.΢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35ÀÖ³ÉÈëÇÖ¶à¸ö×ÅÃûÈËÊ¿ÓÊÏä


3.jpg


MicrosoftµÄÍþвÇ鱨ÖÐÐÄ£¨MSTIC£©Åû¶£¬£¬£¬ºÚ¿Í×éÖ¯APT35ÀÖ³ÉÈëÇÖ¼ÓÈë½ñÄêĽÄáºÚÇå¾²¾Û»áºÍThink 20£¨T20£©·å»áµÄ¶à¸ö×ÅÃûÈËÊ¿µÄµç×ÓÓʼþÕÊ»§¡£¡£¡£¡£´Ë´ÎÊÂÎñµÄÊܺ¦Õß°üÀ¨Îª¹ú¼ÒÖ¸¶¨È«ÇòÒé³ÌºÍÍâ½»Õþ²ßµÄǰ´óʹºÍÆäËû¸ß¼¶Õþ²ßר¼Ò¡£¡£¡£¡£Æ¾Ö¤MSTICµÄÆÊÎö£¬£¬£¬´Ë´Î¹¥»÷ÎªÍøÂçÌØ¹¤»î¶¯£¬£¬£¬Ö¼ÔÚͨ¹ýÇÔÈ¡Êܺ¦ÕßµÄÓÊÏäÄÚÈݺÍÁªÏµ·½·¨À´ÍøÂçÇ鱨£¬£¬£¬²¢ÌåÏָûÓëÃÀ¹ú´óÑ¡²¢ÎÞ¹ØÏµ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-iranian-attackers-hacked-security-conference-attendees/


4.ºÚ¿Í¿ÉʹÓÃH?rmannÍø¹Ø×°±¸ÖÐÎó²îÔ¶³Ì¿ØÖƳµ¿âÃÅ


4.jpg


SEC ConsultÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ºÚ¿Í¿ÉʹÓÃH?rmannÍø¹Ø×°±¸ÖÐÎó²îÔ¶³Ì¿ØÖƳµ¿âÃÅ¡£¡£¡£¡£H?rmannÊÇÒ»¼ÒµÂ¹ú¹«Ë¾£¬£¬£¬×¨ÃÅ´ÓʼÒÓú͹¤ÒµÃÅ£¬£¬£¬ÊÇÌìϵÚËÄ´óÃÅÀàÖÆÔìÉÌ¡£¡£¡£¡£Çå¾²¹«Ë¾·¢Ã÷¸ÃÍø¹Ø×°±¸¹²ÓÐ15¸öÎó²î£¬£¬£¬°üÀ¨Óë¼ÓÃÜÓйصÄÎÊÌ⡢ͨѶ±£»£»£»£»£»£»¤²»Á¦ÒÔ¼°Ïà¹ØµÄÒÆ¶¯Ó¦ÓÃÖÐÎó²î¡£¡£¡£¡£ÕâЩÎó²î¿É±»ÓÃÀ´¾ÙÐÐÁ½ÖÖ¹¥»÷£¬£¬£¬Ò»ÖÖÊÇÐèÒª»á¼ûÍâµØÍøÂçµÄ¹¥»÷£¬£¬£¬ÁíÒ»ÖÖÊÇ´Ó»¥ÁªÍøÔ¶³ÌÌᳫµÄ¹¥»÷¡£¡£¡£¡£ÅþÁ¬µ½ÍâµØÍøÂçµÄ¹¥»÷Õß¿ÉÒÔͨ¹ýÊÖ»úÖ´ÐÐÒ»¸öС¾ç±¾·­¿ªH?rmannÃÅ£¬£¬£¬¶øÎÞÐèÒªÉí·ÝÑéÖ¤¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/hackers-can-open-doors-exploiting-vulnerabilities-h%C3%B6rmann-device


5.FireEye³Æ¶«Å·ÍÅ»ïUNC1878ʹÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº


5.jpg


ÍøÂçÇå¾²¹«Ë¾FireEye³Æ¶«Å·ÍÅ»ïUNC1878ʹÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº¡£¡£¡£¡£FireEye¸±×ܲÃCharles CarmakalÌåÏÖ¸Ã×éÖ¯¶ÔÃÀ¹ú¶à¼ÒÒ½Ôº¾ÙÐÐÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ÕâÊÇÒ½ÁÆÐÐÒµÔÚÒßÇéʱ´úÔâµ½µÄ×î¾ßÆÆËðÐÔµÄÍøÂç»î¶¯¡£¡£¡£¡£ÆäÖаüÀ¨±¾ÖܶԶíÀÕ¸ÔÖݵÄSky Lakes Medical CenterµÄ¹¥»÷£¬£¬£¬¶ÔŦԼÖÝÒ½ÔºµÄITÍøÂç¹¥»÷ÆÈʹCanton-Potsdam¡¢MassenaºÍGouverneurÒ½Ôº»Ö¸´Ê¹Óñ¸·Ý³ÌÐò¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.cyberscoop.com/ransomware-hospitals-ryuk-fireeye/


6.ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öÏÂÁî×¢ÈëÎó²î


6.jpg


ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2020-2490ºÍCVE-2020-2492£©¡£¡£¡£¡£QTSÊÇÍøÂ總¼Ó´æ´¢×°±¸µÄ²Ù×÷ϵͳ£¬£¬£¬Ê¹ÓøÃÎó²î¿ÉÔÊÐíí§ÒâÏÂÁîÖ´ÐС£¡£¡£¡£NAS×°±¸¹©Ó¦ÉÌδÌṩÓйØÕâÁ½¸öÎÊÌâµÄÌ«¶àÏêϸÐÅÏ¢£¬£¬£¬µ«ÌåÏÖ×îа汾µÄQTS°üÀ¨±ØÐèµÄ²¹¶¡³ÌÐò£¬£¬£¬Óû§Ö»Òª½«QTS²Ù×÷ϵͳ¸üе½°æ±¾QTS 4.4.3.1421 build 20200907¾Í²»±Øµ£ÐÄ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/qnap-warns-of-new-qts-bugs-that-allow-take-over-of-devices/