GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯£»£»£»£»ºÚ¿ÍʹÓÃÐéαµÄÌØÀÊÆÕ³óÎÅÊÓÆµÈö²¥QNode RAT

Ðû²¼Ê±¼ä 2021-01-08
1.GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯


1.jpg


ÍøÂçÇå¾²¹«Ë¾GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²î£¨CVE-2020-29583£©µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¸ÃÎó²îÓëZyxelÖÐÓ²±àÂëµÄºóÃÅÕÊ»§zyfwpÓйØ£¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÀ´½ÓÊÜÍøÂç×°±¸¡£¡£¡£¡£GreyNoise¼ì²âµ½Èý¸ö²î±ðµÄIPµØµãÕýÔÚɨÃèSSH×°±¸£¬ £¬£¬£¬£¬£¬£¬²¢ÊµÑéʹÓÃZyxelºóÃŵǼ¡£¡£¡£¡£¿ÉÊÇÕâЩ¹¥»÷Õß²¢Ã»ÓÐרÃÅÕë¶ÔZyxel×°±¸£¬ £¬£¬£¬£¬£¬£¬¶øÊÇɨÃèInternetÉÏËùÓÐÕýÔÚÔËÐеÄSSH¡£¡£¡£¡£ÆäÖÐÒ»¸ö¹¥»÷ÕßʹÓÃÁËCobalt StrikeµÄÄÚÖÃSSH¿Í»§¶ËÀ´Ö´ÐÐɨÃ裬 £¬£¬£¬£¬£¬£¬Ö¼ÔÚÈÆ¹ý¼ì²â¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-start-exploiting-the-new-backdoor-in-zyxel-devices/


2.ºÚ¿ÍʹÓÃÐéαµÄÌØÀÊÆÕ³óÎÅÊÓÆµÈö²¥QNode RAT


2.png


CybesecurityÑо¿Ö°Ô±·¢Ã÷ºÚ¿ÍʹÓÃÐéαµÄÌØÀÊÆÕ³óÎÅÊÓÆµÈö²¥¶ñÒâÈí¼þQNode¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß·¢ËÍÒÔ¡°GOOD LOAN OFFER !!¡±ÎªÖ÷ÌâµÄÓʼþ£¬ £¬£¬£¬£¬£¬£¬²¢¸½ÓÐÒ»¸öÃûΪTRUMP_SEX_SCANDAL_VIDEOµÄJAR¶ñÒâÎļþÎļþÒÔ×°ÖÃQNode RAT¡£¡£¡£¡£QRATÊǵ䷶µÄÔ¶³Ì»á¼ûľÂí£¬ £¬£¬£¬£¬£¬£¬¾ßÓлñȡϵͳÐÅÏ¢¡¢Ö´ÐÐÎļþ²Ù×÷ÒÔ¼°´ÓGoogle ChromeºÍFirefoxµÈÓ¦ÓÃÖлñȡƾ֤µÄ¹¦Ð§¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/01/hackers-using-fake-trumps-scandal-video.html


3.ÃÀ¹ú˾·¨²¿³ÆºÚ¿ÍÈëÇÖÆäMicrosoft O365ÓʼþЧÀÍÆ÷


3.png


ÃÀ¹ú˾·¨²¿£¨DoJ£©³ÆSolarWinds¹©Ó¦Á´¹¥»÷µÄºÚ¿ÍÈëÇÖÆäMicrosoft O365ÓʼþЧÀÍÆ÷£¬ £¬£¬£¬£¬£¬£¬²¢»á¼ûÁË3450×óÓÒ¸öÓÊÏäÕË»§¡£¡£¡£¡£¸Ã²¿·Ö³ÆºÚ¿Í»á¼ûµÄO365ÓÊÏäÊýÄ¿½öÔÚ3£¥×óÓÒ£¬ £¬£¬£¬£¬£¬£¬²¢ÇÒÆäÉñÃØÏµÍ³²¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬Êܵ½Ó°ÏìµÄ»ú¹¹°üÀ¨²ÆÎñ²¿¡¢¹úÎñÔº¡¢NTIA¡¢¹úÁ¢ÎÀÉúÑо¿ÔºCISA¡¢ÄÜÔ´²¿¡¢¹ú¼ÒºËÇå¾²¾ÖºÍÁìÍÁÇå¾²²¿µÈ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/solarwinds-hackers-had-access-to-over-3-000-us-doj-email-accounts/


4.TalosÅû¶SoftMaker OfficeÖеĴúÂëÖ´ÐÐÎó²î


4.png


Cisco TalosÅû¶ÁËSoftMaker OfficeÖеĴúÂëÖ´ÐÐÎó²î¡£¡£¡£¡£µÂ¹úÈí¼þ¿ª·¢ÉÌSoftMaker Software GmbHΪСÎÒ˽¼ÒºÍÆóÒµÌṩ°ì¹«Èí¼þÌ×¼þ£¬ £¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÆäÎÄ×Ö´¦Öóͷ£¹¦Ð§×é¼þTextMaker¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄÎó²î»®·ÖΪ·ûºÅÀ©Õ¹Îó²î£¨CVE-2020-13544£©£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂÎĵµÆÊÎöÆ÷¶ÔÓÃÓÚÖÕֹѭ»·µÄ³¤¶È¾ÙÐзûºÅÀ©Õ¹£»£»£»£»ÎĵµÆÊÎö¹¦Ð§ÖеÄÊðÃûת»»Îó²î£¨CVE-2020-13545£©£»£»£»£»ÕûÊýÒç³öÎó²î£¨CVE-2020-13546£©£¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂÓ¦ÓÃÔÚ»º³åÇøÍⲿдÈëÊý¾Ý¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/softmaker-office-vulnerabilities-allow-code-execution-malicious-documents


5.MoFoÐû²¼2020ÄêÊý¾Ýй¶ËßËϵĻØÊ×±¨¸æ


5.png


MoFoÐû²¼2020ÄêÊý¾Ýй¶ËßËϵĻØÊ×±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬£¬£¬£¬£¬2020ÄêÊý¾Ýй¶µÄÊýÄ¿ÔöÌíÁË270£¥¡£¡£¡£¡£¸Ã±¨¸æÍ³¼ÆÁËÈ¥ÄêµÄ25¸öÖØ´óÊý¾Ýй¶ÕûÌåËßËϰ¸¼þ£¬ £¬£¬£¬£¬£¬£¬·¢Ã÷ÔÚԼĪ15£¥µÄÖØ´óÊý¾Ýй¶°¸¼þÖÐÔ­¸æÊǹÍÔ±£¬ £¬£¬£¬£¬£¬£¬ÆäËûÇéÐÎÏ£¬ £¬£¬£¬£¬£¬£¬Ô­¸æÊÇ»á¼û±»¸æ¸¶¿îƽ̨µÄ¿Í»§¡¢»¼Õß¡¢Óû§¡¢ÕÊ»§³ÖÓÐÈË»òСÎÒ˽¼Ò¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬¸Ã±¨¸æÕ¹Íû£¬ £¬£¬£¬£¬£¬£¬2020ÄêÇå¾²ÊÂÎñÊýÄ¿µÄ´ó·ùÔöÌí½«µ¼ÖÂ2021Ä걬·¢¸ü¶àµÄÊý¾Ýй¶ËßËϰ¸¼þ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.mofo.com/resources/insights/210104-data-breach-litigation-2020.html


6.еÄÅÔ·¹¥»÷¿ÉÒÔ´ÓGoogle TitanÖлָ´¼ÓÃÜÃÜÔ¿


6.png


·¨¹úÑо¿Ö°Ô±·¢Ã÷еÄÅÔ·¹¥»÷¿ÉÒÔ´ÓGoogle TitanÖлָ´¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2021-3011£©±£´æÓÚGoogle TitanºÍYubiKeyÓ²¼þÇå¾²ÃÜÔ¿µÄоƬÖУ¬ £¬£¬£¬£¬£¬£¬¿É±»ÓÃÀ´»Ö¸´Ó²¼þÇå¾²ÃÜÔ¿ËùʹÓõļÓÃÜÃÜÔ¿¡£¡£¡£¡£¹¥»÷ÕßÒ»µ©»ñµÃ¼ÓÃÜÃÜÔ¿£¬ £¬£¬£¬£¬£¬£¬¼´ECDSA ˽Կ£¬ £¬£¬£¬£¬£¬£¬±ã¿ÉÒÔ¿Ë¡Titan¡¢YubiKeyºÍÆäËûÃÜÔ¿£¬ £¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ý2FA³ÌÐò¡£¡£¡£¡£¿ÉÊÇ´ËÀ๥»÷²»¿Éͨ¹ýInternet»òÍâµØÍøÂçÔ¶³Ì¾ÙÐУ¬ £¬£¬£¬£¬£¬£¬¶øÊÇÐèÒª¶ÔÇå¾²ÃÜÔ¿¾ÙÐÐÎïÆÊÎö¼û¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-side-channel-attack-can-recover-encryption-keys-from-google-titan-security-keys/