Samba°²È«¸üР£¬½¨¸´Á½¸ö¿Éµ¼ÖÂDoSµÄ·ì϶£»¼ÓÄôó½ðÈÚ»ú¹¹Desjardinsй¶Լ290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢

°ä²¼¹¦·ò 2019-06-21
1.Samba°²È«¸üР£¬½¨¸´Á½¸ö¿Éµ¼ÖÂDoSµÄ·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


SambaÍŶӰ䲼°²È«¸üР£¬½¨¸´Á½¸ö·ì϶¡£µÚÒ»¸ö·ì϶£¨CVE-2019-12435£©ÊÇÒ»¸ö¿ÕÖ¸Õë½âÒýÓÃÎÊÌâ £¬Ó°ÏìSamba°æ±¾4.9ºÍ4.10 £¬³É¹¦ÀûÓô˷ì϶¿Éµ¼ÖÂDNSÖÎÀí·þÎñÆ÷³öÏֻؾø·þÎñ¡£µÚ¶þ¸ö·ì϶£¨CVE-2019-12436£©Ó°ÏìÁËv4.10ÆðÍ·µÄËùÓÐSamba°æ±¾ £¬¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔÚ·ÖÒ³ËÑË÷¿Ø¼þÖÐͨ¹ý¿ÕÖ¸Õë½âÒýÓÃÀ´±ÀÀ£LDAP·þÎñÆ÷¹ý³Ì¡£

   

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/samba-releases-security-updates-to-address-two-vulnerabilities-0f9c2ad6

2.˼¿Æ½¨¸´SD-WAN¡¢RV·ÓÉÆ÷µÈ¶à¸ö²úÆ·Öеݲȫ·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆÕë¶ÔSD-WAN¡¢Êý×ÖÍøÂç¼Ü¹¹£¨DNA£©ÖÐÐÄ¡¢TelePresence¡¢StarOS¡¢RV·ÓÉÆ÷¡¢Prime Service CatalogºÍMeeting ServerµÈ²úÆ·°ä²¼°²È«¸üР£¬½¨¸´¶à¸ö·ì϶¡£ÑϳÁµÄ·ì϶Ô̺¬DNAÖÐÐÄÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2019-1848 £¬CVSS 9.3·Ö£©¡¢SD-WANºÅÁîÐнçÃæÖеı¾µØÌáȨ·ì϶£¨CVE-2019-1625 £¬CVSS 7.8·Ö£©ÒÔ¼°¶à¸öRV·ÓÉÆ÷ÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-1663 £¬CVSS 9.8·Ö£©µÈ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/critical-vulnerabilities-patched-cisco-sd-wan-dna-center-products

3.APT¼¶ºÚ³ÔºÚ £¬¶íÂÞ˹Turla APT¹¥»÷ÒÁÀÊAPT34

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ƾ¾ÝÈüÃÅÌú¿ËµÄ»ã±¨ £¬¶íÂÞ˹Turla APTÔÚ2017ÄêÈëÇÖÁËÒÁÀÊAPT34µÄ»ù´¡ÉèÊ© £¬²¢ÀûÓÃÆäC£¦C·þÎñÆ÷ʹÓÃ×Ô¼ºµÄ¶ñÒâÈí¼þ¶þ´ÎϰȾAPT34µÄÊܺ¦Õß¡£×êÑÐÈËÔ±ÓÚ2018Äê1ÔÂ11Èչ۲쵽¸ÃÈëÇֻµÄÊ׸öÖ¤¾Ý £¬ÆäʱTurlaÏòAPT34µÄÊܺ¦Õß¿ªÊÍÁËÒ»¸ö¶ñÒ⹤¾ß£¨ÃûΪmsfgi.exeµÄ¹¤×÷µ÷¶È·¨Ê½£©¡£TurlaÔÚ¸ÃÍøÂçÉϵĻһÏò³ÖÐøµ½2018Äê9Ô £¬µ«APT34ËÆºõûÓз¢ÏÖ¸ÃÈëÇÖ £¬Ã»ÓÐÖ¤¾ÝÅú×¢APT34×ö³öÁËÈκη´Ó³¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russian-apt-hacked-iranian-apts-infrastructure-back-in-2017/

4.Õë¶ÔµÂ¹úµÄ´ó¹æÄ£´¹µö¹¥»÷ £¬ÖØÒª·Ö·¢Ô¶¿ØÄ¾ÂíRemcos

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Check Point×êÑÐÈËÔ±·¢ÏÖÒ»¸öÕë¶ÔµÂ¹úËùÓÐÐÐÒµµÄдó¹æÄ£ÍøÂç´¹µö»î¶¯ £¬¹¥»÷ÕßµÄÖ¸±êÊÇÔÚÊܺ¦ÕßµÄÍÆËã»úÉÏ×°ÖÃÔ¶¿ØÄ¾ÂíRemcos¡£¸Ã»î¶¯µÄ³õʼ¹¥»÷ÏòÁ¿ÊÇ´¹µöÓʼþ £¬¹¥»÷Õß¼Ù×°³ÉµÂ¹ú¸÷µØµÄºÏ·¨¹«Ë¾ £¬ÏòÖ¸±êÆóÒµ·¢ËÍÔ̺¬·¢Æ±»ò´¹Î£¶©µ¥µÄ´¹µöÓʼþ £¬×îÖÕ·Ö·¢Remcos¡£ÔÚÓëC&CµÄͨѶÖÐ £¬¹¥»÷Õß»¹Ê¹ÓÃDDNS£¨¶¯Ì¬DNS£©¼¼ÊõÀ´°µ²ØÆä×ÙÓ°¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2019/06/19/sandblast-agent-phishing-germany-campaign-security-hack-ransomware/

5.жñÒâÍÚ¿óÈí¼þ £¬Ôö³¤cron´òË㹤×÷ʵÏÖÓÆ¾ÃÐÔ»úÔì


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Sucuri°²È«×êÑÐÈËÔ±Luke Leal·¢ÏÖÒ»¸öеĶñÒâÍÚ¿óÈí¼þͨ¹ýÔö³¤cron´òË㹤×÷À´ÊµÏÖÓÆ¾ÃÐÔ»úÔì £¬ÒÔ±ãÔÚ±»É¾³ýºó³ÁÐÂϰȾָ±ê»úе¡£¹¥»÷Õßͨ¹ýÃûΪcr2.shµÄ¶ñÒâBash½ÅÕý±¾Ï°È¾Web·þÎñÆ÷ £¬¸Ã¹¥»÷»î¶¯µÄ³õʼϰȾ¼¿Á©Î´Öª¡£cr2.sh»áɱËÀÓëÍÚ¿óÓйصĹý³Ì £¬ÀýÈçxmrigºÍcryptonight £¬²¢Í¨¹ýC&CÏÂÔØÍÚ¿ópayload¡£¸Ã¶ñÒâÈí¼þͨ¹ý´´½¨Ã¿·ÖÖÓÔËÐÐÒ»´ÎµÄcron×÷Ò·´»ñµÃÓÆ¾ÃÐÔ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cryptominer-uses-cron-to-reinfect-linux-host-after-removal/

6.¼ÓÄôó½ðÈÚ»ú¹¹Desjardinsй¶Լ290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


DesjardinsÊDZ±ÃÀµØÓò×î´óµÄÐÅÓþÉç £¬Ò²ÊǼÓÄôó×î´óµÄºÏ×÷½ðÈÚ¼¯ÍÅ¡£Æ¾¾Ý¸Ã¹«Ë¾µÄÐÂΟå £¬Ô¼290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢ÔÚÔ±¹¤Î´¾­ÊÚȨÏò¹«Ë¾±í²¿ÈËÔ±Åû¶ºóй¶ £¬ÆäÖÐÔ̺¬270ÍòÃûÓ×ÎÒ»áÔ±ºÍ17.3ÍòÆóÒµ»áÔ±¡£DesjardinsÓÚ2019Äê6ÔÂ14ÈÕ·¢ÏÖй¶ÊÂÎñ £¬Ð¹Â¶µÄÐÅÏ¢Ô̺¬Ó×ÎÒ»áÔ±µÄÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á±£ÏÕºÅÂë¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·ÒÔ¼°ÒøÐкÍDesjardins²úÆ·µÄ¾ßÌåÐÅÏ¢£»ÆóÒµ»áÔ±µÄ¹«Ë¾Ãû³Æ¡¢µØÖ·¡¢µç»°ºÅÂë¡¢ËùÓÐÕßÐÕÃûºÍAcc¨¨sDAffairesÕÊ»§Ãû³ÆÒÔ¼°ÓëAcc¨¨sDAffairesÕÊ»§ÓйصÄһЩÓ×ÎÒÐÅÏ¢¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/desjardins-group-data-leak-exposes-info-of-29-million-members/