ÎÒ¹ú¶à¸ö³ÁÒªµ¥Ôª±»¾³±íAPTºÚ¿Í×éÖ¯¹¥Ï £»Ó¡¶ÈºËµçÕ¾KNPPÔâ¶ñÒâÈí¼þDtrack¹¥»÷

°ä²¼¹¦·ò 2019-10-31
1¡¢ÎÒ¹ú¶à¸ö³ÁÒªµ¥Ôª±»¾³±íAPTºÚ¿Í×éÖ¯¹¥ÏÂ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

10ÔÂ30ÈÕÐÂÎÅ £¬Ò»êdzÆÎª@MisterCh0cµÄÍÆÌØÓû§°ä²¼ÐÂÎųÆ £¬·¢ÏÖÁËÒ»¿îľÂí½ÚÔìÆ½Ì¨µÄµÇ¼µØÖ·http://lmhostsvc[.]net/healthne/login.php¡£¶ûºó £¬ÆäËûÍÆÌØÓû§·¢ÌûÆØ¹â¸Ãºó¶ÜÖÁÉټͼÁË12̨±»¿ØÖ÷»úµÄIPµØÖ·¡¢ÍÆËã»úÃû¡¢Óû§Ãû¡¢²Ù×÷ϵͳ¡¢±»¿Ø¹¦·ò¼°×îºóÒ»´ÎÉÏÏß¹¦·òµÈÐÅÏ¢ £¬ÔÚÆØ¹âµÄ±»¿ØÖ÷»úÖÐ £¬ÓÐ9¸öÊôÓÚÖйú¡£¸Ãºó¶ÜËùÓÐÕßÊÇÓ¡¶Èµ±¾Ö²¼¾°µÄAPT×éÖ¯Bitter£¨±ðÃû¡°ÂûÁ黨¡±£© £¬ÕâÊÇÒ»¸ö³Ö¾ÃÕë¶ÔÖйú¡¢°Í»ù˹̹µÈ¹ú¶ÈÈ·µ±¾Ö¡¢¾ü¹¤¡¢µçÁ¦¡¢ºËµÈ²¿ÃÅ·¢ÆðÍøÂç¹¥»÷µÄAPTÍŻÕâ9¸öÊôÓÚÖйúµÄIPµØÖ·ÖØÒªÉæ¼°±±¾©¡¢ÉϺ£¡¢Õã½­¡¢¹ãÎ÷µÈµØ £¬¸Ãƽ̨»¹¾ß±¸Ï·¢Ä¾Âí²å¼þµÄÖ°ÄÜ £¬¿É¶ÔÊÜ¿ØÖ÷»úʩǰ½øÒ»²½²Ù×÷¡£


Ô­ÎÄÁ´½Ó£º

http://tech.ifeng.com/c/7rCKq4uSCJl

2¡¢Ó¡¶ÈºËµçÕ¾KNPPÔâ¶ñÒâÈí¼þDtrack¹¥»÷

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¸Ã¶ñÒâÈí¼þÊÇDtrackµÄÒ»¸ö±äÌå £¬DtrackÊdz¯ÏÊAPT×éÖ¯Lazarus Group¿ª·¢µÄºóÃÅľÂí¡£×î³õKNPP¹ÙÔ±·ñ¶¨ËûÃÇÔâ·êÁËÈκζñÒâÈí¼þϰȾ £¬µ«KNPPµÄĸ¹«Ë¾NPCILÔÚÁíÒ»·ÝÉêÃ÷ÖÐÈÏ¿ÉÁËÕâÒ»ÊÂÎñ £¬NPCIL°µÊ¾¸Ã¶ñÒâÈí¼þ½öϰȾÁËÖÎÀíÍøÂç £¬µ«Î´´ïµ½¹Ø¼üµÄÄÚ²¿ÍøÂç¡£´Óº¹ÇàÉÏ¿´LazarusºÜÉÙ¹¥»÷ÄÜÔ´ºÍ¹¤ÒµÁìÓòµÄÖ¸±ê £¬¼´±ãÓй¥»÷Ò²Ö»ÊÇÊÔͼÇÔȡ֪ʶ²úȨ £¬¶ø²»ÊÇÔì³É·ÛËé¡£KNPPÊÂÎñ¿´ÆðÀ´¸üÏñÊÇÒâ±íϰȾ £¬¶ø²»ÊÇÕë¶ÔÐԵĹ¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/confirmed-north-korean-malware-found-on-indian-nuclear-plants-network/

3¡¢ÐÂÄ«Î÷¸çÖÝLas Cruces¹«Á¢Ñ§ÌÃÔâÀÕË÷Èí¼þ¹¥»÷

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ÃÀ¹úÐÂÄ«Î÷¸çÖÝLas Cruces¹«Á¢Ñ§ÌÃÔâµ½ÀÕË÷Èí¼þ¹¥»÷ £¬¸ÃÑ§Çø±»ÆÈ¹Ø¹ØÕû¸öÍÆËã»úϵͳÒÔ½ÚÔìϰȾ¡£ÓÉÓÚĿǰµç×ÓÓʼþµÈ»ùÓÚÍÆËã»úϵͳµÄͨѶÒѾ­ÖжÏ £¬Òò¶øÓë¸ÃѧÌÃÖ®¼äµÄÐÅÏ¢»¥»»Êܵ½Á˹ÊÕÏ¡£¸ÃÑ§ÇøµÄÎ £»úÏìÓ¦Ó××éÔÚÖÂÁ¦¸´Ô­¹Ø¼ü·þÎñ £¬µ«Éв»Ã÷ÏÔϵͳ½«å´»ú¶à³¤¹¦·ò¡£Ö»¹ÜÊÂÎñºÜÑϳÁ £¬µ«Ñ§ÌÃÈÔδÍ£¿Î £¬Æä»î¶¯ÈÔ×ñÑ­Õý³£µÄ¹¦·ò±í¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ransomware-attack-causes-school-district-wide-shutdown/

4¡¢ÓòÃû·þÎñÉÌNetwork Solutions¿Í»§ÐÅÏ¢ÒÉÔâй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ÓòÃû·þÎñÉÌNetwork Solutions°ä²¼ÉêÃ÷³ÆµÚÈý·½ÔÚ2019Äê8ÔÂÏÂÑ®¶ÔÆä²¿ÃÅÍÆËã»úϵͳ½øÐÐÁËδÊÚȨ½Ó¼û £¬µ¼Ö¿ͻ§µÄPIIÐÅÏ¢¿ÉÄÜй¶¡£¸Ã¹«Ë¾°µÊ¾¹¥»÷Õß¿ÉÄܽӼûµÄ¿Í»§ÐÅÏ¢Ô̺¬ÁªÏµ·½Ê½¡¢ÐÕÃû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·ÒÔ¼°Ìض¨·þÎñµÄÐÅÏ¢ £¬µ«ÓÉÓÚÐÅÓþ¿¨ºÅÊÇÒÔ¼ÓÃÜ´ó¾Ö´æ´¢µÄ £¬Òò¶øÃ»ÓÐÐÅÓþ¿¨Êý¾ÝÔÚ¹¥»÷ÖÐÊܵ½ÇÖº¦¡£Network SolutionsÊÇÈ«ÇòÊ׸öÓòÃû·þÎñÉÌ £¬ÔçÔÚ1992Äê12ÔÂ31Èոù«Ë¾¾ÍÓëÃÀ¹ú¹ú¶È¿ÆÑ§»ù½ð»á£¨NSF£©Ç©¶¨ºÍ̸ÒÔÌṩÓòÃû×¢²á·þÎñ¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/worlds-first-domain-registrar-network-solutions-discloses-breach/

5¡¢Å·ÃËeIDASÆØÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶ £¬¿É¼Ù×°¹«ÃñÉí·Ý

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

SEC Consult×êÑÐÈËÔ±ÔÚÅ·Ã˹ú¶ÈʹÓõÄeIDASϵͳÖз¢ÏÖÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶ £¬¿ÉÓÃÓÚ¼Ù×°¹«ÃñµÄÉí·Ý¡£eIDASÊÇÖ¸µç×ÓÉí·Ý¼ø±ð¡¢Éí·ÝÑéÖ¤ºÍÐÅÀµ·þÎñ £¬ÓÃÓÚ¶ÔÔÚÏßÂòÂôµÄ¹«ÃñºÏ·¨Éí·Ý½øÐÐÑéÖ¤¡£×êÑÐÈËÔ±·¢ÏÖÿ¸ö¹ú¶ÈµÄeIDAS½Úµã¶¼ÓÃSAMLÊ¢¿ª³ß¶È»¥»»ÐÅÏ¢ÒÔ½øÐÐÉí·ÝÑéÖ¤ºÍÊÚȨ £¬µ«Ã»ÓжÔÊðÃûSAMLÐÂÎŵÄÊý×ÖÖ¤Êé½øÐÐÑéÖ¤ £¬Òò¶ø¹¥»÷ÕßÄܹ»Î±ÔìSAMLÏìÓ¦¡£×êÑÐÈËÔ±ÑÝʾÁËÈôºÎʹÓøèµÂµÄÃû×Ö½øÐÐÉí·ÝÑéÖ¤¡£¸Ã·ì϶ÒÑÔÚeIDAS-Node×é¼þµÄ2.3.1°æ±¾Öн¨¸´¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/europes-electronic-id-system-fixed-against-impersonation-risk/

6¡¢MikroTik·ÓÉÆ÷¶à¸ö·ì϶¿ÉÖ½µ¼¶¹¥»÷¼°´´½¨ºóÃÅ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Tenable×êÑÐÈËÔ±ÔÚMikroTik·ÓÉÆ÷Öз¢ÏÖ¶à¸ö·ì϶ £¬½áºÏÕâЩ·ì϶µÄ¹¥»÷Á´ £¬¹¥»÷ÕßÄܹ»ÌáÒé½µ¼¶¹¥»÷²¢´´½¨ºóÃÅ¡£ÕâËĸö·ì϶Ô̺¬´ÓCVE-2019-3976µ½CVE-2019-3979 £¬Æ¾¾Ý·ì϶²¼¸æ £¬Í¨¹ýÁ´½ÓÕâЩ·ì϶ £¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÄܹ»½Ó¼û·ÓÉÆ÷¶Ë¿Ú8291 £¬Ö´ÐÐRouterOS½µ¼¶ £¬³ÁÖÃϵͳÃÜÂë £¬²¢ÓпÉÄÜ»ñµÃroot shell¡£ÕâЩ·ì϶ÒÑÔÚа汾6.45.7Öн¨¸´¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/mikrotik-router-vulnerabilities-can-lead-backdoor-creation