΢Èí°ä²¼·ì϶²¹¶¡½¨¸´111¸ö·ì϶£»Thunderbolt´æÔÚ·ì϶ӰÏìÊý°ÙÍòÉ豸

°ä²¼¹¦·ò 2020-05-13

1.΢Èí°ä²¼·ì϶²¹¶¡£¬½¨¸´12¿î²úÆ·ÖÐ111¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


5ÔÂ12ÈÕ£¬Î¢Èí°ä²¼ÁË5Ô·ݷì϶²¹¶¡£¬½¨¸´ÁËEdge¡¢Windows¡¢Visual StudioÒÔ¼°.NET FrameworkϵÄ12¿î²úÆ·ÖеÄ111¸ö·ì϶ ¡£Õâ´Î½¨¸´µÄ½ÏΪÑϳÁµÄ·ì϶ΪMicrosoft SharePointÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2020-1023¡¢CVE-2020-1024ºÍCVE-2020-1102£©¡¢Windows OSÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2020-1067£©¡¢MSHTMLÒýÇæÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2020-1064£©¡¢Microsoft Edge PDFÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2020-109£©ºÍJetÊý¾Ý¿âÒýÇæÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2020-1051£¬CVE-2020-1174£¬CVE-2020-1175ºÍCVE-2020-1176£© ¡£±¾Ô°䲼µÄÊÇ΢Èíº¹ÇàÉϵÚÈý´óµÄ²¹¶¡·¨Ê½£¬Áí±íÁ½´Î±ðÀëÊÇÔÚ2020Äê3ÔºÍ2020Äê4Ô£¬½¨¸´ÁË115ºÍ113¸öÃýÎó ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-may-2020-patch-tuesday-fixes-111-vulnerabilities/


2.Thunderbolt´æÔÚ·ì϶£¬»ò½«Ó°ÏìÊý°ÙÍòÉ豸


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°£Òò»ôοƼ¼´óѧµÄ×êÑÐÍŶÓÔÚÓ¢ÌØ¶ûµÄThunderbolt¶Ë¿ÚÖз¢ÏÖÁË7¸ö·ì϶£¬²¢·ÂÕÕÁË9ÖÖ¹¥»÷³¡¾°£¬ÓµÓÐÎïÀí½Ó¼ûȨÏ޵Ĺ¥»÷ÕßÄܹ»ÀûÓÃÕâЩ·ì϶½Ó¼ûºÍµÁÈ¡Êý¾Ý ¡£×êÑз¢ÏÖ£¬¹¥»÷Õß½ö±ØÒªÎïÀí½Ó¼ûÆôÓÃÁËThunderboltµÄWindows»òLinuxϵͳ±ãÄܹ»ÊµÏÖ¹¥»÷£¬²¢ÇÒ²»»áÁôÏ»ºÛ¼£Ò²²»±ØÒªÓëÓû§½»»¥ ¡£¼´±ãÓû§ÔÚÍÑÀëʱÒѾ­Ëø¶¨»ò¹ÒÆðÍÆËã»ú£¬²¢ÇÒÆôÓÃÁ˰²È«Æô¶¯ºÍÈ«Å̼ÓÃÜ£¬¸Ã¹¥»÷ÒÀÈ»Äܹ»ÊµÏÖ ¡£¸Ã·ì϶ӰÏìÁË2019Äê֮ǰÔì×÷µÄÊý°ÙÍòWindowsºÍLinuxÉ豸 ¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/endpoint/thunderbolt-vulnerabilities-could-threaten-millions-of-pcs/d/d-id/1337789


3.ATMÔì×÷ÉÌDiebold NixdorfϰȾÀÕË÷²¡¶¾£¬ÏµÍ³ÖжÏ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¶íÖÝATMÔì×÷ÉÌDiebold NixdorfÓÚ4ÔÂ25ÈÕÍíÉÏ·¢ÏÔìä¹«Ë¾ÍøÂçÒì³££¬²¢ÒÉ»óÊÇÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬µ±¼´¶Ï¿ªÁ˸ÃÍøÂçÉϵÄϵͳÒÔ¶ôÔì¶ñÒâÈí¼þµÄ´«²¼ ¡£Diebold°µÊ¾¸Ã´Ë¹¥»÷Ö»ÊÇÓ°ÏìÁËÍøÂçºÍITϵͳ£¬µ«²¢Î´Ó°Ïì¿Í»§»ò¹«¼Ò ¡£Æ¾¾ÝÉî¿Ìµ÷²é£¬¸ÃÀÕË÷²¡¶¾ÎªProLock£¬ÔÚ3Ô·ÝҲϰȾÁËÒÁÀûŵÒÁÖÝÀ­Èø¶ûÏØµÄϵͳ ¡£BleepingComputerµÄLawrence Abrams˵£¬ProLockÒªÇóµÄÊê½ðͨ³£ÔÚ6λÊý£¬´Ó17.5ÍòÃÀÔªµ½66ÍòÃÀÔª²»µÈ ¡£¶øDiebold°µÊ¾Ëü²¢Ã»ÓÐÖ§¸¶Êê½ð£¬²¢ÇÒ²»»á»áÉÌÊê½ð½ð¶î ¡£


Ô­ÎÄÁ´½Ó£º

https://krebsonsecurity.com/2020/05/ransomware-hit-atm-giant-diebold-nixdorf/


4.ÃÀ¹ú¹«Ë¾Pitney BowesÔÙÔâÀÕË÷²¡¶¾¹¥»÷£¬ÎªMazeÌáÒé


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹ú¹«Ë¾Pitney BowesÔÚ7¸öÔÂÄÚÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷²¡¶¾¹¥»÷£¬Õâ´Î¹¥»÷ΪMazeÍÅ»ïÌáÒé ¡£MazeÍÅ»ïÔÚÍøÉϰ䲼ÁË11ÕŸù«Ë¾ÍÆËã»úÍøÂçÄÚ²¿Ä¿Â¼ÁбíµÄ½ØÍ¼£¬ÒÔÖ¤Ã÷ËûÃǹ¥»÷³É¹¦ ¡£Pitney Bowes½²»°È˰µÊ¾Ä¿Ç°ÔÚµ÷²éÕâ´Î¹¥»÷µÄÁìÓò£¬³ö¸ñÊDZ»µÁÊý¾ÝÀàÐÍ ¡£2019Äê10ÔÂPitney Bowes³õ´ÎÔâµ½RyukÍÅ»ïÌáÒéµÄÀÕË÷²¡¶¾¹¥»÷£¬¸ÃÊÂÎñµ¼ÖÂijЩ°ü¹ü¸ú×ÙϵͳÍ£»ú ¡£RyukºÍMazeÍŻﶼÊÇÀûÓÃÀÕË÷Èí¼þ¹¥»÷£¬µ«·ÖÆçµÄÊÇMaze»¹ÓÐÒ»¸öÍøÕ¾£¬²¢»áÔÚÊܺ¦Õ߾ܸ¶Êê½ðºóÔÚ¸ÃÍøÕ¾Ð¹Â¶Æä±»µÁÊý¾Ý ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/package-delivery-giant-pitney-bowes-confirms-second-ransomware-attack-in-7-months/


5.ºÚ¿ÍÂÛ̳WeLeakData.comÊý¾Ý¿â±»µÁ£¬ÂÛ̳ÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÚ¿ÍÂÛ̳WeLeakData.comµÄÊý¾Ý¿â±»µÁÇÒ±»·ÅÔÚ°µÍøÏúÊÛ£¬Ê¹¸ÃÍøÕ¾ºÚ¿ÍµÄÐÅÏ¢ºÍ°µÀï¶Ô»°Ð¹Â¶ ¡£Æ¾¾ÝÍøÂçµý±¨¹«Ë¾Cyble°ä²¼µÄ»ã±¨£¬WeLeakData.comµÄvBulletinÂÛ̳Êý¾Ý¿âй¶ÊÇÔÚ2020Äê1ÔÂ9ÈÕÆðÍ·µÄ£¬ÏÖÒÑÔÚ°µÍøÊг¡ÉÏÏúÊÛ ¡£Ð¹Â¶Êý¾ÝÔ̺¬Óû§µÇ¼Ãû¡¢µç×ÓÓʼþµØÖ·¡¢¹þÏ£ÃÜÂëÒÔ¼°ËûÃǵÄIPµØÖ·ÒÔ¼°¸öÈËÐÂÎÅ ¡£¶ÔÓÚ¸ÃÍøÕ¾Óû§À´ËµÕâ´ÎÊÂÎñÖÁ¹Ø³ÁÒª£¬ÓÉÓÚ·¨Âɲ¿ÃÅÄܹ»Ê¹ÓÃй©µÄIPµØÖ·ºÍµç×ÓÓʼþµØÖ·À´×·×ÙËûÃDz¢½«ÆäÓëÆäËû¹¥»÷ÓйØÁª ¡£Õâ´Îй¶»¹Äܹ»ÈÃ×êÑÐÈËÔ±ÏàʶÈôºÎ½øÐй¥»÷ ¡£CybleĿǰÒѽ«Ð¹Â¶Êý¾ÝÔö³¤µ½ÆäÊý¾Ýй¶²éÕÒ·þÎñamibreached.comÖУ¬ÒÔ±ãÓû§Äܹ»²é³­ÆäÐÅÏ¢ÊÇ·ñй© ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-private-chats-leaked-in-stolen-weleakdata-database/


6.ÒøÐÐľÂíSphinx»Ø¹éÉý¼¶£¬ÒÔCOVID-19ΪÖ÷ÌâÕë¶ÔÃÀ¹ú


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÒøÐÐľÂíSphinxÉý¼¶²¢»Ø¹é£¬Ê¹ÓÃCOVID-19À¬»øÓʼþ×÷Ϊµö¶üÕë¶ÔÃÀ¹úÓû§£¬Ö¼ÔÚ´ÓÆäÔÚÏßÒøÐлỰÖлñÈ¡Óû§Æ¾Ö¤ºÍÆäËûÓ×ÎÒÐÅÏ¢ ¡£Ð°汾µÄSphinxµÄÅ¤×ªÖØÒªÔÚ¶ñÒâ´úÂë×¢È뷽ʽºÍBotÅäÖÃÁ½·½Ãæ ¡£Sphinxͨ¹ýŲÓÃä¯ÀÀÆ÷º¯ÊýÖ²Èë´úÂ룬Ê×ÏÈËüŲÓÃCreateProcessAº¯ÊýÀ´´´½¨Ò»¸öйý³Ì¼°ÆäÖ÷Ị̈߳¬¶øºóŲÓÃWriteProcessMemoryº¯ÊýÒÔ½«ÓÐЧ¸ºÔØ×¢Èëmsiexec.exe¹ý³Ì£¬×îºóʹÓÃGetThreadContextºÍSetThreadContextº¯Êý½«Ö¸±ê¹ý³ÌµÄÖ´Ðеã¸ü¸ÄΪ´Ó×¢ÈëµÄÓÐЧ¸ºÔØ ¡£¶øBotÅäÖÃÖиü¸ÄÁËC2µØÖ·ºÍRC4ÃÜÔ¿£¬Ñ¡È¡Ö¸ÎƼø±ðÒÔ±ãËæÊ±ÏòÆäÍÆË͸üР¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/sphinx-riddle-us-targets-modifications/155621/