CISA°ä²¼2019²ÆÄê·çÏÕ·ì϶ÆÀ¹ÀµÄÐÅϢͼ£»QNAP½¨¸´HelpdeskÖеķì϶£¬¿Éµ¼ÖÂNASÉ豸ÊÕÊÜ
°ä²¼¹¦·ò 2020-10-09
ÍøÂ簲ȫºÍÐÅÏ¢°²È«»ú¹¹(CISA)°ä²¼ÁË2019²ÆÄê½øÐеÄ44Ïî·çÏպͷì϶ÆÀ¹À£¨RVA£©£¬ÒÔ¼°MITERÆ¥µÐÕ½Êõ¡¢¼¼ÊõºÍѧÎÊ£¨ATT£¦CK£©¿ò¼ÜµÄ·ÖÎöÐÅϢͼ¡£¸ÃÐÅϢͼ±íÈ·¶¨ÁËCISAÔÚ¿ç¶à¸ö²¿ÃŵÄRVAsÆÚ¼ä¹Û²ìµ½µÄͨÀý³É¹¦¹¥»÷õè¾¶£¬ÍøÂç¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩ¹¥»÷õè¾¶À´¹¥»÷×éÖ¯¡£CISA¼¤ÀøÍøÂçÖÎÀíÔ±ºÍITרҵÈËÔ±²é¿´ÐÅϢͼ²¢ÀûÓÃÍÆ¼öµÄ·ÀÓùÕ½Êõ£¬ÒÔÔ¤·ÀÊܵ½ÒÑÖªÕ½ÊõºÍ¼¼ÊõµÄ¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/10/07/cisa-releases-fy2019-risk-vulnerability-assessment-infographic
2.°²È«¹«Ë¾Arctic Wolf°ä²¼°²È«ÔËÓªÄê¶È»ã±¨

°²È«¹«Ë¾Arctic Wolf°ä²¼ÁËÒ»·Ý°²È«ÔËÓªÄê¶È»ã±¨¡£»ã±¨ÏÔʾ£¬×Ô3ÔÂÒÔÀ´£¬°µÍøÉϹ«¿ªµÄ¹«Ë¾Í´´¦ÊýÁ¿Ôö³¤ÁË429£¥¡£Ôڹ۲쵽µÄ¸ß·çÏÕ°²È«ÊÂÎñÖУ¬ÓÐ35£¥²úÉúÔÚ8:00 PMºÍ8:00 AMÖ®¼ä£¬¶ø14£¥²úÉúÔÚÖÜÄ©£¬ÕâÊǺܶàÄÚ²¿°²È«ÍŶӲ»ÔÚÏߵŦ·ò¡£´Ë±í£¬ÍøÂç´¹µöºÍÀÕË÷Èí¼þ¹¥»÷´ÎÊýÔö³¤ÁË64£¥£¬ºÚ¿Í¸ü¶àµÄÒÔCOVID-19Ö÷ÌâΪµö¶ü£¬À´Õë¶ÔÔ¶³Ì¹¤×÷Õß¡£
ÔÎÄÁ´½Ó£º
https://arcticwolf.com/resources/analyst-reports/security-operations-annual-report
3.Google°ä²¼µÄChrome°²È«¸üн¨¸´¶à¸ö·ì϶

Google°ä²¼µÄChrome°²È«¸üÐÂÕë¶ÔWindows¡¢MacºÍLinux°æ±¾½¨¸´ÁË35¸ö·ì϶¡£ÆäÖнÏΪÑϳÁµÄ·ì϶Ϊ֧¸¶ÖеĿªÊͺóʹÓ÷ì϶£¨CVE-2020-15967£©£¬Æä´ÎΪBlink¡¢WebRTC¡¢NFC¡¢´òÓ¡¡¢ÒôƵ¡¢×Ô¶¯Ìî³äºÍÃÜÂëÖÎÀíÆ÷ÖеĿªÊͺóʹÓ÷ì϶£¨CVE-2020-15968¡¢CVE-2020-15969¡¢CVE-2020-15970¡¢CVE-2020-15971¡¢CVE-2020-15972¡¢CVE-2020-15990ºÍCVE-2020-15991£©¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/10/07/google-releases-security-updates-chrome
4.QNAP½¨¸´HelpdeskÖеķì϶£¬¿Éµ¼ÖÂNASÉ豸ÊÕÊÜ

QNAP½¨¸´ÁËHelpdeskÀûÓÃÖеÄÁ½¸ö½ÏΪÑϳÁµÄ·ì϶£¬ÕâЩ·ì϶¿É±»¹¥»÷ÕßÀûÓÃÊÕÊÜQNAPÍøÂçÏνӴ洢£¨NAS£©É豸¡£Õâ´Î½¨¸´Á½¸ö·ì϶¾ùΪ²»Êʵ±µÄ½Ó¼û½ÚÔì·ì϶£¬±»¸ú×ÙΪCVE-2020-2506ºÍCVE-2020-2507£¬¹¥»÷Õ߳ɹ¦ÀûÓúó¿É»ñµÃ¶ÔQNAPÉ豸µÄ½ÚÔì¡£QNAP°µÊ¾£¬ÆäÒѽ¨¸´ÁËHelpdesk 3.0.3¼°¸ü¸ß°æ±¾µÄ·ì϶£¬Ë¼¿¼µ½·ì϶µÄÑϳÁˮƽ£¬Óû§Ó¦¸Ã¾¡¿ì½«¸ÃÀûÓ÷¨Ê½Éý¼¶µ½×îа汾¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/qnap-fixes-critical-flaws-that-could-lead-to-device-takeover/
5.ºÚ¿ÍÒÔÌØÀÊÆÕ½¡È«ÐÅϢΪµö¶ü½øÐд¹µö¹¥»÷

ÍøÂ簲ȫ¹«Ë¾ProofPointµÄ×êÑÐÈËÔ±·¢ÏÖ£¬ºÚ¿ÍÒÔÌØÀÊÆÕ½¡È«ÐÅϢΪµö¶üÌáÒéеÄÍøÂç´¹µö»î¶¯¡£ºÚ¿Í»Ñ³ÆËûÃÇÓÐÌØÀÊÆÕ½¡È«Çé¿öµÄ×îÐÂÄÚ²¿ÐÅÏ¢£¬µ«ÒªÇóÓû§Ê¹ÓÃǶÈëʽÁ´½ÓÏÂÔØÎĵµ¡£Êܺ¦È˵ã»÷Á´½Óºó£¬»á±»³Á¶¨Ïòµ½Ò»¸öGoogleÎĵµ£¬²¢Åú×¢¸ÃÎĵµÒÑͨ¹ýGoogleɨÃè²¢ÇÒÊǰ²È«µÄ¡£Óû§Æ¾¾ÝÌáÐѵã»÷ÏÂÔØÁ´½Óºó£¬½«ÏÂÔØBazarLoader¿ÉÖ´ÐÐÎļþ¡£×îÖÕ£¬¹¥»÷Õß»áÔÚÊÜϰȾϵͳÖÐ×°ÖÃRyukÀÕË÷Èí¼þ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-emails-lure-victims-with-inside-info-on-trumps-health/
6.ºÚ¿Í¿ÉÀûÓÃComcastµçÊÓÒ£¿ØÆ÷ÇÔÌýÓû§¶Ô»°

GuardicoreµÄ×êÑÐÈËÔ±¶ÔComcastµÄXR11 Xfinity Voice Remote½øÐÐÁË·ÖÎö£¬·¢ÏÖÁËÒ»ÖÖÎÞÐèÎïÀí½Ó¼û»òÓû§½»»¥¼´¿É½«Æäת±äΪ¼àÌýÉ豸µÄ²½Ö裬±»³ÆÎªWarezThe Remote¹¥»÷¡£×êÑÐÈËÔ±°µÊ¾£¬ÕƹܼÓÃÜͨѶµÄRF4CE£¨Ïû·Ñµç×ÓÉ䯵£©ºÍ̸µÄÖ´ÐдæÔÚ·ì϶¡£Æäͨ¹ý¶ÔÒ£¿ØÆ÷µÄ¹Ì¼þ½øÐÐÄæÏò¹¤³ÌÕÒµ½ÁËÓïÒô¼Ôì°´Å¥µÄ´úÂ룬ÔÚÅú¸Ä´úÂëºó»áÿ·ÖÖÓÌáÒéÒ»´Î¹àÒôÒªÇ󣬲¢»áÔÚÔ޳ɺó¼Ôì10·ÖÖÓ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/comcast-cable-remotes-hacked-to-snoop-on-conversations/


¾©¹«Íø°²±¸11010802024551ºÅ