Sophos·¢ÏÖLockBitʹÓÃ×Ô¶¯¹¥»÷¹¤¾ß¼ø±ð¿ÉÒÉÖ¸±ê£»DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡µÐÔÖÊý¾Ý
°ä²¼¹¦·ò 2020-10-231.Sophos·¢ÏÖLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´¼ø±ð¿ÉÒÉÖ¸±ê

Sophos°ä²¼»ã±¨£¬³ÆLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´¼ø±ð¿ÉÒÉÖ¸±ê¡£×êÑÐÈËԱͨ¹ý¶ÈÎöÒ»Äêǰ³öÏÖµÄÑù±¾£¬·¢ÏÖLockBitÒѾѸ¿ì³ÉÊ죬²¢Ñ¡È¡ÁËһЩеIJ½ÖèÀ´ÈƹýWindowsÓû§ÕÊ»§½ÚÔ죨UAC£©À´ÌáÉýÌØÈ¨¡£´Ë±í£¬LockBit¿ÉʹÓÃPowerShellºÍWindowsµÄVBscriptÖ÷»úµÄ³Á¶¨Ãû¸±±¾ÒÔ¼°»ùÓÚPowerShellÉøÈë²âÊÔ¹¤¾ßµÄ¾ç±¾£¬À´ËÑË÷Ô̺¬ÓмÛÖµÊý¾ÝµÄϵͳ£¬ÒÔ¹¥»÷Ó×ÐÍ×éÖ¯¡£
ÔÎÄÁ´½Ó£º
https://news.sophos.com/en-us/2020/10/21/lockbit-attackers-uses-automated-attack-tools-to-identify-tasty-targets/
2.ÃÀ¹ú³ÆÒÁÀʺڿͼÙÒâProud BoysÏòÑ¡Ãñ·¢ËÍ¿ÖÏÅÓʼþ

ÃÀ¹úµ±¾Ö³ÆÒÁÀʺڿͼÙÒ⼫ÓÒÒí×éÖ¯Proud Boys£¬¸øÃñÖ÷µ³Ñ¡Ãñ·¢ËÍ¿ÖÏÅÓʼþ¡£ÕâЩµç×ÓÓʼþÒÔ¡°Í¶Æ±¸øÌØÀÊÆÕ»òÆäËûÈË¡±ÎªÖ÷Ì⣬²¢ÖÒ¸æÃñÖ÷µ³Ñ¡Ãñ±ØÐ뽫Õþµ³¸ÄΪ¹²ºÍµ³²¢Í¶Æ±¸øÌØÀÊÆÕ×Üͳ£¬²»È»Proud Boys½«²»»á·Å¹ýËûÃÇ¡£ÓʼþÖеÄÊÕ¼þÈËÐÕÃûºÍµØÖ·°µÊ¾ÕâЩÐÅÏ¢ÊǺڿÍͨ¹ý¹¥»÷Ñ¡Ãñ×¢²áÍøÕ¾»ñµÃµÄ¡£¶øÃÀ¹úµ±¾Ö³ÆÒÁÀʺͶíÂÞ˹ÒѾ»ñµÃÁËÑ¡ÃñµÇ¼ÇÐÅÏ¢£¬²¢ÇÒÒÁÀÊÔÚʹÓøÃÐÅÏ¢·¢ËÍÕâЩÍþвÓʼþ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/government/us-govt-iran-behind-fake-proud-boys-voter-intimidation-emails/
3.ºÚ¿Í¼ÙÒâÓ¢¹úM£¦SµÄCEOÆÈ¡Óû§ÒøÐÐÕÊ»§¾ßÌåÐÅÏ¢

ºÚ¿Í¼ÙÒâÓ¢¹ú´óÐÍ¿ç¹úÁãÊÛÉÌMarks£¦SpencerµÄCEOÆÈ¡Óû§ÒøÐÐÕÊ»§¾ßÌåÐÅÏ¢¡£ºÚ¿ÍÊ×ÏÈÔÚÍøÉϰ䲼ڲÆÐÔ¸æ°×£¬²¢Ðû´«Êܺ¦Õßͨ¹ýÐé¹¹³é½±½«ÓлúÓö»ñµÃÀñÎïȯ¡£µ±Êܺ¦Õßµã»÷¸æ°×ÖеÄÁ´½Óʱ£¬»á±»³Á¶¨Ïòµ½M£¦SµÄÃÅ»§ÍøÕ¾£¬²¢ÒªÇóÌṩÆäÐÕÃû¡¢µØÖ·¡¢ÊÖ»úºÅÂëÒÔ¼°ÒøÐоßÌåÐÅÏ¢£¬Ô̺¬SORT´úÂëºÍÕʺŵȡ£Ò»µ©Óû§ÊäÈëÐÅÏ¢ºó£¬ÆäÐÅÏ¢±ã»á±»ºÚ¿ÍÇÔÈ¡¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ms-boss-spoofed-in-gift-voucher/
4.DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡ÃÀ¹úµÐÔÖÊý¾Ý

ÃÀ¹úºÓɽ°²È«Êý£¨DHS£©ÍøÂ簲ȫ¡¢»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ºÍÁª¹úµ÷²é¾Ö£¨FBI£©ÖҸ棬¶íÂÞ˹APT×éÖ¯Energetic BearÈëÇÖ²¢ÇÔÈ¡ÁËÃÀ¹úµ±¾ÖÍøÂçµÄÊý¾Ý¡£ÕâЩ»ú¹¹°µÊ¾£¬¶íÂÞ˹APT×éÖ¯ÒѶÔ×¼ÊýÊ®¸öSLTTµ±¾ÖºÍº½¿ÕÍøÂ磬²¢³É¹¦·ÛËéÁËÍøÂç»ù´¡ÉèÊ©¡£½ØÖÁ2020Äê10ÔÂ1ÈÕ£¬ÆäÖÁÉÙ´ÓÁ½¸ö·þÎñÆ÷ÖÐÇÔÈ¡ÁËÊý¾Ý¡£Ð¹Â¶µÄÃô¸ÐÊý¾ÝÔ̺¬ÍøÂçÅäÖúÍÃÜÂë¡¢³ß¶È²Ù×÷·¨Ê½£¨SOP£©£¨ÀýÈç×¢²á¶à³É·ÖÉí·ÝÑéÖ¤£©¡¢ITÖ¸ÁÀýÈçÒªÇóÃÜÂë³ÁÖã©¡¢¹©¸øÉ̺ͲɰìÐÅÏ¢¡¢´òÓ¡½Ó¼ûÁîÅÆµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/russian-state-hackers-stole-data-from-us-government-networks/
5.Mozilla°ä²¼¸üУ¬½¨¸´FirefoxÖеĶà¸ö·ì϶

Mozill½¨¸´ÁËFirefoxÖеĶà¸ö·ì϶£¬ÆäÖÐ×îÑϳÁµÄ·ì϶¿ÉÄÜÔÊÐíËÁÒâ´úÂëÖ´ÐС£Õâ´Î½¨¸´µÄ·ì϶Ô̺¬usersctp¿âÖеĿªÊͺóʹÓ÷ì϶£¨CVE-2020-15969£©¡¢ÄÚ´æ·ÖÅäÎÊÌ⣨CVE-2020-15254£©¡¢Í¼Ïñ±êÇ©Öзì϶£¨CVE-2020-15680£©¡¢WASMÏß³ÌÖзì϶£¨CVE-2020-15681£©¡¢¿Éµ¼ÖºýŪÐÔ¹¥»÷µÄ·ì϶£¨CVE-2020-15682£©ºÍÄڴ氲ȫÃýÎó£¨CVE-2020-15683ºÍCVE-2020-15684£©¡£
ÔÎÄÁ´½Ó£º
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-mozilla-firefox-could-allow-for-arbitrary-code-execution_2020-146/
6.Cisco°ä²¼°²È«¸üУ¬½¨¸´Æä¶à¿î²úÆ·Öеķì϶

2020Äê10ÔÂ21ÈÕ£¬Cisco°ä²¼°²È«²¼¸æ£¬Åû¶Æä¶à¸ö²úÆ·ÖдæÔÚµÄ36¸ö°²È«·ì϶¡£ÆäÖнÏΪÑϳÁµÄ·ì϶ΪCisco FXOS FCM¿çÕ¾ÒªÇóαÔì·ì϶£¨CVE-2020-3456£©£¬ÓÉÓÚFCM½Ó¿ÚµÄCSRF±£»¤²»¼°µ¼Ö£¬³É¹¦ÀûÓô˷ì϶¿É·¢ËÍËÁÒâÒªÇó£»Cisco FMC»Ø¾ø·þÎñ·ì϶£¨CVE-2020-3499£©£¬ÓÉÓÚϵͳ¶Ô×ÊÔ´ÖµµÄ´¦Öò»µ±µ¼Ö£¬¿ÉÀûÓô˷ì϶Ôì³É»Ø¾ø·þÎñ£¨DoS£©£»Cisco FTD TCP Flood»Ø¾ø·þÎñ·ì϶£¨CVE-2020-3563£©£¬ÓÉÓÚÄÚ´æÖÎÀíЧÄܵÍÏÂÔì³É£¬¿Éµ¼Ö»ؾø·þÎñ£¨DoS£©¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/cisco-dos-flaws-network-security-software/160414/


¾©¹«Íø°²±¸11010802024551ºÅ