CISAºÍCNMF°ä²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄ·ÖÎö»ã±¨£»Î¢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35³É¹¦ÈëÇÖ¶à¸ö³ÛÃûÈËÊ¿ÓÊÏä
°ä²¼¹¦·ò 2020-10-301.CISAºÍCNMF°ä²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄ·ÖÎö»ã±¨

ÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ºÍ¹ú·À²¿£¨DOD£©ÍøÂç¹ú¶ÈÐû½Ì¶ÓÁУ¨CNMF£©·¢ÏÖеĶñÒâÈí¼þ±äÌåZebrocy¡£¸Ã±äÌåÊÇÒ»¸ö32λµÄWindows¿ÉÖ´ÐÐÎļþ£¬Ê¹ÓÃGolang±à³Ì˵»°±àд£¬Ñ¡È¡µÄ²ÎÊýӦΪÒì»ò£¨XOR£©ºÍÊ®Áù½øÔì±àÂëµÄͳһ×ÊÔ´±êʶ·û£¨URI£©£¬»òÕßÄܹ»Ê¹Óô¿Îı¾URIÔËÐС£Ö´ÐÐʱ£¬Ëü½«Ê¹Óø߼¶¼ÓÃܳ߶ȣ¨AES£©-128µç×ÓÃÜÂë²¾£¨ECB£©Ëã·¨¶ÔURI½øÐмÓÃÜ£¬²¢Ê¹ÓôÓÊܺ¦ÕßµÄÖ÷»úÃûÌìÉúµÄÃÜÔ¿£¬´Ë±í»¹»áÍøÂçÓйØÊÜÖ¸±êϵͳµÄÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/cisa-and-cnmf-identify-new-malware-variant-zebrocy
2.Netscout·¢ÏÖTrickBotʹÓÃбäÌåÖØÒªÕë¶ÔLinuxϵͳ

°²È«¹«Ë¾Netscout·¢ÏÖTrickBotʹÓÃбäÌåÖØÒªÕë¶ÔLinuxϵͳ¡£ÔÚ΢ÈíDefenderÍŶӽáºÏ¶à¼Ò°²È«¹«Ë¾²ð³ýÁËTrickBot´ó²¿ÃÅ·þÎñÆ÷ºó£¬ÆäÆðͷʹÓöñÒâÈí¼þµÄбäÖÖ£¬ÒÔ³¢ÊÔ½«ÆäÓÃÓÚLinuxϵͳ¡£×êÑÐÈËÔ±Waylon GrangeÓÚ7Ô³õ´Î·¢ÏÖÁËAnchor_DNSµÄÐÂLinux±äÖÖ£¬²¢½«Æä³ÆÎªAnchor_Linux¡£ÕâÊÇÒ»¸öÇáÁ¿¼¶µÄLinuxºóÃÅ£¬Ö´Ðкó£¬Ëü½«×Ô¼º×°ÖÃΪcron£¬È·¶¨Ö÷»úµÄ¹«¹²IPµØÖ·£¬¶øºóÆðͷͨ¹ýDNS²éÎÊÖ¸ÏòËüµÄC2·þÎñÆ÷¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110092/cyber-crime/trickbot-linux-variant.html
3.΢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35³É¹¦ÈëÇÖ¶à¸ö³ÛÃûÈËÊ¿ÓÊÏä

MicrosoftµÄÍþвµý±¨ÖÐÐÄ£¨MSTIC£©Åû¶£¬ºÚ¿Í×éÖ¯APT35³É¹¦ÈëÇֲμӽñÄêĽÄáºÚ°²È«»áÒéºÍThink 20£¨T20£©·å»áµÄ¶à¸ö³ÛÃûÈËÊ¿µÄµç×ÓÓʼþÕÊ»§¡£Õâ´ÎÊÂÎñµÄÊܺ¦ÕßÔ̺¬Îª¹ú¶ÈÖ¸¶¨È«ÇòÒé³ÌºÍ±í½»Õþ²ßµÄǰ´óʹºÍÆäËû¸ß¼¶Õþ²ßר¼Ò¡£Æ¾¾ÝMSTICµÄ·ÖÎö£¬Õâ´Î¹¥»÷ÎªÍøÂç¼äµý»î¶¯£¬Ö¼ÔÚͨ¹ýÇÔÈ¡Êܺ¦ÕßµÄÓÊÏäÄÚÈݺÍÁªÏµ·½Ê½À´ÍøÂçµý±¨£¬²¢°µÊ¾¸Ã»î¶¯ÓëÃÀ¹ú´óÑ¡²¢ÎÞ¹ØÏµ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-iranian-attackers-hacked-security-conference-attendees/
4.ºÚ¿Í¿ÉÀûÓÃH?rmannÍø¹ØÉ豸Öзì϶Զ³Ì½ÚÔì³µ¿âÃÅ

SEC Consult×êÑÐÈËÔ±·¢ÏÖ£¬ºÚ¿Í¿ÉÀûÓÃH?rmannÍø¹ØÉ豸Öзì϶Զ³Ì½ÚÔì³µ¿âÃÅ¡£H?rmannÊÇÒ»¼ÒµÂ¹ú¹«Ë¾£¬×¨ÃÅ´ÓʼÒÓú͹¤ÒµÃÅ£¬ÊÇÊÀ½çµÚËÄ´óÃÅÀàÔì×÷ÉÌ¡£°²È«¹«Ë¾·¢ÏÖ¸ÃÍø¹ØÉ豸¹²ÓÐ15¸ö·ì϶£¬Ô̺¬Óë¼ÓÃÜÓйصÄÎÊÌ⡢ͨѶ±£»¤²»Á¦ÒÔ¼°ÓйصÄÒÆ¶¯ÀûÓÃÖзì϶¡£ÕâЩ·ì϶¿É±»ÓÃÀ´½øÐÐÁ½ÖÖ¹¥»÷£¬Ò»ÖÖÊDZØÒª½Ó¼û±¾µØÍøÂçµÄ¹¥»÷£¬ÁíÒ»ÖÖÊÇ´Ó»¥ÁªÍøÔ¶³ÌÌáÒéµÄ¹¥»÷¡£Ïνӵ½±¾µØÍøÂçµÄ¹¥»÷ÕßÄܹ»Í¨¹ýÊÖ»úÖ´ÐÐÒ»¸öÓ׾籾´ò¿ªH?rmannÃÅ£¬¶øÎÞ±ØÒªÉí·ÝÑéÖ¤¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/hackers-can-open-doors-exploiting-vulnerabilities-h%C3%B6rmann-device
5.FireEye³Æ¶«Å·ÍÅ»ïUNC1878ÀûÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº

ÍøÂ簲ȫ¹«Ë¾FireEye³Æ¶«Å·ÍÅ»ïUNC1878ÀûÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº¡£FireEye¸±×ܲÃCharles Carmakal°µÊ¾¸Ã×éÖ¯¶ÔÃÀ¹ú¶à¼ÒÒ½Ôº½øÐÐÁËÀÕË÷Èí¼þ¹¥»÷£¬ÕâÊÇÒ½ÁÆÐÐÒµÔÚÒßÇéÆÚ¼äÔâµ½µÄ×î¾ß·ÛËéÐÔµÄÍøÂç»î¶¯¡£ÆäÖÐÔ̺¬±¾ÖܶԶíÀÕ¸ÔÖݵÄSky Lakes Medical CenterµÄ¹¥»÷£¬¶ÔŦԼÖÝÒ½ÔºµÄITÍøÂç¹¥»÷ÆÈʹCanton-Potsdam¡¢MassenaºÍGouverneurÒ½Ôº¸´ÔʹÓñ¸·Ý·¨Ê½¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/ransomware-hospitals-ryuk-fireeye/
6.ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öºÅÁî×¢Èë·ì϶

ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öºÅÁî×¢Èë·ì϶£¨CVE-2020-2490ºÍCVE-2020-2492£©¡£QTSÊÇÍøÂ總¼Ó´æ´¢É豸µÄ²Ù×÷ϵͳ£¬ÀûÓø÷ì϶¿ÉÔÊÐíËÁÒâºÅÁîÖ´ÐС£NASÉ豸¹©¸øÉÌδÌṩÓйØÕâÁ½¸öÎÊÌâµÄÌ«¶à¾ßÌåÐÅÏ¢£¬µ«°µÊ¾×îа汾µÄQTSÔ̺¬±ØÐëµÄ²¹¶¡·¨Ê½£¬Óû§Ö»Óн«QTS²Ù×÷ϵͳ¸üе½°æ±¾QTS 4.4.3.1421 build 20200907¾Í²»Óò»°²¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/qnap-warns-of-new-qts-bugs-that-allow-take-over-of-devices/


¾©¹«Íø°²±¸11010802024551ºÅ