ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ46ÖÜ
°ä²¼¹¦·ò 2020-11-16> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2020Äê11ÔÂ09ÈÕÖÁ11ÔÂ15ÈÕ¹²ÊÕ¼°²È«·ì϶50¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇSAP solution manager Outside DiscoveryÅäÖ÷þÎñδÊÚȨ½Ó¼û·ì϶£»Apache Airflow APIδÊÚȨ½Ó¼û·ì϶£»Microsoft EdgeÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶£»Microsoft Exchange Server CVE-2020-17083ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶£»A10 Networks ACOSÔ¶³Ì´úÂëÖ´Ðзì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ¿¨°Í˹»ù°ä²¼Linux°æ±¾RansomExxµÄ·ÖÎö»ã±¨£»ESET°ä²¼Cyberchology:±¨´ð³É·ÖµÄ·ÖÎö»ã±¨£»±Ê¼Ç±¾Ôì×÷ÉÌÈʱ¦Ï°È¾DoppelPaymer£¬±»ÀÕË÷1700ÍòÃÀÔª£»Î¢Èí°ä²¼Î¢Âë¸üУ¬½¨¸´Intel CPUÖвàÐÅ··ì϶£»ºÚ¿ÍÔÚGitHub´æ´¢¿âÖй«¿ªCobalt StrikeÔ´´úÂë¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
> ³ÁÒª°²È«·ì϶Áбí
1.SAP solution manager Outside DiscoveryÅäÖ÷þÎñδÊÚȨ½Ó¼û·ì϶
SAP Solution Manager Outside DiscoveryÅäÖ÷þÎñ´æÔÚ°²È«Èƹý·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÈÆ¹ýÏÞ¶È£¬Î´ÊÚȨ½Ó¼û·þÎñ¡£
https://launchpad.support.sap.com/#/notes/2985866
2.Apache Airflow APIδÊÚȨ½Ó¼û·ì϶
Apache Airflow´æÔÚĬÈÏÅäÖ÷ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÎÞÐèÑéÖ¤½Ó¼ûAPI¡£
https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E
3.Microsoft EdgeÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶
Microsoft Edge´æÔÚÄÚ´æ·ÛËé·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17058
4.Microsoft Exchange Server CVE-2020-17083ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶
Microsoft Exchange Server´æÔÚÄÚ´æ·ÛËé·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17083
5.A10 Networks ACOSÔ¶³Ì´úÂëÖ´Ðзì϶
A10 Networks ACOS´æÔÚδÊÚȨ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉδÊÚȨִÐÐËÁÒâ´úÂë¡£
https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384
> ³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢¿¨°Í˹»ù°ä²¼Linux°æ±¾RansomExxµÄ·ÖÎö»ã±¨

¿¨°Í˹»ù°ä²¼Ò»·Ýл㱨½éÉÜÁËLinux°æ±¾µÄRansomExxÀÕË÷Èí¼þ£¬Ò²³ÆÎªDefray777¡£»ã±¨³Æ£¬RansomExxÔÚÕë¶ÔLinux·þÎñÆ÷ʱ£¬»áÏȲ¿ÊðÒ»¸öÃûΪsvc-newµÄELF¿ÉÖ´ÐÐÎļþ£¬ÓÃÓÚ¼ÓÃÜÊܺ¦ÕߵķþÎñÆ÷¡£´Ë±í£¬ÓëWindows°æ±¾·ÖÆç£¬Defray777²»Ô̺¬ÈκÎÓÃÓÚÖÕÖ¹¹ý³ÌµÄ´úÂ루ÀýÈ簲ȫÈí¼þ£©£¬²»»áÏñWindows°æ±¾ÄÇÑù²Á³ý¿ÉÓÿռ䣬Ҳ²»ÄÜÓëºÅÁîºÍ½ÚÔì·þÎñÆ÷ͨѶ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/ransomexx-ransomware-also-encrypts-linux-systems/
2¡¢ESET°ä²¼Cyberchology:±¨´ð³É·ÖµÄ·ÖÎö»ã±¨

ESET°ä²¼ÁËÃûΪCyberchology:±¨´ð³É·ÖµÄ·ÖÎö»ã±¨£¬Ì½ÇóÁËÔ±¹¤ÔÚ×éÖ¯ÍøÂ簲ȫÖеÄ×÷Ó᣷ÖÎö·¢ÏÖ£¬80£¥µÄ¹«Ë¾°µÊ¾ÔÚCOVID-19ÆÚ¼ä±¨´ð³É·Ö´øÀ´µÄ·çÏÕÔö³¤ÁËÊØ»¤ÍøÂ簲ȫµÄÄѶȣ»×ÔCOVID-19ÒÔÀ´£¬ÍøÂç·¸×ïÒÑÔö³¤ÁË63£¥£»±¨´ðÃýÎóÒ»ÏòÊÇCOVID-19ÆÚ¼ä×î´óµÄÍøÂ簲ȫÌôÕ½£»Ö»ÓÐËÄ·ÖÖ®Ò»µÄÆóÒµÒÔΪËûÃǵÄÔ¶³Ì¹¤×÷Õ½ÊõÓÐЧ£»47£¥µÄÈ˲»°²Æä¿¹Ñ¹ÄÜÁ¦¡£
ÔÎÄÁ´½Ó£º
https://cdn1.esetstatic.com/ESET/UK/Collateral/White_Paper_Cyberchology.pdf
3¡¢±Ê¼Ç±¾Ôì×÷ÉÌÈʱ¦Ï°È¾DoppelPaymer£¬±»ÀÕË÷1700ÍòÃÀÔª

±Ê¼Ç±¾Ôì×÷ÉÌÈʱ¦Ôâµ½DoppelPaymerÀÕË÷Èí¼þ¹¥»÷£¬±»ÀÕË÷1700ÍòÃÀÔª¡£Èʱ¦£¨Compal£©ÊÇÈ«ÇòµÚ¶þ´óÔ´´Éè¼Æ(ODM)±Ê¼Ç±¾µçÄÔÔì×÷ÉÌ£¬ÓëÆ»¹û¡¢»ÝÆÕ¡¢´÷¶û¡¢åÚÏëºÍºê³žµÈ³ÛÃû¹«Ë¾ºÏ×÷¡£¸Ã¹«Ë¾°µÊ¾ÆäÖ»Êǰ칫×Ô¶¯»¯ÏµÍ³³öÏÖÒì³££¬²¢Î´Ïñ±í½çËù±¨Â·µÄÄÇÑù±»ºÚ¿ÍÀÕË÷£¬Ä¿Ç°³ö²úÖÐËùÓÐÕý³£¡£µ«¾ÝÐÂÎÅÍøÕ¾BleepingComputer³ÆÆäÒÑ»ñµÃÊê½ð¼Í¼£¬ÆäÖкڿÍÍÅ»ïÒªÇóÖ§¸¶1100±ÈÌØ±Ò£¨16725500ÃÀÔª£©¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/laptop-maker-compal-hit-by-ransomware-17-million-demanded/
4¡¢Î¢Èí°ä²¼Î¢Âë¸üУ¬½¨¸´Intel CPUÖвàÐÅ··ì϶

΢ÈíÒÑÕë¶ÔWindows 10 20H2¡¢2004¡¢1909°ä²¼ÁËIntel΢´úÂë¸üУ¬ÒÔ½¨¸´Intel CPUÖеIJàÐÅ··ì϶Platypus¡£¸Ã·ì϶ÓɸñÀ´Ä¼¼Êõ´óѧ¡¢CISPAº¥Ä·»ô×ÈÐÅÏ¢°²È«ÖÐÐĺͲ®Ã÷º²´óѧµÄ×é³ÉµÄ×êÑÐÍŶÓÅû¶£¬Î»ÓÚÓ¢ÌØ¶ûµÄÔËÐоùÔȹ¦ÂÊÏÞ¶È£¨RAPL£©½çÃæÖС£×êÑÐÈËÔ±Åú×¢£¬¹¥»÷ÕßÄܹ»Ê¹ÓÃRAPL½Ó¿Ú¼à¶½¹¦ºÄ²¢´§¶ÈCPUÔÚÖ´ÐÐÄÄЩָÁ´Ó¶ø´ÓÄÚ´æÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£´Ë±íÕâ´Î¸üл¹½¨¸´ÁËʸÁ¿¼Ä·ÅÆ÷²ÉÑù»î¶¯Öзì϶£¨CVE-2020-8696£©ºÍ¼±¾ç´æ´¢Ç°Õ°Ô¤²âÆ÷Öзì϶£¨CVE-2020-8698£©¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/windows-10-intel-microcode-released-to-fix-new-cpu-security-bugs/
5¡¢ºÚ¿ÍÔÚGitHub´æ´¢¿âÖй«¿ªCobalt StrikeÔ´´úÂë

ºÚ¿ÍÔÚGitHub´æ´¢¿âÖй«¿ªCobalt Strike¹¤¾ß°üµÄÔ´´úÂë¡£Cobalt StrikeÊǺϷ¨µÄÉøÈë²âÊÔ¹¤¾ß°ü£¬¿ÉÔÚÖ¸±êÉ豸Éϲ¿ÊðÐű꣬À´Ô¶³Ì´´½¨Shell²¢Ö´ÐÐPowerShell¾ç±¾¡£Ó¢Ìضû×êÑÐÈËÔ±Éó²éÔ´´úÂëºóÒÔΪJava´úÂëÊÇÊÖ¶¯·´±àÒëµÄ£¬ºÚ¿Í½¨¸´ÁËËùÓÐÒÀÀµ¹ØÏµ²¢É¾³ýÁËÐí¿ÉÖ¤²é³£¬ÒÔ±ã¶ÔÆä½øÐбàÒë¡£×Ô°ä²¼ÒÔÀ´£¬¸Ã´æ´¢¿âÒѱ»forked 172´Î£¬ÕâʹµÃÔ´´úÂëµÄ´«²¼Ô½·¢ÄÑÒÔ½ÚÔì¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike-toolkit-shared-online/


¾©¹«Íø°²±¸11010802024551ºÅ