΢ÈíÐû²¼Îó²î²¹¶¡ÐÞ¸´111¸öÎó²î£»£»£»Thunderbolt±£´æÎó²îÓ°ÏìÊý°ÙÍò×°±¸

Ðû²¼Ê±¼ä 2020-05-13

1.΢ÈíÐû²¼Îó²î²¹¶¡£¡£¡£¡£¡£¡£¬£¬£¬£¬ÐÞ¸´12¿î²úÆ·ÖÐ111¸öÎó²î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


5ÔÂ12ÈÕ£¬£¬£¬£¬Î¢ÈíÐû²¼ÁË5Ô·ÝÎó²î²¹¶¡£¡£¡£¡£¡£¡£¬£¬£¬£¬ÐÞ¸´ÁËEdge¡¢Windows¡¢Visual StudioÒÔ¼°.NET FrameworkϵÄ12¿î²úÆ·ÖеÄ111¸öÎó²î¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪMicrosoft SharePointÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1023¡¢CVE-2020-1024ºÍCVE-2020-1102£©¡¢Windows OSÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1067£©¡¢MSHTMLÒýÇæÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1064£©¡¢Microsoft Edge PDFÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-109£©ºÍJetÊý¾Ý¿âÒýÇæÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1051£¬£¬£¬£¬CVE-2020-1174£¬£¬£¬£¬CVE-2020-1175ºÍCVE-2020-1176£©¡£¡£¡£¡£¡£¡£±¾ÔÂÐû²¼µÄÊÇ΢ÈíÀúÊ·ÉϵÚÈý´óµÄ²¹¶¡³ÌÐò£¬£¬£¬£¬ÁíÍâÁ½´Î»®·ÖÊÇÔÚ2020Äê3ÔºÍ2020Äê4Ô£¬£¬£¬£¬ÐÞ¸´ÁË115ºÍ113¸ö¹ýʧ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-may-2020-patch-tuesday-fixes-111-vulnerabilities/


2.Thunderbolt±£´æÎó²î£¬£¬£¬£¬»ò½«Ó°ÏìÊý°ÙÍò×°±¸


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


°£Òò»ôοƼ¼´óѧµÄÑо¿ÍŶÓÔÚÓ¢ÌØ¶ûµÄThunderbolt¶Ë¿ÚÖз¢Ã÷ÁË7¸öÎó²î£¬£¬£¬£¬²¢Ä£ÄâÁË9ÖÖ¹¥»÷³¡¾°£¬£¬£¬£¬¾ßÓÐÎïÆÊÎö¼ûȨÏ޵Ĺ¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²î»á¼ûºÍ͵ȡÊý¾Ý¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬¹¥»÷Õß½öÐèÒªÎïÆÊÎö¼ûÆôÓÃÁËThunderboltµÄWindows»òLinuxϵͳ±ã¿ÉÒÔʵÏÖ¹¥»÷£¬£¬£¬£¬²¢ÇÒ²»»áÁôÏ»ºÛ¼£Ò²²»ÐèÒªÓëÓû§½»»¥¡£¡£¡£¡£¡£¡£×ÝÈ»Óû§ÔÚÍÑÀëʱÒѾ­Ëø¶¨»ò¹ÒÆðÅÌËã»ú£¬£¬£¬£¬²¢ÇÒÆôÓÃÁËÇå¾²Æô¶¯ºÍͨÅ̼ÓÃÜ£¬£¬£¬£¬¸Ã¹¥»÷ÒÀÈ»¿ÉÒÔʵÏÖ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁË2019ÄêÖ®Ç°ÖÆÔìµÄÊý°ÙÍòWindowsºÍLinux×°±¸¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/endpoint/thunderbolt-vulnerabilities-could-threaten-millions-of-pcs/d/d-id/1337789


3.ATMÖÆÔìÉÌDiebold NixdorfѬȾÀÕË÷²¡¶¾£¬£¬£¬£¬ÏµÍ³ÖÐÖ¹


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¶íÖÝATMÖÆÔìÉÌDiebold NixdorfÓÚ4ÔÂ25ÈÕÍíÉÏ·¢Ã÷Æä¹«Ë¾ÍøÂçÒì³££¬£¬£¬£¬²¢ÏÓÒÉÊÇÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Á¬Ã¦¶Ï¿ªÁ˸ÃÍøÂçÉϵÄϵͳÒÔ×èÖ¹¶ñÒâÈí¼þµÄÈö²¥¡£¡£¡£¡£¡£¡£DieboldÌåÏָô˹¥»÷Ö»ÊÇÓ°ÏìÁËÍøÂçºÍITϵͳ£¬£¬£¬£¬µ«²¢Î´Ó°Ïì¿Í»§»ò¹«ÖÚ¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÉîÈëÊӲ죬£¬£¬£¬¸ÃÀÕË÷²¡¶¾ÎªProLock£¬£¬£¬£¬ÔÚ3Ô·ÝҲѬȾÁËÒÁÀûŵÒÁÖÝÀ­Èø¶ûÏØµÄϵͳ¡£¡£¡£¡£¡£¡£BleepingComputerµÄLawrence Abrams˵£¬£¬£¬£¬ProLockÒªÇóµÄÊê½ðͨ³£ÔÚ6λÊý£¬£¬£¬£¬´Ó17.5ÍòÃÀÔªµ½66ÍòÃÀÔª²»µÈ¡£¡£¡£¡£¡£¡£¶øDieboldÌåÏÖËü²¢Ã»ÓÐÖ§¸¶Êê½ð£¬£¬£¬£¬²¢ÇÒ²»»áÌÖÂÛÊê½ð½ð¶î¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://krebsonsecurity.com/2020/05/ransomware-hit-atm-giant-diebold-nixdorf/


4.ÃÀ¹ú¹«Ë¾Pitney BowesÔÙÔâÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬ÎªMazeÌᳫ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÃÀ¹ú¹«Ë¾Pitney BowesÔÚ7¸öÔÂÄÚÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬´Ë´Î¹¥»÷ΪMazeÍÅ»ïÌᳫ¡£¡£¡£¡£¡£¡£MazeÍÅ»ïÔÚÍøÉÏÐû²¼ÁË11ÕŸù«Ë¾ÅÌËã»úÍøÂçÄÚ²¿Ä¿Â¼ÁбíµÄ½ØÍ¼£¬£¬£¬£¬ÒÔ֤ʵËûÃǹ¥»÷Àֳɡ£¡£¡£¡£¡£¡£Pitney Bowes½²»°ÈËÌåÏÖÏÖÔÚÕýÔÚÊÓ²ì´Ë´Î¹¥»÷µÄ¹æÄ££¬£¬£¬£¬ÌØÊâÊDZ»µÁÊý¾ÝÀàÐÍ¡£¡£¡£¡£¡£¡£2019Äê10ÔÂPitney BowesÊ×´ÎÔâµ½RyukÍÅ»ïÌᳫµÄÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬¸ÃÊÂÎñµ¼ÖÂijЩ°ü¹ü¸ú×ÙϵͳÍ£»£»£»ú¡£¡£¡£¡£¡£¡£RyukºÍMazeÍŻﶼÊÇʹÓÃÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬µ«²î±ðµÄÊÇMazeÉÐÓÐÒ»¸öÍøÕ¾£¬£¬£¬£¬²¢»áÔÚÊܺ¦Õ߾ܸ¶Êê½ðºóÔÚ¸ÃÍøÕ¾Ð¹Â¶Æä±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/package-delivery-giant-pitney-bowes-confirms-second-ransomware-attack-in-7-months/


5.ºÚ¿ÍÂÛ̳WeLeakData.comÊý¾Ý¿â±»µÁ£¬£¬£¬£¬ÂÛ̳ÐÅϢй¶


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ºÚ¿ÍÂÛ̳WeLeakData.comµÄÊý¾Ý¿â±»µÁÇÒ±»·ÅÔÚ°µÍø³öÊÛ£¬£¬£¬£¬Ê¹¸ÃÍøÕ¾ºÚ¿ÍµÄÐÅÏ¢ºÍ˽϶Ի°Ð¹Â¶¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂçÇ鱨¹«Ë¾CybleÐû²¼µÄ±¨¸æ£¬£¬£¬£¬WeLeakData.comµÄvBulletinÂÛ̳Êý¾Ý¿âй¶ÊÇÔÚ2020Äê1ÔÂ9ÈÕ×îÏȵ쬣¬£¬£¬ÏÖÒÑÔÚ°µÍøÊг¡ÉϳöÊÛ¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Óû§µÇ¼Ãû¡¢µç×ÓÓʼþµØµã¡¢¹þÏ£ÃÜÂëÒÔ¼°ËûÃǵÄIPµØµãÒÔ¼°Ë½ÈËÐÂÎÅ¡£¡£¡£¡£¡£¡£¹ØÓÚ¸ÃÍøÕ¾Óû§À´Ëµ´Ë´ÎÊÂÎñÖÁ¹ØÖ÷Òª£¬£¬£¬£¬ÓÉÓÚÖ´·¨²¿·Ö¿ÉÒÔʹÓÃ×ß©µÄIPµØµãºÍµç×ÓÓʼþµØµãÀ´×·×ÙËûÃDz¢½«ÆäÓëÆäËû¹¥»÷Ïà¹ØÁª¡£¡£¡£¡£¡£¡£´Ë´Îй¶»¹¿ÉÒÔÈÃÑо¿Ö°Ô±ÏàʶÔõÑù¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£CybleÏÖÔÚÒѽ«Ð¹Â¶Êý¾ÝÌí¼Óµ½ÆäÊý¾Ýй¶²éÕÒЧÀÍamibreached.comÖУ¬£¬£¬£¬ÒÔ±ãÓû§¿ÉÒÔ¼ì²éÆäÐÅÏ¢ÊÇ·ñ×ß©¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-private-chats-leaked-in-stolen-weleakdata-database/


6.ÒøÐÐľÂíSphinx»Ø¹éÉý¼¶£¬£¬£¬£¬ÒÔCOVID-19ΪÖ÷ÌâÕë¶ÔÃÀ¹ú


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÒøÐÐľÂíSphinxÉý¼¶²¢»Ø¹é£¬£¬£¬£¬Ê¹ÓÃCOVID-19À¬»øÓʼþ×÷ΪÓÕ¶üÕë¶ÔÃÀ¹úÓû§£¬£¬£¬£¬Ö¼ÔÚ´ÓÆäÔÚÏßÒøÐлỰÖлñÈ¡Óû§Æ¾Ö¤ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£Ð°汾µÄSphinxµÄ¸Ä±äÖ÷ÒªÔÚ¶ñÒâ´úÂë×¢Èë·½·¨ºÍBotÉèÖÃÁ½·½Ãæ¡£¡£¡£¡£¡£¡£Sphinxͨ¹ýŲÓÃä¯ÀÀÆ÷º¯ÊýÖ²Èë´úÂ룬£¬£¬£¬Ê×ÏÈËüŲÓÃCreateProcessAº¯ÊýÀ´½¨ÉèÒ»¸öÐÂÀú³Ì¼°ÆäÖ÷Ị̈߳¬£¬£¬£¬È»ºóŲÓÃWriteProcessMemoryº¯ÊýÒÔ½«ÓÐÓøºÔØ×¢Èëmsiexec.exeÀú³Ì£¬£¬£¬£¬×îºóʹÓÃGetThreadContextºÍSetThreadContextº¯Êý½«Ä¿µÄÀú³ÌµÄÖ´Ðеã¸ü¸ÄΪ´Ó×¢ÈëµÄÓÐÓøºÔØ¡£¡£¡£¡£¡£¡£¶øBotÉèÖÃÖиü¸ÄÁËC2µØµãºÍRC4ÃÜÔ¿£¬£¬£¬£¬½ÓÄÉÖ¸ÎÆÊ¶±ðÒÔ±ãËæÊ±ÏòÆäÍÆË͸üС£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/sphinx-riddle-us-targets-modifications/155621/