F5 BIG-IPÎó²îCVE-2020-5902Òѱ»Ê¹Ó㬣¬£¬£¬£¬½¨Ò龡¿ìÉý¼¶£»£»£».NET Core¿âÖÐÎó²î¿É±»Ê¹ÓñܿªÉ±¶¾Èí¼þ¼ì²â
Ðû²¼Ê±¼ä 2020-07-061.F5 BIG-IPÎó²îCVE-2020-5902ÒÑÔ⵽ʹÓ㬣¬£¬£¬£¬½¨ÒéÓû§¾¡¿ìÉý¼¶
NCCµÄÇå¾²Ñо¿Ô±·¢Ã÷£¬£¬£¬£¬£¬ºÚ¿ÍÒѾ×îÏÈʹÓÃF5 BIG-IPÖеÄÎó²î£¨CVE-2020-5902£©Ìᳫ¹¥»÷£¬£¬£¬£¬£¬Ö¼ÔÚ´Ó±»ÈëÇÖµÄ×°±¸ÖÐÇÔÈ¡ÖÎÀíÔ±ÃÜÂë¡£¡£ÉÏÖÜÈý¸ÃÎó²î¹ûÕæºó£¬£¬£¬£¬£¬ÍøÂçÇ徲ר¼ÒÁ¬Ã¦·¢³öÓйؽôÆÈÐÞ²¹´ËÎó²îµÄ¾¯±¨£¬£¬£¬£¬£¬ÓÉÓÚÈκÎÀֳɵĹ¥»÷¶¼½«Ê¹¹¥»÷ÕßÍêÈ«»á¼ûÌìÏÂÉÏ×îÖ÷ÒªµÄITÍøÂç¡£¡£Warren³Æ£¬£¬£¬£¬£¬ÔÚÃÀ¹úÍøÂç˾ÁµÄÖÒÑÔÍÆÎÄÐû²¼¼¸Ð¡Ê±ºó£¬£¬£¬£¬£¬ËûÔÚBIG-IPÃÛ¹ÞÖмì²âµ½À´×ÔÎå¸ö²î±ðIPµØµãµÄ¶ñÒâ¹¥»÷¡£¡£ÔÚ¹²ÏíµÄÈÕÖ¾ÖУ¬£¬£¬£¬£¬WarrenÖ¸³öÁËÕâЩ¹¥»÷µÄȪԴ£¬£¬£¬£¬£¬²¢¿ÉÒÔÈ·ÈÏËüÃÇÊǶñÒâµÄ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hackers-are-trying-to-steal-admin-passwords-from-f5-big-ip-devices/
2..NET Core¿âÖб£´æÎó²î£¬£¬£¬£¬£¬¿É±»Ê¹ÓñܿªÉ±¶¾Èí¼þµÄ¼ì²â
Context Information SecurityµÄPaulLa?n¨¦·¢Ã÷.NET Core¿âÖб£´æÎó²î£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õ߱ܿªÉ±¶¾Èí¼þµÄ¼ì²âÀ´Ö´ÐжñÒâ´úÂë¡£¡£¸ÃÎó²îÓ°ÏìÁË.NET Core µÄ×îÐÂÎȹ̰汾£¨3.1.x°æ±¾£©£¬£¬£¬£¬£¬ÊÇÓÉMicrosoft .NET Core¿âÖеÄ·¾¶±éÀúÎó²îÒýÆðµÄ£¬£¬£¬£¬£¬ÆäÔÊÐí¾ßÓеÍÌØÈ¨µÄÓû§¼ÓÔØ¶ñÒâÀ¬»ø½ÓÄÉDLL¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬¹¥»÷ÕßÐèÒª¾ßÓÐÒ»¶¨µÄ»á¼ûȨÏ޲ŻªÉèÖÃÇéÐαäÁ¿À´Ê¹ÓôËÎó²î£¬£¬£¬£¬£¬ÕâÒâζןÃÎó²îÐèÒªÓëÏÖÓÐÎó²îÁ¬ÏµÊ¹Óᣡ£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/net-core-vulnerability-lets-attackers-evade-malware-detection/
3.KELA·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁè¼Ý38ÍòÓ¢¹ú±¦Âí³µÖ÷ÐÅÏ¢
°µÍøÍþвÇ鱨¹«Ë¾KELAÌåÏÖ£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯KelvinSecurity TeamÕýÔÚ°µÍøÉϳöÊÛÓ¢¹ú384319Ãû±¦Âí³µÖ÷µÄÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨ÐÕÃûµÄÊ××ÖĸºÍÐÕÊÏ¡¢µç×ÓÓʼþ¡¢µØµã¡¢³µÁ¾±àºÅ¡¢¾ÏúÉÌÃû³ÆÒÔ¼°ÆäËûÐÅÏ¢¡£¡£ºÚ¿ÍÉù³ÆÕâЩÊý¾ÝÀ´×ÔÓÃÓÚÖÎÀí²î±ðÆû³µ¹©Ó¦É̿ͻ§µÄºô½ÐÖÐÐÄ£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨ÁË2016ÄêÖÁ2018ÄêµÄ½ü50Íò·Ý¿Í»§¼Í¼£¬£¬£¬£¬£¬Ò²Ó°ÏìÁËÆäËûÆ·ÅÆµÄÓ¢¹ú³µÖ÷£¬£¬£¬£¬£¬°üÀ¨Ã·ÈüµÂ˹¡¢Î÷ÑÅÌØ¡¢±¾ÌïºÍÏÖ´úµÈ¡£¡£KELAÌåÏָúڿÍ×éÖ¯ÔÚ°µÍøÉϺÜÊÇ»£»£»îÔ¾£¬£¬£¬£¬£¬½öÔÚ2020Äê6Ô¾ͳöÊÛÁË16¸öÊý¾Ý¿â£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÓëÃÀ¹úÕþ¸®³Ð°üÉ̺ͶíÂÞ˹¾üÊÂÎäÆ÷¿ª·¢ÓйصÄÊý¾Ý¡£¡£
ÔÎÄÁ´½Ó£º
https://www.scmagazine.com/home/security-news/bmw-customer-database-for-sale-on-dark-web/?web_view=true
4.DuckDuckGoδ¾Ô޳ɼ´¸ú×ÙÍøÂçÓû§ä¯ÀÀÊý¾Ý
TwitterÉϵÄÒ»ÃûÆ·µÂºÚ¿ÍÌåÏÖ£¬£¬£¬£¬£¬DuckDuckGoδ¾Ô޳ɼ´¸ú×ÙÍøÂçÓû§ä¯ÀÀÊý¾Ý¡£¡£¸ÃÎÊÌâʼÓÚËÑËØÒýÇæÔÚicons.duckduckgo.comµÄÒ»¸öЧÀÍÆ÷ÉÏ´æ´¢ÁËÍøÕ¾µÄͼ±ê¡£¡£Òò´Ë£¬£¬£¬£¬£¬¼ÙÉèÓû§Ç¡ÇÉ»á¼ûÁ˸ÃÍøÕ¾£¬£¬£¬£¬£¬DuckDuckGoµÄAndroidä¯ÀÀÆ÷»áÇëÇóÆäЧÀÍÆ÷½«Óû§µÄä¯ÀÀÊý¾Ý´«Ë͵½¸ÃЧÀÍÆ÷£¬£¬£¬£¬£¬¶øÎÞÐèѯÎÊÓû§¡£¡£ÕâÒâζ×ÅÓû§¿ÉÒÔ±»È·ÈÏÆä»á¼ûÁËij¸öÌØ¶¨ÍøÕ¾£¬£¬£¬£¬£¬´Ó¶øÓ°ÏìÁËËûÃǵÄÄäÃûÐÔ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ DuckDuckGoÒѽâ¾ö´ËÎÊÌ⣬£¬£¬£¬£¬ÏÖÔÚ¿ÉÒÔÖ±½Ó´ÓÍøÕ¾ÉÏ»ñȡͼ±ê¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/duckduckgo-collects-user-without-browsing-data/
5.ÐÂÀÕË÷Èí¼þTry2Cryͨ¹ýѬȾUSBÉÁ´æÇý¶¯Æ÷Èö²¥
G2 DATA¶ñÒâÈí¼þÆÊÎöʦKarsten Hahn·¢Ã÷ÁËÐÂÀÕË÷Èí¼þTry2Cry£¬£¬£¬£¬£¬ÆäÕýÊÔͼͨ¹ýѬȾUSBÉÁ´æÇý¶¯Æ÷ÔÚWindowsÅÌËã»úÉÏÈö²¥¡£¡£Try2CryÊÇ.NETÀÕË÷Èí¼þ£¬£¬£¬£¬£¬ÊÇHannÔÚÆÊÎöÁËDNGuard´úÂë±£»£»£»¤¹¤¾ß»ìÏýµÄÑù±¾ºó·¢Ã÷µÄ¿ªÔ´ÀÕË÷Èí¼þStupid¼Ò×åµÄÁíÒ»¸ö±äÖÖ¡£¡£¸ÃÀÕË÷Èí¼þѬȾװ±¸ºó£¬£¬£¬£¬£¬½«Ê¹ÓöԳÆÃÜÔ¿¼ÓÃÜËã·¨RijndaelºÍÓ²±àÂë¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬¶Ô.doc¡¢.ppt¡¢.jpg¡¢.xls¡¢.pdf¡¢.docx¡¢.pptx¡¢.xlsºÍ.xlsxÎļþ¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬²¢ÔÚËùÓмÓÃÜÎļþºó¸½¼Ó.Try2CryÀ©Õ¹Ãû¡£¡£¸ÃÀÕË÷Èí¼þ»¹¾ßÓйÊÕϱ£»£»£»¤¹¦Ð§£¬£¬£¬£¬£¬ÔÚÅÌËã»úÃû³ÆÎªDESKTOP-PQ6NSM4»òIK-PC2µÄϵͳÉÏÌø¹ý¼ÓÃܳÌÐò£¬£¬£¬£¬£¬ÒÔ°ü¹Ü¿ª·¢ÕßÔÚ×Ô¼ºµÄ×°±¸ÉϲâÊÔÀÕË÷Èí¼þʱ²»»áÎÞÒâÖÐËø¶¨×Ô¼ºµÄÎļþ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/try2cry-ransomware-tries-to-worm-its-way-to-other-windows-systems/
6.SodinokibiѬȾ°ÍÎ÷µçÁ¦¹«Ë¾Light SA£¬£¬£¬£¬£¬Ë÷Òª1400ÍòÃÀÔªÊê½ð
ÀÕË÷Èí¼þSodinokibiѬȾÁ˰ÍÎ÷µçÁ¦¹«Ë¾Light SA£¬£¬£¬£¬£¬²¢Ë÷Òª1400ÍòÃÀÔªÊê½ð¡£¡£AppGateµÄÑо¿Ö°Ô±ÆÊÎöÁ˶ñÒâÈí¼þµÄÑù±¾£¬£¬£¬£¬£¬È·ÈϸÃÑùÔÀ´×ÔÒ»¸öÃûΪSodinokibi£¨ÓÖÃûREvil£©µÄ¼Ò×å¡£¡£¸¶¿îÒ³ÃæÍйÜÔÚTorÍøÂçÉÏ£¬£¬£¬£¬£¬ºÚ¿ÍÒªÇóÊܺ¦ÕßÔÚ6ÔÂ19ÈÕ֮ǰ֧¸¶106870.19 XMR£¨Monero£©µÄÊê½ð£¬£¬£¬£¬£¬ÏÞÆÚÒѵ½£¬£¬£¬£¬£¬Êê½ð½ð¶î·ÁËÒ»·¬(215882.8 XMR)£¬£¬£¬£¬£¬Ô¼ÄªÎª1400ÍòÃÀÔª¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬Õû¸ö¹¥»÷¿´ÆðÀ´ºÜÊÇרҵ£¬£¬£¬£¬£¬ÍøÒ³ÉõÖÁ°üÀ¨Ì¸ÌìÖ§³Ö£¬£¬£¬£¬£¬Êܺ¦Õß¿ÉÒÔÖ±½ÓÓë¹¥»÷ÕßÅÊ̸¡£¡£SodinokibiµÄÔË×÷ģʽÊÇRaaS£¬£¬£¬£¬£¬¶ø¸ÃÐж¯±³ºóµÄ×éÖ¯ËÆºõÁ¥ÊôÓÚPinchy Spider¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/105477/cyber-crime/sodinokibi-ransomware-light-s-a.html


¾©¹«Íø°²±¸11010802024551ºÅ