NSAÐû²¼Õë¶ÔÔ¶³ÌÊÂÇéÕߺÍϵͳÖÎÀíÔ±µÄÍøÂçÇå¾²Ö¸ÄÏ£»£»Ñо¿Ö°Ô±·¢Ã÷Cloudflare WAFµÄ·ÀSQL×¢ÈëÕ½ÂÔ¿ÉÈÆ¹ý
Ðû²¼Ê±¼ä 2020-09-231.NSAÐû²¼Õë¶ÔÔ¶³ÌÊÂÇéÕߺÍϵͳÖÎÀíÔ±µÄÍøÂçÇå¾²Ö¸ÄÏ

ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)Ðû²¼ÁËÁ½·ÝÍøÂçÇå¾²ÐÅÏ¢±í(CSIs)£¬£¬£¬£¬£¬Îª¹ú¼ÒÇ徲ϵͳ(NSS)ºÍ¹ú·À²¿(DoD)ÊÂÇéÖ°Ô±ºÍϵͳÖÎÀíÔ±ÌṩÁ˹ØÓÚÔÚ¼ÒÊÂÇéʱ´ú±£»£»¤ÍøÂçÇå¾²ºÍÓ¦¶ÔÊÂÎñµÄ½¨Òé¡£¡£µÚÒ»·ÝÃûΪÊÜËðСÎÒ˽¼ÒÍøÂçÖ¸±ê»ººÍ½â²½·¥£¬£¬£¬£¬£¬Ö¼ÔÚÌṩÓйØÔ¶³ÌÊÂÇéÕßÔõÑùʶ±ðºÍ¼õÇáÆäСÎÒ˽¼ÒÍøÂçΣº¦µÄÏêϸÐÅÏ¢¡£¡£µÚ¶þ·ÝÃûΪִÐдøÍâÍøÂçÖÎÀí£¬£¬£¬£¬£¬ÆäÏòϵͳÖÎÀíÔ±ÌṩÁËÔõÑù¸ôÀëÖÎÀíÁ÷Á¿ºÍÔËÓªÁ÷Á¿µÄÐÅÏ¢¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/nsa-issues-cybersecurity-guidance-remote-workers-system-admins
2.ºÚ¿ÍÃé×¼µÃ¿ËÈøË¹ÖÝÎÀÉúЧÀ;ÖÌá³«ÍøÂç´¹ÂÚ¹¥»÷

ºÚ¿ÍÊÔͼαÔìµÂ¿ËÈøË¹ÖÝÖÝÎÀÉúЧÀ;֣¨DSHS£©µÄµç×ÓÓʼþÀ´Ìá³«ÍøÂç´¹ÂÚ¹¥»÷¡£¡£µç×ÓÓʼþ±£»£»¤µÄ¹«Ë¾Abnormal Security·¢Ã÷£¬£¬£¬£¬£¬ÓкڿÍð³äÁ˵ÿËÈøË¹ÖÝDSHSµÄÊðÀíרԱJohn William Hellerstedt·¢ËÍ´¹ÂÚÓʼþ£¬£¬£¬£¬£¬ÒªÇóÊܺ¦ÕßÌṩ20̨´¥ÃþÆÁÌõ¼Ç±¾µçÄÔºÍ200̨±ãЯʽӲÅ̵ı¨¼Û¡£¡£Æä×îÖÕÄ¿µÄ¿ÉÄÜÊÇ»ñµÃ²úÆ·£¬£¬£¬£¬£¬²¢Í¨¹ýÏúÊÛÔßÎïÒÔıȡÀûÒæ¡£¡£Ñо¿Ö°Ô±Ëµ£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ·¢ËÍÓʼþʱСÐĵØÑÚÊÎÁËÆäÐÐ×Ù£¬£¬£¬£¬£¬²¢Ê¹ÓÃVPNЧÀÍÒþ²ØÁËËûÃǵÄλÖúÍÕæÊµIPµØµã¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/texas-businesses-targeted-in-department-of-state-health-rfq-phishing/
3.Ñо¿Ö°Ô±·¢Ã÷Cloudflare WAFµÄ·ÀSQL×¢ÈëÕ½ÂÔ¿ÉÈÆ¹ý

ÍøÂçÇå¾²Ñо¿Ô±George Skouroupathis·¢Ã÷CloudflareµÄWebÓ¦ÓóÌÐò·À»ðǽ£¨WAF£©SQL×¢Èë±£»£»¤»úÖÆÖб£´æÎó²î£¬£¬£¬£¬£¬¿É±»Èƹý¡£¡£Ëû·¢Ã÷µ±ÆäÅÌÎÊÒ»¸öÌØ¶¨µÄ±äÁ¿ÊÇ·ñÆ¥Åäij¸öÌõ¼þʱ£¬£¬£¬£¬£¬ÈôÊÇÌõ¼þÖª×ã¾Í»á¸ø³ö200¸öOK״̬֪ͨ£¬£¬£¬£¬£¬·´Ö®£¬£¬£¬£¬£¬Ð§ÀÍÆ÷·µ»ØÒ»¸ö500ÄÚ²¿Ð§ÀÍÆ÷¹ýʧ¡£¡£»£»ùÓÚ¸ÃÔÀí£¬£¬£¬£¬£¬Ëû±àдÁËÒ»¸ö¾ç±¾£¬£¬£¬£¬£¬½«DBMSÖÐÑ¡ÔñµÄ×Ö·ûÒÀ´ÎÓëËùÓÐ×Ö·û¾ÙÐнÏÁ¿¡£¡£ÔÚ¾ÓÉ3´Î×¢ÈëʵÑéºó£¬£¬£¬£¬£¬ÆäÀֳɵØÖ´ÐÐÁËSQL×¢Èë¹¥»÷¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/whitehat-hacker-bypass-sql-cloudflare-injection-filter/
4.Cisco³ÆÎÞÎļþµÄ¶ñÒâÈí¼þÊÇ2020Äê1H×î³£¼ûµÄÖÕ¶ËÍþв

ƾ֤Cisco¶ÔÒ£²âÊý¾ÝµÄ×îÐÂÆÊÎö£¬£¬£¬£¬£¬ÔÚ2020ÄêÉϰëÄ꣬£¬£¬£¬£¬Õë¶ÔÖն˵Ä×î³£¼ûµÄÍøÂçÇå¾²ÍþвÊÇÎÞÎļþ¶ñÒâÈí¼þ¡£¡£ÎÞÎļþÍþвΪÊ×´ÎѬȾºóÔÚÄÚ´æÖÐÔËÐеĶñÒâ´úÂ룬£¬£¬£¬£¬¶ø²»ÊÇ´æ´¢ÔÚÓ²ÅÌÉϵÄÎļþ£¬£¬£¬£¬£¬ÀýÈçKovter¡¢Poweliks¡¢DivegentºÍLemonDuck¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÁíÒ»¸ö³£¼ûµÄÕë¶ÔÖն˵ÄÍøÂçÍþвΪ˫ÓÃ;¹¤¾ß£¬£¬£¬£¬£¬ËüÃÇͨ³£ÓÃÓÚ¿ª·¢ºÍ¿ª·¢ºóʹÃü£¬£¬£¬£¬£¬ÀýÈçPowerShell Empire¡¢Cobalt Strike¡¢PowersploitºÍMetasploit¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/fileless-malware-critical-ioc-threats-2020/159422/
5.CISAÖÒÑÔ¶ñÒâÈí¼þLokiBotµÄʹÓÃÁ¿ÏÔ×ÅÔöÌí

ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖÒÑÔ£¬£¬£¬£¬£¬ÆäÄÚ²¿Ç徲ƽ̨£¨ÈëÇÖ¼ì²âϵͳEINSTEIN£©ÒѼì²âµ½LokiBotѬȾµÄÒ»Á¬¶ñÒâ»î¶¯£¬£¬£¬£¬£¬²¢Ìá³öÁËÓйش¦Öóͷ£LokiBot¹¥»÷ºÍѬȾµÄ¼ì²â»ººÍ½â½¨Òé¡£¡£Ä¿½ñ£¬£¬£¬£¬£¬Óжà¸öºÚ¿Í×éÖ¯ÕýÔÚͨ¹ýÖÖÖÖ¸÷ÑùµÄÊÖÒÕÀ´·Ö·¢¸Ã¶ñÒâÈí¼þ£¬£¬£¬£¬£¬´ÓÀ¬»øÓʼþµ½ÆÆ½âµÄ×°ÖóÌÐòÒÔ¼°ÓÕÆµÄÖÖ×ÓÎļþ¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÔÚÊ¢ÐÐÂʺÍÊýÄ¿·½Ã棬£¬£¬£¬£¬SpamHaus½«LokiBotÁÐΪ2019Äê×î»îÔ¾µÄÏÂÁîºÍ¿ØÖÆ(C&C)ЧÀÍÆ÷µÄ¶ñÒâÈí¼þ¾úÖê¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cisa-warns-of-notable-increase-in-lokibot-malware/
6.BingµÄһ̨ºó¶ËЧÀÍÆ÷̻¶£¬£¬£¬£¬£¬Ð¹Â¶Áè¼Ý6.5TBÈÕÖ¾Îļþ

WizCaseµÄÇå¾²Ñо¿Ô±Ata Hakcil·¢Ã÷£¬£¬£¬£¬£¬±¾ÔÂÔçЩʱ¼ä£¬£¬£¬£¬£¬Î¢ÈíµÄITÔ±¹¤ÒâÍâµØ½«BingµÄÒ»¸öºó¶ËЧÀÍÆ÷̻¶ÔÚÁËÍøÂçÉÏ¡£¡£¸ÃÊÂÎñй¶ÁËÁè¼Ý6.5TBµÄÈÕÖ¾Îļþ£¬£¬£¬£¬£¬ÆäÖаüÀ¨130ÒÚ¸öÀ´×ÔBingËÑË÷ÒýÇæµÄ¼Í¼¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬²¢Ã»ÓÐÓû§ÐÅÏ¢±»Ð¹Â¶£¬£¬£¬£¬£¬¿ÉÊÇЧÀÍÆ÷¹ûÕæÁËÊÖÒÕÏêϸÐÅÏ¢£¬£¬£¬£¬£¬ÀýÈçËÑË÷ÅÌÎÊ¡¢ÓйØÓû§ÏµÍ³µÄÏêϸÐÅÏ¢£¨×°±¸£¬£¬£¬£¬£¬²Ù×÷ϵͳ£¬£¬£¬£¬£¬ä¯ÀÀÆ÷µÈ£©¡¢µØÀíλÖÃÏêϸÐÅÏ¢ÒÔ¼°ÖÖÖÖÁîÅÆ¡¢¹þÏ£ºÍÓÅ»Ýȯ´úÂë¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-secures-backend-server-that-leaked-bing-data/


¾©¹«Íø°²±¸11010802024551ºÅ