CISAºÍCNMFÐû²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄÆÊÎö±¨¸æ£»£»Î¢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35ÀÖ³ÉÈëÇÖ¶à¸ö×ÅÃûÈËÊ¿ÓÊÏä

Ðû²¼Ê±¼ä 2020-10-30

1.CISAºÍCNMFÐû²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄÆÊÎö±¨¸æ


1.jpg


ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ºÍ¹ú·À²¿£¨DOD£©ÍøÂç¹ú¼ÒÐû½Ì²½¶Ó£¨CNMF£©·¢Ã÷еĶñÒâÈí¼þ±äÌåZebrocy¡£ ¡£¡£¡£¸Ã±äÌåÊÇÒ»¸ö32λµÄWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬Ê¹ÓÃGolang±à³ÌÓïÑÔ±àд£¬£¬£¬½ÓÄɵIJÎÊýӦΪÒì»ò£¨XOR£©ºÍÊ®Áù½øÖƱàÂëµÄͳһ×ÊÔ´±êʶ·û£¨URI£©£¬£¬£¬»òÕß¿ÉÒÔʹÓô¿Îı¾URIÔËÐС£ ¡£¡£¡£Ö´ÐÐʱ£¬£¬£¬Ëü½«Ê¹Óø߼¶¼ÓÃܱê×¼£¨AES£©-128µç×ÓÃÜÂë²¾£¨ECB£©Ëã·¨¶ÔURI¾ÙÐмÓÃÜ£¬£¬£¬²¢Ê¹ÓôÓÊܺ¦ÕßµÄÖ÷»úÃûÌìÉúµÄÃÜÔ¿£¬£¬£¬±ðµÄ»¹»áÍøÂçÓйØÊÜÄ¿µÄϵͳµÄÐÅÏ¢¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/cisa-and-cnmf-identify-new-malware-variant-zebrocy


2.Netscout·¢Ã÷TrickBotʹÓÃбäÌåÖ÷ÒªÕë¶ÔLinuxϵͳ


2.jpg


Çå¾²¹«Ë¾Netscout·¢Ã÷TrickBotʹÓÃбäÌåÖ÷ÒªÕë¶ÔLinuxϵͳ¡£ ¡£¡£¡£ÔÚ΢ÈíDefenderÍŶÓÁªºÏ¶à¼ÒÇå¾²¹«Ë¾²ð³ýÁËTrickBot´ó²¿·ÖЧÀÍÆ÷ºó£¬£¬£¬Æä×îÏÈʹÓöñÒâÈí¼þµÄбäÖÖ£¬£¬£¬ÒÔʵÑ齫ÆäÓÃÓÚLinuxϵͳ¡£ ¡£¡£¡£Ñо¿Ö°Ô±Waylon GrangeÓÚ7ÔÂÊ״η¢Ã÷ÁËAnchor_DNSµÄÐÂLinux±äÖÖ£¬£¬£¬²¢½«Æä³ÆÎªAnchor_Linux¡£ ¡£¡£¡£ÕâÊÇÒ»¸öÇáÁ¿¼¶µÄLinuxºóÃÅ£¬£¬£¬Ö´Ðк󣬣¬£¬Ëü½«×Ô¼º×°ÖÃΪcron£¬£¬£¬È·¶¨Ö÷»úµÄ¹«¹²IPµØµã£¬£¬£¬È»ºó×îÏÈͨ¹ýDNSÅÌÎÊÖ¸ÏòËüµÄC2ЧÀÍÆ÷¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110092/cyber-crime/trickbot-linux-variant.html


3.΢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35ÀÖ³ÉÈëÇÖ¶à¸ö×ÅÃûÈËÊ¿ÓÊÏä


3.jpg


MicrosoftµÄÍþвÇ鱨ÖÐÐÄ£¨MSTIC£©Åû¶£¬£¬£¬ºÚ¿Í×éÖ¯APT35ÀÖ³ÉÈëÇÖ¼ÓÈë½ñÄêĽÄáºÚÇå¾²¾Û»áºÍThink 20£¨T20£©·å»áµÄ¶à¸ö×ÅÃûÈËÊ¿µÄµç×ÓÓʼþÕÊ»§¡£ ¡£¡£¡£´Ë´ÎÊÂÎñµÄÊܺ¦Õß°üÀ¨Îª¹ú¼ÒÖ¸¶¨È«ÇòÒé³ÌºÍÍâ½»Õþ²ßµÄǰ´óʹºÍÆäËû¸ß¼¶Õþ²ßר¼Ò¡£ ¡£¡£¡£Æ¾Ö¤MSTICµÄÆÊÎö£¬£¬£¬´Ë´Î¹¥»÷ÎªÍøÂçÌØ¹¤»î¶¯£¬£¬£¬Ö¼ÔÚͨ¹ýÇÔÈ¡Êܺ¦ÕßµÄÓÊÏäÄÚÈݺÍÁªÏµ·½·¨À´ÍøÂçÇ鱨£¬£¬£¬²¢ÌåÏָûÓëÃÀ¹ú´óÑ¡²¢ÎÞ¹ØÏµ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-iranian-attackers-hacked-security-conference-attendees/


4.ºÚ¿Í¿ÉʹÓÃH?rmannÍø¹Ø×°±¸ÖÐÎó²îÔ¶³Ì¿ØÖƳµ¿âÃÅ


4.jpg


SEC ConsultÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ºÚ¿Í¿ÉʹÓÃH?rmannÍø¹Ø×°±¸ÖÐÎó²îÔ¶³Ì¿ØÖƳµ¿âÃÅ¡£ ¡£¡£¡£H?rmannÊÇÒ»¼ÒµÂ¹ú¹«Ë¾£¬£¬£¬×¨ÃÅ´ÓʼÒÓú͹¤ÒµÃÅ£¬£¬£¬ÊÇÌìϵÚËÄ´óÃÅÀàÖÆÔìÉÌ¡£ ¡£¡£¡£Çå¾²¹«Ë¾·¢Ã÷¸ÃÍø¹Ø×°±¸¹²ÓÐ15¸öÎó²î£¬£¬£¬°üÀ¨Óë¼ÓÃÜÓйصÄÎÊÌ⡢ͨѶ±£»£»¤²»Á¦ÒÔ¼°Ïà¹ØµÄÒÆ¶¯Ó¦ÓÃÖÐÎó²î¡£ ¡£¡£¡£ÕâЩÎó²î¿É±»ÓÃÀ´¾ÙÐÐÁ½ÖÖ¹¥»÷£¬£¬£¬Ò»ÖÖÊÇÐèÒª»á¼ûÍâµØÍøÂçµÄ¹¥»÷£¬£¬£¬ÁíÒ»ÖÖÊÇ´Ó»¥ÁªÍøÔ¶³ÌÌᳫµÄ¹¥»÷¡£ ¡£¡£¡£ÅþÁ¬µ½ÍâµØÍøÂçµÄ¹¥»÷Õß¿ÉÒÔͨ¹ýÊÖ»úÖ´ÐÐÒ»¸öС¾ç±¾·­¿ªH?rmannÃÅ£¬£¬£¬¶øÎÞÐèÒªÉí·ÝÑéÖ¤¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/hackers-can-open-doors-exploiting-vulnerabilities-h%C3%B6rmann-device


5.FireEye³Æ¶«Å·ÍÅ»ïUNC1878ʹÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº


5.jpg


ÍøÂçÇå¾²¹«Ë¾FireEye³Æ¶«Å·ÍÅ»ïUNC1878ʹÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº¡£ ¡£¡£¡£FireEye¸±×ܲÃCharles CarmakalÌåÏÖ¸Ã×éÖ¯¶ÔÃÀ¹ú¶à¼ÒÒ½Ôº¾ÙÐÐÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ÕâÊÇÒ½ÁÆÐÐÒµÔÚÒßÇéʱ´úÔâµ½µÄ×î¾ßÆÆËðÐÔµÄÍøÂç»î¶¯¡£ ¡£¡£¡£ÆäÖаüÀ¨±¾ÖܶԶíÀÕ¸ÔÖݵÄSky Lakes Medical CenterµÄ¹¥»÷£¬£¬£¬¶ÔŦԼÖÝÒ½ÔºµÄITÍøÂç¹¥»÷ÆÈʹCanton-Potsdam¡¢MassenaºÍGouverneurÒ½Ôº»Ö¸´Ê¹Óñ¸·Ý³ÌÐò¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.cyberscoop.com/ransomware-hospitals-ryuk-fireeye/


6.ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öÏÂÁî×¢ÈëÎó²î


6.jpg


ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2020-2490ºÍCVE-2020-2492£©¡£ ¡£¡£¡£QTSÊÇÍøÂ總¼Ó´æ´¢×°±¸µÄ²Ù×÷ϵͳ£¬£¬£¬Ê¹ÓøÃÎó²î¿ÉÔÊÐíí§ÒâÏÂÁîÖ´ÐС£ ¡£¡£¡£NAS×°±¸¹©Ó¦ÉÌδÌṩÓйØÕâÁ½¸öÎÊÌâµÄÌ«¶àÏêϸÐÅÏ¢£¬£¬£¬µ«ÌåÏÖ×îа汾µÄQTS°üÀ¨±ØÐèµÄ²¹¶¡³ÌÐò£¬£¬£¬Óû§Ö»Òª½«QTS²Ù×÷ϵͳ¸üе½°æ±¾QTS 4.4.3.1421 build 20200907¾Í²»±Øµ£ÐÄ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/qnap-warns-of-new-qts-bugs-that-allow-take-over-of-devices/