CISAºÍCNMFÐû²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄÆÊÎö±¨¸æ£»£»Î¢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35ÀÖ³ÉÈëÇÖ¶à¸ö×ÅÃûÈËÊ¿ÓÊÏä
Ðû²¼Ê±¼ä 2020-10-301.CISAºÍCNMFÐû²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄÆÊÎö±¨¸æ

ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ºÍ¹ú·À²¿£¨DOD£©ÍøÂç¹ú¼ÒÐû½Ì²½¶Ó£¨CNMF£©·¢Ã÷еĶñÒâÈí¼þ±äÌåZebrocy¡£¡£¡£¡£¸Ã±äÌåÊÇÒ»¸ö32λµÄWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬Ê¹ÓÃGolang±à³ÌÓïÑÔ±àд£¬£¬£¬½ÓÄɵIJÎÊýӦΪÒì»ò£¨XOR£©ºÍÊ®Áù½øÖƱàÂëµÄͳһ×ÊÔ´±êʶ·û£¨URI£©£¬£¬£¬»òÕß¿ÉÒÔʹÓô¿Îı¾URIÔËÐС£¡£¡£¡£Ö´ÐÐʱ£¬£¬£¬Ëü½«Ê¹Óø߼¶¼ÓÃܱê×¼£¨AES£©-128µç×ÓÃÜÂë²¾£¨ECB£©Ëã·¨¶ÔURI¾ÙÐмÓÃÜ£¬£¬£¬²¢Ê¹ÓôÓÊܺ¦ÕßµÄÖ÷»úÃûÌìÉúµÄÃÜÔ¿£¬£¬£¬±ðµÄ»¹»áÍøÂçÓйØÊÜÄ¿µÄϵͳµÄÐÅÏ¢¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/cisa-and-cnmf-identify-new-malware-variant-zebrocy
2.Netscout·¢Ã÷TrickBotʹÓÃбäÌåÖ÷ÒªÕë¶ÔLinuxϵͳ

Çå¾²¹«Ë¾Netscout·¢Ã÷TrickBotʹÓÃбäÌåÖ÷ÒªÕë¶ÔLinuxϵͳ¡£¡£¡£¡£ÔÚ΢ÈíDefenderÍŶÓÁªºÏ¶à¼ÒÇå¾²¹«Ë¾²ð³ýÁËTrickBot´ó²¿·ÖЧÀÍÆ÷ºó£¬£¬£¬Æä×îÏÈʹÓöñÒâÈí¼þµÄбäÖÖ£¬£¬£¬ÒÔʵÑ齫ÆäÓÃÓÚLinuxϵͳ¡£¡£¡£¡£Ñо¿Ö°Ô±Waylon GrangeÓÚ7ÔÂÊ״η¢Ã÷ÁËAnchor_DNSµÄÐÂLinux±äÖÖ£¬£¬£¬²¢½«Æä³ÆÎªAnchor_Linux¡£¡£¡£¡£ÕâÊÇÒ»¸öÇáÁ¿¼¶µÄLinuxºóÃÅ£¬£¬£¬Ö´Ðк󣬣¬£¬Ëü½«×Ô¼º×°ÖÃΪcron£¬£¬£¬È·¶¨Ö÷»úµÄ¹«¹²IPµØµã£¬£¬£¬È»ºó×îÏÈͨ¹ýDNSÅÌÎÊÖ¸ÏòËüµÄC2ЧÀÍÆ÷¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110092/cyber-crime/trickbot-linux-variant.html
3.΢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35ÀÖ³ÉÈëÇÖ¶à¸ö×ÅÃûÈËÊ¿ÓÊÏä

MicrosoftµÄÍþвÇ鱨ÖÐÐÄ£¨MSTIC£©Åû¶£¬£¬£¬ºÚ¿Í×éÖ¯APT35ÀÖ³ÉÈëÇÖ¼ÓÈë½ñÄêĽÄáºÚÇå¾²¾Û»áºÍThink 20£¨T20£©·å»áµÄ¶à¸ö×ÅÃûÈËÊ¿µÄµç×ÓÓʼþÕÊ»§¡£¡£¡£¡£´Ë´ÎÊÂÎñµÄÊܺ¦Õß°üÀ¨Îª¹ú¼ÒÖ¸¶¨È«ÇòÒé³ÌºÍÍâ½»Õþ²ßµÄǰ´óʹºÍÆäËû¸ß¼¶Õþ²ßר¼Ò¡£¡£¡£¡£Æ¾Ö¤MSTICµÄÆÊÎö£¬£¬£¬´Ë´Î¹¥»÷ÎªÍøÂçÌØ¹¤»î¶¯£¬£¬£¬Ö¼ÔÚͨ¹ýÇÔÈ¡Êܺ¦ÕßµÄÓÊÏäÄÚÈݺÍÁªÏµ·½·¨À´ÍøÂçÇ鱨£¬£¬£¬²¢ÌåÏָûÓëÃÀ¹ú´óÑ¡²¢ÎÞ¹ØÏµ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-iranian-attackers-hacked-security-conference-attendees/
4.ºÚ¿Í¿ÉʹÓÃH?rmannÍø¹Ø×°±¸ÖÐÎó²îÔ¶³Ì¿ØÖƳµ¿âÃÅ

SEC ConsultÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ºÚ¿Í¿ÉʹÓÃH?rmannÍø¹Ø×°±¸ÖÐÎó²îÔ¶³Ì¿ØÖƳµ¿âÃÅ¡£¡£¡£¡£H?rmannÊÇÒ»¼ÒµÂ¹ú¹«Ë¾£¬£¬£¬×¨ÃÅ´ÓʼÒÓú͹¤ÒµÃÅ£¬£¬£¬ÊÇÌìϵÚËÄ´óÃÅÀàÖÆÔìÉÌ¡£¡£¡£¡£Çå¾²¹«Ë¾·¢Ã÷¸ÃÍø¹Ø×°±¸¹²ÓÐ15¸öÎó²î£¬£¬£¬°üÀ¨Óë¼ÓÃÜÓйصÄÎÊÌ⡢ͨѶ±£»£»¤²»Á¦ÒÔ¼°Ïà¹ØµÄÒÆ¶¯Ó¦ÓÃÖÐÎó²î¡£¡£¡£¡£ÕâЩÎó²î¿É±»ÓÃÀ´¾ÙÐÐÁ½ÖÖ¹¥»÷£¬£¬£¬Ò»ÖÖÊÇÐèÒª»á¼ûÍâµØÍøÂçµÄ¹¥»÷£¬£¬£¬ÁíÒ»ÖÖÊÇ´Ó»¥ÁªÍøÔ¶³ÌÌᳫµÄ¹¥»÷¡£¡£¡£¡£ÅþÁ¬µ½ÍâµØÍøÂçµÄ¹¥»÷Õß¿ÉÒÔͨ¹ýÊÖ»úÖ´ÐÐÒ»¸öС¾ç±¾·¿ªH?rmannÃÅ£¬£¬£¬¶øÎÞÐèÒªÉí·ÝÑéÖ¤¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/hackers-can-open-doors-exploiting-vulnerabilities-h%C3%B6rmann-device
5.FireEye³Æ¶«Å·ÍÅ»ïUNC1878ʹÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº

ÍøÂçÇå¾²¹«Ë¾FireEye³Æ¶«Å·ÍÅ»ïUNC1878ʹÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº¡£¡£¡£¡£FireEye¸±×ܲÃCharles CarmakalÌåÏÖ¸Ã×éÖ¯¶ÔÃÀ¹ú¶à¼ÒÒ½Ôº¾ÙÐÐÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ÕâÊÇÒ½ÁÆÐÐÒµÔÚÒßÇéʱ´úÔâµ½µÄ×î¾ßÆÆËðÐÔµÄÍøÂç»î¶¯¡£¡£¡£¡£ÆäÖаüÀ¨±¾ÖܶԶíÀÕ¸ÔÖݵÄSky Lakes Medical CenterµÄ¹¥»÷£¬£¬£¬¶ÔŦԼÖÝÒ½ÔºµÄITÍøÂç¹¥»÷ÆÈʹCanton-Potsdam¡¢MassenaºÍGouverneurÒ½Ôº»Ö¸´Ê¹Óñ¸·Ý³ÌÐò¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/ransomware-hospitals-ryuk-fireeye/
6.ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öÏÂÁî×¢ÈëÎó²î

ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2020-2490ºÍCVE-2020-2492£©¡£¡£¡£¡£QTSÊÇÍøÂ總¼Ó´æ´¢×°±¸µÄ²Ù×÷ϵͳ£¬£¬£¬Ê¹ÓøÃÎó²î¿ÉÔÊÐíí§ÒâÏÂÁîÖ´ÐС£¡£¡£¡£NAS×°±¸¹©Ó¦ÉÌδÌṩÓйØÕâÁ½¸öÎÊÌâµÄÌ«¶àÏêϸÐÅÏ¢£¬£¬£¬µ«ÌåÏÖ×îа汾µÄQTS°üÀ¨±ØÐèµÄ²¹¶¡³ÌÐò£¬£¬£¬Óû§Ö»Òª½«QTS²Ù×÷ϵͳ¸üе½°æ±¾QTS 4.4.3.1421 build 20200907¾Í²»±Øµ£ÐÄ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/qnap-warns-of-new-qts-bugs-that-allow-take-over-of-devices/


¾©¹«Íø°²±¸11010802024551ºÅ