ÀÕË÷Èí¼þWannaCryÖØÐ»ع飬£¬£¬£¬¹¥»÷»î¶¯¼¤Ôö53£¥£»£»£»£»Ó¡¶È¹¤ÒµÉú³¤¹«Ë¾MIDCѬȾSYNack£¬£¬£¬£¬±»ÀÕË÷50ÒÚ¬±È

Ðû²¼Ê±¼ä 2021-04-01

1.ÀÕË÷Èí¼þWannaCryÖØÐ»ع飬£¬£¬£¬¹¥»÷»î¶¯¼¤Ôö53£¥


1.jpg


Check Point·¢Ã÷ÀÕË÷Èí¼þWannaCryÖØÐ»ع飬£¬£¬£¬¹¥»÷»î¶¯¼¤Ôö53£¥¡£¡£¡£ÒÑÍùµÄ°ëÄêÖУ¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷»î¶¯ÔöÌíÁË57£¥£¬£¬£¬£¬È«Çò×ܹ²±¬·¢ÁË50000¶à´Î¹¥»÷ʵÑ飬£¬£¬£¬ÆäÖдó´ó¶¼Õë¶ÔÕþ¸®¡¢¾üÊ¡¢ÖÆÔìÒµ¡¢ÒøÐкͽðÈÚ²¿·ÖµÄ×éÖ¯¡£¡£¡£³ýÁËÕý³£ÀÕË÷Èí¼þ£¨ÃÔ¹¬¡¢RyukºÍREvilµÈ£©Í⣬£¬£¬£¬Check Point»¹×¢Öص½WannaCryÀÕË÷Èí¼þÔöÌíÁË53£¥¡£¡£¡£2021Äê3ÔÂÊܸöñÒâÈí¼þÓ°ÏìµÄ×éÖ¯ÊýÄ¿ÊÇ2020Äê10ÔµÄ40±¶£¬£¬£¬£¬ÆäÐÂÑù±¾ÈÔʹÓÃÁËEternalBlueÎó²î¾ÙÐзַ¢£¬£¬£¬£¬Ö»¹ÜÕë¶Ô¸ÃÎó²îµÄ²¹¶¡ÒÑÐû²¼Áè¼Ý4Äê¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-exchange-attacks-increase-while-wannacry-gets-a-restart/


2.Talos·¢Ã÷¶à¸ö½«¶ñÒâÈí¼þαװ³ÉÓÎÏ·Íâ¹ÒµÄ¹¥»÷»î¶¯


2.jpg


Ñо¿Ö°Ô±³ÆÔÚ¶à¸ö»î¶¯Öз¢Ã÷ÁËÁ˼¸¸ö¿´ÆðÀ´ÏñÓÎÏ·²¹¶¡¡¢µ÷½âÆ÷»òÐÞ¸ÄÆ÷µÄС¹¤¾ß´øÓÐÄ£ºýµÄ¶ñÒâÈí¼þ¡£¡£¡£´Ó2010Äê×îÏÈ»îÔ¾µÄÉÌÓÃRAT XtremeRAT¾ÍÊÇÆäÖÐÖ®Ò»£¬£¬£¬£¬¿ÉÓÃÀ´ÇÔÈ¡Îĵµ¡¢¼Í¼¼üÅÌÊäÈë¡¢²¶»ñÆÁÄ»½ØÍ¼¡¢Ê¹ÓÃÉãÏñÍ·»òÂó¿Ë·çÂ¼ÖÆÒôƵÒÔ¼°Í¨¹ýÔ¶³ÌshellÓëÊܺ¦Õß»¥¶¯µÈ¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÁËÖØ´óµÄ»ùÓÚVisualBasicµÄ¼ÓÃÜÆ÷ºÍShellcodeÀ´×èÖ¹ÆÊÎöºÍ¼ì²â£¬£¬£¬£¬²¢Òþ²ØÆäpayload¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/malware-hidden-in-game-cheats-and-mods-used-to-target-gamers/


3.VMwareÐÞ¸´vRealize OperationsÖеÄSSRFµÈ¶à¸öÎó²î


3.jpg


VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÒÔÐÞ¸´VMware vRealize OperationsÖеĶà¸öÎó²î¡£¡£¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖØµÄÎó²îÊÇvRealize Operations Manager APIÖеÄЧÀÍÆ÷¶ËÇëÇóαÔìÎó²î£¨CVE-2021-21975£©£¬£¬£¬£¬CVSSv3ÆÀ·ÖΪ8.6£¬£¬£¬£¬Ô¶³Ìδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÎÞÐèÓëÓû§½»»¥¼´¿ÉʹÓôËÎó²îÀ´ÇÔÈ¡ÖÎÀíÆ¾Ö¤¡£¡£¡£±ðµÄ£¬£¬£¬£¬»¹ÐÞ¸´ÁËí§ÒâÎļþдÈëÎó²î£¨CVE-2021-21983£©£¬£¬£¬£¬CVSSv3ÆÀ·ÖΪ7.2£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÆäÔڵײã¹â×Ó²Ù×÷ϵͳµÄí§ÒâλÖÃдÈëÎļþ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/116145/security/vmware-vrealize-operations-ssrf-flaw.html


4.IoT×°±¸ÉÌUbiquitiÔâµ½¹¥»÷£¬£¬£¬£¬Êý¾Ý¿âºÍÔ´´úÂëй¶


4.jpg


ÍøÂç×°±¸ºÍÎïÁªÍø£¨IoT£©×°±¸ÌṩÉÌUbiquitiÔâµ½¹¥»÷£¬£¬£¬£¬Êý¾Ý¿âºÍÔ´´úÂëй¶¡£¡£¡£1ÔÂ11ÈÕ£¬£¬£¬£¬¸Ã¹«Ë¾Åû¶ÆäµÚÈý·½ÔÆÌṩÉÌй¶ÁËÆä¿Í»§µÄÕÊ»§Æ¾Ö¤¡£¡£¡£µ«½üÆÚ£¬£¬£¬£¬ÄäÃûΪAdamµÄ¾Ù±¨Õß͸¶ÊÂÎñÔ¶±È¿´ÉÏÈ¥ÑÏÖØµÃ¶à¡£¡£¡£¹¥»÷Õß¿ÉÒÔrootÖÎÀíԱȨÏÞ»á¼ûËùÓÐUbiquiti AWSÕÊ»§£¬£¬£¬£¬°üÀ¨ËùÓÐS3Êý¾ÝͰ¡¢Ó¦ÓóÌÐòÈÕÖ¾¡¢Êý¾Ý¿âºÍÓû§Æ¾Ö¤£¬£¬£¬£¬ÒÔ¼°Î±Ôìµ¥µãµÇ¼£¨SSO£©CookieºÍÔ¶³Ì»á¼ûËùÐèµÄÃÜÔ¿¡¢ÍêÕûµÄÔ´´úÂë¿ØÖÆÄÚÈݺÍÊðÃûÃÜÔ¿¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/


5.Ó¡¶È¹¤ÒµÉú³¤¹«Ë¾MIDCѬȾSYNack£¬£¬£¬£¬±»ÀÕË÷50ÒÚ¬±È


5.jpg


Ó¡¶ÈÃÏÂòµÄMaharashtra¹¤ÒµÉú³¤¹«Ë¾£¨MIDC£©µÄЧÀÍÆ÷ѬȾSYNack£¬£¬£¬£¬±»ÀÕË÷50ÒÚ¬±È£¨Ô¼ºÏ6800ÍòÃÀÔª£©¡£¡£¡£MIDC³Æ¹¥»÷±¬·¢ÔÚ3ÔÂ21ÈÕÖÜÈÕÆÆÏþ2:30×óÓÒ£¬£¬£¬£¬ÆäÊ×ÏÈÊÕµ½ÁËÓ¦ÓóÌÐò¹Ø±ÕµÄ¾¯±¨£¬£¬£¬£¬¾­ÆÊÎöÆäÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬¸Ã¹«Ë¾Á¬Ã¦½«MIDCϵͳÓëÍøÂç¶Ï¿ªÒÔ×èÖ¹²¡¶¾µÄÈö²¥¡£¡£¡£´Ë´Î¹¥»÷Ó°ÏìÁËMIDCʹÓõÄÓ¦ÓóÌÐòºÍÊý¾Ý¿âЧÀÍÆ÷£¬£¬£¬£¬ÒÔ¼°²¿·Ǫ̈ʽ»ú£¬£¬£¬£¬ÏÖÔڸù«Ë¾Î»ÓÚ16¸öµØÇøµÄËùÓÐЧÀÍ´¦¶¼ÒѹرÕ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/03/midcs-server-hacked-threat-to-destroy.html


6.WatchGuardÐû²¼2020ÄêQ4¶ñÒâÈí¼þºÍÍøÂç¹¥»÷ÆÊÎö±¨¸æ


6.jpg


WatchGuardÐû²¼ÁË2020ÄêQ4¶ñÒâÈí¼þºÍÍøÂç¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬2020ÄêÎÞÎļþ¶ñÒâÈí¼þÊýÄ¿£¨fileless malware£©±È2019ÄêÔöÌíÁË888£¥£¬£¬£¬£¬ÖîÈçPowerSploitºÍCobaltStrikeÖ®ÀàµÄ¹¤¾ß°ü£¬£¬£¬£¬×ÝÈ»Êܺ¦Õßʶ±ð²¢É¾³ýÁËԭʼ¾ç±¾£¬£¬£¬£¬ËüÃÇÈԿɼÌÐøÔËÐС£¡£¡£±ðµÄ£¬£¬£¬£¬¼ÓÃܿ󹤵ļìÕÉÁ¿±È2019ÄêÔöÌíÁË25£¥ÒÔÉÏ£¬£¬£¬£¬¶à´ï850ÖÖ±äÌ壬£¬£¬£¬¶øÀÕË÷Èí¼þ¹¥»÷Á¿³ÊϽµÇ÷ÊÆ´Ó2019ÄêµÄ4131¸öpayloadϽµµ½2152¸ö¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.watchguard.com/wgrd-resource-center/security-report-q4-2020