CISAºÍCNMFÐû²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄÆÊÎö±¨¸æ£»£»£»£»£»Î¢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35ÀÖ³ÉÈëÇÖ¶à¸ö×ÅÃûÈËÊ¿ÓÊÏä
Ðû²¼Ê±¼ä 2020-10-301.CISAºÍCNMFÐû²¼Ð¶ñÒâÈí¼þ±äÌåZebrocyµÄÆÊÎö±¨¸æ

ÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ºÍ¹ú·À²¿£¨DOD£©ÍøÂç¹ú¼ÒÐû½Ì²½¶Ó£¨CNMF£©·¢Ã÷еĶñÒâÈí¼þ±äÌåZebrocy¡£¡£¡£¡£¡£¡£¡£¸Ã±äÌåÊÇÒ»¸ö32λµÄWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬Ê¹ÓÃGolang±à³ÌÓïÑÔ±àд£¬£¬£¬£¬½ÓÄɵIJÎÊýӦΪÒì»ò£¨XOR£©ºÍÊ®Áù½øÖƱàÂëµÄͳһ×ÊÔ´±êʶ·û£¨URI£©£¬£¬£¬£¬»òÕß¿ÉÒÔʹÓô¿Îı¾URIÔËÐС£¡£¡£¡£¡£¡£¡£Ö´ÐÐʱ£¬£¬£¬£¬Ëü½«Ê¹Óø߼¶¼ÓÃܱê×¼£¨AES£©-128µç×ÓÃÜÂë²¾£¨ECB£©Ëã·¨¶ÔURI¾ÙÐмÓÃÜ£¬£¬£¬£¬²¢Ê¹ÓôÓÊܺ¦ÕßµÄÖ÷»úÃûÌìÉúµÄÃÜÔ¿£¬£¬£¬£¬±ðµÄ»¹»áÍøÂçÓйØÊÜÄ¿µÄϵͳµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/10/29/cisa-and-cnmf-identify-new-malware-variant-zebrocy
2.Netscout·¢Ã÷TrickBotʹÓÃбäÌåÖ÷ÒªÕë¶ÔLinuxϵͳ

Çå¾²¹«Ë¾Netscout·¢Ã÷TrickBotʹÓÃбäÌåÖ÷ÒªÕë¶ÔLinuxϵͳ¡£¡£¡£¡£¡£¡£¡£ÔÚ΢ÈíDefenderÍŶÓÁªºÏ¶à¼ÒÇå¾²¹«Ë¾²ð³ýÁËTrickBot´ó²¿·ÖЧÀÍÆ÷ºó£¬£¬£¬£¬Æä×îÏÈʹÓöñÒâÈí¼þµÄбäÖÖ£¬£¬£¬£¬ÒÔʵÑ齫ÆäÓÃÓÚLinuxϵͳ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Waylon GrangeÓÚ7ÔÂÊ״η¢Ã÷ÁËAnchor_DNSµÄÐÂLinux±äÖÖ£¬£¬£¬£¬²¢½«Æä³ÆÎªAnchor_Linux¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öÇáÁ¿¼¶µÄLinuxºóÃÅ£¬£¬£¬£¬Ö´Ðк󣬣¬£¬£¬Ëü½«×Ô¼º×°ÖÃΪcron£¬£¬£¬£¬È·¶¨Ö÷»úµÄ¹«¹²IPµØµã£¬£¬£¬£¬È»ºó×îÏÈͨ¹ýDNSÅÌÎÊÖ¸ÏòËüµÄC2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110092/cyber-crime/trickbot-linux-variant.html
3.΢Èí³ÆÒÁÀʺڿÍ×éÖ¯APT35ÀÖ³ÉÈëÇÖ¶à¸ö×ÅÃûÈËÊ¿ÓÊÏä

MicrosoftµÄÍþвÇ鱨ÖÐÐÄ£¨MSTIC£©Åû¶£¬£¬£¬£¬ºÚ¿Í×éÖ¯APT35ÀÖ³ÉÈëÇÖ¼ÓÈë½ñÄêĽÄáºÚÇå¾²¾Û»áºÍThink 20£¨T20£©·å»áµÄ¶à¸ö×ÅÃûÈËÊ¿µÄµç×ÓÓʼþÕÊ»§¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñµÄÊܺ¦Õß°üÀ¨Îª¹ú¼ÒÖ¸¶¨È«ÇòÒé³ÌºÍÍâ½»Õþ²ßµÄǰ´óʹºÍÆäËû¸ß¼¶Õþ²ßר¼Ò¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤MSTICµÄÆÊÎö£¬£¬£¬£¬´Ë´Î¹¥»÷ÎªÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬Ö¼ÔÚͨ¹ýÇÔÈ¡Êܺ¦ÕßµÄÓÊÏäÄÚÈݺÍÁªÏµ·½·¨À´ÍøÂçÇ鱨£¬£¬£¬£¬²¢ÌåÏָûÓëÃÀ¹ú´óÑ¡²¢ÎÞ¹ØÏµ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-iranian-attackers-hacked-security-conference-attendees/
4.ºÚ¿Í¿ÉʹÓÃH?rmannÍø¹Ø×°±¸ÖÐÎó²îÔ¶³Ì¿ØÖƳµ¿âÃÅ

SEC ConsultÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ºÚ¿Í¿ÉʹÓÃH?rmannÍø¹Ø×°±¸ÖÐÎó²îÔ¶³Ì¿ØÖƳµ¿âÃÅ¡£¡£¡£¡£¡£¡£¡£H?rmannÊÇÒ»¼ÒµÂ¹ú¹«Ë¾£¬£¬£¬£¬×¨ÃÅ´ÓʼÒÓú͹¤ÒµÃÅ£¬£¬£¬£¬ÊÇÌìϵÚËÄ´óÃÅÀàÖÆÔìÉÌ¡£¡£¡£¡£¡£¡£¡£Çå¾²¹«Ë¾·¢Ã÷¸ÃÍø¹Ø×°±¸¹²ÓÐ15¸öÎó²î£¬£¬£¬£¬°üÀ¨Óë¼ÓÃÜÓйصÄÎÊÌ⡢ͨѶ±£»£»£»£»£»¤²»Á¦ÒÔ¼°Ïà¹ØµÄÒÆ¶¯Ó¦ÓÃÖÐÎó²î¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²î¿É±»ÓÃÀ´¾ÙÐÐÁ½ÖÖ¹¥»÷£¬£¬£¬£¬Ò»ÖÖÊÇÐèÒª»á¼ûÍâµØÍøÂçµÄ¹¥»÷£¬£¬£¬£¬ÁíÒ»ÖÖÊÇ´Ó»¥ÁªÍøÔ¶³ÌÌᳫµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÅþÁ¬µ½ÍâµØÍøÂçµÄ¹¥»÷Õß¿ÉÒÔͨ¹ýÊÖ»úÖ´ÐÐÒ»¸öС¾ç±¾·¿ªH?rmannÃÅ£¬£¬£¬£¬¶øÎÞÐèÒªÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/hackers-can-open-doors-exploiting-vulnerabilities-h%C3%B6rmann-device
5.FireEye³Æ¶«Å·ÍÅ»ïUNC1878ʹÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº

ÍøÂçÇå¾²¹«Ë¾FireEye³Æ¶«Å·ÍÅ»ïUNC1878ʹÓÃRyuk¹¥»÷ÃÀ¹ú¶à¸öÒ½Ôº¡£¡£¡£¡£¡£¡£¡£FireEye¸±×ܲÃCharles CarmakalÌåÏÖ¸Ã×éÖ¯¶ÔÃÀ¹ú¶à¼ÒÒ½Ôº¾ÙÐÐÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ÕâÊÇÒ½ÁÆÐÐÒµÔÚÒßÇéʱ´úÔâµ½µÄ×î¾ßÆÆËðÐÔµÄÍøÂç»î¶¯¡£¡£¡£¡£¡£¡£¡£ÆäÖаüÀ¨±¾ÖܶԶíÀÕ¸ÔÖݵÄSky Lakes Medical CenterµÄ¹¥»÷£¬£¬£¬£¬¶ÔŦԼÖÝÒ½ÔºµÄITÍøÂç¹¥»÷ÆÈʹCanton-Potsdam¡¢MassenaºÍGouverneurÒ½Ôº»Ö¸´Ê¹Óñ¸·Ý³ÌÐò¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/ransomware-hospitals-ryuk-fireeye/
6.ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öÏÂÁî×¢ÈëÎó²î

ÍþÁªÍ¨£¨QNAP£©Åû¶ÆäQTSÖеÄÁ½¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2020-2490ºÍCVE-2020-2492£©¡£¡£¡£¡£¡£¡£¡£QTSÊÇÍøÂ總¼Ó´æ´¢×°±¸µÄ²Ù×÷ϵͳ£¬£¬£¬£¬Ê¹ÓøÃÎó²î¿ÉÔÊÐíí§ÒâÏÂÁîÖ´ÐС£¡£¡£¡£¡£¡£¡£NAS×°±¸¹©Ó¦ÉÌδÌṩÓйØÕâÁ½¸öÎÊÌâµÄÌ«¶àÏêϸÐÅÏ¢£¬£¬£¬£¬µ«ÌåÏÖ×îа汾µÄQTS°üÀ¨±ØÐèµÄ²¹¶¡³ÌÐò£¬£¬£¬£¬Óû§Ö»Òª½«QTS²Ù×÷ϵͳ¸üе½°æ±¾QTS 4.4.3.1421 build 20200907¾Í²»±Øµ£ÐÄ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/qnap-warns-of-new-qts-bugs-that-allow-take-over-of-devices/


¾©¹«Íø°²±¸11010802024551ºÅ