ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ15ÖÜ
Ðû²¼Ê±¼ä 2020-04-14> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2020Äê04ÔÂ06ÈÕÖÁ12ÈÕ¹²ÊÕ¼Çå¾²Îó²î55¸ö£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇBroadcom Advanced Secure Gateway/ProxySGδÊÚȨ»á¼ûÎó²î; Linux kernel drivers/input/input.cÔ½½çдÎó²î£»£»£»£»£»£»£»OpsRamp GatewayĬÈϱàÂëÎó²î£»£»£»£»£»£»£»Synergy Systems & Solutions HUSKY RTU 6049-E70 telnetÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»£»£»SolarWinds Dameware ECDH key½»Á÷»º³åÇøÒç³öÎó²î¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇFireEyeÐû²¼×î½üÊýÄê0dayʹÓÃÇéÐÎµÄÆÊÎö±¨¸æ£»£»£»£»£»£»£»FIN6¼°ÔËÓªTrickBotµÄÍÅ»ïÁªºÏµÄ¹¥»÷»î¶¯£»£»£»£»£»£»£»Äá²´¶ûISP VianetÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬170Íò¿Í»§Êý¾Ýй¶£»£»£»£»£»£»£»¶íÂÞ˹µçÐŹ«Ë¾RostelecomÐ®ÖÆ¶à¸öÆóÒµµÄ»¥ÁªÍøÁ÷Á¿£»£»£»£»£»£»£»Î¢ÈíÐû²¼Emotet¹¥»÷Fabrikam¹«Ë¾µÄ°¸ÀýÑо¿±¨¸æ¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
>Ö÷ÒªÇå¾²Îó²îÁбí
1. Broadcom Advanced Secure Gateway/ProxySGδÊÚȨ»á¼ûÎó²î
Broadcom Advanced Secure Gateway/ProxySG¿ØÖÆÌ¨±£´æ»á»°Ð®ÖÆÎÊÌ⣬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼ûÖÎÀí½Ó¿Ú¡£¡£¡£¡£
https://support.broadcom.com/security-advisory/security-advisory-detail.html?notificationId=SYMSA1752
2. Linux kernel drivers/input/input.cÔ½½çдÎó²î
Linux kernel drivers/input/input.c±£´æÔ½½çдÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬Í¨¹ýÌØÖúµÄkeycode±í´¥·¢£¬£¬£¬£¬£¬£¬£¬ÌáÉýȨÏÞ¡£¡£¡£¡£
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb222aed03d798fc074be55e59d9a112338ee784
3. OpsRamp GatewayĬÈϱàÂëÎó²î
OpsRamp Gateway±£´æÃÜÂëΪpassword 9vt@f3VtµÄÖÎÀíÔ±ÕË»§£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼ûϵͳ¡£¡£¡£¡£
https://www.criticalstart.com/hard-coded-administrator-password-discovered-in-opsramp/
4. Synergy Systems & Solutions HUSKY RTU 6049-E70 telnetÑéÖ¤ÈÆ¹ýÎó²î
Synergy Systems £¦ Solutions HUSKY RTU 6049-E70 telnetЧÀͲ»ÐèÒªÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼û¡£¡£¡£¡£
https://www.us-cert.gov/ics/advisories/icsa-20-042-01
5. SolarWinds Dameware ECDH key½»Á÷»º³åÇøÒç³öÎó²î
SolarWinds Dameware ECDH key½»Á÷´¦Öóͷ£'SigPubkeyLen'±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»£»ò¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://www.tenable.com/security/research/tra-2020-19
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢FireEyeÐû²¼×î½üÊýÄê0dayʹÓÃÇéÐÎµÄÆÊÎö±¨¸æ
FireEye MandiantÍþвÇ鱨ÍŶӼͼµÄ2019Äê0dayʹÓÃÁ¿±ÈǰÈýÄêÖеÄÈκÎÒ»Äê¶¼Òª¶à¡£¡£¡£¡£Ö»¹Ü²¢²»¿É½«Ã¿Ò»¸ö0dayʹÓö¼¹éÒòµ½Ìض¨µÄ¹¥»÷Õߣ¬£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±×¢Öص½Ô½À´Ô½¶àµÄ¹¥»÷Õß»ñµÃÁË0dayʹÓõÄÄÜÁ¦¡£¡£¡£¡£FireEyeÒÔΪ£¬£¬£¬£¬£¬£¬£¬ÕâÖÖ¼¤ÔöÖÁÉÙ²¿·ÖÊÇÓÉÓÚÒ»Ö±Éú³¤µÄ¹ÍÓ¶ºÚ¿ÍÐÐÒµÉú³¤ÆðÀ´µÄ£¬£¬£¬£¬£¬£¬£¬ÕâЩÐÐÒµ¿ª·¢0dayʹÓù¤¾ß²¢½«Æä³öÊÛ¸øÌìϸ÷µØµÄÇ鱨»ú¹¹¡£¡£¡£¡£¹¥»÷ÕßÓë0dayʹÓÃÖ®¼äµÄ×î´óÕϰ²»ÊÇÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬¶øÊÇÏֽ𡣡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬£¬£¬FireEyeÖ¸³öNSO Group¡¢Gamma GroupºÍHacking TeamÊÇÕâÀà³Ð°üÉÌ£¬£¬£¬£¬£¬£¬£¬ÕâЩ³Ð°üÉÌʹһÅúеĹú¼Ò/µØÇøÄܹ»¹ºÖÃ0dayʹÓᣡ£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2020/04/zero-day-exploitation-demonstrates-access-to-money-not-skill.html
2¡¢FIN6¼°ÔËÓªTrickBotµÄÍÅ»ïÁªºÏµÄ¹¥»÷»î¶¯
IBM X-ForceÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÔÚ×î½üµÄÍøÂç¹¥»÷Öз¢Ã÷ÁËFIN6µÄºÛ¼££¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷»î¶¯×î³õʹÓÃTrickBotľÂíѬȾÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬È»ºó×îÖÕÏÂÔØÁËAnchorºóÃÅ¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÕâÁ½¸ö·¸·¨×éÖ¯-TrickBotµÄÔËÓªÍÅ»ïÒÔ¼°FIN6-ÒѾ¾ÙÐÐÏàÖú£¬£¬£¬£¬£¬£¬£¬ÕâÊÇÍøÂç·¸·¨ÕûÌåÏÖÓÐÏàÖúÇ÷ÊÆÖеġ°ÐµÄΣÏÕתÕÛ¡±¡£¡£¡£¡£AnchorÖÁÉÙ¿ÉÒÔ×·Ëݵ½2018Ä꣬£¬£¬£¬£¬£¬£¬ËƺõÊÇÓÉTrickBotµÄÔËÓªÍÅ»ï±àдµÄ¡°¡°¶àºÏÒ»¹¥»÷¿ò¼Ü¡±£¬£¬£¬£¬£¬£¬£¬ËüÓÉÖÖÖÖ×ÓÄ£¿£¿£¿£¿£¿£¿£¿£¿é×é³É£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ×ÊÖú¹¥»÷ÕßÔÚÍøÂçÉϺáÏòÈö²¥£¨ÀýÈç×°ÖúóÃÅ£©¡£¡£¡£¡£Í¬Ê±TrickBotµÄÁíÒ»¸ö¹¤¾ßPowerTrickÖ÷ÒªÓÃÓÚÔÚÊÜѬȾµÄ¸ß¼ÛֵĿµÄ£¨ÀýÈç½ðÈÚ»ú¹¹£©ÄÚ²¿¾ÙÐÐÒþÉí¡¢³¤ÆÚÐÔºÍÕì̽¡£¡£¡£¡£IBM X-ForceÖ¸³öFIN6¼ÓÈëÁËʹÓÃAnchorºÍPowerTrickµÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Æä±£´æµÄ×î´óÖ¸±êÊǹ¥»÷ÖÐʹÓõÄ×°ÔØ³ÌÐò£¨Terraloader£©ºÍºóÃÅ£¨More_eggs£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/fin6-and-trickbot-combine-forces-in-anchor-attacks/154508/
3¡¢Äá²´¶ûISP VianetÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬170Íò¿Í»§Êý¾Ýй¶
Äá²´¶û»¥ÁªÍøÐ§ÀÍÌṩÉÌVianet CommunicationsÈ·ÈÏÆäÐÅϢϵͳÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢±»ÇÔ¡£¡£¡£¡£ºÚ¿ÍÔÚTwitterÕÊ»§ÉÏÉù³ÆÇÔÈ¡ÁË170ÍòVianet¿Í»§µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨ËûÃǵÄÐÕÃû¡¢ÊÖ»úºÅÂë¡¢µØµãºÍµç×ÓÓʼþµØµã¡£¡£¡£¡£ºÚ¿ÍµÄÍÆÎÄÖл¹°üÀ¨ÍйÜÔÚÑó´ÐÍøÂçÉϵÄй¶Êý¾ÝÁ´½Ó¡£¡£¡£¡£VianetÔÚÆä¹Ù·½ÉùÃ÷ÖÐÈ·ÈÏÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÒѾȷ¶¨ÁËй¶µÄȪԴºÍ½ÓÄÉÊʵ±µÄ²½·¥À´ÔöÇ¿Çå¾²ÐÔ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.nepalitelecom.com/2020/04/vianet-customer-data-leaks-hack.html
4¡¢¶íÂÞ˹µçÐŹ«Ë¾RostelecomÐ®ÖÆ¶à¸öÆóÒµµÄ»¥ÁªÍøÁ÷Á¿
4ÔÂ1ÈÕ¶íÂÞ˹µçÐŹ«Ë¾RostelecomÐ®ÖÆÁ˹ȸèµÈ¹«Ë¾µÄ»¥ÁªÍøÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÌìÏÂÉÏ×î´óµÄ200¶à¸öCDNÍøÂç¼°ÔÆÍйÜЧÀÍÉÌ£¬£¬£¬£¬£¬£¬£¬Ò»Á¬ÁËԼĪ1¸öСʱ¡£¡£¡£¡£ÊÜÓ°ÏìµÄÆóÒµ°üÀ¨¹È¸è¡¢ÑÇÂíÑ·¡¢Facebook¡¢Akamai¡¢Cloudflare¡¢GoDaddy¡¢Digital Ocean¡¢Joyent¡¢LeaseWeb¡¢HetznerºÍLinodeµÈ×ÅÃû¹«Ë¾¡£¡£¡£¡£ÕâÊÇÒ»´Îµä·¶µÄBGPÐ®ÖÆÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñµÄÔµ¹ÊÔÓÉ¿ÉÄÜÊÇRostelecomµÄÄÚ²¿Á÷Á¿ÐÞÕýϵͳ¹ýʧµØ½«²»×¼È·µÄBGP·ÓÉ̻¶ÔÚ¹«ÍøÉÏ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ±»ÉÏÓι©Ó¦É̹㲥Ôì³ÉµÄ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/russian-telco-hijacks-internet-traffic-for-google-aws-cloudflare-and-others/
5¡¢Î¢ÈíÐû²¼Emotet¹¥»÷Fabrikam¹«Ë¾µÄ°¸ÀýÑо¿±¨¸æ
΢ÈíÔÚ¼ì²âºÍÏìӦС×飨DART£©°¸Àý±¨¸æ002ÖзÖÏíÁËFabrikam¹«Ë¾ÔâÊÜEmotet¹¥»÷µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¸Ã¹¥»÷ʼÓÚÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬µ±ÄÚ²¿Ô±¹¤»á¼ûÁË´¹ÂÚÐÅÏ¢ºó£¬£¬£¬£¬£¬£¬£¬EmotetѬȾÁËÆäϵͳ²¢ºáÏòѬȾÁËÍ³Ò»ÍøÂçÖÐµÄÆäËüϵͳ¡£¡£¡£¡£¸Ã²¡¶¾×èÖ¹ÁËͨ¹ýÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¨C2£©¾ÙÐа´ÆÚ¸üжø±»·À²¡¶¾½â¾ö¼Æ»®¼ì²âµ½µÄÇéÐΣ¬£¬£¬£¬£¬£¬£¬²¢ÇÒͨ¹ýʹWindowsÉè±¹ØÁ¬ÄCPUʹÓÃÂʵִﱥºÍÀ´×èÖ¹½¹µãЧÀÍ£¬£¬£¬£¬£¬£¬£¬µ¼Ö¸Ã×éÖ¯µÄ»ù±¾Ð§ÀͺÍÍøÂçÖÐÖ¹ÁË¿ìÒªÒ»ÖܵÄʱ¼ä¡£¡£¡£¡£CPUʹÓÃÂÊÒ»Ö±±¥ºÍʹµÃÅÌËã»ú¹ýÈÈ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÄÚ²¿ÏµÍ³¿¨ËÀ¡¢ÖØÆôºÍÍøÂçÅþÁ¬Ï½µ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýÇÔÈ¡ÖÎÀíÔ±ÕÊ»§Æ¾Ö¤¾ÙÐкáÏòÒÆ¶¯£¬£¬£¬£¬£¬£¬£¬ÔÚ×î³õѬȾºóµÄ8ÌìÖ®ÄÚ£¬£¬£¬£¬£¬£¬£¬FabrikamµÄÕû¸öÍøÂç¾Í±»¹Ø±ÕÁË¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.microsoft.com/security/blog/wp-content/uploads/2020/04/Case-study_Full-Operational-Shutdown.pdf


¾©¹«Íø°²±¸11010802024551ºÅ