AG¹«Ë¾ÍþвÇ鱨Öܱ¨£¨20200511~20200517£©
2020-05-18
Ò»¡¢Íþвͨ¸æ
- ΢Èí2020Äê5ÔÂÇå¾²¸üжà¸ö²úÆ·¸ßΣÎó²î
¡¾Ðû²¼Ê±¼ä¡¿2020-05-13 10:00:00 GMT
¡¾¸ÅÊö¡¿±±¾©Ê±¼ä5ÔÂ13ÈÕ£¬Î¢ÈíÐû²¼5ÔÂÇå¾²¸üв¹¶¡£¬ÐÞ¸´ÁË111¸öÇå¾²ÎÊÌâ£¬Éæ¼°Microsoft Windows¡¢InternetExplorer¡¢MicrosoftEdge¡¢.NET Framework¡¢MicrosoftOffice¡¢Visual StudioµÈÆÕ±éʹÓõIJúÆ·£¬ÆäÖаüÀ¨ÌØÈ¨ÌáÉýºÍÔ¶³Ì´úÂëÖ´ÐеȸßΣÎó²îÀàÐÍ¡£ ±¾ÔÂ΢ÈíÔ¶ȸüÐÂÐÞ¸´µÄÎó²îÖУ¬ÑÏÖØË®Æ½ÎªÒªº¦£¨Critical£©µÄÎó²î¹²ÓÐ16¸ö£¬Ö÷Òª£¨I mportant£©Îó²îÓÐ95¸ö¡£
¡¾Á´½Ó¡¿http://blog.nsfocus.net/ms-patchday-0513/
¶þ¡¢ÈÈÃÅ×ÊѶ
- Adobe5ÔÂÇå¾²¸üÐÂ
¡¾¸ÅÊö¡¿ÍâµØÊ±¼ä5ÔÂ12ÈÕ£¬Adobe¹Ù·½Ðû²¼ÁË5ÔÂÇå¾²¸üУ¬ÐÞ¸´ÁËAdobe¶à¿î²úÆ·µÄ¶à¸öÎó²î£¬°üÀ¨Adobe DNG Software Development Kit (SDK)ºÍAdobe Acrobat and Reader¡£
¡¾²Î¿¼Á´½Ó¡¿http://blog.nsfocus.net/
- SecureCRTÄÚ´æËð»µÎó²î
¡¾¸ÅÊö¡¿SecureCRT×îа汾8.7.2ÖÐÐÞ¸´ÁËÒ»¸öÄÚ´æËð»µÎó²î£¨CVE-2020-12651£©£¬µ±CSI º¯ÊýÎüÊÕµ½Ò»¸ö´ó¸ºÊý×÷Ϊ²ÎÊýʱ£¬¿ÉÄÜÔÊÐíÔ¶³ÌÏµÍ³ÆÆËðÖÕ¶ËÀú³ÌÖеÄÄڴ棬×îÖÕµ¼ÖÂí§Òâ´úÂëµÄÖ´Ðлò³ÌÐòÍ߽⡣¹¥»÷Õß¿ÉÄÜͨ¹ýÀàËÆSSH bannerµÄ·½·¨Ê¹ÓøÃÎó²î¡£
¡¾²Î¿¼Á´½Ó¡¿http://blog.nsfocus.net/securecrt-0515/
- Mozi ½©Ê¬ÍøÂçÏÖ×´
¡¾¸ÅÊö¡¿×÷ΪÎïÁªÍø½©Ê¬ÍøÂçÔÚP2PÆ«ÏòÑÓÉìµÄ´ú±í£¬MoziľÂíʹÓÃDHTÐÒé×é³ÉÍøÂç½á¹¹£¬ÔÚDHTÍøÂçÄÚ²¿¹¹½¨Mozi-DHT½©Ê¬ÍøÂç¡£×Ô2019Äê±»·¢Ã÷ÒÔÀ´£¬MoziÖÁ½ñÒÀÈ»ÔÚÀ©´óÆä¹æÄ£¡£AG¹«Ë¾·üӰʵÑéÊÒ·¢Ã÷£¬½ñÄê4ÔÂÒÔÀ´MoziµÄÈÕ¾ù¿É̽Ë÷½ÚµãÒѾÁè¼ÝÁË10000¸ö£¬Õ¼ÓÐÁËÕû¸öDHTÍøÂç¹æÄ£µÄ1%ÒÔÉÏ£¬ÕâÅú×¢MoziÒÑÉú³¤³ÉΪÖеȹæÄ£µÄ½©Ê¬ÍøÂ磬¿ÉÒÔ¶ÔÌìϹæÄ£ÄÚµÄÄ¿µÄÓÈÆäÊǺ£ÄÚµÄÍøÂç½Úµã·¢¶¯ÓÐÍþвµÄ¹¥»÷¡£
¡¾²Î¿¼Á´½Ó¡¿http://blog.nsfocus.net/mozi-botnet-0513/
- ÑǿؿƼ¼×é̬ÍõKingView¶à¸öÎó²î
¡¾¸ÅÊö¡¿ÑǿؿƼ¼×é̬ÍõKingView²¿·Ö°æ±¾Öб£´æ¶à¸öÎó²î£¬°üÀ¨ÊµÊ±Êý¾Ý¿â»á¼ûÊÚÈ¨ÈÆ¹ýÎó²îºÍwebÊý¾Ý´«Êä·þÎñ±£´æ¾Ü¾ø·þÎñÎó²î¡£
¡¾²Î¿¼Á´½Ó¡¿http://blog.nsfocus.net/kingview-0515/
- ΢Èí¿ªÔ´COVID-19 ÍþвÇ鱨
¡¾¸ÅÊö¡¿ÔÚÒÔ¹Ú×´²¡¶¾ÎªÖ÷ÌâµÄ¹¥»÷ÊýĿһÁ¬ÔöÌíµÄͬʱ£¬Î¢ÈíÐû²¼¿ª·ÅÆäCOVID-19ÍþвÇ鱨µÄȪԴ£¬ÒÔ×ÊÖúÓû§Ïû³ýÕâЩÍþв¡£
¡¾²Î¿¼Á´½Ó¡¿https://www.microsoft.com/security/blog/2020/05/14/open-sourcing-covid-threat-intelligence/
- Tropic Trooper×é֯ʹÓÃUSBferryÕë¶ÔÎïÀí¸ôÀëÇéÐÎ
¡¾¸ÅÊö¡¿Tropic Trooper×é֝ɯÓÚʹÓÃÒÑÖªµÄÎó²îÏòÄ¿µÄ·¢ËÍ´øÓжñÒ⸽¼þµÄÓã²æÊ½´¹ÂÚÓʼþ¾ÙÐÐÈö²¥£¬ËÅ»ú¾ÙÐÐÐÅϢ͵ÇÔºÍÌØ¹¤Ô˶¯£¬ÆäÖ÷ҪĿµÄ°üÀ¨Ì¨Íå¡¢·ÆÂɱöºÍÏã¸ÛµÄÕþ¸®¡¢¾üÊ¡¢Ò½ÁÆ¡¢½»Í¨ºÍ¸ß¿Æ¼¼¹¤Òµ¡£½üÆÚ¸Ã×é֯ͨ¹ýUSB¶ñÒâÈí¼þUSBferry¹¥»÷̨ÍåºÍ·ÆÂɱö¾ü·½µÄÎïÀí¸ôÀëÍøÂ磬¸Ã¶ñÒâÈí¼þ¿ÉÒÔ¶ÔÌØ¶¨Ä¿µÄÖ´Ðвî±ðµÄÏÂÁ¼á³ÖÒþÉí²¢Í¨¹ýUSB´æ´¢ÇÔÈ¡ÉñÃØÐÅÏ¢»òÇ鱨¡£
¡¾²Î¿¼Á´½Ó¡¿https://blog.trendmicro.com/trendlabs-security-intelligence/tropic-troopers-back-usbferry-attack-targets-air-gapped-environments/
- Hangover×é֯ʹÓÃBackConfigľÂíÕë¶ÔÄÏÑÇÕþ¸®ºÍ¾üÊÂ
¡¾¸ÅÊö¡¿Hangover×éÖ¯Õë¶ÔÄÏÑǵÄÕþ¸®ºÍ¾üÊÂ×éÖ¯ÌᳫÁËÓã²æÊ½´¹ÂÚ¹¥»÷¡£´Ë´Î¹¥»÷ʹÓôøÓÐÐżþ»òÕþ¸®±í¸ñÎļþÒýÓÕÓû§ä¯ÀÀÊܹ¥»÷µÄÍøÕ¾£¬ÕâÐ©ÍøÕ¾ÀïÓÐЯ´øBackConfigľÂíµÄMicrosoft ExcelÎļþ£¬¸Ã¶ñÒâľÂí¾ßÓÐÎÞаµÄ²å¼þϵͳ½á¹¹£¬¿ÉÓÃÓÚÌṩÖÖÖÖ¹¦Ð§µÄ×é¼þ£¬°üÀ¨ÍøÂçϵͳºÍ¼üÅ̼ͼÐÅÏ¢ÒÔ¼°ÉÏÔØºÍÖ´ÐÐÆäËûÓÐÓøºÔصÄÄÜÁ¦¡£Hangover£¬Ò²±»³ÆÎªPatchwork¡¢Dropping Elephant¡¢VICEROY TIGERµÈ£¬ÊÇÒ»¸öÓëÓ¡¶ÈÓйصÄÍþв×éÖ¯¡£
¡¾²Î¿¼Á´½Ó¡¿https://unit42.paloaltonetworks.com/updated-backconfig-malware-targeting-government-and-military-organizations/
- LampionľÂíʹÓÃйÚÒßÇéÕë¶ÔÆÏÌÑÑÀÓû§
¡¾¸ÅÊö¡¿LampionľÂíͨ¹ý·ÂðÆÏÌÑÑÀÕþ¸®ÌṩµÄ¿¹»÷йÚÒßÇéµÄÏà¹Øµç×ÓÓʼþ¾ÙÐзַ¢£¬ÊÕ¼þÈ˵¥»÷µç×ÓÓʼþÖеÄÁ´½Óʱ£¬¶ñÒâÈí¼þ½«´ÓÔÚÏß·þÎñÆ÷ÏÂÔØ¡£¸Ã¶ñÒâÈí¼þÍøÂçÏµÍ³Ò³Ãæ¡¢ÒÑ×°ÖÃÈí¼þ¡¢Webä¯ÀÀÆ÷ÀúÊ·¼Í¼µÈÓû§ÐÅÏ¢£¬»¹ÔÊÐí¹¥»÷Õßͨ¹ýרÃÅÉè¼ÆµÄWeb½çÃæ»á¼ûºÍʹÓÃÊÜѬȾµÄÅÌËã»ú¡£
¡¾²Î¿¼Á´½Ó¡¿https://seguranca-informatica.pt/trojan-lampion-is-back-after-3-months/#.Xrudm2gzaUl
- RamsayÍøÂçÌØ¹¤¹¤¾ßÕë¶ÔÎïÀí¸ôÀëÍøÂçÇÔÈ¡Ãô¸ÐÊý¾Ý
¡¾¸ÅÊö¡¿RamsayÊÇÒ»¸öÐÂÍøÂçÌØ¹¤¿ò¼Ü¹¤¾ß£¬Äܹ»ÔÚÎïÀí¸ôÀëÍøÂçÇéÐÎÖÐÔËÐУ¬ÓÃÓÚÇÔÈ¡ÍøÂçÃô¸ÐÎĵµÊý¾Ý£¬¹¥»÷Ô˶¯ÖÐRamsayʹÓÃCVE-2017-0199¡¢CVE-2017-11882µÄ¶ñÒâÎĵµ»òÐéα7zip×°ÖóÌÐò·Ö·¢¡£Ramsay¶ñÒâÈí¼þÓëDarkhotel×éÖ¯Óйأ¬¸Ã×éÖ¯ÖÁÉÙ×Ô2004ÄêÒÔÀ´´ÓÊÂÍøÂçÌØ¹¤Ô˶¯¡£
¡¾²Î¿¼Á´½Ó¡¿https://www.welivesecurity.com/2020/05/13/ramsay-cyberespionage-toolkit-airgapped-networks/
- 8220ÍÚ¿óľÂí×齨Tsunami½©Ê¬ÍøÂç¾ÙÐÐDDoS¹¥»÷
¡¾¸ÅÊö¡¿“8220”ÍÚ¿óľÂíÉÆÓÚʹÓÃÎó²îÈëÇÖ·þÎñÆ÷£¬Õë¶ÔWindowsϵͳºÍLinuxϵͳ£¬Ê¹ÓÃÍÚ¿óľÂí¾ÙÐÐÃÅÂÞ±ÒÍÚ¿ó¡£½üÆÚ¸ÃľÂíÔÚ¹¥»÷Ô˶¯ÖÐͨ¹ýApache StrutsÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2017-5638£©ºÍTomcatÈõ¿ÚÁî±¬ÆÆÖ²Èë¶à¿îÃÅÂÞ±ÒÍÚ¿óľÂí²¢Èö²¥Tsunami½©Ê¬ÍøÂçľÂí¾ÙÐÐDDoS¹¥»÷¡£
¡¾²Î¿¼Á´½Ó¡¿https://s.tencent.com/research/report/978.html
- ¹¥»÷ÕßʹÓÃJsOutProxľÂíÕë¶ÔÓ¡¶ÈÕþ¸®ºÍ½ðÈÚ»ú¹¹
¡¾¸ÅÊö¡¿¹¥»÷ÕßÕë¶ÔÓ¡¶ÈÕþ¸®»ú¹¹ºÍÒøÐÐÒµ£¬Í¨¹ý´øÓжñÒ⸽¼þµÄÓʼþÈö²¥ÌØÊâ¶ñÒâÈí¼þJsOutProx¡£JsOutProxÊÇÒ»¸ö¾ßÓÐÌØÊâÔ¶³Ì»á¼û¹¦Ð§µÄ¹¤¾ßÏä¡£JsOutProxͨ¹ý¶Ô.NET²å¼þµÄ¼ÓÔØ³ÌÐòʵÏֵĹ²Ïí½Ó¿ÚÓëJavaScriptÄÚºËÊèÉ¢À´ÊµÏÖ×Ô¼ºµÄ¹¦Ð§¡£
¡¾²Î¿¼Á´½Ó¡¿https://www.zscaler.com/blogs/research/targeted-attacks-indian-government-and-financial-institutions-using-jsoutprox-rat

AG¹«Ë¾ÔÆ







