AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.06.08-2020.06.14£©
2020-06-15
Ò»¡¢ Íþвͨ¸æ
΢Èí2020Äê6ÔÂÇå¾²¸üжà¸ö²úÆ·¸ßΣÎó²î
¡¾Ðû²¼Ê±¼ä¡¿2020-06-10 09:00:00 GMT
¡¾¸ÅÊö¡¿
±±¾©Ê±¼ä6ÔÂ10ÈÕ£¬Î¢ÈíÐû²¼6ÔÂÇå¾²¸üв¹¶¡£¬ÐÞ¸´ÁË130¸öÇå¾²ÎÊÌâ£¬Éæ¼°Micros oft Windows¡¢InternetExplorer¡¢MicrosoftEdge¡¢WindowsDefender¡¢MicrosoftOffice¡¢Visual Studio¡¢AdobeFlashPlayerµÈÆÕ±éʹÓõIJúÆ·£¬ÆäÖаüÀ¨ÄÚ´æÐ¹Â¶ºÍÔ¶³Ì´úÂëÖ´ÐеȸßΣÎó²îÀàÐÍ¡£ ±¾ÔÂ΢ÈíÔ¶ȸüÐÂÐÞ¸´µÄÎó²îÖУ¬ÑÏÖØË®Æ½ÎªÒªº¦£¨Critical£©µÄÎó²î¹²ÓÐ12¸ö£¬Ö÷Òª£¨Important£©Îó²îÓÐ118¸ö¡£ÕâÊÇ΢ÈíÓÐÊ·ÒÔÀ´ÔÚÒ»¸öÔÂÄÚÐû²¼CVEÊýÄ¿×î¶àµÄÒ»´Î£¬ÆäÖÐWindowsSMBÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-1301£©ÓëWindowsSMBv3¿Í»§¶Ë/·þÎñÆ÷ÐÅÏ¢×ß©Îó²î£¨CVE-2020-1206£©µÄPoCÒѹûÕæ¡£
¡¾Á´½Ó¡¿
http://blog.nsfocus.net/ms-security-update-0610/
¶þ¡¢ ÈÈÃÅ×ÊѶ
1. Adobe 2020Äê6ÔÂÇå¾²¸üÐÂ
¡¾¸ÅÊö¡¿
ÍâµØÊ±¼ä2020Äê6ÔÂ10ÈÕ£¬Adobe¹Ù·½Ðû²¼ÁË6ÔÂÇå¾²¸üУ¬ÐÞ¸´ÁËAdobe ¶à¿î²úÆ·µÄ¶à¸öÎó²î£¬°üÀ¨Adobe Framemaker¡¢Adobe Experience ManagerºÍAdobe Flash Player¡£
¡¾²Î¿¼Á´½Ó¡¿
http://blog.nsfocus.net/adobe-security-update-0610/
2. ¹¥»÷ÕßʹÓÃUser-Agent: AbcdѬȾ¶à¿î·ÓÉÆ÷ºÍÊÓÆµ¼à¿Ø×°±¸
¡¾¸ÅÊö¡¿
½üÆÚͨ¹ýAG¹«Ë¾Íþв²¶»ñϵͳ£¬ÎÒÃÇ·¢Ã÷ÁËÒ»Åú¾ßÓÐÌØ¶¨ÐÐΪºÍÄ¿µÄµÄ¹¥»÷Õߣ¬Æä¹¥»÷ËùÓÃHTTPÇëÇó°üÖеÄUser-Agent×Ö¶ÎÍùÍùÊÇÈ·¶¨ÄÚÈÝ£º“Abcd”£¬ Ö÷ҪѬȾĿµÄÉæ¼°¶à¿î·ÓÉÆ÷ºÍÊÓÆµ¼à¿Ø×°±¸¡£ÕâЩ¹¥»÷Õß´Ó5Ô·ݷºÆð»îÔ¾ÖÁ½ñ£¬½üÆÚÒÀÈ»²¶»ñµ½ÆäͶµÝÑù±¾µÄÐÐΪ£¬ÊÜÓ°ÏìµÄÎïÁªÍø×ʲú°üÀ¨AXISÉãÏñÍ·¡¢¾Å°²ÉãÏñÍ·¡¢TVTÉãÏñÍ·¡¢LILIN DVR¡¢ipTIME·ÓÉÆ÷ÒÔ¼°¶à¿î±£´æDNSÐ®ÖÆÎó²îµÄ·ÓÉÆ÷¡£
¡¾²Î¿¼Á´½Ó¡¿
http://blog.nsfocus.net/
3. Õë¶ÔGithubÖÐJavaÏîÄ¿µÄ¶¨Ïò¹¥»÷
¡¾¸ÅÊö¡¿
2020Äê5ÔÂ28ÈÕ£¬GithubÇå¾²ÍŶӽÒÏþÁËÎÄÕ³ÆGithubÉϱ£´æÒ»×é´úÂë¿ÍÕ»ÕýÔÚ·þÎñÓÚѬȾÁ˶ñÒâ´úÂëµÄ¿ªÔ´ÏîÄ¿£¨https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain£©£¬¹¥»÷Õßͨ¹ýÌá½»¶ñÒâ´úÂëÖÁ¿ªÔ´ÏîÄ¿£¬²¢±»ÆäËû¿ªÔ´ÏîÄ¿ËùÒýÓᣱ¾´Î¹©Ó¦Á´¹¥»÷Õë¶ÔµÄÊǾ³£Ê¹ÓÿªÔ´ÏîÄ¿µÄ¿ª·¢Ö°Ô±¡£Í¨¹ýѬȾ¿ª·¢Ö°Ô±Ê¹ÓõÄIDE£¨¼¯³É¿ª·¢ÇéÐΣ©£¬ÒÔµÖ´ïÔÚ¿ª·¢Ö°Ô±¿ª·¢µÄËùÓÐÏîĿֲÈëÓжñÒâÈí¼þµÄÄ¿µÄ¡£ÏÖÔÚÀ´¿´£¬¸Ã¹¥»÷ÕßÖ»Õë¶ÔJAVAÏîÄ¿¡£
¡¾²Î¿¼Á´½Ó¡¿
http://blog.nsfocus.net/github-ocs-0605/
4. TA410×é֯ʹÓöñÒâÈí¼þFlowCloudÕë¶ÔÃÀ¹ú¹«ÓÃÊÂÒµÌṩÉÌ
¡¾¸ÅÊö¡¿
TA410×éÖ¯½üÆÚÕë¶ÔÃÀ¹ú¹«ÓÃÊÂÒµÌṩÉÌÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬´Ë´Î¹¥»÷ÒÔÅàѵºÍÈÏ֤ΪÖ÷ÌâÓʼþ×÷ΪÓÕ¶ü£¬Í¨¹ý±ãЯʽ¿ÉÖ´Ðи½¼þºÍ¸ºÔØÓдó×ÚºêµÄMicrosoft WordÎĵµ×ª´ïÄ£¿é»¯µÄ¶ñÒâÈí¼þFlowCloud¡£FlowCloud¶ñÒâÈí¼þÄܹ»Æ¾Ö¤»á¼û¼ôÌù°å¡¢ÒÑ×°ÖõÄÓ¦ÓóÌÐò¡¢¼üÅÌ¡¢Êó±ê¡¢ÆÁÄ»¡¢Îļþ¡¢·þÎñºÍÀú³ÌµÈÏÂÁîÌṩԶ³Ì»á¼û¹¦Ð§£¬²¢C&C´«ÊäÐÅÏ¢¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.proofpoint.com/us/blog/threat-insight/ta410-group-behind-lookback-attacks-against-us-utilities-sector-returns-new
5. Gamaredon×é֯ʹÓÃOutlookȺ·¢Óã²æÓʼþ
¡¾¸ÅÊö¡¿
Gamaredon¶ñÒâ×éÖ¯Ö÷ÒªÕë¶ÔÎÚ¿ËÀ¼µÄ»ú¹¹£¬Ê¹ÓþßÓн«¶ñÒâºêºÍÔ¶³ÌÄ£°å×¢ÈëÏÖÓÐOfficeÎĵµµÄ¹¦Ð§µÄ¹¤¾ß¡£ÕâЩ¹¤¾ß¿ÉÒÔÏòÊܺ¦ÕßµÄMicrosoft OfficeͨѶ²¾ÖеÄÁªÏµÈË·¢ËÍÓã²æÊ½µç×ÓÓʼþ£¬Ö¼ÔÚ´ÓÊÜѬȾµÄϵͳÖÐÍøÂçÃô¸ÐÐÅÏ¢²¢½øÒ»²½Èö²¥£¬Ö÷ÒªÊÇÔÚÊÔͼÇÔÈ¡Êý¾ÝµÄͬʱÔÚÄ¿µÄÍøÂçÖо¡¿ÉÄÜ¿ìµØÈö²¥¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.welivesecurity.com/2020/06/11/gamaredon-group-grows-its-game/
6. Dark Basin×éÖ¯ÔÚÈ«Çò·¢¶¯´ó¹æÄ£ÍøÂç´¹ÂÚ¹¥»÷
¡¾¸ÅÊö¡¿
Dark BasinÊÇÒ»¸öÒÔÈëÇÖΪĿµÄµÄºÚ¿Í×éÖ¯£¬Ä¿µÄȺÌåÊÇÁù´óÖÞµÄÊýǧСÎÒ˽¼ÒºÍÊý°Ù¼Ò»ú¹¹£¬°üÀ¨Ðû´«ÕûÌåºÍ¼ÇÕß¡¢ÃñÑ¡ºÍ¸ß¼¶Õþ¸®¹ÙÔ±£¬½ðÈÚÒÔ¼°ÆäËû¶à¸öÐÐÒµ¡£Dark Basin×é֯ͨ¹ýGmailÕÊ»§ºÍ×ÔÍÐ»á¼Æ»§µÈÏòÄ¿µÄ·¢ËÍ´øÓжñÒâÁ´½ÓµÄÍøÂç´¹ÂÚµç×ÓÓʼþ£¬²¢ÇÒʹÓÃURLËõ¶ÌÆ÷À´ÑÚÊδ¹ÂÚÍøÕ¾£¬ÆäÄ¿µÄÊǾÙÐÐÇé±¨ÍøÂç¡£
¡¾²Î¿¼Á´½Ó¡¿
https://citizenlab.ca/2020/06/dark-basin-uncovering-a-massive-hack-for-hire-operation/
7. Valak¶ñÒâÈí¼þʹÓÃÎÞÎļþ¾ç±¾Ñ¬È¾×°±¸
¡¾¸ÅÊö¡¿
ValakÊÇ»ùÓھ籾µÄ¶à½×¶Î¶ñÒâÈí¼þ£¬¸ÃÈí¼þͨ¹ýǶÈë¶ñÒâURL»ò¸½¼þµÄµç×ÓÓʼþ¾ÙÐÐÈö²¥£¬²¢Ê¹ÓÃÎÞÎļþ¾ç±¾Ñ¬È¾×°±¸£¬¹¥»÷Ô˶¯ÖÐValak¶ñÒâÈí¼þ´ÓÕÊ»§ÖÐÍøÂçµç×ÓÓʼþ£¬ÆäÖеç×ÓÓʼþƾ֤²å¼þCLIENTGRABBER»¹ÓÃÓÚ´Ó×¢²á±íÖÐÇÔÈ¡µç×ÓÓʼþƾ֤¡£
¡¾²Î¿¼Á´½Ó¡¿
https://labs.sentinelone.com/valak-malware-and-the-connection-to-gozi-loader-confcrew/
8. Kingminer½©Ê¬ÍøÂçʹÓù«¹²ÁìÓòµÄ¹¤¾ß·Ö·¢²É¿ó»ú
¡¾¸ÅÊö¡¿
Kingminerͨ¹ý¶ÔSQL ServerµÄÓû§Ãû/ÃÜÂëºÍEternalBlueÎó²î¾ÙÐÐÈö²¥£¬Ê¹Óÿª·ÅÔ´´úÂë»ò¹«¹²ÁìÓòµÄÈí¼þÀ´Íйܽ»¸¶µÄÄÚÈÝ£¬²¢ÇÒʹÓÃÌØÈ¨ÌáÉýÎó²îÌá¸ß×Ô¼ºµÄȨÏÞ£¬Ñ¬È¾Àֳɺó·Ö·¢XMRig¿ó»úµÄ±äÌå¡£
¡¾²Î¿¼Á´½Ó¡¿
https://news.sophos.com/en-us/2020/06/09/kingminer-report/
9. Tor2Mine×éÖ¯°²ÅÅAZORultµÈ¶ñÒâÈí¼þ
¡¾¸ÅÊö¡¿
Tor2MineÊÇÒ»¸öÒÔÌṩ¼ÓÃÜÇ®±ÒÍÚ¿ó¶ñÒâÈí¼þ¶øÖøÃûµÄ×éÖ¯£¬¸Ã×éÖ¯ÕýÔÚ°²ÅÅÆäËû¶ñÒâÈí¼þ£¬°üÀ¨ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þAZORult£¬Ô¶³Ì»á¼û¹¤¾ßRemcos£¬DarkVNCºóÃÅľÂíºÍ¼ôÌù°åÉϵļÓÃÜÇ®±Ò͵ÇÔÕßÓÃÀ´¼¯Æ¾Ö¤²¢ÇÔÈ¡¸ü¶àÇ®¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.talosintelligence.com/2020/06/tor2mine-is-up-to-their-old-tricks-and_11.html
10. EKANSÀÕË÷Èí¼þÕë¶Ô¹¤Òµ¿ØÖÆÏµÍ³
¡¾¸ÅÊö¡¿
EKANSÀÕË÷Èí¼þÔÚ2020Äê1ÔÂÊ״α»·¢Ã÷£¬½üÆÚ·¢Ã÷EKANSÕë¶Ô¹¤Òµ¿ØÖÆÏµÍ³ICSµÄ¹¥»÷Ô˶¯£¬HondaºÍEnelµÈ×ÅÃû³§É̾ùÊܵ½Ó°Ïì¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.malwarebytes.com/threat-analysis/2020/06/honda-and-enel-impacted-by-cyber-attack-suspected-to-be-ransomware/
11. RagnarLockerÀÕË÷Èí¼þ¹¥»÷ÆóÒµÓû§
¡¾¸ÅÊö¡¿
RagnarLockerÀÕË÷Èí¼þµÄ´úÂëÁ¿Ð¡£¬ÒԸ߼¶±à³ÌÓïÑÔ¾ÙÐбàÂ룬ĿµÄÊǶÔËü¿ÉÒÔ¼ÓÃܵÄËùÓÐÎļþ¼ÓÃܲ¢¾ÙÐÐÀÕË÷¡£½üÆÚRagnarLockerÀÕË÷Èí¼þ¹¥»÷ÆóÒµÓû§£¬È»ºóÒªÇóÀÕË÷½ü1100ÍòÃÀÔªµÄÊê½ð»»È¡Î´Ð¹Â¶´Ó¹«Ë¾ÇÔÈ¡µÄÐÅÏ¢¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.mcafee.com//blogs/other-blogs/mcafee-labs/ragnarlocker-ransomware-threatens-to-release-confidential-information/
12. Phorphiex/Trik½©Ê¬ÍøÂç·Ö·¢ÀÕË÷Èí¼þAvaddon
¡¾¸ÅÊö¡¿
½üÆÚÔÚPhorphiex/Trik½©Ê¬ÍøÂçÔ˶¯ÖУ¬¹¥»÷ÕßʹÓô¹ÂÚÓʼþ·Ö·¢ÀÕË÷Èí¼þAvaddon£¬ÊÜѬȾµÄÓû§»úе±»¼ÓÃܵÄÎļþÀ©Õ¹ÃûΪ.avdn£¬²¢ÔÚ×ÀÃæÉÏÁôÏÂ×ÔÊöÎļþ£¬¶¨Ïòµ½Ò»¸ö°µÍøµØµã£¬ÒÔÖ¸µ¼Êܺ¦Õß½øÒ»²½»ñÈ¡½âÃÜÐÅÏ¢¡£
¡¾²Î¿¼Á´½Ó¡¿
https://appriver.com/resources/blog/june-2020/phorphiextrik-botnet-delivers-avaddon-ransomware
13. Higaisa×é֯ʹÓöñÒâLNKÎļþÕë¶ÔÖйúÓû§
¡¾¸ÅÊö¡¿
Higaisa×éÖ¯½üÆÚÕë¶ÔÖйúÓû§Ê¹ÓðüÀ¨ÓÕÆÎļþµÄLNKÎļþÈö²¥¶ñÒâºóÃÅ£¬ÓÕ¶üÄÚÈÝ×÷ΪInternet¿ì½Ý·½·¨Îļþ»òPDFÎļþÏÔʾ£¬²¢ÔÚºǫִ́ÐжñÒâÔ˶¯Ê±ÏÔʾ¸øÓû§£¬¸ÃºóÃÅʹÓÃÖØ´óµÄÓÕÆÐÔÊÖÒÕ£¬Ö¼ÔÚ¹æ±ÜÇå¾²¼ì²â¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.zscaler.com/blogs/research/return-higaisa-apt
14. QakBot±äÖÖͨ¹ýÍøÂç´¹ÂÚÓʼþÈö²¥
¡¾¸ÅÊö¡¿
QBotľÂí£¬Ò²³ÆÎªQakBot£¬Í¨¹ý´øÓÐMS Office WordÎĵµµÄÍøÂç´¹ÂÚµç×ÓÓʼþ¾ÙÐÐÈö²¥£¬²¢ÇÒ¿ÉÒÔÒþ²Ø×Ô¼º²»±»Ê¶±ð¡£¸Ã¶ñÒâÈí¼þ×î³õ±»³ÆÎª½ðÈÚ¶ñÒâÈí¼þ£¬Ö¼ÔÚͨ¹ýÇÔÈ¡Óû§Æ¾Ö¤ºÍ»÷¼üÀ´Õë¶ÔÕþ¸®ºÍÆóÒµ¾ÙÐнðÈÚڲơ£
¡¾²Î¿¼Á´½Ó¡¿
https://www.fortinet.com/blog/threat-research/deep-analysis-of-a-qbot-campaign-part-1

AG¹«Ë¾ÔÆ







