AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Öܱ¨£¨2020.08.17-2020.08.23£©
2020-08-24
Ò»¡¢ Íþвͨ¸æ
ÉîÐÅ·þÖն˼ì²âƽ̨£¨EDR£©Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î´¦Öóͷ£ÊÖ²á
¡¾Ðû²¼Ê±¼ä¡¿2020-08-19 14:00:00 GMT
¡¾¸ÅÊö¡¿
2020 Äê 8 Ô 18 ÈÕ£¬¹ú¼ÒÐÅÏ¢Çå¾²Îó²î¹²ÏíÆ½Ì¨£¨CNVD£©ÊÕ¼ÁËÉîÐÅ·þÖն˼ì²âÏìӦƽ̨£¨EDR£©Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î£¨CNVD-2020-46552£©¡£Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓøÃÎó²î£¬¿ÉÏòÄ¿µÄ·þÎñÆ÷·¢ËͶñÒâ½á¹¹µÄ HTTP ÇëÇ󣬴Ӷø»ñµÃÄ¿µÄ·þÎñÆ÷µÄȨÏÞ£¬ÊµÏÖÔ¶³ÌÖ´ÐÐϵͳÏÂÁî¡£
¡¾Á´½Ó¡¿
https://www.cnvd.org.cn/webinfo/show/5677
¶þ¡¢ ÈÈÃÅ×ÊѶ
1. DeepfakeÍøÂç´¹ÂÚ
¡¾¸ÅÊö¡¿
DeepfakeÊÇÐÎòÈ˹¤ÖÇÄܸ͝ÊÓÆµºÍÒôƵ¼Í¼µÄЧ¹û¡£DeepfakeÍøÂç´¹ÂÚ£¬ÊÇÕë¶ÔÌØ¶¨Ö°Ô±µÄ£¬ÆäÀÖ³ÉÂÊÉõÖÁ¸ßÓÚÒ»Ñùƽ³£´¹ÂÚµç×ÓÓʼþ¡£×î½üÓмÒÕ©ÆÕßʹÓÃDeepfakeÍøÂç´¹ÂÚ£¬ÖÆ×÷ÁË´øÄ³¹«Ë¾Ê×ϯִÐйÙÉùÒôµÄ¼Òô£¬Òò´Ë»ñµÃÁË243,000ÃÀÔª¡£ÏÖÔÚ£¬Deepfake¼ì²âÈí¼þ¿ÉÒÔΪĿµÄÃ÷È·µÄÖ°Ô±£¨ÀýÈçÕþ¿Í£©Á¿Éí¶¨ÖÆÌØ¶¨µÄ¼ì²âÄ£×Ó¡£¿ÉÊÇ£¬¹ØÓÚ²»Ñ°³£µÄÇëÇó£¬×ÝÈ»ÊÇÀ´×ÔÆä¹ÍÖ÷»òÊìϤµÄÈ˵ÄÇëÇó£¬ÈËÃÇÒ²Ó¦¼á³ÖÉóÉ÷¡£
¡¾²Î¿¼Á´½Ó¡¿
2. Pagodo-×Ô¶¯»¯GoogleºÚ¿ÍÊý¾Ý¿âץȡºÍËÑË÷
¡¾¸ÅÊö¡¿
PagodoµÄÄ¿µÄÊÇ¿ª·¢Ò»¸ö±»¶¯µÄGoogle dork¾ç±¾£¬ÒÔÍøÂçInternetÉÏDZÔÚµÄÒ×Êܹ¥»÷µÄÍøÒ³ºÍÓ¦ÓóÌÐò¡£ÓÐ2¸ö²¿·Ö¡£µÚÒ»¸öÊÇghdb_scraper.py£¬Ëü¼ìË÷Google Dorks£¬ÆäÊÇGoogleËÑË÷µÄÜöÝÍ£¬¿ÉÓÃÓÚ²éÕÒDZÔÚµÄÒ×Êܹ¥»÷µÄºÐ×Ó»òÆäËûÓÉGoogleµÄËÑË÷»úеÈË»ñÈ¡µÄÐÅÏ¢£»µÚ¶þ¸ö²¿·ÖÊÇpagodo.py£¬ËüȨºâghdb_scraper.pyÍøÂçµÄÐÅÏ¢¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.kitploit.com/2020/08/pagodo-automate-google-hacking-database.html
3. ΪWannaRenÀÕË÷Èí¼þÐû²¼µÄ½âÃܹ¤¾ß
¡¾¸ÅÊö¡¿
BitdefenderÇå¾²Ñо¿Ö°Ô±Ðû²¼ÁËÒ»ÖÖ½âÃܹ¤¾ß£¬Ê¹WannaRenÀÕË÷Èí¼þµÄÊܺ¦ÕßÄܹ»Ãâ·Ñ»Ö¸´ÆäÎļþ¡£ 8ÔÂ19ÈÕ£¬BitdefenderÐû²¼ÒѹûÕæÌṩWannaRen½âÃÜÊÊÓóÌÐò¹©ÏÂÔØ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.tripwire.com/state-of-security/security-data-protection/decryption-tool-released-for-wannaren-ransomware/
4. ÎÚ¿ËÀ¼¾¯·½¾Ð²¶ÓëÀÕË÷¡¢Ï´Ç®ÓйصļÓÃÜÍÅ»ï
¡¾¸ÅÊö¡¿
¼ÓÃÜÇ®±ÒÉúÒâËùBinanceÐÖúÎÚ¿ËÀ¼¾¯·½ÊӲ죬¾Ð²¶ÁËÈýÃûÉæÏÓΪÀÕË÷Èí¼þºÚ°ïÏ´Ç®µÄ×éÖ¯³ÉÔ±¡£¸Ã×éÖ¯×Ô2018ÄêÒÔÀ´Ò»Ö±ÔÚÎÚ¿ËÀ¼µÄ²¨¶ûËþÍßµØÇø£¬ÎªÀÕË÷Èí¼þÕûÌåÏ´Ç®²¢×ÔÐÐÈö²¥ÀÕË÷Èí¼þ£¬ÒѾϴ½ÙÁËÓëÀÕË÷Èí¼þÏà¹ØµÄ¼ÛÖµÁè¼Ý4,200ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£ÕâÊÇ·Àµ¯½»Á÷ÏîÄ¿µÄÊÂÇéÒýÆðµÄµÚÒ»´Î¾Ð²¶£¬ÆäÄ¿µÄÊÇʶ±ð¼ÓÃÜÇ®±ÒÁìÓòÄڵĶñÒâÔ˶¯ÖÐÐÄ£¬×·×ÙÔËÓªÉÌ£¬²¢ÓëÕþ¸®ÏàÖú½«Æä¹Ø±Õ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.binarydefense.com/threat_watch/ukrainian-police-arrest-crypto-gang-linked-to-ransomware-money-laundering/
5. ÑÇÂíÑ·Alexa±»±¬¶à¸öÎó²î
¡¾¸ÅÊö¡¿
CheckpointÑо¿Ö°Ô±ÆÊÎö·¢Ã÷²¿·ÖAmazon/Alexa ×ÓÓòÃû±£´æCORS£¨¿çÓò×ÊÔ´¹²Ïí£©ÎóÉèÖúͿçÕ¾¾ç±¾Îó²î¡£¹¥»÷ÕßʹÓÃXSS¿ÉÒÔ»ñÈ¡CSRF token£¬²¢ÒÔÊܺ¦ÕßÃûÒåÖ´ÐÐÐж¯¡£
¡¾²Î¿¼Á´½Ó¡¿
6. ÃÀ¹úÆÏÌѾƾÞÍ·ÔâÊÜÍøÂç¹¥»÷£¬±»ÍµÇÔ1TBÊý¾Ý
¡¾¸ÅÊö¡¿
REvilÀÕË÷Èí¼þÔËÓªÉÌÖÜÎåÐû²¼£¬ËûÃÇÒÑ¾ÆÆËðÁ˲¼ÀÊ·¸£¶ûÂüµÄÅÌËã»úÍøÂç¡£²¼ÀÊ·¸£¶ûÂüÊÇÃÀ¹úÆÏÌѾÆÓªÒµ×î´óµÄ¹«Ë¾Ö®Ò»£¬ÄêÏúÊÛÊÕÈë20¶àÒÚÃÀ½ð¡£ÈëÇÖÖ®ºó£¬¹¥»÷ÕßÉù³ÆËûÃÇÇÔÈ¡ÁË1TBÊý¾Ý£¬ÆäÖаüÀ¨¹«Ë¾ÐÒé¡¢ÌõÔ¼¡¢²ÆÎñ±¨±íºÍÄÚ²¿Í¨Ñ¶µÄÉñÃØÐÅÏ¢¡£ÔÚÆä×ß©վµãÉϵÄÌû×ÓÖУ¬REvilÐû²¼Á˶à¸öÆÁÄ»¿ìÕÕ£¬Í¼Æ¬ÏÔʾµÄÎļþ¿É×·Ëݵ½2009Äê¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.anquanke.com/post/id/214568
7. AWSÃÜÂëÐ®ÖÆÈ䳿ÔÚÔÆ¶ËÉìÕÅ
¡¾¸ÅÊö¡¿
À´×ÔTeamTNT×éÖ¯µÄÒ»ÖÖ¼ÓÃܲɿóÈ䳿ÕýÔÚAmazon Web Services£¨AWS£©ÔÆÖÐÈö²¥²¢ÍøÂçÆ¾Ö¤¡£Ò»µ©ÍøÂçµ½µÇ¼ÐÅÏ¢£¬¸Ã¶ñÒâÈí¼þ¾Í»áµÇ¼²¢°²ÅÅXMRigÍÚ¾ò¹¤¾ßÀ´ÍÚ¾òMonero¼ÓÃÜÇ®±Ò¡£Æ¾Ö¤Cado SecurityµÄÑо¿Ö°Ô±Ëù˵£¬ÕâÊÇÔÚÒ°ÍâÊӲ쵽µÄµÚÒ»¸öÍþв£¬×¨ÃÅÕë¶ÔAWSÒÔ¾ÙÐÐÃÜÂëÐ®ÖÆ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://threatpost.com/aws-cryptojacking-worm-cloud/158427
8. ÔÚWindowsÖ®ºó£¬Lucifer¶ñÒâÈí¼þÓÖÖØÐ·ºÆðÔÚLinux×°±¸ÉÏ
¡¾¸ÅÊö¡¿
Lucifer¶ñÒâÈí¼þÄܹ»¾ÙÐÐDDoS¹¥»÷²¢´ÓÄ¿µÄ×°±¸ÖÐÍÚ¾òMonero¼ÓÃÜÇ®±Ò¡£³ýÁËWindows°æ±¾ÖеĹ¦Ð§£¨ÈçÃÜÂëÐ®ÖÆ£©Í⣬еÄLinux°æ±¾»¹¾ßÓÐʹËüÄܹ»Ê¹ÓÃÃûΪMIMIKATZµÄ¹¤¾ßÀ´ÇÔÈ¡Óû§Æ¾Ö¤µÄ¹¦Ð§¡£±ðµÄ£¬»¹¿ÉÒÔÌᳫ»ùÓÚTCP£¬UCP£¬ICMPºÍHTTPµÄDDoS¹¥»÷£¬²¢Í¨¹ýÓÕÆ¹¥»÷Êý¾Ý°üµÄIPµØµãÀ´Òþ²ØÆäȪԴ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.hackread.com/windows-lucifer-malware-return-haunt-linux-devices/
9. ÃÀ¹úCert¶Ô³¯ÏÊϹÑÛ¶ñÒâÈí¼þ·¢³öÖÒÑÔ
¡¾¸ÅÊö¡¿
ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½ñÌìÐû²¼ÁËÒ»·Ý¶ñÒâÈí¼þÆÊÎö±¨¸æ£¬Õ¹ÏÖÁËÓɳ¯ÏÊÕþ¸®Ö§³ÖµÄºÚ¿ÍµÄÍøÂç·¸·¨Ô˶¯¡£¸Ã±¨¸æÖ¸³ö£¬ÓëÁª°îÊÓ²ì¾ÖºÍÁìÍÁÇå¾²²¿Ò»Æð£¬È·¶¨ÁËÓɳ¯ÏÊÕþ¸®×ÊÖúµÄºÚ¿Í×éÖ¯£¨ÃÀ¹úÕþ¸®³ÆÎª“Òþ²ØÑÛ¾µÉß”£©°²ÅŵÄÔ¶³Ì»á¼ûľÂí²¢ÒÔLazarus Group»òAPT38¶øÎÛÃûÕÑÖø¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.hackread.com/us-cert-warns-of-north-korea-blindingcan-trojan/
10. IBM AIÇý¶¯µÄÊý¾ÝÖÎÀíÈí¼þÊܵ½¹¥»÷
¡¾¸ÅÊö¡¿
IBM Db2ÊǰüÀ¨È˹¤ÖÇÄܵĻìÏýÊý¾ÝÖÎÀí²úƷϵÁУ¬¿ÉÓÃÓÚÆÊÎöºÍÖÎÀíÆóÒµÄڵĽṹ»¯ºÍ·Ç½á¹¹»¯Êý¾Ý¡£Æ¾Ö¤TrustwaveµÄÑо¿Ö°Ô±Ëù˵£¬×î½üÅû¶µÄbug£¨CVE-2020-4414£©·ºÆðÊÇÓÉÓÚÆ½Ì¨µÄ¿ª·¢Ö°Ô±ÒÅÍüÁËÔÚDb2¸ú×Ù¹¤¾ßʹÓõĹ²ÏíÄÚ´æÖÜΧ°²ÅÅÏÔʽµÄÄÚ´æ±£»¤¡£ÈôÊDZ»Ê¹Óã¬Ôò¿ÉÄܵ¼Ö¾ܾø·þÎñ»òÐÅϢй¶¡£
¡¾²Î¿¼Á´½Ó¡¿
https://threatpost.com/ibm-ai-powered-data-management-software-subject-exploit/158497/

AG¹«Ë¾ÔÆ







