AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨Ô±¨£¨2020Äê9Ô£©
2020-09-29
9Ô£¬AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨ÖÐÐÄ£¨NTI£©Ðû²¼Á˶à¸öÎó²îºÍÍþвÊÂÎñͨ¸æ£¬ÆäÖУ¬Linux ÄÚºËȨÏÞÌáÉýÎó²î£¨CVE-2020-14386£©ÒÔ¼°WebSphere XML ÍⲿʵÌå×¢Èë(XXE)Îó²î£¨CVE-2020-4643£©Ó°Ïì½Ï´ó¡£Ç°ÕßÓÉÓÚnet/packet/af_packet.c ÔÚ´¦Öóͷ£AF_PACKET ʱ±£´æÕûÊýÒç³ö£¬µ¼Ö¿ɾÙÐÐÔ½½çд´Ó¶øÊµÏÖȨÏÞÌáÉý£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²î´Ó·ÇÌØÈ¨Àú³Ì»ñµÃϵͳroot ȨÏÞ£»ºóÕßÓÉÓÚWAS δ׼ȷ´¦Öóͷ£XML Êý¾Ý£¬¹¥»÷Õß¿ÉÒÔʹÓà ´ËÎó²îÔ¶³Ì»ñÈ¡·þÎñÆ÷ÉϵÄÃô¸ÐÐÅÏ¢¡£
ÁíÍ⣬±¾ÔÂ΢ÈíÐÞ¸´129¸öÇå¾²ÎÊÌ⣬CriticalµÄÎó²î¹²ÓÐ23¸ö£¬Èô¸É¸öImportant¼¶±ð£¬ÇëÏà¹ØÓû§ÊµÊ±¸üв¹¶¡¾ÙÐзÀ»¤¡£
ÔÚ±¾ÔµÄÍþвÊÂÎñÖУ¬Õë¶Ô¹ú¼ÒºÍÕþ¸®µÄ¹¥»÷±ÈÖØ½Ï´ó£¬ÕþÖÎÉ«²Ê¾Ó¶à£»Æä´ÎÊÇÍÚ¿óľÂíºÍÕë¶Ôµç×ÓÓʼþËù¾ÙÐеĹ¥»÷¡£ÍøÂçÇ徲ΪÈËÃñ£¬ÍøÂçÇå¾²¿¿ÈËÃñ£¬¹¥»÷ÊÂÎñÌìÌì¶¼ÔÚ±¬·¢£¬ÍøÂçÇå¾²ÎÊÌâÕýÒýÆð¸ü¶àµÄ¹Ø×¢ºÍÖØÊÓ¡£
ÒÔÉÏËùÓÐÎó²îÇ鱨ºÍÍþвÊÂÎñÇ鱨¡¢¹¥»÷×éÖ¯Ç鱨£¬ÒÔ¼°¹ØÁªµÄIOC£¬¾ù¿ÉÔÚAG¹«Ë¾ÍþвÇ鱨ÖÐÐÄ»ñÈ¡£¬ÍøÖ·£ºhttps://nti.nsfocus.com/
Ò»¡¢ Îó²îÌ¬ÊÆ
2020Äê09ÔÂAG¹«Ë¾¿Æ¼¼Çå¾²Îó²î¿â¹²ÊÕ¼108¸öÎó²î, ÆäÖиßΣÎó²î20¸ö¡£

* Êý¾ÝȪԴ£ºAG¹«Ë¾¿Æ¼¼ÍþвÇ鱨ÖÐÐÄ£¬±¾±íÊý¾Ý×èÖ¹µ½2020.09.28
×¢£ºAG¹«Ë¾¿Æ¼¼Îó²î¿â°üÀ¨Ó¦ÓóÌÐòÎó²î¡¢Çå¾²²úÆ·Îó²î¡¢²Ù×÷ϵͳÎó²î¡¢Êý¾Ý¿âÎó²î¡¢ÍøÂç×°±¸Îó²îµÈ£»
¶þ¡¢ ÍþвÊÂÎñ
1. ÍÚ¿óľÂíMrbMiner¿ØÖÆÉÏǧ̨·þÎñÆ÷
¡¾±êÇ©¡¿MrbMiner
¡¾Ê±¼ä¡¿2020-09-01
¡¾¼ò½é¡¿
ÐÂÐÍÍÚ¿óľÂí¼Ò×åMrbMiner£¬¸ÃÍÚ¿óľÂíÎļþͨ¹ýZIP½âѹËõ»ñµÃ£¬²¢ÇÒ»áαװ³ÉÖÖÖÖWindowsϵͳ·þÎñ¡£ºÚ¿Íͨ¹ýSQL Server·þÎñÆ÷Èõ¿ÚÁî±¬ÆÆÈëÇÖ£¬±¬ÆÆÀֳɺóÔÚÄ¿µÄϵͳÊÍ·ÅC#ÓïÑÔ±àдµÄľÂíassm.exe£¬½øÒ»²½Í¨¹ý¸ÃľÂíÓëC2·þÎñÆ÷ͨѶ£¬È»ºóÏÂÔØÃÅÂÞ±ÒÍÚ¿óľÂí²¢Î¬³ÖÍÚ¿óÀú³Ì¡£MrbMinerÍÚ¿óľÂí»áСÐÄÒþ²Ø×ÔÉí£¬×èÖ¹±»ÖÎÀíÔ±·¢Ã÷¡£
¡¾²Î¿¼Á´½Ó¡¿
https://s.tencent.com//research/report/1105.html
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡43ÌõIOC£¬ÆäÖаüÀ¨2¸öIP£¬2¸öÓòÃûºÍ39¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
2. RCEÎó²îÕë¶ÔvBulletin
¡¾±êÇ©¡¿RCE
¡¾Ê±¼ä¡¿2020-09-02
¡¾¼ò½é¡¿
Õë¶ÔÊ¢ÐÐÂÛ̳Èí¼þvBulletinµÄÒ»¸öÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î±»·¢Ã÷ΪCVE-2019-16759¡£¸ÃÎó²îʹÓÃÈÆ¹ýÁËÏÈǰÎó²îCVE-2019-16759µÄÐÞ¸´£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²î·¢ËÍ´øÓÐÖ¸¶¨Ä£°åÃû³ÆºÍ¶ñÒâPHP´úÂëµÄÈ«ÐÄÉè¼ÆµÄHTTPÇëÇ󣬲¢µ¼ÖÂÔ¶³ÌÖ´ÐдúÂë¡£ÔÚvBulletinÉϽ¨ÉèÁËÁè¼Ý100,000¸öÕ¾µã£¬ÆäÖаüÀ¨´óÐÍÆóÒµºÍ×éÖ¯µÄÂÛ̳ ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/cve-2020-17496/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡45ÌõIOC£¬ÆäÖаüÀ¨2¸öIPºÍ38¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
3. URSAÌØÂåÒÁľÂíÕë¶ÔʹÓÃÖØ´ó¼ÓÔØ³ÌÐòµÄ¹ú¼Ò
¡¾±êÇ©¡¿URSA
¡¾Ê±¼ä¡¿2020-09-14
¡¾¼ò½é¡¿
URSAľÂí£¬Ò»ÖÖÑÜÉúÆ·£¬Ò²±»ESET ³ÆÎªmispadu ¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þÊÇÒ»ÖÖÌØÂåÒÁľÂí¶ñÒâÈí¼þ£¬µ±×°ÖÃÔÚÊܺ¦ÕßµÄ×°±¸ÉÏʱ£¬Ëü»á´Óä¯ÀÀÆ÷ÒÔ¼°Ê¢ÐеÄÈí¼þ£¨ÀýÈçFTPºÍµç×ÓÓʼþ·þÎñ£©ÖÐÍøÂçÃÜÂ룬²¢Ö´ÐÐÒøÐÐä¯ÀÀÆ÷ÁýÕÖ£¬ÒÔÓÕʹÊܺ¦ÕßÔÚÖ´ÐÐÁ÷³ÌʱÒýÈëÒøÐÐÆ¾Ö¤–·Ö²½¾ÙÐЖÔÚ·¸·¨·Ö×ӵĺǫ́¡£
¡¾²Î¿¼Á´½Ó¡¿
https://seguranca-informatica.pt/threat-analysis-the-emergent-ursa-trojan-impacts-many-countries-using-a-sophisticated-loader/#.X2RmWMEzaM9
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡24ÌõIOC£¬ÆäÖаüÀ¨14¸öIPºÍ10¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
4. Dofloo½©Ê¬ÍøÂçÕë¶ÔDockerÈÝÆ÷
¡¾±êÇ©¡¿Dofloo
¡¾Ê±¼ä¡¿2020-09-16
¡¾¼ò½é¡¿
Dofloo£¨AESDDoS£©½©Ê¬ÍøÂçÕýÅúÁ¿É¨ÃèºÍ¹¥»÷DockerÈÝÆ÷¡£²¿·ÖÔÆÖ÷»úÉϰ²ÅŵÄDockerÈÝÆ÷ûÓÐÕë¶ÔÔ¶³Ì»á¼û×öÇå¾²ÈÏÖ¤£¬±£´æRemote APIÔÊÐíδÊÚȨʹÓÃÎó²îÇÒ̻¶ÔÚ¹«Íø£¬µ¼ÖºڿÍͨ¹ýÎó²îÈëÇÖ²¢Ö²ÈëDofloo½©Ê¬ÍøÂçľÂí¡£´Ë´ÎDofloo½©Ê¬ÍøÂçÈëÇÖϵͳºó£¬»áËѼ¯ÏµÍ³Ãô¸ÐÐÅÏ¢²¢¼ÓÃÜÉÏ´«£¬ÎüÊÕC&C·þÎñÆ÷Ö¸ÁִÐÐÖÖÖÖDDoS¹¥»÷¡£
¡¾²Î¿¼Á´½Ó¡¿
https://s.tencent.com//research/report/1127.html
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡13ÌõIOC£¬ÆäÖаüÀ¨3¸öIPºÍ10¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
5. Glupteba¶ñÒâÈí¼þ¹¥»÷Õþ¸®×éÖ¯
¡¾±êÇ©¡¿Glupteba
¡¾Ê±¼ä¡¿2020-09-21
¡¾¼ò½é¡¿
¹¥»÷ÕßʹÓÃGlupteba¶ñÒâÈí¼þ£¬ÊÔͼ´Óä¯ÀÀÆ÷ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬ÀýÈçÃÜÂëºÍÐÅÓÿ¨ÐÅÏ¢ÒÔ¼°µç×ÓÓʼþÕÊ»§Æ¾Ö¤¡£ÓÉÓÚÕâЩÊôÓÚÕþ¸®»ú¹¹£¬ÒÔÊǹ¥»÷Õß»ñµÃÓû§µÄÐÅÏ¢µÄЧ¹ûºÜÊÇÑÏÖØ¡£¸Ã¶ñÒâÈí¼þµÄоúÖ껹ʹÓõ½Á˶ñÒâ¹ã¸æ£¬½«Óû§¶¨Ïòµ½ÓÐÊýµÄ¶Ëµã²¢Ç¿ÖÆÒì³£ÎļþÏÂÔØ¡£ÏÂÔØ´ËÎļþºó£¬×°±¸Í¨¹ýÒ쳣ͨѶͨµÀÆô¶¯Á˵½¿ÉÒɶ˵ãµÄ½øÒ»²½¼ÓÃÜÅþÁ¬¡£Í¬Ê±£¬×°±¸»á´Ó¾ßÓÐÒì³£Óû§ÊðÀí“ CertUtil URLÊðÀ픵ÄÓòÖÐÏÂÔØÁËÁíÒ»¸ö¿ÉÖ´ÐÐÎļþ¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.darktrace.com/en/blog/fast-and-stealthy-malware-attempts-to-steal-public-data-from-government-organization/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡13ÌõIOC£¬ÆäÖаüÀ¨13¸öIP£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£
6. MoDi RATͨ¹ýµç×ÓÓʼþÈö²¥
¡¾±êÇ©¡¿MoDi RAT
¡¾Ê±¼ä¡¿2020-09-24
¡¾¼ò½é¡¿
SophosLabsµÄÁ½Î»Ñо¿Ö°Ô±ÉϸöÔÂÔÚͨ¹ýÍþвң²â¾ÙÐÐÕ÷²ÉʱÎÞÒâ·¢Ã÷ÁËÒ»ÖÖ²»Ñ°³£µÄ·´ÉäÊ½×°ÔØ»ú¹¥»÷ÒªÁì¡£¹¥»÷Á´Ê¼ÓÚ°üÀ¨Ò»Ð©³ðÊÓµÄVB¾ç±¾´úÂëµÄ¶ñÒâµç×ÓÓʼþ£¬×îºóÒÔ½»¸¶ÃûΪMoDi RATµÄÉÌÆ·Ô¶³Ì»á¼ûľÂíΪ×îºó¡£¸Ã¹¥»÷´ú±íÁËÎÒÃÇ¿´µ½µÄ´ó´ó¶¼ÎÞÎļþ¹¥»÷ÔõÑùÆð×÷Óá£AMSIΪSophosÌṩÁË×Ô¶¯±£»¤¿Í»§ÃâÊÜһϵÁÐÀàËÆ¹¥»÷µÄÄÜÁ¦£¬¶øÎÒÃÇÄܹ»»ñµÃµÄÒ£²âÊÖÒÕʹÎÒÃÇÄܹ»ÉîÈëÕâЩÍÃ×Ó¶´£¬´Ó¶ø¿ÉÒÔ¸üÓÐÓõØÊ¶±ðºÍÔöÇ¿±£»¤¡£
¡¾²Î¿¼Á´½Ó¡¿
https://news.sophos.com/en-us/2020/09/24/email-delivered-modi-rat-attack-pastes-powershell-commands/
¡¾·À»¤²½·¥¡¿
AG¹«Ë¾ÍþвÇ鱨ÖÐÐĹØÓÚ¸ÃÊÂÎñÌáÈ¡7ÌõIOC£¬ÆäÖаüÀ¨1¸öÓòÃûºÍ6¸öÑù±¾£»AG¹«Ë¾Ç徲ƽ̨Óë×°±¸ÒѼ¯³ÉÏìÓ¦Ç鱨Êý¾Ý£¬Îª¿Í»§ÌṩÏà¹Ø·ÀÓù¼ì²âÄÜÁ¦¡£

AG¹«Ë¾ÔÆ







