ÎÒ¹ú¶à¸öÖ÷Òªµ¥Î»±»¾³ÍâAPTºÚ¿Í×éÖ¯¹¥ÏÝ£»£»£»£»£»£»Ó¡¶ÈºËµçÕ¾KNPPÔâ¶ñÒâÈí¼þDtrack¹¥»÷

Ðû²¼Ê±¼ä 2019-10-31
1¡¢ÎÒ¹ú¶à¸öÖ÷Òªµ¥Î»±»¾³ÍâAPTºÚ¿Í×éÖ¯¹¥ÏÝ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

10ÔÂ30ÈÕÐÂÎÅ£¬ £¬£¬£¬£¬£¬Ò»êdzÆÎª@MisterCh0cµÄÍÆÌØÓû§Ðû²¼ÐÂÎųƣ¬ £¬£¬£¬£¬£¬·¢Ã÷ÁËÒ»¿îľÂí¿ØÖÆÆ½Ì¨µÄµÇ¼µØµãhttp://lmhostsvc[.]net/healthne/login.php¡£¡£¡£ ¡£ÒÔºó£¬ £¬£¬£¬£¬£¬ÆäËûÍÆÌØÓû§·¢ÌûÆØ¹â¸Ãºǫ́ÖÁÉټͼÁË12̨±»¿ØÖ÷»úµÄIPµØµã¡¢ÅÌËã»úÃû¡¢Óû§Ãû¡¢²Ù×÷ϵͳ¡¢±»¿ØÊ±¼ä¼°×îºóÒ»´ÎÉÏÏßʱ¼äµÈÐÅÏ¢£¬ £¬£¬£¬£¬£¬ÔÚÆØ¹âµÄ±»¿ØÖ÷»úÖУ¬ £¬£¬£¬£¬£¬ÓÐ9¸öÊôÓÚÖйú¡£¡£¡£ ¡£¸Ãºǫ́ËùÓÐÕßÊÇÓ¡¶ÈÕþ¸®Åä¾°µÄAPT×éÖ¯Bitter£¨ÓÖÃû¡°ÂûÁ黨¡±£©£¬ £¬£¬£¬£¬£¬ÕâÊÇÒ»¸öºã¾ÃÕë¶ÔÖйú¡¢°Í»ù˹̹µÈ¹ú¼ÒµÄÕþ¸®¡¢¾ü¹¤¡¢µçÁ¦¡¢ºËµÈ²¿·Ö·¢¶¯ÍøÂç¹¥»÷µÄAPTÍŻ¡£¡£ ¡£Õâ9¸öÊôÓÚÖйúµÄIPµØµãÖ÷񻃾¼°±±¾©¡¢ÉϺ£¡¢Õã½­¡¢¹ãÎ÷µÈµØ£¬ £¬£¬£¬£¬£¬¸Ãƽ̨»¹¾ß±¸Ï·¢Ä¾Âí²å¼þµÄ¹¦Ð§£¬ £¬£¬£¬£¬£¬¿É¶ÔÊÜ¿ØÖ÷»úʵÑé½øÒ»²½²Ù×÷¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

http://tech.ifeng.com/c/7rCKq4uSCJl

2¡¢Ó¡¶ÈºËµçÕ¾KNPPÔâ¶ñÒâÈí¼þDtrack¹¥»÷

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

¸Ã¶ñÒâÈí¼þÊÇDtrackµÄÒ»¸ö±äÌ壬 £¬£¬£¬£¬£¬DtrackÊdz¯ÏÊAPT×éÖ¯Lazarus Group¿ª·¢µÄºóÃÅľÂí¡£¡£¡£ ¡£×î³õKNPP¹ÙÔ±·ñ¶¨ËûÃÇÔâÊÜÁËÈκζñÒâÈí¼þѬȾ£¬ £¬£¬£¬£¬£¬µ«KNPPµÄĸ¹«Ë¾NPCILÔÚÁíÒ»·ÝÉùÃ÷ÖÐÈÏ¿ÉÁËÕâÒ»ÊÂÎñ£¬ £¬£¬£¬£¬£¬NPCILÌåÏָöñÒâÈí¼þ½öѬȾÁËÖÎÀíÍøÂ磬 £¬£¬£¬£¬£¬µ«Î´µÖ´ïÒªº¦µÄÄÚ²¿ÍøÂç¡£¡£¡£ ¡£´ÓÀúÊ·ÉÏ¿´LazarusºÜÉÙ¹¥»÷ÄÜÔ´ºÍ¹¤ÒµÁìÓòµÄÄ¿µÄ£¬ £¬£¬£¬£¬£¬×ÝÈ»Óй¥»÷Ò²Ö´ÙÇÊÔͼÇÔȡ֪ʶ²úȨ£¬ £¬£¬£¬£¬£¬¶ø²»ÊÇÔì³ÉÆÆË𡣡£¡£ ¡£KNPPÊÂÎñ¿´ÆðÀ´¸üÏñÊÇÒâÍâѬȾ£¬ £¬£¬£¬£¬£¬¶ø²»ÊÇÕë¶ÔÐԵĹ¥»÷¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/confirmed-north-korean-malware-found-on-indian-nuclear-plants-network/

3¡¢ÐÂÄ«Î÷¸çÖÝLas Cruces¹«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

ÃÀ¹úÐÂÄ«Î÷¸çÖÝLas Cruces¹«Á¢Ñ§Ð£Ôâµ½ÀÕË÷Èí¼þ¹¥»÷£¬ £¬£¬£¬£¬£¬¸ÃÑ§Çø±»ÆÈ¹Ø±ÕÕû¸öÅÌËã»úϵͳÒÔ¿ØÖÆÑ¬È¾¡£¡£¡£ ¡£ÓÉÓÚÏÖÔÚµç×ÓÓʼþµÈ»ùÓÚÅÌËã»úϵͳµÄͨѶÒѾ­ÖÐÖ¹£¬ £¬£¬£¬£¬£¬Òò´ËÓë¸ÃѧУ֮¼äµÄÐÅÏ¢½»Á÷Êܵ½ÁË×è°­¡£¡£¡£ ¡£¸ÃÑ§ÇøµÄΣ»£»£»£»£»£»úÏìӦС×éÕýÔÚÆð¾¢»Ö¸´Òªº¦Ð§ÀÍ£¬ £¬£¬£¬£¬£¬µ«Éв»ÇåÎúϵͳ½«å´»ú¶à³¤Ê±¼ä¡£¡£¡£ ¡£Ö»¹ÜÊÂÎñºÜÑÏÖØ£¬ £¬£¬£¬£¬£¬µ«Ñ§Ð£ÈÔδÍ£¿ £¿£¿£¿Î£¬ £¬£¬£¬£¬£¬Æä»î¶¯ÈÔ×ñÕÕÕý³£µÄʱ¼ä±í¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ransomware-attack-causes-school-district-wide-shutdown/

4¡¢ÓòÃûЧÀÍÉÌNetwork Solutions¿Í»§ÐÅÏ¢ÒÉÔâй¶

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

ÓòÃûЧÀÍÉÌNetwork SolutionsÐû²¼ÉùÃ÷³ÆµÚÈý·½ÔÚ2019Äê8ÔÂÏÂÑ®¶ÔÆä²¿·ÖÅÌËã»úϵͳ¾ÙÐÐÁËδÊÚȨ»á¼û£¬ £¬£¬£¬£¬£¬µ¼Ö¿ͻ§µÄPIIÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£ ¡£¸Ã¹«Ë¾ÌåÏÖ¹¥»÷Õß¿ÉÄÜ»á¼ûµÄ¿Í»§ÐÅÏ¢°üÀ¨ÁªÏµ·½·¨¡¢ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãÒÔ¼°Ìض¨Ð§À͵ÄÐÅÏ¢£¬ £¬£¬£¬£¬£¬µ«ÓÉÓÚÐÅÓÿ¨ºÅÊÇÒÔ¼ÓÃÜÐÎʽ´æ´¢µÄ£¬ £¬£¬£¬£¬£¬Òò´ËûÓÐÐÅÓÿ¨Êý¾ÝÔÚ¹¥»÷ÖÐÊܵ½Ë𺦡£¡£¡£ ¡£Network SolutionsÊÇÈ«ÇòÊ׸öÓòÃûЧÀÍÉÌ£¬ £¬£¬£¬£¬£¬ÔçÔÚ1992Äê12ÔÂ31Èոù«Ë¾¾ÍÓëÃÀ¹ú¹ú¼Ò¿ÆÑ§»ù½ð»á£¨NSF£©Ç©ÊðЭÒéÒÔÌṩÓòÃû×¢²áЧÀÍ¡£¡£¡£ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/worlds-first-domain-registrar-network-solutions-discloses-breach/

5¡¢Å·ÃËeIDASÆØÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬ £¬£¬£¬£¬£¬¿Éαװ¹«ÃñÉí·Ý

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

SEC ConsultÑо¿Ö°Ô±ÔÚÅ·ÓѰî¼ÒʹÓõÄeIDASϵͳÖз¢Ã÷Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬ £¬£¬£¬£¬£¬¿ÉÓÃÓÚαװ¹«ÃñµÄÉí·Ý¡£¡£¡£ ¡£eIDASÊÇÖ¸µç×ÓÉí·Ýʶ±ð¡¢Éí·ÝÑéÖ¤ºÍÐÅÈÎЧÀÍ£¬ £¬£¬£¬£¬£¬ÓÃÓÚ¶ÔÔÚÏßÉúÒâµÄ¹«ÃñÕýµ±Éí·Ý¾ÙÐÐÑéÖ¤¡£¡£¡£ ¡£Ñо¿Ö°Ô±·¢Ã÷ÿ¸ö¹ú¼ÒµÄeIDAS½Úµã¶¼ÓÃSAML¿ª·Å±ê×¼½»Á÷ÐÅÏ¢ÒÔ¾ÙÐÐÉí·ÝÑéÖ¤ºÍÊÚȨ£¬ £¬£¬£¬£¬£¬µ«Ã»ÓжÔÊðÃûSAMLÐÂÎŵÄÊý×ÖÖ¤Êé¾ÙÐÐÑéÖ¤£¬ £¬£¬£¬£¬£¬Òò´Ë¹¥»÷Õß¿ÉÒÔαÔìSAMLÏìÓ¦¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÑÝʾÁËÔõÑùʹÓøèµÂµÄÃû×Ö¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£ ¡£¸ÃÎó²îÒÑÔÚeIDAS-Node×é¼þµÄ2.3.1°æ±¾ÖÐÐÞ¸´¡£¡£¡£ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/europes-electronic-id-system-fixed-against-impersonation-risk/

6¡¢MikroTik·ÓÉÆ÷¶à¸öÎó²î¿ÉÖ½µ¼¶¹¥»÷¼°½¨ÉèºóÃÅ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

TenableÑо¿Ö°Ô±ÔÚMikroTik·ÓÉÆ÷Öз¢Ã÷¶à¸öÎó²î£¬ £¬£¬£¬£¬£¬Á¬ÏµÕâЩÎó²îµÄ¹¥»÷Á´£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÌᳫ½µ¼¶¹¥»÷²¢½¨ÉèºóÃÅ¡£¡£¡£ ¡£ÕâËĸöÎó²î°üÀ¨´ÓCVE-2019-3976µ½CVE-2019-3979£¬ £¬£¬£¬£¬£¬Æ¾Ö¤Îó²îͨ¸æ£¬ £¬£¬£¬£¬£¬Í¨¹ýÁ´½ÓÕâЩÎó²î£¬ £¬£¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔ»á¼û·ÓÉÆ÷¶Ë¿Ú8291£¬ £¬£¬£¬£¬£¬Ö´ÐÐRouterOS½µ¼¶£¬ £¬£¬£¬£¬£¬ÖØÖÃϵͳÃÜÂ룬 £¬£¬£¬£¬£¬²¢ÓпÉÄÜ»ñµÃroot shell¡£¡£¡£ ¡£ÕâЩÎó²îÒÑÔÚа汾6.45.7ÖÐÐÞ¸´¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/mikrotik-router-vulnerabilities-can-lead-backdoor-creation