ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂçÇå¾²±ê×¼£»£»£»RealtekÐÞ¸´Windows HDÒôƵÇý¶¯³ÌÐòÖеÄDLLÐ®ÖÆÎó²î
Ðû²¼Ê±¼ä 2020-02-051.ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂçÇå¾²±ê×¼
ÃÀ¹ú·À²¿1ÔÂ31ÈÕÕýʽÐû²¼ÍøÂçÇå¾²³ÉÊì¶ÈÄ£×ÓÈÏÖ¤£¨CMMC£©¿ò¼Ü1.0°æ±¾¡£¡£¡£¡£¹ú·À²¿Ðû²¼£¬£¬µ½2026Äê¹ú·À³Ð°üÉÌÔÚ»ØÓ¦Õþ¸®²É¹ºÍýÏëµÄÌá°¸ÇëÇóʱ£¬£¬±ØÐèÖª×ã»ù±¾µÄÍøÂçÇå¾²±ê×¼¡£¡£¡£¡£Ëæ×ÅCMMCµÄÍÆ³ö£¬£¬¹ú·À²¿Ï£Íûͨ¹ýÌá¸ß¹ú·À¹¤Òµ»ù´¡£¡£¡£¡£¨DIB£©·Ö°üÉ̵ÄÍøÂçÇå¾²×¼±¸Ë®Æ½£¬£¬À´ÔöÇ¿¶Ô¹©Ó¦Á´Î´·ÖÀàÐÅÏ¢£¨Áª°îÌõÔ¼ÐÅÏ¢£¨FCI£©ºÍÊÜ¿ØÎ´·ÖÀàÐÅÏ¢£¨CUI£©£©µÄ±£»£»£»¤¡£¡£¡£¡£CMMCÖ¼ÔÚͨ¹ýʹÓÃ5ÖÖ¼¶±ðµÄÈÏÖ¤À´¼ò»¯´óÐͺÍСÐ͹ú·À³Ð°üÉ̵ÄÍøÂçÍ£µ±ÐÔÈÏÖ¤£¬£¬ÖصãÊÇÍøÂçÇ徲ʵ¼ùºÍÁ÷³Ì¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/dod-to-require-cybersecurity-certification-from-defense-contractors/
2.°Ä´óÀûÑÇ»õÔ˹«Ë¾Toll GroupÔâµ½ÀÕË÷Èí¼þ¹¥»÷

ΪӦ¶ÔÀÕË÷Èí¼þ¹¥»÷£¬£¬°Ä´óÀûÑÇÔËÊäºÍÎïÁ÷¾ÞÍ·Toll Group±»ÆÈ¹Ø±Õ²¿·ÖÔÚÏßЧÀÍ£¬£¬²¿·Ö¿Í»§¶Ô¸Ã¹«Ë¾µÄ´¦Öóͷ£·½·¨ÌåÏÖ²»Öª×ã¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬ËüÓÚ1ÔÂ31ÈÕÐÇÆÚÎåÔÚÆäϵͳÉÏ·¢Ã÷ÁËÒ»¸öÀÕË÷Èí¼þ£¬£¬²¢½ûÓÃÁËijЩϵͳÀ´×èÖ¹´ËÊÂÎñ¡£¡£¡£¡£Ò»Ð©¿Í»§ÔÚÉ罻ýÌåÉÏËß¿àËûÃÇÎÞ·¨ÔÙ¸ú×Ù°ü¹ü£¬£¬²¢Éù³Æ¸Ã¹«Ë¾µÄÔ±¹¤Ò²ÎÞ·¨»á¼û¸ú×ÙÊý¾Ý¿â¡£¡£¡£¡£ÓÐÐÂÎÅÈËÊ¿³Æ¸ÃÊÂÎñÓ°ÏìÁ˰ĴóÀûÑÇ¡¢Ó¡¶ÈºÍ·ÆÂɱöµÄÓªÒµ¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÖÐʹÓõÄÊÇÄÄÖÖÀÕË÷Èí¼þ£¬£¬¸Ã¹«Ë¾ÒÑ֪ͨÓйز¿·Ö£¬£¬µ«Éù³ÆÉÐδÕÒµ½ÈκÎÖ¤¾ÝÅúעСÎÒ˽¼ÒÊý¾ÝÒѱ»Ð¹Â¶¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/australian-shipping-giant-toll-hit-ransomware
3.ÀÕË÷Èí¼þDoppelPaymer½«ÔÚ°µÍø³öÊÛδ¸¶¿îÊܺ¦ÕßµÄÊý¾Ý
ÀÕË÷Èí¼þDoppelPaymerÍþв³ÆÈôÊÇÊܺ¦Õß²»Ö§¸¶Êê½ð£¬£¬ËûÃǽ«ÔÚ°µÍø³öÊÛ»òÐû²¼ÍµÈ¡µÄÊܺ¦ÕßÎļþ¡£¡£¡£¡£ÕâÖÖÐµĹ¥»÷Õ½ÂÔʼÓÚ2019Äê11Ô£¬£¬ÓÉÀÕË÷Èí¼þMazeÌᳫ£¬£¬ËæºóÓÉSodinokibi/REvilºÍNemty¸ú½ø£¬£¬ÏÖÔÚÂÖµ½DoppelPaymerÁË¡£¡£¡£¡£DoppelPaymer¹¥»÷Õ߳ƽüÒ»ÄêÀ´ËûÃÇÒ»Ö±´ÓÊܺ¦ÕßÄÇÀïÇÔÈ¡Êý¾Ý£¬£¬²¢ÇÒÉù³Æµ±Êܺ¦Õß²»Ö§¸¶Êê½ðʱ£¬£¬ËûÃÇÒÑÍù¾ÍÔøÔÚ°µÍøÉÏÄäÃû³öÊÛÕâЩÊý¾Ý¡£¡£¡£¡£ÎªÁË֤ʵÕâÒ»µã£¬£¬¹¥»÷Õß»¹Ðû²¼ÁËÁ½¸öExcel±í¸ñ£¬£¬ÆäÖаüÀ¨ËûÃÇÔøÈëÇÖµÄÁ½¸öÍøÂçµÄWindows DomainÓû§ÁÐ±í£¬£¬µ«Ã»ÓзÖÏí¾Ý³Æ´ÓÊܺ¦ÕßÄÇÀï͵ȡµÄÈκÎÎļþ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/
4.ºÚ¿ÍʹÓÃSharePointÎó²î(CVE-2019-0604)¹¥»÷Öж«µØÇø
Palo Alto Networks µÄ Unit 42·¢Ã÷ºÚ¿ÍÈÔÔÚʹÓÃSharePointÎó²î£¨CVE-2019-0604£©¹¥»÷Öж«Õþ¸®×éÖ¯¡£¡£¡£¡£ÔÚ2019Äê9ÔÂ10ÈÕ£¬£¬Ñо¿Ö°Ô±ÊӲ쵽¹¥»÷ÕßʹÓøÃÎó²îÔÚÖж«Õþ¸®×éÖ¯µÄÍøÕ¾ÉÏ×°ÖÃÁ˶à¸öWeb Shell£¬£¬ÆäÖÐÒ»¸öÊÇGithubÉÏÃâ·ÑÌṩµÄ¿ªÔ´AntSword Web Shell¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÕâЩWeb ShellºáÏòÒÆ¶¯ÍøÂç»á¼ûÆäËüϵͳ£¬£¬²¢Ê¹Óö¨ÖƵÄMimikatz±äÖÖ´ÓÄÚ´æÖÐת´¢Æ¾Ö¤ºÍʹÓÃImpacketµÄatexec¹¤¾ßÔÚÕû¸öÍøÂçµÄÆäËüϵͳÉÏÔËÐÐÏÂÁî¡£¡£¡£¡£9ÔÂÏÂÑ®£¬£¬Unit 42ÊӲ쵽ÏàͬµÄMimikatz±äÖÖ±»ÉÏÔØµ½ÁíÒ»ÆäÖж«¹ú¼ÒµÄÁíÒ»¸öÕþ¸®×éÖ¯µÄWeb ShellÖС£¡£¡£¡£2020Äê1ÔÂÉÏÑ®£¬£¬Ñо¿Ö°Ô±Ê¹ÓÃShodanËÑË÷ÁË̻¶µÄSharePointЧÀÍÆ÷£¬£¬·¢Ã÷ÈÔÓÐ28881¸öЧÀÍÆ÷ʹÓñ£´æÎó²îµÄ°æ±¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/actors-still-exploiting-sharepoint-vulnerability/
5.Ñо¿Ö°Ô±·¢Ã÷ÐÂÀÕË÷Èí¼þEKANSÖ÷ÒªÕë¶Ô¹¤Òµ¿ØÖÆÏµÍ³
2ÔÂ3ÈÕÇå¾²³§ÉÌDragosÐû²¼Ò»·Ý±¨¸æ³Æ£¬£¬ÐÂÀÕË÷Èí¼þEKANSÒýÆðÁËÇå¾²Ñо¿Ö°Ô±µÄ×¢ÖØ£¬£¬ÓÉÓÚ¸ÃÀÕË÷Èí¼þ¾ßÓÐÆÈʹÅÌËã»ú×èÖ¹Ó빤ҵ¿ØÖÆÏµÍ³ÓйصÄÌØ¶¨»î¶¯»òÀú³ÌµÄÄÜÁ¦¡£¡£¡£¡£Ñо¿Ö°Ô±Joe SlowikÌåÏÖ£¬£¬Ö»¹ÜÆä¹¥»÷Ïà¶ÔÔʼ£¬£¬µ«EKANSÕÕ¾É×Ô¶¯Õë¶ÔICSÇéÐÎÖеÄÄ³Ð©ÌØ¶¨²úÆ·£¬£¬°üÀ¨ÓëGE ProficyµÄÊý¾ÝÀúʷЧÀÍ¡¢GE Fanuc licensing serverµÄЧÀÍÒÔ¼°HoneywellµÄHMIWebÓ¦ÓÃÓйصÄÀú³Ì¡£¡£¡£¡£ÏÖÔÚ¸ÃÀÕË÷Èí¼þËÆºõ»¹²»ÊÇÒ»¸öºÜ´óµÄΣÏÕ£¬£¬Ñо¿Ö°Ô±ÒÔΪEKANS¿ÉÄÜÓëÁíÒ»¸öÕë¶ÔICSµÄÀÕË÷Èí¼þMegaCortex±£´æ¹ØÁª¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/attacks-breaches/ekans-ransomware-raises-industrial-control-worries/d/d-id/1336950
6.RealtekÐÞ¸´Windows HDÒôƵÇý¶¯³ÌÐòÖеÄDLLÐ®ÖÆÎó²î
RealtekÐÞ¸´ÁËWindows HDÒôƵÇý¶¯³ÌÐò°üÖеÄÒ»¸öDLLÐ®ÖÆÎó²î£¬£¬¸ÃÎó²î£¨CVE-2019-19705£©¿ÉÄÜÔÊÐíDZÔڵĹ¥»÷Õß»ñµÃ³¤ÆÚÐÔ¡¢Ö²Èë¶ñÒâÈí¼þ²¢Ìӱܼì²â¡£¡£¡£¡£SafeBreach LabsÇå¾²Ñо¿Ô±Peleg Hadar·¢Ã÷Á˸ÃÎó²î£¬£¬HadarÌåÏÖ¸ÃÎó²îÊÇÓÉÒÑÊðÃûµÄHDÒôƵÅä¾°£¨RAVBg64.exe£©Àú³Ìµ¼Öµģ¬£¬¸ÃÀú³ÌÊÔͼ´ÓÆäÄ¿½ñÊÂÇéĿ¼£¨CWD£©¶ø²»ÊÇDLLµÄÏÖʵλÖüÓÔØDLL£¬£¬²¢ÇÒûÓÐÑéÖ¤DLLµÄÊðÃûÖ¤Êé¡£¡£¡£¡£ÕâÒ»ÎÊÌâµÄ»ù´¡Ôµ¹ÊÔÓÉÊÇÔÚÇý¶¯³ÌÐò°ü£¨°æ±¾1.0.0.8855£©ÖÐʹÓÃÁËMicrosoft Visual Studio 2005 MFC£¬£¬µ¼Ö¸óÌÐò°ü»á×Ô¶¯¼ÓÔØ×ÊÔ´DLL¡£¡£¡£¡£Realtekͨ¹ý8857¼°¸ü¸ß°æ±¾µÄHD AudioÇý¶¯³ÌÐò°üÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/realtek-fixes-dll-hijacking-flaw-in-hd-audio-driver-for-windows/


¾©¹«Íø°²±¸11010802024551ºÅ