Sophos·¢Ã÷LockBitʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßʶ±ð¿ÉÒÉÄ¿µÄ£»£»£»£»£»DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡Õþ¸®Êý¾Ý
Ðû²¼Ê±¼ä 2020-10-231.Sophos·¢Ã÷LockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿µÄ

SophosÐû²¼±¨¸æ£¬£¬£¬£¬³ÆLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿µÄ¡£¡£Ñо¿Ö°Ô±Í¨Ì«¹ýÎöÒ»Äêǰ·ºÆðµÄÑù±¾£¬£¬£¬£¬·¢Ã÷LockBitÒѾѸËÙ³ÉÊ죬£¬£¬£¬²¢½ÓÄÉÁËһЩеÄÒªÁìÀ´ÈƹýWindowsÓû§ÕÊ»§¿ØÖÆ£¨UAC£©À´ÌáÉýÌØÈ¨¡£¡£±ðµÄ£¬£¬£¬£¬LockBit¿ÉʹÓÃPowerShellºÍWindowsµÄVBscriptÖ÷»úµÄÖØÃüÃû¸±±¾ÒÔ¼°»ùÓÚPowerShellÉøÍ¸²âÊÔ¹¤¾ßµÄ¾ç±¾£¬£¬£¬£¬À´ËÑË÷°üÀ¨ÓмÛÖµÊý¾ÝµÄϵͳ£¬£¬£¬£¬ÒÔ¹¥»÷СÐÍ×éÖ¯¡£¡£
ÔÎÄÁ´½Ó£º
https://news.sophos.com/en-us/2020/10/21/lockbit-attackers-uses-automated-attack-tools-to-identify-tasty-targets/
2.ÃÀ¹ú³ÆÒÁÀʺڿÍð³äProud BoysÏòÑ¡Ãñ·¢ËÍÏÅ»£Óʼþ

ÃÀ¹úÕþ¸®³ÆÒÁÀʺڿÍð³ä¼«ÓÒÒí×éÖ¯Proud Boys£¬£¬£¬£¬¸øÃñÖ÷µ³Ñ¡Ãñ·¢ËÍÏÅ»£Óʼþ¡£¡£ÕâЩµç×ÓÓʼþÒÔ¡°Í¶Æ±¸øÌØÀÊÆÕ»òÆäËûÈË¡±ÎªÖ÷Ì⣬£¬£¬£¬²¢ÖÒÑÔÃñÖ÷µ³Ñ¡Ãñ±ØÐ轫Õþµ³¸ÄΪ¹²ºÍµ³²¢Í¶Æ±¸øÌØÀÊÆÕ×Üͳ£¬£¬£¬£¬²»È»Proud Boys½«²»»á·Å¹ýËûÃÇ¡£¡£ÓʼþÖеÄÊÕ¼þÈËÐÕÃûºÍµØµãÌåÏÖÕâЩÐÅÏ¢ÊǺڿÍͨ¹ý¹¥»÷Ñ¡Ãñ×¢²áÍøÕ¾»ñµÃµÄ¡£¡£¶øÃÀ¹úÕþ¸®³ÆÒÁÀʺͶíÂÞ˹ÒѾ»ñµÃÁËÑ¡Ãñ¹ÒºÅÐÅÏ¢£¬£¬£¬£¬²¢ÇÒÒÁÀÊÕýÔÚʹÓøÃÐÅÏ¢·¢ËÍÕâЩÍþвÓʼþ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/government/us-govt-iran-behind-fake-proud-boys-voter-intimidation-emails/
3.ºÚ¿Íð³äÓ¢¹úM£¦SµÄCEOÆÈ¡Óû§ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢

ºÚ¿Íð³äÓ¢¹ú´óÐÍ¿ç¹úÁãÊÛÉÌMarks£¦SpencerµÄCEOÆÈ¡Óû§ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢¡£¡£ºÚ¿ÍÊ×ÏÈÔÚÍøÉÏÐû²¼Ú²ÆÐÔ¹ã¸æ£¬£¬£¬£¬²¢Ðû´«Êܺ¦Õßͨ¹ýÐéÄâ³é½±½«ÓÐʱ»ú»ñµÃÀñÎïȯ¡£¡£µ±Êܺ¦Õßµã»÷¹ã¸æÖеÄÁ´½Óʱ£¬£¬£¬£¬»á±»Öض¨Ïòµ½M£¦SµÄÃÅ»§ÍøÕ¾£¬£¬£¬£¬²¢ÒªÇóÌṩÆäÐÕÃû¡¢µØµã¡¢ÊÖ»úºÅÂëÒÔ¼°ÒøÐÐÏêϸÐÅÏ¢£¬£¬£¬£¬°üÀ¨SORT´úÂëºÍÕʺŵȡ£¡£Ò»µ©Óû§ÊäÈëÐÅÏ¢ºó£¬£¬£¬£¬ÆäÐÅÏ¢±ã»á±»ºÚ¿ÍÇÔÈ¡¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ms-boss-spoofed-in-gift-voucher/
4.DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡ÃÀ¹úÕþ¸®Êý¾Ý

ÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©ÍøÂçÇå¾²¡¢»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ºÍÁª°îÊÓ²ì¾Ö£¨FBI£©ÖÒÑÔ£¬£¬£¬£¬¶íÂÞ˹APT×éÖ¯Energetic BearÈëÇÖ²¢ÇÔÈ¡ÁËÃÀ¹úÕþ¸®ÍøÂçµÄÊý¾Ý¡£¡£ÕâЩ»ú¹¹ÌåÏÖ£¬£¬£¬£¬¶íÂÞ˹APT×éÖ¯ÒÑÃé×¼ÊýÊ®¸öSLTTÕþ¸®ºÍº½¿ÕÍøÂ磬£¬£¬£¬²¢ÀֳɯÆËðÁËÍøÂç»ù´¡ÉèÊ©¡£¡£×èÖ¹2020Äê10ÔÂ1ÈÕ£¬£¬£¬£¬ÆäÖÁÉÙ´ÓÁ½¸öЧÀÍÆ÷ÖÐÇÔÈ¡ÁËÊý¾Ý¡£¡£Ð¹Â¶µÄÃô¸ÐÊý¾Ý°üÀ¨ÍøÂçÉèÖúÍÃÜÂë¡¢±ê×¼²Ù×÷³ÌÐò£¨SOP£©£¨ÀýÈç×¢²á¶àÒòËØÉí·ÝÑéÖ¤£©¡¢ITÖ¸ÁÀýÈçÇëÇóÃÜÂëÖØÖã©¡¢¹©Ó¦É̺͹ºÖÃÐÅÏ¢¡¢´òÓ¡»á¼ûÁîÅÆµÈ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/russian-state-hackers-stole-data-from-us-government-networks/
5.MozillaÐû²¼¸üУ¬£¬£¬£¬ÐÞ¸´FirefoxÖеĶà¸öÎó²î

MozillÐÞ¸´ÁËFirefoxÖеĶà¸öÎó²î£¬£¬£¬£¬ÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜÔÊÐíí§Òâ´úÂëÖ´ÐС£¡£´Ë´ÎÐÞ¸´µÄÎó²î°üÀ¨usersctp¿âÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15969£©¡¢ÄÚ´æ·ÖÅÉÎÊÌ⣨CVE-2020-15254£©¡¢Í¼Ïñ±êÇ©ÖÐÎó²î£¨CVE-2020-15680£©¡¢WASMÏß³ÌÖÐÎó²î£¨CVE-2020-15681£©¡¢¿Éµ¼ÖÂÓÕÆÐÔ¹¥»÷µÄÎó²î£¨CVE-2020-15682£©ºÍÄÚ´æÇå¾²¹ýʧ£¨CVE-2020-15683ºÍCVE-2020-15684£©¡£¡£
ÔÎÄÁ´½Ó£º
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-mozilla-firefox-could-allow-for-arbitrary-code-execution_2020-146/
6.CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄÎó²î

2020Äê10ÔÂ21ÈÕ£¬£¬£¬£¬CiscoÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬Åû¶Æä¶à¸ö²úÆ·Öб£´æµÄ36¸öÇå¾²Îó²î¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪCisco FXOS FCM¿çÕ¾ÇëÇóαÔìÎó²î£¨CVE-2020-3456£©£¬£¬£¬£¬ÓÉÓÚFCM½Ó¿ÚµÄCSRF±£»£»£»£»£»¤È±·¦µ¼Ö£¬£¬£¬£¬ÀÖ³ÉʹÓôËÎó²î¿É·¢ËÍí§ÒâÇëÇ󣻣»£»£»£»Cisco FMC¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3499£©£¬£¬£¬£¬ÓÉÓÚϵͳ¶Ô×ÊÔ´ÖµµÄ´¦Öóͷ£²»µ±µ¼Ö£¬£¬£¬£¬¿ÉʹÓôËÎó²îÔì³É¾Ü¾øÐ§ÀÍ£¨DoS£©£»£»£»£»£»Cisco FTD TCP Flood¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3563£©£¬£¬£¬£¬ÓÉÓÚÄÚ´æÖÎÀíЧÂʵÍÏÂÔì³É£¬£¬£¬£¬¿Éµ¼Ö¾ܾøÐ§ÀÍ£¨DoS£©¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/cisco-dos-flaws-network-security-software/160414/


¾©¹«Íø°²±¸11010802024551ºÅ