·É»úÖÆÔìÉÌBombardier³ÆÆäÊý¾ÝÒÑÔÚClopÍøÕ¾ÉϹûÕæ£»£»£»£»£»ÃÀÁª´¢µÄITϵͳ¹ÊÕϵ¼ÖÂÉúÒâЧÀÍÔÝʱÖÐÖ¹£¬£¬£¬£¬£¬Ôµ¹ÊÔÓÉδ֪
Ðû²¼Ê±¼ä 2021-02-251.·É»úÖÆÔìÉÌBombardier³ÆÆäÊý¾ÝÒÑÔÚClopÍøÕ¾ÉϹûÕæ

¼ÓÄôó·É»úÖÆÔìÉÌBombardier³ÆÆäÊý¾ÝÒÑÔÚClopÍøÕ¾ÉϹûÕæ¡£¡£¸Ã¹«Ë¾ÔÚͨ¸æÖÐÌåÏÖ£¬£¬£¬£¬£¬¾³õ³ÌÐò²é£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÁ˵ÚÈý·½Îļþ´«ÊäÓ¦ÓÃÖеÄÎó²îÀ´»á¼ûºÍÇÔÈ¡Êý¾Ý¡£¡£Ö»¹Ü²¢Ã»ÓÐÏêϸָ³ö¸Ã×°±¸µÄÃû³Æ£¬£¬£¬£¬£¬µ«¾ÝÍÆ²âºÜ¿ÉÄÜÊÇÖ¸µÄAccellion FTA¡£¡£±»µÁÊý¾ÝÒÑÔÚÀÕË÷ÍÅ»ïClopµÄÊý¾ÝÐ¹Â¶ÍøÕ¾¹ûÕæ£¬£¬£¬£¬£¬°üÀ¨BombardierÖÖÖÖ·É»úºÍ·É»úÁã¼þµÄÉè¼ÆÎļþ£¬£¬£¬£¬£¬²¢Ã»ÓÐÈκÎСÎÒ˽¼ÒÊý¾Ýй¶¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/airplane-maker-bombardier-data-posted-on-ransomware-leak-site-following-fta-hack/
2.ÃÀÁª´¢µÄITϵͳ¹ÊÕϵ¼ÖÂÉúÒâЧÀÍÔÝʱÖÐÖ¹£¬£¬£¬£¬£¬Ôµ¹ÊÔÓÉδ֪

2ÔÂ24ÈÕÃÀÁª´¢£¨Fed£©µÄITϵͳ±¬·¢ÑÏÖØµÄ¹ÊÕÏ£¬£¬£¬£¬£¬µ¼Öµç»ãµÈÉúÒâЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬ÏÖÔÚÔµ¹ÊÔÓÉÈÔȻδ֪¡£¡£ÆäÖÐÖ¹Ó°ÏìÁ˸ÃÒøÐÐÏÕЩËùÓеĵç×ÓЧÀÍ£¬£¬£¬£¬£¬°üÀ¨ÕÊ»§Ð§ÀÍ¡¢ÖÐÑëÒøÐС¢Check 21¡¢FedACH¡¢FedCash¡¢FedLine AdvantageµÈ¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ðí¶à¼ÓÃÜÇ®±ÒÉúÒâËù£¨ÀýÈçBinance£©Ò²ÌåÏÖЧÀÍÖÐÖ¹µ¼ÖÂÆäÎÞ·¨Ö´ÐÐACH´æ¿î»òÌá¿î¡£¡£Fed³ÆÊÇÓÉÓÚÆä²Ù×÷¹ýʧµ¼Ö´˴ÎÖÐÖ¹£¬£¬£¬£¬£¬µ«²¢Î´Í¸Â¶¸ü¶àϸ½Ú£¬£¬£¬£¬£¬¸ÃÎÊÌâÓÚÃÀ¹ú¶«²¿Ê±¼ä2ÔÂ24ÈÕÏÂÖç2:32±»½â¾ö¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/government/federal-reserve-nationwide-outage-impacts-us-banking-system/
3.·ÒÀ¼TietoEVRYÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬¿Í»§Ð§ÀÍÔÝʱÖÐÖ¹

·ÒÀ¼ITЧÀ͹«Ë¾TietoEVRYÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬¿Í»§Ð§ÀÍÔÝʱÖÐÖ¹¡£¡£TietoEVRYÊÇÒ»¼ÒÈí¼þ¿ª·¢ºÍITЧÀ͹«Ë¾£¬£¬£¬£¬£¬ÔÚ80¸ö¹ú¼ÒºÍµØÇøÓµÓÐ24000ÃûÔ±¹¤£¬£¬£¬£¬£¬2019ÄêµÄÊÕÈëΪ29.5ÒÚÅ·Ôª¡£¡£±¾ÖÜÒ»£¬£¬£¬£¬£¬TietoEVRYµÄÁãÊÛ¡¢ÖÆÔìºÍЧÀÍÏà¹ØÐÐÒµµÄ25¸ö¿Í»§ÌåÏÖÆäÓöµ½ÁËÊÖÒÕÎÊÌ⣬£¬£¬£¬£¬ØÊºóµÃÖªÕâЩÎÊÌâÊÇÓÉÀÕË÷Èí¼þ¹¥»÷ÒýÆðµÄ¡£¡£TietoEVRY·¢Ã÷¹¥»÷ºóÁ¬Ã¦¹Ø±ÕÁËÊÜÓ°ÏìµÄϵͳºÍЧÀÍ£¬£¬£¬£¬£¬²¢ÓëµØ·½Õþ¸®¶Ô´ËÊÂÕö¿ªÊӲ졣¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/finnish-it-services-giant-tietoevry-discloses-ransomware-attack/
4.IBMÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Ó°Ïì¶à¸ö²úÆ·µÄÎó²î

IBMÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËJava Runtime¡¢Planning Analytics WorkspaceºÍKenexa LMSÖеÄÎó²î¡£¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖØµÄÎó²îÊÇEclipse OpenJ9ÖеĻùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¨CVE-2020-27221£©£¬£¬£¬£¬£¬CVSSµÃ·ÖΪ9.8£¬£¬£¬£¬£¬¿É±»ÓÃÀ´Ö´ÐÐí§Òâ´úÂë»òµ¼ÖÂÓ¦ÓÃÍ߽⡣¡£Æä´ÎΪJava SE¿âµÄ×é¼þÖеÄCVE-2020-14782¡£¡£±ðµÄ£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËNode.jsÖеľܾøÐ§ÀÍÎó²î£¨CVE-2020-8251£©»ººÍ³åÇøÒç³öÎó²î£¨CVE-2020-8252£©µÈÎó²î¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/114942/security/ibm-security-flaws.html
5.TalosÐû²¼ÓйغڿÍ×éÖ¯GamaredonµÄÆÊÎö±¨¸æ

Cisco TalosÐû²¼ÁËÓйغڿÍ×éÖ¯GamaredonµÄÆÊÎö±¨¸æ¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬GamaredonÖÁÉÙ´Ó2013Äê×îÏÈ»îÔ¾£¬£¬£¬£¬£¬¶àÄêÀ´Ò»Ö±ÔÚÓëÇ×¶íÂÞ˹µÄ»î¶¯Óйء£¡£ËüÒ»Ö±±»ÒÔΪÊÇAPT£¬£¬£¬£¬£¬¿ÉÊÇÆäÌØÕ÷ÓëAPT²»·û¡£¡£GamaredonÍ»ÆÆÁËAPTģʽ£¬£¬£¬£¬£¬Ê¹ÓÃÁË´ó×ÚµÄÓòÃû£¬£¬£¬£¬£¬¿ØÖÆ×Å600¶à¸öÓò£¬£¬£¬£¬£¬ºÜÉÙÓÐÔÆÔÆÖØ´ó»ù´¡¼Ü¹¹µÄAPTС×éºã¾Ã»îÔ¾¡£¡£±ðµÄ£¬£¬£¬£¬£¬Gamaredon²»ÏñÆäËûAPT×éÖ¯Ò»ÑùÒþ²Ø×ã¼££¬£¬£¬£¬£¬Ò²Ã»ÓÐÕë¶ÔÐÔµÄÄ¿µÄ£¬£¬£¬£¬£¬Òò´ËÆä¸üÏñÊÇΪAPTÌṩЧÀ͵폷¨ÍŻ¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2021/02/gamaredonactivities.html
6.Trend MicroÐû²¼2020ÄêÍøÂçÇå¾²Ì¬ÊÆµÄ»ØÊ×±¨¸æ

Trend MicroÐû²¼ÁË2020ÄêÍøÂçÇå¾²Ì¬ÊÆµÄ»ØÊ×±¨¸æ¡£¡£±¨¸æÊÓ²ìÁË2020Äê·ºÆð²¢Ò»Á¬±£´æµÄ×îÏÔןÍÒªº¦µÄÇå¾²ÎÊÌ⣬£¬£¬£¬£¬²¢ÎªÓû§ºÍ×éÖ¯ÌṩÁËÓ¦¶Ô¼±¾çת±äµÄÍþвµÄ½¨Òé¡£¡£ÐÂÀÕË÷Èí¼þ¼Ò×åµÄÊýÄ¿ÓÉ2019ÄêµÄ¸öÔöÌíµ½2020ÄêµÄ127¸ö£¬£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÕþ¸®¡¢ÒøÐС¢ÖÆÔìÒµºÍÒ½ÁƱ£½¡ÐÐÒµ¡£¡£±ðµÄ£¬£¬£¬£¬£¬2020Äê¼ì²âµ½Áè¼Ý1600Íò¸öÓëCovid-19Ïà¹ØµÄÍþв£¬£¬£¬£¬£¬ÆäÖÐÓÐ60£¥ÒÔÉÏÀ´×ÔÃÀ¹ú¡¢µÂ¹úºÍ·¨¹ú¡£¡£
ÔÎÄÁ´½Ó£º
https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/a-constant-state-of-flux-trend-micro-2020-annual-cybersecurity-report


¾©¹«Íø°²±¸11010802024551ºÅ