ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂçÇå¾²±ê×¼£»£»£»RealtekÐÞ¸´Windows HDÒôƵÇý¶¯³ÌÐòÖеÄDLLÐ®ÖÆÎó²î
Ðû²¼Ê±¼ä 2020-02-051.ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂçÇå¾²±ê×¼
ÃÀ¹ú·À²¿1ÔÂ31ÈÕÕýʽÐû²¼ÍøÂçÇå¾²³ÉÊì¶ÈÄ£×ÓÈÏÖ¤£¨CMMC£©¿ò¼Ü1.0°æ±¾¡£¡£¡£¹ú·À²¿Ðû²¼£¬£¬£¬£¬£¬£¬µ½2026Äê¹ú·À³Ð°üÉÌÔÚ»ØÓ¦Õþ¸®²É¹ºÍýÏëµÄÌá°¸ÇëÇóʱ£¬£¬£¬£¬£¬£¬±ØÐèÖª×ã»ù±¾µÄÍøÂçÇå¾²±ê×¼¡£¡£¡£Ëæ×ÅCMMCµÄÍÆ³ö£¬£¬£¬£¬£¬£¬¹ú·À²¿Ï£Íûͨ¹ýÌá¸ß¹ú·À¹¤Òµ»ù´¡£¡£¡£¨DIB£©·Ö°üÉ̵ÄÍøÂçÇå¾²×¼±¸Ë®Æ½£¬£¬£¬£¬£¬£¬À´ÔöÇ¿¶Ô¹©Ó¦Á´Î´·ÖÀàÐÅÏ¢£¨Áª°îÌõÔ¼ÐÅÏ¢£¨FCI£©ºÍÊÜ¿ØÎ´·ÖÀàÐÅÏ¢£¨CUI£©£©µÄ±£»£»£»¤¡£¡£¡£CMMCÖ¼ÔÚͨ¹ýʹÓÃ5ÖÖ¼¶±ðµÄÈÏÖ¤À´¼ò»¯´óÐͺÍСÐ͹ú·À³Ð°üÉ̵ÄÍøÂçÍ£µ±ÐÔÈÏÖ¤£¬£¬£¬£¬£¬£¬ÖصãÊÇÍøÂçÇ徲ʵ¼ùºÍÁ÷³Ì¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/dod-to-require-cybersecurity-certification-from-defense-contractors/
2.°Ä´óÀûÑÇ»õÔ˹«Ë¾Toll GroupÔâµ½ÀÕË÷Èí¼þ¹¥»÷
ΪӦ¶ÔÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬°Ä´óÀûÑÇÔËÊäºÍÎïÁ÷¾ÞÍ·Toll Group±»ÆÈ¹Ø±Õ²¿·ÖÔÚÏßЧÀÍ£¬£¬£¬£¬£¬£¬²¿·Ö¿Í»§¶Ô¸Ã¹«Ë¾µÄ´¦Öóͷ£·½·¨ÌåÏÖ²»Öª×ã¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬ËüÓÚ1ÔÂ31ÈÕÐÇÆÚÎåÔÚÆäϵͳÉÏ·¢Ã÷ÁËÒ»¸öÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬²¢½ûÓÃÁËijЩϵͳÀ´×èÖ¹´ËÊÂÎñ¡£¡£¡£Ò»Ð©¿Í»§ÔÚÉ罻ýÌåÉÏËß¿àËûÃÇÎÞ·¨ÔÙ¸ú×Ù°ü¹ü£¬£¬£¬£¬£¬£¬²¢Éù³Æ¸Ã¹«Ë¾µÄÔ±¹¤Ò²ÎÞ·¨»á¼û¸ú×ÙÊý¾Ý¿â¡£¡£¡£ÓÐÐÂÎÅÈËÊ¿³Æ¸ÃÊÂÎñÓ°ÏìÁ˰ĴóÀûÑÇ¡¢Ó¡¶ÈºÍ·ÆÂɱöµÄÓªÒµ¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÖÐʹÓõÄÊÇÄÄÖÖÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒÑ֪ͨÓйز¿·Ö£¬£¬£¬£¬£¬£¬µ«Éù³ÆÉÐδÕÒµ½ÈκÎÖ¤¾ÝÅúעСÎÒ˽¼ÒÊý¾ÝÒѱ»Ð¹Â¶¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/australian-shipping-giant-toll-hit-ransomware
3.ÀÕË÷Èí¼þDoppelPaymer½«ÔÚ°µÍø³öÊÛδ¸¶¿îÊܺ¦ÕßµÄÊý¾Ý
ÀÕË÷Èí¼þDoppelPaymerÍþв³ÆÈôÊÇÊܺ¦Õß²»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬£¬ËûÃǽ«ÔÚ°µÍø³öÊÛ»òÐû²¼ÍµÈ¡µÄÊܺ¦ÕßÎļþ¡£¡£¡£ÕâÖÖÐµĹ¥»÷Õ½ÂÔʼÓÚ2019Äê11Ô£¬£¬£¬£¬£¬£¬ÓÉÀÕË÷Èí¼þMazeÌᳫ£¬£¬£¬£¬£¬£¬ËæºóÓÉSodinokibi/REvilºÍNemty¸ú½ø£¬£¬£¬£¬£¬£¬ÏÖÔÚÂÖµ½DoppelPaymerÁË¡£¡£¡£DoppelPaymer¹¥»÷Õ߳ƽüÒ»ÄêÀ´ËûÃÇÒ»Ö±´ÓÊܺ¦ÕßÄÇÀïÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬²¢ÇÒÉù³Æµ±Êܺ¦Õß²»Ö§¸¶Êê½ðʱ£¬£¬£¬£¬£¬£¬ËûÃÇÒÑÍù¾ÍÔøÔÚ°µÍøÉÏÄäÃû³öÊÛÕâЩÊý¾Ý¡£¡£¡£ÎªÁË֤ʵÕâÒ»µã£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Ðû²¼ÁËÁ½¸öExcel±í¸ñ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ËûÃÇÔøÈëÇÖµÄÁ½¸öÍøÂçµÄWindows DomainÓû§ÁÐ±í£¬£¬£¬£¬£¬£¬µ«Ã»ÓзÖÏí¾Ý³Æ´ÓÊܺ¦ÕßÄÇÀï͵ȡµÄÈκÎÎļþ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/
4.ºÚ¿ÍʹÓÃSharePointÎó²î(CVE-2019-0604)¹¥»÷Öж«µØÇø
Palo Alto Networks µÄ Unit 42·¢Ã÷ºÚ¿ÍÈÔÔÚʹÓÃSharePointÎó²î£¨CVE-2019-0604£©¹¥»÷Öж«Õþ¸®×éÖ¯¡£¡£¡£ÔÚ2019Äê9ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÊӲ쵽¹¥»÷ÕßʹÓøÃÎó²îÔÚÖж«Õþ¸®×éÖ¯µÄÍøÕ¾ÉÏ×°ÖÃÁ˶à¸öWeb Shell£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»¸öÊÇGithubÉÏÃâ·ÑÌṩµÄ¿ªÔ´AntSword Web Shell¡£¡£¡£¹¥»÷ÕßʹÓÃÕâЩWeb ShellºáÏòÒÆ¶¯ÍøÂç»á¼ûÆäËüϵͳ£¬£¬£¬£¬£¬£¬²¢Ê¹Óö¨ÖƵÄMimikatz±äÖÖ´ÓÄÚ´æÖÐת´¢Æ¾Ö¤ºÍʹÓÃImpacketµÄatexec¹¤¾ßÔÚÕû¸öÍøÂçµÄÆäËüϵͳÉÏÔËÐÐÏÂÁî¡£¡£¡£9ÔÂÏÂÑ®£¬£¬£¬£¬£¬£¬Unit 42ÊӲ쵽ÏàͬµÄMimikatz±äÖÖ±»ÉÏÔØµ½ÁíÒ»ÆäÖж«¹ú¼ÒµÄÁíÒ»¸öÕþ¸®×éÖ¯µÄWeb ShellÖС£¡£¡£2020Äê1ÔÂÉÏÑ®£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ê¹ÓÃShodanËÑË÷ÁË̻¶µÄSharePointЧÀÍÆ÷£¬£¬£¬£¬£¬£¬·¢Ã÷ÈÔÓÐ28881¸öЧÀÍÆ÷ʹÓñ£´æÎó²îµÄ°æ±¾¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/actors-still-exploiting-sharepoint-vulnerability/
5.Ñо¿Ö°Ô±·¢Ã÷ÐÂÀÕË÷Èí¼þEKANSÖ÷ÒªÕë¶Ô¹¤Òµ¿ØÖÆÏµÍ³
2ÔÂ3ÈÕÇå¾²³§ÉÌDragosÐû²¼Ò»·Ý±¨¸æ³Æ£¬£¬£¬£¬£¬£¬ÐÂÀÕË÷Èí¼þEKANSÒýÆðÁËÇå¾²Ñо¿Ö°Ô±µÄ×¢ÖØ£¬£¬£¬£¬£¬£¬ÓÉÓÚ¸ÃÀÕË÷Èí¼þ¾ßÓÐÆÈʹÅÌËã»ú×èÖ¹Ó빤ҵ¿ØÖÆÏµÍ³ÓйصÄÌØ¶¨»î¶¯»òÀú³ÌµÄÄÜÁ¦¡£¡£¡£Ñо¿Ö°Ô±Joe SlowikÌåÏÖ£¬£¬£¬£¬£¬£¬Ö»¹ÜÆä¹¥»÷Ïà¶ÔÔʼ£¬£¬£¬£¬£¬£¬µ«EKANSÕÕ¾É×Ô¶¯Õë¶ÔICSÇéÐÎÖеÄÄ³Ð©ÌØ¶¨²úÆ·£¬£¬£¬£¬£¬£¬°üÀ¨ÓëGE ProficyµÄÊý¾ÝÀúʷЧÀÍ¡¢GE Fanuc licensing serverµÄЧÀÍÒÔ¼°HoneywellµÄHMIWebÓ¦ÓÃÓйصÄÀú³Ì¡£¡£¡£ÏÖÔÚ¸ÃÀÕË÷Èí¼þËÆºõ»¹²»ÊÇÒ»¸öºÜ´óµÄΣÏÕ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪEKANS¿ÉÄÜÓëÁíÒ»¸öÕë¶ÔICSµÄÀÕË÷Èí¼þMegaCortex±£´æ¹ØÁª¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/attacks-breaches/ekans-ransomware-raises-industrial-control-worries/d/d-id/1336950
6.RealtekÐÞ¸´Windows HDÒôƵÇý¶¯³ÌÐòÖеÄDLLÐ®ÖÆÎó²î
RealtekÐÞ¸´ÁËWindows HDÒôƵÇý¶¯³ÌÐò°üÖеÄÒ»¸öDLLÐ®ÖÆÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-19705£©¿ÉÄÜÔÊÐíDZÔڵĹ¥»÷Õß»ñµÃ³¤ÆÚÐÔ¡¢Ö²Èë¶ñÒâÈí¼þ²¢Ìӱܼì²â¡£¡£¡£SafeBreach LabsÇå¾²Ñо¿Ô±Peleg Hadar·¢Ã÷Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬HadarÌåÏÖ¸ÃÎó²îÊÇÓÉÒÑÊðÃûµÄHDÒôƵÅä¾°£¨RAVBg64.exe£©Àú³Ìµ¼Öµģ¬£¬£¬£¬£¬£¬¸ÃÀú³ÌÊÔͼ´ÓÆäÄ¿½ñÊÂÇéĿ¼£¨CWD£©¶ø²»ÊÇDLLµÄÏÖʵλÖüÓÔØDLL£¬£¬£¬£¬£¬£¬²¢ÇÒûÓÐÑéÖ¤DLLµÄÊðÃûÖ¤Êé¡£¡£¡£ÕâÒ»ÎÊÌâµÄ»ù´¡Ôµ¹ÊÔÓÉÊÇÔÚÇý¶¯³ÌÐò°ü£¨°æ±¾1.0.0.8855£©ÖÐʹÓÃÁËMicrosoft Visual Studio 2005 MFC£¬£¬£¬£¬£¬£¬µ¼Ö¸óÌÐò°ü»á×Ô¶¯¼ÓÔØ×ÊÔ´DLL¡£¡£¡£Realtekͨ¹ý8857¼°¸ü¸ß°æ±¾µÄHD AudioÇý¶¯³ÌÐò°üÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/realtek-fixes-dll-hijacking-flaw-in-hd-audio-driver-for-windows/