΢ÈíÐû²¼Õë¶ÔSMBv3Îó²îµÄKB4551762Çå¾²¸üУ»£»£»?ºÉÀ¼Õþ¸®É¥Ê§Áè¼Ý690ÍòÆ÷¹Ùļ¾èÕßÊý¾Ý

Ðû²¼Ê±¼ä 2020-03-13

1.΢ÈíÐû²¼Õë¶ÔSMBv3Îó²îµÄKB4551762Çå¾²¸üÐÂ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


΢Èí½ñÌìÔçЩʱ¼äÐû²¼ÁËÕë¶ÔSMBv3 RCEÎó²î£¨CVE-2020-0796£©µÄ²¹¶¡¸üУ¨KB4551762£© £¬£¬£¬£¬£¬Óû§¿ÉÒÔͨ¹ýWindows Update¼ì²é¸üлò´Ó΢Èí²¹¶¡Ä¿Â¼£¨https://www.catalog.update.microsoft.com/Search.aspx?q=KB4551762£©ÉÏÊÖ¶¯ÏÂÔØÊʺÏ×Ô¼ºWindows°æ±¾µÄKB4551762¡£¡£¡£Î¢ÈíÌåÏÖËäȻûÓз¢Ã÷ʹÓôËÎó²îµÄ¹¥»÷ £¬£¬£¬£¬£¬µ«½¨ÒéÓû§ÓÅÏÈ×°Öô˸üС£¡£¡£´ËÎó²îÒ²±»³ÆÎªSMBGhost»òEternalDarkness £¬£¬£¬£¬£¬½öÓ°ÏìÔËÐÐWindows 10°æ±¾1903ºÍ1909ÒÔ¼°Windows Server Server Core×°Öð汾1903ºÍ1909µÄ×°±¸¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-releases-kb4551762-security-update-for-smbv3-vulnerability/


2.Turla APTÐÂË®¿Ó¹¥»÷ £¬£¬£¬£¬£¬Ê¹ÓÃкóÃÅÕë¶ÔÑÇÃÀÄáÑÇ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ESETÑо¿Ö°Ô±·¢Ã÷¶íÂÞ˹ºÚ¿ÍÍÅ»ïTurla APTµÄÐÂË®¿Ó¹¥»÷ £¬£¬£¬£¬£¬¸Ã¹¥»÷ÖÁÉÙ´Ó2019ÄêÍ·×îÏÈ £¬£¬£¬£¬£¬ÖÁÉÙÓÐËĸöÑÇÃÀÄáÑÇÍøÕ¾Êܵ½Ñ¬È¾ £¬£¬£¬£¬£¬°üÀ¨¶íÂÞ˹ÑÇÃÀÄáÑÇ´óʹ¹ÝÁìÊ´¦£¨armconsul[.]ru£©¡¢Artsakh¹²ºÍ¹ú×ÔÈ»±£»£»£»¤ºÍ×ÔÈ»×ÊÔ´²¿£¨mnp.nkr[.]am£©¡¢ÑÇÃÀÄáÑǹú¼ÊºÍÇå¾²ÊÂÎñÑо¿Ëù£¨aiisa[.]am£©ºÍÑÇÃÀÄáÑÇ´æ¿îµ£±£»£»£»ù½ð£¨adgf[.]am£©¡£¡£¡£¹¥»÷ÕßʹÓÃÐéαµÄAdobe Flash¸üзַ¢Á½¸öеĶñÒâÈí¼þ £¬£¬£¬£¬£¬°üÀ¨¶ñÒâÈí¼þÊÍ·ÅÆ÷NetFlashºÍľÂíPyFlash¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/03/12/tracking-turla-new-backdoor-armenian-watering-holes/


3.Operation Overtrap¹¥»÷»î¶¯ £¬£¬£¬£¬£¬Õë¶ÔÈÕ±¾ÒøÐÐÓû§


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ç÷ÊÆ¿Æ¼¼·¢Ã÷Õë¶ÔÈÕ±¾ÒøÐÐÓû§µÄй¥»÷»î¶¯¡°Operation Overtrap¡± £¬£¬£¬£¬£¬¸Ã»î¶¯×Ô2019Äê4ÔÂÒÔÀ´Ò»Ö±»îÔ¾ £¬£¬£¬£¬£¬²¢ÇÒʹÓÃÈýÖÖ²î±ðµÄ¹¥»÷ǰÑÔÀ´ÇÔÈ¡Êܺ¦ÕßµÄÒøÐÐÆ¾Ö¤£ºÍ¨¹ýÀ¬»øÓʼþ·¢ËÍαװ³ÉÒøÐÐÍøÕ¾µÄ´¹ÂÚÁ´½Ó£»£»£»Í¨¹ýÀ¬»øÓʼþÒªÇóÊܺ¦Õß´ÓÁ´½ÓµÄÍøÕ¾ÉÏÏÂÔØ¶ñÒâÈí¼þµÄ¿ÉÖ´ÐÐÎļþ£»£»£»Í¨¹ý¶¨ÖƵÄÎó²îʹÓù¤¾ß°ü£¨BottleEK£©Èö²¥¶ñÒâÈí¼þ¡£¡£¡£¹¥»÷ÕßÖ÷ҪʹÓõĶñÒâÈí¼þÊÇÐÂÒøÐÐľÂíCinobi¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/operation-overtrap-targets-japanese-online-banking-users-via-bottle-exploit-kit-and-brand-new-cinobi-banking-trojan/


4.ºÏÇڿƼ¼ÍøÂçÖÎÀíÈí¼þ16¸öÎó²î £¬£¬£¬£¬£¬³§ÉÌÉÐδÐÞ¸´


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨



Ñо¿Ö°Ô±ÔÚºÏÇڿƼ¼£¨Zyxel£©µÄÍøÂçÖÎÀíÈí¼þCloudCNM SecuManagerÖз¢Ã÷16¸öÇå¾²Îó²î £¬£¬£¬£¬£¬ÕâЩÎó²î°üÀ¨¶à¸öºóÃźÍÓ²±àÂëµÄĬÈÏÆ¾Ö¤¡¢ÃÜÔ¿µÈ¡£¡£¡£Ñо¿Ö°Ô±³ÆÊÜÓ°ÏìµÄ°æ±¾°üÀ¨CloudCNM SecuManager 3.1.0ºÍ3.1.1 £¬£¬£¬£¬£¬¶øËüÃǵÄ×îиüÐÂÈÕÆÚΪ2018Äê11Ô¡£¡£¡£Zyxel Gateway SBUµÄ¸ß¼¶¸±×ܲÃNathan YenÌåÏָù«Ë¾ÏÖÔÚÒÑÒâʶµ½ÎÊÌâ £¬£¬£¬£¬£¬²¢ÕýÔÚÆð¾¢Ñ¸ËÙÐÞ¸´Îó²î¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/flaws-zyxels-network-management-software/153554/


5.AvastɱÈíÔÚÆØ³öÑÏÖØÎó²îºó½ûÓÃJavaScriptɨÃèÒýÇæ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¹È¸èÇå¾²Ñо¿Ö°Ô±Ëþά˹¡¤°ÂÂüµÏ£¨Tavis Ormandy£©·¢Ã÷Avastɱ¶¾Èí¼þ±£´æÎó²î £¬£¬£¬£¬£¬¿ÉÔÊÐíºÚ¿ÍÔÚÓû§ÅÌËã»úÉÏÔ¶³ÌÖ´ÐжñÒâ´úÂë¡£¡£¡£AvastÔÚÒ»ÖÜǰ¾Í½Óµ½Á˸ÃÎó²îµÄ±¨¸æ £¬£¬£¬£¬£¬µ«ÈÔδ½â¾ö¸ÃÎÊÌâ £¬£¬£¬£¬£¬¸Ã¹«Ë¾¾öÒéÔÝʱ½ûÓÃɱÈíÖеÄJavaScriptɨÃèÒýÇæ¡£¡£¡£OrmandyÌåÏÖ¸ÃÎó²îºÜÈÝÒ×±»Ê¹Óà £¬£¬£¬£¬£¬¹¥»÷ÕßÖ»Ðèͨ¹ýµç×ÓÓʼþ·¢ËͶñÒâJavaScript»òWSHÎļþ £¬£¬£¬£¬£¬»òÓÕʹÓû§·­¿ª°üÀ¨¶ñÒâJavaScriptµÄÎļþ £¬£¬£¬£¬£¬¼´¿ÉÒÔϵͳ¼¶»á¼ûȨÏÞÖ´ÐжñÒâ²Ù×÷ £¬£¬£¬£¬£¬ÀýÈç×°ÖöñÒâÈí¼þ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/avast-disables-javascript-engine-in-its-antivirus-following-major-bug/


6.ºÉÀ¼Õþ¸®É¥Ê§Áè¼Ý690ÍòÆ÷¹Ùļ¾èÕßÊý¾Ý £¬£¬£¬£¬£¬Õ¼×ÜÉú³Ý½üÒ»°ë


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÉÀ¼Õþ¸®ÌåÏÖɥʧÁËÁ½¸ö´æÓÐ690ÍòÆ÷¹Ù¾èÔùÕßÊý¾ÝµÄÓ²ÅÌ £¬£¬£¬£¬£¬ÕâЩÊý¾ÝÊÇ1998Äê2ÔÂÖÁ2010Äê6ÔÂʱ´úÏòºÉÀ¼¾èÔùÕ߹ҺŴ¦Ìá½»µÄËùÓоèÔùÕß±í¸ñµÄ±¸·Ý¡£¡£¡£ÕâЩӲÅ̵Ä×îºóʹÓÃʱ¼äÊÇ2016Äê £¬£¬£¬£¬£¬ËæºóËüÃDZ»°²ÅÅÔÚÒ»¸öÇå¾²µÄ±£¹Ü¿âÖС£¡£¡£µ«ÔÚ½ñÄêÔçЩʱ¼äÕþ¸®·¢Ã÷Ó²ÅÌɥʧ £¬£¬£¬£¬£¬²¢ÇÒÏÖÔÚÈÔÈ»ÎÞ·¨ÕÒµ½¡£¡£¡£Ó²ÅÌÖд洢µÄÐÅÏ¢°üÀ¨×¢²á¾èÔùÕßµÄÐÕÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢µØµã¡¢Æ÷¹Ù¾èÔùµÄÑ¡Ôñ¡¢IDÒÔ¼°ÊðÃû¡£¡£¡£ºÉÀ¼µÄ×ÜÉú³ÝΪ1740Íò×óÓÒ £¬£¬£¬£¬£¬ÆäÖнüÒ»°ë±»ÒÔΪÊÇ×¢²á¾èÔùÕß¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/dutch-government-loses-hard-drives-with-data-of-6-9-million-registered-donors/