»ÝÆÕÔÙ´ÎÖÒÑÔ²¿·ÖSSD½«ÔÚÔËÐÐ4ÍòСʱºó·ºÆð¹ÊÕÏ£»£»£»£»£»£»ºÚ¿Íͨ¹ýÐ®ÖÆÂ·ÓÉÆ÷DNSÈö²¥OskiľÂí

Ðû²¼Ê±¼ä 2020-03-25

1.GE¹©Ó¦ÉÌÔâºÚ¿ÍÈëÇÖµ¼ÖÂÔ±¹¤ÐÅϢй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ͨÓÃµçÆø£¨GE£©ÌåÏÖÔÚÒ»¼ÒЧÀÍÌṩÉÌÔâµ½ºÚ¿ÍÈëÇÖºóÆäÏÖÈΡ¢Ç°ÈÎÔ±¹¤ÒÔ¼°Ïà¹ØÊÜÒæÈ˵ÄСÎÒ˽¼ÒÉí·ÝÐÅϢй¶¡£¡£¡£¡£GEÔÚÏò¼ÓÀû¸£ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÊý¾Ýй¶֪ͨÖÐ³Æ £¬£¬£¬£¬£¬ £¬£¬ÆäЧÀÍÌṩÉ̼ÑÄÜÓªÒµÁ÷³ÌЧÀÍÓÐÏÞ¹«Ë¾£¨Canon Business Process Services £¬£¬£¬£¬£¬ £¬£¬Inc.£©µÄÒ»¸öÓÊÏäÕË»§ÔÚ2ÔÂ3ÈÕÖÁ14ÈÕÖ®¼äÔâδÊÚȨ»á¼û £¬£¬£¬£¬£¬ £¬£¬¸ÃÕË»§°üÀ¨²¿·ÖGEÔ±¹¤ºÍÏà¹ØÊÜÒæÈ˵ÄÎļþ £¬£¬£¬£¬£¬ £¬£¬ÀýÈçÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§ºÅÂë¡¢ÈËΪ±í¡¢¼ÝÕÕ¡¢»¤ÕÕ¡¢ÉúÈÕ¡¢Íê»é֤ʵµÈ £¬£¬£¬£¬£¬ £¬£¬GEµÄϵͳδÊܵ½ÊÂÎñÓ°Ïì¡£¡£¡£¡£GEûÓÐ͸¶ÊÜÓ°ÏìµÄÏêϸÈËÊý £¬£¬£¬£¬£¬ £¬£¬CanonÌåÏÖ½«Í¨¹ýÒ»¼ÒÃûΪExperianµÄ¹«Ë¾Ãâ·ÑΪÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêµÄÉí·Ý±£»£»£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/tech-giant-ge-discloses-data-breach-after-service-provider-hack/


2.FireEyeÖÒÑÔÕë¶ÔICSµÄºÚ¿Í¹¤¾ßÕýÔÚÂþÒç


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


FireEyeÇå¾²Ñо¿Ö°Ô±ÖÒÑÔ³Æ £¬£¬£¬£¬£¬ £¬£¬Õë¶Ô¹¤Òµ¿ØÖÆÏµÍ³£¨ICS£©µÄºÚ¿Í¹¤¾ßÕýÔÚÂþÒç £¬£¬£¬£¬£¬ £¬£¬Õâ½µµÍÁ˹¥»÷ÕßµÄ×¼ÈëÃż÷ £¬£¬£¬£¬£¬ £¬£¬²¢ÔöÌíÁ˹¤ÒµÆóÒµµÄΣº¦¡£¡£¡£¡£ÔÚ×î½üµÄÒ»ÏîÑо¿ÖÐ £¬£¬£¬£¬£¬ £¬£¬FireEyeÆÊÎöÁ˽üÄêÀ´Ðû²¼µÄ¾ßÓÐÕë¶ÔICS¹¦Ð§µÄËùÓкڿ͹¤¾ß £¬£¬£¬£¬£¬ £¬£¬ËäȻһЩ¹¤¾ßÔçÔÚ2004Äê¾ÍÒѽ¨Éè £¬£¬£¬£¬£¬ £¬£¬µ«´ó´ó¶¼¶¼ÊÇÔÚÒÑÍù10ÄêÖпª·¢µÄ¡£¡£¡£¡£FireEyeÌåÏÖ´ó´ó¶¼ºÚ¿Í¹¤¾ß¶¼Ó빩ӦÉÌÎÞ¹Ø £¬£¬£¬£¬£¬ £¬£¬Ö÷ҪɨÃèICSÍøÂçÉϵÄͨÓÃÖ¸±ê £¬£¬£¬£¬£¬ £¬£¬µ«Ò²ÓÐÕë¶ÔÌØ¶¨ICS¹©Ó¦ÉÌ¿ª·¢µÄ¹¤¾ß £¬£¬£¬£¬£¬ £¬£¬ÕâЩ¹¤¾ßÖÐ60%¶¼ÊÇÕë¶ÔÎ÷ÃÅ×Ó¡£¡£¡£¡£Æ¾Ö¤FireEyeµÄ˵·¨ £¬£¬£¬£¬£¬ £¬£¬´ó´ó¶¼ICSºÚ¿Í¹¤¾ß¶¼ÊÇ»ùÓÚµ±½ñÈýÖÖ×îÊ¢ÐеÄÉøÍ¸²âÊÔ¿ò¼ÜÄ£¿£¿£¿£¿£¿£¿é-Metasploit¡¢Core ImpactºÍImmunity Canvas¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fireeye-warns-about-the-proliferation-of-ready-made-ics-hacking-tools/


3.WildPressure¹¥»÷»î¶¯ £¬£¬£¬£¬£¬ £¬£¬Õë¶ÔÖж«¹¤Òµ×éÖ¯


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¿¨°Í˹»ùʵÑéÊÒµÄÇ徲ר¼Ò·¢Ã÷Õë¶ÔÖж«¹¤Òµ×éÖ¯µÄAPT¹¥»÷»î¶¯WildPressure¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2019Äê8ÔÂÊ״η¢Ã÷ÁËWildPressure £¬£¬£¬£¬£¬ £¬£¬ÆäʱÑо¿Ö°Ô±¼ì²âµ½Ò»¸öеĶñÒâÈí¼þMilum¡£¡£¡£¡£MilumÊÇÒ»¸ö³ÉÊìµÄC++ľÂí £¬£¬£¬£¬£¬ £¬£¬¸Ã¶ñÒâÈí¼þÓëÒÑÖªµÄÈκι¥»÷»î¶¯¾ùûÓÐÏàËÆµÄ´úÂë £¬£¬£¬£¬£¬ £¬£¬Ò²Ã»Óй¥»÷Ä¿µÄÉϵĽ»Ö¯¡£¡£¡£¡£ÏÖʵÉÏ £¬£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±½öÔÚÒ»¸ö¹ú¼ÒÖз¢Ã÷ÁË3¸ö×ÔÁ¦µÄÑù±¾¡£¡£¡£¡£Ä¿½ñÈÔ²»ÇåÎú¹¥»÷ÕßÈö²¥MilumľÂíµÄ·½·¨ £¬£¬£¬£¬£¬ £¬£¬²¢ÇÒÎÞ·¨½«Æä¹éÒò £¬£¬£¬£¬£¬ £¬£¬µ«Ñо¿Ö°Ô±ÒÔΪ¹¥»÷Õß¿ÉÄÜ»áÔÚÆäËü¹¥»÷»î¶¯ÖÐÖØ¸´Ê¹ÓøÃľÂí¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/wildpressure-targets-industrial-in-the-middle-east/96360/


4.ºÚ¿Íͨ¹ýÐ®ÖÆÂ·ÓÉÆ÷DNSÈö²¥OskiľÂí


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔÚ×î½üµÄ¹¥»÷»î¶¯ÖÐ £¬£¬£¬£¬£¬ £¬£¬ºÚ¿Íͨ¹ýÐ®ÖÆÂ·ÓÉÆ÷µÄDNSÉèÖÃÔÚÓû§µÄWebä¯ÀÀÆ÷ÉÏÏÔʾÐéαµÄCOVID-19¾¯±¨²¢·Ö·¢ÐÅÏ¢ÇÔȡľÂíOski¡£¡£¡£¡£ÏÖÔÚÉв»ÖªµÀ¹¥»÷ÕßÔõÑù»ñµÃ¶Ô·ÓÉÆ÷µÄ»á¼ûºÍ¸ü¸ÄÆäDNSÉèÖà £¬£¬£¬£¬£¬ £¬£¬µ«¿ÉÄÜÊÇͨ¹ýÈõÃÜÂëÀ´¾ÙÐÐÔ¶³Ì»á¼û¡£¡£¡£¡£ÏêϸÀ´Ëµ £¬£¬£¬£¬£¬ £¬£¬¹¥»÷Õß½«Â·ÓÉÆ÷µÄDNSЧÀÍÆ÷¸ü¸ÄΪ109.234.35.230ºÍ94.103.82.249 £¬£¬£¬£¬£¬ £¬£¬µ±WindowsÔËÐÐNCSI̽ÕëÀ´¼ì²éÅÌËã»úÊÇ·ñÒÑÅþÁ¬µ½»¥ÁªÍøÊ± £¬£¬£¬£¬£¬ £¬£¬¶ñÒâDNSЧÀÍÆ÷½«Æä·¢Ë͵½¶ñÒâIP 176.113.81.159 £¬£¬£¬£¬£¬ £¬£¬¸ÃIPÉϵÄÍøÕ¾ÒªÇóÓû§ÏÂÔØ²¢×°ÖöñÒâµÄ¡°Emergency-COVID-19 Informator¡±»ò¡°COVID-19 Inform App¡± £¬£¬£¬£¬£¬ £¬£¬¸Ã³ÌÐòÏÖʵÉÏÊÇÐÅÏ¢ÇÔȡľÂíOski¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-hijack-routers-dns-to-spread-malicious-covid-19-apps/


5.΢ÈíÐû²¼AstarothľÂíй¥»÷Á´µÄÆÊÎö±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤΢ÈíDefender ATPÍŶӵÄÒ»·ÝÑо¿±¨¸æ £¬£¬£¬£¬£¬ £¬£¬AstarothľÂíÔÚ2Ô³õ±äµÃ»îÔ¾ £¬£¬£¬£¬£¬ £¬£¬²¢ÇÒ¹¥»÷ÕßÒýÈëÁËÐÂÊÖÒÕʹ¹¥»÷Á´Ô½·¢Òþ²Ø¡£¡£¡£¡£AstarothÏÖÔÚÑïÆúÁËÒÀÀµWindowsÖÎÀí¹¤¾ßÏÂÁîÐУ¨WMIC£©µÄÏà¹ØÌÓ±ÜÊÖÒÕ £¬£¬£¬£¬£¬ £¬£¬×ªÏòÀÄÓñ¸ÓÃÊý¾ÝÁ÷£¨ADS£©À´Òþ²Ø¶ñÒâºÉÔØÒÔ¼°ÀÄÓÃÕýµ±Àú³ÌExtExport.exe£¨Ò»ÖÖºÜÊDz»³£¼ûµÄ¹¥»÷ǰÑÔ£©À´¼ÓÔØÓÐÓúÉÔØ¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÆÏÌÑÑÀÓïµÄµç×ÓÓʼþ £¬£¬£¬£¬£¬ £¬£¬ÓʼþÖаüÀ¨Ö¸ÏòÍйܴ浵ÎļþµÄURLÁ´½Ó £¬£¬£¬£¬£¬ £¬£¬ÎļþÖаüÀ¨ÓÕµ¼ÐÔµÄLNKÎļþ £¬£¬£¬£¬£¬ £¬£¬µã»÷ʱLNKÎļþ½«ÔËÐлìÏýµÄBATÏÂÁî¡£¡£¡£¡£BATÏÂÁîŲÓÃexplorer.exeÀ´ÔËÐÐJavaScriptÎļþ £¬£¬£¬£¬£¬ £¬£¬²¢Ê¹ÓÃGetObjectÊÖÒÕÔÚÄÚ´æÖÐÔËÐиü´óµÄÖ÷JavaScript £¬£¬£¬£¬£¬ £¬£¬È»ºóÖ÷¾ç±¾Å²ÓÃBITSAdminµÄ¶à¸öʵÀý´ÓC2ÏÂÔØ¶à¸ö¶þ½øÖÆBlob £¬£¬£¬£¬£¬ £¬£¬²¢Á¬ÏµÈý¸öBlobÐγɲ¢¼ÓÔØµÚÒ»½×¶Î¶ñÒâ´úÂë £¬£¬£¬£¬£¬ £¬£¬×îºó¶ÁÈ¡ADSÁ÷²¢½âÃÜΪAstarothµÄDLL £¬£¬£¬£¬£¬ £¬£¬·´Éä¼ÓÔØµ½userinit.exeÖС£¡£¡£¡£ÔÚÕâ¸öÀú³ÌÖÐAstaroth²»»á½Ó´¥´ÅÅÌ £¬£¬£¬£¬£¬ £¬£¬Ö±½Ó¼ÓÔØµ½ÄÚ´æÖС£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2020/03/23/latest-astaroth-living-off-the-land-attacks-are-even-more-invisible-but-not-less-observable/


6.»ÝÆÕÔÙ´ÎÖÒÑÔ²¿·ÖSSD½«ÔÚÔËÐÐ4ÍòСʱºó·ºÆð¹ÊÕÏ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


»ÝÆÕÔÙ´ÎÖÒÑÔÆä¿Í»§ £¬£¬£¬£¬£¬ £¬£¬Ä³Ð©´®ÐÐÅþÁ¬µÄSCSI¹Ì̬ӲÅÌ»áÔÚÔËÐÐ4ÍòСʱ£¨Ï൱ÓÚ4Äê206Ìì16¸öСʱ£©ºó·ºÆð¹ÊÕÏ £¬£¬£¬£¬£¬ £¬£¬Êý¾ÝºÍÓ²Å̾ùÎÞ·¨»Ö¸´¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ2019Äê11ÔÂÐû²¼ÁËÀàËÆµÄͨ¸æ £¬£¬£¬£¬£¬ £¬£¬Æäʱ²¿·ÖSSDÔÚÔËÐÐ32768Сʱºó±¬·¢¹ÊÕÏ¡£¡£¡£¡£ÕâÒ»´ÎÊÜÓ°ÏìµÄSSDÐͺŰüÀ¨EK0800JVYPN¡¢EO1600JVYPP¡¢MK0800JVYPQºÍMO1600JVYPR £¬£¬£¬£¬£¬ £¬£¬ÊÜÓ°ÏìµÄ²úÆ·°üÀ¨¶àÖÖHPЧÀÍÆ÷ºÍ´æ´¢²úÆ· £¬£¬£¬£¬£¬ £¬£¬ÈçHP ProLiant¡¢Synergy¡¢Apollo 4200µÈ¡£¡£¡£¡£HPEÔ¤¼Æ £¬£¬£¬£¬£¬ £¬£¬Î´´ò²¹¶¡µÄSSD×îÔ罫ÔÚ2020Äê10ÔÂ×îÏÈ·ºÆð¹ÊÕÏ £¬£¬£¬£¬£¬ £¬£¬½¨ÒéÓû§¾¡¿ìÓ¦Óù̼þ¸üС£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hpe-warns-of-new-bug-that-kills-ssd-drives-after-40-000-hours/