SymantecÐû²¼2020ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆ±¨¸æ£»£»£»Î¢ÈíÐÞ¸´Azure Sphere IoTƽ̨ÖеÄ4¸öÎó²î
Ðû²¼Ê±¼ä 2020-08-271.SymantecÐû²¼2020ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆ±¨¸æ
ÃÀ¹úÍøÂçÇå¾²³§ÉÌSymantecÐû²¼2020ÄêµÚ¶þ¼¾¶ÈÍþÐ²Ì¬ÊÆ±¨¸æ¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬Óëǰ¼¸¸ö¼¾¶ÈÏà±È£¬£¬£¬£¬2020ÄêµÚ¶þ¼¾¶È¼ÓÃÜÐ®ÖÆµÄÊýÄ¿ÔöÌíÁË163£¥¡£¡£¡£¾ÝÐÂÎÅÈËÊ¿³Æ£¬£¬£¬£¬¼ÓÃÜÐ®ÖÆ»î¶¯ÊýÄ¿µÄ¼¤ÔöºÜ¿ÉÄÜÊÇÓÉ·ÓÉÆ÷½©Ê¬ÍøÂçÒýÆðµÄ£¬£¬£¬£¬¶ø´ËÀàÊÂÎñÒÔÇ°Ò²ÔøÔÚÀ¶¡ÃÀÖÞ±¬·¢¹ý¡£¡£¡£ºÚ¿Í×éÖ¯»áÈëÇÖ¼ÒÓ÷ÓÉÆ÷£¬£¬£¬£¬²¢¸ü¸ÄDNSÉèÖÃÒÔÐ®ÖÆÕýµ±µÄÍøÂçÁ÷Á¿£¬£¬£¬£¬½«±»ÈëÇֵķÓÉÆ÷ÓÃ×÷ÊðÀí»òÀÄÓÃËüÃÇÀ´ÌᳫDDoS¹¥»÷¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/browser-based-cryptojacking-sees-sudden-spike-in-activity-in-q2-2020/
2.΢ÈíÐÞ¸´Azure Sphere IoTƽ̨ÖеÄ4¸öÎó²î
΢ÈíÐû²¼Îó²î²¹¶¡£¬£¬£¬£¬ÐÞ¸´Azure Sphere IoTƽ̨ÖеÄ4¸öÎó²î¡£¡£¡£´Ë´ÎÐû²¼µÄ²¹¶¡³ÌÐòÐÞ¸´ÁË2¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²îºÍ2¸öÌáȨÎó²î£¬£¬£¬£¬ÕâЩÎó²î¶¼ÊÇÓÉCisco TalosµÄÇå¾²Ñо¿Ö°Ô±ÓÚ7Ô·ݷ¢Ã÷¡£¡£¡£µÚÒ»¸öΪREAD_IMPLIES_EXEC personalityδÊðÃû´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬µÚ¶þ¸öRCEÎó²î±£´æÓÚ/proc/thread-self/ memÖС£¡£¡£±ðµÄ£¬£¬£¬£¬È¨ÏÞ»á¼û¿ØÖƹ¦Ð§Öб£´æÒ»¸öÌáȨÎó²î£¬£¬£¬£¬¶øµÚ¶þ¸öÌáȨÎó²î±£´æÓÚAzure Sphere 20.06µÄuid_map¹¦Ð§ÖС£¡£¡£Î¢ÈíÌåÏÖ»áÈ·±£½â¾öÕâЩÎÊÌⲢΪ¿Í»§Ìṩ¸üУ¬£¬£¬£¬¿ÉÊǾܾøÐû²¼ÈκÎCVEs¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/four-more-bugs-patched-in-microsofts-azure-sphere-iot-platform/158643/
3.CISAµÈ4¼Ò»ú¹¹ÖÒÑÔ³¯ÏÊBeagleBoyzÃé׼ȫÇòÒøÐÐ
CISA¡¢²ÆÎñ²¿¡¢FBIºÍUSCYBERCOMÁªºÏÐû²¼ÖÒÑÔ£¬£¬£¬£¬³¯ÏʺڿÍ×éÖ¯BeagleBoyzÃé׼ȫÇòÒøÐС£¡£¡£¾Ý¼¸¼Ò»ú¹¹Ðû²¼µÄÁªºÏ×Éѯ±¨¸æ£¬£¬£¬£¬×Ô2020Äê2ÔÂÒÔÀ´£¬£¬£¬£¬BeagleBoyzÒ»Ö±ÔÚʹÓöñÒâÔ¶³Ì»á¼û¹¤¾ßͨ¹ý»¥ÁªÍøÇÀ½ÙÒøÐУ¬£¬£¬£¬ÏÖÔÚÒÑ´ÓÈ«ÇòÒøÐÐÇÔÈ¡ÁËÊý°ÙÍòÃÀÔª¡£¡£¡£¾ÝÃÀ¹úÍøÂç˾ÁµÄÍÆÎÄ£¬£¬£¬£¬BeagleBoyzÏÖÔÚÕýÔÚ¾ÙÐÐÒ»ÏîÒ»Á¬µÄÒøÐÐÇÀ½ÙÍýÏ룬£¬£¬£¬Õë¶Ô30¶à¸ö¹ú¼ÒµÄÒøÐУ¬£¬£¬£¬ÊÔͼÇÀ½Ù20ÒÚÃÀÔª¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/alerts/aa20-239a
4.FBIÏßÈËÅû¶ÊÖÒÕÖ§³ÖÕ©ÆÍÅ»ïµÄÄÚ²¿ÔË×÷ÇéÐÎ
FBIÏßÈËÅû¶ÊÖÒÕÖ§³ÖÕ©ÆÍÅ»ïµÄÄÚ²¿ÔË×÷ÇéÐΡ£¡£¡£¸ÃÃûÏßÈ˵ĽÇɫΪ¾¼ÍÈË£¬£¬£¬£¬Ö÷ÒªÈÏÕæ³öÊÛºô½ÐÁ÷Á¿£¬£¬£¬£¬Îª¸Ã´ËÀàȦÌ׵ĵڶþ½×¶ÎÈÏÕæÈË¡£¡£¡£µÚÒ»½×¶ÎΪÐû²¼ÉÌ£¬£¬£¬£¬ÆäÊ×ÏÈ»áÔÚFacebookÖ®ÀàµÄƽ̨ÉÏÕë¶ÔÖÖÖÖÖ÷Ì⣨ÀýÈçÂÃÐеȣ©Í¶·ÅÔÚÏß¹ã¸æ£¬£¬£¬£¬²¢ÓÕʹÊܺ¦Õßµã»÷¸Ã¹ã¸æÒÔ½«ÆäÖØ¶¨Ïòµ½¶ñÒâÍøÕ¾¡£¡£¡£¾¼ÍÈËÔòÊdz䵱Ðû²¼É̺ͺô½ÐÖÐÐÄÖ®¼äÖн飬£¬£¬£¬½«ºô½ÐÁ÷Á¿³öÊÛ¸øÔ¸Ò⹺ÖÃËüµÄºô½ÐÖÐÐÄ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fbi-informant-provides-a-glimpse-into-the-inner-workings-of-tech-support-scams/
5.¶íÂÞ˹ÖÊÁ¿ÏµÍ³Åû¶WhatsAppÖеÄÐÂÐÍÕ©Æ·½·¨
¶íÂÞ˹ÖÊÁ¿ÏµÍ³£¨Roskachestvo£©Åû¶WhatsAppÖеÄÐÂÐÍÕ©Æ·½·¨¡£¡£¡£Roskachestvo¸±Ö÷¹ÜIlya LoevskyÌåÏÖ£¬£¬£¬£¬WhatsAppÖеľø´ó´ó¶¼Ú²ÆÐÐΪ¶¼ÊÇͨ¹ýÉç»á¹¤³Ì±¬·¢µÄ£¬£¬£¬£¬ºÚ¿Í»áͨ³£ÒÔGoogle¡¢Æ»¹û¡¢FacebookµÈ¹«Ë¾µÄÃûÒ壬£¬£¬£¬Ê¹ÓÃCOVID-19Ö®ÀàµÄÈÈÃÅ»°Ìâ»òÓÐÀû¿ÉͼµÄ²úÆ·£¬£¬£¬£¬ÓÕʹÓû§µã»÷ÊÜѬȾµÄÁ´½Ó»òÏÂÔØ¿ÉÒÉÎļþ¡£¡£¡£Êܺ¦ÕßÒ»µ©µã»÷¶ñÒâÁ´½Óºó£¬£¬£¬£¬Ôò¿ÉÄܻᱬ·¢ÈκÎÊÂÇ飬£¬£¬£¬´ÓÇÔȡСÎÒ˽¼ÒÊý¾Ýµ½ÇÔÈ¡ÆäÐÅÓÿ¨ÖÐ×ʽ𡣡£¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2020/08/the-russian-quality-system-roskachestvo.html
6.Conti´î½¨¹ûÕæÊý¾Ý¿â£¬£¬£¬£¬½ÓÄÉË«ÏòÀÕË÷Õ½ÂÔ
ÀÕË÷Èí¼þ×éÖ¯Conti´î½¨¹ûÕæÊý¾Ý¿â£¬£¬£¬£¬²¢½ÓÄÉË«ÏòÀÕË÷Õ½ÂÔ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Ðí¶à´óÐÍÀÕË÷Èí¼þ×éÖ¯½ÓÄÉÁË´ËÀàÕ½ÂÔ£¬£¬£¬£¬ÈôÊÇÊܺ¦Õß²î±ðÒâÖ§¸¶Êê½ð£¬£¬£¬£¬ÎÞÂÛËûÃÇÊÇ·ñ»Ö¸´Á˱»¼ÓÃܵÄÔʼÎļþ£¬£¬£¬£¬¸Ã×éÖ¯¶¼½«×ß©°üÀ¨ÆäÎļþ¡£¡£¡£ÐµĺڿÍ×éÖ¯ContiÔڴÊý¾Ý¿âºó£¬£¬£¬£¬ÒѾÁгöÁË26¼ÒÔâµ½¹¥»÷ÇҾܾøÖ§¸¶Êê½ðµÄ¹«Ë¾£¬£¬£¬£¬²¢ÒѾ×ß©ÁËÕâЩ¹«Ë¾µÄÎļþ¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬ContiÓë×ÅÃûµÄRyukÊÇÓÉͳһ×éÖ¯ÔËÓªµÄ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/conti-ryuk-joins-the-ranks-of-ransomware-gangs-operating-data-leak-sites/