CISAÐû²¼SolarWinds Orion¹¥»÷ÊÂÎñµÄÔö²¹Ö¸ÄÏ£»£»£»£»Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄ¸ùÖ¤Êé
Ðû²¼Ê±¼ä 2020-12-22CISA×î³õÓÚ12ÔÂ17ÈÕÐû²¼ÁËÓйØÕþ¸®»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ºÍ¹«Ë¾×éÖ¯µÄAPT¹¥»÷»î¶¯µÄ¾¯±¨£¬£¬£¬£¬£¬£¬£¬Ö®ºóÕë¶Ô¸Ã½ôÆÈÖ¸ÁîÐû²¼ÁËÔö²¹Ö¸ÄÏ¡£¡£¡£¡£¡£¡£Ôö²¹Ö¸ÄϰüÀ¨ÊÜÓ°Ïì°æ±¾µÄ¸üС¢Õë¶ÔʹÓõÚÈý·½Ð§ÀÍÌṩÉ̵ÄÊðÀíµÄÖ¸ÄÏÒÔ¼°¶ÔËùÐè²½·¥µÄ½øÒ»²½ËµÃ÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬CISA»¹¸üÐÂÁ˸þ¯±¨£¬£¬£¬£¬£¬£¬£¬ÌṩÁËÐµĻº½â¼Æ»®²¢ÐÞ¶©ÁËIOC±í¸ñ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/12/19/cisa-updates-alert-and-releases-supplemental-guidance-emergency
2.ÏãÁϹ«Ë¾SymriseѬȾClop£¬£¬£¬£¬£¬£¬£¬500GBδ¼ÓÃܵÄÎļþ±»µÁ
Ï㾫ÏãÁϹ«Ë¾SymriseѬȾÀÕË÷Èí¼þClop£¬£¬£¬£¬£¬£¬£¬500GBδ¼ÓÃܵÄÎļþ±»µÁ£¬£¬£¬£¬£¬£¬£¬½ü1000̨װ±¸±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£SymriseÊÇÈ«ÇòÁè¼Ý3ÍòÖÖ²úÆ·£¨°üÀ¨È¸³²ºÍÊʿڿÉÀÖ£©ÖÐʹÓõÄÏ㾫ÏãÁϵÄÖ÷Òª¿ª·¢ÉÌ£¬£¬£¬£¬£¬£¬£¬ÓÚÉÏÖÜÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢¹Ø±ÕÁËËùÓÐÐëÒªµÄϵͳÒÔ±ÜÃâ¹¥»÷ÉìÕÅ¡£¡£¡£¡£¡£¡£ClopÍÅ»ïÉù³ÆÆäͨ¹ý´¹ÂÚ¹¥»÷ÈëÇÖÁËSymriseµÄÍøÂç²¢ÇÔÈ¡ÁË500 GBµÄδ¼ÓÃÜÎļþ£¬£¬£¬£¬£¬£¬£¬ÆäÔÚÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû²¼µÄ½ØÍ¼ÏÔʾ±»µÁÊý¾Ý°üÀ¨»¤ÕÕ¡¢»á¼ÆÆ¾Ö¤¡¢É󼯱¨¸æ¡¢»¯×±Æ·ÒòËØºÍµç×ÓÓʼþµÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/flavors-designer-symrise-halts-production-after-clop-ransomware-attack/
3.ClearSky³ÆÒÁÀʺڿÍʹÓÃPay2KeyÃé×¼ÒÔÉ«ÁеĹ«Ë¾
ÍþвÇ鱨¹«Ë¾ClearSky³ÆÒÁÀʺڿÍʹÓÃPay2KeyÃé×¼ÒÔÉ«ÁеĹ«Ë¾¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯±¬·¢ÓÚ2020Äê11Ôµ½12Ô£¬£¬£¬£¬£¬£¬£¬»òÓëÒÁÀʺڿÍ×éÖ¯Fox KittenÓйء£¡£¡£¡£¡£¡£Fox KittenÉÆÓÚʹÓÃÖÖÖÖ¿ªÔ´ºÍ×ÔÖ÷¿ª·¢µÄ¹¥»÷¹¤¾ß£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÄ¿µÄÆóÒµµÄvpnÒÔ¼°F5 NetworksµÄBIG-IPÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷(ADC)ÈëÇÖ¡£¡£¡£¡£¡£¡£ClearSky³ÆºÚ¿ÍÕë¶ÔÒÔÉ«ÁÐÊýÊ®¼Ò¹¤Òµ¡¢°ü¹ÜºÍÎïÁ÷¹«Ë¾£¬£¬£¬£¬£¬£¬£¬À´×°ÖÃÀÕË÷Èí¼þÀ´¼ÓÃÜЧÀÍÆ÷ºÍÊÂÇéÕ¾£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ìᳫ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/iranian-hackers-target-israeli-companies-pay2key-ransomware
4.Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄ¸ùÖ¤Êé
Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄMitM HTTPSÖ¤Êé¡£¡£¡£¡£¡£¡£¸ÃÖ¤Êé×Ô2020Äê12ÔÂ6ÈÕ×îÏÈʹÓ㬣¬£¬£¬£¬£¬£¬¹þÈø¿Ë˹̹Õþ¸®Ç¿ÖÆ×°Öô˸ùÖ¤ÊéÒÔ×èµ²ºÍ¼àÊӸùúÊ×¶¼Å¬¶ûËÕµ¤×¡ÃñµÄHTTPSÁ÷Á¿¡£¡£¡£¡£¡£¡£´Ë½ûÁîÐû²¼ºó£¬£¬£¬£¬£¬£¬£¬×ÝÈ»Óû§ÒÑ×°ÖÃÖ¤Ê飬£¬£¬£¬£¬£¬£¬ÈÔÎÞ·¨»á¼ûChrome¡¢Edge¡¢MozillaºÍSafariµÈä¯ÀÀÆ÷£¬£¬£¬£¬£¬£¬£¬´Ó¶ø×èÖ¹¹þÈø¿Ë˹̹¹ÙÔ±×èµ²Óû§Êý¾Ý¡£¡£¡£¡£¡£¡£ÕâÊÇËļҳ§É̵ڶþ´Î½ûÓùþÈø¿Ë˹̹Õþ¸®Ç¿ÖÆ×°ÖõÄMitM HTTPSÖ¤Êé¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/apple-google-microsoft-and-mozilla-ban-kazakhstans-mitm-https-certificate/
5.Dell Wyse Thin¿Í»§¶Ë±£´æÁ½¸ö´úÂëÖ´ÐÐÎó²î
Dell Wyse Thin¿Í»§¶Ë±£´æÁ½¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬£¬CVSSÑÏÖØÐÔÆÀ·Ö¾ùΪ10¡£¡£¡£¡£¡£¡£ÆäÖÐÒ»¸öÎó²î±»×·×ÙΪCVE-2020-29491£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ°´ÆÚpingЧÀÍÆ÷ÒÔ»ñÈ¡×îÐÂÉèÖ㬣¬£¬£¬£¬£¬£¬²¢ÎÞÐèÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬Òò´ËËùÓÐÈ˶¼¿É»á¼ûÕâЩ¿ÉÄܰüÀ¨Ô¶³Ì»á¼ûƾ֤µÄÉèÖÃÎļþ¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²î±»×·×ÙΪCVE-2020-29492£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ´æ´¢ÕâЩÉèÖõÄЧÀÍÆ÷ÔÊÐí¶ÔÆäÉèÖÃÎļþ¾ÙÐжÁд»á¼û£¬£¬£¬£¬£¬£¬£¬Òò´ËÈκÎÈ˶¼¿ÉÒÔʹÓÃFTP¶ÁÈ¡ºÍ¸ü¸ÄËüÃÇ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²îÒѾ±»ÐÞ¸´¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-bugs-dell-wyse-thin-clients/162452/
6.VerizonÐû²¼2020ÄêÊý¾Ýй¶µÄÊÓ²ìÆÊÎö±¨¸æ
VerizonÐû²¼ÁË2020ÄêÊý¾Ýй¶µÄÊÓ²ìÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬×ܹ²ÆÊÎöÁË157525ÆðÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Éæ¼°µ½16¸ö±ÊÖ±ÐÐÒµ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÔÚµ¼ÖÂÊý¾Ýй¶µÄ¹¥»÷·½·¨ÖУ¬£¬£¬£¬£¬£¬£¬ÍøÂç´¹ÂÚ¡¢Ê¹Óñ»µÁƾ֤ºÍÉèÖùýʧµÄÕ¼±È×î´ó£¬£¬£¬£¬£¬£¬£¬¶øµ¼ÖÂÊý¾Ýй¶×î¶àµÄ¶ñÒâÈí¼þÀàÐÍΪÃÜÂëת´¢³ÌÐò¡¢´¹ÂÚµç×ÓÓʼþºÍÖ±½Ó×°ÖÃÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬2020ÄêÓÐÁè¼Ý80%µÄºÚ¿ÍÈëÇÖ»î¶¯Éæ¼°µ½±©Á¦¹¥»÷»òʹÓÃɥʧºÍ±»µÁµÄƾ֤¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/