CISAÐû²¼SolarWinds Orion¹¥»÷ÊÂÎñµÄÔö²¹Ö¸ÄÏ£»£»£»£»Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄ¸ùÖ¤Êé

Ðû²¼Ê±¼ä 2020-12-22
1.CISAÐû²¼SolarWinds Orion¹¥»÷ÊÂÎñµÄÔö²¹Ö¸ÄÏ


1.jpg


CISA×î³õÓÚ12ÔÂ17ÈÕÐû²¼ÁËÓйØÕþ¸®»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ºÍ¹«Ë¾×éÖ¯µÄAPT¹¥»÷»î¶¯µÄ¾¯±¨£¬ £¬£¬£¬£¬£¬£¬Ö®ºóÕë¶Ô¸Ã½ôÆÈÖ¸ÁîÐû²¼ÁËÔö²¹Ö¸ÄÏ¡£¡£¡£¡£¡£¡£Ôö²¹Ö¸ÄϰüÀ¨ÊÜÓ°Ïì°æ±¾µÄ¸üС¢Õë¶ÔʹÓõÚÈý·½Ð§ÀÍÌṩÉ̵ÄÊðÀíµÄÖ¸ÄÏÒÔ¼°¶ÔËùÐè²½·¥µÄ½øÒ»²½ËµÃ÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬CISA»¹¸üÐÂÁ˸þ¯±¨£¬ £¬£¬£¬£¬£¬£¬ÌṩÁËÐµĻº½â¼Æ»®²¢ÐÞ¶©ÁËIOC±í¸ñ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/12/19/cisa-updates-alert-and-releases-supplemental-guidance-emergency


2.ÏãÁϹ«Ë¾SymriseѬȾClop£¬ £¬£¬£¬£¬£¬£¬500GBδ¼ÓÃܵÄÎļþ±»µÁ


2.jpg


Ï㾫ÏãÁϹ«Ë¾SymriseѬȾÀÕË÷Èí¼þClop£¬ £¬£¬£¬£¬£¬£¬500GBδ¼ÓÃܵÄÎļþ±»µÁ£¬ £¬£¬£¬£¬£¬£¬½ü1000̨װ±¸±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£SymriseÊÇÈ«ÇòÁè¼Ý3ÍòÖÖ²úÆ·£¨°üÀ¨È¸³²ºÍÊʿڿÉÀÖ£©ÖÐʹÓõÄÏ㾫ÏãÁϵÄÖ÷Òª¿ª·¢ÉÌ£¬ £¬£¬£¬£¬£¬£¬ÓÚÉÏÖÜÔâµ½ÁËÍøÂç¹¥»÷£¬ £¬£¬£¬£¬£¬£¬²¢¹Ø±ÕÁËËùÓÐÐëÒªµÄϵͳÒÔ±ÜÃâ¹¥»÷ÉìÕÅ¡£¡£¡£¡£¡£¡£ClopÍÅ»ïÉù³ÆÆäͨ¹ý´¹ÂÚ¹¥»÷ÈëÇÖÁËSymriseµÄÍøÂç²¢ÇÔÈ¡ÁË500 GBµÄδ¼ÓÃÜÎļþ£¬ £¬£¬£¬£¬£¬£¬ÆäÔÚÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû²¼µÄ½ØÍ¼ÏÔʾ±»µÁÊý¾Ý°üÀ¨»¤ÕÕ¡¢»á¼ÆÆ¾Ö¤¡¢É󼯱¨¸æ¡¢»¯×±Æ·ÒòËØºÍµç×ÓÓʼþµÈ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/flavors-designer-symrise-halts-production-after-clop-ransomware-attack/


3.ClearSky³ÆÒÁÀʺڿÍʹÓÃPay2KeyÃé×¼ÒÔÉ«ÁеĹ«Ë¾


3.jpg


ÍþвÇ鱨¹«Ë¾ClearSky³ÆÒÁÀʺڿÍʹÓÃPay2KeyÃé×¼ÒÔÉ«ÁеĹ«Ë¾¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯±¬·¢ÓÚ2020Äê11Ôµ½12Ô£¬ £¬£¬£¬£¬£¬£¬»òÓëÒÁÀʺڿÍ×éÖ¯Fox KittenÓйØ¡£¡£¡£¡£¡£¡£Fox KittenÉÆÓÚʹÓÃÖÖÖÖ¿ªÔ´ºÍ×ÔÖ÷¿ª·¢µÄ¹¥»÷¹¤¾ß£¬ £¬£¬£¬£¬£¬£¬Í¨¹ýÄ¿µÄÆóÒµµÄvpnÒÔ¼°F5 NetworksµÄBIG-IPÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷(ADC)ÈëÇÖ¡£¡£¡£¡£¡£¡£ClearSky³ÆºÚ¿ÍÕë¶ÔÒÔÉ«ÁÐÊýÊ®¼Ò¹¤Òµ¡¢°ü¹ÜºÍÎïÁ÷¹«Ë¾£¬ £¬£¬£¬£¬£¬£¬À´×°ÖÃÀÕË÷Èí¼þÀ´¼ÓÃÜЧÀÍÆ÷ºÍÊÂÇéÕ¾£¬ £¬£¬£¬£¬£¬£¬ÒÔ¼°Ìᳫ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/iranian-hackers-target-israeli-companies-pay2key-ransomware


4.Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄ¸ùÖ¤Êé


4.jpg


Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄMitM HTTPSÖ¤Êé¡£¡£¡£¡£¡£¡£¸ÃÖ¤Êé×Ô2020Äê12ÔÂ6ÈÕ×îÏÈʹÓ㬠£¬£¬£¬£¬£¬£¬¹þÈø¿Ë˹̹Õþ¸®Ç¿ÖÆ×°Öô˸ùÖ¤ÊéÒÔ×èµ²ºÍ¼àÊӸùúÊ×¶¼Å¬¶ûËÕµ¤×¡ÃñµÄHTTPSÁ÷Á¿¡£¡£¡£¡£¡£¡£´Ë½ûÁîÐû²¼ºó£¬ £¬£¬£¬£¬£¬£¬×ÝÈ»Óû§ÒÑ×°ÖÃÖ¤Ê飬 £¬£¬£¬£¬£¬£¬ÈÔÎÞ·¨»á¼ûChrome¡¢Edge¡¢MozillaºÍSafariµÈä¯ÀÀÆ÷£¬ £¬£¬£¬£¬£¬£¬´Ó¶ø×èÖ¹¹þÈø¿Ë˹̹¹ÙÔ±×èµ²Óû§Êý¾Ý¡£¡£¡£¡£¡£¡£ÕâÊÇËļҳ§É̵ڶþ´Î½ûÓùþÈø¿Ë˹̹Õþ¸®Ç¿ÖÆ×°ÖõÄMitM HTTPSÖ¤Êé¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/apple-google-microsoft-and-mozilla-ban-kazakhstans-mitm-https-certificate/


5.Dell Wyse Thin¿Í»§¶Ë±£´æÁ½¸ö´úÂëÖ´ÐÐÎó²î


5.jpg


Dell Wyse Thin¿Í»§¶Ë±£´æÁ½¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬ £¬£¬£¬£¬£¬£¬CVSSÑÏÖØÐÔÆÀ·Ö¾ùΪ10¡£¡£¡£¡£¡£¡£ÆäÖÐÒ»¸öÎó²î±»×·×ÙΪCVE-2020-29491£¬ £¬£¬£¬£¬£¬£¬ÓÉÓÚ°´ÆÚpingЧÀÍÆ÷ÒÔ»ñÈ¡×îÐÂÉèÖ㬠£¬£¬£¬£¬£¬£¬²¢ÎÞÐèÉí·ÝÑéÖ¤£¬ £¬£¬£¬£¬£¬£¬Òò´ËËùÓÐÈ˶¼¿É»á¼ûÕâЩ¿ÉÄܰüÀ¨Ô¶³Ì»á¼ûƾ֤µÄÉèÖÃÎļþ¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²î±»×·×ÙΪCVE-2020-29492£¬ £¬£¬£¬£¬£¬£¬ÓÉÓÚ´æ´¢ÕâЩÉèÖõÄЧÀÍÆ÷ÔÊÐí¶ÔÆäÉèÖÃÎļþ¾ÙÐжÁд»á¼û£¬ £¬£¬£¬£¬£¬£¬Òò´ËÈκÎÈ˶¼¿ÉÒÔʹÓÃFTP¶ÁÈ¡ºÍ¸ü¸ÄËüÃÇ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²îÒѾ­±»ÐÞ¸´¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/critical-bugs-dell-wyse-thin-clients/162452/


6.VerizonÐû²¼2020ÄêÊý¾Ýй¶µÄÊÓ²ìÆÊÎö±¨¸æ


6.jpg


VerizonÐû²¼ÁË2020ÄêÊý¾Ýй¶µÄÊÓ²ìÆÊÎö±¨¸æ£¬ £¬£¬£¬£¬£¬£¬×ܹ²ÆÊÎöÁË157525ÆðÊÂÎñ£¬ £¬£¬£¬£¬£¬£¬Éæ¼°µ½16¸ö±ÊÖ±ÐÐÒµ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬£¬£¬£¬£¬ÔÚµ¼ÖÂÊý¾Ýй¶µÄ¹¥»÷·½·¨ÖУ¬ £¬£¬£¬£¬£¬£¬ÍøÂç´¹ÂÚ¡¢Ê¹Óñ»µÁƾ֤ºÍÉèÖùýʧµÄÕ¼±È×î´ó£¬ £¬£¬£¬£¬£¬£¬¶øµ¼ÖÂÊý¾Ýй¶×î¶àµÄ¶ñÒâÈí¼þÀàÐÍΪÃÜÂëת´¢³ÌÐò¡¢´¹ÂÚµç×ÓÓʼþºÍÖ±½Ó×°ÖÃÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬£¬2020ÄêÓÐÁè¼Ý80%µÄºÚ¿ÍÈëÇÖ»î¶¯Éæ¼°µ½±©Á¦¹¥»÷»òʹÓÃɥʧºÍ±»µÁµÄƾ֤¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/