GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯£»£»£»£»ºÚ¿ÍʹÓÃÐéαµÄÌØÀÊÆÕ³óÎÅÊÓÆµÈö²¥QNode RAT

Ðû²¼Ê±¼ä 2021-01-08
1.GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯


1.jpg


ÍøÂçÇå¾²¹«Ë¾GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²î£¨CVE-2020-29583£©µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¸ÃÎó²îÓëZyxelÖÐÓ²±àÂëµÄºóÃÅÕÊ»§zyfwpÓйأ¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÀ´½ÓÊÜÍøÂç×°±¸¡£¡£¡£¡£GreyNoise¼ì²âµ½Èý¸ö²î±ðµÄIPµØµãÕýÔÚɨÃèSSH×°±¸£¬£¬£¬£¬²¢ÊµÑéʹÓÃZyxelºóÃŵǼ¡£¡£¡£¡£¿ÉÊÇÕâЩ¹¥»÷Õß²¢Ã»ÓÐרÃÅÕë¶ÔZyxel×°±¸£¬£¬£¬£¬¶øÊÇɨÃèInternetÉÏËùÓÐÕýÔÚÔËÐеÄSSH¡£¡£¡£¡£ÆäÖÐÒ»¸ö¹¥»÷ÕßʹÓÃÁËCobalt StrikeµÄÄÚÖÃSSH¿Í»§¶ËÀ´Ö´ÐÐɨÃ裬£¬£¬£¬Ö¼ÔÚÈÆ¹ý¼ì²â¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-start-exploiting-the-new-backdoor-in-zyxel-devices/


2.ºÚ¿ÍʹÓÃÐéαµÄÌØÀÊÆÕ³óÎÅÊÓÆµÈö²¥QNode RAT


2.png


CybesecurityÑо¿Ö°Ô±·¢Ã÷ºÚ¿ÍʹÓÃÐéαµÄÌØÀÊÆÕ³óÎÅÊÓÆµÈö²¥¶ñÒâÈí¼þQNode¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬¹¥»÷Õß·¢ËÍÒÔ¡°GOOD LOAN OFFER !!¡±ÎªÖ÷ÌâµÄÓʼþ£¬£¬£¬£¬²¢¸½ÓÐÒ»¸öÃûΪTRUMP_SEX_SCANDAL_VIDEOµÄJAR¶ñÒâÎļþÎļþÒÔ×°ÖÃQNode RAT¡£¡£¡£¡£QRATÊǵ䷶µÄÔ¶³Ì»á¼ûľÂí£¬£¬£¬£¬¾ßÓлñȡϵͳÐÅÏ¢¡¢Ö´ÐÐÎļþ²Ù×÷ÒÔ¼°´ÓGoogle ChromeºÍFirefoxµÈÓ¦ÓÃÖлñȡƾ֤µÄ¹¦Ð§¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/01/hackers-using-fake-trumps-scandal-video.html


3.ÃÀ¹ú˾·¨²¿³ÆºÚ¿ÍÈëÇÖÆäMicrosoft O365ÓʼþЧÀÍÆ÷


3.png


ÃÀ¹ú˾·¨²¿£¨DoJ£©³ÆSolarWinds¹©Ó¦Á´¹¥»÷µÄºÚ¿ÍÈëÇÖÆäMicrosoft O365ÓʼþЧÀÍÆ÷£¬£¬£¬£¬²¢»á¼ûÁË3450×óÓÒ¸öÓÊÏäÕË»§¡£¡£¡£¡£¸Ã²¿·Ö³ÆºÚ¿Í»á¼ûµÄO365ÓÊÏäÊýÄ¿½öÔÚ3£¥×óÓÒ£¬£¬£¬£¬²¢ÇÒÆäÉñÃØÏµÍ³²¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬Êܵ½Ó°ÏìµÄ»ú¹¹°üÀ¨²ÆÎñ²¿¡¢¹úÎñÔº¡¢NTIA¡¢¹úÁ¢ÎÀÉúÑо¿ÔºCISA¡¢ÄÜÔ´²¿¡¢¹ú¼ÒºËÇå¾²¾ÖºÍÁìÍÁÇå¾²²¿µÈ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/solarwinds-hackers-had-access-to-over-3-000-us-doj-email-accounts/


4.TalosÅû¶SoftMaker OfficeÖеĴúÂëÖ´ÐÐÎó²î


4.png


Cisco TalosÅû¶ÁËSoftMaker OfficeÖеĴúÂëÖ´ÐÐÎó²î¡£¡£¡£¡£µÂ¹úÈí¼þ¿ª·¢ÉÌSoftMaker Software GmbHΪСÎÒ˽¼ÒºÍÆóÒµÌṩ°ì¹«Èí¼þÌ×¼þ£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÆäÎÄ×Ö´¦Öóͷ£¹¦Ð§×é¼þTextMaker¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄÎó²î»®·ÖΪ·ûºÅÀ©Õ¹Îó²î£¨CVE-2020-13544£©£¬£¬£¬£¬µ¼ÖÂÎĵµÆÊÎöÆ÷¶ÔÓÃÓÚÖÕֹѭ»·µÄ³¤¶È¾ÙÐзûºÅÀ©Õ¹£»£»£»£»ÎĵµÆÊÎö¹¦Ð§ÖеÄÊðÃûת»»Îó²î£¨CVE-2020-13545£©£»£»£»£»ÕûÊýÒç³öÎó²î£¨CVE-2020-13546£©£¬£¬£¬£¬µ¼ÖÂÓ¦ÓÃÔÚ»º³åÇøÍⲿдÈëÊý¾Ý¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/softmaker-office-vulnerabilities-allow-code-execution-malicious-documents


5.MoFoÐû²¼2020ÄêÊý¾Ýй¶ËßËϵĻØÊ×±¨¸æ


5.png


MoFoÐû²¼2020ÄêÊý¾Ýй¶ËßËϵĻØÊ×±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬2020ÄêÊý¾Ýй¶µÄÊýÄ¿ÔöÌíÁË270£¥¡£¡£¡£¡£¸Ã±¨¸æÍ³¼ÆÁËÈ¥ÄêµÄ25¸öÖØ´óÊý¾Ýй¶ÕûÌåËßËϰ¸¼þ£¬£¬£¬£¬·¢Ã÷ÔÚԼĪ15£¥µÄÖØ´óÊý¾Ýй¶°¸¼þÖÐÔ­¸æÊǹÍÔ±£¬£¬£¬£¬ÆäËûÇéÐÎÏ£¬£¬£¬£¬Ô­¸æÊÇ»á¼û±»¸æ¸¶¿îƽ̨µÄ¿Í»§¡¢»¼Õß¡¢Óû§¡¢ÕÊ»§³ÖÓÐÈË»òСÎÒ˽¼Ò¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¸Ã±¨¸æÕ¹Íû£¬£¬£¬£¬2020ÄêÇå¾²ÊÂÎñÊýÄ¿µÄ´ó·ùÔöÌí½«µ¼ÖÂ2021Ä걬·¢¸ü¶àµÄÊý¾Ýй¶ËßËϰ¸¼þ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.mofo.com/resources/insights/210104-data-breach-litigation-2020.html


6.еÄÅÔ·¹¥»÷¿ÉÒÔ´ÓGoogle TitanÖлָ´¼ÓÃÜÃÜÔ¿


6.png


·¨¹úÑо¿Ö°Ô±·¢Ã÷еÄÅÔ·¹¥»÷¿ÉÒÔ´ÓGoogle TitanÖлָ´¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2021-3011£©±£´æÓÚGoogle TitanºÍYubiKeyÓ²¼þÇå¾²ÃÜÔ¿µÄоƬÖУ¬£¬£¬£¬¿É±»ÓÃÀ´»Ö¸´Ó²¼þÇå¾²ÃÜÔ¿ËùʹÓõļÓÃÜÃÜÔ¿¡£¡£¡£¡£¹¥»÷ÕßÒ»µ©»ñµÃ¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬¼´ECDSA ˽Կ£¬£¬£¬£¬±ã¿ÉÒÔ¿Ë¡Titan¡¢YubiKeyºÍÆäËûÃÜÔ¿£¬£¬£¬£¬ÒÔÈÆ¹ý2FA³ÌÐò¡£¡£¡£¡£¿ÉÊÇ´ËÀ๥»÷²»¿Éͨ¹ýInternet»òÍâµØÍøÂçÔ¶³Ì¾ÙÐУ¬£¬£¬£¬¶øÊÇÐèÒª¶ÔÇå¾²ÃÜÔ¿¾ÙÐÐÎïÆÊÎö¼û¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-side-channel-attack-can-recover-encryption-keys-from-google-titan-security-keys/