ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ46ÖÜ

Ðû²¼Ê±¼ä 2020-11-16

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ09ÈÕÖÁ11ÔÂ15ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´50¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇSAP solution manager Outside DiscoveryÅäÖ÷þÎñδÊÚȨ·ÃÎÊ©¶´£»Apache Airflow APIδÊÚȨ·ÃÎÊ©¶´£»Microsoft EdgeÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´£»Microsoft Exchange Server CVE-2020-17083ÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´£»A10 Networks ACOSÔ¶³Ì´úÂëÖ´ÐЩ¶´  ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇ¿¨°Í˹»ùÐû²¼Linux°æ±¾RansomExxµÄ·ÖÎö³ÂËߣ»ESETÐû²¼Cyberchology:ÈËΪÒòËصķÖÎö³ÂËߣ»Ìõ¼Ç±¾ÖÆÔìÉÌÈʱ¦Ñ¬È¾DoppelPaymer£¬±»ÀÕË÷1700ÍòÃÀÔª£»Î¢ÈíÐû²¼Î¢Âë¸üУ¬ÐÞ¸´Intel CPUÖвàÐŵÀ©¶´£»ºÚ¿ÍÔÚGitHub´æ´¢¿âÖйûÈ»Cobalt StrikeÔ´´úÂë  ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖÐ  ¡£


ÖØÒªÄþ¾²Â©¶´Áбí


1.SAP solution manager Outside DiscoveryÅäÖ÷þÎñδÊÚȨ·ÃÎÊ©¶´


SAP Solution Manager Outside DiscoveryÅäÖ÷þÎñ´æÔÚÄþ¾²Èƹý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÈƹýÏÞÖÆ£¬Î´ÊÚȨ·ÃÎÊ·þÎñ  ¡£

https://launchpad.support.sap.com/#/notes/2985866


2.Apache Airflow APIδÊÚȨ·ÃÎÊ©¶´


Apache Airflow´æÔÚĬÈÏÅäÖ鶴£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÎÞÐèÑéÖ¤·ÃÎÊAPI  ¡£

https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E


3.Microsoft EdgeÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´


Microsoft Edge´æÔÚÄÚ´æÆÆ»µÂ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë  ¡£

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17058


4.Microsoft Exchange Server CVE-2020-17083ÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´


Microsoft Exchange Server´æÔÚÄÚ´æÆÆ»µÂ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë  ¡£

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17083


5.A10 Networks ACOSÔ¶³Ì´úÂëÖ´ÐЩ¶´


A10 Networks ACOS´æÔÚδÊÚȨÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨִÐÐÈÎÒâ´úÂë  ¡£

https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384


> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢¿¨°Í˹»ùÐû²¼Linux°æ±¾RansomExxµÄ·ÖÎö³ÂËß


1.jpg


¿¨°Í˹»ùÐû²¼Ò»·ÝгÂËß½éÉÜÁËLinux°æ±¾µÄRansomExxÀÕË÷Èí¼þ£¬Ò²³ÆΪDefray777  ¡£³ÂË߳ƣ¬RansomExxÔÚÕë¶ÔLinux·þÎñÆ÷ʱ£¬»áÏȲ¿ÊðÒ»¸öÃûΪsvc-newµÄELF¿ÉÖ´ÐÐÎļþ£¬ÓÃÓÚ¼ÓÃÜÊܺ¦ÕߵķþÎñÆ÷  ¡£´ËÍ⣬ÓëWindows°æ±¾²îÒ죬Defray777²»°üÂÞÈκÎÓÃÓÚÖÕÖ¹½ø³ÌµÄ´úÂ루ÀýÈçÄþ¾²Èí¼þ£©£¬²»»áÏñWindows°æ±¾ÄÇÑù²Á³ý¿ÉÓÿռ䣬Ҳ²»ÄÜÓëÃüÁîºÍ¿ØÖÆ·þÎñÆ÷ͨÐÅ  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ransomexx-ransomware-also-encrypts-linux-systems/


2¡¢ESETÐû²¼Cyberchology:ÈËΪÒòËصķÖÎö³ÂËß


2.jpg


ESETÐû²¼ÁËÃûΪCyberchology:ÈËΪÒòËصķÖÎö³ÂËߣ¬Ì½ÌÖÁËÔ±¹¤ÔÚ×éÖ¯ÍøÂçÄþ¾²ÖеÄ×÷Óà  ¡£·ÖÎö·¢ÏÖ£¬80£¥µÄ¹«Ë¾ÌåÏÖÔÚCOVID-19ÆÚ¼äÈËΪÒòËØ´øÀ´µÄ·çÏÕÔö¼ÓÁËά»¤ÍøÂçÄþ¾²µÄÄѶÈ£»×ÔCOVID-19ÒÔÀ´£¬ÍøÂç·¸×ïÒÑÔö¼ÓÁË63£¥£»ÈËΪ´íÎóÒ»Ö±ÊÇCOVID-19ÆÚ¼ä×î´óµÄÍøÂçÄþ¾²ÌôÕ½£»Ö»ÓÐËÄ·ÖÖ®Ò»µÄÆóÒµÈÏΪËûÃǵÄÔ¶³ÌÊÂÇé¼ÆıÓÐЧ£»47£¥µÄÈ˵£ÓÇÆ俹ѹÄÜÁ¦  ¡£


Ô­ÎÄÁ´½Ó£º

https://cdn1.esetstatic.com/ESET/UK/Collateral/White_Paper_Cyberchology.pdf


3¡¢Ìõ¼Ç±¾ÖÆÔìÉÌÈʱ¦Ñ¬È¾DoppelPaymer£¬±»ÀÕË÷1700ÍòÃÀÔª


3.jpg


Ìõ¼Ç±¾ÖÆÔìÉÌÈʱ¦Ôâµ½DoppelPaymerÀÕË÷Èí¼þ¹¥»÷£¬±»ÀÕË÷1700ÍòÃÀÔª  ¡£Èʱ¦£¨Compal£©ÊÇÈ«ÇòµÚ¶þ´óÔ­´´Éè¼Æ(ODM)Ìõ¼Ç±¾µçÄÔÖÆÔìÉÌ£¬ÓëÆ»¹û¡¢»ÝÆÕ¡¢´÷¶û¡¢ÁªÏëºÍºê³žµÈÖªÃû¹«Ë¾ºÏ×÷  ¡£¸Ã¹«Ë¾ÌåÏÖÆäÖ»Êǰ칫×Ô¶¯»¯ÏµÍ³·ºÆðÒì³££¬²¢Î´ÏñÍâ½çËù±¨µÀµÄÄÇÑù±»ºÚ¿ÍÀÕË÷£¬Ä¿Ç°Éú²úÖÐÒ»ÇÐÕý³£  ¡£µ«¾ÝÐÂÎÅÍøÕ¾BleepingComputer³ÆÆäÒÑ»ñµÃÊê½ð¼Ç¼£¬ÆäÖкڿÍÍÅ»ïÒªÇóÖ§¸¶1100±ÈÌرң¨16725500ÃÀÔª£©  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/laptop-maker-compal-hit-by-ransomware-17-million-demanded/


4¡¢Î¢ÈíÐû²¼Î¢Âë¸üУ¬ÐÞ¸´Intel CPUÖвàÐŵÀ©¶´


4.jpg


΢ÈíÒÑÕë¶ÔWindows 10 20H2¡¢2004¡¢1909Ðû²¼ÁËIntel΢´úÂë¸üУ¬ÒÔÐÞ¸´Intel CPUÖеIJàÐŵÀ©¶´Platypus  ¡£¸Ã©¶´ÓɸñÀ­´Ä¼¼Êõ´óѧ¡¢CISPAº¥Ä·»ô×ÈÐÅÏ¢Äþ¾²ÖÐÐĺͲ®Ã÷º²´óѧµÄ×é³ÉµÄÑо¿ÍŶÓÅû¶£¬Î»ÓÚÓ¢ÌضûµÄÔËÐÐƽ¾ù¹¦ÂÊÏÞÖÆ£¨RAPL£©½çÃæÖÐ  ¡£Ñо¿ÈËÔ±±íÃ÷£¬¹¥»÷Õß¿ÉÒÔʹÓÃRAPL½Ó¿Ú¼àÊÓ¹¦ºÄ²¢ÍƶÏCPUÕýÔÚÖ´ÐÐÄÄЩָÁ´Ó¶ø´ÓÄÚ´æÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý  ¡£´ËÍâ´Ë´Î¸üл¹ÐÞ¸´ÁËʸÁ¿¼Ä´æÆ÷²ÉÑù»î¶¯ÖЩ¶´£¨CVE-2020-8696£©ºÍ¿ìËٴ洢ǰհԤ²âÆ÷ÖЩ¶´£¨CVE-2020-8698£©  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/windows-10-intel-microcode-released-to-fix-new-cpu-security-bugs/


5¡¢ºÚ¿ÍÔÚGitHub´æ´¢¿âÖйûÈ»Cobalt StrikeÔ´´úÂë


5.jpg


ºÚ¿ÍÔÚGitHub´æ´¢¿âÖйûÈ»Cobalt Strike¹¤¾ß°üµÄÔ´´úÂë  ¡£Cobalt StrikeÊǺϷ¨µÄÉø͸²âÊÔ¹¤¾ß°ü£¬¿ÉÔÚÄ¿±êÉ豸Éϲ¿ÊðÐű꣬À´Ô¶³Ì´´½¨Shell²¢Ö´ÐÐPowerShell½Å±¾  ¡£Ó¢ÌضûÑо¿ÈËÔ±Éó²éÔ´´úÂëºóÈÏΪJava´úÂëÊÇÊÖ¶¯·´±àÒëµÄ£¬ºÚ¿ÍÐÞ¸´ÁËËùÓÐÒÀÀµ¹Øϵ²¢É¾³ýÁËÐí¿ÉÖ¤¼ì²é£¬ÒÔ±ã¶ÔÆä½øÐбàÒë  ¡£×ÔÐû²¼ÒÔÀ´£¬¸Ã´æ´¢¿âÒѱ»forked 172´Î£¬ÕâʹµÃÔ´´úÂëµÄÁ÷´«Ô½·¢ÄÑÒÔ¿ØÖÆ  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike-toolkit-shared-online/