ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂçÇå¾²±ê×¼ £»RealtekÐÞ¸´Windows HDÒôƵÇý¶¯³ÌÐòÖеÄDLLÐ®ÖÆÎó²î

Ðû²¼Ê±¼ä 2020-02-05

1.ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂçÇå¾²±ê×¼


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÃÀ¹ú·À²¿1ÔÂ31ÈÕÕýʽÐû²¼ÍøÂçÇå¾²³ÉÊì¶ÈÄ£×ÓÈÏÖ¤£¨CMMC£©¿ò¼Ü1.0°æ±¾ ¡£¹ú·À²¿Ðû²¼£¬µ½2026Äê¹ú·À³Ð°üÉÌÔÚ»ØÓ¦Õþ¸®²É¹ºÍýÏëµÄÌá°¸ÇëÇóʱ£¬±ØÐèÖª×ã»ù±¾µÄÍøÂçÇå¾²±ê×¼ ¡£Ëæ×ÅCMMCµÄÍÆ³ö£¬¹ú·À²¿Ï£Íûͨ¹ýÌá¸ß¹ú·À¹¤Òµ»ù´ ¡£¨DIB£©·Ö°üÉ̵ÄÍøÂçÇå¾²×¼±¸Ë®Æ½£¬À´ÔöÇ¿¶Ô¹©Ó¦Á´Î´·ÖÀàÐÅÏ¢£¨Áª°îÌõÔ¼ÐÅÏ¢£¨FCI£©ºÍÊÜ¿ØÎ´·ÖÀàÐÅÏ¢£¨CUI£©£©µÄ± £»¤ ¡£CMMCÖ¼ÔÚͨ¹ýʹÓÃ5ÖÖ¼¶±ðµÄÈÏÖ¤À´¼ò»¯´óÐͺÍСÐ͹ú·À³Ð°üÉ̵ÄÍøÂçÍ£µ±ÐÔÈÏÖ¤£¬ÖصãÊÇÍøÂçÇ徲ʵ¼ùºÍÁ÷³Ì ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dod-to-require-cybersecurity-certification-from-defense-contractors/


2.°Ä´óÀûÑÇ»õÔ˹«Ë¾Toll GroupÔâµ½ÀÕË÷Èí¼þ¹¥»÷


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ΪӦ¶ÔÀÕË÷Èí¼þ¹¥»÷£¬°Ä´óÀûÑÇÔËÊäºÍÎïÁ÷¾ÞÍ·Toll Group±»ÆÈ¹Ø±Õ²¿·ÖÔÚÏß·þÎñ£¬²¿·Ö¿Í»§¶Ô¸Ã¹«Ë¾µÄ´¦Öóͷ£·½·¨ÌåÏÖ²»Öª×ã ¡£¸Ã¹«Ë¾ÌåÏÖ£¬ËüÓÚ1ÔÂ31ÈÕÐÇÆÚÎåÔÚÆäϵͳÉÏ·¢Ã÷ÁËÒ»¸öÀÕË÷Èí¼þ£¬²¢½ûÓÃÁËijЩϵͳÀ´×èÖ¹´ËÊÂÎñ ¡£Ò»Ð©¿Í»§ÔÚÉ罻ýÌåÉÏËß¿àËûÃÇÎÞ·¨ÔÙ¸ú×Ù°ü¹ü£¬²¢Éù³Æ¸Ã¹«Ë¾µÄÔ±¹¤Ò²ÎÞ·¨»á¼û¸ú×ÙÊý¾Ý¿â ¡£ÓÐÐÂÎÅÈËÊ¿³Æ¸ÃÊÂÎñÓ°ÏìÁ˰ĴóÀûÑÇ¡¢Ó¡¶ÈºÍ·ÆÂɱöµÄÓªÒµ ¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÖÐʹÓõÄÊÇÄÄÖÖÀÕË÷Èí¼þ£¬¸Ã¹«Ë¾ÒÑ֪ͨÓйز¿·Ö£¬µ«Éù³ÆÉÐδÕÒµ½ÈκÎÖ¤¾ÝÅúעСÎÒ˽¼ÒÊý¾ÝÒѱ»Ð¹Â¶ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/australian-shipping-giant-toll-hit-ransomware


3.ÀÕË÷Èí¼þDoppelPaymer½«ÔÚ°µÍø³öÊÛδ¸¶¿îÊܺ¦ÕßµÄÊý¾Ý


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÀÕË÷Èí¼þDoppelPaymerÍþв³ÆÈôÊÇÊܺ¦Õß²»Ö§¸¶Êê½ð£¬ËûÃǽ«ÔÚ°µÍø³öÊÛ»òÐû²¼ÍµÈ¡µÄÊܺ¦ÕßÎļþ ¡£ÕâÖÖÐµĹ¥»÷Õ½ÂÔʼÓÚ2019Äê11Ô£¬ÓÉÀÕË÷Èí¼þMazeÌᳫ£¬ËæºóÓÉSodinokibi/REvilºÍNemty¸ú½ø£¬ÏÖÔÚÂÖµ½DoppelPaymerÁË ¡£DoppelPaymer¹¥»÷Õ߳ƽüÒ»ÄêÀ´ËûÃÇÒ»Ö±´ÓÊܺ¦ÕßÄÇÀïÇÔÈ¡Êý¾Ý£¬²¢ÇÒÉù³Æµ±Êܺ¦Õß²»Ö§¸¶Êê½ðʱ£¬ËûÃÇÒÑÍù¾ÍÔøÔÚ°µÍøÉÏÄäÃû³öÊÛÕâЩÊý¾Ý ¡£ÎªÁË֤ʵÕâÒ»µã£¬¹¥»÷Õß»¹Ðû²¼ÁËÁ½¸öExcel±í¸ñ£¬ÆäÖаüÀ¨ËûÃÇÔøÈëÇÖµÄÁ½¸öÍøÂçµÄWindows DomainÓû§Áбí£¬µ«Ã»ÓзÖÏí¾Ý³Æ´ÓÊܺ¦ÕßÄÇÀï͵ȡµÄÈκÎÎļþ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/


4.ºÚ¿ÍʹÓÃSharePointÎó²î(CVE-2019-0604)¹¥»÷Öж«µØÇø


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Palo Alto Networks µÄ Unit 42·¢Ã÷ºÚ¿ÍÈÔÔÚʹÓÃSharePointÎó²î£¨CVE-2019-0604£©¹¥»÷Öж«Õþ¸®×éÖ¯ ¡£ÔÚ2019Äê9ÔÂ10ÈÕ£¬Ñо¿Ö°Ô±ÊӲ쵽¹¥»÷ÕßʹÓøÃÎó²îÔÚÖж«Õþ¸®×éÖ¯µÄÍøÕ¾ÉÏ×°ÖÃÁ˶à¸öWeb Shell£¬ÆäÖÐÒ»¸öÊÇGithubÉÏÃâ·ÑÌṩµÄ¿ªÔ´AntSword Web Shell ¡£¹¥»÷ÕßʹÓÃÕâЩWeb ShellºáÏòÒÆ¶¯ÍøÂç»á¼ûÆäËüϵͳ£¬²¢Ê¹Óö¨ÖƵÄMimikatz±äÖÖ´ÓÄÚ´æÖÐת´¢Æ¾Ö¤ºÍʹÓÃImpacketµÄatexec¹¤¾ßÔÚÕû¸öÍøÂçµÄÆäËüϵͳÉÏÔËÐÐÏÂÁî ¡£9ÔÂÏÂÑ®£¬Unit 42ÊӲ쵽ÏàͬµÄMimikatz±äÖÖ±»ÉÏÔØµ½ÁíÒ»ÆäÖж«¹ú¼ÒµÄÁíÒ»¸öÕþ¸®×éÖ¯µÄWeb ShellÖÐ ¡£2020Äê1ÔÂÉÏÑ®£¬Ñо¿Ö°Ô±Ê¹ÓÃShodanËÑË÷ÁË̻¶µÄSharePoint·þÎñÆ÷£¬·¢Ã÷ÈÔÓÐ28881¸ö·þÎñÆ÷ʹÓñ£´æÎó²îµÄ°æ±¾ ¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/actors-still-exploiting-sharepoint-vulnerability/


5.Ñо¿Ö°Ô±·¢Ã÷ÐÂÀÕË÷Èí¼þEKANSÖ÷ÒªÕë¶Ô¹¤Òµ¿ØÖÆÏµÍ³


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


2ÔÂ3ÈÕÇå¾²³§ÉÌDragosÐû²¼Ò»·Ý±¨¸æ³Æ£¬ÐÂÀÕË÷Èí¼þEKANSÒýÆðÁËÇå¾²Ñо¿Ö°Ô±µÄ×¢ÖØ£¬ÓÉÓÚ¸ÃÀÕË÷Èí¼þ¾ßÓÐÆÈʹÅÌËã»ú×èÖ¹Ó빤ҵ¿ØÖÆÏµÍ³ÓйصÄÌØ¶¨Ô˶¯»òÀú³ÌµÄÄÜÁ¦ ¡£Ñо¿Ö°Ô±Joe SlowikÌåÏÖ£¬Ö»¹ÜÆä¹¥»÷Ïà¶Ôԭʼ£¬µ«EKANSÕÕ¾É×Ô¶¯Õë¶ÔICSÇéÐÎÖеÄÄ³Ð©ÌØ¶¨²úÆ·£¬°üÀ¨ÓëGE ProficyµÄÊý¾ÝÀúÊ··þÎñ¡¢GE Fanuc licensing serverµÄ·þÎñÒÔ¼°HoneywellµÄHMIWebÓ¦ÓÃÓйصÄÀú³Ì ¡£ÏÖÔÚ¸ÃÀÕË÷Èí¼þËÆºõ»¹²»ÊÇÒ»¸öºÜ´óµÄΣÏÕ£¬Ñо¿Ö°Ô±ÒÔΪEKANS¿ÉÄÜÓëÁíÒ»¸öÕë¶ÔICSµÄÀÕË÷Èí¼þMegaCortex±£´æ¹ØÁª ¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/attacks-breaches/ekans-ransomware-raises-industrial-control-worries/d/d-id/1336950


6.RealtekÐÞ¸´Windows HDÒôƵÇý¶¯³ÌÐòÖеÄDLLÐ®ÖÆÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


RealtekÐÞ¸´ÁËWindows HDÒôƵÇý¶¯³ÌÐò°üÖеÄÒ»¸öDLLÐ®ÖÆÎó²î£¬¸ÃÎó²î£¨CVE-2019-19705£©¿ÉÄÜÔÊÐíDZÔڵĹ¥»÷Õß»ñµÃ³¤ÆÚÐÔ¡¢Ö²Èë¶ñÒâÈí¼þ²¢Ìӱܼì²â ¡£SafeBreach LabsÇå¾²Ñо¿Ô±Peleg Hadar·¢Ã÷Á˸ÃÎó²î£¬HadarÌåÏÖ¸ÃÎó²îÊÇÓÉÒÑÊðÃûµÄHDÒôƵÅä¾°£¨RAVBg64.exe£©Àú³Ìµ¼ÖµÄ£¬¸ÃÀú³ÌÊÔͼ´ÓÆäÄ¿½ñÊÂÇéĿ¼£¨CWD£©¶ø²»ÊÇDLLµÄÏÖʵλÖüÓÔØDLL£¬²¢ÇÒûÓÐÑéÖ¤DLLµÄÊðÃûÖ¤Êé ¡£ÕâÒ»ÎÊÌâµÄ»ù´¡Ôµ¹ÊÔ­ÓÉÊÇÔÚÇý¶¯³ÌÐò°ü£¨°æ±¾1.0.0.8855£©ÖÐʹÓÃÁËMicrosoft Visual Studio 2005 MFC£¬µ¼Ö¸óÌÐò°ü»á×Ô¶¯¼ÓÔØ×ÊÔ´DLL ¡£Realtekͨ¹ý8857¼°¸ü¸ß°æ±¾µÄHD AudioÇý¶¯³ÌÐò°üÐÞ¸´Á˸ÃÎÊÌâ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/realtek-fixes-dll-hijacking-flaw-in-hd-audio-driver-for-windows/