΢ÈíÐû²¼Îó²î²¹¶¡ÐÞ¸´111¸öÎó²î£»Thunderbolt±£´æÎó²îÓ°ÏìÊý°ÙÍò×°±¸
Ðû²¼Ê±¼ä 2020-05-131.΢ÈíÐû²¼Îó²î²¹¶¡£¬ÐÞ¸´12¿î²úÆ·ÖÐ111¸öÎó²î
5ÔÂ12ÈÕ£¬Î¢ÈíÐû²¼ÁË5Ô·ÝÎó²î²¹¶¡£¬ÐÞ¸´ÁËEdge¡¢Windows¡¢Visual StudioÒÔ¼°.NET FrameworkϵÄ12¿î²úÆ·ÖеÄ111¸öÎó²î¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪMicrosoft SharePointÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1023¡¢CVE-2020-1024ºÍCVE-2020-1102£©¡¢Windows OSÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1067£©¡¢MSHTMLÒýÇæÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1064£©¡¢Microsoft Edge PDFÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-109£©ºÍJetÊý¾Ý¿âÒýÇæÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1051£¬CVE-2020-1174£¬CVE-2020-1175ºÍCVE-2020-1176£©¡£±¾ÔÂÐû²¼µÄÊÇ΢ÈíÀúÊ·ÉϵÚÈý´óµÄ²¹¶¡³ÌÐò£¬ÁíÍâÁ½´Î»®·ÖÊÇÔÚ2020Äê3ÔºÍ2020Äê4Ô£¬ÐÞ¸´ÁË115ºÍ113¸ö¹ýʧ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-may-2020-patch-tuesday-fixes-111-vulnerabilities/
2.Thunderbolt±£´æÎó²î£¬»ò½«Ó°ÏìÊý°ÙÍò×°±¸
°£Òò»ôοƼ¼´óѧµÄÑо¿ÍŶÓÔÚÓ¢ÌØ¶ûµÄThunderbolt¶Ë¿ÚÖз¢Ã÷ÁË7¸öÎó²î£¬²¢Ä£ÄâÁË9ÖÖ¹¥»÷³¡¾°£¬¾ßÓÐÎïÆÊÎö¼ûȨÏ޵Ĺ¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²î»á¼ûºÍ͵ȡÊý¾Ý¡£Ñо¿·¢Ã÷£¬¹¥»÷Õß½öÐèÒªÎïÆÊÎö¼ûÆôÓÃÁËThunderboltµÄWindows»òLinuxϵͳ±ã¿ÉÒÔʵÏÖ¹¥»÷£¬²¢ÇÒ²»»áÁôÏÂÔ˶¯ºÛ¼£Ò²²»ÐèÒªÓëÓû§½»»¥¡£×ÝÈ»Óû§ÔÚÍÑÀëʱÒÑ¾Ëø¶¨»ò¹ÒÆðÅÌËã»ú£¬²¢ÇÒÆôÓÃÁËÇå¾²Æô¶¯ºÍͨÅ̼ÓÃÜ£¬¸Ã¹¥»÷ÒÀÈ»¿ÉÒÔʵÏÖ¡£¸ÃÎó²îÓ°ÏìÁË2019ÄêÖ®Ç°ÖÆÔìµÄÊý°ÙÍòWindowsºÍLinux×°±¸¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/endpoint/thunderbolt-vulnerabilities-could-threaten-millions-of-pcs/d/d-id/1337789
3.ATMÖÆÔìÉÌDiebold NixdorfѬȾÀÕË÷²¡¶¾£¬ÏµÍ³ÖÐÖ¹
¶íÖÝATMÖÆÔìÉÌDiebold NixdorfÓÚ4ÔÂ25ÈÕÍíÉÏ·¢Ã÷Æä¹«Ë¾ÍøÂçÒì³££¬²¢ÏÓÒÉÊÇÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬Á¬Ã¦¶Ï¿ªÁ˸ÃÍøÂçÉϵÄϵͳÒÔ×èÖ¹¶ñÒâÈí¼þµÄÈö²¥¡£DieboldÌåÏָô˹¥»÷Ö»ÊÇÓ°ÏìÁËÍøÂçºÍITϵͳ£¬µ«²¢Î´Ó°Ïì¿Í»§»ò¹«ÖÚ¡£Æ¾Ö¤ÉîÈëÊӲ죬¸ÃÀÕË÷²¡¶¾ÎªProLock£¬ÔÚ3Ô·ÝҲѬȾÁËÒÁÀûŵÒÁÖÝÀÈø¶ûÏØµÄϵͳ¡£BleepingComputerµÄLawrence Abrams˵£¬ProLockÒªÇóµÄÊê½ðͨ³£ÔÚ6λÊý£¬´Ó17.5ÍòÃÀÔªµ½66ÍòÃÀÔª²»µÈ¡£¶øDieboldÌåÏÖËü²¢Ã»ÓÐÖ§¸¶Êê½ð£¬²¢ÇÒ²»»áÌÖÂÛÊê½ð½ð¶î¡£
ÔÎÄÁ´½Ó£º
https://krebsonsecurity.com/2020/05/ransomware-hit-atm-giant-diebold-nixdorf/
4.ÃÀ¹ú¹«Ë¾Pitney BowesÔÙÔâÀÕË÷²¡¶¾¹¥»÷£¬ÎªMazeÌᳫ
ÃÀ¹ú¹«Ë¾Pitney BowesÔÚ7¸öÔÂÄÚÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷²¡¶¾¹¥»÷£¬´Ë´Î¹¥»÷ΪMazeÍÅ»ïÌᳫ¡£MazeÍÅ»ïÔÚÍøÉÏÐû²¼ÁË11ÕŸù«Ë¾ÅÌËã»úÍøÂçÄÚ²¿Ä¿Â¼ÁбíµÄ½ØÍ¼£¬ÒÔ֤ʵËûÃǹ¥»÷Àֳɡ£Pitney Bowes½²»°ÈËÌåÏÖÏÖÔÚÕýÔÚÊÓ²ì´Ë´Î¹¥»÷µÄ¹æÄ££¬ÌØÊâÊDZ»µÁÊý¾ÝÀàÐÍ¡£2019Äê10ÔÂPitney BowesÊ×´ÎÔâµ½RyukÍÅ»ïÌᳫµÄÀÕË÷²¡¶¾¹¥»÷£¬¸ÃÊÂÎñµ¼ÖÂijЩ°ü¹ü¸ú×Ùϵͳͣ»ú¡£RyukºÍMazeÍŻﶼÊÇʹÓÃÀÕË÷Èí¼þ¹¥»÷£¬µ«²î±ðµÄÊÇMazeÉÐÓÐÒ»¸öÍøÕ¾£¬²¢»áÔÚÊܺ¦Õ߾ܸ¶Êê½ðºóÔÚ¸ÃÍøÕ¾Ð¹Â¶Æä±»µÁÊý¾Ý¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/package-delivery-giant-pitney-bowes-confirms-second-ransomware-attack-in-7-months/
5.ºÚ¿ÍÂÛ̳WeLeakData.comÊý¾Ý¿â±»µÁ£¬ÂÛ̳ÐÅϢй¶
ºÚ¿ÍÂÛ̳WeLeakData.comµÄÊý¾Ý¿â±»µÁÇÒ±»·ÅÔÚ°µÍø³öÊÛ£¬Ê¹¸ÃÍøÕ¾ºÚ¿ÍµÄÐÅÏ¢ºÍ˽϶Ի°Ð¹Â¶¡£Æ¾Ö¤ÍøÂçÇ鱨¹«Ë¾CybleÐû²¼µÄ±¨¸æ£¬WeLeakData.comµÄvBulletinÂÛ̳Êý¾Ý¿âй¶ÊÇÔÚ2020Äê1ÔÂ9ÈÕ×îÏȵģ¬ÏÖÒÑÔÚ°µÍøÊг¡ÉϳöÊÛ¡£Ð¹Â¶Êý¾Ý°üÀ¨Óû§µÇ¼Ãû¡¢µç×ÓÓʼþµØµã¡¢¹þÏ£ÃÜÂëÒÔ¼°ËûÃǵÄIPµØµãÒÔ¼°Ë½ÈËÐÂÎÅ¡£¹ØÓÚ¸ÃÍøÕ¾Óû§À´Ëµ´Ë´ÎÊÂÎñÖÁ¹ØÖ÷Òª£¬ÓÉÓÚÖ´·¨²¿·Ö¿ÉÒÔʹÓÃ×ß©µÄIPµØµãºÍµç×ÓÓʼþµØµãÀ´×·×ÙËûÃDz¢½«ÆäÓëÆäËû¹¥»÷Ïà¹ØÁª¡£´Ë´Îй¶»¹¿ÉÒÔÈÃÑо¿Ö°Ô±ÏàʶÔõÑù¾ÙÐй¥»÷¡£CybleÏÖÔÚÒѽ«Ð¹Â¶Êý¾ÝÌí¼Óµ½ÆäÊý¾Ýй¶²éÕÒ·þÎñamibreached.comÖУ¬ÒÔ±ãÓû§¿ÉÒÔ¼ì²éÆäÐÅÏ¢ÊÇ·ñ×ß©¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-private-chats-leaked-in-stolen-weleakdata-database/
6.ÒøÐÐľÂíSphinx»Ø¹éÉý¼¶£¬ÒÔCOVID-19ΪÖ÷ÌâÕë¶ÔÃÀ¹ú
ÒøÐÐľÂíSphinxÉý¼¶²¢»Ø¹é£¬Ê¹ÓÃCOVID-19À¬»øÓʼþ×÷ΪÓÕ¶üÕë¶ÔÃÀ¹úÓû§£¬Ö¼ÔÚ´ÓÆäÔÚÏßÒøÐлỰÖлñÈ¡Óû§Æ¾Ö¤ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢¡£Ð°汾µÄSphinxµÄ¸Ä±äÖ÷ÒªÔÚ¶ñÒâ´úÂë×¢Èë·½·¨ºÍBotÉèÖÃÁ½·½Ãæ¡£Sphinxͨ¹ýŲÓÃä¯ÀÀÆ÷º¯ÊýÖ²Èë´úÂ룬Ê×ÏÈËüŲÓÃCreateProcessAº¯ÊýÀ´½¨ÉèÒ»¸öÐÂÀú³Ì¼°ÆäÖ÷Ị̈߳¬È»ºóŲÓÃWriteProcessMemoryº¯ÊýÒÔ½«ÓÐÓøºÔØ×¢Èëmsiexec.exeÀú³Ì£¬×îºóʹÓÃGetThreadContextºÍSetThreadContextº¯Êý½«Ä¿µÄÀú³ÌµÄÖ´Ðеã¸ü¸ÄΪ´Ó×¢ÈëµÄÓÐÓøºÔØ¡£¶øBotÉèÖÃÖиü¸ÄÁËC2µØµãºÍRC4ÃÜÔ¿£¬½ÓÄÉÖ¸ÎÆÊ¶±ðÒÔ±ãËæÊ±ÏòÆäÍÆË͸üС£
ÔÎÄÁ´½Ó£º
https://threatpost.com/sphinx-riddle-us-targets-modifications/155621/


¾©¹«Íø°²±¸11010802024551ºÅ