CodeMeterÖб£´æÑÏÖØÎó²î £¬¿Éµ¼ÖÂOT¹©Ó¦Á´¹¥»÷£»ACSCÐû²¼¡¶2019¨C2020Äê¶ÈÍøÂçÍþв±¨¸æ¡·

Ðû²¼Ê±¼ä 2020-09-11
1.CodeMeterÖб£´æÑÏÖØÎó²î £¬¿Éµ¼ÖÂOT¹©Ó¦Á´¹¥»÷


1.jpg


Claroty·¢Ã÷Î÷ÃÅ×ӵȶ¥¼¶ICS¹©Ó¦ÉÌʹÓõĵÚÈý·½¹¤Òµ×é¼þCodeMeterÖб£´æ6¸öÑÏÖØµÄÎó²î £¬»ò½«µ¼ÖÂOT¹©Ó¦Á´¹¥»÷ £¬ÕâЩÎó²îµÄCVSSÆÀ·Ö¾ùΪ10.0 ¡£CISAÌåÏÖ £¬¹¥»÷ÕßÀÖ³ÉʹÓÃÕâЩÎó²îºó¿É¸ü¸ÄºÍαÔìÔÊÐíÖ¤Îļþ £¬µ¼Ö¾ܾø·þÎñÇéÐÎ £¬Ç±ÔÚµØÊµÏÖÔ¶³ÌÖ´ÐдúÂë¡¢¶ÁÈ¡¶ÑÊý¾Ý²¢×èÖ¹ÒÀÀµCodeMeterµÄµÚÈý·½Èí¼þµÄÕý³£ÔËÐÐ ¡£ÆäÖÐ×îÑÏÖØµÄÎó²î¿Éͨ¹ýÆÆËðCodeMeterͨѶЭæÅºÍÄÚ²¿APÒÔIÔ¶³ÌÖ´ÐдúÂë £¬ÊµÏÖICSϵͳµÄÍêÈ«½ÓÊÜ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/critical-bugs-enable-ot-supply/


2.ºÚ¿Í¹¥»÷˹Âå·¥¿Ë¼ÓÃÜÇ®±ÒÉúÒâËù £¬ÍµÈ¡¼ÛÖµ540ÍòÃÀԪǮ±Ò


2.jpg


ºÚ¿Í¹¥»÷˹Âå·¥¿Ë¼ÓÃÜÇ®±ÒÉúÒâËùETERBASE £¬ÍµÈ¡Á˼ÛÖµ540ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò ¡£¸Ã¹«Ë¾ÓÚ±¾ÖÜËÄÅû¶¸ÃÊÂÎñ £¬ÌåÏÖÆä´æ´¢Á˱ÈÌØ±Ò¡¢ÒÔÌ«±Ò¡¢ALGO¡¢Ripple¡¢TezosºÍTRONµÄÁù¸ö¼ÓÃÜÇ®°üÎļþ±»µÁ £¬ÆäÒѼì²âµ½¹¥»÷ £¬µ«ÎÞ·¨×èÖ¹ËüµÄ±¬·¢ ¡£ETERBASEÌåÏÖ £¬ËüÔÚÕâЩǮ±Ò±»µÁʱ¾Í¶ÔÆä¾ÙÐÐÁ˸ú×Ù £¬ÏÖÔÚ±»µÁ×ʽðÔÚ¸÷×ÔÇø¿éÁ´ÉϵÄ×ªÒÆ £¬¸Ã¹«Ë¾Ò²ÁªÏµÁ˱»µÁ×ʽðËùÔÚµÄÉúÒâÒÔÊǶ³½á±»µÁ×ʽð ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/slovak-cryptocurrency-exchange-eterbase-discloses-5-4-million-hack/


3.Ñо¿Ö°Ô±·¢Ã÷ÐÂÐ͹¥»÷Raccoon £¬Õë¶ÔTLS¼ÓÃÜЭÒéÇÔÊØÐÅÏ¢


3.jpg


Ñо¿Ö°Ô±Åû¶ÁËÕë¶ÔTLS¼ÓÃÜЭÒéµÄÐÂÐ͹¥»÷·½·¨Raccoon £¬¸Ã¹¥»÷¿ÉÓÃÓÚ½âÃÜÓû§ºÍ·þÎñÆ÷Ö®¼äµÄHTTPSÅþÁ¬²¢¶ÁÈ¡Ãô¸ÐͨѶ ¡£Raccoon¹¥»÷´Ó»ù´¡ÉÏ˵ÊÇ׼ʱ¹¥»÷ £¬¹¥»÷Õß»áÕÉÁ¿Ö´ÐÐÒÑÖªÃÜÂë²Ù×÷ËùÐèµÄʱ¼ä £¬ÒÔÈ·¶¨²¿·ÖËã·¨ ¡£Ñо¿Ö°Ô±³Æ £¬ËùÓÐʹÓÃDiffie-HellmanÃÜÔ¿½»Á÷À´½¨ÉèTLSÅþÁ¬µÄ·þÎñÆ÷¶¼ÈÝÒ×Êܵ½´ËÀ๥»÷ ¡£ÏÖÔÚ £¬Ò»Ð©¹©Ó¦ÉÌ £¬ÈçMicrosoft¡¢Mozilla¡¢OpenSSLºÍF5 NetworksÒÑÐû²¼Çå¾²¸üÐÂÒÔ×èÖ¹Raccoon¹¥»÷ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions/


4.ZeppelinÉý¼¶»Ø¹é £¬ÒÔ·¢Æ±ÎªÖ÷ÌâÈö²¥ÐµÄľÂí


4.jpg


Ñо¿Ö°Ô±Juniper Threatlab·¢Ã÷ZeppelinÉý¼¶»Ø¹é £¬ÒÔ·¢Æ±ÎªÖ÷ÌâÈö²¥ÐµÄľÂí ¡£ÔÚ×îÐµĹ¥»÷Ô˶¯ÖÐ £¬ºÚ¿ÍÒÀȻʹÓôøÓжñÒâºêµÄÖ÷ÌâΪ·¢Æ±´¹ÂÚµç×ÓÓʼþ ¡£ºÚ¿Í½«Visual Basic¾ç±¾µÄƬ¶ÏÒþ²ØÔÚÖÖÖÖͼÏñºóµÄÀ¬»øÎı¾ÖÐ £¬¶ñÒâºê»áÆÊÎö²¢ÌáÈ¡ÕâЩ¾ç±¾ £¬È»ºó½«ÆäдÈëc£º\wordpress\about1.vbsÖеÄÎļþÖÐ ¡£Ö®ºó £¬Ê¹Óõڶþ¸öºêÖ´ÐÐabout1.vbs £¬ÒÔÏÂÔØÐµÄľÂí ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/zeppelin-ransomware-returns-trojan/159092/


5.ÈýÐÇÐû²¼Çå¾²¸üР£¬ÐÞ¸´GalaxyÉϵĶà¸öÎó²î


5.jpg


ÔÚAndroidÐû²¼ÁË9ÔÂÇå¾²¸üкó £¬ÈýÐÇÒ²Ðû²¼ÁËÇå¾²¸üР£¬ÐÞ¸´ÆäGalaxyÉϵĶà¸öÎó²î ¡£´Ë´ÎÐÞ¸´µÄ×îÑÏÖØµÄÎó²îÖ®Ò»±»×·×ÙΪCVE-2020-0245 £¬Ó°ÏìÁËMedia Framework×é¼þ £¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂëºÍÐÅÏ¢Åû¶ ¡£±ðµÄ £¬»¹ÐÞ¸´ÁËÆäFramework¡¢Media FrameworkºÍϵͳÖеĶà¸öȨÏÞÌáÉýÎó²î£¨CVE-2020-0074¡¢CVE-2020-0388¡¢CVE-2020-0391¡¢CVE-2020-0401¡¢CVE-2020-0392¡¢CVE-2020-0386ºÍCVE-2020-0394£© ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/samsung-fixes-critical-android-flaws-with-september-updates/


6.ACSCÐû²¼¡¶2019¨C2020Äê¶ÈÍøÂçÍþв±¨¸æ¡·


6.jpg


°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©ÒÑÐû²¼ÓйØ2019-2020ÄêÖ÷ÒªÍøÂçÍþвºÍͳ¼ÆÊý¾ÝµÄÄê¶È±¨¸æ ¡£¸Ã±¨¸æÇ¿µ÷Ö¸³ö £¬ÍøÂç´¹ÂÚºÍÓã²æ´¹ÂÚÈÔÈ»ÊǺڿͻñȡСÎÒ˽¼ÒÐÅÏ¢»òÓû§Ö¤ÊéÒÔ½øÈëÍøÂç»òÈö²¥¶ñÒâÄÚÈݵÄ×î³£¼ûÒªÁì £¬ÀÕË÷Èí¼þÒѳÉΪ¶ÔÆóÒµºÍÕþ¸®µÄÖØ´óÍþв ¡£ºÚ¿Íͨ³£Í¨¹ýÓã²æÊ½´¹ÂÚ²»·¨»ñÈ¡Óû§µÇ¼ºÍÖ¤Êé £¬È»ºóʹÓÃÔ¶³Ì×ÀÃæÐ­Òé(RDP)·þÎñ×°ÖÃÀÕË÷Èí¼þ ¡£

Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/09/10/acsc-releases-annual-cyber-threat-report-2019-2020