Sophos·¢Ã÷LockBitʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßʶ±ð¿ÉÒÉÄ¿µÄ£»DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡Õþ¸®Êý¾Ý
Ðû²¼Ê±¼ä 2020-10-231.Sophos·¢Ã÷LockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿µÄ

SophosÐû²¼±¨¸æ£¬³ÆLockBit¿ÉʹÓÃ×Ô¶¯¹¥»÷¹¤¾ßÀ´Ê¶±ð¿ÉÒÉÄ¿µÄ¡£Ñо¿Ö°Ô±Í¨Ì«¹ýÎöÒ»Äêǰ·ºÆðµÄÑù±¾£¬·¢Ã÷LockBitÒѾѸËÙ³ÉÊ죬²¢½ÓÄÉÁËһЩеÄÒªÁìÀ´ÈƹýWindowsÓû§ÕÊ»§¿ØÖÆ£¨UAC£©À´ÌáÉýÌØÈ¨¡£±ðµÄ£¬LockBit¿ÉʹÓÃPowerShellºÍWindowsµÄVBscriptÖ÷»úµÄÖØÃüÃû¸±±¾ÒÔ¼°»ùÓÚPowerShellÉøÍ¸²âÊÔ¹¤¾ßµÄ¾ç±¾£¬À´ËÑË÷°üÀ¨ÓмÛÖµÊý¾ÝµÄϵͳ£¬ÒÔ¹¥»÷СÐÍ×éÖ¯¡£
ÔÎÄÁ´½Ó£º
https://news.sophos.com/en-us/2020/10/21/lockbit-attackers-uses-automated-attack-tools-to-identify-tasty-targets/
2.ÃÀ¹ú³ÆÒÁÀʺڿÍð³äProud BoysÏòÑ¡Ãñ·¢ËÍÏÅ»£Óʼþ

ÃÀ¹úÕþ¸®³ÆÒÁÀʺڿÍð³ä¼«ÓÒÒí×éÖ¯Proud Boys£¬¸øÃñÖ÷µ³Ñ¡Ãñ·¢ËÍÏÅ»£Óʼþ¡£ÕâЩµç×ÓÓʼþÒÔ¡°Í¶Æ±¸øÌØÀÊÆÕ»òÆäËûÈË¡±ÎªÖ÷Ì⣬²¢ÖÒÑÔÃñÖ÷µ³Ñ¡Ãñ±ØÐ轫Õþµ³¸ÄΪ¹²ºÍµ³²¢Í¶Æ±¸øÌØÀÊÆÕ×Üͳ£¬²»È»Proud Boys½«²»»á·Å¹ýËûÃÇ¡£ÓʼþÖеÄÊÕ¼þÈËÐÕÃûºÍµØµãÌåÏÖÕâЩÐÅÏ¢ÊǺڿÍͨ¹ý¹¥»÷Ñ¡Ãñ×¢²áÍøÕ¾»ñµÃµÄ¡£¶øÃÀ¹úÕþ¸®³ÆÒÁÀʺͶíÂÞ˹ÒѾ»ñµÃÁËÑ¡Ãñ¹ÒºÅÐÅÏ¢£¬²¢ÇÒÒÁÀÊÕýÔÚʹÓøÃÐÅÏ¢·¢ËÍÕâЩÍþвÓʼþ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/government/us-govt-iran-behind-fake-proud-boys-voter-intimidation-emails/
3.ºÚ¿Íð³äÓ¢¹úM£¦SµÄCEOÆÈ¡Óû§ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢

ºÚ¿Íð³äÓ¢¹ú´óÐÍ¿ç¹úÁãÊÛÉÌMarks£¦SpencerµÄCEOÆÈ¡Óû§ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢¡£ºÚ¿ÍÊ×ÏÈÔÚÍøÉÏÐû²¼Ú²ÆÐÔ¹ã¸æ£¬²¢Ðû´«Êܺ¦Õßͨ¹ýÐéÄâ³é½±½«ÓÐʱ»ú»ñµÃÀñÎïȯ¡£µ±Êܺ¦Õßµã»÷¹ã¸æÖеÄÁ´½Óʱ£¬»á±»Öض¨Ïòµ½M£¦SµÄÃÅ»§ÍøÕ¾£¬²¢ÒªÇóÌṩÆäÐÕÃû¡¢µØµã¡¢ÊÖ»úºÅÂëÒÔ¼°ÒøÐÐÏêϸÐÅÏ¢£¬°üÀ¨SORT´úÂëºÍÕʺŵȡ£Ò»µ©Óû§ÊäÈëÐÅÏ¢ºó£¬ÆäÐÅÏ¢±ã»á±»ºÚ¿ÍÇÔÈ¡¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ms-boss-spoofed-in-gift-voucher/
4.DHS¡¢CISAºÍFBI³Æ¶íEnergetic BearÇÔÈ¡ÃÀ¹úÕþ¸®Êý¾Ý

ÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©ÍøÂçÇå¾²¡¢»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ºÍÁª°îÊÓ²ì¾Ö£¨FBI£©ÖÒÑÔ£¬¶íÂÞ˹APT×éÖ¯Energetic BearÈëÇÖ²¢ÇÔÈ¡ÁËÃÀ¹úÕþ¸®ÍøÂçµÄÊý¾Ý¡£ÕâЩ»ú¹¹ÌåÏÖ£¬¶íÂÞ˹APT×éÖ¯ÒÑÃé×¼ÊýÊ®¸öSLTTÕþ¸®ºÍº½¿ÕÍøÂ磬²¢ÀֳɯÆËðÁËÍøÂç»ù´¡ÉèÊ©¡£×èÖ¹2020Äê10ÔÂ1ÈÕ£¬ÆäÖÁÉÙ´ÓÁ½¸ö·þÎñÆ÷ÖÐÇÔÈ¡ÁËÊý¾Ý¡£Ð¹Â¶µÄÃô¸ÐÊý¾Ý°üÀ¨ÍøÂçÉèÖúÍÃÜÂë¡¢±ê×¼²Ù×÷³ÌÐò£¨SOP£©£¨ÀýÈç×¢²á¶àÒòËØÉí·ÝÑéÖ¤£©¡¢ITÖ¸ÁÀýÈçÇëÇóÃÜÂëÖØÖã©¡¢¹©Ó¦É̺͹ºÖÃÐÅÏ¢¡¢´òÓ¡»á¼ûÁîÅÆµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/russian-state-hackers-stole-data-from-us-government-networks/
5.MozillaÐû²¼¸üУ¬ÐÞ¸´FirefoxÖеĶà¸öÎó²î

MozillÐÞ¸´ÁËFirefoxÖеĶà¸öÎó²î£¬ÆäÖÐ×îÑÏÖØµÄÎó²î¿ÉÄÜÔÊÐíí§Òâ´úÂëÖ´ÐС£´Ë´ÎÐÞ¸´µÄÎó²î°üÀ¨usersctp¿âÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15969£©¡¢ÄÚ´æ·ÖÅÉÎÊÌ⣨CVE-2020-15254£©¡¢Í¼Ïñ±êÇ©ÖÐÎó²î£¨CVE-2020-15680£©¡¢WASMÏß³ÌÖÐÎó²î£¨CVE-2020-15681£©¡¢¿Éµ¼ÖÂÓÕÆÐÔ¹¥»÷µÄÎó²î£¨CVE-2020-15682£©ºÍÄÚ´æÇå¾²¹ýʧ£¨CVE-2020-15683ºÍCVE-2020-15684£©¡£
ÔÎÄÁ´½Ó£º
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-mozilla-firefox-could-allow-for-arbitrary-code-execution_2020-146/
6.CiscoÐû²¼Çå¾²¸üУ¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄÎó²î

2020Äê10ÔÂ21ÈÕ£¬CiscoÐû²¼Ç徲ͨ¸æ£¬Åû¶Æä¶à¸ö²úÆ·Öб£´æµÄ36¸öÇå¾²Îó²î¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪCisco FXOS FCM¿çÕ¾ÇëÇóαÔìÎó²î£¨CVE-2020-3456£©£¬ÓÉÓÚFCM½Ó¿ÚµÄCSRF±£»¤È±·¦µ¼Ö£¬ÀÖ³ÉʹÓôËÎó²î¿É·¢ËÍí§ÒâÇëÇó£»Cisco FMC¾Ü¾ø·þÎñÎó²î£¨CVE-2020-3499£©£¬ÓÉÓÚϵͳ¶Ô×ÊÔ´ÖµµÄ´¦Öóͷ£²»µ±µ¼Ö£¬¿ÉʹÓôËÎó²îÔì³É¾Ü¾ø·þÎñ£¨DoS£©£»Cisco FTD TCP Flood¾Ü¾ø·þÎñÎó²î£¨CVE-2020-3563£©£¬ÓÉÓÚÄÚ´æÖÎÀíЧÂʵÍÏÂÔì³É£¬¿Éµ¼Ö¾ܾø·þÎñ£¨DoS£©¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/cisco-dos-flaws-network-security-software/160414/


¾©¹«Íø°²±¸11010802024551ºÅ