·É»úÖÆÔìÉÌBombardier³ÆÆäÊý¾ÝÒÑÔÚClopÍøÕ¾ÉϹûÕæ£»ÃÀÁª´¢µÄITϵͳ¹ÊÕϵ¼ÖÂÉúÒâ·þÎñÔÝʱÖÐÖ¹£¬Ôµ¹ÊÔÓÉδ֪
Ðû²¼Ê±¼ä 2021-02-251.·É»úÖÆÔìÉÌBombardier³ÆÆäÊý¾ÝÒÑÔÚClopÍøÕ¾ÉϹûÕæ

¼ÓÄôó·É»úÖÆÔìÉÌBombardier³ÆÆäÊý¾ÝÒÑÔÚClopÍøÕ¾ÉϹûÕæ¡£¸Ã¹«Ë¾ÔÚͨ¸æÖÐÌåÏÖ£¬¾³õ³ÌÐò²é£¬ºÚ¿ÍʹÓÃÁ˵ÚÈý·½Îļþ´«ÊäÓ¦ÓÃÖеÄÎó²îÀ´»á¼ûºÍÇÔÈ¡Êý¾Ý¡£Ö»¹Ü²¢Ã»ÓÐÏêϸָ³ö¸Ã×°±¸µÄÃû³Æ£¬µ«¾ÝÍÆ²âºÜ¿ÉÄÜÊÇÖ¸µÄAccellion FTA¡£±»µÁÊý¾ÝÒÑÔÚÀÕË÷ÍÅ»ïClopµÄÊý¾ÝÐ¹Â¶ÍøÕ¾¹ûÕæ£¬°üÀ¨BombardierÖÖÖÖ·É»úºÍ·É»úÁã¼þµÄÉè¼ÆÎļþ£¬²¢Ã»ÓÐÈκÎСÎÒ˽¼ÒÊý¾Ýй¶¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/airplane-maker-bombardier-data-posted-on-ransomware-leak-site-following-fta-hack/
2.ÃÀÁª´¢µÄITϵͳ¹ÊÕϵ¼ÖÂÉúÒâ·þÎñÔÝʱÖÐÖ¹£¬Ôµ¹ÊÔÓÉδ֪

2ÔÂ24ÈÕÃÀÁª´¢£¨Fed£©µÄITϵͳ±¬·¢ÑÏÖØµÄ¹ÊÕÏ£¬µ¼Öµç»ãµÈÉúÒâ·þÎñÖÐÖ¹£¬ÏÖÔÚÔµ¹ÊÔÓÉÈÔȻδ֪¡£ÆäÖÐÖ¹Ó°ÏìÁ˸ÃÒøÐÐÏÕЩËùÓеĵç×Ó·þÎñ£¬°üÀ¨ÕÊ»§·þÎñ¡¢ÖÐÑëÒøÐС¢Check 21¡¢FedACH¡¢FedCash¡¢FedLine AdvantageµÈ¡£±ðµÄ£¬Ðí¶à¼ÓÃÜÇ®±ÒÉúÒâËù£¨ÀýÈçBinance£©Ò²ÌåÏÖ·þÎñÖÐÖ¹µ¼ÖÂÆäÎÞ·¨Ö´ÐÐACH´æ¿î»òÌá¿î¡£Fed³ÆÊÇÓÉÓÚÆä²Ù×÷¹ýʧµ¼Ö´˴ÎÖÐÖ¹£¬µ«²¢Î´Í¸Â¶¸ü¶àϸ½Ú£¬¸ÃÎÊÌâÓÚÃÀ¹ú¶«²¿Ê±¼ä2ÔÂ24ÈÕÏÂÖç2:32±»½â¾ö¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/government/federal-reserve-nationwide-outage-impacts-us-banking-system/
3.·ÒÀ¼TietoEVRYÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬¿Í»§·þÎñÔÝʱÖÐÖ¹

·ÒÀ¼IT·þÎñ¹«Ë¾TietoEVRYÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬¿Í»§·þÎñÔÝʱÖÐÖ¹¡£TietoEVRYÊÇÒ»¼ÒÈí¼þ¿ª·¢ºÍIT·þÎñ¹«Ë¾£¬ÔÚ80¸ö¹ú¼ÒºÍµØÇøÓµÓÐ24000ÃûÔ±¹¤£¬2019ÄêµÄÊÕÈëΪ29.5ÒÚÅ·Ôª¡£±¾ÖÜÒ»£¬TietoEVRYµÄÁãÊÛ¡¢ÖÆÔìºÍ·þÎñÏà¹ØÐÐÒµµÄ25¸ö¿Í»§ÌåÏÖÆäÓöµ½ÁËÊÖÒÕÎÊÌ⣬ØÊºóµÃÖªÕâЩÎÊÌâÊÇÓÉÀÕË÷Èí¼þ¹¥»÷ÒýÆðµÄ¡£TietoEVRY·¢Ã÷¹¥»÷ºóÁ¬Ã¦¹Ø±ÕÁËÊÜÓ°ÏìµÄϵͳºÍ·þÎñ£¬²¢ÓëµØ·½Õþ¸®¶Ô´ËÊÂÕö¿ªÊӲ졣
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/finnish-it-services-giant-tietoevry-discloses-ransomware-attack/
4.IBMÐû²¼Çå¾²¸üУ¬ÐÞ¸´Ó°Ïì¶à¸ö²úÆ·µÄÎó²î

IBMÐû²¼Çå¾²¸üУ¬ÐÞ¸´ÁËJava Runtime¡¢Planning Analytics WorkspaceºÍKenexa LMSÖеÄÎó²î¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖØµÄÎó²îÊÇEclipse OpenJ9ÖеĻùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¨CVE-2020-27221£©£¬CVSSµÃ·ÖΪ9.8£¬¿É±»ÓÃÀ´Ö´ÐÐí§Òâ´úÂë»òµ¼ÖÂÓ¦ÓÃÍ߽⡣Æä´ÎΪJava SE¿âµÄ×é¼þÖеÄCVE-2020-14782¡£±ðµÄ£¬»¹ÐÞ¸´ÁËNode.jsÖеľܾø·þÎñÎó²î£¨CVE-2020-8251£©»ººÍ³åÇøÒç³öÎó²î£¨CVE-2020-8252£©µÈÎó²î¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/114942/security/ibm-security-flaws.html
5.TalosÐû²¼ÓйغڿÍ×éÖ¯GamaredonµÄÆÊÎö±¨¸æ

Cisco TalosÐû²¼ÁËÓйغڿÍ×éÖ¯GamaredonµÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬GamaredonÖÁÉÙ´Ó2013Äê×îÏÈ»îÔ¾£¬¶àÄêÀ´Ò»Ö±ÔÚÓëÇ×¶íÂÞ˹µÄÔ˶¯Óйء£ËüÒ»Ö±±»ÒÔΪÊÇAPT£¬¿ÉÊÇÆäÌØÕ÷ÓëAPT²»·û¡£GamaredonÍ»ÆÆÁËAPTģʽ£¬Ê¹ÓÃÁË´ó×ÚµÄÓòÃû£¬¿ØÖÆ×Å600¶à¸öÓò£¬ºÜÉÙÓÐÔÆÔÆÖØ´ó»ù´¡¼Ü¹¹µÄAPTС×éºã¾Ã»îÔ¾¡£±ðµÄ£¬Gamaredon²»ÏñÆäËûAPT×éÖ¯Ò»ÑùÒþ²Ø×ã¼££¬Ò²Ã»ÓÐÕë¶ÔÐÔµÄÄ¿µÄ£¬Òò´ËÆä¸üÏñÊÇΪAPTÌṩ·þÎñµÄ·¸·¨ÍŻ
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2021/02/gamaredonactivities.html
6.Trend MicroÐû²¼2020ÄêÍøÂçÇå¾²Ì¬ÊÆµÄ»ØÊ×±¨¸æ

Trend MicroÐû²¼ÁË2020ÄêÍøÂçÇå¾²Ì¬ÊÆµÄ»ØÊ×±¨¸æ¡£±¨¸æÊÓ²ìÁË2020Äê·ºÆð²¢Ò»Á¬±£´æµÄ×îÏÔןÍÒªº¦µÄÇå¾²ÎÊÌ⣬²¢ÎªÓû§ºÍ×éÖ¯ÌṩÁËÓ¦¶Ô¼±¾çת±äµÄÍþвµÄ½¨Òé¡£ÐÂÀÕË÷Èí¼þ¼Ò×åµÄÊýÄ¿ÓÉ2019ÄêµÄ¸öÔöÌíµ½2020ÄêµÄ127¸ö£¬ÆäÖ÷ÒªÕë¶ÔÕþ¸®¡¢ÒøÐС¢ÖÆÔìÒµºÍÒ½ÁƱ£½¡ÐÐÒµ¡£±ðµÄ£¬2020Äê¼ì²âµ½Áè¼Ý1600Íò¸öÓëCovid-19Ïà¹ØµÄÍþв£¬ÆäÖÐÓÐ60£¥ÒÔÉÏÀ´×ÔÃÀ¹ú¡¢µÂ¹úºÍ·¨¹ú¡£
ÔÎÄÁ´½Ó£º
https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/a-constant-state-of-flux-trend-micro-2020-annual-cybersecurity-report


¾©¹«Íø°²±¸11010802024551ºÅ