ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ39ÖÜ
°ä²¼¹¦·ò 2020-09-28> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2020Äê09ÔÂ21ÈÕÖÁ09ÔÂ27ÈÕ¹²ÊÕ¼°²È«·ì϶60¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇChrome storageÔ½½ç¶Á´úÂëÖ´Ðзì϶£»£»Chrome ExtensionsÕ½ÊõÈÆ¹ý´úÂëÖ´Ðзì϶£»£»Chrome V8´úÂëÖ´Ðзì϶£»£»Chrome mediaÊý¾ÝÑéÖ¤´úÂëÖ´Ðзì϶£»£»IBM Data Risk Manager FasterXML jackson-databind´úÂëÖ´Ðзì϶¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊǵ¹úTutanotaÔâµ½DDoS¹¥»÷µ¼Ö·þÎñÁÙʱÖжϣ»£»Pradeo°ä²¼¡¶ÊÖ»úÒøÐУº£º£ºÂÉÀý¡¢¡¢¡¢ÍþвºÍÚ²ÆÔ¤·À¡·°×ƤÊ飻£»NSA°ä²¼Õë¶ÔÔ¶³Ì¹¤×÷ÕߺÍϵͳÖÎÀíÔ±µÄÍøÂ簲ȫָÄÏ£»£»2020ÄêQ2 DDoS¹¥»÷µÄ´ÎÊý±ÈÈ¥Äêͬ±ÈÔö³¤570£¥£»£»Î¢Èí³ÆÒѼì²âµ½ÀûÓÃZerologon·ì϶ÌáÒéµÄ×Ô¶¯¹¥»÷¡£¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£¡£
> ÖØÒª°²È«·ì϶Áбí
1.Chrome storageÔ½½ç¶Á´úÂëÖ´Ðзì϶
Chrome storage´æÔÚÔ½½ç¶Á·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
2. Chrome ExtensionsÕ½ÊõÈÆ¹ý´úÂëÖ´Ðзì϶
Chrome Extensions´æÔÚÕ½ÊõÈÆ¹ý·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
3.Chrome V8´úÂëÖ´Ðзì϶
Chrome V8ÒýÇæ´æÔÚÔ½½çд·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
4. Chrome mediaÊý¾ÝÑéÖ¤´úÂëÖ´Ðзì϶
Chrome media´æÔÚÊý¾ÝÑéÖ¤·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
5.IBM Data Risk Manager FasterXML jackson-databind´úÂëÖ´Ðзì϶
IBM Data Risk Manager FasterXML jackson-databind´æÔÚ·´ÐòÁл¯·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://www.ibm.com/support/pages/node/6335281
> ÖØÒª°²È«ÊÂÎñ×ÛÊö
1¡¢¡¢¡¢µÂ¹úTutanotaÔâµ½DDoS¹¥»÷µ¼Ö·þÎñÁÙʱÖжÏ

µÂ¹ú¶Ëµ½¶Ë¼ÓÃܵç×ÓÓʼþ·þÎñÌṩÉÌTutanotaÔâµ½DDoS¹¥»÷£¬µ¼Ö·þÎñÁÙʱÖжÏÊýСʱ¡£¡£³õ´ÎÖ±½ÓÕë¶ÔTutanotaµÄDDoS¹¥»÷²úÉúÔÚ9ÔÂ14ÈÕ֮ǰµÄÄǸöÖÜÄ©£¬µ¼ÖÂÊý°ÙÃûÓû§ÎÞ·¨½Ó¼û·þÎñ£¬µ«¸ÃÎÊÌâºÜ¿ìµÃµ½Ïàʶ¾ö¡£¡£Ö®ºóÔÚTutanotaµÄ·þÎñÆ÷¹Ø±Õºó£¬ºÚ¿Í¹¥»÷ÁËÍйÜTutanota¼Í¼µÄDNSÌṩ·¨Ê½£¬ÕâʹÊý°ÙÍòÓû§ÎÞ·¨½Ó¼ûÆäTutanotaÕÊ»§¡£¡£Ä¿Ç°£¬¸Ã¹«Ë¾ÕýÔÚ³¢ÊÔ¸üÐÂÆäDNS¼Í¼£¬²¢½«ËüÃÇÍйÜÔÚÁíÒ»¸öÌṩÉÌ´¦¡£¡£
ÔÎÄÁ´½Ó£º£º£º
https://www.bleepingcomputer.com/news/security/tutanota-encrypted-email-service-suffers-ddos-cyberattacks/
2¡¢¡¢¡¢Pradeo°ä²¼¡¶ÊÖ»úÒøÐУº£º£ºÂÉÀý¡¢¡¢¡¢ÍþвºÍÚ²ÆÔ¤·À¡·°×ƤÊé

Pradeo°ä²¼ÁË¡¶ÊÖ»úÒøÐУº£º£ºÂÉÀý¡¢¡¢¡¢ÍþвºÍÚ²ÆÔ¤·À¡·°×ƤÊ飬½éÉÜÁËÓйØÒƶ¯ÒøÐеÄʹÓᢡ¢¡¢Ë¾·¨¿ò¼Ü¡¢¡¢¡¢·çÏÕÒÔ¼°±£»£»¤Òƶ¯ÒøÐÐÀûÓ÷¨Ê½°²È«µÄ½â¾ö¹æ»®£¨´Ó¿ª·¢µ½Ö´ÐУ©µÄ¾ßÌåÐÅÏ¢¡£¡£ÆäÖÐдµÀ£¬Òƶ¯ÒøÐзþÎñѸËÙÊܵ½Ïû·ÑÕßµÄϲ»¶£¬µ½2019Äêµ×£¬74%µÄÓ¢¹úÈ˺Í75%µÄÃÀ¹úÈËʹÓÃÒÆ¶¯É豸À´ÖÎÀíÆä²ÆÕþ¡£¡£µ«ÊÇ×êÑÐÅú×¢£¬ÊÖ»úÒøÐÐÀûÓÃÍùÍùûÓÐÔ¤ÆÚµÄÄÇô°²È«£¬¾ÝRSAµÄÚ²ÆÎ¢·çÏÕµý±¨ÍŶÓ×î½üÍøÂçµÄÊý¾Ý·ÖÎöÏÔʾ£¬ÓëÊÖ»úÀûÓÃÓйصÄÚ²ÆÐÐΪÔÚ2020ÄêµÚÒ»¼¾¶È·ÁËÒ»·¬¡£¡£
ÔÎÄÁ´½Ó£º£º£º
https://www.helpnetsecurity.com/2020/09/21/whitepaper-mobile-banking-regulations-threats-and-fraud-prevention
3¡¢¡¢¡¢NSA°ä²¼Õë¶ÔÔ¶³Ì¹¤×÷ÕߺÍϵͳÖÎÀíÔ±µÄÍøÂ簲ȫָÄÏ

ÃÀ¹ú¹ú¶È°²È«¾Ö(NSA)°ä²¼ÁËÁ½·ÝÍøÂ簲ȫÐÅÏ¢±í(CSIs)£¬Îª¹ú¶È°²Õûϵͳ(NSS)ºÍ¹ú·À²¿(DoD)¹¤×÷ÈËÔ±ºÍϵͳÖÎÀíÔ±ÌṩÁ˹ØÓÚÔÚ¼Ò¹¤×÷ÆÚ¼ä±£»£»¤ÍøÂ簲ȫºÍÓ¦¶ÔÊÂÎñµÄ½¨Òé¡£¡£µÚÒ»·ÝÃûΪÊÜËðСÎÒÍøÂçÖ¸±ê»ººÍ½â´ëÊ©£¬Ö¼ÔÚÌṩÓйØÔ¶³Ì¹¤×÷ÕßÈôºÎ¼ø±ðºÍ¼õÇáÆäСÎÒÍøÂçΣº£º£º¦µÄ¾ßÌåÐÅÏ¢¡£¡£µÚ¶þ·ÝÃûΪִÐдøÍâÍøÂçÖÎÀí£¬ÆäÏòϵͳÖÎÀíÔ±ÌṩÁËÈôºÎ¸ôÀëÖÎÀíÁ÷Á¿ºÍÔËÓªÁ÷Á¿µÄÐÅÏ¢¡£¡£
ÔÎÄÁ´½Ó£º£º£º
https://www.securityweek.com/nsa-issues-cybersecurity-guidance-remote-workers-system-admins
4¡¢¡¢¡¢2020ÄêQ2 DDoS¹¥»÷µÄ´ÎÊý±ÈÈ¥Äêͬ±ÈÔö³¤570£¥

ƾ¾ÝNexusguard»ã±¨£¬DDoS¹¥»÷µÄ´ÎÊýÓëÈ¥ÄêͬÆÚÏà±ÈÔö³¤ÁË570£¥¡£¡£¹¥»÷ÕßѡȡÁ˸ü¾«ÃܵĹ¥»÷·½Ê½£¬ÒÔ·¢Æð¸÷Àà·Å´óºÍ»ùÓÚUDPµÄ¹¥»÷£¬ÓÃÁ÷Á¿¸²Ã»Ö¸±êÍøÂ磬ÕâʹCSPºÜÄÑͨ¹ý´«Í³µÄ»ùÓÚãÐÖµµÄ²½Öè½øÐмì²â»ººÍ½â¡£¡£Nexusguard»¹·¢ÏÖÁËÒ»ÖÖеÄÇ÷Ïò£¬¼´¹¥»÷Õßѡȡ»ìºÏ¹¥»÷ý½éÀ´ÌáÒé¸ü¿í·ºµÄ»ùÓÚUDPµÄ¹¥»÷£¬Ö÷ÕÅÊÇÌá¸ßCSP¼ì²âºÍ·Ö±æ¶ñÒâÁ÷Á¿ÓëºÏ·¨Á÷Á¿µÄÄѶȡ£¡£
ÔÎÄÁ´½Ó£º£º£º
https://www.helpnetsecurity.com/2020/09/23/bit-and-piece-ddos-attacks-increased-570-in-q2-2020/
5¡¢¡¢¡¢Î¢Èí³ÆÒѼì²âµ½ÀûÓÃZerologon·ì϶ÌáÒéµÄ×Ô¶¯¹¥»÷

΢Èí°²È«µý±¨ÍŶӰµÊ¾£¬ÆäÒѼì²âµ½ÀûÓÃZerologon·ì϶£¨CVE-2020-1472 £©ÌáÒéµÄ×Ô¶¯¹¥»÷¡£¡£×ÔºÉÀ¼°²È«¹«Ë¾Secura BVÔÚ9ÔÂ14ÈÕÅû¶ÁËÓйØZerologon·ì϶µÄ¾ßÌåÐÅÏ¢ºó£¬ÒÑÓжà¸ö±øÆ÷»¯µÄPoC¿ª·¢´úÂëÔÚÍøÉϹ«¿ª¡£¡£Î¢Èí²¢Ã»Óа䲼ÓйØÕâ´Î¹¥»÷µÄϸ½Ú£¬µ«Êǰ䲼ÁËÓÃÓÚ¹¥»÷µÄÎļþÉ¢ÁС£¡£Òò¶ø°²È«×¨¼Ò¾Í½¨Ò飬ÄÇЩÓòÃû½ÚÖÆÆ÷¶³öµÄ¹«Ë¾Ó¦¾¡¿ìÈÃϵͳÀëÏߣ¬ÒÔ±ã¶ÔÆä½øÐв¹¶¡¡£¡£
ÔÎÄÁ´½Ó£º£º£º
https://www.zdnet.com/article/microsoft-says-it-detected-active-attacks-leveraging-zerologon-vulnerability/


¾©¹«Íø°²±¸11010802024551ºÅ