ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ46ÖÜ

°ä²¼¹¦·ò 2020-11-16

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ09ÈÕÖÁ11ÔÂ15ÈÕ¹²ÊÕ¼°²È«·ì϶50¸ö £¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇSAP solution manager Outside DiscoveryÅäÖ÷þÎñδÊÚȨ½Ó¼û·ì϶£»£»£»Apache Airflow APIδÊÚȨ½Ó¼û·ì϶£»£»£»Microsoft EdgeÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶£»£»£»Microsoft Exchange Server CVE-2020-17083ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶£»£»£»A10 Networks ACOSÔ¶³Ì´úÂëÖ´Ðзì϶¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ¿¨°Í˹»ù°ä²¼Linux°æ±¾RansomExxµÄ·ÖÎö»ã±¨£»£»£»ESET°ä²¼Cyberchology:±¨´ð³É·ÖµÄ·ÖÎö»ã±¨£»£»£»±Ê¼Ç±¾ÖÆ×÷ÉÌÈʱ¦Ï°È¾DoppelPaymer £¬£¬£¬±»ÀÕË÷1700ÍòÃÀÔª£»£»£»Î¢Èí°ä²¼Î¢Âë¸üР£¬£¬£¬ÐÞ¸´Intel CPUÖвàÐŵÀ·ì϶£»£»£»ºÚ¿ÍÔÚGitHub´æ´¢¿âÖй«¿ªCobalt StrikeÔ´´úÂë¡£¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬£¬£¬±¾Öܰ²È«ÍþвΪÖС£¡£


ÖØÒª°²È«·ì϶Áбí


1.SAP solution manager Outside DiscoveryÅäÖ÷þÎñδÊÚȨ½Ó¼û·ì϶


SAP Solution Manager Outside DiscoveryÅäÖ÷þÎñ´æÔÚ°²È«Èƹý·ì϶ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬£¬£¬¿ÉÈÆ¹ýÏÞ¶È £¬£¬£¬Î´ÊÚȨ½Ó¼û·þÎñ¡£¡£

https://launchpad.support.sap.com/#/notes/2985866


2.Apache Airflow APIδÊÚȨ½Ó¼û·ì϶


Apache Airflow´æÔÚĬÈÏÅäÖ÷ì϶ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬£¬£¬¿ÉÎÞÐèÑéÖ¤½Ó¼ûAPI¡£¡£

https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E


3.Microsoft EdgeÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶


Microsoft Edge´æÔÚÄÚ´æ·ÛËé·ì϶ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó £¬£¬£¬ÓÕʹÓû§½âÎö £¬£¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17058


4.Microsoft Exchange Server CVE-2020-17083ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶


Microsoft Exchange Server´æÔÚÄÚ´æ·ÛËé·ì϶ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬£¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17083


5.A10 Networks ACOSÔ¶³Ì´úÂëÖ´Ðзì϶


A10 Networks ACOS´æÔÚδÊÚȨ°²È«·ì϶ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬£¬£¬¿ÉδÊÚȨִÐÐËÁÒâ´úÂë¡£¡£

https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384


> ÖØÒª°²È«ÊÂÎñ×ÛÊö


1¡¢¿¨°Í˹»ù°ä²¼Linux°æ±¾RansomExxµÄ·ÖÎö»ã±¨


1.jpg


¿¨°Í˹»ù°ä²¼Ò»·Ýл㱨½éÉÜÁËLinux°æ±¾µÄRansomExxÀÕË÷Èí¼þ £¬£¬£¬Ò²³ÆÎªDefray777¡£¡£»ã±¨³Æ £¬£¬£¬RansomExxÔÚÕë¶ÔLinux·þÎñÆ÷ʱ £¬£¬£¬»áÏȲ¿ÊðÒ»¸öÃûΪsvc-newµÄELF¿ÉÖ´ÐÐÎļþ £¬£¬£¬ÓÃÓÚ¼ÓÃÜÊܺ¦ÕߵķþÎñÆ÷¡£¡£´ËÍâ £¬£¬£¬ÓëWindows°æ±¾·ÖÆç £¬£¬£¬Defray777²»Ô̺¬ÈκÎÓÃÓÚÖÕÖ¹¹ý³ÌµÄ´úÂ루ÀýÈ簲ȫÈí¼þ£© £¬£¬£¬²»»áÏñWindows°æ±¾ÄÇÑù²Á³ý¿ÉÓÃ¿Õ¼ä £¬£¬£¬Ò²²»ÄÜÓëºÅÁîºÍ½ÚÀñ·þÎñÆ÷ͨѶ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ransomexx-ransomware-also-encrypts-linux-systems/


2¡¢ESET°ä²¼Cyberchology:±¨´ð³É·ÖµÄ·ÖÎö»ã±¨


2.jpg


ESET°ä²¼ÁËÃûΪCyberchology:±¨´ð³É·ÖµÄ·ÖÎö»ã±¨ £¬£¬£¬Ì½ÇóÁËÔ±¹¤ÔÚ×éÖ¯ÍøÂ簲ȫÖеÄ×÷Óᣡ£·ÖÎö·¢ÏÖ £¬£¬£¬80£¥µÄ¹«Ë¾°µÊ¾ÔÚCOVID-19ÆÚ¼ä±¨´ð³É·Ö´øÀ´µÄ·çÏÕÔö³¤ÁËÊØ»¤ÍøÂ簲ȫµÄÄѶÈ£»£»£»×ÔCOVID-19ÒÔÀ´ £¬£¬£¬ÍøÂç·¸×ïÒÑÔö³¤ÁË63£¥£»£»£»±¨´ðÃýÎóÒ»ÏòÊÇCOVID-19ÆÚ¼ä×î´óµÄÍøÂ簲ȫÌôÕ½£»£»£»Ö»ÓÐËÄ·ÖÖ®Ò»µÄÆóÒµÒÔΪËûÃǵÄÔ¶³Ì¹¤×÷Õ½ÊõÓÐЧ£»£»£»47£¥µÄÈ˲»°²Æä¿¹Ñ¹ÄÜÁ¦¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cdn1.esetstatic.com/ESET/UK/Collateral/White_Paper_Cyberchology.pdf


3¡¢±Ê¼Ç±¾ÖÆ×÷ÉÌÈʱ¦Ï°È¾DoppelPaymer £¬£¬£¬±»ÀÕË÷1700ÍòÃÀÔª


3.jpg


±Ê¼Ç±¾ÖÆ×÷ÉÌÈʱ¦Ôâµ½DoppelPaymerÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬±»ÀÕË÷1700ÍòÃÀÔª¡£¡£Èʱ¦£¨Compal£©ÊÇÈ«ÇòµÚ¶þ´óÔ­´´Éè¼Æ(ODM)±Ê¼Ç±¾µçÄÔÖÆ×÷ÉÌ £¬£¬£¬ÓëÆ»¹û¡¢»ÝÆÕ¡¢´÷¶û¡¢åÚÏëºÍºê³žµÈ³ÛÃû¹«Ë¾ºÏ×÷¡£¡£¸Ã¹«Ë¾°µÊ¾ÆäÖ»Êǰ칫×Ô¶¯»¯ÏµÍ³³öÏÖÒì³£ £¬£¬£¬²¢Î´ÏñÍâ½çËù±¨µÀµÄÄÇÑù±»ºÚ¿ÍÀÕË÷ £¬£¬£¬Ä¿Ç°³ö²úÖÐËùÓÐÕý³£¡£¡£µ«¾ÝÐÂÎÅÍøÕ¾BleepingComputer³ÆÆäÒÑ»ñµÃÊê½ð¼Í¼ £¬£¬£¬ÆäÖкڿÍÍÅ»ïÒªÇóÖ§¸¶1100±ÈÌØ±Ò£¨16725500ÃÀÔª£©¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/laptop-maker-compal-hit-by-ransomware-17-million-demanded/


4¡¢Î¢Èí°ä²¼Î¢Âë¸üР£¬£¬£¬ÐÞ¸´Intel CPUÖвàÐŵÀ·ì϶


4.jpg


΢ÈíÒÑÕë¶ÔWindows 10 20H2¡¢2004¡¢1909°ä²¼ÁËIntel΢´úÂë¸üР£¬£¬£¬ÒÔÐÞ¸´Intel CPUÖеIJàÐŵÀ·ì϶Platypus¡£¡£¸Ã·ì϶ÓɸñÀ­´Ä¼¼Êõ´óѧ¡¢CISPAº¥Ä·»ô×ÈÐÅÏ¢°²È«ÖÐÐĺͲ®Ã÷º²´óѧµÄ×é³ÉµÄ×êÑÐÍŶÓÅû¶ £¬£¬£¬Î»ÓÚÓ¢ÌØ¶ûµÄÔËÐоùÔȹ¦ÂÊÏÞ¶È£¨RAPL£©½çÃæÖС£¡£×êÑÐÈËÔ±Åú×¢ £¬£¬£¬¹¥»÷ÕßÄܹ»Ê¹ÓÃRAPL½Ó¿Ú¼à¶½¹¦ºÄ²¢´§¶ÈCPUÕýÔÚÖ´ÐÐÄÄЩָÁî £¬£¬£¬´Ó¶ø´ÓÄÚ´æÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£´ËÍâÕâ´Î¸üл¹ÐÞ¸´ÁËʸÁ¿¼Ä·ÅÆ÷²ÉÑù»î¶¯Öзì϶£¨CVE-2020-8696£©ºÍ¼±¾ç´æ´¢Ç°Õ°Ô¤²âÆ÷Öзì϶£¨CVE-2020-8698£©¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/windows-10-intel-microcode-released-to-fix-new-cpu-security-bugs/


5¡¢ºÚ¿ÍÔÚGitHub´æ´¢¿âÖй«¿ªCobalt StrikeÔ´´úÂë


5.jpg


ºÚ¿ÍÔÚGitHub´æ´¢¿âÖй«¿ªCobalt Strike¹¤¾ß°üµÄÔ´´úÂë¡£¡£Cobalt StrikeÊǺϷ¨µÄÉøÈë²âÊÔ¹¤¾ß°ü £¬£¬£¬¿ÉÔÚÖ¸±êÉ豸Éϲ¿ÊðÐÅ±ê £¬£¬£¬À´Ô¶³Ì´´½¨Shell²¢Ö´ÐÐPowerShell¾ç±¾¡£¡£Ó¢Ìضû×êÑÐÈËÔ±Éó²éÔ´´úÂëºóÒÔΪJava´úÂëÊÇÊÖ¶¯·´±àÒëµÄ £¬£¬£¬ºÚ¿ÍÐÞ¸´ÁËËùÓÐÒÀÀµ¹ØÏµ²¢É¾³ýÁËÐí¿ÉÖ¤²é³­ £¬£¬£¬ÒÔ±ã¶ÔÆä½øÐбàÒë¡£¡£×Ô°ä²¼ÒÔÀ´ £¬£¬£¬¸Ã´æ´¢¿âÒѱ»forked 172´Î £¬£¬£¬ÕâʹµÃÔ´´úÂëµÄ´«²¼Ô½·¢ÄÑÒÔ½ÚÖÆ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike-toolkit-shared-online/