΢ÈíÐû²¼Îó²î²¹¶¡ÐÞ¸´111¸öÎó²î£»£»£»£»£»Thunderbolt±£´æÎó²îÓ°ÏìÊý°ÙÍò×°±¸

Ðû²¼Ê±¼ä 2020-05-13

1.΢ÈíÐû²¼Îó²î²¹¶ ¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´12¿î²úÆ·ÖÐ111¸öÎó²î


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


5ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼ÁË5Ô·ÝÎó²î²¹¶ ¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËEdge¡¢Windows¡¢Visual StudioÒÔ¼°.NET FrameworkϵÄ12¿î²úÆ·ÖеÄ111¸öÎó²î ¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪMicrosoft SharePointÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1023¡¢CVE-2020-1024ºÍCVE-2020-1102£©¡¢Windows OSÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1067£©¡¢MSHTMLÒýÇæÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1064£©¡¢Microsoft Edge PDFÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-109£©ºÍJetÊý¾Ý¿âÒýÇæÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1051£¬£¬£¬£¬£¬£¬£¬CVE-2020-1174£¬£¬£¬£¬£¬£¬£¬CVE-2020-1175ºÍCVE-2020-1176£© ¡£¡£¡£¡£¡£±¾ÔÂÐû²¼µÄÊÇ΢ÈíÀúÊ·ÉϵÚÈý´óµÄ²¹¶¡³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÁíÍâÁ½´Î»®·ÖÊÇÔÚ2020Äê3ÔºÍ2020Äê4Ô£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁË115ºÍ113¸ö¹ýʧ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-may-2020-patch-tuesday-fixes-111-vulnerabilities/


2.Thunderbolt±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬»ò½«Ó°ÏìÊý°ÙÍò×°±¸


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


°£Òò»ôοƼ¼´óѧµÄÑо¿ÍŶÓÔÚÓ¢ÌØ¶ûµÄThunderbolt¶Ë¿ÚÖз¢Ã÷ÁË7¸öÎó²î£¬£¬£¬£¬£¬£¬£¬²¢Ä£ÄâÁË9ÖÖ¹¥»÷³¡¾°£¬£¬£¬£¬£¬£¬£¬¾ßÓÐÎïÆÊÎö¼ûȨÏ޵Ĺ¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²î»á¼ûºÍ͵ȡÊý¾Ý ¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½öÐèÒªÎïÆÊÎö¼ûÆôÓÃÁËThunderboltµÄWindows»òLinuxϵͳ±ã¿ÉÒÔʵÏÖ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ²»»áÁôÏ»ºÛ¼£Ò²²»ÐèÒªÓëÓû§½»»¥ ¡£¡£¡£¡£¡£×ÝÈ»Óû§ÔÚÍÑÀëʱÒѾ­Ëø¶¨»ò¹ÒÆðÅÌËã»ú£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÆôÓÃÁËÇå¾²Æô¶¯ºÍͨÅ̼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÒÀÈ»¿ÉÒÔʵÏÖ ¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁË2019ÄêÖ®Ç°ÖÆÔìµÄÊý°ÙÍòWindowsºÍLinux×°±¸ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/endpoint/thunderbolt-vulnerabilities-could-threaten-millions-of-pcs/d/d-id/1337789


3.ATMÖÆÔìÉÌDiebold NixdorfѬȾÀÕË÷²¡¶¾£¬£¬£¬£¬£¬£¬£¬ÏµÍ³ÖÐÖ¹


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


¶íÖÝATMÖÆÔìÉÌDiebold NixdorfÓÚ4ÔÂ25ÈÕÍíÉÏ·¢Ã÷Æä¹«Ë¾ÍøÂçÒì³££¬£¬£¬£¬£¬£¬£¬²¢ÏÓÒÉÊÇÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Á¬Ã¦¶Ï¿ªÁ˸ÃÍøÂçÉϵÄϵͳÒÔ×èÖ¹¶ñÒâÈí¼þµÄÈö²¥ ¡£¡£¡£¡£¡£DieboldÌåÏָô˹¥»÷Ö»ÊÇÓ°ÏìÁËÍøÂçºÍITϵͳ£¬£¬£¬£¬£¬£¬£¬µ«²¢Î´Ó°Ïì¿Í»§»ò¹«ÖÚ ¡£¡£¡£¡£¡£Æ¾Ö¤ÉîÈëÊӲ죬£¬£¬£¬£¬£¬£¬¸ÃÀÕË÷²¡¶¾ÎªProLock£¬£¬£¬£¬£¬£¬£¬ÔÚ3Ô·ÝҲѬȾÁËÒÁÀûŵÒÁÖÝÀ­Èø¶ûÏØµÄϵͳ ¡£¡£¡£¡£¡£BleepingComputerµÄLawrence Abrams˵£¬£¬£¬£¬£¬£¬£¬ProLockÒªÇóµÄÊê½ðͨ³£ÔÚ6λÊý£¬£¬£¬£¬£¬£¬£¬´Ó17.5ÍòÃÀÔªµ½66ÍòÃÀÔª²»µÈ ¡£¡£¡£¡£¡£¶øDieboldÌåÏÖËü²¢Ã»ÓÐÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ²»»áÌÖÂÛÊê½ð½ð¶î ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://krebsonsecurity.com/2020/05/ransomware-hit-atm-giant-diebold-nixdorf/


4.ÃÀ¹ú¹«Ë¾Pitney BowesÔÙÔâÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÎªMazeÌᳫ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÃÀ¹ú¹«Ë¾Pitney BowesÔÚ7¸öÔÂÄÚÓÖÔâµ½Á˵ڶþ´ÎÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ΪMazeÍÅ»ïÌᳫ ¡£¡£¡£¡£¡£MazeÍÅ»ïÔÚÍøÉÏÐû²¼ÁË11ÕŸù«Ë¾ÅÌËã»úÍøÂçÄÚ²¿Ä¿Â¼ÁбíµÄ½ØÍ¼£¬£¬£¬£¬£¬£¬£¬ÒÔ֤ʵËûÃǹ¥»÷ÀÖ³É ¡£¡£¡£¡£¡£Pitney Bowes½²»°ÈËÌåÏÖÏÖÔÚÕýÔÚÊÓ²ì´Ë´Î¹¥»÷µÄ¹æÄ££¬£¬£¬£¬£¬£¬£¬ÌØÊâÊDZ»µÁÊý¾ÝÀàÐÍ ¡£¡£¡£¡£¡£2019Äê10ÔÂPitney BowesÊ×´ÎÔâµ½RyukÍÅ»ïÌᳫµÄÀÕË÷²¡¶¾¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñµ¼ÖÂijЩ°ü¹ü¸ú×Ùϵͳͣ»£»£»£»£»ú ¡£¡£¡£¡£¡£RyukºÍMazeÍŻﶼÊÇʹÓÃÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«²î±ðµÄÊÇMazeÉÐÓÐÒ»¸öÍøÕ¾£¬£¬£¬£¬£¬£¬£¬²¢»áÔÚÊܺ¦Õ߾ܸ¶Êê½ðºóÔÚ¸ÃÍøÕ¾Ð¹Â¶Æä±»µÁÊý¾Ý ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/package-delivery-giant-pitney-bowes-confirms-second-ransomware-attack-in-7-months/


5.ºÚ¿ÍÂÛ̳WeLeakData.comÊý¾Ý¿â±»µÁ£¬£¬£¬£¬£¬£¬£¬ÂÛ̳ÐÅϢй¶


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ºÚ¿ÍÂÛ̳WeLeakData.comµÄÊý¾Ý¿â±»µÁÇÒ±»·ÅÔÚ°µÍø³öÊÛ£¬£¬£¬£¬£¬£¬£¬Ê¹¸ÃÍøÕ¾ºÚ¿ÍµÄÐÅÏ¢ºÍ˽϶Ի°Ð¹Â¶ ¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂçÇ鱨¹«Ë¾CybleÐû²¼µÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬WeLeakData.comµÄvBulletinÂÛ̳Êý¾Ý¿âй¶ÊÇÔÚ2020Äê1ÔÂ9ÈÕ×îÏȵ쬣¬£¬£¬£¬£¬£¬ÏÖÒÑÔÚ°µÍøÊг¡ÉϳöÊÛ ¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Óû§µÇ¼Ãû¡¢µç×ÓÓʼþµØµã¡¢¹þÏ£ÃÜÂëÒÔ¼°ËûÃǵÄIPµØµãÒÔ¼°Ë½ÈËÐÂÎÅ ¡£¡£¡£¡£¡£¹ØÓÚ¸ÃÍøÕ¾Óû§À´Ëµ´Ë´ÎÊÂÎñÖÁ¹ØÖ÷Òª£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÖ´·¨²¿·Ö¿ÉÒÔʹÓÃ×ß©µÄIPµØµãºÍµç×ÓÓʼþµØµãÀ´×·×ÙËûÃDz¢½«ÆäÓëÆäËû¹¥»÷Ïà¹ØÁª ¡£¡£¡£¡£¡£´Ë´Îй¶»¹¿ÉÒÔÈÃÑо¿Ö°Ô±ÏàʶÔõÑù¾ÙÐй¥»÷ ¡£¡£¡£¡£¡£CybleÏÖÔÚÒѽ«Ð¹Â¶Êý¾ÝÌí¼Óµ½ÆäÊý¾Ýй¶²éÕÒЧÀÍamibreached.comÖУ¬£¬£¬£¬£¬£¬£¬ÒÔ±ãÓû§¿ÉÒÔ¼ì²éÆäÐÅÏ¢ÊÇ·ñ×ß© ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-private-chats-leaked-in-stolen-weleakdata-database/


6.ÒøÐÐľÂíSphinx»Ø¹éÉý¼¶£¬£¬£¬£¬£¬£¬£¬ÒÔCOVID-19ΪÖ÷ÌâÕë¶ÔÃÀ¹ú


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÒøÐÐľÂíSphinxÉý¼¶²¢»Ø¹é£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃCOVID-19À¬»øÓʼþ×÷ΪÓÕ¶üÕë¶ÔÃÀ¹úÓû§£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÆäÔÚÏßÒøÐлỰÖлñÈ¡Óû§Æ¾Ö¤ºÍÆäËûСÎÒ˽¼ÒÐÅÏ¢ ¡£¡£¡£¡£¡£Ð°汾µÄSphinxµÄ¸Ä±äÖ÷ÒªÔÚ¶ñÒâ´úÂë×¢Èë·½·¨ºÍBotÉèÖÃÁ½·½Ãæ ¡£¡£¡£¡£¡£Sphinxͨ¹ýŲÓÃä¯ÀÀÆ÷º¯ÊýÖ²Èë´úÂ룬£¬£¬£¬£¬£¬£¬Ê×ÏÈËüŲÓÃCreateProcessAº¯ÊýÀ´½¨ÉèÒ»¸öÐÂÀú³Ì¼°ÆäÖ÷Ị̈߳¬£¬£¬£¬£¬£¬£¬È»ºóŲÓÃWriteProcessMemoryº¯ÊýÒÔ½«ÓÐÓøºÔØ×¢Èëmsiexec.exeÀú³Ì£¬£¬£¬£¬£¬£¬£¬×îºóʹÓÃGetThreadContextºÍSetThreadContextº¯Êý½«Ä¿µÄÀú³ÌµÄÖ´Ðеã¸ü¸ÄΪ´Ó×¢ÈëµÄÓÐÓøºÔØ ¡£¡£¡£¡£¡£¶øBotÉèÖÃÖиü¸ÄÁËC2µØµãºÍRC4ÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÖ¸ÎÆÊ¶±ðÒÔ±ãËæÊ±ÏòÆäÍÆË͸üР¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/sphinx-riddle-us-targets-modifications/155621/