΢ÈíÐû²¼Õë¶ÔSMBv3Îó²îµÄKB4551762Çå¾²¸üУ»£»?ºÉÀ¼Õþ¸®É¥Ê§Áè¼Ý690ÍòÆ÷¹Ùļ¾èÕßÊý¾Ý

Ðû²¼Ê±¼ä 2020-03-13

1.΢ÈíÐû²¼Õë¶ÔSMBv3Îó²îµÄKB4551762Çå¾²¸üÐÂ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


΢Èí½ñÌìÔçЩʱ¼äÐû²¼ÁËÕë¶ÔSMBv3 RCEÎó²î£¨CVE-2020-0796£©µÄ²¹¶¡¸üУ¨KB4551762£©£¬£¬£¬£¬ £¬Óû§¿ÉÒÔͨ¹ýWindows Update¼ì²é¸üлò´Ó΢Èí²¹¶¡Ä¿Â¼£¨https://www.catalog.update.microsoft.com/Search.aspx?q=KB4551762£©ÉÏÊÖ¶¯ÏÂÔØÊʺÏ×Ô¼ºWindows°æ±¾µÄKB4551762¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖËäȻûÓз¢Ã÷ʹÓôËÎó²îµÄ¹¥»÷£¬£¬£¬£¬ £¬µ«½¨ÒéÓû§ÓÅÏÈ×°Öô˸üС£¡£¡£¡£¡£´ËÎó²îÒ²±»³ÆÎªSMBGhost»òEternalDarkness£¬£¬£¬£¬ £¬½öÓ°ÏìÔËÐÐWindows 10°æ±¾1903ºÍ1909ÒÔ¼°Windows Server Server Core×°Öð汾1903ºÍ1909µÄ×°±¸¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-releases-kb4551762-security-update-for-smbv3-vulnerability/


2.Turla APTÐÂË®¿Ó¹¥»÷£¬£¬£¬£¬ £¬Ê¹ÓÃкóÃÅÕë¶ÔÑÇÃÀÄáÑÇ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ESETÑо¿Ö°Ô±·¢Ã÷¶íÂÞ˹ºÚ¿ÍÍÅ»ïTurla APTµÄÐÂË®¿Ó¹¥»÷£¬£¬£¬£¬ £¬¸Ã¹¥»÷ÖÁÉÙ´Ó2019ÄêÍ·×îÏÈ£¬£¬£¬£¬ £¬ÖÁÉÙÓÐËĸöÑÇÃÀÄáÑÇÍøÕ¾Êܵ½Ñ¬È¾£¬£¬£¬£¬ £¬°üÀ¨¶íÂÞ˹ÑÇÃÀÄáÑÇ´óʹ¹ÝÁìÊ´¦£¨armconsul[.]ru£©¡¢Artsakh¹²ºÍ¹ú×ÔÈ»±£»£»¤ºÍ×ÔÈ»×ÊÔ´²¿£¨mnp.nkr[.]am£©¡¢ÑÇÃÀÄáÑǹú¼ÊºÍÇå¾²ÊÂÎñÑо¿Ëù£¨aiisa[.]am£©ºÍÑÇÃÀÄáÑÇ´æ¿îµ£±£»£»ù½ð£¨adgf[.]am£©¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÐéαµÄAdobe Flash¸üзַ¢Á½¸öеĶñÒâÈí¼þ£¬£¬£¬£¬ £¬°üÀ¨¶ñÒâÈí¼þÊÍ·ÅÆ÷NetFlashºÍľÂíPyFlash¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/03/12/tracking-turla-new-backdoor-armenian-watering-holes/


3.Operation Overtrap¹¥»÷»î¶¯£¬£¬£¬£¬ £¬Õë¶ÔÈÕ±¾ÒøÐÐÓû§


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ç÷ÊÆ¿Æ¼¼·¢Ã÷Õë¶ÔÈÕ±¾ÒøÐÐÓû§µÄй¥»÷»î¶¯¡°Operation Overtrap¡±£¬£¬£¬£¬ £¬¸Ã»î¶¯×Ô2019Äê4ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬ £¬²¢ÇÒʹÓÃÈýÖÖ²î±ðµÄ¹¥»÷ǰÑÔÀ´ÇÔÈ¡Êܺ¦ÕßµÄÒøÐÐÆ¾Ö¤£ºÍ¨¹ýÀ¬»øÓʼþ·¢ËÍαװ³ÉÒøÐÐÍøÕ¾µÄ´¹ÂÚÁ´½Ó£»£»Í¨¹ýÀ¬»øÓʼþÒªÇóÊܺ¦Õß´ÓÁ´½ÓµÄÍøÕ¾ÉÏÏÂÔØ¶ñÒâÈí¼þµÄ¿ÉÖ´ÐÐÎļþ£»£»Í¨¹ý¶¨ÖƵÄÎó²îʹÓù¤¾ß°ü£¨BottleEK£©Èö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¹¥»÷ÕßÖ÷ҪʹÓõĶñÒâÈí¼þÊÇÐÂÒøÐÐľÂíCinobi¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/operation-overtrap-targets-japanese-online-banking-users-via-bottle-exploit-kit-and-brand-new-cinobi-banking-trojan/


4.ºÏÇڿƼ¼ÍøÂçÖÎÀíÈí¼þ16¸öÎó²î£¬£¬£¬£¬ £¬³§ÉÌÉÐδÐÞ¸´


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾



Ñо¿Ö°Ô±ÔÚºÏÇڿƼ¼£¨Zyxel£©µÄÍøÂçÖÎÀíÈí¼þCloudCNM SecuManagerÖз¢Ã÷16¸öÇå¾²Îó²î£¬£¬£¬£¬ £¬ÕâЩÎó²î°üÀ¨¶à¸öºóÃźÍÓ²±àÂëµÄĬÈÏÆ¾Ö¤¡¢ÃÜÔ¿µÈ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÊÜÓ°ÏìµÄ°æ±¾°üÀ¨CloudCNM SecuManager 3.1.0ºÍ3.1.1£¬£¬£¬£¬ £¬¶øËüÃǵÄ×îиüÐÂÈÕÆÚΪ2018Äê11Ô¡£¡£¡£¡£¡£Zyxel Gateway SBUµÄ¸ß¼¶¸±×ܲÃNathan YenÌåÏָù«Ë¾ÏÖÔÚÒÑÒâʶµ½ÎÊÌ⣬£¬£¬£¬ £¬²¢ÕýÔÚÆð¾¢Ñ¸ËÙÐÞ¸´Îó²î¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/flaws-zyxels-network-management-software/153554/


5.AvastɱÈíÔÚÆØ³öÑÏÖØÎó²îºó½ûÓÃJavaScriptɨÃèÒýÇæ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¹È¸èÇå¾²Ñо¿Ö°Ô±Ëþά˹¡¤°ÂÂüµÏ£¨Tavis Ormandy£©·¢Ã÷Avastɱ¶¾Èí¼þ±£´æÎó²î£¬£¬£¬£¬ £¬¿ÉÔÊÐíºÚ¿ÍÔÚÓû§ÅÌËã»úÉÏÔ¶³ÌÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£AvastÔÚÒ»ÖÜǰ¾Í½Óµ½Á˸ÃÎó²îµÄ±¨¸æ£¬£¬£¬£¬ £¬µ«ÈÔδ½â¾ö¸ÃÎÊÌ⣬£¬£¬£¬ £¬¸Ã¹«Ë¾¾öÒéÔÝʱ½ûÓÃɱÈíÖеÄJavaScriptɨÃèÒýÇæ¡£¡£¡£¡£¡£OrmandyÌåÏÖ¸ÃÎó²îºÜÈÝÒ×±»Ê¹Ó㬣¬£¬£¬ £¬¹¥»÷ÕßÖ»Ðèͨ¹ýµç×ÓÓʼþ·¢ËͶñÒâJavaScript»òWSHÎļþ£¬£¬£¬£¬ £¬»òÓÕʹÓû§·­¿ª°üÀ¨¶ñÒâJavaScriptµÄÎļþ£¬£¬£¬£¬ £¬¼´¿ÉÒÔϵͳ¼¶»á¼ûȨÏÞÖ´ÐжñÒâ²Ù×÷£¬£¬£¬£¬ £¬ÀýÈç×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/avast-disables-javascript-engine-in-its-antivirus-following-major-bug/


6.ºÉÀ¼Õþ¸®É¥Ê§Áè¼Ý690ÍòÆ÷¹Ùļ¾èÕßÊý¾Ý£¬£¬£¬£¬ £¬Õ¼×ÜÉú³Ý½üÒ»°ë


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ºÉÀ¼Õþ¸®ÌåÏÖɥʧÁËÁ½¸ö´æÓÐ690ÍòÆ÷¹Ù¾èÔùÕßÊý¾ÝµÄÓ²ÅÌ£¬£¬£¬£¬ £¬ÕâЩÊý¾ÝÊÇ1998Äê2ÔÂÖÁ2010Äê6ÔÂʱ´úÏòºÉÀ¼¾èÔùÕ߹ҺŴ¦Ìá½»µÄËùÓоèÔùÕß±í¸ñµÄ±¸·Ý¡£¡£¡£¡£¡£ÕâЩӲÅ̵Ä×îºóʹÓÃʱ¼äÊÇ2016Ä꣬£¬£¬£¬ £¬ËæºóËüÃDZ»°²ÅÅÔÚÒ»¸öÇå¾²µÄ±£¹Ü¿âÖС£¡£¡£¡£¡£µ«ÔÚ½ñÄêÔçЩʱ¼äÕþ¸®·¢Ã÷Ó²ÅÌɥʧ£¬£¬£¬£¬ £¬²¢ÇÒÏÖÔÚÈÔÈ»ÎÞ·¨ÕÒµ½¡£¡£¡£¡£¡£Ó²ÅÌÖд洢µÄÐÅÏ¢°üÀ¨×¢²á¾èÔùÕßµÄÐÕÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢µØµã¡¢Æ÷¹Ù¾èÔùµÄÑ¡Ôñ¡¢IDÒÔ¼°ÊðÃû¡£¡£¡£¡£¡£ºÉÀ¼µÄ×ÜÉú³ÝΪ1740Íò×óÓÒ£¬£¬£¬£¬ £¬ÆäÖнüÒ»°ë±»ÒÔΪÊÇ×¢²á¾èÔùÕß¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/dutch-government-loses-hard-drives-with-data-of-6-9-million-registered-donors/