CISAÐû²¼SolarWinds Orion¹¥»÷ÊÂÎñµÄÔö²¹Ö¸ÄÏ£»£»£»£»£»£»Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄ¸ùÖ¤Êé
Ðû²¼Ê±¼ä 2020-12-22
CISA×î³õÓÚ12ÔÂ17ÈÕÐû²¼ÁËÓйØÕþ¸®»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ºÍ¹«Ë¾×éÖ¯µÄAPT¹¥»÷»î¶¯µÄ¾¯±¨£¬£¬£¬£¬£¬£¬£¬Ö®ºóÕë¶Ô¸Ã½ôÆÈÖ¸ÁîÐû²¼ÁËÔö²¹Ö¸ÄÏ¡£¡£¡£¡£¡£¡£¡£Ôö²¹Ö¸ÄϰüÀ¨ÊÜÓ°Ïì°æ±¾µÄ¸üС¢Õë¶ÔʹÓõÚÈý·½Ð§ÀÍÌṩÉ̵ÄÊðÀíµÄÖ¸ÄÏÒÔ¼°¶ÔËùÐè²½·¥µÄ½øÒ»²½ËµÃ÷¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬CISA»¹¸üÐÂÁ˸þ¯±¨£¬£¬£¬£¬£¬£¬£¬ÌṩÁËÐµĻº½â¼Æ»®²¢ÐÞ¶©ÁËIOC±í¸ñ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/12/19/cisa-updates-alert-and-releases-supplemental-guidance-emergency
2.ÏãÁϹ«Ë¾SymriseѬȾClop£¬£¬£¬£¬£¬£¬£¬500GBδ¼ÓÃܵÄÎļþ±»µÁ

Ï㾫ÏãÁϹ«Ë¾SymriseѬȾÀÕË÷Èí¼þClop£¬£¬£¬£¬£¬£¬£¬500GBδ¼ÓÃܵÄÎļþ±»µÁ£¬£¬£¬£¬£¬£¬£¬½ü1000̨װ±¸±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£¡£SymriseÊÇÈ«ÇòÁè¼Ý3ÍòÖÖ²úÆ·£¨°üÀ¨È¸³²ºÍÊʿڿÉÀÖ£©ÖÐʹÓõÄÏ㾫ÏãÁϵÄÖ÷Òª¿ª·¢ÉÌ£¬£¬£¬£¬£¬£¬£¬ÓÚÉÏÖÜÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢¹Ø±ÕÁËËùÓÐÐëÒªµÄϵͳÒÔ±ÜÃâ¹¥»÷ÉìÕÅ¡£¡£¡£¡£¡£¡£¡£ClopÍÅ»ïÉù³ÆÆäͨ¹ý´¹ÂÚ¹¥»÷ÈëÇÖÁËSymriseµÄÍøÂç²¢ÇÔÈ¡ÁË500 GBµÄδ¼ÓÃÜÎļþ£¬£¬£¬£¬£¬£¬£¬ÆäÔÚÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû²¼µÄ½ØÍ¼ÏÔʾ±»µÁÊý¾Ý°üÀ¨»¤ÕÕ¡¢»á¼ÆÆ¾Ö¤¡¢É󼯱¨¸æ¡¢»¯×±Æ·ÒòËØºÍµç×ÓÓʼþµÈ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/flavors-designer-symrise-halts-production-after-clop-ransomware-attack/
3.ClearSky³ÆÒÁÀʺڿÍʹÓÃPay2KeyÃé×¼ÒÔÉ«ÁеĹ«Ë¾

ÍþвÇ鱨¹«Ë¾ClearSky³ÆÒÁÀʺڿÍʹÓÃPay2KeyÃé×¼ÒÔÉ«ÁеĹ«Ë¾¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯±¬·¢ÓÚ2020Äê11Ôµ½12Ô£¬£¬£¬£¬£¬£¬£¬»òÓëÒÁÀʺڿÍ×éÖ¯Fox KittenÓйء£¡£¡£¡£¡£¡£¡£Fox KittenÉÆÓÚʹÓÃÖÖÖÖ¿ªÔ´ºÍ×ÔÖ÷¿ª·¢µÄ¹¥»÷¹¤¾ß£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÄ¿µÄÆóÒµµÄvpnÒÔ¼°F5 NetworksµÄBIG-IPÓ¦ÓóÌÐò½»¸¶¿ØÖÆÆ÷(ADC)ÈëÇÖ¡£¡£¡£¡£¡£¡£¡£ClearSky³ÆºÚ¿ÍÕë¶ÔÒÔÉ«ÁÐÊýÊ®¼Ò¹¤Òµ¡¢°ü¹ÜºÍÎïÁ÷¹«Ë¾£¬£¬£¬£¬£¬£¬£¬À´×°ÖÃÀÕË÷Èí¼þÀ´¼ÓÃÜЧÀÍÆ÷ºÍÊÂÇéÕ¾£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ìᳫ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/iranian-hackers-target-israeli-companies-pay2key-ransomware
4.Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄ¸ùÖ¤Êé

Æ»¹û¡¢¹È¸è¡¢Î¢ÈíºÍMozilla½ûÓùþÈø¿Ë˹̹µÄMitM HTTPSÖ¤Êé¡£¡£¡£¡£¡£¡£¡£¸ÃÖ¤Êé×Ô2020Äê12ÔÂ6ÈÕ×îÏÈʹÓ㬣¬£¬£¬£¬£¬£¬¹þÈø¿Ë˹̹Õþ¸®Ç¿ÖÆ×°Öô˸ùÖ¤ÊéÒÔ×èµ²ºÍ¼àÊӸùúÊ×¶¼Å¬¶ûËÕµ¤×¡ÃñµÄHTTPSÁ÷Á¿¡£¡£¡£¡£¡£¡£¡£´Ë½ûÁîÐû²¼ºó£¬£¬£¬£¬£¬£¬£¬×ÝÈ»Óû§ÒÑ×°ÖÃÖ¤Ê飬£¬£¬£¬£¬£¬£¬ÈÔÎÞ·¨»á¼ûChrome¡¢Edge¡¢MozillaºÍSafariµÈä¯ÀÀÆ÷£¬£¬£¬£¬£¬£¬£¬´Ó¶ø×èÖ¹¹þÈø¿Ë˹̹¹ÙÔ±×èµ²Óû§Êý¾Ý¡£¡£¡£¡£¡£¡£¡£ÕâÊÇËļҳ§É̵ڶþ´Î½ûÓùþÈø¿Ë˹̹Õþ¸®Ç¿ÖÆ×°ÖõÄMitM HTTPSÖ¤Êé¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/apple-google-microsoft-and-mozilla-ban-kazakhstans-mitm-https-certificate/
5.Dell Wyse Thin¿Í»§¶Ë±£´æÁ½¸ö´úÂëÖ´ÐÐÎó²î

Dell Wyse Thin¿Í»§¶Ë±£´æÁ½¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬£¬CVSSÑÏÖØÐÔÆÀ·Ö¾ùΪ10¡£¡£¡£¡£¡£¡£¡£ÆäÖÐÒ»¸öÎó²î±»×·×ÙΪCVE-2020-29491£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ°´ÆÚpingЧÀÍÆ÷ÒÔ»ñÈ¡×îÐÂÉèÖ㬣¬£¬£¬£¬£¬£¬²¢ÎÞÐèÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬Òò´ËËùÓÐÈ˶¼¿É»á¼ûÕâЩ¿ÉÄܰüÀ¨Ô¶³Ì»á¼ûƾ֤µÄÉèÖÃÎļþ¡£¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²î±»×·×ÙΪCVE-2020-29492£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ´æ´¢ÕâЩÉèÖõÄЧÀÍÆ÷ÔÊÐí¶ÔÆäÉèÖÃÎļþ¾ÙÐжÁд»á¼û£¬£¬£¬£¬£¬£¬£¬Òò´ËÈκÎÈ˶¼¿ÉÒÔʹÓÃFTP¶ÁÈ¡ºÍ¸ü¸ÄËüÃÇ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²îÒѾ±»ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-bugs-dell-wyse-thin-clients/162452/
6.VerizonÐû²¼2020ÄêÊý¾Ýй¶µÄÊÓ²ìÆÊÎö±¨¸æ

VerizonÐû²¼ÁË2020ÄêÊý¾Ýй¶µÄÊÓ²ìÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬×ܹ²ÆÊÎöÁË157525ÆðÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Éæ¼°µ½16¸ö±ÊÖ±ÐÐÒµ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÔÚµ¼ÖÂÊý¾Ýй¶µÄ¹¥»÷·½·¨ÖУ¬£¬£¬£¬£¬£¬£¬ÍøÂç´¹ÂÚ¡¢Ê¹Óñ»µÁƾ֤ºÍÉèÖùýʧµÄÕ¼±È×î´ó£¬£¬£¬£¬£¬£¬£¬¶øµ¼ÖÂÊý¾Ýй¶×î¶àµÄ¶ñÒâÈí¼þÀàÐÍΪÃÜÂëת´¢³ÌÐò¡¢´¹ÂÚµç×ÓÓʼþºÍÖ±½Ó×°ÖÃÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬2020ÄêÓÐÁè¼Ý80%µÄºÚ¿ÍÈëÇÖ»î¶¯Éæ¼°µ½±©Á¦¹¥»÷»òʹÓÃɥʧºÍ±»µÁµÄƾ֤¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://enterprise.verizon.com/resources/reports/dbir/2020/introduction/


¾©¹«Íø°²±¸11010802024551ºÅ