Samba°²È«¸üУ¬½¨¸´Á½¸ö¿Éµ¼ÖÂDoSµÄ·ì϶£»¼ÓÄôó½ðÈÚ»ú¹¹Desjardinsй¶Լ290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢

°ä²¼¹¦·ò 2019-06-21
1.Samba°²È«¸üУ¬½¨¸´Á½¸ö¿Éµ¼ÖÂDoSµÄ·ì϶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


SambaÍŶӰ䲼°²È«¸üУ¬½¨¸´Á½¸ö·ì϶ ¡£µÚÒ»¸ö·ì϶£¨CVE-2019-12435£©ÊÇÒ»¸ö¿ÕÖ¸Õë½âÒýÓÃÎÊÌ⣬ӰÏìSamba°æ±¾4.9ºÍ4.10£¬³É¹¦ÀûÓô˷ì϶¿Éµ¼ÖÂDNSÖÎÀí·þÎñÆ÷³öÏֻؾø·þÎñ ¡£µÚ¶þ¸ö·ì϶£¨CVE-2019-12436£©Ó°ÏìÁËv4.10ÆðÍ·µÄËùÓÐSamba°æ±¾£¬¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔÚ·ÖÒ³ËÑË÷¿Ø¼þÖÐͨ¹ý¿ÕÖ¸Õë½âÒýÓÃÀ´±ÀÀ£LDAP·þÎñÆ÷¹ý³Ì ¡£

   

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/samba-releases-security-updates-to-address-two-vulnerabilities-0f9c2ad6

2.˼¿Æ½¨¸´SD-WAN¡¢RV·ÓÉÆ÷µÈ¶à¸ö²úÆ·Öеݲȫ·ì϶

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


˼¿ÆÕë¶ÔSD-WAN¡¢Êý×ÖÍøÂç¼Ü¹¹£¨DNA£©ÖÐÐÄ¡¢TelePresence¡¢StarOS¡¢RV·ÓÉÆ÷¡¢Prime Service CatalogºÍMeeting ServerµÈ²úÆ·°ä²¼°²È«¸üУ¬½¨¸´¶à¸ö·ì϶ ¡£ÑϳÁµÄ·ì϶Ô̺¬DNAÖÐÐÄÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2019-1848£¬CVSS 9.3·Ö£©¡¢SD-WANºÅÁîÐнçÃæÖеı¾µØÌáȨ·ì϶£¨CVE-2019-1625£¬CVSS 7.8·Ö£©ÒÔ¼°¶à¸öRV·ÓÉÆ÷ÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-1663£¬CVSS 9.8·Ö£©µÈ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/critical-vulnerabilities-patched-cisco-sd-wan-dna-center-products

3.APT¼¶ºÚ³ÔºÚ£¬¶íÂÞ˹Turla APT¹¥»÷ÒÁÀÊAPT34

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

ƾ¾ÝÈüÃÅÌú¿ËµÄ»ã±¨£¬¶íÂÞ˹Turla APTÔÚ2017ÄêÈëÇÖÁËÒÁÀÊAPT34µÄ»ù´¡ÉèÊ©£¬²¢ÀûÓÃÆäC£¦C·þÎñÆ÷ʹÓÃ×Ô¼ºµÄ¶ñÒâÈí¼þ¶þ´ÎϰȾAPT34µÄÊܺ¦Õß ¡£×êÑÐÈËÔ±ÓÚ2018Äê1ÔÂ11Èչ۲쵽¸ÃÈëÇֻµÄÊ׸öÖ¤¾Ý£¬ÆäʱTurlaÏòAPT34µÄÊܺ¦Õß¿ªÊÍÁËÒ»¸ö¶ñÒ⹤¾ß£¨ÃûΪmsfgi.exeµÄ¹¤×÷µ÷¶È·¨Ê½£© ¡£TurlaÔÚ¸ÃÍøÂçÉϵĻһÏò³ÖÐøµ½2018Äê9Ô£¬µ«APT34ËÆºõûÓз¢ÏÖ¸ÃÈëÇÖ£¬Ã»ÓÐÖ¤¾ÝÅú×¢APT34×ö³öÁËÈκη´Ó³ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russian-apt-hacked-iranian-apts-infrastructure-back-in-2017/

4.Õë¶ÔµÂ¹úµÄ´ó¹æÄ£´¹µö¹¥»÷£¬ÖØÒª·Ö·¢Ô¶¿ØÄ¾ÂíRemcos

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Check Point×êÑÐÈËÔ±·¢ÏÖÒ»¸öÕë¶ÔµÂ¹úËùÓÐÐÐÒµµÄдó¹æÄ£ÍøÂç´¹µö»î¶¯£¬¹¥»÷ÕßµÄÖ¸±êÊÇÔÚÊܺ¦ÕßµÄÍÆËã»úÉÏ×°ÖÃÔ¶¿ØÄ¾ÂíRemcos ¡£¸Ã»î¶¯µÄ³õʼ¹¥»÷ÏòÁ¿ÊÇ´¹µöÓʼþ£¬¹¥»÷Õß¼Ù×°³ÉµÂ¹ú¸÷µØµÄºÏ·¨¹«Ë¾£¬ÏòÖ¸±êÆóÒµ·¢ËÍÔ̺¬·¢Æ±»ò´¹Î£¶©µ¥µÄ´¹µöÓʼþ£¬×îÖÕ·Ö·¢Remcos ¡£ÔÚÓëC&CµÄͨѶÖУ¬¹¥»÷Õß»¹Ê¹ÓÃDDNS£¨¶¯Ì¬DNS£©¼¼ÊõÀ´°µ²ØÆä×ÙÓ° ¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2019/06/19/sandblast-agent-phishing-germany-campaign-security-hack-ransomware/

5.жñÒâÍÚ¿óÈí¼þ£¬Ôö³¤cron´òË㹤×÷ʵÏÖÓÆ¾ÃÐÔ»úÔì


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Sucuri°²È«×êÑÐÈËÔ±Luke Leal·¢ÏÖÒ»¸öеĶñÒâÍÚ¿óÈí¼þͨ¹ýÔö³¤cron´òË㹤×÷À´ÊµÏÖÓÆ¾ÃÐÔ»úÔ죬ÒÔ±ãÔÚ±»É¾³ýºó³ÁÐÂϰȾָ±ê»úе ¡£¹¥»÷Õßͨ¹ýÃûΪcr2.shµÄ¶ñÒâBash½ÅÕý±¾Ï°È¾Web·þÎñÆ÷£¬¸Ã¹¥»÷»î¶¯µÄ³õʼϰȾ¼¿Á©Î´Öª ¡£cr2.sh»áɱËÀÓëÍÚ¿óÓйصĹý³Ì£¬ÀýÈçxmrigºÍcryptonight£¬²¢Í¨¹ýC&CÏÂÔØÍÚ¿ópayload ¡£¸Ã¶ñÒâÈí¼þͨ¹ý´´½¨Ã¿·ÖÖÓÔËÐÐÒ»´ÎµÄcron×÷Ò·´»ñµÃÓÆ¾ÃÐÔ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cryptominer-uses-cron-to-reinfect-linux-host-after-removal/

6.¼ÓÄôó½ðÈÚ»ú¹¹Desjardinsй¶Լ290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


DesjardinsÊDZ±ÃÀµØÓò×î´óµÄÐÅÓþÉ磬ҲÊǼÓÄôó×î´óµÄºÏ×÷½ðÈÚ¼¯ÍÅ ¡£Æ¾¾Ý¸Ã¹«Ë¾µÄÐÂΟ壬Լ290Íò»áÔ±µÄÃô¸ÐÐÅÏ¢ÔÚÔ±¹¤Î´¾­ÊÚȨÏò¹«Ë¾±í²¿ÈËÔ±Åû¶ºóй¶£¬ÆäÖÐÔ̺¬270ÍòÃûÓ×ÎÒ»áÔ±ºÍ17.3ÍòÆóÒµ»áÔ± ¡£DesjardinsÓÚ2019Äê6ÔÂ14ÈÕ·¢ÏÖй¶ÊÂÎñ£¬Ð¹Â¶µÄÐÅÏ¢Ô̺¬Ó×ÎÒ»áÔ±µÄÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Éç»á±£ÏÕºÅÂë¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·ÒÔ¼°ÒøÐкÍDesjardins²úÆ·µÄ¾ßÌåÐÅÏ¢£»ÆóÒµ»áÔ±µÄ¹«Ë¾Ãû³Æ¡¢µØÖ·¡¢µç»°ºÅÂë¡¢ËùÓÐÕßÐÕÃûºÍAcc¨¨sDAffairesÕÊ»§Ãû³ÆÒÔ¼°ÓëAcc¨¨sDAffairesÕÊ»§ÓйصÄһЩÓ×ÎÒÐÅÏ¢ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/desjardins-group-data-leak-exposes-info-of-29-million-members/