¾ÅÓÎÀÏ¸ç¿Æ¼¼ÍþвÖܱ¨£¨2020.03.16~2020.0322£©
2020-03-23
Ò»¡¢Íþвͨ¸æ
- VMwareȨÏÞÌáÉýÎó²î¡¾Ðû²¼Ê±¼ä¡¿2020-03-18 20:00:00 GMT¡¾¸ÅÊö¡¿3ÔÂ17ÈÕ£¬VMware¹Ù·½Ðû²¼±àºÅΪVMSA-2020-0005µÄÇ徲ͨ¸æ£¬ÐÞ¸´Á˱£´æÓÚVMware Fusion£¬VMRC for Mac ºÍHorizon Client for MacÖеÄȨÏÞÌáÉýÎó²î£¨CVE-2020-3950£©£¬ÓÉÓÚVMware¹ýʧµÄʹÓÃÁËsetuid£¬¹¥»÷ÕßʹÓôËÎó²î¿É½«Ä¿µÄϵͳÖеÄͨË×Óû§È¨ÏÞÌáÉýÖÁÖÎÀíԱȨÏÞ¡£¡¾Á´½Ó¡¿http://blog.nsfocus.net/vmware-cve-2020-3950-0318/
¶þ¡¢ÈÈÃÅ×ÊѶ
- NetWireľÂí¿ØÖÆÕßͶ·ÅnCoV-19ÒßÇéÓÕ¶üÎĵµ¡¾¸ÅÊö¡¿½üÆÚ£¬¾ÅÓÎÀϸç·üӰʵÑéÊÒ·¢Ã÷£¬NetWireÔ¶¿ØÄ¾Âí¿ØÖÆÕßÒ²×îÏÈʹÓÃnCoV-19ÒßÇéÏà¹ØµÄÓÕ¶üÎĵµÀ´Í¶·ÅľÂí¡£NetWire£¬ÓÖ³ÆNetWireRC»òRecam£¬ÊÇÒ»¿î×îÔç·ºÆðÔÚ2012ÄêµÄÔ¶¿ØÄ¾Âí£¬Ôø±»ÄáÈÕÀûÑǵĺڿÍÓÃÓÚ¹¥»÷ÆóҵĿµÄ¡£¶àÄêÒÔÀ´£¬NetWireÒ»Ö±ÔÚ¸üа汾£¬²¢ÑÝ»¯³ö¶àÌõ²î±ðµÄ¹¥»÷Á´¡£¡¾²Î¿¼Á´½Ó¡¿http://blog.nsfocus.net/netwire-ncov-19-0318/
- IPv6ÎïÁªÍø×ʲú̻¶ÇéÐÎÑо¿¡¾¸ÅÊö¡¿Ëæ×ÅÎïÁªÍøÓ¦ÓõÄÅÉú³¤¡¢IPv4µØµãµÄºÄ¾¡£¬IPv6ÆÕ¼°ÒѳÉΪһ¶¨Ç÷ÊÆ¡£IPv6ÍøÂçÉÏ̻¶µÄÎïÁªÍø×ʲú½«³ÉΪ¹¥»÷ÕßµÄÖØµãÄ¿µÄ£¬ÒÔÊÇÄܹ»¶ÔIPv6×ʲúºÍ·þÎñ׼ȷµÄ²â»æ£¬¹ØÓÚÍøÂçÇå¾²¾ßÓÐ×ÅÖ÷ÒªµÄÒâÒå¡£¾ÅÓÎÀϸç¸ñÎïʵÑéÊÒÏÈÈݺ£ÄÚ¡¢ÐÂ¼ÓÆÂºÍÈÕ±¾µÄIPv4ÎïÁªÍø×ʲúµÄÏÖʵ̻¶ÇéÐΣ¬²¿·ÖµÄIPv6µØµã¼¯ÖеÄÎïÁªÍø×ʲú̻¶ÇéÐΡ£¡¾²Î¿¼Á´½Ó¡¿https://mp.weixin.qq.com/s/Bj6PRqcxDoYwmXStShvYOw
- UrsnifľÂíбäÖÖÕë¶ÔÈÕ±¾Óû§¡¾¸ÅÊö¡¿½üÆÚ·¢Ã÷Õë¶ÔÈÕ±¾Óû§µÄUrsnifľÂíбäÖֵĹ¥»÷Ô˶¯£¬¸Ã¶ñÒâÈí¼þÊÇͨ¹ýÀ´×ÔÀ¬»øÓʼþÖÐÊÜѬȾMicrosoft WordÎĵµ·Ö·¢µÄ¡£Ursnif£¬Ò²³ÆÎªGozi£¬ÊÇÒ»¸öÐÅÏ¢ÇÔÈ¡Æ÷£¬Ëü´Óä¯ÀÀÆ÷ºÍµç×ÓÓʼþÓ¦ÓóÌÐòÍøÂçµÇ¼ƾ֤£¬¾ßÓмàÊÓÍøÂçÁ÷Á¿¡¢ÆÁÄ»²¶»ñºÍ°´¼ü¼Í¼¹¦Ð§¡£¡¾²Î¿¼Á´½Ó¡¿https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/new-ursnif-campaign-targets-users-in-japan?_ga=2.95453402.710669801.1584953460-1997041092.1571902105
- TrickBotÒÔÃÀ¹úºÍÏã¸ÛµÄµçÐÅÐÐҵΪĿµÄ¡¾¸ÅÊö¡¿×î½üÔÚÕë¶ÔÃÀ¹úºÍÏã¸ÛµçÐÅ×éÖ¯µÄ¹¥»÷Ô˶¯Öз¢Ã÷TrickBotµÄ±äÌ壬¸ÃбäÌå°üÀ¨Ò»¸öÓÃÓÚÔ¶³Ì×ÀÃæÐÒ飨RDP£©±©Á¦ÆÆ½âµÄÄ£¿é£¬°üÀ¨¶Ôcheck¡¢trybruteºÍbruteÈýÖÖ¹¥»÷ģʽµÄÖ§³Ö¡£TrickBot¶ñÒâÈí¼þÖ÷Ҫͨ¹ýÀ¬»øÓʼþ¾ÙÐзַ¢¡£¡¾²Î¿¼Á´½Ó¡¿https://www.bitdefender.com/files/News/CaseStudies/study/316/Bitdefender-Whitepaper-TrickBot-en-EN-interactive.pdf
- EnigmaSparkÔ˶¯Õë¶ÔÖж«ÊµÌ塾¸ÅÊö¡¿EnigmaSparkÔ˶¯Õë¶ÔеÄÖж«Çå¾²ÍýÏ룬¹¥»÷ÕßʹÓÃÖж«µØÔµÕþÖÎÉú³¤£¬È«ÐÄÖÆ×÷ÏêϸÕþÖÎÖ¸¿ØÎļþÓÕµ¼ÊÕ¼þÈË£¬ÒÑ·Ö·¢EnigmaSpark¶ñÒâÈí¼þ¡£´Ë´Î¹¥»÷Ô˶¯ÒÉËÆÓëMoleratsÓйأ¬MoleratsÊÇÒ»¸ö³öÓÚÕþÖÎÄîÍ·µÄÍþв×éÖ¯£¬×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬¸Ã×éÖ¯µÄÊܺ¦ÕßÖ÷ÒªÔÚÖж«¡¢Å·ÖÞºÍÃÀ¹ú¡£¡¾²Î¿¼Á´½Ó¡¿https://securityintelligence.com/posts/EnigmaSpark-Politically-Themed-Cyber-Activity-Highlights-Regional-Opposition-to-Middle-East-Peace-Plan/
- ÒÔ¹Ú×´²¡¶¾ÎªÖ÷ÌâµÄй¥»÷ʹÓÃÁËαÔìµÄWHOÖ÷ÌâÓʼþ¡¾¸ÅÊö¡¿Ëæ×ŹÚ×´²¡¶¾ÔÚÈ«Çò¹æÄ£ÄÚµÄÈö²¥£¬ÒÔ¹Ú×´²¡¶¾ÎªÖ÷ÌâµÄ¹¥»÷Ò²ÈÕÇ÷ÔöÌí¡£½üÆÚ·¢Ã÷¹¥»÷ÕßʹÓÃÉù³ÆÊÇÓÐÌìÏÂÎÀÉú×éÖ¯WHOÈÏÕæÈË·¢Ë͵ÄÍøÂçµç×Ó´¹ÂÚÓʼþÓÕµ¼Óû§£¬Ìṩ¶ñÒâÈí¼þHawkEyeбäÖÖ£¬¸Ã¶ñÒâÈí¼þÊÇÒ»¸ö¼üÅ̼ͼÆ÷¡£¡¾²Î¿¼Á´½Ó¡¿https://exchange.xforce.ibmcloud.com/collection/Covid-19-Drug-Advice-From-The-WHO-Disguised-As-HawkEye-Info-Stealer-2f9a23ad901ad94a8668731932ab5826
- APT36ʹÓùÚ×´²¡¶¾³±Á÷Èö²¥Crimson¡¾¸ÅÊö¡¿APT36£¬Ò²±»³ÆÎªTransparent Tribe¡¢ProjectM¡¢Mythic LeopardºÍTEMP.Lapis£¬ÊÇÒ»¸öÖÁÉÙ´Ó2016Äê»îÔ¾ÖÁ½ñµÄ°Í»ù˹̹Íþв×éÖ¯£¬Ö÷ÒªÕë¶ÔÓ¡¶ÈÕþ¸®¡¢¹ú·À²¿ºÍʹ¹Ý¡£ÏÖÔÚAPT36ÕýÔÚʹÓùÚ×´²¡¶¾Ïà¹Ø¿µ½¡×ÉѯÎĵµ×÷ΪÓÕ¶üÀ´Èö²¥Ô¶³ÌÖÎÀí¹¤¾ßCrimson¡£¡¾²Î¿¼Á´½Ó¡¿https://blog.malwarebytes.com/threat-analysis/2020/03/apt36-jumps-on-the-coronavirus-bandwagon-delivers-crimson-rat/

¾ÅÓÎÀϸçÔÆ







