NSAÐû²¼Õë¶ÔÔ¶³ÌÊÂÇéÕߺÍϵͳ¹ÜÀíÔ±µÄÍøÂçÇå¾²Ö¸ÄÏ £»Ñо¿Ö°Ô±·¢Ã÷Cloudflare WAFµÄ·ÀSQL×¢ÈëÕ½ÂÔ¿ÉÈÆ¹ý

Ðû²¼Ê±¼ä 2020-09-23

1.NSAÐû²¼Õë¶ÔÔ¶³ÌÊÂÇéÕߺÍϵͳ¹ÜÀíÔ±µÄÍøÂçÇå¾²Ö¸ÄÏ


1.jpg


ÃÀ¹ú¹ú¼ÒÇå¾²¾Ö(NSA)Ðû²¼ÁËÁ½·ÝÍøÂçÇå¾²ÐÅÏ¢±í(CSIs)£¬Îª¹ú¼ÒÇ徲ϵͳ(NSS)ºÍ¹ú·À²¿(DoD)ÊÂÇéÖ°Ô±ºÍϵͳ¹ÜÀíÔ±ÌṩÁ˹ØÓÚÔÚ¼ÒÊÂÇéʱ´ú± £»¤ÍøÂçÇå¾²ºÍÓ¦¶ÔÊÂÎñµÄ½¨Òé ¡£µÚÒ»·ÝÃûΪÊÜËðСÎÒ˽¼ÒÍøÂçÖ¸±ê»ººÍ½â²½·¥£¬Ö¼ÔÚÌṩÓйØÔ¶³ÌÊÂÇéÕßÔõÑùʶ±ðºÍ¼õÇáÆäСÎÒ˽¼ÒÍøÂçΣº¦µÄÏêϸÐÅÏ¢ ¡£µÚ¶þ·ÝÃûΪִÐдøÍâÍøÂç¹ÜÀí£¬ÆäÏòϵͳ¹ÜÀíÔ±ÌṩÁËÔõÑù¸ôÀë¹ÜÀíÁ÷Á¿ºÍÔËÓªÁ÷Á¿µÄÐÅÏ¢ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/nsa-issues-cybersecurity-guidance-remote-workers-system-admins


2.ºÚ¿ÍÃé×¼µÃ¿ËÈøË¹ÖÝÎÀÉú·þÎñ¾ÖÌá³«ÍøÂç´¹ÂÚ¹¥»÷


2.jpg


ºÚ¿ÍÊÔͼαÔìµÂ¿ËÈøË¹ÖÝÖÝÎÀÉú·þÎñ¾Ö£¨DSHS£©µÄµç×ÓÓʼþÀ´Ìá³«ÍøÂç´¹ÂÚ¹¥»÷ ¡£µç×ÓÓʼþ± £»¤µÄ¹«Ë¾Abnormal Security·¢Ã÷£¬ÓкڿÍð³äÁ˵ÿËÈøË¹ÖÝDSHSµÄ´úÀíרԱJohn William Hellerstedt·¢ËÍ´¹ÂÚÓʼþ£¬ÒªÇóÊܺ¦ÕßÌṩ20̨´¥ÃþÆÁÌõ¼Ç±¾µçÄÔºÍ200̨±ãЯʽӲÅ̵ı¨¼Û ¡£Æä×îÖÕÄ¿µÄ¿ÉÄÜÊÇ»ñµÃ²úÆ·£¬²¢Í¨¹ýÏúÊÛÔßÎïÒÔıȡÀûÒæ ¡£Ñо¿Ö°Ô±Ëµ£¬¹¥»÷ÕßÔÚ·¢ËÍÓʼþʱСÐĵØÑÚÊÎÁËÆäÐÐ×Ù£¬²¢Ê¹ÓÃVPN·þÎñÒþ²ØÁËËûÃǵÄλÖúÍÕæÊµIPµØÖ· ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/texas-businesses-targeted-in-department-of-state-health-rfq-phishing/


3.Ñо¿Ö°Ô±·¢Ã÷Cloudflare WAFµÄ·ÀSQL×¢ÈëÕ½ÂÔ¿ÉÈÆ¹ý


3.jpg


ÍøÂçÇå¾²Ñо¿Ô±George Skouroupathis·¢Ã÷CloudflareµÄWebÓ¦ÓóÌÐò·À»ðǽ£¨WAF£©SQL×¢Èë± £»¤»úÖÆÖб£´æÎó²î£¬¿É±»Èƹý ¡£Ëû·¢Ã÷µ±ÆäÅÌÎÊÒ»¸öÌØ¶¨µÄ±äÁ¿ÊÇ·ñÆ¥Åäij¸öÌõ¼þʱ£¬ÈôÊÇÌõ¼þÖª×ã¾Í»á¸ø³ö200¸öOK״̬֪ͨ£¬·´Ö®£¬·þÎñÆ÷·µ»ØÒ»¸ö500ÄÚ²¿·þÎñÆ÷¹ýʧ ¡ £»ùÓÚ¸ÃÔ­Àí£¬Ëû±àдÁËÒ»¸ö¾ç±¾£¬½«DBMSÖÐÑ¡ÔñµÄ×Ö·ûÒÀ´ÎÓëËùÓÐ×Ö·û¾ÙÐнÏÁ¿ ¡£ÔÚ¾­ÓÉ3´Î×¢ÈëʵÑéºó£¬ÆäÀֳɵØÖ´ÐÐÁËSQL×¢Èë¹¥»÷ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/whitehat-hacker-bypass-sql-cloudflare-injection-filter/


4.Cisco³ÆÎÞÎļþµÄ¶ñÒâÈí¼þÊÇ2020Äê1H×î³£¼ûµÄÖÕ¶ËÍþв


4.jpg


ƾ֤Cisco¶ÔÒ£²âÊý¾ÝµÄ×îÐÂÆÊÎö£¬ÔÚ2020ÄêÉϰëÄ꣬Õë¶ÔÖն˵Ä×î³£¼ûµÄÍøÂçÇå¾²ÍþвÊÇÎÞÎļþ¶ñÒâÈí¼þ ¡£ÎÞÎļþÍþвΪÊ×´ÎѬȾºóÔÚÄÚ´æÖÐÔËÐеĶñÒâ´úÂ룬¶ø²»ÊÇ´æ´¢ÔÚÓ²ÅÌÉϵÄÎļþ£¬ÀýÈçKovter¡¢Poweliks¡¢DivegentºÍLemonDuck ¡£±ðµÄ£¬ÁíÒ»¸ö³£¼ûµÄÕë¶ÔÖն˵ÄÍøÂçÍþвΪ˫ÓÃ;¹¤¾ß£¬ËüÃÇͨ³£ÓÃÓÚ¿ª·¢ºÍ¿ª·¢ºóʹÃü£¬ÀýÈçPowerShell Empire¡¢Cobalt Strike¡¢PowersploitºÍMetasploit ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/fileless-malware-critical-ioc-threats-2020/159422/


5.CISAÖÒÑÔ¶ñÒâÈí¼þLokiBotµÄʹÓÃÁ¿ÏÔ×ÅÔöÌí


5.jpg


ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖÒÑÔ£¬ÆäÄÚ²¿Ç徲ƽ̨£¨ÈëÇÖ¼ì²âϵͳEINSTEIN£©ÒѼì²âµ½LokiBotѬȾµÄÒ»Á¬¶ñÒâÔ˶¯£¬²¢Ìá³öÁËÓйش¦Öóͷ£LokiBot¹¥»÷ºÍѬȾµÄ¼ì²â»ººÍ½â½¨Òé ¡£Ä¿½ñ£¬Óжà¸öºÚ¿Í×éÖ¯ÕýÔÚͨ¹ýÖÖÖÖ¸÷ÑùµÄÊÖÒÕÀ´·Ö·¢¸Ã¶ñÒâÈí¼þ£¬´ÓÀ¬»øÓʼþµ½ÆÆ½âµÄ×°ÖóÌÐòÒÔ¼°ÓÕÆ­µÄÖÖ×ÓÎļþ ¡£±ðµÄ£¬ÔÚÊ¢ÐÐÂʺÍÊýÄ¿·½Ã棬SpamHaus½«LokiBotÁÐΪ2019Äê×î»îÔ¾µÄÏÂÁîºÍ¿ØÖÆ(C&C)·þÎñÆ÷µÄ¶ñÒâÈí¼þ¾úÖê ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cisa-warns-of-notable-increase-in-lokibot-malware/


6.BingµÄһ̨ºó¶Ë·þÎñÆ÷̻¶£¬Ð¹Â¶Áè¼Ý6.5TBÈÕÖ¾Îļþ


6.jpg


WizCaseµÄÇå¾²Ñо¿Ô±Ata Hakcil·¢Ã÷£¬±¾ÔÂÔçЩʱ¼ä£¬Î¢ÈíµÄITÔ±¹¤ÒâÍâµØ½«BingµÄÒ»¸öºó¶Ë·þÎñÆ÷̻¶ÔÚÁËÍøÂçÉÏ ¡£¸ÃÊÂÎñй¶ÁËÁè¼Ý6.5TBµÄÈÕÖ¾Îļþ£¬ÆäÖаüÀ¨130ÒÚ¸öÀ´×ÔBingËÑË÷ÒýÇæµÄ¼Í¼ ¡£¾ÝÊӲ죬²¢Ã»ÓÐÓû§ÐÅÏ¢±»Ð¹Â¶£¬¿ÉÊÇ·þÎñÆ÷¹ûÕæÁËÊÖÒÕÏêϸÐÅÏ¢£¬ÀýÈçËÑË÷ÅÌÎÊ¡¢ÓйØÓû§ÏµÍ³µÄÏêϸÐÅÏ¢£¨×°±¸£¬²Ù×÷ϵͳ£¬ä¯ÀÀÆ÷µÈ£©¡¢µØÀíλÖÃÏêϸÐÅÏ¢ÒÔ¼°ÖÖÖÖÁîÅÆ¡¢¹þÏ£ºÍÓÅ»Ýȯ´úÂë ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-secures-backend-server-that-leaked-bing-data/