Malwarebytes°ä²¼2020Äê¶ñÒâÈí¼þÇé¿ö»ã±¨£»Ë¼¿ÆTalosÅû¶ImageGear¿âÖжà¸ö´úÂëÖ´Ðзì϶

°ä²¼¹¦·ò 2020-02-12

1.΢Èí°ä²¼2ÔÂWindows°²È«¸üР£¬½¨¸´99¸ö·ì϶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


΢Èí°ä²¼2ÔÂWindows°²È«¸üР£¬ÕâÒ²ÊÇWindows 7Óû§µÚÒ»´Î²»»á»ñµÃÃâ·ÑµÄ°²È«¸üР ¡£ÔÚ±¾Ôµİ²È«¸üÐÂÖÐ £¬Î¢Èí½¨¸´ÁË99¸ö·ì϶ £¬ÆäÖÐÔ̺¬IE 0day£¨CVE-2020-0674£© £¬¸Ã·ì϶ÒÑÔÚÒ°±í±»»ý¼«ÀûÓà £¬½¨ÒéÓû§¾¡¿ì×°ÖøüР ¡£³ý´ËÖ®±í £¬Î¢Èí»¹³ÆÓÐ3¸ö·ì϶Òѹ«¿ªÅû¶ £¬µ«Î´ÔÚÒ°±í±»ÀûÓà £¬Ô̺¬Windows InstallerÌáȨ·ì϶£¨CVE-2020-0683ºÍCVE-2020-0686£©ÒÔ¼°Î¢Èíä¯ÀÀÆ÷ÐÅϢй¶·ì϶£¨CVE-2020-0706£©  ¡£ÆëÈ«·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsofts-february-2020-patch-tuesday-fixes-99-flaws-ie-0day/


2.˼¿ÆTalosÅû¶ImageGear¿âÖжà¸ö´úÂëÖ´Ðзì϶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


˼¿ÆTalosÅû¶Accusoft ImageGear¿âÖз¢ÏֵĶà¸ö´úÂëÖ´Ðзì϶  ¡£ImageGear¿âÊÇÒ»¸öÎĵµ-ͼÏñ¿ª·¢ÈËÔ±¹¤¾ß°ü £¬¿ÉÔ®ÊÖÓû§½øÐÐͼÏñת»»¡¢´´½¨¡¢±à×ëµÈ²Ù×÷  ¡£×êÑÐÈËÔ±·¢ÏÖImageGear 19.5.0°æ±¾µÄigcore19d.dll´æÔÚ¶à¸ö´úÂëÖ´Ðзì϶ £¬Ô̺¬CVE-2019-5187¡¢CVE-2020-6063~CVE-2020-6067¼°CVE-2020-6069  ¡£AccusoftÒѾ­ÔÚImageGear 19.6Öн¨¸´ÁËÕâЩ·ì϶  ¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/02/accusoft-imagegear-code-execution-feb-2020.html


3.Malwarebytes°ä²¼2020Äê¶ñÒâÈí¼þÇé¿ö»ã±¨


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Malwarebytes Labs°ä²¼2020Äê¶ñÒâÈí¼þÇé¿ö»ã±¨ £¬»ã±¨Ö¸³öÓëÕë¶ÔWindows PCµÄÍþвÏà±È £¬MacÍþв³ÊÖ¸Êý¼¶Ôö³¤  ¡£MacÍþвµÄ×ÜÊýÁ¿Í¬±ÈÔö³¤ÁË400£¥ÒÔÉÏ £¬µ«ÕâÒ»Êý×ֿ϶¨Ë®Æ½ÉÏ¿ÉÄÜÊܵ½2019ÄêMalwarebytes MacÓû§ÈºÔö³¤µÄÓ°Ïì  ¡£¶Ôµ¥¸öÖն˶øÑÔ £¬MacÍþвÒÀÈ»±ÈWindows¸ß £¬ÏÕЩΪ2£º1  ¡£»ã±¨»¹Ö¸³ö¹¥»÷ÐÔ¸æ°×Èí¼þ¡¢Ä¾ÂíºÍHackToolsÖ÷µ¼ÁËÕë¶ÔÒµÎñ¶ËµãµÄÈ«ÇòÍþв £¬±ÈÈ¥ÄêͬÆÚÔö³¤ÁË13£¥  ¡£¹¥»÷ÆóÒµµÄÀÕË÷Èí¼þ»î¶¯´ïµ½º¹Çà×î¸ßˮƽ £¬RyukºÍSodinokibiµÈ¼Ò×å±ðÀëÔö³¤ÁË543£¥ºÍ820£¥  ¡£EmotetºÍTrickBotÒÀÈ»ÊÇÕë¶ÔÆóÒµµÄÖØÒªÍþв֮һ  ¡£


Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/reports/2020/02/malwarebytes-labs-releases-2020-state-of-malware-report/


4.FBIÖÒ¸æÕë¶ÔÃÀ¹úICSÄÜÔ´²¿ÃŵÄÈí¼þ¹©¸øÁ´¹¥»÷


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


¾ÝZDNet±¨Â· £¬FBIÒÑÏòÃÀ¹ú˽Ӫ²¿ÃÅ·¢³ö°²È«¾¯±¨ £¬ÖÒ¸æÔÚ½øÐеÄÕë¶ÔÈí¼þÌṩÉ̵Ĺ©¸øÁ´¹¥»÷»î¶¯  ¡£¹¥»÷ÕßÊÔIJÀûÓÃÔ¶¿ØÄ¾ÂíKwampirsϰȾÆóÒµ  ¡£FBIÔÚÒ»·ÝÉêÃ÷ÖаµÊ¾ £¬¹¥»÷ÕßÕë¶ÔÈí¼þ¹©¸øÁ´¹«Ë¾ÊÇΪÁ˽ӼûÊܺ¦ÕßµÄÕ½ÊõºÏ×÷ͬ°éºÍ¿Í»§ £¬ÆäÖÐÔ̺¬ÎªÈ«ÇòÄÜÔ´³ö²ú¡¢´«ÊäºÍ·ÖÅäICSϵͳÌṩ֧³ÖµÄʵÌå  ¡£¸Ã¶ñÒâÈí¼þ»¹²¿ÊðÔÚÕë¶ÔÒ½ÁÆ¡¢ÄÜÔ´ºÍ½ðÈÚÁìÓò¹«Ë¾µÄ¹¥»÷ÖÐ  ¡£FBI²¢Î´ÔÚ¾¯±¨Öбêʶָ±êÈí¼þ¹©¸øÉÌ £¬Ò²Ã»ÓбêʶÈÎºÎÆäËüÊܺ¦Õß £¬µ«ÌṩÁËIOCºÍYARA¹æ¶¨  ¡£×éÖ¯Äܹ»ÀûÓÃËüÃÇÀ´É¨ÃèÄÚ²¿ÍøÂç £¬²éÕÒKwampirs RATµÄºÛ¼£  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-warns-about-ongoing-attacks-against-software-supply-chain-companies/


5.Êý°Ù¸öDocker×¢²á±íÒòÅäÖÃÃýÎóй¶¹«Ë¾Ãô¸ÐÐÅÏ¢


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Palo Alto Networks»ã±¨³ÆÔÚÊý°Ù¸ö¿É´Ó»¥ÁªÍø¹«¿ª½Ó¼ûµÄDocker×¢²á±íÖз¢ÏÖÁËÊýÒÔǧ¼ÆµÄ¶³ö´úÂë´æ´¢¿â  ¡£ÕâЩDocker×¢²á±íÔ̺¬ÀûÓ÷¨Ê½Ô´´úÂëºÍº¹Çà°æ±¾µÈ¹Ø¼üÒµÎñÊý¾Ý £¬¿ÉÄÜ»áʹ×éÖ¯µÄÕû¸öÔÆ»ù´¡¼Ü¹¹Ãæ¶Ô·çÏÕ  ¡£Â¶³ö»¹¿ÉÄܵ¼ÖÂרÓÐ֪ʶ²úȨ±»µÁ¡¢¹Ø¼üÔËÓªÊý¾Ý±»½Ù³Ö»ò¶ñÒâ´úÂë±»×¢Èë  ¡£×êÑÐÈËÔ±É跨ͨ¹ý·´ÏòDNS²éÕÒ¼°TLSÖ¤ÊéÖеÄcname½«ËÄ·ÖÖ®Ò»µÄ¶³öDocker×¢²á±í¹éÒòÓÚ×êÑлú¹¹¡¢ÁãÊÛÉÌ¡¢ÐÂÎÅýÌå×éÖ¯ºÍ¼¼Êõ¹«Ë¾  ¡£ÓÉÓÚÿ¸ö×¢²á±íͨ³£¶¼±»¶à¸ö¿Í»§¶Ë½Ó¼û £¬ÕâÒâζ×ÅËùÓÐÀ­È¡²¢ÔËÐоµÏñµÄ¿Í»§¶Ë¶¼ÈÝÒ×Êܵ½ÇÖº¦  ¡£ÕâÖÖÅäÖÃÃýÎóµÄ²¹¾ÈÕ½ÊõºÜµ¥Ò» £¬Äܹ»Í¨¹ýÔö³¤·À»ðǽ¹æ¶¨ÒÔÔ¤·À´ÓInternet½Ó¼û×¢²á±í £¬ÒÔ¼°ÔÚËùÓÐAPIÒªÇóÖÐÇ¿ÔìÖ´ÐÐÉí·ÝÑéÖ¤±êÍ·À´ÊµÏÖ  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/misconfigured-docker-registries-expose-thousands-repositories


6.Ê¥µØÑǸçѧǰ½ÌÓý»ú¹¹EESй¶ѧÁäǰ¶ùͯÊý¾Ý


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


¹¥»÷Õß·¸·¨½Ó¼ûÁËλÓÚ¼ÓÀû¸£ÄáÑÇÖÝÊ¥µØÑǸçµÄѧǰ½ÌÓý»ú¹¹Enrichment Systems £¬Inc£¨EES£©µÄÔ±¹¤µç×ÓÓʼþÕÊ»§ £¬²¢ÇÒ¿ÉÄÜÒѾ­²é¿´Á˸¸Ä¸ºÍѧÉúµÄÃô¸ÐÐÅÏ¢  ¡£¸Ã·ÇͶ»ú×éÖ¯ÖÂÁ¦ÓÚΪµÍÊÕÈë¼ÒÍ¥µÄ18¸öÔÂÖÁ5ËêµÄ¶ùͯÌṩ·þÎñ £¬¸Ã×éÖ¯ÔÚÍøÕ¾ÉϵÄÊý¾Ýй¶֪ͨÖаµÊ¾ £¬ÆäÔ±¹¤ÕË»§ÔÚ2019Äê5ÔÂ27ÈÕÖÁ2019Äê7ÔÂ15ÈÕÖ®¼äÊܵ½Î´¾­ÊÚȨµÄ½Ó¼û £¬¿ÉÄÜÔÚ¸ÃÊÂÎñÖÐй¶µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢µØÖ·¡¢Éç»á°²È«ºÅÂë¡¢²ÆÕþÐÅÏ¢¡¢Ò½ÁƱ£ÏÕÐÅÏ¢¡¢Ñ§Éú½ÌÓýµµ°¸ÒÔ¼°²¡ÀúºÍÒ½ÖÎÐÅÏ¢  ¡£EES³ÐŵΪÊÜÓ°ÏìµÄÈËÌṩÃâ·ÑµÄÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ  ¡£


Ô­ÎÄÁ´½Ó£º

https://hotforsecurity.bitdefender.com/blog/data-breach-hits-san-diego-low-income-preschool-provider-22261.html