±ÈÀûʱBelnetÔâµ½DDoS¹¥»÷ £¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨·ÃÎÊ £»DellÐû²¼Äþ¾²¸üР£¬ÐÞ¸´¶à¸öÒѾ­´æÔÚ12ÄêµÄ©¶´

Ðû²¼Ê±¼ä 2021-05-06

1.±ÈÀûʱBelnetÔâµ½DDoS¹¥»÷ £¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨·ÃÎÊ


1.jpg


±ÈÀûʱBelnetÓÚÖܶþÔâµ½´ó¹æÄ£DDoS¹¥»÷ £¬¶à¸ö¹Ù·½ÍøÕ¾ÎÞ·¨·ÃÎÊ ¡£Belnet£¨±ÈÀûʱ ¹ú¼ÒÑо¿ºÍ½ÌÓýÍøÂ磩ÊÇΪ±ÈÀûʱ½ÌÓý»ú¹¹¡¢Ñо¿ÖÐÐÄ¡¢¿ÆÑ§Ñо¿ËùºÍÕþ¸®·þÎñÌṩ·þÎñµÄ»¥ÁªÍøÌṩÉÌ ¡£¾ÝÔ¤¼Æ £¬Õâ´Î¹¥»÷Ó°ÏìÁ˱ÈÀûʱµÄ200¶à¸ö×éÖ¯ £¬°üÂÞÕþ¸®¡¢¾¯²ì¾ÖºÍCOVID-19ÒßÃçÔ¤¶©µÈÍøÕ¾ ¡£Ä¿Ç° £¬±ÈÀûʱÕþ¸®ÕýÔÚÊÓ²ì´Ëʼþ £¬Éв»Çå³þ·¢¶¯´Ë´Î¹¥»÷µÄ¹¥»÷Õß ¡£


Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/belgium-was-hit-by-a-massive-cyberattack-532812.shtml


2.DellÐû²¼Äþ¾²¸üР£¬ÐÞ¸´¶à¸öÒѾ­´æÔÚ12ÄêµÄ©¶´


2.jpg


DellÐû²¼Äþ¾²¸üР£¬ÐÞ¸´DBUtil BIOSÇý¶¯·¨Ê½ÖÐÒѾ­´æÔÚ12ÄêµÄ5¸ö©¶´ ¡£SentinelLabsÌåÏÖ £¬ÕâЩ©¶´×Ô2009ÄêÒÔÀ´Ò»Ö±´æÔÚ £¬Ó°ÏìÁËDellËùÓеĄ̈ʽ»ú¡¢Ìõ¼Ç±¾µçÄÔºÍÆ½°åµçÄÔ ¡£Õâ5¸ö©¶´±»×·×ÙΪCVE-2021-21551 £¬CVSSÆÀ·ÖΪ8.8 £¬·Ö±ðΪ2¸öÄÚ´æË𻵵¼ÖµÄÌáȨ©¶´ £¬2¸öȱ·¦ÊäÈëÑéÖ¤µ¼ÖµÄÌáȨ©¶´ºÍ1¸ö´úÂëÂß¼­ÎÊÌâµ¼Öµľܾø·þÎñ©¶´ ¡£Ä¿Ç° £¬ÕâЩ©¶´ÉÐδ±»ÔÚÒ°ÀûÓà ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/dell-kernel-privilege-bugs/165843/


3.CiscoÐû²¼Äþ¾²¸üР£¬ÐÞ¸´¶à¿î²úÎïÖÐÑÏÖØµÄ©¶´


3.jpg


CiscoÐû²¼Äþ¾²¸üР£¬ÐÞ¸´Á˶à¿î²úÎïÖÐÑÏÖØµÄ©¶´ ¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄ©¶´ÎªSD-WAN vManageÖÐδÊÚȨµÄÏûÏ¢´¦Öé¶´£¨CVE-2021-1468£©¡¢ÌáȨ©¶´ÄǸö£¨CVE-2021-1505£©ÒÔ¼°HyperFlex HXÖеÄÃüÁî×¢Èë©¶´£¨CVE-2021-1497£© ¡£´ËÍâ £¬¸üл¹ÐÞ¸´ÁËÆäËû²úÎïÖеĶà¸ö©¶´ £¬°üÂÞÈÎÒâ´úÂëÖ´ÐЩ¶´¡¢ÌáȨ©¶´ºÍ¾Ü¾ø·þÎñ©¶´µÈ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cisco-bugs-allow-creating-admin-accounts-executing-commands-as-root/


4.QualysÅû¶EximÖÐÓ°ÏìÊý°ÙÍǫ̀·þÎñÆ÷µÄ©¶´21Nails


4.jpg


QualysÅû¶EximÓʼþ´«ÊäÊðÀí£¨MTA£©Èí¼þÓ°ÏìÊý°ÙÍǫ̀·þÎñÆ÷µÄ21¸ö©¶´ £¬Í³³ÆÎª21Nails ¡£ÕâЩ©¶´ÓÐ10¸ö¿É±»Ô¶³ÌÀûÓà £¬ÁíÍâ11¸öΪµ±µØÂ©¶´ £¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿É×éºÏʹÓÃÕâЩ©¶´ £¬À´Ô¶³ÌÖ´ÐдúÂë £¬²¢ÔÚExim ServerÉÏ»ñµÃrootȨÏÞ ¡£ÕâЩ©¶´·Ö±ðΪqueue_run£¨£©ÖеĶѻº³åÇøÒç³ö©¶´£¨CVE-2020-28011£©¡¢tls-openssl.cÖеÄÊͷźóʹÓé¶´£¨CVE-2020-28018£©µÈ ¡£Ñо¿ÈËÔ±½¨ÒéÓû§Á¢¼´Éý¼¶µ½×îеĿÉÓÃExim°æ±¾ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-21nails-exim-bugs-expose-millions-of-servers-to-attacks/


5.ºÚ¿Íͨ¹ýDiscord·Ö·¢Panda StealerÀ´ÇÔÈ¡¼ÓÃÜ»õ±Ò


5.jpg


Ç÷ÊÆ¿Æ¼¼Ñо¿ÈËÔ±·¢ÏÖ £¬ºÚ¿Íͨ¹ýDiscord·Ö·¢Panda StealerÀ´ÇÔÈ¡¼ÓÃÜ»õ±Ò £¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡¢°Ä´óÀûÑÇ¡¢ÈÕ±¾ºÍµÂ¹úµÈ¹ú¼ÒºÍµØÓò ¡£´Ë´Î¹¥»÷»î¶¯µÄÀûÓÃÁËαװ³ÉÆóÒµ±¨¼ÛÇëÇóµÄµöÓãÓʼþ £¬Í¨¹ýÆôÓöñÒâºêµÄ.XLSMÎĵµºÍ°üÂÞ¶ñÒâExcel¹«Ê½µÄ.XLSMÁ½ÖÖ·½Ê½ £¬À´·Ö·¢Panda Stealer ¡£¸Ã¶ñÒâÈí¼þÊÇCollector StealerµÄ±äÖÖ £¬¹ýÈ¥ÔøÔÚ°µÍøºÍTelegramÉϳöÊÛ £¬¿ÉÇÔÈ¡ETH¡¢LTC¡¢BCN¡¢DASHµÈ¼ÓÃÜ»õ±Ò £¬ä¯ÀÀÆ÷CookieÒÔ¼°NordVPN¡¢Telegram¡¢DiscordºÍSteamµÈÕÊ»§Æ¾¾Ý ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/panda-stealer-dropped-in-discord-to-steal-user-cryptocurrency/


6.FireEyeÐû²¼ÓйØUNC2529µöÓã»î¶¯µÄ·ÖÎö³ÂËß


6.jpg


FireEyeÐû²¼ÁËÓйØUNC2529µöÓã»î¶¯µÄ·ÖÎö³ÂËß ¡£FireEyeµÄMandiantÍŶӷ¢ÏÖ2020Äê12ÔÂ2ÈÕ £¬ºÍ2020Äê12ÔÂ11ÈÕÖÁ12ÔÂ18ÈÕÖ®¼ä·¢ÉúµÄÁ½ÂÖµöÓã»î¶¯ £¬Ö÷ÒªÒÔÃÀ¹ú¡¢Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ¡¢ÑÇÖ޺ͰĴóÀûÑǵĹ«Ë¾ÎªÄ¿±ê ¡£¹¥»÷Õß×ܹ²Ê¹ÓÃÁËÁè¼Ý50¸öÓò £¬ÀûÓö¨ÖƵĵöÓãÓʼþ £¬Õë¶Ô°üÂÞ¹ú·À¡¢Ò½Ò©¡¢ÔËÊä¡¢¾üʺ͵ç×ӵȲîÒìµÄÐÐÒµ ¡£ÔÚÒ»´Î¹¥»÷»î¶¯ÖÐ £¬UNC2529ÀÖ³ÉÈëÇÖÁËÃÀ¹úÒ»¼Ò¹©Å¯ºÍÖÆÀä·þÎñ¹«Ë¾µÄÓò²¢¸Ä¶¯ÁËÆäDNS¼Ç¼ ¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2021/05/unc2529-triple-double-trifecta-phishing-campaign.html