ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ15ÖÜ

Ðû²¼Ê±¼ä 2020-04-14

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2020Äê04ÔÂ06ÈÕÖÁ12ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´55¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇBroadcom Advanced Secure Gateway/ProxySGδÊÚȨ·ÃÎÊ©¶´; Linux kernel drivers/input/input.cÔ½½ç䩶´£»OpsRamp GatewayĬÈϱàÂ멶´£»Synergy Systems & Solutions HUSKY RTU 6049-E70 telnetÑéÖ¤Èƹý©¶´£»SolarWinds Dameware ECDH key½»»»»º³åÇøÒç³ö©¶´ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇFireEyeÐû²¼×î½üÊýÄê0dayÀûÓÃÇé¿öµÄ·ÖÎö³ÂËߣ»FIN6¼°ÔËÓªTrickBotµÄÍÅ»ïÁªºÏµÄ¹¥»÷»î¶¯£»Äá²´¶ûISP VianetÔâºÚ¿ÍÈëÇÖ£¬170Íò¿Í»§Êý¾Ýй¶£»¶íÂÞ˹µçÐŹ«Ë¾Rostelecom½Ù³Ö¶à¸öÆóÒµµÄ»¥ÁªÍøÁ÷Á¿£»Î¢ÈíÐû²¼Emotet¹¥»÷Fabrikam¹«Ë¾µÄ°¸ÀýÑо¿³ÂËß ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖÐ ¡£


>ÖØÒªÄþ¾²Â©¶´Áбí



1. Broadcom Advanced Secure Gateway/ProxySGδÊÚȨ·ÃÎÊ©¶´


Broadcom Advanced Secure Gateway/ProxySG¿ØÖÆ̨´æÔڻỰ½Ù³ÖÎÊÌ⣬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎʹÜÀí½Ó¿Ú ¡£

https://support.broadcom.com/security-advisory/security-advisory-detail.html?notificationId=SYMSA1752


2. Linux kernel drivers/input/input.cÔ½½ç䩶´


Linux kernel drivers/input/input.c´æÔÚÔ½½ç䩶´£¬ÔÊÐíµ±µØ¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬Í¨¹ýÌØÖúµÄkeycode±í´¥·¢£¬ÌáÉýȨÏÞ ¡£

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb222aed03d798fc074be55e59d9a112338ee784


3. OpsRamp GatewayĬÈϱàÂ멶´


OpsRamp Gateway´æÔÚÃÜÂëΪpassword 9vt@f3VtµÄ¹ÜÀíÔ±ÕË»§£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊϵͳ ¡£

https://www.criticalstart.com/hard-coded-administrator-password-discovered-in-opsramp/


4. Synergy Systems & Solutions HUSKY RTU 6049-E70 telnetÑéÖ¤Èƹý©¶´


Synergy Systems £¦ Solutions HUSKY RTU 6049-E70 telnet·þÎñ²»ÐèÒªÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊ ¡£

https://www.us-cert.gov/ics/advisories/icsa-20-042-01


5. SolarWinds Dameware ECDH key½»»»»º³åÇøÒç³ö©¶´


SolarWinds Dameware ECDH key½»»»´¦ÖÃ'SigPubkeyLen'´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»ò¿ÉÖ´ÐÐÈÎÒâ´úÂë ¡£

https://www.tenable.com/security/research/tra-2020-19



> ÖØÒªÄþ¾²Ê¼þ×ÛÊö



1¡¢FireEyeÐû²¼×î½üÊýÄê0dayÀûÓÃÇé¿öµÄ·ÖÎö³ÂËß


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



FireEye MandiantÍþвÇ鱨ÍŶӼǼµÄ2019Äê0dayÀûÓÃÁ¿±ÈÇ°ÈýÄêÖеÄÈκÎÒ»Ä궼Ҫ¶à ¡£¾¡¹Ü²¢²»Äܽ«Ã¿Ò»¸ö0dayÀûÓö¼¹éÒòµ½Ìض¨µÄ¹¥»÷Õߣ¬µ«Ñо¿ÈËÔ±×¢Òâµ½Ô½À´Ô½¶àµÄ¹¥»÷Õß»ñµÃÁË0dayÀûÓõÄÄÜÁ¦ ¡£FireEyeÈÏΪ£¬ÕâÖÖ¼¤ÔöÖÁÉÙ²¿ÃÅÊÇÓÉÓÚ²»Í£Éú³¤µÄ¹ÍÓ¶ºÚ¿ÍÐÐÒµÉú³¤ÆðÀ´µÄ£¬ÕâЩÐÐÒµ¿ª·¢0dayÀûÓù¤¾ß²¢½«Æä³öÊÛ¸øÊÀ½ç¸÷µØµÄÇ鱨»ú¹¹ ¡£¹¥»÷ÕßÓë0dayÀûÓÃÖ®¼äµÄ×î´óÕÏ°­²»ÊǼ¼ÄÜ£¬¶øÊÇÏֽ𠡣¾ßÌåÀ´Ëµ£¬FireEyeÖ¸³öNSO Group¡¢Gamma GroupºÍHacking TeamÊÇÕâÀà³Ð°üÉÌ£¬ÕâЩ³Ð°üÉÌʹһÅúеĹú¼Ò/µØÓòÄܹ»¹ºÖÃ0dayÀûÓà ¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2020/04/zero-day-exploitation-demonstrates-access-to-money-not-skill.html


2¡¢FIN6¼°ÔËÓªTrickBotµÄÍÅ»ïÁªºÏµÄ¹¥»÷»î¶¯


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


IBM X-ForceÑо¿ÈËÔ±ÌåÏÖ£¬ÔÚ×î½üµÄÍøÂç¹¥»÷Öз¢ÏÖÁËFIN6µÄºÛ¼££¬ÕâЩ¹¥»÷»î¶¯×î³õÀûÓÃTrickBotľÂíѬȾÊܺ¦Õߣ¬È»ºó×îÖÕÏÂÔØÁËAnchorºóÃÅ ¡£Ñо¿ÈËÔ±³ÆÕâÁ½¸ö·¸×ï×éÖ¯-TrickBotµÄÔËÓªÍÅ»ïÒÔ¼°FIN6-ÒѾ­½øÐкÏ×÷£¬ÕâÊÇÍøÂç·¸×ïÍÅÌåÏÖÓкÏ×÷Ç÷ÊÆÖеġ°ÐµÄΣÏÕתÕÛ¡± ¡£AnchorÖÁÉÙ¿ÉÒÔ×·Ëݵ½2018Ä꣬ËƺõÊÇÓÉTrickBotµÄÔËÓªÍÅ»ï±àдµÄ¡°¡°¶àºÏÒ»¹¥»÷¿ò¼Ü¡±£¬ËüÓÉÖÖÖÖ×ÓÄ£¿é×é³É£¬¿ÉÒÔ×ÊÖú¹¥»÷ÕßÔÚÍøÂçÉϺáÏòÁ÷´«£¨ÀýÈç°²×°ºóÃÅ£© ¡£Í¬Ê±TrickBotµÄÁíÒ»¸ö¹¤¾ßPowerTrickÖ÷ÒªÓÃÓÚÔÚÊÜѬȾµÄ¸ß¼ÛֵĿ±ê£¨ÀýÈç½ðÈÚ»ú¹¹£©ÄÚ²¿½øÐÐÒþÉí¡¢³Ö¾ÃÐÔºÍÕì²ì ¡£IBM X-ForceÖ¸³öFIN6¼ÓÈëÁËÀûÓÃAnchorºÍPowerTrickµÄ¹¥»÷£¬Æä´æÔÚµÄ×î´óÖ¸±êÊǹ¥»÷ÖÐʹÓõÄ×°ÔØ·¨Ê½£¨Terraloader£©ºÍºóÃÅ£¨More_eggs£© ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/fin6-and-trickbot-combine-forces-in-anchor-attacks/154508/


3¡¢Äá²´¶ûISP VianetÔâºÚ¿ÍÈëÇÖ£¬170Íò¿Í»§Êý¾Ýй¶


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Äá²´¶û»¥ÁªÍø·þÎñÌṩÉÌVianet CommunicationsÈ·ÈÏÆäÐÅϢϵͳÔâºÚ¿ÍÈëÇÖ£¬¿Í»§µÄ¸öÈËÐÅÏ¢±»ÇÔ ¡£ºÚ¿ÍÔÚTwitterÕÊ»§ÉÏÉù³ÆÇÔÈ¡ÁË170ÍòVianet¿Í»§µÄÊý¾Ý£¬°üÂÞËûÃǵÄÐÕÃû¡¢ÊÖ»úºÅÂë¡¢µØÖ·ºÍµç×ÓÓʼþµØÖ· ¡£ºÚ¿ÍµÄÍÆÎÄÖл¹°üÂÞÍйÜÔÚÑó´ÐÍøÂçÉϵÄй¶Êý¾ÝÁ´½Ó ¡£VianetÔÚÆä¹Ù·½ÉùÃ÷ÖÐÈ·ÈÏÁËÕâһʼþ£¬²¢ÌåÏÖÒѾ­È·¶¨ÁË鶵ÄȪԴºÍ½ÓÄÉÊʵ±µÄ´ëÊ©À´ÔöÇ¿Äþ¾²ÐÔ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.nepalitelecom.com/2020/04/vianet-customer-data-leaks-hack.html


4¡¢¶íÂÞ˹µçÐŹ«Ë¾Rostelecom½Ù³Ö¶à¸öÆóÒµµÄ»¥ÁªÍøÁ÷Á¿


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


4ÔÂ1ÈÕ¶íÂÞ˹µçÐŹ«Ë¾Rostelecom½Ù³ÖÁ˹ȸèµÈ¹«Ë¾µÄ»¥ÁªÍøÁ÷Á¿£¬¸ÃʼþÓ°ÏìÁËÊÀ½çÉÏ×î´óµÄ200¶à¸öCDNÍøÂç¼°ÔÆÍйܷþÎñÉÌ£¬Á¬ÐøÁËԼĪ1¸öСʱ ¡£ÊÜÓ°ÏìµÄÆóÒµ°üÂ޹ȸ衢ÑÇÂíÑ·¡¢Facebook¡¢Akamai¡¢Cloudflare¡¢GoDaddy¡¢Digital Ocean¡¢Joyent¡¢LeaseWeb¡¢HetznerºÍLinodeµÈÖªÃû¹«Ë¾ ¡£ÕâÊÇÒ»´ÎµäÐ͵ÄBGP½Ù³Öʼþ£¬¸ÃʼþµÄÔ­Òò¿ÉÄÜÊÇRostelecomµÄÄÚ²¿Á÷Á¿ÐÞÕýϵͳ´íÎóµØ½«²»ÕýÈ·µÄBGP·ÓÉ̻¶ÔÚ¹«ÍøÉÏ£¬¶øÇÒ±»ÉÏÓι©Ó¦É̹㲥Ôì³ÉµÄ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/russian-telco-hijacks-internet-traffic-for-google-aws-cloudflare-and-others/


5¡¢Î¢ÈíÐû²¼Emotet¹¥»÷Fabrikam¹«Ë¾µÄ°¸ÀýÑо¿³ÂËß


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


΢ÈíÔÚ¼ì²âºÍÏìӦС×飨DART£©°¸Àý³ÂËß002ÖзÖÏíÁËFabrikam¹«Ë¾ÔâÊÜEmotet¹¥»÷µÄÏêϸÐÅÏ¢ ¡£¸Ã¹¥»÷ʼÓÚÍøÂçµöÓãÓʼþ£¬µ±ÄÚ²¿Ô±¹¤·ÃÎÊÁ˵öÓãÐÅÏ¢ºó£¬EmotetѬȾÁËÆäϵͳ²¢ºáÏòѬȾÁËͬһÍøÂçÖеÄÆäËüϵͳ ¡£¸Ã²¡¶¾ÖÆÖ¹ÁËͨ¹ýÃüÁîºÍ¿ØÖÆ·þÎñÆ÷£¨C2£©½øÐж¨ÆÚ¸üжø±»·À²¡¶¾½â¾ö·½°¸¼ì²âµ½µÄÇé¿ö£¬¶øÇÒͨ¹ýʹWindowsÉè±¹ØÁ¬ÄCPUʹÓÃÂʵ½´ï±¥ºÍÀ´Í£Ö¹ºËÐÄ·þÎñ£¬µ¼Ö¸Ã×éÖ¯µÄ»ù±¾·þÎñºÍÍøÂçÖжÏÁ˽«½üÒ»ÖܵÄʱ¼ä ¡£CPUʹÓÃÂÊÒ»Ö±±¥ºÍʹµÃ¼ÆËã»ú¹ýÈÈ£¬µ¼ÖÂÄÚ²¿ÏµÍ³¿¨ËÀ¡¢ÖØÆôºÍÍøÂçÁ¬½ÓϽµ ¡£¸Ã¶ñÒâÈí¼þͨ¹ýÇÔÈ¡¹ÜÀíÔ±ÕÊ»§Æ¾¾Ý½øÐкáÏòÒƶ¯£¬ÔÚ×î³õѬȾºóµÄ8ÌìÖ®ÄÚ£¬FabrikamµÄÕû¸öÍøÂç¾Í±»¹Ø±ÕÁË ¡£


Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/wp-content/uploads/2020/04/Case-study_Full-Operational-Shutdown.pdf