CISAÐû²¼2019²ÆÄêΣº¦Îó²îÆÀ¹ÀµÄÐÅϢͼ£»£»£»QNAPÐÞ¸´HelpdeskÖеÄÎó²î £¬£¬£¬¿Éµ¼ÖÂNAS×°±¸½ÓÊÜ

Ðû²¼Ê±¼ä 2020-10-09
1.CISAÐû²¼2019²ÆÄêΣº¦Îó²îÆÀ¹ÀµÄÐÅϢͼ


1.png


ÍøÂçÇå¾²ºÍÐÅÏ¢Çå¾²»ú¹¹(CISA)Ðû²¼ÁË2019²ÆÄê¾ÙÐеÄ44ÏîΣº¦ºÍÎó²îÆÀ¹À£¨RVA£© £¬£¬£¬ÒÔ¼°MITER¶Ô¿¹Õ½ÂÔ¡¢ÊÖÒÕºÍ֪ʶ£¨ATT£¦CK£©¿ò¼ÜµÄÆÊÎöÐÅϢͼ¡£¡£¡£¡£¸ÃÐÅϢͼ±íÈ·¶¨ÁËCISAÔÚ¿ç¶à¸ö²¿·ÖµÄRVAsʱ´úÊӲ쵽µÄͨÀýÀֳɹ¥»÷·¾¶ £¬£¬£¬ÍøÂç¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩ¹¥»÷;¾¶À´¹¥»÷×éÖ¯¡£¡£¡£¡£CISAÃãÀøÍøÂçÖÎÀíÔ±ºÍITרҵְԱÉó²éÐÅϢͼ²¢Ó¦ÓÃÍÆ¼öµÄ·ÀÓùÕ½ÂÔ £¬£¬£¬ÒÔ±ÜÃâÊܵ½ÒÑÖªÕ½ÊõºÍÊÖÒյĹ¥»÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/10/07/cisa-releases-fy2019-risk-vulnerability-assessment-infographic


2.Çå¾²¹«Ë¾Arctic WolfÐû²¼Çå¾²ÔËÓªÄê¶È±¨¸æ


2.png


Çå¾²¹«Ë¾Arctic WolfÐû²¼ÁËÒ»·ÝÇå¾²ÔËÓªÄê¶È±¨¸æ¡£¡£¡£¡£±¨¸æÏÔʾ £¬£¬£¬×Ô3ÔÂÒÔÀ´ £¬£¬£¬°µÍøÉϹûÕæµÄ¹«Ë¾Æ¾Ö¤ÊýÄ¿ÔöÌíÁË429£¥¡£¡£¡£¡£ÔÚÊӲ쵽µÄ¸ßΣº¦Çå¾²ÊÂÎñÖÐ £¬£¬£¬ÓÐ35£¥±¬·¢ÔÚ8:00 PMºÍ8:00 AMÖ®¼ä £¬£¬£¬¶ø14£¥±¬·¢ÔÚÖÜÄ© £¬£¬£¬ÕâÊÇÐí¶àÄÚ²¿Çå¾²ÍŶӲ»ÔÚÏßµÄʱ¼ä¡£¡£¡£¡£±ðµÄ £¬£¬£¬ÍøÂç´¹ÂÚºÍÀÕË÷Èí¼þ¹¥»÷´ÎÊýÔöÌíÁË64£¥ £¬£¬£¬ºÚ¿Í¸ü¶àµÄÒÔCOVID-19Ö÷ÌâΪÓÕ¶ü £¬£¬£¬À´Õë¶ÔÔ¶³ÌÊÂÇéÕß¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://arcticwolf.com/resources/analyst-reports/security-operations-annual-report


3.GoogleÐû²¼µÄChromeÇå¾²¸üÐÂÐÞ¸´¶à¸öÎó²î


3.png


GoogleÐû²¼µÄChromeÇå¾²¸üÐÂÕë¶ÔWindows¡¢MacºÍLinux°æ±¾ÐÞ¸´ÁË35¸öÎó²î¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪ֧¸¶ÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15967£© £¬£¬£¬Æä´ÎΪBlink¡¢WebRTC¡¢NFC¡¢´òÓ¡¡¢ÒôƵ¡¢×Ô¶¯Ìî³äºÍÃÜÂëÖÎÀíÆ÷ÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15968¡¢CVE-2020-15969¡¢CVE-2020-15970¡¢CVE-2020-15971¡¢CVE-2020-15972¡¢CVE-2020-15990ºÍCVE-2020-15991£©¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/10/07/google-releases-security-updates-chrome


4.QNAPÐÞ¸´HelpdeskÖеÄÎó²î £¬£¬£¬¿Éµ¼ÖÂNAS×°±¸½ÓÊÜ


4.png


QNAPÐÞ¸´ÁËHelpdeskÓ¦ÓÃÖеÄÁ½¸ö½ÏΪÑÏÖØµÄÎó²î £¬£¬£¬ÕâЩÎó²î¿É±»¹¥»÷ÕßʹÓýÓÊÜQNAPÍøÂçÅþÁ¬´æ´¢£¨NAS£©×°±¸¡£¡£¡£¡£´Ë´ÎÐÞ¸´Á½¸öÎó²î¾ùΪ²»Êʵ±µÄ»á¼û¿ØÖÆÎó²î £¬£¬£¬±»¸ú×ÙΪCVE-2020-2506ºÍCVE-2020-2507 £¬£¬£¬¹¥»÷ÕßÀÖ³ÉʹÓúó¿É»ñµÃ¶ÔQNAP×°±¸µÄ¿ØÖÆ¡£¡£¡£¡£QNAPÌåÏÖ £¬£¬£¬ÆäÒÑÐÞ¸´ÁËHelpdesk 3.0.3¼°¸ü¸ß°æ±¾µÄÎó²î £¬£¬£¬Ë¼Á¿µ½Îó²îµÄÑÏÖØË®Æ½ £¬£¬£¬Óû§Ó¦¸Ã¾¡¿ì½«¸ÃÓ¦ÓóÌÐòÉý¼¶µ½×îа汾¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/qnap-fixes-critical-flaws-that-could-lead-to-device-takeover/


5.ºÚ¿ÍÒÔÌØÀÊÆÕ¿µ½¡ÐÅϢΪÓÕ¶ü¾ÙÐд¹ÂÚ¹¥»÷


5.png


ÍøÂçÇå¾²¹«Ë¾ProofPointµÄÑо¿Ö°Ô±·¢Ã÷ £¬£¬£¬ºÚ¿ÍÒÔÌØÀÊÆÕ¿µ½¡ÐÅϢΪÓÕ¶üÌᳫеÄÍøÂç´¹Âڻ¡£¡£¡£¡£ºÚ¿Í»Ñ³ÆËûÃÇÓÐÌØÀÊÆÕ¿µ½¡ÇéÐεÄ×îÐÂÄÚ²¿ÐÅÏ¢ £¬£¬£¬µ«ÒªÇóÓû§Ê¹ÓÃǶÈëʽÁ´½ÓÏÂÔØÎĵµ¡£¡£¡£¡£Êܺ¦È˵ã»÷Á´½Óºó £¬£¬£¬»á±»Öض¨Ïòµ½Ò»¸öGoogleÎĵµ £¬£¬£¬²¢Åú×¢¸ÃÎĵµÒÑͨ¹ýGoogleɨÃè²¢ÇÒÊÇÇå¾²µÄ¡£¡£¡£¡£Óû§Æ¾Ö¤ÌáÐѵã»÷ÏÂÔØÁ´½Óºó £¬£¬£¬½«ÏÂÔØBazarLoader¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£×îÖÕ £¬£¬£¬¹¥»÷Õß»áÔÚÊÜѬȾϵͳÖÐ×°ÖÃRyukÀÕË÷Èí¼þ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-emails-lure-victims-with-inside-info-on-trumps-health/


6.ºÚ¿Í¿ÉʹÓÃComcastµçÊÓÒ£¿£¿£¿£¿ØÆ÷ÇÔÌýÓû§¶Ô»°


6.png


GuardicoreµÄÑо¿Ö°Ô±¶ÔComcastµÄXR11 Xfinity Voice Remote¾ÙÐÐÁËÆÊÎö £¬£¬£¬·¢Ã÷ÁËÒ»ÖÖÎÞÐèÎïÆÊÎö¼û»òÓû§½»»¥¼´¿É½«Æäת±äΪ¼àÌý×°±¸µÄÒªÁì £¬£¬£¬±»³ÆÎªWarezThe Remote¹¥»÷¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ £¬£¬£¬ÈÏÕæ¼ÓÃÜͨѶµÄRF4CE£¨ÏûºÄµç×ÓÉ䯵£©Ð­ÒéµÄʵÑé±£´æÎó²î¡£¡£¡£¡£Æäͨ¹ý¶ÔÒ£¿£¿£¿£¿ØÆ÷µÄ¹Ì¼þ¾ÙÐÐÄæÏò¹¤³ÌÕÒµ½ÁËÓïÒôÂ¼ÖÆ°´Å¥µÄ´úÂë £¬£¬£¬ÔÚÐ޸ĴúÂëºó»áÿ·ÖÖÓÌᳫһ´Î¼ÒôÇëÇó £¬£¬£¬²¢»áÔÚÔ޳ɺóÂ¼ÖÆ10·ÖÖÓ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/comcast-cable-remotes-hacked-to-snoop-on-conversations/