GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯£»£»£»£»ºÚ¿ÍʹÓÃÐéαµÄÌØÀÊÆÕ³óÎÅÊÓÆµÈö²¥QNode RAT
Ðû²¼Ê±¼ä 2021-01-08
ÍøÂçÇå¾²¹«Ë¾GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²î£¨CVE-2020-29583£©µÄ¹¥»÷»î¶¯¡£¡£¡£¸ÃÎó²îÓëZyxelÖÐÓ²±àÂëµÄºóÃÅÕÊ»§zyfwpÓйأ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÀ´½ÓÊÜÍøÂç×°±¸¡£¡£¡£GreyNoise¼ì²âµ½Èý¸ö²î±ðµÄIPµØµãÕýÔÚɨÃèSSH×°±¸£¬£¬£¬£¬£¬£¬£¬²¢ÊµÑéʹÓÃZyxelºóÃŵǼ¡£¡£¡£¿ÉÊÇÕâЩ¹¥»÷Õß²¢Ã»ÓÐרÃÅÕë¶ÔZyxel×°±¸£¬£¬£¬£¬£¬£¬£¬¶øÊÇɨÃèInternetÉÏËùÓÐÕýÔÚÔËÐеÄSSH¡£¡£¡£ÆäÖÐÒ»¸ö¹¥»÷ÕßʹÓÃÁËCobalt StrikeµÄÄÚÖÃSSH¿Í»§¶ËÀ´Ö´ÐÐɨÃ裬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÈÆ¹ý¼ì²â¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-start-exploiting-the-new-backdoor-in-zyxel-devices/
2.ºÚ¿ÍʹÓÃÐéαµÄÌØÀÊÆÕ³óÎÅÊÓÆµÈö²¥QNode RAT

CybesecurityÑо¿Ö°Ô±·¢Ã÷ºÚ¿ÍʹÓÃÐéαµÄÌØÀÊÆÕ³óÎÅÊÓÆµÈö²¥¶ñÒâÈí¼þQNode¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß·¢ËÍÒÔ¡°GOOD LOAN OFFER !!¡±ÎªÖ÷ÌâµÄÓʼþ£¬£¬£¬£¬£¬£¬£¬²¢¸½ÓÐÒ»¸öÃûΪTRUMP_SEX_SCANDAL_VIDEOµÄJAR¶ñÒâÎļþÎļþÒÔ×°ÖÃQNode RAT¡£¡£¡£QRATÊǵ䷶µÄÔ¶³Ì»á¼ûľÂí£¬£¬£¬£¬£¬£¬£¬¾ßÓлñȡϵͳÐÅÏ¢¡¢Ö´ÐÐÎļþ²Ù×÷ÒÔ¼°´ÓGoogle ChromeºÍFirefoxµÈÓ¦ÓÃÖлñȡƾ֤µÄ¹¦Ð§¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/01/hackers-using-fake-trumps-scandal-video.html
3.ÃÀ¹ú˾·¨²¿³ÆºÚ¿ÍÈëÇÖÆäMicrosoft O365ÓʼþЧÀÍÆ÷

ÃÀ¹ú˾·¨²¿£¨DoJ£©³ÆSolarWinds¹©Ó¦Á´¹¥»÷µÄºÚ¿ÍÈëÇÖÆäMicrosoft O365ÓʼþЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬²¢»á¼ûÁË3450×óÓÒ¸öÓÊÏäÕË»§¡£¡£¡£¸Ã²¿·Ö³ÆºÚ¿Í»á¼ûµÄO365ÓÊÏäÊýÄ¿½öÔÚ3£¥×óÓÒ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÆäÉñÃØÏµÍ³²¢Î´Êܵ½Ó°Ïì¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Êܵ½Ó°ÏìµÄ»ú¹¹°üÀ¨²ÆÎñ²¿¡¢¹úÎñÔº¡¢NTIA¡¢¹úÁ¢ÎÀÉúÑо¿ÔºCISA¡¢ÄÜÔ´²¿¡¢¹ú¼ÒºËÇå¾²¾ÖºÍÁìÍÁÇå¾²²¿µÈ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/solarwinds-hackers-had-access-to-over-3-000-us-doj-email-accounts/
4.TalosÅû¶SoftMaker OfficeÖеĴúÂëÖ´ÐÐÎó²î

Cisco TalosÅû¶ÁËSoftMaker OfficeÖеĴúÂëÖ´ÐÐÎó²î¡£¡£¡£µÂ¹úÈí¼þ¿ª·¢ÉÌSoftMaker Software GmbHΪСÎÒ˽¼ÒºÍÆóÒµÌṩ°ì¹«Èí¼þÌ×¼þ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÆäÎÄ×Ö´¦Öóͷ£¹¦Ð§×é¼þTextMaker¡£¡£¡£´Ë´Î·¢Ã÷µÄÎó²î»®·ÖΪ·ûºÅÀ©Õ¹Îó²î£¨CVE-2020-13544£©£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÎĵµÆÊÎöÆ÷¶ÔÓÃÓÚÖÕֹѻ·µÄ³¤¶È¾ÙÐзûºÅÀ©Õ¹£»£»£»£»ÎĵµÆÊÎö¹¦Ð§ÖеÄÊðÃûת»»Îó²î£¨CVE-2020-13545£©£»£»£»£»ÕûÊýÒç³öÎó²î£¨CVE-2020-13546£©£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÓ¦ÓÃÔÚ»º³åÇøÍⲿдÈëÊý¾Ý¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/softmaker-office-vulnerabilities-allow-code-execution-malicious-documents
5.MoFoÐû²¼2020ÄêÊý¾Ýй¶ËßËϵĻØÊ×±¨¸æ

MoFoÐû²¼2020ÄêÊý¾Ýй¶ËßËϵĻØÊ×±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬2020ÄêÊý¾Ýй¶µÄÊýÄ¿ÔöÌíÁË270£¥¡£¡£¡£¸Ã±¨¸æÍ³¼ÆÁËÈ¥ÄêµÄ25¸öÖØ´óÊý¾Ýй¶ÕûÌåËßËϰ¸¼þ£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÔÚԼĪ15£¥µÄÖØ´óÊý¾Ýй¶°¸¼þÖÐÔ¸æÊǹÍÔ±£¬£¬£¬£¬£¬£¬£¬ÆäËûÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬Ô¸æÊÇ»á¼û±»¸æ¸¶¿îƽ̨µÄ¿Í»§¡¢»¼Õß¡¢Óû§¡¢ÕÊ»§³ÖÓÐÈË»òСÎÒ˽¼Ò¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã±¨¸æÕ¹Íû£¬£¬£¬£¬£¬£¬£¬2020ÄêÇå¾²ÊÂÎñÊýÄ¿µÄ´ó·ùÔöÌí½«µ¼ÖÂ2021Ä걬·¢¸ü¶àµÄÊý¾Ýй¶ËßËϰ¸¼þ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.mofo.com/resources/insights/210104-data-breach-litigation-2020.html
6.еÄÅÔ·¹¥»÷¿ÉÒÔ´ÓGoogle TitanÖлָ´¼ÓÃÜÃÜÔ¿

·¨¹úÑо¿Ö°Ô±·¢Ã÷еÄÅÔ·¹¥»÷¿ÉÒÔ´ÓGoogle TitanÖлָ´¼ÓÃÜÃÜÔ¿¡£¡£¡£¸ÃÎó²î£¨CVE-2021-3011£©±£´æÓÚGoogle TitanºÍYubiKeyÓ²¼þÇå¾²ÃÜÔ¿µÄоƬÖУ¬£¬£¬£¬£¬£¬£¬¿É±»ÓÃÀ´»Ö¸´Ó²¼þÇå¾²ÃÜÔ¿ËùʹÓõļÓÃÜÃÜÔ¿¡£¡£¡£¹¥»÷ÕßÒ»µ©»ñµÃ¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬¼´ECDSA ˽Կ£¬£¬£¬£¬£¬£¬£¬±ã¿ÉÒÔ¿Ë¡Titan¡¢YubiKeyºÍÆäËûÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ý2FA³ÌÐò¡£¡£¡£¿ÉÊÇ´ËÀ๥»÷²»¿Éͨ¹ýInternet»òÍâµØÍøÂçÔ¶³Ì¾ÙÐУ¬£¬£¬£¬£¬£¬£¬¶øÊÇÐèÒª¶ÔÇå¾²ÃÜÔ¿¾ÙÐÐÎïÆÊÎö¼û¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-side-channel-attack-can-recover-encryption-keys-from-google-titan-security-keys/


¾©¹«Íø°²±¸11010802024551ºÅ