CISAÐû²¼2019²ÆÄêΣº¦Îó²îÆÀ¹ÀµÄÐÅϢͼ£»£»£»£»QNAPÐÞ¸´HelpdeskÖеÄÎó²î£¬£¬ £¬¿Éµ¼ÖÂNAS×°±¸½ÓÊÜ

Ðû²¼Ê±¼ä 2020-10-09
1.CISAÐû²¼2019²ÆÄêΣº¦Îó²îÆÀ¹ÀµÄÐÅϢͼ


1.png


ÍøÂçÇå¾²ºÍÐÅÏ¢Çå¾²»ú¹¹(CISA)Ðû²¼ÁË2019²ÆÄê¾ÙÐеÄ44ÏîΣº¦ºÍÎó²îÆÀ¹À£¨RVA£©£¬£¬ £¬ÒÔ¼°MITER¶Ô¿¹Õ½ÂÔ¡¢ÊÖÒÕºÍ֪ʶ£¨ATT£¦CK£©¿ò¼ÜµÄÆÊÎöÐÅϢͼ¡£¡£¸ÃÐÅϢͼ±íÈ·¶¨ÁËCISAÔÚ¿ç¶à¸ö²¿·ÖµÄRVAsʱ´úÊӲ쵽µÄͨÀýÀֳɹ¥»÷·¾¶£¬£¬ £¬ÍøÂç¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩ¹¥»÷;¾¶À´¹¥»÷×éÖ¯¡£¡£CISAÃãÀøÍøÂçÖÎÀíÔ±ºÍITרҵְԱÉó²éÐÅϢͼ²¢Ó¦ÓÃÍÆ¼öµÄ·ÀÓùÕ½ÂÔ£¬£¬ £¬ÒÔ±ÜÃâÊܵ½ÒÑÖªÕ½ÊõºÍÊÖÒյĹ¥»÷¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/10/07/cisa-releases-fy2019-risk-vulnerability-assessment-infographic


2.Çå¾²¹«Ë¾Arctic WolfÐû²¼Çå¾²ÔËÓªÄê¶È±¨¸æ


2.png


Çå¾²¹«Ë¾Arctic WolfÐû²¼ÁËÒ»·ÝÇå¾²ÔËÓªÄê¶È±¨¸æ¡£¡£±¨¸æÏÔʾ£¬£¬ £¬×Ô3ÔÂÒÔÀ´£¬£¬ £¬°µÍøÉϹûÕæµÄ¹«Ë¾Æ¾Ö¤ÊýÄ¿ÔöÌíÁË429£¥¡£¡£ÔÚÊӲ쵽µÄ¸ßΣº¦Çå¾²ÊÂÎñÖУ¬£¬ £¬ÓÐ35£¥±¬·¢ÔÚ8:00 PMºÍ8:00 AMÖ®¼ä£¬£¬ £¬¶ø14£¥±¬·¢ÔÚÖÜÄ©£¬£¬ £¬ÕâÊÇÐí¶àÄÚ²¿Çå¾²ÍŶӲ»ÔÚÏßµÄʱ¼ä¡£¡£±ðµÄ£¬£¬ £¬ÍøÂç´¹ÂÚºÍÀÕË÷Èí¼þ¹¥»÷´ÎÊýÔöÌíÁË64£¥£¬£¬ £¬ºÚ¿Í¸ü¶àµÄÒÔCOVID-19Ö÷ÌâΪÓÕ¶ü£¬£¬ £¬À´Õë¶ÔÔ¶³ÌÊÂÇéÕß¡£¡£


Ô­ÎÄÁ´½Ó£º

https://arcticwolf.com/resources/analyst-reports/security-operations-annual-report


3.GoogleÐû²¼µÄChromeÇå¾²¸üÐÂÐÞ¸´¶à¸öÎó²î


3.png


GoogleÐû²¼µÄChromeÇå¾²¸üÐÂÕë¶ÔWindows¡¢MacºÍLinux°æ±¾ÐÞ¸´ÁË35¸öÎó²î¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪ֧¸¶ÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15967£©£¬£¬ £¬Æä´ÎΪBlink¡¢WebRTC¡¢NFC¡¢´òÓ¡¡¢ÒôƵ¡¢×Ô¶¯Ìî³äºÍÃÜÂëÖÎÀíÆ÷ÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15968¡¢CVE-2020-15969¡¢CVE-2020-15970¡¢CVE-2020-15971¡¢CVE-2020-15972¡¢CVE-2020-15990ºÍCVE-2020-15991£©¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/10/07/google-releases-security-updates-chrome


4.QNAPÐÞ¸´HelpdeskÖеÄÎó²î£¬£¬ £¬¿Éµ¼ÖÂNAS×°±¸½ÓÊÜ


4.png


QNAPÐÞ¸´ÁËHelpdeskÓ¦ÓÃÖеÄÁ½¸ö½ÏΪÑÏÖØµÄÎó²î£¬£¬ £¬ÕâЩÎó²î¿É±»¹¥»÷ÕßʹÓýÓÊÜQNAPÍøÂçÅþÁ¬´æ´¢£¨NAS£©×°±¸¡£¡£´Ë´ÎÐÞ¸´Á½¸öÎó²î¾ùΪ²»Êʵ±µÄ»á¼û¿ØÖÆÎó²î£¬£¬ £¬±»¸ú×ÙΪCVE-2020-2506ºÍCVE-2020-2507£¬£¬ £¬¹¥»÷ÕßÀÖ³ÉʹÓúó¿É»ñµÃ¶ÔQNAP×°±¸µÄ¿ØÖÆ¡£¡£QNAPÌåÏÖ£¬£¬ £¬ÆäÒÑÐÞ¸´ÁËHelpdesk 3.0.3¼°¸ü¸ß°æ±¾µÄÎó²î£¬£¬ £¬Ë¼Á¿µ½Îó²îµÄÑÏÖØË®Æ½£¬£¬ £¬Óû§Ó¦¸Ã¾¡¿ì½«¸ÃÓ¦ÓóÌÐòÉý¼¶µ½×îа汾¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/qnap-fixes-critical-flaws-that-could-lead-to-device-takeover/


5.ºÚ¿ÍÒÔÌØÀÊÆÕ¿µ½¡ÐÅϢΪÓÕ¶ü¾ÙÐд¹ÂÚ¹¥»÷


5.png


ÍøÂçÇå¾²¹«Ë¾ProofPointµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬ £¬ºÚ¿ÍÒÔÌØÀÊÆÕ¿µ½¡ÐÅϢΪÓÕ¶üÌᳫеÄÍøÂç´¹Âڻ¡£¡£ºÚ¿Í»Ñ³ÆËûÃÇÓÐÌØÀÊÆÕ¿µ½¡ÇéÐεÄ×îÐÂÄÚ²¿ÐÅÏ¢£¬£¬ £¬µ«ÒªÇóÓû§Ê¹ÓÃǶÈëʽÁ´½ÓÏÂÔØÎĵµ¡£¡£Êܺ¦È˵ã»÷Á´½Óºó£¬£¬ £¬»á±»Öض¨Ïòµ½Ò»¸öGoogleÎĵµ£¬£¬ £¬²¢Åú×¢¸ÃÎĵµÒÑͨ¹ýGoogleɨÃè²¢ÇÒÊÇÇå¾²µÄ¡£¡£Óû§Æ¾Ö¤ÌáÐѵã»÷ÏÂÔØÁ´½Óºó£¬£¬ £¬½«ÏÂÔØBazarLoader¿ÉÖ´ÐÐÎļþ¡£¡£×îÖÕ£¬£¬ £¬¹¥»÷Õß»áÔÚÊÜѬȾϵͳÖÐ×°ÖÃRyukÀÕË÷Èí¼þ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-emails-lure-victims-with-inside-info-on-trumps-health/


6.ºÚ¿Í¿ÉʹÓÃComcastµçÊÓÒ£¿£¿£¿£¿ØÆ÷ÇÔÌýÓû§¶Ô»°


6.png


GuardicoreµÄÑо¿Ö°Ô±¶ÔComcastµÄXR11 Xfinity Voice Remote¾ÙÐÐÁËÆÊÎö£¬£¬ £¬·¢Ã÷ÁËÒ»ÖÖÎÞÐèÎïÆÊÎö¼û»òÓû§½»»¥¼´¿É½«Æäת±äΪ¼àÌý×°±¸µÄÒªÁ죬£¬ £¬±»³ÆÎªWarezThe Remote¹¥»÷¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬ £¬ÈÏÕæ¼ÓÃÜͨѶµÄRF4CE£¨ÏûºÄµç×ÓÉ䯵£©Ð­ÒéµÄʵÑé±£´æÎó²î¡£¡£Æäͨ¹ý¶ÔÒ£¿£¿£¿£¿ØÆ÷µÄ¹Ì¼þ¾ÙÐÐÄæÏò¹¤³ÌÕÒµ½ÁËÓïÒôÂ¼ÖÆ°´Å¥µÄ´úÂ룬£¬ £¬ÔÚÐ޸ĴúÂëºó»áÿ·ÖÖÓÌᳫһ´Î¼ÒôÇëÇ󣬣¬ £¬²¢»áÔÚÔ޳ɺóÂ¼ÖÆ10·ÖÖÓ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/comcast-cable-remotes-hacked-to-snoop-on-conversations/