ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ2ÖÜ
Ðû²¼Ê±¼ä 2021-01-11> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2021Äê01ÔÂ04ÈÕÖÁ01ÔÂ10ÈÕ¹²ÊÕ¼Çå¾²Îó²î68¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇDell Wyse ThinOSĬÈÏÉèÖÃÎļþ²Ù×÷Îó²î£»£»£»£»£»Panasonic FPWIN Pro»º³åÇøÒç³öÎó²î£»£»£»£»£»Qualcomm Video NALÆÊÎöÔ½½çдÎó²î£»£»£»£»£»Google Android¼Ü¹¹CVE-2021-0313¾Ü¾øÐ§ÀÍÎó²î£»£»£»£»£»Delta Electronics Industrial Automation DOPSoft CVE-2020-27277»º³åÇøÒç³öÎó²î¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÄÉʲά¶û±¬Õ¨µ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹£»£»£»£»£»Cyble·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢£»£»£»£»£»Ì¸ÌìȺ×éSlackЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬²¨¼°È«ÇòÓû§£»£»£»£»£»ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷£»£»£»£»£»GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Dell Wyse ThinOSĬÈÏÉèÖÃÎļþ²Ù×÷Îó²î
Dell Wyse ThinOSĬÈÏÉèÖñ£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉдÎļþµ½ÏµÍ³»òÕß²Ù×÷Ä¿µÄÉèÖᣡ£¡£
https://www.dell.com/support/kbdoc/zh-hk/000180768/dsa-2020-281
2.Panasonic FPWIN Pro»º³åÇøÒç³öÎó²î
Panasonic FPWIN Pro´¦Öóͷ£ÏîÄ¿Îļþ±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-005-02
3.Qualcomm Video NALÆÊÎöÔ½½çдÎó²î
Qualcomm Video NALÆÊÎö±£´æÔ½½çдÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
4.Google Android¼Ü¹¹CVE-2021-0313¾Ü¾øÐ§ÀÍÎó²î
Google Android¼Ü¹¹±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£
https://source.android.com/security/bulletin/2021-01-01
5.Delta Electronics Industrial Automation DOPSoft CVE-2020-27277»º³åÇøÒç³öÎó²î
Delta Electronics Industrial Automation DOPSoft´¦Öóͷ£ÏîÄ¿Îļþ±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢ÄÉʲά¶û±¬Õ¨µ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹

ÄÉʲά¶ûÊÐÖÐÐı¬·¢µÄÊ¥µ®½Ú±¬Õ¨ÊÂÎñµ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹¡£¡£¡£´Ë´Î±¬Õ¨Ëð»µÁËÃÀ¹úµç»°µç±¨¹«Ë¾(AT£¦T)Òªº¦µÄÍøÂçÉèÊ©£¬£¬£¬£¬£¬£¬ÆäÔÚÌïÄÉÎ÷ÖÝ¡¢¿ÏËþ»ùÖݺͰ¢À°ÍÂíÖݵĴ󲿷ֵØÇøµÄ¿Í»§¾ùÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬ÎÞ·¨Í¨Ñ¶ºÍÉÏÍø¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬´Ë´Î±¬Õ¨»¹Ôì³ÉÁËÊýÊ®ÈËéæÃüºÍÊýÊ®ÈËÊÜÉË£¬£¬£¬£¬£¬£¬Ô¼ÓÐ100¸ö911ºô½ÐÖÐÐÄ·ºÆðÎÊÌâ¡£¡£¡£AT£¦TÌåÏÖ×èÖ¹ÉÏÖÜÈý£¬£¬£¬£¬£¬£¬ËùÓÐЧÀÍ»ù±¾ÒѾ»Ö¸´¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/nashville-bombing-spotlights-vulnerable-voice-data-networks
2¡¢Cyble·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢

CybleµÄÑо¿ÍŶӷ¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÀ´×Ô¶à¸öƽ̨ºÍÈí¼þ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨730Íòºþ±±Ê¡¾£ÖÝÊй«°²ÏØ×¡ÃñµÄÉí·ÝÖ¤ºÅ¡¢ÐÔ±ð¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÊÖ»ú¡¢µØµãºÍ´úÂëµÈÐÅÏ¢£¬£¬£¬£¬£¬£¬4180Íò¸ö΢²©Óû§µÄÕ˺źÍÏìÓ¦µÄÊÖ»úºÅÂ룬£¬£¬£¬£¬£¬ÒÔ¼°1.92ÒÚQQÓû§µÄÕ˺źÍÏìÓ¦µÄÊÖ»úºÅÂë¡£¡£¡£´Ë´Îй¶µÄÓëÖйú¹«ÃñÓйصļͼ×ÜÊýÁè¼Ý2ÒÚ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112966/deep-web/chinese-citizens-data-darkweb.html
3¡¢Ì¸ÌìȺ×éSlackЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬²¨¼°È«ÇòÓû§

̸ÌìȺ×éSlackЧÀͱ¬·¢ÁË2021ÄêµÄÊ×´ÎÖÐÖ¹£¬£¬£¬£¬£¬£¬²¨¼°È«ÇòÓû§¡£¡£¡£ÐÂÄêºóµÄµÚÒ»¸öÊÂÇéÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú¶«²¿Ê±¼ä1ÔÂ4ÈÕÉÏÎç10µãSlack·ºÆðÁËÖÐÖ¹£¬£¬£¬£¬£¬£¬Ó°ÏìÁË×ÀÃæ¿Í»§¶ËºÍWeb½çÃæ£¬£¬£¬£¬£¬£¬Óû§ÎÞ·¨ÅþÁ¬Ð§ÀÍÆ÷¡¢ÎÞ·¨·¢ËͺÍÎüÊÕÐÂÎŲ¢ÇÒÎÞ·¨¼ìË÷ƵµÀÀúÊ·¼Í¼¡£¡£¡£×î³õ±¬·¢ÖÐֹʱSlack³ÆÕâÖ»Ó°ÏìÁËÐÂÎÅת´ï£¬£¬£¬£¬£¬£¬µ«ËæºóSlackµÄËùÓÐЧÀ͵ͼ·ºÆðÁËÖÐÖ¹¡£¡£¡£ÏÖÔÚSlack»Ö¸´Á˿ͻ§¶ËµÄ²¿·Ö¹¦Ð§£¬£¬£¬£¬£¬£¬ÈçÎüÊպͷ¢ËÍÐÂÎÅ£¬£¬£¬£¬£¬£¬µ«GoogleÈÕÀúºÍOutlookÈÕÀúµÈЧÀÍÈÔÎÞ·¨Õý³£ÊÂÇé¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/technology/slack-suffers-its-first-massive-outage-of-2021/
4¡¢ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷

ESTsecurityÅû¶APT×éÖ¯Thallium£¨ÓÖÃûAPT37£©Õë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬ºÚ¿Í¸Ä¶¯ÁËÒ»¿î˽ÈË¹ÉÆ±Í¶×ÊÐÅϢת´ïµÄÓ¦Ó㬣¬£¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâ´úÂë¡£¡£¡£ThalliumÊ×ÏÈʹÓÃNullsoft¾ç±¾×°ÖÃϵͳ£¨NSIS£©ÌìÉúWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬¸ÃÎļþ°üÀ¨ÁËÀ´×ÔÕýµ±¹ÉƱͶ×ÊÓ¦ÓóÌÐòµÄÕýµ±ÎļþºÍ¶ñÒâ´úÂë¡£¡£¡£µ±Óû§ÔÚ×°ÖÃÕæÕýµÄ¹ÉƱͶ×ÊÓ¦ÓóÌÐòʱ£¬£¬£¬£¬£¬£¬ºǫ́ͬʱÔËÐжñÒâ¾ç±¾¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-software-supply-chain-attack-targets-stock-investors/
5¡¢GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯

ÍøÂçÇå¾²¹«Ë¾GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²î£¨CVE-2020-29583£©µÄ¹¥»÷»î¶¯¡£¡£¡£¸ÃÎó²îÓëZyxelÖÐÓ²±àÂëµÄºóÃÅÕÊ»§zyfwpÓйأ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÀ´½ÓÊÜÍøÂç×°±¸¡£¡£¡£GreyNoise¼ì²âµ½Èý¸ö²î±ðµÄIPµØµãÕýÔÚɨÃèSSH×°±¸£¬£¬£¬£¬£¬£¬²¢ÊµÑéʹÓÃZyxelºóÃŵǼ¡£¡£¡£¿ÉÊÇÕâЩ¹¥»÷Õß²¢Ã»ÓÐרÃÅÕë¶ÔZyxel×°±¸£¬£¬£¬£¬£¬£¬¶øÊÇɨÃèInternetÉÏËùÓÐÕýÔÚÔËÐеÄSSH¡£¡£¡£ÆäÖÐÒ»¸ö¹¥»÷ÕßʹÓÃÁËCobalt StrikeµÄÄÚÖÃSSH¿Í»§¶ËÀ´Ö´ÐÐɨÃ裬£¬£¬£¬£¬£¬Ö¼ÔÚÈÆ¹ý¼ì²â¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-start-exploiting-the-new-backdoor-in-zyxel-devices/


¾©¹«Íø°²±¸11010802024551ºÅ