GRUB2ÖÐÎó²îBootHoleÓ°ÏìÊýÊ®ÒÚ×°±¸£»£»£»£»£»£»Ñо¿Ö°Ô±Åû¶TorÖÐÁ½¸ö0day²¢ÍýÏëÐû²¼ÁíÍâÈý¸ö
Ðû²¼Ê±¼ä 2020-07-311.GRUB2ÖÐÎó²îBootHoleÓ°ÏìÊýÊ®ÒÚWindowsºÍLinux×°±¸
EclypsiumÑо¿Ö°Ô±ÔÚ´ó¶¼LinuxϵͳʹÓõÄGRUB2Ö¸µ¼³ÌÐòÖз¢Ã÷ÁËÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬£¬²¢½«ÆäÃüÃûΪ¡°BootHole¡±£¨CVE-2020-10713£©£¬£¬£¬£¬£¬£¬£¬×ÝÈ»ÆôÓÃÁËSecure Boot£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒ²¿ÉÔÚÆô¶¯Àú³ÌÖÐÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬£¬»¹¿ÉÒÔʹÓøÃÎó²î×°Öó¤ÆÚÇÒÒþ²ØµÄbootkit»ò¶ñÒâÖ¸µ¼³ÌÐòÀ´¿ØÖÆ×°±¸¡£¡£¡£±ðµÄGRUB2»¹Ö§³ÖÆäËü²Ù×÷ϵͳ¡¢Äں˺ÍÖÎÀí³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬£¬£¬Xen¡£¡£¡£¸ÃÎó²î»¹Éæ¼°µ½ËùÓÐʹÓñê×¼Microsoft Third Party UEFI Certificate AuthorityµÄSecure BootµÄWindows×°±¸£¬£¬£¬£¬£¬£¬£¬ÀýÈ繤ҵ¡¢Ò½ÁÆ¡¢½ðÈÚµÈÐÐÒµÖÐʹÓõÄ×°±¸¾ùÊÜÓ°Ïì¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÊýÊ®ÒÚʹÓÃSecure BootµÄWindowsºÍLinux×°±¸¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/billions-of-devices-impacted-secure-boot-bypass/157843/
2.Ñо¿Ö°Ô±Åû¶TorÖеÄÁ½¸ö0day²¢ÍýÏëÐû²¼ÁíÍâÈý¸öÎó²î
Çå¾²Ñо¿Ö°Ô±Neal KrawetzÔÚÒÑÍùÒ»ÖÜÄÚÅú¶ÁËÁ½¸öTorÖеÄ0day£¬£¬£¬£¬£¬£¬£¬²¢ÔÊÐíÖÁÉÙÔÙÐû²¼Èý¸öTor 0day£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»¸ö¿ÉÒÔÕ¹ÏÖTorЧÀÍÆ÷ÕæÊµIPµØµã¡£¡£¡£´Ë´ÎÅû¶µÄÎó²îÖУ¬£¬£¬£¬£¬£¬£¬µÚÒ»¸ö¿É±»Ê¹ÓÃͨ¹ýɨÃèÍøÂçÅþÁ¬£¬£¬£¬£¬£¬£¬£¬Ñ°ÕÒTor¶ÀÍ̵ÄÊý¾Ý°üÊðÃûÀ´×èÖ¹Óû§ÅþÁ¬µ½TorÍøÂ磬£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý°ü¿ÉÓÃÀ´×èÖ¹TorÅþÁ¬µÄÆô¶¯²¢ÓÐÓõØÍêÈ«½ûÓÃTor¡£¡£¡£ÏñµÚÒ»¸ö0dayÒ»Ñù£¬£¬£¬£¬£¬£¬£¬µÚ¶þ¸öÒ²ÔÊÐíÍøÂçÔËÓªÉ̼ì²âTorÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬µ«Ëü¿ÉÓÃÓÚ¼ì²â¼ä½ÓÅþÁ¬¡£¡£¡£Krawetz²©Ê¿ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Ê¹Óøú×ÙÌØ¶¨TCPÊý¾Ý°üµÄÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬Ò²¿ÉÒÔÇáËɼì²âµ½TorÇŵÄÅþÁ¬¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/106567/hacking/tor-zero-day-flaws.html?utm_source=rss&utm_medium=rss&utm_campaign=tor-zero-day-flaws
3.˼¿ÆÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ11¸öÇå¾²Îó²î
˼¿ÆÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´¶à¿î²úÆ·ÖеÄ11¸öÇå¾²Îó²î¡£¡£¡£ÆäÖÐÓÐÈý¸ö½ÏΪÑÏÖØµÄÎó²î£¬£¬£¬£¬£¬£¬£¬µÚÒ»¸öΪDCNM REST APIÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-3382£©£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬£¬£¬¾ßÓÐÖÎÀíȨÏ޵Ĺ¥»÷Õß¿ÉÔ¶³ÌÖ´ÐÐí§Òâ²Ù×÷£»£»£»£»£»£»µÚ¶þ¸öΪSD-WAN vManageÈí¼þÖеÄÊÚÈ¨ÈÆ¹ýÎó²î£¨CVE-2020-3374£©£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.9£¬£¬£¬£¬£¬£¬£¬ÆäÔÊÐí¾ÓÉÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÈÆ¹ýÊÚȨ£¬£¬£¬£¬£¬£¬£¬»á¼ûÃô¸ÐÐÅÏ¢²¢ÐÞ¸ÄϵͳÉèÖ㻣»£»£»£»£»µÚÈý¸öΪSD-WAN½â¾ö¼Æ»®Èí¼þÖеĻº³åÇøÒç³öÎó²î(CVE-2020-3375),ÓÉÓÚÊäÈëÑé֤ȱ·¦µ¼Ö£¬£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»á¼ûÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢¶ÔËûÃÇûÓÐȨÏÞµÄϵͳ¾ÙÐиü¸Ä¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-fixes-severe-flaws-in-data-center-management-solution/
4.Ô¼»áÈí¼þOkCupid±£´æ¶à¸öÎó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶
Check Point ResearchÅû¶ÁËOkCupidÖеÄһϵÁÐÎó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±¶Ô¸ÃAndroidÓ¦ÓþÙÐÐÁËÄæÏò¹¤³Ì£¬£¬£¬£¬£¬£¬£¬²¢·¢Ã÷ÁËÆäÉî²ãÁ´½Ó¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ÕâÒâζ׏¥»÷Õ߿ɷ¢ËÍ×Ô½ç˵µÄ¶ñÒâÁ´½ÓÀ´·¿ª¸ÃÓ¦ÓóÌÐò¡£¡£¡£ÓÉÓÚÓ¦ÓõÄÓû§ÉèÖù¦Ð§ÖеıàÂëÎÊÌ⣬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁË·´Éä¿çÕ¾µã¾ç±¾£¨XSS£©¹¥»÷ǰÑÔ¡£¡£¡£½«¶þÕßÁ¬ÏµÆðÀ´£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ´Ó×Ô¼ºµÄЧÀÍÆ÷·¢ËÍHTTP GETÇëÇóºÍXSSÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬£¬È»ºó¿ÉÒÔͨ¹ýWebViewÖ´ÐÐJavaScript¡£¡£¡£Õâ¿ÉÄܵ¼Ö¸ÃÓ¦ÓÃÉϵÄÃô¸ÐÉèÖÃÎļþÊý¾Ý̻¶£¬£¬£¬£¬£¬£¬£¬Óû§ÕÊ»§Ð®ÖÆÒÔ¼°Óû§Éí·ÝÑéÖ¤ÁîÅÆ¡¢IDÒÔ¼°µç×ÓÓʼþµØµãй¶¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/okcupid-hackers-want-your-data-not-a-relationship/#ftag=RSSbaffb68
5.FBIÖÒÑÔNetwalkerÕë¶Ô¹ú¼ÒµÄ¹¥»÷»î¶¯²¢Ðû²¼Î£º¦Ö¸±ê
FBIÖÒÑÔÓйØNetwalkerÕë¶ÔÃÀ¹úºÍÍâ¹úÕþ¸®×éÖ¯µÄ¹¥»÷»î¶¯²¢Ðû²¼Î£º¦Ö¸±ê¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þÍÅ»ï´Ó2020Äê6ÔÂ×îÏÈÕë¶ÔÃÀ¹úºÍÍâ¹úÕþ¸®×éÖ¯£¬£¬£¬£¬£¬£¬£¬´ËǰNetwalker¼ÓÃÜÁ˼ÓÖÝ´óѧ¾É½ðɽ·ÖУҽѧԺµÄϵͳ£¬£¬£¬£¬£¬£¬£¬Ö®ºó£¬£¬£¬£¬£¬£¬£¬ÓÖÁ½´Î¹¥»÷Á˰ĴóÀûÑÇÔËÊäºÍÎïÁ÷¹«Ë¾Toll Group£¬£¬£¬£¬£¬£¬£¬ÔÚ±¾Ô¹¥»÷ÁËLorienÒ½Ôº¡£¡£¡£FBI»¹·¢Ã÷£¬£¬£¬£¬£¬£¬£¬NetwalkerÍÅ»ïÔÚ3Ô·Ýͨ¹ýʹÓÃVisual Basic¾ç±¾£¨VBS£©Ìá³«ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬4Ô·ÝÓÖ×îÏÈʹÓÃÒ×Êܹ¥»÷µÄÐéÄâרÓÃÍø£¨VPN£©×°±¸Ìᳫ¹¥»÷¡£¡£¡£FBI±Þ²ßÊܺ¦Õß¾Ù±¨ÀÕË÷Èí¼þÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖú×·×Ù¹¥»÷Õß²¢Ìá·ÀδÀ´µÄ¹¥»÷¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fbi-warns-of-netwalker-ransomware-targeting-us-government-and-orgs/
6.¿¨°Í˹»ù·¢Ã÷ºÚ¿Í×éÖ¯DeceptikonsÖ÷ÒªÕë¶ÔÅ·ÖÞÂÉËù
ÍøÂçÇå¾²¹«Ë¾¿¨°Í˹»ù·¢Ã÷ÁËÒ»¸öеĺڿÍ×éÖ¯Deceptikons£¬£¬£¬£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÅ·ÖÞ״ʦÊÂÎñËùºÍ½ðÈڿƼ¼¹«Ë¾¡£¡£¡£¸Ã×é֯רעÓÚÇÔÈ¡ÉÌÒµºÍ½ðÈÚÉñÃØ£¬£¬£¬£¬£¬£¬£¬¶ø²»ÊÇÓëÕþ¸®ÓйصÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÆäÖ÷ҪĿµÄ¶¼Î»ÓÚÅ·ÖÞ£¬£¬£¬£¬£¬£¬£¬ÎÞÒâÒ²ÓÐһЩÖж«¹ú¼Ò£¬£¬£¬£¬£¬£¬£¬ÀýÈçÒÔÉ«ÁУ¬£¬£¬£¬£¬£¬£¬Ô¼µ©ºÍ°£¼°¡£¡£¡£¸Ã×éÖ¯ÔÚ×î½üµÄ¹¥»÷ÖжԶà¸öÅ·ÖÞ״ʦÊÂÎñËùÌᳫÁËÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ý¶ñÒâPowerShell½ÅÔÀ´Ñ¬È¾Ö÷»ú¡£¡£¡£¿£¿£¿£¿¨°Í˹»ùÌåÏÖ£¬£¬£¬£¬£¬£¬£¬DeceptikonsÔÚÊÖÒÕÉϲ¢²»¿ÉÊ죬£¬£¬£¬£¬£¬£¬ÏÖÔÚ»¹Ã»ÓÐʹÓùýÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼¹¥»÷¶¼×ñÕÕÏàËÆµÄģʽ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/kaspersky-new-hacker-for-hire-mercenary-group-is-targeting-european-law-firms/#ftag=RSSbaffb68


¾©¹«Íø°²±¸11010802024551ºÅ