AdobeÐû²¼´øÍâ¸üУ¬£¬£¬£¬£¬ÐÞ¸´ColdfusionÖеÄ3¸öÎó²î£»£»£»£»£»Ð¹¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯
Ðû²¼Ê±¼ä 2019-09-26
AdobeÐû²¼´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ColdFusionÖеÄÈý¸öÎó²î£¬£¬£¬£¬£¬ÆäÖÐÁ½¸öÎó²îΪcritical¼¶±ð£¬£¬£¬£¬£¬ÁíÒ»¸öΪimportant¼¶±ð¡£¡£¡£¡£¡£¡£Á½¸öcriticalÎó²îÊÇÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬°üÀ¨¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÎó²î£¨CVE-2019-8073£©ºÍÔÊÐí¹¥»÷ÕßÈÆ¹ý»á¼û¿ØÖƵÄ·¾¶±éÀúÎó²î£¨CVE-2019-8074£©¡£¡£¡£¡£¡£¡£Ò»¸öimportantÎó²îÊÇÈÆ¹ýÎó²î£¨CVE-2019-8072£©£¬£¬£¬£¬£¬¸ÃÎó²î¿Éµ¼ÖÂÐÅϢй¶¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨ColdFusion 2018 Update 4¼°¸üÔç°æ±¾ºÍColdFusion 2016 Update 11¼°¸üÔç°æ±¾£¬£¬£¬£¬£¬½¨ÒéÓû§¸üÐÂÖÁColdFusion 2018 Update 5ºÍColdFusion 2016 Update 12¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerabilities-in-coldfusion/2.Ô¼»áÓ¦ÓÃHeyyoÒâÍâй¶½ü7.2ÍòÓû§ÐÅÏ¢
ÔÚÏßÔ¼»áÓ¦ÓÃHeyyoµÄElasticsearchʵÀýÒòδÉèÃÜÂë¶øÔÚ»¥ÁªÍøÉÏ̻¶£¬£¬£¬£¬£¬µ¼Ö½ü7.2ÍòÓû§µÄÏêϸÒþ˽ÐÅϢй¶¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÊÇÓÉWizCaseÇå¾²Ñо¿Ö°Ô±·¢Ã÷µÄ£¬£¬£¬£¬£¬Æ¾Ö¤ZDNetµÄ±¨µÀ£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷ÊÇÒ»¸öÉú²úЧÀÍÆ÷£¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ð¡¢Éí¸ß¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬ¡¢Î»ÖÃÐÅÏ¢¡¢Ô¼»áÆ«ºÃµÈ¡£¡£¡£¡£¡£¡£¸ÃÓ¦ÓÃËùÊôµÄÒÁ˹̹²¼¶ûÈí¼þ¹«Ë¾ÔÚ½üÒ»¸öÐÇÆÚÄÚδÄܻظ´ZDNetµÄѯÎÊ£¬£¬£¬£¬£¬Ð¹Â¶µÄЧÀÍÆ÷ÔÚZDNetת´ïÍÁ¶úÆäCERTºó»ñµÃ±£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/heyyo-dating-app-leaked-users-personal-data-photos-location-data-more/3.й¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯
ƾ֤Palo Alto NetworksµÄ±¨¸æ£¬£¬£¬£¬£¬Ò»¸öÐµĹ¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØµÄÔËÊäºÍº½ÔË×éÖ¯¡£¡£¡£¡£¡£¡£xHuntÖ÷ÒªÔÚ2019Äê5ÔÂÖÁ6ÔÂÖ®¼ä¾ÙÐУ¬£¬£¬£¬£¬Ñо¿Ö°Ô±½«¸Ã¹¥»÷»î¶¯ÖÐʹÓõŤ¾ßÓë2018Äê7ÔÂÖÁ12ÔÂÖ®¼äÕë¶Ô¿ÆÍþÌØµÄ¹¥»÷¹ØÁªÆðÀ´¡£¡£¡£¡£¡£¡£×÷Ϊй¥»÷µÄÒ»²¿·Ö£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËSakabota¡¢Histoka¡¢NeteroºÍKilluaµÈºóÃÅ£¬£¬£¬£¬£¬ÕâЩºóÃÅͨ¹ýHTTPÓëC&CͨѶ£¬£¬£¬£¬£¬²¿·Ö±äÌåҲʹÓÃDNSËíµÀ»òµç×ÓÓʼþ¾ÙÐÐͨѶ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÒ²ÔÚÊÜѬȾµÄϵͳÉÏÊÍ·ÅÁ˶ñÒ⹤¾ßGonºÍEYE¡£¡£¡£¡£¡£¡£Ö»¹Ü2018ÄêºÍ2019ÄêµÄ¹¥»÷»î¶¯ÖÐʹÓõŤ¾ß±£´æÖصþ£¬£¬£¬£¬£¬µ«ÏÖÔÚÉв»¿ÉÈ·¶¨ÕâÁ½¸ö»î¶¯ÊÇ·ñÓÉͳһ¹¥»÷ÕßÌᳫ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/xhunt-campaign-targets-kuwait-transportation-and-shipping-sector4.Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß
¿¨°Í˹»ùÑо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß¡£¡£¡£¡£¡£¡£YatronÖ÷Òª»ùÓÚ¿ªÔ´ÀÕË÷Èí¼þHidden Tear¾ÙÐпª·¢£¬£¬£¬£¬£¬Æ¾Ö¤¿¨°Í˹»ùµÄͳ¼ÆÊý¾Ý£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þÔÚÒÑÍùÒ»ÄêÖÐÊÔͼÌᳫ600¶à´ÎѬȾ£¬£¬£¬£¬£¬ÆäÖдó´ó¶¼¹¥»÷λÓڵ¹ú¡¢Öйú¡¢¶íÂÞ˹¡¢Ó¡¶ÈºÍÃåµé¡£¡£¡£¡£¡£¡£FortuneCryptµÄÖ÷ÒªÌØµãÊÇʹÓÃBlitzMax±àÒëÆ÷¾ÙÐбàÒ룬£¬£¬£¬£¬ÕâÊÇ¿¨°Í˹»ùÊӲ쵽µÄÊ׸öʹÓÃBlitz BASIC±àдµÄÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£È¥Ä꿨°Í˹»ù¹²¼Í¼ÁËTrojan-Ransom.Win32.Crypren¼Ò×åµÄ6000¶à´Î¹¥»÷£¬£¬£¬£¬£¬Êܹ¥»÷Êý×î¶àµÄ¹ú¼ÒÊǶíÂÞ˹¡¢°ÍÎ÷¡¢µÂ¹ú¡¢º«¹úºÍÒÁÀÊ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/ransomware-two-pieces-of-good-news/93355/
5.·¸·¨ÍÅ»ïTortoiseshellʹÓÃÐéÎ±ÍøÕ¾Ãé×¼ÃÀ¹úÍËÎéÎäÊ¿
˼¿ÆTalos·¢Ã÷ÓÉÒÁÀÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯TortoiseshellÕýÊÔͼʹÓÃÐéαÕÐÆ¸ÍøÕ¾Õë¶ÔÃÀ¹úÍËÎéÎäÊ¿¡£¡£¡£¡£¡£¡£¸ÃÍøÕ¾µÄÓòÃûÊÇhiremilitaryheroes[.]com£¬£¬£¬£¬£¬ÉÏÃæÌṩһ¸ö×ÀÃæ°æÈí¼þµÄÏÂÔØ£¬£¬£¬£¬£¬µ«¸ÃÈí¼þ»áÏÔʾװÖÃʧ°ÜÐÅÏ¢²¢ÏÖʵÉÏ×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»áÔÚºǫ́ÔËÐÐÍøÂçÓû§µÄÐÅÏ¢£¬£¬£¬£¬£¬È»ºó·¢Ë͵½¹¥»÷ÕßµÄGmailÓÊÏä¡£¡£¡£¡£¡£¡£ÍøÂçµÄÐÅÏ¢°üÀ¨ÏµÍ³²¹¶¡¼¶±ð¡¢´¦Öóͷ£Æ÷ÊýÄ¿¡¢ÍøÂçÉèÖá¢Ó²¼þºÍ¹Ì¼þ°æ±¾¡¢Óò¿ØÖÆÆ÷¡¢ÖÎÀíÔ±Ãû³Æ¡¢ÕË»§ÁÐ±í¡¢ÈÕÆÚ¡¢Ê±¼ä¡¢Çý¶¯³ÌÐòµÈ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»¹»áÔÚÊܺ¦ÕßµÄϵͳÉÏ×°ÖÃÔ¶¿ØÄ¾Âí¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-military-veterans-targeted-by-iranian-state-hackers/
6.·¸·¨ÍÅ»ïMagecartÃé×¼¹«¹²Wi-Fi±³ºóµÄÉÌÓ÷ÓÉÆ÷
Magecart Group 5±»·¢Ã÷ÕýÔÚÃé×¼±¸×¢ÈëÉÌÓ÷ÓÉÆ÷ÖеĶñÒâ´úÂë¾ÙÐвâÊÔ¡£¡£¡£¡£¡£¡£¸Ã´úÂëÕë¶ÔµÄ·ÓÉÆ÷Ö÷ÒªÓÃÓÚÔÚ¹«¹²³¡ºÏºÍÂùÝÖÐÌṩÃâ·Ñ»ò¸¶·ÑµÄWi-FiЧÀÍ£¬£¬£¬£¬£¬ÈôÊÇÀֳɣ¬£¬£¬£¬£¬¹¥»÷Õß½«Äܹ»Ñ¬È¾ÕâЩ·ÓÉÆ÷²¢ÔÚ»ú³¡¡¢¿§·Èµê¡¢Âùݵȹ«¹²ÉèÊ©ÖÐÇÔÈ¡ÆäWi-FiÓû§µÄÖ§¸¶Êý¾Ý¡£¡£¡£¡£¡£¡£ÕâЩ´úÂë±»×¢Èëµ½Á¼ÐÔµÄJavaScriptÎļþÖУ¬£¬£¬£¬£¬È»ºó¼ÓÔØµ½Ö§³ÖL7ÐÒéµÄÉÌÓ÷ÓÉÆ÷¡£¡£¡£¡£¡£¡£L7ÐÒéÖ¸µÄÊÇOSIµÄÓ¦ÓòãÐÒ飬£¬£¬£¬£¬³£ÓÃÓÚÉÌÓ÷ÓÉÆ÷ÒÔ¾ÙÐÐÁ÷Á¿¸ºÔØÆ½ºâºÍÔÚÓû§ÅþÁ¬µ½Wi-FiЧÀÍʱÏÔÊ¾Ò³Ãæ»ò¹ã¸æ¡£¡£¡£¡£¡£¡£ÏÖÔÚÑо¿Ö°Ô±ÉÐδ·¢Ã÷ÏÖʵµÄ¹¥»÷°¸Àý¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/magecart-group-targets-routers-behind-public-wi-fi-networks/148662/


¾©¹«Íø°²±¸11010802024551ºÅ