Area1±¨¸æ¶íÂÞ˹ͨ¹ýEximÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡£¡£¡£¡£¡£¡£»£»£»£»£»£»£»Naval Dome·¢Ã÷×Ô2ÔÂÒÔÀ´Õë¶Ôº½Ô˵Ĺ¥»÷¼¤Ôö400%
Ðû²¼Ê±¼ä 2020-06-091.Area1Ðû²¼±¨¸æ£¬£¬£¬£¬£¬¶íÂÞ˹ͨ¹ýEximÊðÀí(MTA)ÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡
Area1Ðû²¼±¨¸æ£¬£¬£¬£¬£¬ÌåÏÖ¶íÂÞ˹ͨ¹ýEximÊðÀí(MTA)ÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡¡£¡£¡£¡£¡£¡£ÃÀ¹úÍøÂçÇå¾²×ÉѯÖÒÑԳƣ¬£¬£¬£¬£¬×Ô2019Äê8ÔÂÒÔÀ´£¬£¬£¬£¬£¬Óë¶íÂÞ˹¾ü·½ÓйصĺڿÍÒ»Ö±ÔÚʹÓÃÃÀ¹úEximÓʼþ´«ÊäÊðÀí(MTA)Èí¼þÖеÄÎó²î(CVE-2019-10149)¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿ÉÒÔÓ°ÏìEximµÄ4.87µ½4.91°æ±¾£¬£¬£¬£¬£¬Ê¹ÓÃËü¿ÉÒÔÔöÌíÌØÈ¨Óû§¡¢½ûÓÃÍøÂçÇå¾²ÉèÖá¢ÌᳫBEC´¹ÂڻµÈ¡£¡£¡£¡£¡£¡£¶øÏÖÒÑÈ·¶¨2018ÄêÃÀ¹ú´óÑ¡ÖÐÖÁÉÙ44ÃûºòÑ¡ÈËʹÓÃÁËEximЧÀÍÆ÷£¬£¬£¬£¬£¬¶ø2020ÄêÃÀ¹ú´óÑ¡ÖÁÉÙ50ÃûºòÑ¡ÈËʹÓÃEximЧÀÍÆ÷¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬Area1È·ÐÅ2020ÄêÑ¡¾ÙÖеÄÏÖÈκòÑ¡ÈËÔÚ2018ÄêÑ¡¾Ùµ½2019Äê2ÔÂÖ®¼ä¿Ï¶¨»áÊܵ½CVE-2019-10149µÄÓ°Ïì¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cdn.area1security.com/reports/Area-1-Security-EximReport.pdf
2.BolsterÐû²¼2020ÄêµÚÒ»¼¾¶ÈÍøÂç´¹ÂÚºÍÔÚÏßڲƱ¨¸æ
·Àڲƹ«Ë¾BolsterÐû²¼ÁË2020ÄêµÚÒ»¼¾¶ÈÍøÂç´¹ÂÚºÍÔÚÏßڲƱ¨¸æ£¬£¬£¬£¬£¬·¢Ã÷ÓëCOVID-19Ïà¹ØµÄÚ²ÆÍøÕ¾¼¤Ôö¡£¡£¡£¡£¡£¡£ÔÚ2020ÄêµÚÒ»¼¾¶È£¬£¬£¬£¬£¬Bolster×ܹ²¼ì²âµ½854441¸öÍøÂç´¹ÂÚºÍÕ©ÆÍøÕ¾ºÍԼĪ400Íò¸ö¿ÉÒÉÍøÕ¾£¬£¬£¬£¬£¬ÆäÖÐÔ¼30£¥ÓëCOVID-19Óйء£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬´ËÀàÍøÕ¾µÄÔöÌíÁ¿Ò²ÔÚÒ»Ö±ÔöÌí£¬£¬£¬£¬£¬´ÓÒ»Ô·ÝÌìÌì3142¸öеÄÍøÒ³ÔöÌíµ½ÈýÔ·Ý8342¸öÍøÒ³£¬£¬£¬£¬£¬Ö±µ½3ÔÂ19ÈÕµÖ´ïá۷壬£¬£¬£¬£¬Ò»ÌìÄÚ½¨ÉèÁËÁè¼Ý25000¸öеÄÍøÒ³¡£¡£¡£¡£¡£¡£SaaSºÍµçÐÅÐÐÒµÊÇÊÜÍøÂç´¹ÂÚÕ©ÆÓ°Ïì×î´óµÄÐÐÒµ£¬£¬£¬£¬£¬Æä´ÎÊǽðÈÚ¡¢ÁãÊÛºÍÁ÷ýÌåÐÐÒµ¡£¡£¡£¡£¡£¡£Bolster»¹·¢Ã÷Á˶à¸öÕ©ÆÍøÕ¾ÊÛÂôαÔìµÄCOVID-19¼ÓÃÜÇ®±ÒºÍ¼ÓÃÜÇ®°ü£¬£¬£¬£¬£¬ÆäÄ¿µÄÊÇÇÔÈ¡Êý¾ÝÒÔÓÃÓÚδÀ´µÄÍøÂç´¹ÂÚ¡¢¶ñÒâÈí¼þ·Ö·¢ºÍÇÔȡƾ֤¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.businesswire.com/news/home/20200513005152/en/Bolster%E2%80%99s-Q1-2020-State-Phishing-Online-Fraud
3.Naval Dome·¢Ã÷£¬£¬£¬£¬£¬×Ô2ÔÂÒÔÀ´Õë¶Ôº½Ô˵ĺڿ͹¥»÷¼¤Ôö400%
ÒÔÉ«Áк£ÉÏÍøÂçÇ徲ר¼ÒNaval Dome³Æ£¬£¬£¬£¬£¬×Ô2020Äê2ÔÂÒÔÀ´£¬£¬£¬£¬£¬Õë¶Ôº½Ô˵ĺڿ͹¥»÷¼¤ÔöÁË400%¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÔΪCOVID-19ʹµÃº£ÉÏÄÜÔ´²¿·Ö±ÈÒÔǰ¸üÈÝÒ×Êܵ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬Í¬Ê±Ê¹¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þºÍ´¹ÂÚÓʼþ¼¤Ôö¡£¡£¡£¡£¡£¡£Naval DomeµÄCEO Itai SelaÌåÏÖ£¬£¬£¬£¬£¬ÓÉÓÚCovid-19µ¼ÖµÄÉç½»ÏÞÖÆºÍ¸ôÀë²½·¥£¬£¬£¬£¬£¬ÆÈʹÔʼװ±¸ÖÆÔìÉÌ£¨OEM£©¡¢ÊÖÒÕÖ°Ô±ºÍ¹©Ó¦É̽«Ô±¾×ÔÁ¦µÄϽµµÍ¬½Óµ½InternetÉÏ£¬£¬£¬£¬£¬OEMÊÖÒÕÖ°Ô±ÎÞ·¨µ½´¬Ö»ºÍ×ê»úÉÏÉý¼¶OTϵͳ£¬£¬£¬£¬£¬ÕâЩ¶¼µ¼Ö¸ÃÐÐÒµ¸üÒ×ÓÚ±»¹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.offshore-energy.biz/naval-dome-400-increase-in-attempted-hacks-since-february-2020/
4.WordPress²å¼þPageLayer±£´æÎó²î£¬£¬£¬£¬£¬Ó°ÏìÁè¼Ý20Íò¸öÍøÕ¾
WordfenceÍŶӷ¢Ã÷WordPress²å¼þPageLayer±£´æÁ½¸öÎó²î£¬£¬£¬£¬£¬¿ÉÄÜ»áÓ°ÏìÁè¼Ý20Íò¸öÍøÕ¾¡£¡£¡£¡£¡£¡£µÚÒ»¸öÎó²îµÄCVSSµÄÆÀ·ÖΪ7.4£¬£¬£¬£¬£¬¸ÃÎó²îµÄ±£´æÊÇÓÉÓÚ²å¼þµÄAJAX¶ËµãÖ»ÊÇͨ¹ýÒ»¸öÉí·ÝÑéÖ¤µÄ»á»°¼ì²éÇëÇóÊÇ·ñÀ´×Ô /wp-admin£¬£¬£¬£¬£¬¶ø²»¼ì²é·¢ËÍÇëÇóµÄÓû§µÄȨÏÞ£¬£¬£¬£¬£¬Òò´ËÈκλá¼ûȨÏÞµÄÓû§¶¼¿ÉÒÔÖ´ÐÐÈκβÙ×÷£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»Ê¹ÓÃɾ³ýÄÚÈÝ»òÏòÏÖÓÐÒ³Ãæ×¢Èë¶ñÒâÄÚÈÝ¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÎó²îµÄCVSSÆÀ·ÖΪ8.8·Ö£¬£¬£¬£¬£¬ÊÇÓÉÓÚȱÉÙCSRF±£»£»£»£»£»£»£»¤£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÒÔʹÓøÃÎó²îÏòÕ¾µãÒ³Ãæ×¢Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±ÒѾÐû²¼ÁËÇå¾²²¹¶¡ÒÔ¶ÔÎó²î¾ÙÐÐÐÞ¸´¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2020/06/07/pagelayer-wordpress-plugin-vulnerabilities-risked-over-200k-websites/
5.ºÚ¿ÍʹÓÃÍøÂç´¹ÂÚ¹¥»÷µÂ¹úСÎÒ˽¼Ò·À»¤×°±¸¹©Ó¦Á´
IBM X-ForceÑо¿Ö°Ô±Ðû²¼±¨¸æÌåÏÖ£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÍøÂç´¹ÂÚ¹¥»÷Ò»¼ÒµÂ¹ú¹«Ë¾µÄ¸ß²ãÖÎÀíÖ°Ô±£¬£¬£¬£¬£¬¸Ã¹«Ë¾µÄÖ÷ÒªÊÂÇéÊDzɹºÐ¡ÎÒ˽¼Ò·À»¤×°±¸£¨PPE£©£¬£¬£¬£¬£¬ÏÖÔÚºÚ¿ÍÒÑÊÔͼÇÔÈ¡100¶àλ¸ß¹ÜµÄƾ֤¡£¡£¡£¡£¡£¡£3ÔÂ30ÈÕ£¬£¬£¬£¬£¬µÂ¹úÕþ¸®Óë¸Ã¹ú´óÐ͹«Ë¾¾ÙÐоۻᣬ£¬£¬£¬£¬ÒªÇóÆäÐÖúµÂ¹ú¹ºÖÃPPEÖ®ºó£¬£¬£¬£¬£¬Ï®»÷¾Í×îÏÈÁË¡£¡£¡£¡£¡£¡£Í³Ò»Ì죬£¬£¬£¬£¬ÕâЩ´óÐ͹«Ë¾ÖеÄÒ»¸ö¹«Ë¾µÄ¸ß¹ÜÊÕµ½ÁËÀ´×Ô¶íÂÞ˹IPµØµãµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£Êܺ¦ÕßÖÐÌ©°ëΪĿµÄ¹«Ë¾ÖÐÓëÔËÓª¡¢²ÆÎñºÍ²É¹ºÏà¹ØµÄ¸ß¹Ü£¬£¬£¬£¬£¬ÁíÒ»°ëÊôÓڸù«Ë¾µÄÏàÖú¹«Ë¾µÄ¸ß¹Ü¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬ºÚ¿ÍʹÓÃǶÈëʽ³¬Á´½Ó£¬£¬£¬£¬£¬½«Êܺ¦ÕßÖØ¶¨Ïòµ½Î±×°³ÉMicrosoftµÇ¼±íµ¥µÄÍøÂç´¹ÂÚµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬²¢½«ÍøÂçµ½µÄÊý¾Ý·¢Ë͵½¶à¸öYandexµç×ÓÓʼþÕÊ»§¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-are-attacking-the-german-ppe-supply-chain/
6.еÄÍøÂç´¹Âڻͨ¹ýStackBlitz¹¤¾ßÍйܴ¹ÂÚÒ³Ãæ
Zscaler ThreatLabzÍŶӷ¢Ã÷£¬£¬£¬£¬£¬ÏÖÔÚ±£´æ¶àÖÖʹÓÃStackBlitz¹¤¾ßµÄÍøÂç´¹Âڻ£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÁËÔ¤Ö¸µ¼¿â¹¦Ð§½«ÍйܵÄÍøÒ³´ÓЧÀÍÆ÷¶ËÖ±½Ó¹ý¶Éµ½¿Í»§¶Ë¡£¡£¡£¡£¡£¡£ÔÚµÚÒ»ÖÖ´¹ÂڻÖУ¬£¬£¬£¬£¬ºÚ¿Íαװ³ÉÒ½ÁÆÎÀÉú×éÖ¯£¬£¬£¬£¬£¬Í¨¹ýOneDrive¹²ÏíЧÀÍ·¢ËÍÎĵµ£¬£¬£¬£¬£¬Óû§Ò»µ©µã»÷ÏÂÔØÁ´½Ó£¬£¬£¬£¬£¬¾Í»á±»Öض¨Ïòµ½Outlook´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£¡£ÔÚÁíÒ»ÖÖ´¹ÂڻÖУ¬£¬£¬£¬£¬´¹ÂÚÓʼþÖеÄÁ´½ÓÖ¸ÏòÒ»¸öÍøÒ³£¬£¬£¬£¬£¬²¢°üÀ¨Ò»ÌõÐÂÎÅ˵Ã÷ÄúÊÕµ½ÁË´øÓÐÏà¹ØÎĵµÏÂÔØÁ´½ÓµÄ¹²ÏíÎĵµ£¬£¬£¬£¬£¬Óû§µ¥»÷ÏÂÔØÁ´½Óºó±ã»á±»Öض¨Ïòµ½OneDriveÍøÂç´¹ÂÚÍøÒ³¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zscaler.com/blogs/research/new-campaign-abusing-stackblitz-tool-host-phishing-pages


¾©¹«Íø°²±¸11010802024551ºÅ