ºÚ¿ÍʹÓÃGoogleÔÆ´¹ÂÚ¹¥»÷ÇÔÈ¡Office 365ƾ֤£»£»£»£» £»£»ºÚ¿ÍÈëÇÖTwilioÔÆ´æ´¢ÏµÍ³²¢ÐÞ¸ÄJavaScript SDK¸±±¾

Ðû²¼Ê±¼ä 2020-07-23

1.ºÚ¿ÍʹÓÃGoogleÔÆÌᳫ´¹ÂÚ¹¥»÷£¬ £¬£¬£¬ £¬£¬ £¬£¬ÇÔÈ¡Office 365ƾ֤


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Check PointÑо¿Ö°Ô±·¢Ã÷£¬ £¬£¬£¬ £¬£¬ £¬£¬ºÚ¿ÍʹÓÃGoogleÔÆÌᳫ´¹ÂÚ¹¥»÷£¬ £¬£¬£¬ £¬£¬ £¬£¬Ö¼ÔÚÇÔÈ¡Office 365ƾ֤¡£¡£ ¡£ËûÃÇʹÓÃGoogleÔÆÓ²ÅÌÍйܶñÒâPDFÎĵµ£¬ £¬£¬£¬ £¬£¬ £¬£¬²¢Ê¹ÓÃGoogleµÄstorage.googleapis[.]comÍйÜÍøÂç´¹ÂÚÒ³Ãæ¡£¡£ ¡£Check Point·¢Ã÷¶ñÒâPDF¿´ÆðÀ´ÏñÒ»¸ö¿ÉÒÔͨ¹ý»ùÓÚwebµÄЭ×÷ƽ̨»á¼ûSharePointÌṩÄÚÈݵÄÃÅ»§£¬ £¬£¬£¬ £¬£¬ £¬£¬Ò»µ©Óû§µã»÷Access DocumentÁ´½Ó£¬ £¬£¬£¬ £¬£¬ £¬£¬ÍøÂç´¹ÂÚÒ³Ãæ¾Í»áÒªÇóÌá½»Office 365ƾ֤»ò×éÖ¯IDµÇ¼µÄÐÅÏ¢¡£¡£ ¡£ÓÉÓÚÒ³ÃæÊÇ´ÓÕýµ±ÈªÔ´¼ÓÔØµÄ£¬ £¬£¬£¬ £¬£¬ £¬£¬²¢ÇÒÔÚÁ÷³Ì¿¢ÊÂʱ¸Ã´¹ÂÚÍøÕ¾Ò²»á½»¸¶Õý°æPDFÎĵµ£¬ £¬£¬£¬ £¬£¬ £¬£¬Òò´ËÊܺ¦ÕߺÜÄÑ·¢Ã÷¸ÃȦÌס£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-campaign-uses-google-cloud-services-to-steal-office-365-logins/    


2.ºÚ¿ÍÈëÇÖTwilioÔÆ´æ´¢ÏµÍ³²¢ÐÞ¸ÄJavaScript SDK¸±±¾


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Twilio֤ʵ£¬ £¬£¬£¬ £¬£¬ £¬£¬ÓкڿÍÈëÇÖÁËÆäÔÆ´æ´¢ÏµÍ³£¬ £¬£¬£¬ £¬£¬ £¬£¬²¢ÐÞ¸ÄÁËÆä¿Í»§Ê¹ÓõÄJavaScript SDKµÄ¸±±¾¡£¡£ ¡£TwilioÚ¹ÊÍ£¬ £¬£¬£¬ £¬£¬ £¬£¬ÓÐÈ˽øÈëÁËTwilioµÄAmazon Web Services S3´æ´¢Í°£¬ £¬£¬£¬ £¬£¬ £¬£¬²¢¸Ä¶¯ÁËTaskRouter v1.20 SDK£¬ £¬£¬£¬ £¬£¬ £¬£¬ÔÚÆäÖмÓÈëÁËÒ»¶Î·Ç¶ñÒâ´úÂ룬 £¬£¬£¬ £¬£¬ £¬£¬Ö¼ÔÚ×·×ÙÊÇ·ñÐÞ¸ÄÀֳɡ£¡£ ¡£ÏêϸÀ´Ëµ£¬ £¬£¬£¬ £¬£¬ £¬£¬ºÚ¿Í½«´úÂëÌí¼Óµ½TaskRouter.js v1.20 SDKµÄĩ⣬ £¬£¬£¬ £¬£¬ £¬£¬¸ÃSDKÏòhxxps://gold.platinumus.top/track/awswrite?q=dmn·¢³öHTTP GETÇëÇó£¬ £¬£¬£¬ £¬£¬ £¬£¬²¢×ñÕÕ¸ÃÇëÇóÔÚHTMLÖзµ»ØµÄURL¡£¡£ ¡£¸Ã¹«Ë¾½²»°ÈËÌåÏÖ£¬ £¬£¬£¬ £¬£¬ £¬£¬ËûÃÇÔÚ·¢Ã÷¸ÃÊÂÎñºó¾ÍÁ¬Ã¦¹Ø±ÕÁËÉèÖùýʧµÄS3´æ´¢Í°£¬ £¬£¬£¬ £¬£¬ £¬£¬²¢ÉóºËÁËËùÓÐS3´æ´¢Í°¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.theregister.com/2020/07/21/twilio_sdk_code_injection/


3.Èí¼þ¹«Ë¾MacKievÔÆÐ§ÀÍÆ÷ÉèÖùýʧй¶25GBÓû§Êý¾Ý


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÍøÂçÇå¾²¹«Ë¾WizCaseµÄÑо¿Ö°Ô±·¢Ã÷Èí¼þ¹«Ë¾MacKievÔÆÐ§ÀÍÆ÷ÉèÖùýʧ£¬ £¬£¬£¬ £¬£¬ £¬£¬Ð¹Â¶25GBÓû§Êý¾Ý£¬ £¬£¬£¬ £¬£¬ £¬£¬¸Ã¹«Ë¾ÖÎÀí×ÅÖøÃûµÄÈí¼þFamily Tree Maker£¨Ò²³ÆÎªFTM£©¡£¡£ ¡£´Ë´Îй¶µÄÊý¾Ý¿â°üÀ¨Ô¼Äª25GBµÄÊý¾Ý£¬ £¬£¬£¬ £¬£¬ £¬£¬¸ÃÊý¾Ý¿â»¹»áÓëAncestry.comµÄÓû§Êý¾Ý¾ÙÐÐͬ²½¡£¡£ ¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨IPµØµã¡¢Ê±¼ä´Á¼Ç¡¢µç×ÓÓʼþµØµã¡¢Í˿Óû§Ö§³ÖÐÅÏ¢¡¢ÄÚ²¿ÏµÍ³Óû§±êʶ¡¢¶©ÔÄÀàÐͺÍ״̬¡¢ÊÖÒÕÊý¾Ý£¨ÀýÈç¹ýʧÈÕÖ¾£©¡¢Óû§Î»ÖÃÊý¾Ý£¨°üÀ¨µØÀíλÖÃ×ø±êºÍ¶¼»á£©¡£¡£ ¡£¾ÝÑо¿Ö°Ô±³Æ£¬ £¬£¬£¬ £¬£¬ £¬£¬¸Ã×ß©ÊÂÎñ¿ÉÄÜ»áÓ°ÏìԼĪ60000ÃûMacKievÓû§¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/software-firm-leaks-ancestry-com-user-data/


4.ºÚ¿Í¹¥»÷Dunzo²¢ÔÚShinyHunter¹ûÕæ11.2GB͵ȡµÄÊý¾Ý


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¹È¸èÔÞÖúµÄÍâÂôЧÀ͹«Ë¾DunzoÌåÏÖÆäÔâµ½Á˹¥»÷£¬ £¬£¬£¬ £¬£¬ £¬£¬²¢Ð¹Â¶ÁËÒ»¸ö°üÀ¨¿Í»§¼Í¼µÄÊý¾Ý¿â¡£¡£ ¡£ÓÉÓÚDunzoûÓÐ͸¶ÊÜÓ°ÏìÓû§µÄÊýÄ¿£¬ £¬£¬£¬ £¬£¬ £¬£¬Òò´ËÉÐδȷ¶¨Ãü¾Ýй¶µÄ¹æÄ££¬ £¬£¬£¬ £¬£¬ £¬£¬¿ÉÊÇ£¬ £¬£¬£¬ £¬£¬ £¬£¬¸Ã¹«Ë¾ÌåÏÖ²ÆÎñÊý¾ÝºÍÐÅÓÿ¨ÐÅÏ¢²¢Î´Ð¹Â¶¡£¡£ ¡£ÏÖÔÚ£¬ £¬£¬£¬ £¬£¬ £¬£¬±»µÁµÄ11.2GBÊý¾Ý±»ºÚ¿Í·ÅÔÚShinyHunter£¬ £¬£¬£¬ £¬£¬ £¬£¬×ܹ²ÓÐÁè¼Ý800ÍòÐеÄÐÅÏ¢£¬ £¬£¬£¬ £¬£¬ £¬£¬°üÀ¨Óû§Ãû¡¢¹ú¼Ò¡¢×°±¸¡¢È«Ãû¡¢ÉñÒþÃØÔ¿¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂëÉ¢ÁС¢µç»°ºÅÂë¡¢ÁîÅÆºÅÂë¡¢¼ÓÈëÈÕÆÚºÍµÚÒ»¸ö/×îºóÒ»¸öλÖõȡ£¡£ ¡£¸Ã¹«Ë¾ÌåÏÖËûÃǵÄÊÖÒÕÍŶÓÒѾ­Ñ¸ËÙ½â¾öÁ˸ÃÎÊÌ⣬ £¬£¬£¬ £¬£¬ £¬£¬ÐÞ¸´ÁËÎó²î²¢Ìí¼ÓÁËеÄÇ徲ЭÒé²ã¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/google-delivery-service-dunzo-hacked-data-leaked/


5.SkyboxÐû²¼±¨¸æ£¬ £¬£¬£¬ £¬£¬ £¬£¬Õ¹Íû2020Ä꽫ÓÐ2Íò¶à¸öÐÂÎó²î


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Skybox SecurityÐû²¼±¨¸æ£¬ £¬£¬£¬ £¬£¬ £¬£¬×èÖ¹2020ÄêÉϰëÄêÒѾ­±¨¸æÁË9000¶à¸öÐÂÎó²î£¬ £¬£¬£¬ £¬£¬ £¬£¬¶øÆäÔ¤¼ÆÕûÄ꽫ÓÐ20000¶à¸öÐÂÎó²î¡£¡£ ¡£±¨¸æÖ¸³ö£¬ £¬£¬£¬ £¬£¬ £¬£¬COVID-19¸Ä±äÁË×éÖ¯¼°ÆäÔ±¹¤µÄÊÂÇé·½·¨£¬ £¬£¬£¬ £¬£¬ £¬£¬¼¯ÖÐÌåÏÖÎªÒÆ¶¯Îó²îÔöÌíÁË50£¥£¬ £¬£¬£¬ £¬£¬ £¬£¬ÕâÍ»ÏÔÁ˹«Ë¾ÍøÂçÓëСÎÒ˽¼ÒÍøÂçÖ®¼ä½çÏßÄ£ºýµÄΣÏÕ£»£»£»£» £»£»ÀÕË÷Èí¼þÔÚCOVID-19´óÊ¢ÐÐʱ´ú±¬·¢£¬ £¬£¬£¬ £¬£¬ £¬£¬ÐÂÑù±¾ÊýÄ¿ÔöÌíÁË72£¥£»£»£»£» £»£»¶ÔÒªº¦»ù´¡ÉèÊ©£¨°üÀ¨Ò½ÁƱ£½¡¹«Ë¾ºÍÑо¿ÊµÑéÊÒ£©µÄ¹¥»÷¼Ó¾ç¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/07/22/vulnerability-reports-2020/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+HelpNetSecurity+%28Help+Net+Security%29


6.A10 NetworksÐû²¼2020ÄêQ2 DDoS¹¥»÷Ç÷ÊÆÆÊÎö±¨¸æ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


A10 NetworksÐû²¼2020ÄêQ2 DDoS¹¥»÷Ç÷ÊÆÆÊÎö±¨¸æ£¬ £¬£¬£¬ £¬£¬ £¬£¬·¢Ã÷ÑÇÖÞÊÇDDoS½©Ê¬ÍøÂç»î¶¯µÄÖ÷ҪȪԴ£¬ £¬£¬£¬ £¬£¬ £¬£¬Ö÷ҪʹÓÃÖÖÖÖ·Å´ó¹¥»÷¡£¡£ ¡£ÔÚ2020ÄêµÚ¶þ¼¾¶È£¬ £¬£¬£¬ £¬£¬ £¬£¬470Íò¶à¸öÀ´×ÔÃÀ¹ú¡¢Öйú¡¢º«¹ú¡¢¶íÂÞ˹ºÍÓ¡¶ÈÕâÎå¸ö¹ú¼Ò/µØÇøµÄIP±»ÓÃÓÚÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬ £¬£¬£¬ £¬£¬ £¬£¬ÆäÖдó´ó¶¼Ê¹ÓÃÁËportmapЭÒé¾ÙÐзŴ󹥻÷¡£¡£ ¡£¸Ã±¨¸æÖ¸³ö£¬ £¬£¬£¬ £¬£¬ £¬£¬ÔÚ´ó´ó¶¼ÇéÐÎÏ£¬ £¬£¬£¬ £¬£¬ £¬£¬DDoS½©Ê¬ÍøÂç¿Í»§¶Ë£¨»òÎÞÈË»ú£©ÊÇÔÚÊÜËðµÄIoT×°±¸ÉϽ¨ÉèµÄ£¬ £¬£¬£¬ £¬£¬ £¬£¬ÓÃÓÚ½¨Éè´ËÀàIoT½©Ê¬ÍøÂçµÄ×î³£¼ûÎó²îÊÇÕë¶Ô̻¶telnetÅþÁ¬µÄ×°±¸ÖеÄÎó²î£¬ £¬£¬£¬ £¬£¬ £¬£¬Netgear·ÓÉÆ÷ÖÐδÐÞ²¹µÄÎó²îÒÔ¼°Êý×ÖÊÓÆµÂ¼Ïñ»úÖеÄÇå¾²ÐÔÎÊÌâ¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/threat-intelligence/ddos-botnets-are-entrenched-in-asia-and-amplification-attacks-set-records/d/d-id/1338415?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple