Ñо¿ÍŶÓÅû¶net¿âÖб£´æµÄIPµØµãÑéÖ¤Îó²îµÄϸ½Ú£»£»£»ÐÂAndroid¶ñÒâÈí¼þFlyTrapÐ®ÖÆÊýǧFacebookÕÊ»§

Ðû²¼Ê±¼ä 2021-08-10
1.Ñо¿ÍŶÓÅû¶net¿âÖб£´æµÄIPµØµãÑéÖ¤Îó²îµÄϸ½Ú


1.jpg


ÉÏÖÜ£¬£¬ £¬£¬£¬Ñо¿ÍŶÓÅû¶GoºÍRustÓïÑÔ³£ÓõÄnet¿âÖеÄIPµØµãÑéÖ¤Îó²îµÄϸ½Ú¡£¡£¡£¡£¡£¡£¡£Îó²î×·×ÙΪCVE-2021-29922£¨ÓÃÓÚRust£©ºÍCVE-2021-29923£¨ÓÃÓÚGolang£©£¬£¬ £¬£¬£¬Éæ¼°netÈçÄÇÀïÖû켰ÃûÌõÄIPµØµã£¬£¬ £¬£¬£¬»òÕ߸üÏêϸµØËµµ±Ê®½øÖÆIPv4µØµã°üÀ¨Ç°µ¼ÁãʱµÄ´¦Öóͷ£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿ÉÄܻᵼÖÂÓ¦ÓóÌÐòÖзºÆðЧÀÍÆ÷¶ËÇëÇóαÔì (SSRF) ºÍÔ¶³ÌÎļþ°üÀ¨ (RFI) Îó²î£¬£¬ £¬£¬£¬Ó°ÏìÁ˳ÉǧÉÏÍòÒÀÀµ¸Ã¿âµÄÓ¦Óᣡ£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/go-rust-net-library-affected-by-critical-ip-address-validation-vulnerability/


2.Ñо¿Ö°Ô±ÑÝʾÔõÑùÓÃÍÏí³»úÎó²î¹¥»÷Á¸Ê³Éú²ú¹©Ó¦Á´


2.jpg


8ÔÂ8ÈÕ£¬£¬ £¬£¬£¬ÔÚDEF CON 29¾Û»áÉÏ£¬£¬ £¬£¬£¬±»³ÆÎªSick CodesµÄ°Ä´óÀûÑÇÑо¿Ö°Ô±ÏêϸÏÈÈÝÁËËûËùνµÄÍÏí³»úÎó²î£¨tractor load of vulnerabilities£©¡£¡£¡£¡£¡£¡£¡£Sick Codes³Æ·¢Ã÷Á˶à¸öÎó²î£¬£¬ £¬£¬£¬¿ÉÈëÇÖũҵװ±¸¹©Ó¦ÉÌJohn DeereÓÃÀ´´¦Öóͷ£ÐÅÏ¢ºÍ¿ØÖÆ×°±¸µÄÔËÓªÖÐÐÄ£¬£¬ £¬£¬£¬²¢¿ÉÒÔͨ¹ý¸ÃÖÐÐÄ»á¼ûһЩÁªÍøµÄũҵװ±¸¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬ £¬£¬£¬¹¥»÷ÕßʹÓøÃÎó²î£¬£¬ £¬£¬£¬¿ÉÄܶÔÈ«ÇòµÄÁ¸Ê³Éú²ú¹©Ó¦Á´Ôì³ÉÖØ´óµÄÓ°Ï죬£¬ £¬£¬£¬ÀýÈçÌ«¹ýÅçÈ÷»¯Ñ§Ò©¼Á£¬£¬ £¬£¬£¬»òÔ¶³Ì¼ÝÊ»ÍÏí³»úµÈ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/defcon-exploiting-vulnerabilities/


3.ACSC³ÆLockBit 2.0Õë¶Ô°Ä´óÀûÑǵÄÀÕË÷¹¥»÷¼¤Ôö


3.jpg


°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ (ACSC)³Æ£¬£¬ £¬£¬£¬´Ó2021Äê7ÔÂ×îÏÈ£¬£¬ £¬£¬£¬LockBit 2.0Õë¶Ô°Ä´óÀûÑÇ×éÖ¯µÄÀÕË÷Èí¼þ¹¥»÷¼¤Ôö¡£¡£¡£¡£¡£¡£¡£ACSCÖ¸³öLockBitÒÑÀֳɵØÔÚÉæ¼°×¨ÒµÐ§ÀÍ¡¢ÐÞ½¨¡¢ÖÆÔì¡¢ÁãÊÛºÍʳÎïÔÚÄڵĸ÷¸öÐÐÒµµÄ¹«Ë¾ÏµÍ³ÉÏ×°ÖÃÁËÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬¸Ã»ú¹¹»¹Ðû²¼ÁËÒ»·ÝÀÕË÷Èí¼þÉèÖÃÎļþ£¬£¬ £¬£¬£¬ÆäÖаüÀ¨ÓйØLockBitÍÅ»ïµÄÆäËûÐÅÏ¢£¬£¬ £¬£¬£¬°üÀ¨³õʼ»á¼ûÖ¸±ê¡¢Ä¿µÄÐÐÒµ»ººÍ½â²½·¥µÈ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/australian-govt-warns-of-escalating-lockbit-ransomware-attacks/


4.ÐÂAndroid¶ñÒâÈí¼þFlyTrapÐ®ÖÆÊýǧFacebookÕÊ»§


4.jpg


ZimperiumÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪFlyTrapµÄÐÂÐÍAndroidľÂí¡£¡£¡£¡£¡£¡£¡£×Ô3ÔÂÒÔÀ´£¬£¬ £¬£¬£¬FlyTrapÒÑͨ¹ýGoogle PlayÊÐËÁºÍµÚÈý·½Ó¦ÓóÌÐòÊг¡ÉϵĶñÒâÓ¦ÓÃÈö²¥µ½ÖÁÉÙ144¸ö¹ú¼ÒºÍµØÇø¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬ £¬£¬£¬ÔÚÔ½ÄϵĹ¥»÷»î¶¯Ö¼ÔÚÐ®ÖÆFacebookÕÊ»§¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓöàÖÖÊÖ¶ÎÀ´·Ö·¢¸Ã¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬ÈçÃâ·ÑNetflixÓÅ»Ýȯ´úÂë¡¢Google AdWordsÓÅ»Ýȯ´úÂ룬£¬ £¬£¬£¬ÒÔ¼°×î¼ÑÇò¶Ó»òÇòÔ±µÄͶƱ¡£¡£¡£¡£¡£¡£¡£Ò»µ©Ä¿µÄÀÖ³É×°Ö㬣¬ £¬£¬£¬Æä¾Í»áÇÔÈ¡Facebook ID¡¢Î»Öá¢ÓʼþµØµã¡¢IPµØµã£¬£¬ £¬£¬£¬ÒÔ¼°Ïà¹ØµÄcookieºÍ´ú±Ò¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/android-malware-flytrap-facebook/168463/


5.KasperskyÐû²¼2021ÄêQ2À¬»øÓʼþºÍ´¹ÂڻµÄ±¨¸æ


5.jpg


KasperskyÐû²¼ÁËÓйØ2021ÄêQ2À¬»øÓʼþºÍ´¹ÂڻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£2021ÄêQ2£¬£¬ £¬£¬£¬ÆóÒµÕË»§ÈÔÈ»Êǹ¥»÷ÕßµÄÖ÷ҪĿµÄÖ®Ò»¡£¡£¡£¡£¡£¡£¡£ÎªÁËÔöÌí´¹ÂÚÓʼþÖÐÁ´½ÓµÄ¿ÉÐŶÈ£¬£¬ £¬£¬£¬¹¥»÷Õßαװ³ÆÀ´×ÔÔÆÐ§À͵ÄÓʼþ£¬£¬ £¬£¬£¬ÀýÈçMicrosoft Teams¾Û»áµÄ֪ͨµÈ¡£¡£¡£¡£¡£¡£¡£À¬»øÓʼþÊýÄ¿µÄÕ¼±ÈÔÚ3Ô·ݴ¥µ×£¨45.10%£©ºó£¬£¬ £¬£¬£¬ÔÚ4Ô·ÝС·ùÉÏÉý£¨45.29%£©£¬£¬ £¬£¬£¬µ½6Ô£¨48.03%£©Óë2020ÄêQ4Ï൱¡£¡£¡£¡£¡£¡£¡£À¬»øÓʼþȪԴ×î¶àµÄ¹ú¼ÒΪ¶íÂÞ˹£¨26.07%£©£¬£¬ £¬£¬£¬Æä´ÎÊǵ¹ú£¨13.97%£©ºÍÃÀ¹ú£¨11.24%£©¡£¡£¡£¡£¡£¡£¡£×î³£¼ûµÄ¶ñÒ⸽¼þÊÇBadun¼Ò×壨7.09%£©¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/spam-and-phishing-in-q2-2021/103548/


6.Digital ShadowÐû²¼2021ÄêQ2ÀÕË÷¹¥»÷µÄÆÊÎö±¨¸æ


6.jpg


Digital ShadowÐû²¼ÁË2021ÄêQ2ÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬£¬£¬2021ÄêQ2ÊÇ×îÖ÷ÒªµÄÀÕË÷Èí¼þʱÆÚÖ®Ò»£¬£¬ £¬£¬£¬±¬·¢Á˼¸ÆðÖØ´óÊÂÎñ£¬£¬ £¬£¬£¬ÈçDarkSide¶ÔColonial PipelineµÄ¹¥»÷¡¢JBS¶ÔÈ«Çò×î´óÈâÀà¼Ó¹¤É̵Ĺ¥»÷£¬£¬ £¬£¬£¬ÒÔ¼°ÃÀ¹úºÍÅ·ÖÞµÄÖ´·¨Ðж¯µÈ¡£¡£¡£¡£¡£¡£¡£½öÔÚQ2¾ÍÓÐ740¼Ò¹«Ë¾µÄÐÅÏ¢±»Ðû²¼µ½ÀÕË÷ÍÅ»ïµÄÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬ £¬£¬£¬±ÈQ1ÔöÌíÁË47%¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬ContiÍÅ»ï×îΪ»îÔ¾£¬£¬ £¬£¬£¬Æä´ÎΪAvaddon¡¢PYSAºÍREvil¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.digitalshadows.com/blog-and-research/q2-2021-ransomware-roll-up/