Adobe°ä²¼´ø±í¸üУ¬½¨¸´ColdfusionÖеÄ3¸ö·ì϶£»Ð¹¥»÷»î¶¯xHuntÖØÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯
°ä²¼¹¦·ò 2019-09-26
Adobe°ä²¼´ø±í°²È«¸üУ¬½¨¸´ColdFusionÖеÄÈý¸ö·ì϶£¬ÆäÖÐÁ½¸ö·ì϶Ϊcritical¼¶±ð£¬ÁíÒ»¸öΪimportant¼¶±ð¡£Á½¸öcritical·ì϶ÊǺÅÁî×¢Èë·ì϶£¬Ô̺¬¿Éµ¼ÖÂËÁÒâ´úÂëÖ´Ðеķì϶£¨CVE-2019-8073£©ºÍÔÊÐí¹¥»÷ÕßÈÆ¹ý½Ó¼û½ÚÔìµÄõè¾¶±éÀú·ì϶£¨CVE-2019-8074£©¡£Ò»¸öimportant·ì϶ÊÇÈÆ¹ý·ì϶£¨CVE-2019-8072£©£¬¸Ã·ì϶¿Éµ¼ÖÂÐÅϢй¶¡£ÊÜÓ°ÏìµÄ°æ±¾Ô̺¬ColdFusion 2018 Update 4¼°¸üÔç°æ±¾ºÍColdFusion 2016 Update 11¼°¸üÔç°æ±¾£¬½¨ÒéÓû§¸üÐÂÖÁColdFusion 2018 Update 5ºÍColdFusion 2016 Update 12¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerabilities-in-coldfusion/2.Ô¼»áÀûÓÃHeyyoÒâ±íй¶½ü7.2ÍòÓû§ÐÅÏ¢
ÔÚÏßÔ¼»áÀûÓÃHeyyoµÄElasticsearchÊ·ýÒòδÉèÃÜÂë¶øÔÚ»¥ÁªÍøÉ϶³ö£¬µ¼Ö½ü7.2ÍòÓû§µÄ¾ßÌåÒþÖÔÐÅϢй¶¡£¸ÃÊÂÎñÊÇÓÉWizCase°²È«×êÑÐÈËÔ±·¢Ïֵ쬯¾¾ÝZDNetµÄ±¨Â·£¬¸Ã·þÎñÆ÷ÊÇÒ»¸ö³ö²ú·þÎñÆ÷£¬Ð¹Â¶µÄÐÅÏ¢Ô̺¬Óû§µÄÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØÖ·¡¢µ®ÉúÈÕÆÚ¡¢ÐÔ±ð¡¢Éí¸ß¡¢Ó×ÎÒ×ÊÁÏͼƬ¡¢Î»ÏàÐÅÏ¢¡¢Ô¼»áÆ«ºÃµÈ¡£¸ÃÀûÓÃËùÊôµÄÒÁ˹̹²¼¶ûÈí¼þ¹«Ë¾ÔÚ½üÒ»¸öÐÇÆÚÄÚδÄܻظ´ZDNetµÄѯÎÊ£¬Ð¹Â¶µÄ·þÎñÆ÷ÔÚZDNet´«µÝÍÁ¶úÆäCERTºóµÃµ½±£»¤¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/heyyo-dating-app-leaked-users-personal-data-photos-location-data-more/3.й¥»÷»î¶¯xHuntÖØÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯
ƾ¾ÝPalo Alto NetworksµÄ»ã±¨£¬Ò»¸öÐµĹ¥»÷»î¶¯xHuntÖØÒªÕë¶Ô¿ÆÍþÌØµÄÔËÊäºÍº½ÔË×éÖ¯¡£xHuntÖØÒªÔÚ2019Äê5ÔÂÖÁ6ÔÂÖ®¼ä½øÐУ¬×êÑÐÈËÔ±½«¸Ã¹¥»÷»î¶¯ÖÐʹÓõŤ¾ßÓë2018Äê7ÔÂÖÁ12ÔÂÖ®¼äÕë¶Ô¿ÆÍþÌØµÄ¹¥»÷¹ØÁªÆðÀ´¡£×÷Ϊй¥»÷µÄÒ»²¿ÃÅ£¬¹¥»÷ÕßʹÓÃÁËSakabota¡¢Histoka¡¢NeteroºÍKilluaµÈºóÃÅ£¬ÕâЩºóÃÅͨ¹ýHTTPÓëC&CͨѶ£¬²¿ÃűäÌåҲʹÓÃDNSËí·»òµç×ÓÓʼþ½øÐÐͨѶ¡£¹¥»÷ÕßÒ²ÔÚÊÜϰȾµÄϵͳÉÏ¿ªÊÍÁ˶ñÒ⹤¾ßGonºÍEYE¡£Ö»¹Ü2018ÄêºÍ2019ÄêµÄ¹¥»÷»î¶¯ÖÐʹÓõŤ¾ß´æÔÚ³Áµþ£¬µ«Ä¿Ç°Éв»ÄÜÈ·¶¨ÕâÁ½¸ö»î¶¯ÊÇ·ñÓÉͳһ¹¥»÷ÕßÌáÒé¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/xhunt-campaign-targets-kuwait-transportation-and-shipping-sector4.×êÑÐÍŶӰ䲼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß
¿¨°Í˹»ù×êÑÐÍŶӰ䲼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß¡£YatronÖØÒª»ùÓÚ¿ªÔ´ÀÕË÷Èí¼þHidden Tear½øÐпª·¢£¬Æ¾¾Ý¿¨°Í˹»ùµÄͳ¼ÆÊý¾Ý£¬¸ÃÀÕË÷Èí¼þÔÚ´ÓǰһÄêÖÐÊÔͼÌáÒé600ÂÅ´ÎϰȾ£¬ÆäÖдóÎÞÊý¹¥»÷λÓڵ¹ú¡¢Öйú¡¢¶íÂÞ˹¡¢Ó¡¶ÈºÍÃåµé¡£FortuneCryptµÄÖØÒªÌØµãÊÇʹÓÃBlitzMax±àÒëÆ÷½øÐбàÒ룬ÕâÊÇ¿¨°Í˹»ù¹Û²ìµ½µÄÊ׸öÀûÓÃBlitz BASIC±àдµÄÀÕË÷Èí¼þ¡£È¥Ä꿨°Í˹»ù¹²¼Í¼ÁËTrojan-Ransom.Win32.Crypren¼Ò×åµÄ6000ÂŴι¥»÷£¬Êܹ¥»÷Êý×î¶àµÄ¹ú¶ÈÊǶíÂÞ˹¡¢°ÍÎ÷¡¢µÂ¹ú¡¢º«¹úºÍÒÁÀÊ¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/ransomware-two-pieces-of-good-news/93355/
5.·¸×ïÍÅ»ïTortoiseshellÀûÓÃÐéÎ±ÍøÕ¾¶Ô×¼ÃÀ¹úÍËÒÛÎäÊ¿
˼¿ÆTalos·¢ÏÖÓÉÒÁÀʵ±¾ÖÖ§³ÖµÄºÚ¿Í×éÖ¯TortoiseshellÕýÊÔIJÀûÓÃÐéαÕÐÆ¸ÍøÕ¾Õë¶ÔÃÀ¹úÍËÒÛÎäÊ¿¡£¸ÃÍøÕ¾µÄÓòÃûÊÇhiremilitaryheroes[.]com£¬ÉÏÃæÌṩһ¸ö×ÀÃæ°æÈí¼þµÄÏÂÔØ£¬µ«¸ÃÈí¼þ»áÏÔʾװÖÃʧ°ÜÐÅÏ¢²¢ÏÖʵÉÏ×°ÖöñÒâÈí¼þ¡£Æ¾¾Ý×êÑÐÈËÔ±µÄ±íÊö£¬¶ñÒâÈí¼þ»áÔÚºó¶ÜÔËÐÐÍøÂçÓû§µÄÐÅÏ¢£¬¶øºó·¢Ë͵½¹¥»÷ÕßµÄGmailÓÊÏä¡£ÍøÂçµÄÐÅÏ¢Ô̺¬ÏµÍ³²¹¶¡¼¶±ð¡¢´¦ÖÃÆ÷ÊýÁ¿¡¢ÍøÂçÅäÖá¢Ó²¼þºÍ¹Ì¼þ°æ±¾¡¢Óò½ÚÔìÆ÷¡¢ÖÎÀíÔ±Ãû³Æ¡¢ÕË»§ÁÐ±í¡¢ÈÕÆÚ¡¢¹¦·ò¡¢Çý¶¯·¨Ê½µÈ¡£´Ë±í£¬¶ñÒâÈí¼þ»¹»áÔÚÊܺ¦ÕßµÄϵͳÉÏ×°ÖÃÔ¶¿ØÄ¾Âí¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-military-veterans-targeted-by-iranian-state-hackers/
6.·¸×ïÍÅ»ïMagecart¶Ô×¼¹«¹²Wi-Fi±³ºóµÄÉÌÓ÷ÓÉÆ÷
Magecart Group 5±»·¢Èç½ñ¶Ô³ï±¸×¢ÈëÉÌÓ÷ÓÉÆ÷ÖеĶñÒâ´úÂë½øÐвâÊÔ¡£¸Ã´úÂëÕë¶ÔµÄ·ÓÉÆ÷ÖØÒªÓÃÓÚÔÚ¹«¹²³¡ËùºÍ¾ÆµêÖÐÌṩÃâ·Ñ»ò¸¶·ÑµÄWi-Fi·þÎñ£¬ÈôÊdzɹ¦£¬¹¥»÷Õß½«¿ÉÄÜϰȾÕâЩ·ÓÉÆ÷²¢ÔÚ»ú³¡¡¢¿§·Èµê¡¢¾ÆµêµÈ¹«¹²ÉèÊ©ÖÐÇÔÈ¡ÆäWi-FiÓû§µÄÖ§¸¶Êý¾Ý¡£ÕâЩ´úÂë±»×¢Èëµ½Á¼ÐÔµÄJavaScriptÎļþÖУ¬¶øºó¼ÓÔØµ½Ö§³ÖL7ºÍ̸µÄÉÌÓ÷ÓÉÆ÷¡£L7ºÍ̸ָµÄÊÇOSIµÄÀûÓòãºÍ̸£¬³£ÓÃÓÚÉÌÓ÷ÓÉÆ÷ÒÔ½øÐÐÁ÷Á¿¸ºÔØÆ½ºâºÍÔÚÓû§Ïνӵ½Wi-Fi·þÎñʱÏÔÊ¾Ò³Ãæ»ò¸æ°×¡£Ä¿Ç°×êÑÐÈËÔ±ÉÐδ·¢ÏÖÏÖʵµÄ¹¥»÷°¸Àý¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/magecart-group-targets-routers-behind-public-wi-fi-networks/148662/


¾©¹«Íø°²±¸11010802024551ºÅ