Ó¡¶ÈÖ§¸¶ÀûÓÃBHIMÒòÅäÖÃÃýÎóй¶Êý°ÙÍòÓû§ÐÅÏ¢£»Æ»¹û°ä²¼°²È«¸üУ¬½¨¸´unc0verÔ½Óü·ì϶

°ä²¼¹¦·ò 2020-06-03

1.Ó¡¶ÈÖ§¸¶ÀûÓÃBHIMÒòÅäÖÃÃýÎó£¬Ð¹Â¶Êý°ÙÍòÓû§ÐÅÏ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¡¶ÈÒÆ¶¯Ö§¸¶ÀûÓ÷¨Ê½Bharat Interface for Money (BHIM) ´æÔÚ°²È«·ì϶£¬Ð¹Â¶Êý°ÙÍòÓ¡¶Å×û§µÄÓ×ÎÒÊý¾ÝºÍ²ÆÕþÊý¾Ý¡£4ÔÂ23ÈÕ£¬vpnMentor×êÑÐÈËÔ±·¢ÏÖ£¬¸ÃÀûÓôæ·ÅÊý¾ÝµÄAmazon Web Services S3´æ´¢Í°ÓÉÓÚÅäÖÃÃýÎ󣬵¼ÖÂÄܹ»±»¹«¿ª½Ó¼û¡£Õâ´Îй¶µÄÎļþÔ̺¬É¨ÃèArdaar¿¨£¨Ó¡¶ÈÉí·ÝÖ¤£©¡¢ÖÖÐÕÖ¤Ê顢רҵºÍ½ÌÓýÖ¤Êé¡¢ÓÃ×÷¾Óס֤Ã÷µÄÕÕÆ¬¡¢ÓëÓ¡¶ÈËùµÃ˰·þÎñÓйصÄÓÀÔ¶Õʺţ¨PAN£©¿¨ÒÔ¼°¿ªÉèBHIMÕÊ»§ËùÐèµÄËùÓÐÎļþ£¬Ð¹Â¶Ó×ÎÒÐÅÏ¢Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢´ºÇÐԱ𡢼Òͥסַ¡¢ÖÖÐÕÉí·Ý¡¢×Ú½ÌÐÅÑö¡¢ÉúÎïÌØµã¾ßÌåÐÅÏ¢¡¢Ö¸ÎÆÉ¨Ãè¡¢Éí·ÝÖ¤ÕÕÆ¬ÒÔ¼°µ±¾ÐÄÆ»®ºÍÉç»á±£ÏÕ·þÎñµÄÉí·ÝÖ¤ºÅÂë¡£×êÑÐÈËÔ±°µÊ¾£¬ÔÚÊýÐÇÆÚºóµÚ¶þ´ÎÁªÏµÁËÓ¡¶ÈµÄCERTºó£¬¸Ã·ì϶²Å±»½¨¸´¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/indian-payment-app-bhim-data-breach/


2.REvilÀÕË÷Ó¢¹úElexonʧ°Üºó£¬Ð¹Â¶Æä1280¸öÎļþ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÚ¿ÍÍÅ»ïREvilÓÚÁ½ÖÜǰ¶ÔÓ¢¹ú¹«Ë¾ElexonÌáÒéÀÕË÷Èí¼þ¹¥»÷£¬ÔÚË÷ÒªÊê½ðʧ°Üºó£¬½«ÇÔÈ¡µÄ1280¸öÎļþÒÔ»º´æµÄ´ó¾Ö°ä²¼ÔÚÆäÍøÕ¾ÉÏ¡£ÕâЩÎļþÔ̺¬ElexonÔ±¹¤»¤ÕÕµÄÎļþºÍóÒ×±£ÏÕÉêÇë±í¡£ElexonÔÚ5ÔÂÖÐÑ®Ôâµ½ÍøÂç¹¥»÷ʱ°µÊ¾£¬ÆäÒѾ­È·¶¨Á˵××ÓÔ­Òò²¢ÔÚ²ÉÈ¡´ëÊ©¸´Ô­ÆäITϵͳ£¬Òò¶ø²¢Î´Ö§¸¶Êê½ð¡£Ä¿Ç°£¬Elexon²¢Î´»ØÓ¦The RegisterµÄÖÃÆÀÒªÇó£¬The Register°µÊ¾ÈôÊÇÕâ´Îй¶µÄÊý¾ÝÊÇÕæÊµµÄ£¬REvilµÄÐÐΪÄܹ»¿´×÷ÊÇ´òËãʧ°ÜºóµÄ¸´³ð¡£


Ô­ÎÄÁ´½Ó£º

https://www.theregister.com/2020/06/01/elexon_ransomware_was_revil_sodinokibi/


3.Æ»¹û°ä²¼°²È«¸üУ¬½¨¸´unc0verÔ½Óü·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


6ÔÂ1ÈÕ£¬Æ»¹û°ä²¼Á˶à¸ö²úÆ·µÄ°²¸üУ¬ÔÚÕë¶ÔiOS 13.5.1ºÍiPadOS 13.5.1µÄ¸üÐÂÖн¨¸´ÁËunc0verÔ½Óü·ì϶£¬Æä±»¸ú×ÙΪCVE-2020-9859£¬Ä¿Ç°ÉÐδ°ä²¼MITER / NVDÌõ¿î¡£Æ»¹û¹«Ë¾°µÊ¾£¬ÓÉÓڸ÷ì϶ΪÄÚ´æ´¦Ö÷ì϶²¢ÇÒ¶à¸öPoCsÒѾ­±»Åû¶³¬¹ýÒ»¸öÐÇÆÚ£¬ËùÒÔÕâ¸ö·ì϶¿ÉÄÜ»áÈù¥»÷ÕßʹÓÃÄÚºËÌØÈ¨Ö´ÐÐËÁÒâ´úÂ룬²¢½¨ÒéÓû§ÂíÉϸüС£³ý´ËÖ®±í£¬Õâ´Î¸üл¹Ô̺¬Õë¶ÔmacOS Catalina 10.15.5ÖÐͳһ·ì϶µÄÂŴθüеIJ¹³ä¸üÐÂ2020-003£¬ÓÃÓÚApple WatchºÍTVÉ豸µÄwatchOS 6.2.6ºÍtvOS 13.4.6µÄ¸üУ¬ÒÔ¼°ÓÃÓÚApple WatchµÄwatchOS 6.2.6°²È«¸üС£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/apple/apple-pushes-fix-across-all-devices-for-unc0ver-jailbreak-flaw/


4.Éç½»ÊÓÆµÀûÓÃMitron´æÔÚ·ì϶£¬¿Éµ¼ÖÂÕË»§ÊÕÊÜ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÔ±Rahul KankraleÔÚMitronÀûÓ÷¨Ê½Öз¢ÏÖʹÓÃGoogleµÇ¼ְÄÜ´æÔÚÎÊÌ⣬¿Éµ¼ÖÂÕË»§ÊÕÊÜ¡£¸ÃÀûÓÃÖÐÔÚÓû§ÔÊÐí½Ó¼ûÅäÖÃÎļþÐÅϢʱ²»´´½¨Ë½ÓÐÉí·ÝÑéÖ¤ÁîÅÆ£¬ËùÒÔ£¬Ö»ÓÐ֪·Óû§id¾ÍÄܹ»ÇáËɵØÊÕÊܸÃÕÊ»§£¬¶ø¸ÃidÔÚÒ³ÃæÔ´Öй«¿ªÏÔʾ¡£Ä¿Ç°£¬»¹Ã»ÓпÉÓõIJ¹¶¡·¨Ê½½¨¸´´Ë·ì϶£¬×êÑÐÈËÔ±³¢ÊÔÓ뿪·¢ÈËÔ±ÁªÏµµ«ÊÇûÓгɹ¦¡£Òò¶ø£¬Ä¿Ç°¸Ã·ì϶ÈÔ佨¸´£¬ÆäPoCÏÖÒÑÅú¶£¬Òò¶øËùÓÐЧ»§¶¼ÈÝÒ×Êܵ½ºÚ¿Í¹¥»÷¡£MitronÔÚGoogle PlayÉ̵êÖÐÓг¬¹ý500ÍòÓû§£¬×êÑÐÈËÔ±½¨ÒéÓû§ÖÕ³¡Ê¹ÓôËÀûÓÃÒÔ±£»¤ÒþÖԺͰ²È«¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/06/02/tiktok-alternative-mitron-app-has-a-critical-vulnerability-allowing-account-takeovers/


5.½ö5Ô·ݾͻ㱨ÁË105ÆðÊý¾Ýй¶ÊÂÎñ£¬Ð¹Â¶88ÒÚÌõÊý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍøÂç·çÏÕºÍÒþÖÔÖÎÀí½â¾ö¹æ»®ÌṩÉÌIT Governance°ä²¼ÁËÒ»·ÝÊý¾Ýй¶ÊÂÎñÇåµ¥£¬¸Ã¹«Ë¾½ö5Ô·ݾÍͳ¼ÆÁË105ÆðÊÂÎñ£¬ÕâЩÊÂÎñ×ܹ²Ð¹Â¶Á˳¬¹ý88Òڱʼͼ¡£ÆäÖÐ×î´óµÄÒ»´ÎÊý¾Ýй¶ÊÂÎñÀ´×ÔÌ©¹úAISÒÆ¶¯ÔËÓªÉÌ£¬ÆäDNS²éÎʺÍNetFlowÈÕÖ¾Êý¾Ý¿â¶³ö£¬Ð¹Â¶83Òڱʼͼ¡£¶ÔÊÂÎñÔ­Òò½øÐзÖÀ࣬ÆäÖÐ39ÆðÓÉÓÚÍøÂç¹¥»÷£¬37ÆðÓÉÓÚÊý¾Ýй¶£¬17ÆðÓÉÓÚÀÕË÷Èí¼þ¹¥»÷£¬6ÆðÓÉÓÚÄÚ²¿Íþв»òÆäËûÀàÐ͵ÄÍøÂçÊÂÎñ¡£¸Ã¹«Ë¾°µÊ¾£¬ÕâЩÊý×ÖÖ»ÊǼ«¶ÈÊØ¾ÉµÄ¹À¼Æ£¬ÓÉÓÚËü½ö·´Ó³³ö¹«¿ª»ã±¨µÄÊÂÎñ£¬»¹ÓÐһЩδ֪ÊÂÎñ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/over-460-million-records-exposed-in-breach-incidents-reported-in-may/


6.×êÑз¢ÏÖÊý¾Ýй¶ºóÖ»ÓÐÈý·ÖÖ®Ò»µÄÓû§¸ü¸ÄÃÜÂë


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨ÄÚ»ù÷¡´óѧ°²È«ÓëÒþÖÔ×êÑÐËù£¨CyLab£©×êÑÐÈËÔ±°ä·¢ÁËÒ»Ïî×êÑУ¬Åú×¢Ö»ÓÐԼĪÈý·ÖÖ®Ò»µÄÓû§»áÔÚÊý¾Ýй¶ºó¸ü¸ÄÆäÃÜÂë¡£¸Ã×êÑв»ÊÇ»ùÓÚµ÷²éÊý¾Ý£¬¶øÊÇ»ùÓÚÏÖʵµÄä¯ÀÀÆ÷Á÷Á¿¡£×êÑÐÓ××éͨ¹ýÍøÂçÓÚ2017Äê1ÔÂÖÁ2018Äê12ÔÂÖ®¼ä249Ãû²Î¼ÓÕߵļÒÓÃÍÆËã»úµÄÐÅÏ¢½øÐзÖÎö£¬ÍøÂçµÄÊý¾ÝÔ̺¬ÍøÂçÁ÷Á¿¡¢µÇÂ¼ÍøÕ¾µÄÃÜÂëÒÔ¼°´æ´¢ÔÚä¯ÀÀÆ÷ÖеÄÃÜÂë¡£×êÑÐÈËÔ±°µÊ¾£¬ÔÚÕâ249¸öÓû§ÖÐÓÐ63¸öÓû§Ôâµ½ÁËÊý¾Ýй¶£¬ÆäÖÐÖ»ÓÐ21루33£¥£©¸ü¸ÄÁËÃÜÂ룬¶øÔÚÕâ21λÓû§ÖУ¬Ö»ÓÐ15λÔÚÊý¾Ýй¶²¼¸æ°ä²¼ºóµÄÈý¸öÔÂÄÚ¸ü¸ÄÃÜÂ룬²¢ÇÒÖ»ÓÐ9루Èý·ÖÖ®Ò»£©Æ¾¾ÝÃÜÂëµÄlog10ת»»Ç¿¶È½«Æä¸ü¸ÄΪ¸üÇ¿µÄÃÜÂë¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/after-a-breach-users-rarely-change-their-passwords-study-finds/