Ô¶³Ì×ÀÃæµÄUSBÇý¶¯´æÔÚ·ì϶£¬¿É½øÐÐÌáȨ£»Plex Media Server´æÔÚ3¸ö·ì϶£¬½áºÏÀûÓÿÉÊÕÊÜϵͳ

°ä²¼¹¦·ò 2020-06-19

1.Ô¶³Ì×ÀÃæµÄUSBÇý¶¯´æÔÚ·ì϶£¬¿ÉÀûÓô˷ì϶½øÐÐÌáȨ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍøÂ簲ȫ¹«Ë¾SentinelOne·¢ÏÖÔ¶³Ì×ÀÃæµÄUSBÇý¶¯´æÔÚ·ì϶£¬ºÚ¿ÍÄܹ»ÀûÓô˷ì϶½øÐÐÌáȨ ¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-9332£¬Î»ÓÚFabulaTech¿ª·¢µÄ¡°ÓÃÓÚÔ¶³Ì×ÀÃæµÄUSB¡±µÄÇý¶¯·¨Ê½ÖУ¬Æä¿Í»§Ô̺¬Google¡¢Î¢Èí¡¢ÍòÊ´│¡¢ÃÀ¹úÓ¾Ö¡¢Â·Í¸Éç¡¢Ó¢ÌØ¶ûµÈ¹«Ë¾ ¡£×êÑÐÈËÔ±·¢ÏÖ£¬FabulaTechµÄÇý¶¯·¨Ê½Å²ÓÃÁËIoCreateDevice£¬¸Ã·¨Ê½²»»áͨ¹ý°²È«²é³­À´×èÖ¹µÍȨÏÞµÄʵÌåµÄ½Ó¼û£¬ÕâÔÊÐí·ÇÌØÈ¨Óû§Ôö³¤²¢½ÚÔìOSÐÅÀµµÄÈí¼þÉ豸 ¡£Ä¿Ç°£¬¸Ã·ì϶ÉÐδ±»½¨¸´ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/bug-in-usb-for-remote-desktop-lets-hackers-add-fake-devices/


2.Plex Media Server´æÔÚ3¸ö·ì϶£¬½áºÏÀûÓÿÉÊÕÊÜϵͳ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


TenableµÄ°²È«×êÑÐÔ±Chris Lyne·¢ÏÖÁËPlex Media Server´æÔÚ3¸öÑϳÁµÄ·ì϶£¬ºÚ¿Í½áºÏÀûÓÃÕâЩ·ì϶Äܹ»ÆëÈ«ÊÕÊÜÕû¸öϵͳ ¡£Õâ3¸ö·ì϶±ðÀë±»¸ú×ÙΪCVE-2020-5740¡¢CVE-2020-5741ºÍCVE-2020-5742 ¡£¹¥»÷ÕßÈôÊÇͬʱÀûÓÃÕâ3¸ö·ì϶£¬Ôò¿ÉÏñSYSTEMÒ»ÑùÔ¶³ÌÖ´ÐдúÂë¡¢ÆëÈ«ÊÕÊܲÙ×÷ϵͳ¡¢»ñµÃ¶ÔËùÓÐÎļþµÄ½Ó¼ûȨ¡¢²¿ÊðºóÃÅ»òºáÏòÒÆ¶¯µ½Í³Ò»ÍøÂçÉÏµÄÆäËûÉ豸ÖÐ ¡£Ä¿Ç°Õâ3¸ö·ì϶¾ùÒѱ»½¨¸´ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.itsecurityguru.org/2020/06/17/vulnerabilities-in-plex-that-could-enable-full-system-takeover-has-now-been-patched/


3.ºÚ¿ÍÔÚÏúÊÛÊý¾Ý¿â£¬Éæ¼°11.5Íò¶íÂÞ˹¹«ÃñÐÅÏ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


DeviceLock¼¼Êõ×ܼàAshot Hovhannisyan°µÊ¾£¬ºÚ¿ÍÔÚÒÔ66.6±ÈÌØ±Ò£¨Ô¼ºÏ62.7ÍòÃÀÔª£©µÄ¼ÛÖµÏúÊÛ11.5Íò¶íÂÞ˹¹«ÃñµÄÐÅÏ¢ ¡£¸ÃÊý¾Ý¿âÔ̺¬È«Ãû¡¢µ®ÉúÈÕÆÚ¡¢»¤ÕÕÊý¾Ý¡¢µØÖ·£¬µç»°ºÅÂë¡¢µç×ÓÓʼþ¡¢¶íÂÞ˹³öÈë¾³ÈÕÆÚ¡¢¹«¹²·þÎñÃÅ»§ÍøÕ¾ÉϵÄÀûÓ÷¨Ê½¡¢ÒÔ¼°ÒøÐп¨ºÍÕÊ»§Êý¾Ý¡¢»¤ÕÕÊý¾ÝºÍµØµã¹ú¶È/µØÓòµÈÐÅÏ¢ ¡£°²È«×¨¼Ò°µÊ¾£¬ÓÉÓÚĿǰֻÓÐ34ÌõÊý¾ÝµÄ½ØÍ¼£¬ËùÒÔÉÐÎÞ·¨È·¶¨ÕâЩÊý¾ÝµÄÕæÊµÐÔ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/06/devicelock-data-from-115-thousand.html


4.ºÚ¿Í½Ù³ÖÁËÅ£½ò´óѧÓʼþϵͳ½øÐÐOffice 365ÍøÂç´¹µö


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Check Point×êÑÐÈËÔ±·¢ÏÖ£¬ºÚ¿Í½Ù³ÖÁËÅ£½ò´óѧµÄµç×ÓÓʼþϵͳÀ´½øÐÐÍøÂç´¹µö»î¶¯£¬Ö¼ÔÚÇÔȡŷÖÞ¡¢ÑÇÖÞºÍÖж«Óû§µÄMicrosoft Office 365µÇ¼ʹ´¦ ¡£ºÚ¿Í·¢ËÍαÔìµÄÓïÒôÓʼþÌáÐÑÐû³ÆÊܺ¦ÕßµÄÓïÒôÓÊÏäÖÐÓÐÒ»ÌõÓïÒôÐÅÏ¢£¬²¢ÓÕʹÆä´ò¿ªÓʼþÖеĶñÒâÁ´½Ó£¬Ö®ºóÓû§»á±»³Á¶¨Ïòµ½´¹µöÒ³Ãæ ¡£´Ë±í£¬´ó²¿ÃŵĴ¹µöÓʼþÀ´×ÔÅ£½ò´óѧ·ÖÆç²¿ÃŵĺϷ¨×ÓÓò£¬²¢ÇÒºÚ¿Í»¹ÀûÓÃÁËAdobe·þÎñÆ÷ÉÏÍйܵÄÓò£¬ÒÔ¶ã±Ü´¹µöÓʼþ¼ì²âϵͳ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hijacked-oxford-server-used-by-hackers-for-office-365-phishing/


5.ºÚ¿Í¼ÙÒâÁìÓ¢ÕÐÆ¸ÈËÔ±£¬Õë¶ÔÅ·ÖÞºÍÖж«¾üʺͺ½¿Õ×éÖ¯


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



ÍøÂ簲ȫ¹«Ë¾ESETµÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÐÂÐ͵ĸ߶ȸ´Ôӵļäµý»î¶¯£¬ºÚ¿Í¼ÙÒâÁìÓ¢ÕÐÆ¸ÈËÔ¹Øë¶ÔÅ·ÖÞºÍÖж«¾üʺͺ½¿Õº½Ìì×éÖ¯£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÎļþ ¡£Õâ´Î»î¶¯ÖУ¬ºÚ¿Í¼ÙÒâCollins AerospaceºÍGeneral DynamicsµÄÕÐÆ¸ÈËÔ±£¬Ïòº½¿Õº½ÌìºÍ¹ú·À¹«Ë¾ÓйصÄÔ±¹¤·¢ËÍÐÂÎźͼÙ×°³Éн×ÊÐÅÏ¢µÄ¶ñÒâÎļþ ¡£Êܺ¦ÕßÏÂÔØ¸Ã¶ñÒâÎļþºó£¬ºÚ¿Í»á³¢ÊÔÀûÓÃÆäÈëÇÖÍøÂ磬³É¹¦ºó±ã»áÌáÒ鱩Á¦¹¥»÷£¬ÒÔÇÔÈ¡ÖÎÀíÕÊ»§µÄµÇ¼ʹ´¦ ¡£Ë¼¿¼µ½Ö¸±ê¹«Ë¾µÄÀàÐÍ£¬ESETÒÔΪ¹¥»÷ÕßµÄÖ¸±ê¿ÉÄÜÊÇÃô¸ÐµÄÒµÎñºÍ¼¼ÊõÐÅÏ¢ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/hackers-linkedin-recruiters-scam-military-aerospace-firms/


6.InvisiMoleÔڲ߶¯Õë¶Ô¶«Å·¾üÊÂºÍ±í½»×éÖ¯µÄ¼äµý»î¶¯


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍøÂ簲ȫ¹«Ë¾ESETÅû¶Á˼äµý×éÖ¯InvisiMoleµÄ×÷°¸ÊÖ·¨£¬ÆäÔÚ¶Ô¶«Å·±¸ÊÜÖõÖ÷ÕžüÊÂºÍ±í½»×éÖ¯ÌáÒé¼äµý»î¶¯£¬»¹·¢ÏÖÁ˸Ã×éÖ¯ÓÃÓÚ½»¸¶¡¢ºáÏòÒÆ¶¯ºÍÖ´ÐÐInvisiMoleºóÃŵŤ¾ß¼¯ ¡£×êÑз¢ÏÖ£¬Ä¿Ç°InvisiMoleÔÚÓëºÚ¿Í×éÖ¯GamaredonºÏ×÷£¬ºóÕßÒ»Ïò»îÔ¾ÓÚÕë¶ÔÎÚ¿ËÀ¼ºÍ¶íÂÞ˹µÄÍøÂç¼äµý»î¶¯ÖÐ ¡£´Ë±í£¬InvisiMole¶ÔÆäÓÐЧ¸ºÔØRC2CLºÍRC2FM½øÐÐÁËÉý¼¶£¬Ê¹ÆäÓµÓÐ·ÖÆçµÄ¶ã±Üɱ¶¾Èí¼þ¼ì²âµÄ²½Öè ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2020/06/invisimole-hackers.html