Ô¶³Ì×ÀÃæµÄUSBÇý¶¯´æÔÚ·ì϶£¬¿É½øÐÐÌáȨ£»Plex Media Server´æÔÚ3¸ö·ì϶£¬½áºÏÀûÓÿÉÊÕÊÜϵͳ
°ä²¼¹¦·ò 2020-06-191.Ô¶³Ì×ÀÃæµÄUSBÇý¶¯´æÔÚ·ì϶£¬¿ÉÀûÓô˷ì϶½øÐÐÌáȨ
ÍøÂ簲ȫ¹«Ë¾SentinelOne·¢ÏÖÔ¶³Ì×ÀÃæµÄUSBÇý¶¯´æÔÚ·ì϶£¬ºÚ¿ÍÄܹ»ÀûÓô˷ì϶½øÐÐÌáȨ¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-9332£¬Î»ÓÚFabulaTech¿ª·¢µÄ¡°ÓÃÓÚÔ¶³Ì×ÀÃæµÄUSB¡±µÄÇý¶¯·¨Ê½ÖУ¬Æä¿Í»§Ô̺¬Google¡¢Î¢Èí¡¢ÍòÊ´│¡¢ÃÀ¹úÓ¾Ö¡¢Â·Í¸Éç¡¢Ó¢ÌØ¶ûµÈ¹«Ë¾¡£×êÑÐÈËÔ±·¢ÏÖ£¬FabulaTechµÄÇý¶¯·¨Ê½Å²ÓÃÁËIoCreateDevice£¬¸Ã·¨Ê½²»»áͨ¹ý°²È«²é³À´×èÖ¹µÍȨÏÞµÄʵÌåµÄ½Ó¼û£¬ÕâÔÊÐí·ÇÌØÈ¨Óû§Ôö³¤²¢½ÚÔìOSÐÅÀµµÄÈí¼þÉ豸¡£Ä¿Ç°£¬¸Ã·ì϶ÉÐδ±»½¨¸´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/bug-in-usb-for-remote-desktop-lets-hackers-add-fake-devices/
2.Plex Media Server´æÔÚ3¸ö·ì϶£¬½áºÏÀûÓÿÉÊÕÊÜϵͳ
TenableµÄ°²È«×êÑÐÔ±Chris Lyne·¢ÏÖÁËPlex Media Server´æÔÚ3¸öÑϳÁµÄ·ì϶£¬ºÚ¿Í½áºÏÀûÓÃÕâЩ·ì϶Äܹ»ÆëÈ«ÊÕÊÜÕû¸öϵͳ¡£Õâ3¸ö·ì϶±ðÀë±»¸ú×ÙΪCVE-2020-5740¡¢CVE-2020-5741ºÍCVE-2020-5742¡£¹¥»÷ÕßÈôÊÇͬʱÀûÓÃÕâ3¸ö·ì϶£¬Ôò¿ÉÏñSYSTEMÒ»ÑùÔ¶³ÌÖ´ÐдúÂë¡¢ÆëÈ«ÊÕÊܲÙ×÷ϵͳ¡¢»ñµÃ¶ÔËùÓÐÎļþµÄ½Ó¼ûȨ¡¢²¿ÊðºóÃÅ»òºáÏòÒÆ¶¯µ½Í³Ò»ÍøÂçÉÏµÄÆäËûÉ豸ÖС£Ä¿Ç°Õâ3¸ö·ì϶¾ùÒѱ»½¨¸´¡£
ÔÎÄÁ´½Ó£º
https://www.itsecurityguru.org/2020/06/17/vulnerabilities-in-plex-that-could-enable-full-system-takeover-has-now-been-patched/
3.ºÚ¿ÍÔÚÏúÊÛÊý¾Ý¿â£¬Éæ¼°11.5Íò¶íÂÞ˹¹«ÃñÐÅÏ¢
DeviceLock¼¼Êõ×ܼàAshot Hovhannisyan°µÊ¾£¬ºÚ¿ÍÔÚÒÔ66.6±ÈÌØ±Ò£¨Ô¼ºÏ62.7ÍòÃÀÔª£©µÄ¼ÛÖµÏúÊÛ11.5Íò¶íÂÞ˹¹«ÃñµÄÐÅÏ¢¡£¸ÃÊý¾Ý¿âÔ̺¬È«Ãû¡¢µ®ÉúÈÕÆÚ¡¢»¤ÕÕÊý¾Ý¡¢µØÖ·£¬µç»°ºÅÂë¡¢µç×ÓÓʼþ¡¢¶íÂÞ˹³öÈë¾³ÈÕÆÚ¡¢¹«¹²·þÎñÃÅ»§ÍøÕ¾ÉϵÄÀûÓ÷¨Ê½¡¢ÒÔ¼°ÒøÐп¨ºÍÕÊ»§Êý¾Ý¡¢»¤ÕÕÊý¾ÝºÍµØµã¹ú¶È/µØÓòµÈÐÅÏ¢¡£°²È«×¨¼Ò°µÊ¾£¬ÓÉÓÚĿǰֻÓÐ34ÌõÊý¾ÝµÄ½ØÍ¼£¬ËùÒÔÉÐÎÞ·¨È·¶¨ÕâЩÊý¾ÝµÄÕæÊµÐÔ¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2020/06/devicelock-data-from-115-thousand.html
4.ºÚ¿Í½Ù³ÖÁËÅ£½ò´óѧÓʼþϵͳ½øÐÐOffice 365ÍøÂç´¹µö
Check Point×êÑÐÈËÔ±·¢ÏÖ£¬ºÚ¿Í½Ù³ÖÁËÅ£½ò´óѧµÄµç×ÓÓʼþϵͳÀ´½øÐÐÍøÂç´¹µö»î¶¯£¬Ö¼ÔÚÇÔȡŷÖÞ¡¢ÑÇÖÞºÍÖж«Óû§µÄMicrosoft Office 365µÇ¼ʹ´¦¡£ºÚ¿Í·¢ËÍαÔìµÄÓïÒôÓʼþÌáÐÑÐû³ÆÊܺ¦ÕßµÄÓïÒôÓÊÏäÖÐÓÐÒ»ÌõÓïÒôÐÅÏ¢£¬²¢ÓÕʹÆä´ò¿ªÓʼþÖеĶñÒâÁ´½Ó£¬Ö®ºóÓû§»á±»³Á¶¨Ïòµ½´¹µöÒ³Ãæ¡£´Ë±í£¬´ó²¿ÃŵĴ¹µöÓʼþÀ´×ÔÅ£½ò´óѧ·ÖÆç²¿ÃŵĺϷ¨×ÓÓò£¬²¢ÇÒºÚ¿Í»¹ÀûÓÃÁËAdobe·þÎñÆ÷ÉÏÍйܵÄÓò£¬ÒÔ¶ã±Ü´¹µöÓʼþ¼ì²âϵͳ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hijacked-oxford-server-used-by-hackers-for-office-365-phishing/
5.ºÚ¿Í¼ÙÒâÁìÓ¢ÕÐÆ¸ÈËÔ±£¬Õë¶ÔÅ·ÖÞºÍÖж«¾üʺͺ½¿Õ×éÖ¯
ÍøÂ簲ȫ¹«Ë¾ESETµÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÐÂÐ͵ĸ߶ȸ´Ôӵļäµý»î¶¯£¬ºÚ¿Í¼ÙÒâÁìÓ¢ÕÐÆ¸ÈËÔ¹Øë¶ÔÅ·ÖÞºÍÖж«¾üʺͺ½¿Õº½Ìì×éÖ¯£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÎļþ¡£Õâ´Î»î¶¯ÖУ¬ºÚ¿Í¼ÙÒâCollins AerospaceºÍGeneral DynamicsµÄÕÐÆ¸ÈËÔ±£¬Ïòº½¿Õº½ÌìºÍ¹ú·À¹«Ë¾ÓйصÄÔ±¹¤·¢ËÍÐÂÎźͼÙ×°³Éн×ÊÐÅÏ¢µÄ¶ñÒâÎļþ¡£Êܺ¦ÕßÏÂÔØ¸Ã¶ñÒâÎļþºó£¬ºÚ¿Í»á³¢ÊÔÀûÓÃÆäÈëÇÖÍøÂ磬³É¹¦ºó±ã»áÌáÒ鱩Á¦¹¥»÷£¬ÒÔÇÔÈ¡ÖÎÀíÕÊ»§µÄµÇ¼ʹ´¦¡£Ë¼¿¼µ½Ö¸±ê¹«Ë¾µÄÀàÐÍ£¬ESETÒÔΪ¹¥»÷ÕßµÄÖ¸±ê¿ÉÄÜÊÇÃô¸ÐµÄÒµÎñºÍ¼¼ÊõÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/hackers-linkedin-recruiters-scam-military-aerospace-firms/
6.InvisiMoleÔڲ߶¯Õë¶Ô¶«Å·¾üÊÂºÍ±í½»×éÖ¯µÄ¼äµý»î¶¯
ÍøÂ簲ȫ¹«Ë¾ESETÅû¶Á˼äµý×éÖ¯InvisiMoleµÄ×÷°¸ÊÖ·¨£¬ÆäÔÚ¶Ô¶«Å·±¸ÊÜÖõÖ÷ÕžüÊÂºÍ±í½»×éÖ¯ÌáÒé¼äµý»î¶¯£¬»¹·¢ÏÖÁ˸Ã×éÖ¯ÓÃÓÚ½»¸¶¡¢ºáÏòÒÆ¶¯ºÍÖ´ÐÐInvisiMoleºóÃŵŤ¾ß¼¯¡£×êÑз¢ÏÖ£¬Ä¿Ç°InvisiMoleÔÚÓëºÚ¿Í×éÖ¯GamaredonºÏ×÷£¬ºóÕßÒ»Ïò»îÔ¾ÓÚÕë¶ÔÎÚ¿ËÀ¼ºÍ¶íÂÞ˹µÄÍøÂç¼äµý»î¶¯ÖС£´Ë±í£¬InvisiMole¶ÔÆäÓÐЧ¸ºÔØRC2CLºÍRC2FM½øÐÐÁËÉý¼¶£¬Ê¹ÆäÓµÓÐ·ÖÆçµÄ¶ã±Üɱ¶¾Èí¼þ¼ì²âµÄ²½Öè¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2020/06/invisimole-hackers.html


¾©¹«Íø°²±¸11010802024551ºÅ