ÃÀ¹ú200¶à¸ö´¦Ëù¾¯¾Ö24ÄêÊý¾Ýй¶£¬±»³ÆÎªBlueLeaks£»¶ñÒâÈí¼þShlayer Mac¿ÉÈÆ¹ýmacOSÄÚÖð²È«·À»¤
°ä²¼¹¦·ò 2020-06-231.ÃÀ¹ú200¶à¸ö´¦Ëù¾¯¾Ö24ÄêÊý¾Ýй¶£¬±»³ÆÎªBlueLeaks
ËùνµÄBlueLeaksÊÇÒ»¸öÃûΪDistributed Denial of Secrets£¨DDoSecrets£©µÄºÚ¿Í×éÖ¯°ä²¼µÄ269 GBµÄÊý¾Ý£¬Ô̺¬ÁË200¶à¸ö¾¯¾Ö24ÄêµÄÊý¾Ý¡£Ð¹Â¶Êý¾ÝÔ̺¬¸ß¶ÈÃô¸ÐµÄÐÅÏ¢£¬ÀýÈçACH·ÓɺÅÂë¡¢¹ú¼ÊÒøÐÐÕʺţ¨IBAN£©ºÍÆäËû²ÆÕþÊý¾Ý£¬ÒÔ¼°Ó×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡¢ÏÓÒÉÈËͼÏñ£¨RFI£©¡¢ÆäËû·¨Âɺ͵±¾Ö»ú¹¹»ã±¨¡£NFCAµÄµ÷²éÁ˾ÖÅú×¢£¬Ð¹Â©Îļþ¿É×·Òäµ½24ÄêǰµÄ1996Äê8Ô£¬¶øÕâ´Îй¶ÊǵÄÔÓÉÓڵ¿ËÈøË¹ÖÝÐÝ˹¶ÙµÄÈí¼þ¿ª·¢¹«Ë¾Netsential²úÉúµÄÊý¾Ýй¶¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/blueleaks-data-dump-exposes-over-24-years-of-police-records/
2.¶ñÒâÈí¼þShlayer Mac»Ø¹é£¬¿ÉÈÆ¹ýmacOSÄÚÖð²È«·À»¤
°²È«¹«Ë¾IntegoµÄ×êÑÐÈËÔ±·¢ÏÖÁ˶ñÒâÈí¼þShlayer MacµÄбäÌ壬ÆäÄܹ»Í¨¹ýGoogleËÑË÷Á˾ִ«²¼¡£¸ÃбäÖÖ¼Ù×°³ÉAdobe Flash Player×°Ö÷¨Ê½£¨.DMG´ÅÅÌÓ³Ïñ£©ÒÔ¶ã±Üɱ¶¾Èí¼þµÄ¼ì²â¡£Intego°µÊ¾£¬¸Ã¶ñÒⲡ¶¾Äܹ»ÈƹýÆ»¹ûÄÚÖõÄmacOS°²È«·À»¤£¬µ±ËûÃÇÀûÓÃVirusTotalÉÏËùÓеÄɱ¶¾ÒýÇæ¶Ô¸Ã¶ñÒâÈí¼þµÄ×°Ö÷¨Ê½ºÍÓÐЧ¸ºÔؽøÐмì²âʱ£¬·¢ÏÖ¼ì²âÂÊΪ0/60¡£Ä¿Ç°£¬Éв»Ã÷È·Óм¸¶à¸öÕ¾µãÒѱ»ÓÃÀ´´«²¼¸Ã¶ñÒâÈí¼þ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/105028/malware/shlayer-mac-malware-search-engines.html?utm_source=rss&utm_medium=rss&utm_campaign=shlayer-mac-malware-search-engines
3.PCI°²È«³ß¶ÈίԱ»á¸üÐÂÖ§¸¶É豸³ß¶ÈÒÔ±£»¤³Ö¿¨ÈËÊý¾Ý
PCI°²È«³ß¶ÈίԱ»áÒѸüÐÂÁËÖ§¸¶É豸³ß¶È£¬ÒÔ±£»¤³Ö¿¨ÈËÊý¾Ý¡£PTS POI 6.0°æ±¾ÐÄÔÚ±£»¤¿¨Æ¬£¨ÔÚ´ÅÌõ»òEMV¿¨µÄоƬÉÏ£©»òÔÚÒÆ¶¯É豸ÖÐʹÓõÄPIN£¬ÒÔ¼°³Ö¿¨ÈËµÄÆäËûÊý¾Ý¡£Ð³߶ÈÖУ¬½«¹Ì¼þµÄÉóÅú¹¦·òÏÞ¶ÈÔÚ3ÄêÒÔÄÚ£¬ÒÔÈ·±£Äܹ»Ó¦¶Ô²»ÐÝ·¢Õ¹µÄ·ì϶£»ÒªÇóEMVÉ豸֧³ÖÍÖÔ²ÇúÏß¼ÓÃÜ(ECC)£¬ÒÔÌá¸ßEMVµÄ¼ÓÃܼ¶±ð£»Ê¹ÓÃ×ñÑCOTS (SPoC)³ß¶ÈµÄ»ùÓÚÈí¼þµÄPINÊäÈëµÄ½â¾ö¹æ»®¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/06/18/pts-poi-standard/
4.BitDefender½¨¸´ÁËÆäSafepayä¯ÀÀÆ÷×é¼þÖеÄÔ¶³ÌºÅÁîÖ´Ðзì϶
BitDefender½¨¸´ÁËÆäSafepayä¯ÀÀÆ÷×é¼þÖеÄÔ¶³ÌºÅÁîÖ´Ðзì϶£¨CVE-2020-8102£©£¬¸Ã·ì϶ӰÏìÁËBitdefender Total Security 2000֮ǰµÄ°æ±¾¡£¸Ã·ì϶ÊÇÓÉÓÚSafepayä¯ÀÀÆ÷×é¼þ´æÔÚÊäÈëÑéÖ¤·ì϶£¬µ¼ÖºڿÍÄܹ»ÀûÓÃÌØÔìµÄÍøÒ³ÔÚSafepayÖÐÔ¶³ÌÖ´ÐкÅÁî¡£BitdefenderÄܹ»²é³°²È«µÄHTTPSÏνӲ¢ÏÔʾÃýÎóÒ³Ãæ£¬µ«ÊDz¿ÃŰ²È«ÁîÅÆ»á´Ó¸ÃÃýÎóÒ³ÃæÐ¹Â¶£¬µ¼ÖÂÄܹ»±»ºÚ¿ÍÓÃÀ´½øÐкÅÁîÖ´ÐУ¬ÉõÖÁÊÇÆô¶¯ËÁÒâÀûÓ÷¨Ê½¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/bitdefender-fixes-bug-allowing-attackers-to-run-commands-remotely/
5.Windows DefenderȨÏÞÌáÉý·ì϶£¨CVE-2020-1170£©·ÖÎö
Microsoft Windows DefenderÖдæÔÚȨÏÞÌáÉý·ì϶£¨CVE-2020-1170£©£¬¹¥»÷Õß¿Éͨ¹ýÔËÐÐÌØÔìµÄÀûÓ÷¨Ê½ÀûÓø÷ì϶ɾ³ýϵͳÉÏËÁÒâÎļþ£¬ÒÔϲúÆ·¼°°æ±¾Êܵ½Ó°Ï죺Microsoft Forefront Endpoint Protection 2010¡¢Microsoft Security Essentials¡¢Microsoft System Center 2012 Endpoint Protection¡¢Microsoft System Center 2012 R2 Endpoint Protection¡¢Microsoft System Center Endpoint Protection¡£¸Ã·ì϶ÓëWindows DefenderÈÕÖ¾ÎļþµÄ´¦Ö÷½Ê½Óйأ¬Ô̺¬µÍÌØÈ¨Óû§Ò²Äܹ»Í¨¹ýºÅÁîǰ¹ý³ÌÀ´´¥·¢ÈÕÖ¾ÎļþдÈë²Ù×÷£¬ÈκÎÓû§¶¼Äܹ»ÔÚC:\Windows\Temp\Öд´½¨ÎļþºÍĿ¼£¬ÈÕÖ¾ÂÖ»»»úÔì±£ÕÏÈÕÖ¾ÉÙÓÚ16MB¡£
ÔÎÄÁ´½Ó£º
https://itm4n.github.io/cve-2020-1170-windows-defender-eop/
6.Windows LNKÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-1299£©·ÖÎö
Windows LNK´æÔÚÔ¶³Ì´úÂëÖ´Ðзì϶£¬ÔÚ´¦ÖÃ.lnkÎļþʱ£¬¸Ã·ì϶¿ÉÄÜÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¬³É¹¦ÀûÓø÷ì϶µÄÄܹ»»ñµÃÓë±¾µØÓû§Ò»ÑùµÄÓû§È¨ÏÞ¡£¹¥»÷Õß¿ÉÏòÓû§·Ö·¢Ô̺¬¶ñÒâµÄ.LNKÎļþºÍ¶ñÒâ¶þ½øÔìÎļþµÄ¿ÉÒÆ¶¯Çý¶¯Æ÷»òÔ¶³Ì¹²ÏíÎļþ¡£µ±Óû§ÔÚWindows×ÊÔ´ÖÎÀíÆ÷»òÈÎºÎÆäËû½âÎö.LNKÎļþµÄÀûÓ÷¨Ê½Öдò¿ª´ËÇý¶¯Æ÷£¨»òÔ¶³Ì¹²ÏíÎļþ£©Ê±£¬¶ñÒâ¶þ½øÔìÎļþ½«ÔÚÖ¸±êϵͳÉÏÖ´Ðй¥»÷ÕßËùÉèÖõĴúÂë¡£
ÔÎÄÁ´½Ó£º
https://blog.vincss.net/2020/06/cve49-microsoft-windows-lnk-remote-code-execution-vuln-cve-2020-1299-eng.html


¾©¹«Íø°²±¸11010802024551ºÅ