ºÚ¿Í×éÖ¯TeamTNTÀûÓüÓÃÜÈ䳿ÇÔÈ¡AWSƾ֤£»TinyMCE±à×ëÆ÷´æÔÚÑϳÁµÄXSS·ì϶ £¬ÏÖÒѽ¨¸´

°ä²¼¹¦·ò 2020-08-18
1.ºÚ¿Í×éÖ¯TeamTNTÀûÓüÓÃÜÈ䳿ÇÔÈ¡AWSƾ֤


1.png

TeamTNTÊÇÒ»¸öÕë¶ÔDocker×°ÖõÄÍøÂç·¸×ï×éÖ¯ £¬»òÐíΪµÚÒ»¸öʹÆ÷ÓµÓÐÇÔÈ¡AWSƾְ֤ÄܵļÓÃÜÍÚ¾ò¶ñÒâÈí¼þµÄ×éÖ¯¡£Trend Micro½ñÄêÔçЩʱ³½·¢ÏÖ £¬¸Ã×éÖ¯´Ó4ÔÂÆðÍ·»îÔ¾ £¬Í¨¹ýÔÚ»¥ÁªÍøÉÏɨÃèÅäÖÃÃýÎóµÄDockerϵͳ½Ó¼û¶³öµÄAPI £¬²¢ÔÚDocker²¿Êð·þÎñÆ÷À´ÔËÐÐDDoSºÍ¼ÓÃܶñÒâÈí¼þ¡£×êÑÐÈËÔ±·¢ÏÖËû»¹Äܹ»É¨ÃèÔËÐÐÔÚAWS»ù´¡¼Ü¹¹ÉÏ·þÎñÆ÷ÖÐµÄ ~/.aws/credentials and ~/.aws/configÎļþ £¬À´»ñÈ¡Amazon Web Services£¨AWS£©Æ¾Ö¤¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/crypto-mining-worm-steal-aws-credentials/


2.TinyMCE±à×ëÆ÷´æÔÚÑϳÁµÄXSS·ì϶ £¬ÏÖÒѽ¨¸´


2.png

TinyMCΪTiny Technologies¹«Ë¾¿ª·¢µÄWYSIWYG HTML±à×ëÆ÷ £¬Ä¿Ç°±»·¢ÏÖ´æÔÚÑϳÁµÄXSS·ì϶ £¬Ó°ÏìÁ˰汾5.2.1ºÍ¸üÔç°æ±¾¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-12648 £¬¿É±»¹¥»÷ÕßÀûÓÃͨ¹ýÌØÔìHTMLÏóÕ÷ÈÆ¹ýɱ¶¾Èí¼þ¡£³É¹¦ÀûÓô˷ì϶Äܹ»Ê¹¹¥»÷ÕßÌáÉýÌØÈ¨¡¢»ñÊØÐÅÏ¢¡¢ÉõÖÁ½Ù³ÖÖ¸±êÓû§µÄÕÊ»§¡£¸Ã·ì϶ÊÇÔÚ2020Äê4ÔÂ7ÈÕ±»·¢ÏÖµÄ £¬¶ûºóÆä³ö²úḚ́䲼Á˲¹¶¡·¨Ê½ £¬²¢ÓÚ±¾Öܹ«¿ªÅû¶¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/high-severity-tinymce-cross-site-scripting-flaw-fixed/158306/


3.Windows Defender½«Citrix×é¼þÏóÕ÷Ϊ¶ñÒâÈí¼þ²¢Îóɾ


3.png

Windows Defender½«Citrix´úÀí·þÎñ£¨BrokerService.exeºÍHighAvailabilityService.exe£©ÃýÎ󵨼ì²âΪÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þAgent Tesla £¬²¢¶ÔÆä½øÐиôÀë¡£ÉÏÖÜËÄ £¬¶àλCitrixϵͳÖÎÀíÔ±»ã±¨ÁËDelivery ControllerÉϵĴúÀí·þÎñ³öÏÖÁ˹ÊÕÏ £¬¸ÃÎÊÌâ³ÖÐøÁË7¸ö¶àÓ×ʱ £¬Ö±µ½Î¢ÈíÍÆ³öɱ¶¾Èí¼þ1.321.1341.0°æ±¾¡£Citrix ½¨ÒéÊÜÓ°ÏìµÄÖÎÀíÔ±ÂíÉ϶ϸùµ±Ç°»º´æ²¢×°ÖøüÐÂÒÔ½â¾ö¸ÃÎÊÌâ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/windows-defender-deletes-citrix-components-mislabeled-as-malware/


4.SANS°ä²¼ÆäÔâµ½µÄ´¹µö¹¥»÷µÄIOC¼°¹¥»÷ϸ½Ú


4.png



SANS°ä²¼ÆäÔâµ½µÄ´¹µö¹¥»÷µÄ·çÏÕÖ¸±ê£¨IOC£©¼°¹¥»÷ϸ½Ú¡£Æ¾¾ÝSANSµÄ˵·¨ £¬×î³õµÄ¹¥»÷ʼÓÚ¼ÙÒâΪSANS SharePoint·þÎñ¹²ÏíµÄÎļþÍøÂç´¹µöµç×ÓÓʼþ¡£¸ÃÓʼþÔ̺¬ÓÐÃûΪ7Ô½±½ð¸±±¾24JUL2020.xlsµÄ¶ñÒâÎļþ £¬²¢ÒªÇóÓû§µã»÷´ò¿ª°´Å¥ÒÔ½Ó¼û¸ÃÎļþ¡£Ö®ºó £¬Óû§»á±»³Á¶¨Ïòµ½´¹µöÍøÒ³²¢±»ÒªÇóÊäÈëOffice 365Í´´¦ £¬Í¬Ê±×°ÖÃÃûΪEnable4ExcelµÄMicrosoft Office OAuth²å¼þ¡£×°Öòå¼þºó»á´´½¨ÃûΪ·´À¬»øÓʼþ¹æ¶¨µÄת·¢¹æ¶¨ £¬À´¼à¶½Ìض¨µÄ¹Ø¼ü×Ö¡£Ò»µ©¼ì²âµ½Æ¥ÅäµÄ¹Ø¼ü×Ö £¬Ôò¸Ãµç×ÓÓʼþ½«±»×ª·¢µ½±í²¿µØÖ· daemon[@]daemongr5yenh53ci0w6cjbbh1gy1l61fxpd.com¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sans-shares-details-on-attack-that-led-to-their-data-breach/


5.Õë¶ÔÓ¢¹ú³¬ÊÐAsdaµÄ´¹µö¹¥»÷ÇÔÈ¡Óû§ÐÅÓþ¿¨ÐÅÏ¢


5.png


ºÚ¿ÍÀûÓÃFacebookºÍTwitterÌáÒéÓã¹¥»÷ £¬Õë¶ÔÓ¢¹ú³¬ÊÐAsdaµÄÓû§ £¬Ö¼ÔÚÇÔÈ¡ÆäÐÅÓþ¿¨ÐÅÏ¢¡£ºÚ¿ÍÊ×ÏÈÔÚÍøÕ¾°ä²¼¸æ°× £¬ÎªÊ®Ôµ®ÉúµÄ¸¾Å®Ãâ·ÑÌṩ1000Ó¢°÷µÄÀñÎ│¡£µã»÷¸Ã¸æ°×Á´½ÓµÄÊܺ¦Õ߻ᱻ³Á¶¨Ïòµ½¼Ù×°³É³¬ÊйÙÍøµÄ¶ñÒâÍøÕ¾ £¬²¢±»ÒªÇóÊäÈëÆäÓ×ÎÒ¾ßÌåÐÅÏ¢ÒÔ»ñÈ¡ÀñÎ│ £¬Ô̺¬Ô̺¬ÐÕÃû¡¢¼Òͥסַ¡¢ÊÖ»úºÅÂë¡¢ÒøÐÐÕÊ»§¾ßÌåÐÅÏ¢ºÍÒøÐп¨°²È«ºÅ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/phishing-scam-targets-asda-shoppers/


6.¿ÂÄῨÃÀÄÜ´ïϵͳϰȾÀÕË÷Èí¼þEXXÖÂÍ£»úÒ»ÖÜ


6.png


óÒ×¼¼Êõ¹«Ë¾¿ÂÄῨÃÀÄܴKonica Minolta£©µÄϵͳÔÚ7Ôµ×ϰȾÀÕË÷Èí¼þEXX £¬µ¼ÖÂÍ£»ú½üÒ»ÖÜ¡£¸Ã¹«Ë¾Ìṩ¸÷Àà·þÎñºÍ²úÆ· £¬´Ó´òÓ¡½â¾ö¹æ»®¡¢Ò½ÁƼ¼Êõµ½ÎªÆóÒµÌṩÍйÜIT·þÎñ¡£2020Äê7ÔÂ30ÈÕ £¬¹«Ë¾¿Í»§ÆðÍ··´Ó³ÆäÎÞ·¨½Ó¼û¿ÂÄῨÃÀÄÜ´ïµÄ¹ÙÍø £¬¶øÄ³Ð©Konica Minolta´òÓ¡»úÒ²ÏÔʾ·þÎñ֪ͨʧ°ÜµÄÃýÎó¡£ÓÐÐÂÎÅÆðÔ´³Æ £¬Konica MinoltaÔâµ½ÁËÀÕË÷Èí¼þEXXµÄ¹¥»÷ £¬ÆäÉ豸ҲÒѱ»¼ÓÃÜ £¬²¢±»Ôö³¤À©´óÃû.K0N1M1N0¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/business-technology-giant-konica-minolta-hit-by-new-ransomware/