Google°ä²¼3ÔÂAndroid°²È«¸üУ¬×ܼƽ¨¸´37¸ö·ì϶£»ÂíÀ´Î÷ÑǺ½¿Õ¹«Ë¾³ÆÆä»áÔ±ÐÅÏ¢ÒÑй¶³¤´ï¾ÅÄêÖ®¾Ã
°ä²¼¹¦·ò 2021-03-041.Google°ä²¼3ÔÂAndroid°²È«¸üУ¬×ܼƽ¨¸´37¸ö·ì϶

GoogleÓÚ2021Äê3Ô°䲼ÁËAndroid°²È«¸üУ¬×ܼƽ¨¸´ÁË37¸ö·ì϶¡£Õâ´Î½¨¸´µÄ×îΪÑϳÁµÄ·ì϶ÊÇϵͳÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2021-0397£©£¬Ó°ÏìÁËAndroid 8.1¡¢9¡¢10ºÍ11°æ±¾¡£´Ë±í£¬»¹½¨¸´ÁË¿ò¼ÜÖпɵ¼ÖÂÊý¾Ýй¶µÄCVE-2021-0391ºÍCVE-2021-0398·ì϶£¬ÒÔ¼°Ó°ÏìÁËQualcomm¹ØÔ´×é¼þµÄ¶à¸öÑϳÁµÄ·ì϶£¨CVE-2020-11192¡¢ CVE-2020-11204¡¢CVE-2020-11218¡¢CVE-2020-11227ºÍCVE-2020-11228£©µÈ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/115189/mobile-2/google-android-rce-2.html
2.SEC Consult·¢ÏÖGenuaµÄ·À»ðǽ´æÔÚÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶

°ÂµØÀûÍøÂ簲ȫÕ÷ѯ¹«Ë¾SEC Consult·¢ÏÖÁ˵¹ú°²È«¹«Ë¾Genua¿ª·¢µÄ·À»ðǽÉ豸ÖдæÔÚÑϳÁµÄ·ì϶¡£Genua GenugateÊÇÊÀ½çÉÏΨһ»ñµÃµÂ¹úµ±¾Ö¸ß¿¹ÆÀ¼¶µÄ·À»ðǽ£¬Çкϱ±Ô¼Ï޶ȺÍÅ·Ã˵ÄRESTREINT UE/EU RESTRICTEDÊý¾Ý°²È«ÂÉÀý¡£¸ÃÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶±»×·×ÙΪCVE-2021-27215£¬Î»ÓÚ·À»ðǽµÄÖÎÀí½Ó¿Ú£¬ÀûÓø÷ì϶ºÚ¿ÍÎÞÐèÊäÈëµÇ¼ʹ´¦¼´¿ÉµÇ¼µ½ÖÎÀíÔ±Ò³Ãæ³ÉΪrootÓû§£¬²¢¸ü¸Ä·À»ðǽÅäÖá£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/authentication-bypass-vulnerability-nato-eu-firewall/
3.ÂíÀ´Î÷ÑǺ½¿Õ¹«Ë¾³ÆÆä»áÔ±ÐÅÏ¢ÒÑй¶³¤´ï¾ÅÄêÖ®¾Ã

ÂíÀ´Î÷ÑǺ½¿Õ¹«Ë¾³ÆÆäEnrich³£´î¿Í´òËãÖлáÔ±µÄÓ×ÎÒÐÅÏ¢ÒÑй¶³¤´ï¾ÅÄêÖ®¾Ã¡£¸Ã¹«Ë¾°µÊ¾ÆäÊÕµ½À´×ÔµÚÈý·½IT·þÎñÌṩÉ̵Ä֪ͨ£¬Ö¸³ö¸Ã¹«Ë¾ÔÚ2010Äê3ÔÂÖÁ2019Äê6ÔÂÆÚ¼ä²úÉúÁËÊý¾Ýй¶£¬Ð¹Â¶µÄÊý¾ÝÔ̺¬»áÔ±µÄÃû³Æ¡¢ÁªÏµÐÅÏ¢¡¢µ®ÉúÈÕÆÚ¡¢ÐԱ𡢳£´î¿ÍºÅÂ롢״̬ºÍ¼Î½±µÈ¼¶¡£Ä¿Ç°Éв»Ã÷ÏÔÊÜÓ°Ïì»áÔ±µÄÁìÓò£¬¸Ã¹«Ë¾Ò²Î´°ä²¼¸ü¶àÓйØÕâ´ÎÊÂÎñµÄÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/malaysia-airlines-discloses-a-nine-year-long-data-breach/
4.Êý¾Ý·ÖÎö¹«Ë¾PolecatÒòÅäÖÃÃýÎóй¶30TBÊý¾Ý

Ó¢¹úÊý¾Ý·ÖÎö¹«Ë¾PolecatÒòElasticsearch·þÎñÆ÷ÅäÖÃÃýÎóй¶30TBÊý¾Ý¡£Wizcase×êÑÐÈËÔ±ÓÚ2020Äê10ÔÂ29ÈÕ·¢ÏÖÁ˶³öµÄ·þÎñÆ÷£¬PolecatÓÚ11ÔÂ2ÈÕ¶ÔÆä½øÐÐÁ˱£»¤¡£µ÷²éÏÔʾ¸Ã·þÎñÆ÷´æ´¢ÁË2007ÄêÖÁ½ñµÄÒµÎñ¼Í¼£¬Ô̺¬Ô±¹¤µÄÓû§ÃûºÍÃÜÂë¡¢³¬¹ý65ÒÚÌõÍÆÎÄ¡¢³¬¹ý10ÒÚÌõÌû×ÓÒÔ¼°É罻ýÌå¼Í¼¡£´Ë±í£¬¸ÃÊý¾Ý¿âÓÚ2020Äê10ÔÂ30ÈÕÔâµ½ÁËMeow¹¥»÷£¬Êý¾Ý¿âË÷Òý±»´úÌæÎªgg-meowºó׺£¬µ¼Ö´óÁ¿Êý¾Ý±»·ÛËé¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/polecat-data-analytics-data-breach-30tb-data-exposed/
5.ºÚ¿ÍÀûÓÃеĶñÒâNPMÈí¼þ°üÕë¶ÔAmazonºÍSlackµÅצÓÃ

¿ªÔ´°²È«¹«Ë¾Sonatype·¢ÏÖºÚ¿ÍÀûÓÃеĶñÒâNPMÈí¼þ°üÕë¶ÔAmazon¡¢Zillow¡¢LyftºÍSlackµÅצÓ÷¨Ê½¡£ÕâÖÖ¹¥»÷ÀûÓÃÁËÒÀÀµ¹ØÏµ»ìºÏµÄ·½Ê½£¬ºÚ¿ÍʹÓÃÓ빫˾ÄÚ²¿´æ´¢¿â»ò×é¼þÒ»ÑùµÄÃû³ÆÀ´¶¨ÃûÈí¼þ°ü£¬²¢ÍйÜÔÚ¹«¹²´æ´¢¿â(Ô̺¬npm¡¢PyPIºÍRubyGems)ÉÏ£¬¶øÒÀÀµÖÎÀíÆ÷ÔÚ¹¹½¨ÀûÓÃʱ½«Ê¹Óù«¹²´æ´¢¿âÉϵİü£¬¶ø·Ç¹«Ë¾ÄÚ²¿µÄ°ü¡£Í¨¹ýÕâÖÖ·½Ê½£¬ºÚ¿ÍÄܹ»ÔÚ¹©¸øÁ´¹¥»÷Öн«×Ô¼ºµÄ¶ñÒâ´úÂë×¢ÈëÄÚ²¿ÀûÓ÷¨Ê½¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/malicious-npm-packages-target-amazon-slack-with-new-dependency-attacks/
6.Cisco Talos°ä²¼¶ñÒâÈí¼þObliqueRATµÄ·ÖÎö»ã±¨

Cisco Talos°ä²¼ÁËÓйضñÒâÈí¼þObliqueRATµÄ·ÖÎö»ã±¨¡£Talos×î½ü·¢ÏÖÁËÐµĹ¥»÷»î¶¯£¬¸Ã»î¶¯·Ö·¢Á˶ñÒâÔ¶³Ì½Ó¼ûľÂí£¨RAT£©ObliqueRAT£¬ÖØÒªÕë¶ÔÄÏÑǵÄ×éÖ¯¡£ÔÚÒÔÍùµÄ¹¥»÷»î¶¯ÖУ¬ºÚ¿ÍʹÓöñÒâµÄMicrosoft OfficeÎĵµ£¨maldocs£©´«²¼¸ÃRAT¡£µ«ÐµĹ¥»÷»î¶¯Ôò½«payload°µ²ØÔÚÔ̺¬ÓÐZIPÎļþµÄBMPͼÏñÖУ¬¶ñÒâºêÕÆ¹ÜÌáÈ¡ZIP£¬¶øºóÏÂÔØObliqueRAT¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2021/02/obliquerat-new-campaign.html


¾©¹«Íø°²±¸11010802024551ºÅ