eSentire·¢ÏÖÕë¶ÔLinkedInÓû§·Ö·¢more_eggsµÄ´¹µö»î¶¯£»ClarotyÅû¶ÂÞ¿ËΤ¶û×Ô¶¯»¯µÄ²úÆ·ÖÐÓжà¸ö·ì϶

°ä²¼¹¦·ò 2021-04-07

1.eSentire·¢ÏÖÕë¶ÔLinkedInÓû§·Ö·¢more_eggsµÄ´¹µö»î¶¯


1.jpg


°²È«¹«Ë¾eSentire·¢ÏÖÕë¶ÔLinkedInÉÏʧҵÓû§µÄÐÂÒ»ÂÖÓã²æÊ½ÍøÂç´¹µö»î¶¯ £¬ÀûÓÃÁ˶ñÒâµÄZIPÎļþÀ´·Ö·¢¸´ÔÓµÄÎÞÎļþºóÃÅmore_eggs ¡£¸Ã¶ñÒâÈí¼þ»á½Ù³ÖºÏ·¨µÄWindows¹ý³ÌÀ´°µ²ØÆäÅäÖÃÎļþ £¬²¢¿É¼ìË÷ÆäËû¶ñÒâpayload»òÊÇÇÔÈ¡Êý¾Ý ¡£´Ë±í £¬¸Ã»î¶¯Äܹ»Õë¶Ô·ÖÆçµÄÖ¸±êÀ´²»Ðݵ÷ÕûÆä¹¥»÷ £¬ÀûÓÃÌØÔìµÄµö¶üÀ´ÓÕʹÓû§ÏÂÔØ¶ñÒâÈí¼þ ¡£Ä¿Ç°Éв»Ã÷ÏԸúڿÍ×éÖ¯µÄÉí·Ý £¬µ«¾Ý´§Ä¦ £¬¿ÉÄÜÓëFIN6¡¢Cobalt Group»òEvilnumÓйØ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.esentire.com/security-advisories/hackers-spearphish-professionals-on-linkedin-with-fake-job-offers-infecting-them-with-malware-warns-esentire


2.OnapsisÓëSAP½áºÏ°ä²¼Õë¶ÔSAPÀûÓõĹ¥»÷»î¶¯µÄ¾¯±¨


2.jpg


4ÔÂ6ÈÕ £¬Ôư²È«¹«Ë¾OnapsisºÍSAPÖÒ¸æÁËÕë¶ÔSAPÀûÓõijÖÐø¹¥»÷ £¬²¢ÓëCISAºÍµÂ¹úÍøÂ簲ȫ»ú¹¹BSIºÏ×÷ £¬ÌáÐÑSAP¿Í»§×°Öò¹¶¡·¨Ê½²¢µ÷²éÆä»·¾³ÖÐÊÇ·ñ´æÔÚ²»°²È«µÄÀûÓà ¡£Onapsis³Æ £¬ÔÚ2020Äê6ÔÂÖÁ2021Äê3ÔÂÖ®¼ä £¬²úÉúÁËÀ´×Ô20¸ö¹ú¶È»òµØÓòµÄ1500´Î¹¥»÷³¢ÊÔ £¬ÆäÖÐ300´Î¹¥»÷³É¹¦ ¡£¸Ã»ã±¨»¹¾ßÌåÃèÊöÁËÕâЩ¶ñÒâ»î¶¯Ê¹Óõķì϶ºÍ¹¥»÷²½Öè £¬Ö¼ÔÚÔ®ÊÖÓû§¼ø±ðºÍ·À±¸Ç±ÔڵĹ¥»÷»î¶¯ ¡£


Ô­ÎÄÁ´½Ó£º

https://onapsis.com/active-cyberattacks-mission-critical-sap-applications


3.SensorFuÅû¶Apple MailÖмàÌýÓʼþµÄÁãµã»÷·ì϶


3.jpg


SensorFuÅû¶AppleµÄmacOS MailÖдæÔÚ¿ÉÓÃÀ´¼àÌýÓʼþµÄÁãµã»÷·ì϶ ¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-9922 £¬CVSSÆÀ·ÖΪ6.5 £¬¿ÉÓÃÀ´ÔÚMailµÄɳÏä»·¾³ÖÐÔö³¤»òÅú¸ÄËÁÒâÎļþ ¡£¹¥»÷ÕßÖ»ÐèÏòÖ¸±ê·¢ËÍÒ»·â´øÓÐÁ½¸ö.ZIPÎļþµÄÓʼþ¼´¿É´¥·¢¸Ã·ì϶ £¬µÚÒ»¸ö.ZIPÔ̺¬ÃûΪMailµÄ·ûºÅÁ´½Ó £¬Ö¸ÏòÊܺ¦ÕßµÄ$HOME/Library/MailºÍ1.txt £¬µÚ¶þ¸ö.ZIPÔ̺¬Òª¶Ô$HOME/Library/MailËù×öµÄ¸ü¸Ä £¬À´Ìṩ¶Ô¿â»òÓʼþµÄËÁÒâÎļþдÈëȨÏÞ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/apple-mail-zero-click-security-vulnerability/165238/    


4.ClarotyÅû¶ÂÞ¿ËΤ¶û×Ô¶¯»¯µÄ²úÆ·ÖдæÔÚ¶à¸ö·ì϶


4.jpg


°²È«¹«Ë¾ClarotyÅû¶ÁËÂÞ¿ËΤ¶û×Ô¶¯»¯µÄFactoryTalk AssetCentre²úÆ·ÖдæÔÚµÄ9¸ö·ì϶ £¬ËüÃǵÄCVSS 3ÆÀ·Ö¾ùΪ10 ¡£¸Ã²úÆ·ÖØÒªÓÃÓÚÕû¸ö¹¤³§Óë×Ô¶¯»¯ÓйصÄ×ʲúÐÅÏ¢µÄ±£»¤¡¢ÖÎÀí¡¢°æ±¾½ÚÔì¡¢¸ú×ٺͻ㱨 ¡£ÕâЩ·ì϶±ðÀëΪ²»³ÉÐÅÊý¾ÝµÄ·´ÐòÁл¯£¨CVE-2021-27462¡¢CVE-2021-27466¡¢CVE-2021-27460ºÍCVE-20201-27470£©¡¢²Ù×÷ϵͳºÅÁî×¢È루CVE-2021-27476£©¡¢SQL×¢È루CVE-2021-27472¡¢CVE-2021-27468ºÍCVE-2021-27464£©ÒÔ¼°ÐÅϢй¶£¨CVE-2021-27474£© ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/116391/ics-scada/rockwell-factorytalk-assetcentre-flaws.html


5.ÐÂ¼ÓÆÂ¹¤»áe2iÔâµ½´¹µö¹¥»÷ £¬Ð¹Â¶ÊýÍò¹«ÃñµÄÐÅÏ¢


5.jpg


ÐÂ¼ÓÆÂÈ«¹ú¹¤»á´ú±í´ó»á¾ÍÒµÓë¾ÍÒµ×êÑÐËù£¨e2i£©ÔÚ±¾ÖÜÒ»£¨4ÔÂ5ÈÕ£©°ä²¼ÉêÃ÷³Æ £¬¹¥»÷Õß¿ÉÄÜÒѾ­½Ó¼ûÆäÓû§µÄÓ×ÎÒÐÅÏ¢ ¡£Õâ´Îй¶µÄÐÅÏ¢Ô̺¬Óû§µÄÐÕÃû¡¢½ÌÓý×ʸñºÍNRIC¡¢ÁªÏµ·½Ê½ºÍ¾Íҵϸ½ÚµÈ ¡£ÊÂÎñ²úÉúÔÚ3ÔÂ12ÈÕ £¬ÆäµÚÈý·½¹©¸øÉÌ¡ª¡ªÁªÏµÖÐÐÄ·þÎñ¹«Ë¾i-vic InternationalÔ±¹¤µÄÓÊÏäÔâµ½´¹µö¹¥»÷ £¬¸ÃÓÊÏäµÄÔÆ¶ËÔ̺¬ÁËÔ¼3Íò¸ö²ÎÓëÁËe2i»î¶¯µÄÓû§ÐÅÏ¢ £¬µ«ÊǸûú¹¹»Ø¾øÐ¹Â©×ܹ²Óм¸¶àÈËÔøÊ¹Óùýe2iµÄ·þÎñ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.straitstimes.com/tech/tech-news/personal-data-of-30000-people-who-use-ntucs-e2i-services-may-have-been-breached


6.Unit42°ä²¼2020ÄêÍøÂç´¹µö¹¥»÷Ç÷ÏòµÄ»ØÊ׻㱨


6.jpg


Unit42°ä²¼ÁË2020ÄêÍøÂç´¹µö¹¥»÷Ç÷ÏòµÄ»ØÊ׻㱨 ¡£»ã±¨ÏÔʾ £¬´Ó2019µ½2020Äê £¬¶ñÒâPDFÎļþ¼±¾çÔö³¤ÁË1160£¥ £¬´Ó411800¸ö¶ñÒâÎļþÔö³¤µ½5224056¸ö ¡£ÎªÁËÓÕʹÓû§´¹µöPDFÎļþÖеÄǶÈëµÄÁ´½Ó £¬¹¥»÷ÕßÔÚ2020ÄêÖØÒªÊ¹ÓÃÁË5ÖÖ·ÖÆçµÄý½é £¬·ÖΪαÔìµÄÑéÖ¤Â루ռ±È38.67%£©¡¢ÓÅ»Ýȯ£¨2.16%£©¡¢´øÓв¥·Å°´Å¥µÄ¾²Ì¬Í¼Ïñ£¨1.44%£©¡¢Îļþ¹²Ïí£¨0.84%£©ºÍµç×ÓÉÌÎñ£¨0.36%£© ¡£ÆäÖÐ £¬´óÎÞÊý¹¥»÷ʹÓÃÁËÒ»ÖÖͨÓü¼Êõ£ºÁ÷Á¿³Á¶¨Ïò ¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/phishing-trends-with-pdf-files/