TrustwaveÅû¶»ªÎªUSB LTE donglesÖÐÌáȨ·ì϶£»ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð
°ä²¼¹¦·ò 2021-06-041.TrustwaveÅû¶»ªÎªUSB LTE donglesÖеÄÌáȨ·ì϶

TrustwaveµÄ×êÑÐÈËÔ±Åû¶ÁË»ªÎªE3372ÐÍUSB LTE donglesÖеÄÌáȨ·ì϶¡£USB donglesÊÇÒ»ÖÖÄܹ»²åÈë±Ê¼Ç±¾µçÄÔºĮ́ʽµçÄÔµÄÓ²¼þ£¬±í¹ÛÏñuÅÌ£¬Äܹ»½Ó¼û»¥ÁªÍø¡£×êÑÐÈËÔ±³ÆÆäÔÚä¯ÀÀdongles×°ÖõÄÇý¶¯·¨Ê½Îļþʱ·¢ÏÖ£¬Ã¿´Î²åÈë¸ÃÉ豸³ÇÊÐ×Ô¶¯ÔËÐÐmbbserviceopen£¬ÔÚWebä¯ÀÀÆ÷´ò¿ª»ªÎªÉ豸ÖÎÀí½çÃæ£¬¶øÕâ¸öÎļþÊÇÒÔÆëȫȨÏÞ£¨777£©ÔËÐеġ£Ä¿Ç°£¬»ªÎªÒѰ䲼Óйظ÷ì϶µÄ°²È«Õ÷ѯ»ººÍ½â´ëÊ©¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/huawei-usb-lte-dongles-are-vulnerable-to-privilege-escalation-attacks/
2.Cisco°ä²¼°²È«¸üУ¬½¨¸´Æä¶à¿î²úÆ·ÖÐÑϳÁµÄ·ì϶

Cisco°ä²¼°²È«¸üУ¬½¨¸´ÁËWebex Player¡¢SD-WANºÍASR 5000 ϵÁÐÖеĶà¸ö·ì϶¡£Õâ´Î½¨¸´µÄ½ÏΪÑϳÁµÄ·ì϶ÊÇWebex PlayerÖеĿɵ¼ÖÂËÁÒâ´úÂëÖ´ÐеÄÄÚ´æ°Ü»µ·ì϶£¨CVE-2021-1526¡¢CVE-2021-1502ºÍCVE-2021-1503£©ÒÔ¼°SD-WANÈí¼þÖеÄÌáȨ·ì϶£¨CVE-2021-1528£©¡£»¹½¨¸´ÁËASR 5000ϵÁÐÈí¼þ(StarOS) ÖеÄÁ½¸öÊÚÈ¨ÈÆ¹ý·ì϶£¨CVE-2021-1539ºÍCVE-2021-1540£©µÈ·ì϶¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118564/security/cisco-webex-player-sd-wan-asr-5000-flaws.html
3.AMT GamesÔÆ´æ´¢ÅäÖÃÃýÎóй¶½ü600ÍòÓû§µÄÐÅÏ¢

WizCase×êÑÐÈËÔ±·¢ÏÖAMT GamesµÄElasticSearch·þÎñÆ÷ÅäÖÃÃýÎóй¶590ÍòÓû§µÄÐÅÏ¢¡£AMT GamesÊÇ×ܲ¿Î»ÓÚÖйúµÄÒ»¼ÒÓÎÏ·¿ª·¢ÉÌ£¬ËüµÄÃâ·ÑÊÖ»úÓÎÏ·Battle for the Galaxy£¨ÌìºÓÖ®Õ½£©ÔÚ103¸ö¹ú¶È/µØÓòÓµº±¼û°ÙÍòÓû§¡£Õâ´Î×ܹ²Ð¹Â¶ÁË1.47TBÊý¾Ý£¬Ô̺¬590Íò¸öÍæ¼Ò×ÊÁÏ¡¢200Íò±ÊÂòÂôºÍ587000 Ìõ·´À¡ÐÂÎÅ£¬Éæ¼°ÕÊ»§ID¡¢µç×ÓÓʼþµØÖ·¡¢ÓÎÏ·Äڲɰì¼ÛÖµºÍÖ§¸¶ÌṩÉ̵ÈÐÅÏ¢¡£Ä¿Ç°£¬¸Ã¹«Ë¾Î´¶Ô´ËʽøÐÐ×¢Ã÷£¬µ«½ûÓÃÁ˶ԷþÎñÆ÷µÄ½Ó¼û¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118529/data-breach/amt-games-data-leak.html
4.±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬Æä·þÎñÒÑÑÓ³¤»òÖжÏ

±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬Õâ¿Éµ¼ÖÂÒ»Ð©Íæ¼ÒµÄ·þÎñ³öÏÖÑϳÁµÄÑÓ³¤ºÍÏνÓÖжϡ£¸Ã¹«Ë¾ÓÚ6ÔÂ1ÈÕ°ä²¼ÍÆÎĹ«¿ªÕâ´Î¹¥»÷£¬²¢°µÊ¾ÆäÔÚÖÂÁ¦»º½âÕâ¸öÎÊÌâ¡£µ«ÓÐTwitterÓû§¶Ô´ËÉêÃ÷×ö³öÆÀÂÛ£¬³ÆÕâ¿ÉÄÜÊÇÓÉÓÚËûÃÇϵͳµÄ¸ºÔØÆ½ºâÇ·°²µ¼Öµģ¬¶ø²»ÊÇDDoS¹¥»÷¡£Õâ¿ÉÄÜÓëÔçЩʱ³½°ä²¼µÄµã»ðµÄÔ¶Õ÷£¨The Burning Crusade£©Óйأ¬ÔçÔÚ½ñÄê1Ô£¬Íæ¼ÒÔÚÍæÄ§ÊÞÊÀ½çʱҲÓöµ½ÁËͬÑùµÄÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/blizzard-experiencing-ddos-attack-possible-high-latency-and-disconnections-533100.shtml
5.ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð

±¸·ÝÉ豸¹©¸øÉÌExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬ÔÚ5ÔÂ13ÈÕÖ§¸¶ÁË260ÍòÃÀÔªÊê½ð¡£ºÚ¿ÍÔÚ½»ÉæÖÐÐû³ÆÆäÒÑÔڸù«Ë¾µÄµÄÍøÂçÖÐÍ£¶ÙÒ»¸ö¶àÔ£¬¼ÓÃÜÁËËùÓÐÎļþ·þÎñÆ÷ºÍSQL ·þÎñÆ÷£¬²¢ÏÂÔØÁ˳¬¹ý800GBµÄÐÅÏ¢¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬¿Í»§ºÍÔ±¹¤µÄÓ×ÎÒÊý¾Ý¡¢Ã³Ò׺Ïͬ¡¢±£ÃܺÍ̸±í¸ñ¡¢²ÆÕþÊý¾Ý¡¢ÄÉ˰É걨±íºÍÔ´´úÂë¡£ºÚ¿Í×î³õÒªÇóµÄÊê½ð½ð¶îΪ7480000ÃÀÔª£¬¾ÂŴν»ÉæºóΪ260ÍòÃÀÔª¡£ExaGridÔÚÊÕµ½½âÃܹ¤¾ßÁ½Ììºó³Æ²»Ó×ÐÄɾ³ýÁËËü£¬²¢ÒªÇóºÚ¿ÍÓÖ·¢ÁËÒ»±é¡£
ÔÎÄÁ´½Ó£º
https://www.computerweekly.com/news/252501665/Exagrid-pays-26m-to-Conti-ransomware-attackers
6.×êÑÐÈËÔ±ÑÝʾÈôºÎÈÆ¹ý΢ÈíAMSIµÄͨÀý°²È«Õ½Êõ

SophosµÄ×êÑÐÈËÔ±ÑÝʾÁËÈôºÎÈÆ¹ý΢Èí·´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) µÄͨÀý°²È«Õ½Êõ¡£×êÑÐÈËÔ±³ÆÒ»ÖÖ²½ÖèÊÇÈÆ¹ýɨÃ跨ʽ£¬Ê¹ÓûìºÏ¡¢¼ÓÃÜ¡¢ÒþдÊõºÍÆäËû¼¼Êõ£¬Ê¹É±¶¾Èí¼þ¸üÄÑ·¢ÏÖpayloadµÄ¹¥»÷Òâͼ£»ÁíÒ»ÖÖÊÇһ·ͷ¾ÍÆëȫԤ·À¶ñÒâÈí¼þ±»É¨Ãè¡£Sophos°µÊ¾£¬³¬¹ý98%µÄAMSI³¢ÊÔ¶¼ÊÇͨ¹ý´Û¸ÄAMSI¿âÀ´ÊµÏֵģ¬ÓжàÖÖ¶ñÒâÈí¼þ»áÊÔͼÕÒµ½ÒѼÓÔØµ½ÄÚ´æÖеÄAmsiScanBuffer£¬¶øºó¸²¸ÇÆäÖ¸ÁîÒÔÈ·±£É¨ÃèÒªÇóʧ°Ü¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/this-is-how-attackers-bypass-microsoft-antimalware-scan-software-amsi/


¾©¹«Íø°²±¸11010802024551ºÅ