×êÑÐÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day£»¶ò¹Ï¶à¶ûµçÐŹ«Ë¾CNTÔâµ½RansomEXXÀÕË÷¹¥»÷

°ä²¼¹¦·ò 2021-07-19
1.×êÑÐÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day


1.jpg


×êÑÐÍŶӹ«¿ªÅû¶ÁËÒ»¸öеÄ0day£¬¹¥»÷ÕßÀûÓø÷ì϶Äܹ»Í¨¹ýÔ¶³Ì´òÓ¡·þÎñ»ñµÃWindowsÉϵÄSYSTEMȨÏÞ¡£×êÑÐÈËÔ±Benjamin Delpy³Æ£¬¸Ã·ì϶ÀûÓÃÁËWindows Point and PrintÖ°ÄÜÖеġ°Queue-Specific Files¡±¸öÐÔ¡£ÔÚ×°ÖôòÓ¡»úʱ£¬¹©¸øÉÌÌṩµÄ×°Ö÷¨Ê½Äܹ»Ö¸¶¨Ò»×éÓëÌØ¶¨´òÓ¡¶ÓÁÐÓйØÁªµÄÈκÎÀàÐ͵ÄÎļþ£¬¸ÃÎļþ½«±»ÏÂÔØµ½Ã¿Ò»¸öÏνӵ½´Ë´òÓ¡·þÎñÆ÷µÄ¿Í»§¶Ë¡£Òò¶ø£¬µ±¿Í»§¶ËÏνӵ½¹¥»÷ÕßËù½ÚÔìµÄ´òÓ¡·þÎñÆ÷ʱ£¬½«×Ô¶¯ÏÂÔØ²¢ÒÔSYSTEMȨÏÞÖ´ÐжñÒâDLL¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/new-windows-print-spooler-zero-day-exploitable-via-remote-print-servers/


2.CloudflareµÄCDN JSÖзì϶ӰÏìÈ«ÍøÉÏ12.7%µÄÍøÕ¾


2.jpg


CloudflareÒѽ¨¸´Æä¿ªÔ´CDN JSÖеÄÒ»¸öÑϳÁ·ì϶£¬¸Ã·ì϶¿ÉÓ°ÏìÈ«ÍøÉÏ12.7%µÄÍøÕ¾¡£CDN JSΪÊý°ÙÍòÍøÕ¾Ìṩ³¬¹ý4000¸öJavaScriptºÍCSS¿â£¬ÎªµÚ¶þ´óJavaScript CDN¡£×êÑÐÈËÔ±·¢ÏÖ¶ÔÓÚÿ¸ö°ä²¼µ½CDN JSµÄGitHub´æ´¢¿âµÄ¿â£¬Æä¸üа汾½«´ÓÁ´½ÓµÄnpm×¢²á±íÏÂÔØ£¬²¢ÇÒ¸Ãnpm°æ±¾Ò²ÓÉ¿âµÄ×÷ÕßÊØ»¤¡£µ±°ä²¼Ô̺¬õè¾¶±éÀú·ì϶µÄnpm°üºó£¬¸Ã°ü×îÖÕÒ²»á±»CDNJSµÄ¸üлúеÈË´¦Ö㬲¢ÔÚÆæ¹ÖµÄõè¾¶ÉÏ×¢ÈëBash¾ç±¾¡£¸Ã·ì϶¿É±»ÓÃÀ´Ô¶³ÌÖ´ÐкÅÁÏÖÒѱ»½¨¸´¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-cloudflare-cdn-flaw-allowed-compromise-of-12-percent-of-all-sites/


3.¶ò¹Ï¶à¶ûµçÐŹ«Ë¾CNTÔâµ½RansomEXXÀÕË÷¹¥»÷


3.jpg


¶ò¹Ï¶à¶ûµÄ¹«Ë¾Corporaci¨®n Nacional de Telecomunicaci¨®n (CNT)Ôâµ½RansomEXXÀÕË÷¹¥»÷£¬µ¼ÖÂÒµÎñÔËÓª¡¢Ö§¸¶ÍøÕ¾ºÍ¿Í»§Ö§³ÖÖжÏ¡£CNTÊǶò¹Ï¶à¶ûµÄ¹úÓªµçÐÅÔËÓªÉÌ£¬Ìṩ¹Ì¶¨µç»°·þÎñ¡¢Òƶ¯¡¢ÎÀÐǵçÊӺͻ¥ÁªÍøÏνÓ¡£7ÔÂ16ÈÕ£¬¸Ã¹«Ë¾ÔÚÆä¹ÙÍø°ä²¼²¼¸æ£¬³ÆÒòÔâµ½¹¥»÷¿Í»§·þÎñºÍÔÚÏßÖ§¸¶ÁÙʱÖжÏ£¬²¢°µÊ¾ÒÑÏòµ±¾ÖÉϱ¨ÁËÕâ´Î¹¥»÷ÊÂÎñ¡£¹ÌÈ»CNTûÓÐÕýʽÉêÃ÷ÆäÔâµ½ÁËÀÕË÷¹¥»÷£¬µ«RansomEXXÔÚÆäÍøÕ¾³ÆËûÃÇÒѾ­ÏÂÔØÁËCNT³¬¹ý190GBµÄÎļþ£¬²¢³ï±¸¹«¿ªËüÃÇ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ecuadors-state-run-cnt-telco-hit-by-ransomexx-ransomware/


4.TestcoronanuµÄCovidÊý¾Ý¿É±»´Û¸Ä²¢Ð¹Â¶6ÍòÈËÐÅÏ¢


4.jpg


Covid¼ì²â¹«Ë¾TestcoronanuµÄÊý¾Ý¿É±»´Û¸Ä²¢Ð¹Â¶³¬¹ý6ÍòÈ˵ÄÐÅÏ¢¡£RTL NieuwsÔÚÉÏÖÜÈÕ±¨Â·³Æ£¬Testcoronanu²úÉúÁËÑϳÁµÄй¶ÊÂÎñ£¬ÈκÎÈ˶¼Äܹ»´´½¨×Ô¼ºµÄCovidÒßÃç½ÓÖÖ»ò¼ì²âÖ¤Êé¡£Óû§Äܹ»×Ô¼ºÔÚÊý¾Ý¿âÖÐÊäÈë¾­¹ýÁËÄÄÖÖ¼ì²âÒÔ¼°¼ì²âÁ˾ÖÊÇʲô£¬Ö®ºó£¬½«×Ô¶¯ÊÕµ½TestcoronanuµÄ¹Û¹âÖ¤Ã÷£¬²¢ÇÒÓû§»¹Äܹ»´Û¸ÄÆäËûÈ˵ÄÊý¾Ý¡£´Ë±í£¬Õâ´ÎÊÂÎñ»¹Ð¹Â¶ÁË6ÍòÓû§µÄÓ×ÎÒÐÅÏ¢£¬ÀýÈçÈ«Ãû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢Éç»á°²È«ºÅÂë¡¢»¤ÕÕºÅÂëºÍÒ½ÁÆÐÅÏ¢µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/nl-leak-at-covid-testing-company-made-it-possible-to-fake-results-in-coronacheck-app/


5.×êÑÐÈËÔ±Åû¶HelloKittyÕë¶ÔSonicWallÉ豸µÄ¹¥»÷


5.jpg


ÍøÂ簲ȫ¹«Ë¾CrowdStrikeÅû¶HelloKittyÕë¶ÔSonicWallÉ豸µÄ¹¥»÷¡£HelloKityÊÇ×Ô2020Äê11ÔÂÆðÍ·»îÔ¾µÄÀÕË÷ÍÅ»ï£¬ÔøÇÔÈ¡ÁËCyberpunk 2077¡¢Witcher 3¡¢Gwent ºÍÆäËûÓÎÏ·µÄÔ´´úÂë¡£×êÑÐÈËÔ±³ÆºÚ¿ÍÀûÓÃÁËSonicWall SMAºÍSRA²úÆ·ÖеÄCVE-2019-7481·ì϶£¬¸Ã·ì϶ÒÑÔÚ2021ËêÊ×°ä²¼µÄ¹Ì¼þ¸üÐÂÖнøÐÐÁ˽¨¸´¡£´Ë±í£¬CrowdStrikeÖÒ¸æBabukÍŻﻹÔÚÕë¶Ô´æÔÚCVE-2020-5135·ì϶µÄSonicWall VPNÉ豸¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/120249/malware/hellokitty-ransomware-sonicwall-devices.html


6.PRODAFT³Æ°²×¿ToddlerÕë¶ÔÅ·Ö޵Ĺ¥»÷»î¶¯¼¤Ôö


6.jpg


PRODAFTÍþвµý±¨(PTI)ÍŶӰµÊ¾£¬ÐÂÐÍAndroidÒøÐÐľÂíToddler£¨Ò²³ÆTeaBot/Anatsa£©Õë¶ÔÅ·Ö޵Ĺ¥»÷»î¶¯¼¤Ôö¡£CleafyÔÚ1Ô·ݳõ´ÎÅû¶ÁËToddler£¬Æä¹¥»÷ÁË60¼ÒÅ·ÖÞÒøÐеĿͻ§¡£PTI·ÖÎö·¢ÏÖ£¬ToddlerÖØÒªÕë¶ÔÎ÷°àÑÀ£¬µ«Æä¶ñÒâÈí¼þÑù±¾ÖÐÒ²Ô̺¬ÁËÕë¶ÔÎ÷°àÑÀÓï¡¢Ó¢Óï¡¢Òâ´óÀûÓï¡¢µÂÓï¡¢·¨ÓïºÍºÉÀ¼ÓïÓû§µÄÎı¾ÄÚÈÝ£¬½ØÖÁ´Ë¿Ì£¬ToddlerÒѾ­Ï°È¾Á˳¬¹ý7632̨É豸¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/toddler-mobile-banking-malware-surges-across-europe/