Adobe°ä²¼°²È«¸üн¨¸´¶à¿î·ì϶: ¶ò¹Ï¶à¶û×î´ó¸öÈËÒøÐÐÔâµ½¹¥»÷

°ä²¼¹¦·ò 2021-10-14

¶ò¹Ï¶à¶û×î´ó¸öÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷


¶ò¹Ï¶à¶û×î´ó¸öÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷.png


ÉÏÖÜÄ© £¬¶ò¹Ï¶à¶û×î´óµÄ¸öÈËÒøÐÐBanco PichinchaÔâµ½ÁËÍøÂç¹¥»÷ £¬ÏµÍÂäÙʱ¹Ø¹Ø¡£Õâ´Î¹¥»÷µ¼ÖÂÒøÐеÄÒµÎñ´óÃæ»ýÖÐ¶Ï £¬Ô̺¬ATM¡¢ÍøÉÏÒøÐÓ×¢ÀûÓ÷¨Ê½¡¢µç×ÓÓʼþϵͳºÍ×ÔÖ÷·þÎñ¡£¸ÃÒøÐÐÔÚ·þÎñÖжϵÄÁ½Ììºó°ä²¼ÉêÃ÷ £¬³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷ £¬µ«²¢Î´¹«¿ªÕâ´Î¹¥»÷µÄÐÔÖÊ¡£¾Ý×êÑÐÈËÔ±³ÆÕâÊÇÒ»´ÎÀÕË÷Èí¼þ¹¥»÷ £¬¹¥»÷ÕßÔÚÒøÐеÄϵͳÖÐ×°ÖÃÁËCobalt Strike beacon¡£


Ô­ÎÄÁ´½Ó£º


https://www.bleepingcomputer.com/news/security/cyberattack-shuts-down-ecuadors-largest-bank-banco-pichincha/02


Ò½ÁƼ¼Êõ¹«Ë¾OlympusÔÙÔâ¹¥»÷ £¬ÃÀÖÞÒµÎñÊܵ½Ó°Ïì


Ò½ÁƼ¼Êõ¹«Ë¾OlympusÔÙÔâ¹¥»÷£¬ÃÀÖÞÒµÎñÊܵ½Ó°Ïì.png


ÈÕ±¾Ò½ÁƼ¼Êõ¹«Ë¾OlympusÔÚ10ÔÂ10ÈÕÔâµ½¹¥»÷ £¬µ¼ÖÂÃÀÖÞ£¨ÃÀ¹ú¡¢¼ÓÄôóºÍÀ­¶¡ÃÀÖÞ£©µÄϵͳ·þÎñÖжÏ¡£¸Ã¹«Ë¾³ÆÆäÔÚ¼ì²âµ½¿ÉÒɻºó £¬µ±¼´²ÉÈ¡ÁËÏìÓ¦´ëÊ© £¬¹Ø¹ØÊÜÓ°ÏìµÄϵͳºó½«¸ÃÊÂÎñ¶ôÔìÁËÔÚÃÀÖÞ¡£¹«Ë¾½²»°È˳ÆÃ»º±¼û¾Ýй¶ÎÊÌâ £¬²¢³Ðŵ½«¾¡¿ì°ä²¼¾ßÌåÐÅÏ¢¡£OlympusÔøÔÚ9ÔÂ8ÈÕÔâµ½ÁËBlackMatterµÄÀÕË÷¹¥»÷ £¬ÆäʱµÄ¹¥»÷Ó°ÏìÁËÆäEMEA£¨Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ£©ITϵͳ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123263/security/olympus-us-cyberattack.html



Adobe°ä²¼°²È«¸üР£¬½¨¸´¶à¿î²úÆ·ÖеÄ10¸ö·ì϶


Adobe°ä²¼°²È«¸üÐÂ£¬½¨¸´¶à¿î²úÆ·ÖеÄ10¸ö·ì϶.png


AdobeÔÚ10ÔÂ13ÈÕ°ä²¼°²È«¸üР£¬½¨¸´ÆäAcrobat¡¢Reader¡¢Connect¡¢CommerceºÍCampaign StandardÖеÄ10¸ö·ì϶¡£Õâ´Î½¨¸´µÄ½ÏΪÑϳÁµÄÊÇConnectÖеķ´ÐòÁл¯·ì϶ £¬¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐÐ £¬CVSSÆÀ·ÖΪ9.8¡£´Ë±í £¬»¹½¨¸´ÁËAcrobatºÍReaderÖеĴúÂëÖ´Ðзì϶CVE-2021-40728ºÍCVE-2021-40731¡¢ÌáȨ·ì϶CVE-2021-40729ºÍCVE-2021-40720 £¬ÒÔ¼° Adobe ops-cliÖеķ´ÐòÁл¯·ì϶CVE-2021-40720µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123269/security/adobe-critical-flaws.html


×êÑÐÍŶӷ¢ÏÖFreakoutÕë¶ÔVisual Tools DVRµÄ»î¶¯


×êÑÐÍŶӷ¢ÏÖFreakoutÕë¶ÔVisual Tools DVRµÄ»î¶¯.png


Juniper Threat LabsÔÚ10ÔÂ11ÈÕÅû¶Á˽©Ê¬ÍøÂçFreakout£¨±ðÃûNecro£©ÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£×êÑÐÈËÔ±ÔÚ2021Äê9ÔµÄ×îºóÒ»Öܼì²âµ½ÁËÕâ´Î»î¶¯ £¬¹¥»÷ÕßÔÚÆä±øÆ÷¿âÖÐÔö³¤ÁËÒ»¸öзì϶ £¬¸Ã·ìÏ¶ÖØÒªÕë¶ÔVisual Tools DVR VX16 4.2.28.0 £¬ÆäPoCÒÑÔÚ7ÔÂ6ÈÕ¹«¿ª¡£´Ë±í £¬ÐµÄÑù±¾É¾³ýÁË֮ǰµÄ¹¥»÷ÖÐʹÓõÄSMBɨÃ跨ʽ £¬²¢½«¾ç±¾×¢ÈëURL´Ó֮ǰµÄÓ²±àÂë¸ü¸ÄΪÁËDGA URL¡£


Ô­ÎÄÁ´½Ó£º

https://blogs.juniper.net/en-us/threat-research/necro-python-botnet-goes-after-vulnerable-visualtools-dvr


NCC Group·¢ÏÖÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷»î¶¯


NCC Group·¢ÏÖÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷»î¶¯.png


10ÔÂ11ÈÕ £¬NCC Group·¢ÏÖÁËÒ»¸ö½öÇÔÈ¡Êý¾Ý¶ø²»¼ÓÃÜÎļþµÄÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMC¡£×êÑÐÈËÔ±°µÊ¾SnapMCÕâ¸öÃû×ÖÆðÔ´ÓÚ¹¥»÷Õß¼±¾çµÄ¹¥»÷·½Ê½ £¬ËüÄܹ»ÔÚ30·ÖÖÓÄÚÈëÇÖÍøÂç¡¢ÇÔÈ¡Îļþ²¢·¢ËÍÀÕË÷Óʼþ¡£SnapMCʹÓ÷ì϶ɨÃèÆ÷AcunetixÀ´ËÑË÷Ö¸±êVPNºÍWebÖеķì϶ £¬Ô̺¬PrintNightmare·ì϶¡¢ASPX.NETµÄTelerik UIÖеÄÔ¶³Ì´úÂë·ì϶ÒÔ¼°¸÷ÀàSQL×¢Èë·ì϶µÈ¡£Ë¼¿¼µ½SnapMCÀûÓõľùÊÇÒѽ¨¸´µÄ·ì϶ £¬×êÑÐÈËÔ±½¨ÒéÓû§ÊµÊ±×°Öò¹¶¡¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/snapmc-hackers-skip-file-encryption-and-just-steal-your-files/


IDC°ä²¼2021ÉϰëÄêÖйúIT°²È«·þÎñÊг¡¸ú×ٻ㱨


IDC°ä²¼2021ÉϰëÄêÖйúIT°²È«·þÎñÊг¡¸ú×ٻ㱨.png


IDCÔÚ10ÔÂ12ÈÕ°ä²¼ÁË2021ÉϰëÄêÖйúIT°²È«·þÎñÊг¡¸ú×ٻ㱨¡£IDC½ç˵µÄÍøÂ簲ȫ·þÎñÊг¡±ðÀëÓɰ²È«Õ÷ѯ·þÎñ¡¢IT°²È«½ÌÓýÓëÅàѵ·þÎñ¡¢Íйܰ²È«·þÎñºÍ°²È«¼¯³É·þÎñËĸö×ÓÊг¡×é³É¡£»ã±¨ÏÔʾ £¬2021ÉϰëÄêÖйúIT°²È«·þÎñÊг¡³§ÉÌÕûÌåÊÕÈëԼΪ11.1ÒÚÃÀÔª£¨Ô¼ºÏ71.5ÒÚÔªÈËÃñ±Ò£© £¬³§ÉÌÊÕÈë¹æÄ£½ÏÈ¥ÄêͬÆÚʵÏÖ·­±¶Ôö³¤ £¬ÕÇ·ù¸ß´ï110% £¬½Ï2019Äêͬ±ÈÔö³¤38% £¬ÖйúIT°²È«·þÎñÊг¡Õýʽ½øÈëÐèÒªÈ«Ãæ·¢×÷ÆÚ¡£


Ô­ÎÄÁ´½Ó£º

https://www.idc.com/getdoc.prCHE48302321