ÃÀ¹úÄÜÔ´²¿Ðû²¼2019ÄêQ1µçÁ¦ÍøÂç½ôÆÈÇéÐκÍ×ÌÈű¨¸æ£»£»£»£»£»PrinterLogic´òÓ¡ÖÎÀíÈí¼þ¶à¸öÎó²î£¬£¬£¬£¬¿Éµ¼ÖÂRCE
Ðû²¼Ê±¼ä 2019-05-06
ƾ֤ÃÀ¹úÄÜÔ´²¿Ðû²¼µÄ2019ÄêµÚÒ»¼¾¶ÈµçÁ¦ÍøÂç½ôÆÈÇéÐκÍ×ÌÈű¨¸æ£¬£¬£¬£¬3ÔÂ5ÈÕÉÏÎç9:12µ½ÏÂÖç6:57ʱ´ú±±ÃÀµçÍøÔâÓöµ½Ò»¸ö¡°µ¼ÖµçÁ¦ÏµÍ³ÔËÓªÖÐÖ¹µÄÍøÂçÊÂÎñ¡±£¬£¬£¬£¬ÊÜÓ°ÏìµÄµØÇø°üÀ¨¼ÓÖݵĿ˶÷ÏØºÍÂåɼí¶ÏØ¡¢ÓÌËûÖݵÄÑκþÏØºÍ»³¶íÃ÷ÖݵĿµ¸¥Ë¹ÏØ¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÃÀ¹úÄÜÔ´²¿µÄ½ç˵£¬£¬£¬£¬¡°ÍøÂçÊÂÎñ¡±ÊÇÖ¸¡°Î´ÊÚȨ»á¼û¡±µ¼ÖµÄÍøÂçÖÐÖ¹£¬£¬£¬£¬µ«Ã»Óиü¶àÐÅÏ¢Åú×¢¸ÃÊÂÎñÊÇÔ¶³ÌºÚ¿Í¹¥»÷ÕվɯóÒµÄÚ²¿µÄ¹¥»÷¡£¡£¡£¡£¡£¡£´ÓÀúÊ·ÉÏ¿´£¬£¬£¬£¬±±ÃÀµçÍø´ÓδÔâµ½ÍøÂç¹¥»÷µ¼ÖÂµÄÆÆËð»òÖÐÖ¹£¬£¬£¬£¬ÈôÊÇÊÂÇéÊôʵ£¬£¬£¬£¬ÕâÒ»ÊÂÎñ¿ÉÄܳÉΪÀúÊ·ÐÔµÄÊÂÎñ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.avast.com/western-us-power-grid-hit-by-cyber-event
2¡¢ºÚ¿Íͨ¹ý±©Á¦¹¥»÷½ÓÊÜ29¸öIoT DDoS½©Ê¬ÍøÂç

ƾ֤ZDNet±¨µÀ£¬£¬£¬£¬ÃûΪSubbyµÄºÚ¿Íͨ¹ý±©Á¦¹¥»÷½ÓÊÜÁË29¸öIoT DDoS½©Ê¬ÍøÂç¡£¡£¡£¡£¡£¡£SubbyʹÓÃÁËÓû§Ãû×ÖµäºÍ³£ÓÃÃÜÂëÁбíÀ´¶ÔÕâ29¸ö½©Ê¬ÍøÂçµÄC&C»ù´¡ÉèÊ©¾ÙÐб©Á¦¹¥»÷£¬£¬£¬£¬ÆäÖÐһЩÉèʩʹÓÃÁ˽ÏÁ¿ÈõµÄƾ֤£¬£¬£¬£¬ÀýÈçroot:root¡¢admin:admin¡¢oof:oofµÈ¡£¡£¡£¡£¡£¡£Æ¾Ö¤SubbyµÄ˵·¨£¬£¬£¬£¬ÕâЩ½©Ê¬ÍøÂç¶¼½ÏÁ¿Ð¡£¬£¬£¬£¬ÏÖʵµÄbot×ÜÊý½öΪ2.5Íò¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/hacker-takes-over-29-iot-botnets/
3¡¢Ñо¿ÍŶÓÖÒÑÔÕë¶ÔOffice 365ÕÊ»§µÄ½ÓÊÜÀ˳±

ƾ֤Barracuda NetworksµÄÆÊÎö£¬£¬£¬£¬3Ô·ÝÕë¶ÔÔÆµç×ÓÓÊÏäµÄATO£¨ÕË»§½ÓÊÜ£©¹¥»÷¼¤Ôö£¬£¬£¬£¬½öÔÚÒ»¸öÔÂÄÚ¹¥»÷Õß¾Íͨ¹ýÊýǧ¸öÊÜËðµÄOffice 365 ÕË»§·¢ËÍÁËÁè¼Ý150Íò·âÀ¬»øÓʼþ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆËùÓеÄÊӲ칤¾ßÖÐÓÐÁè¼Ý1/4£¨29%£©µÄÆóÒµÔâµ½Õë¶ÔOffice 365ÕÊ»§µÄ¹¥»÷£¬£¬£¬£¬ÕâЩ¹¥»÷°üÀ¨×²¿â¡¢±©Á¦¹¥»÷µÈ¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÊÜËðÕË»§¾ÙÐÐÐÅÏ¢ÇÔÈ¡¡¢²ÆÎñÊý¾ÝÇÔÈ¡¡¢Éí·Ý͵ÇÔÒÔ¼°BECڲƵȷ½·¨»ñµÃÀûÒæ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/researchers-warn-office-365-1/
4¡¢Ñо¿Ö°Ô±·¢Ã÷100¶à¸öJenkins²å¼þ±£´æÇå¾²Îó²î

NCC GroupÇå¾²Ñо¿Ô±Viktor Gazdag·¢Ã÷100¶à¸öJenkins²å¼þ±£´æÇå¾²Îó²î¡£¡£¡£¡£¡£¡£JenkinsÊÇÓÉCloudBeesºÍJenkinsÉçÇøÎ¬»¤µÄ¿ªÔ´×Ô¶¯»¯Ð§ÀÍÆ÷£¬£¬£¬£¬ËüÔÚÈ«ÇòÓµÓÐÁè¼Ý100ÍòÓû§¡£¡£¡£¡£¡£¡£Ò»Ð©Ò×Êܹ¥»÷µÄ²å¼þÊÇÓɵÚÈý·½¿ª·¢µÄ£¬£¬£¬£¬ÓÃÓÚ»á¼ûTwitter¡¢AWSºÍAzureµÈЧÀÍ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄ´ó´ó¶¼Îó²î¶¼ÊÇÃ÷ÎÄÃÜÂë´æ´¢¡¢CSRFÎó²î¡¢È±ÉÙȨÏÞ¼ì²éµÈ¡£¡£¡£¡£¡£¡£Jenkins¿ª·¢ÍŶÓÕë¶ÔÕâЩÎó²îÐû²¼ÁËÇ徲ͨ¸æ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/84910/hacking/jenkins-plugins-flaws.html
5¡¢PrinterLogic´òÓ¡ÖÎÀíÈí¼þ¶à¸öÎó²î£¬£¬£¬£¬¿Éµ¼ÖÂRCE

PrinterLogic´òÓ¡ÖÎÀíÈí¼þδ׼ȷÑéÖ¤ÆäSSLÖ¤ÊéºÍÈí¼þ¸üаüµÄȪԴºÍÍêÕûÐÔ£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÖØÐÂÉèÖÃÈí¼þ²¢Ô¶³ÌÖ´ÐдúÂ루CVE-2018-5408¡¢CVE-2018-5409£©¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬PrinterLogicδ¶Ôä¯ÀÀÆ÷ÊäÈë¾ÙÐÐÌØÊâ×Ö·û¹ýÂË£¬£¬£¬£¬¿ÉÔÊÐíδ¾ÊÚȨµÄÔ¶³Ì¹¥»÷Õ߸ü¸ÄÉèÖÃÎļþ£¨CVE-2019-9505£©¡£¡£¡£¡£¡£¡£18.3.1.96¼°Ö®Ç°µÄ°æ±¾Ò×Êܹ¥»÷£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì¾ÙÐÐÉý¼¶¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.kb.cert.org/vuls/id/169249/
6¡¢½üÒ»°ëµÄÃÀ¹úÆóҵûÓÐΪ¼ÓÖÝÏûºÄÕßÒþ˽·¨°¸×öºÃ×¼±¸

ÃÀ¹ú¼ÓÖݵÄÏûºÄÕßÒþ˽·¨°¸£¨CCPA£©½«ÓÚ2020Äê1ÔÂ1ÈÕÉúЧ£¬£¬£¬£¬µ«Ðí¶àÃÀ¹úÆóÒµ²¢Î´¶Ô´Ë×öºÃ×¼±¸¡£¡£¡£¡£¡£¡£Æ¾Ö¤¹ú¼ÊÒþ˽ר¼ÒлᣨIAPP£©ºÍOneTrustµÄÒ»Ïîµ÷ÑУ¬£¬£¬£¬Ö»ÓÐ55%µÄÆóÒµ³Æ½«ÔÚ1ÔÂ1ÈÕ֮ǰ×öºÃ×¼±¸¡£¡£¡£¡£¡£¡£CCPAÓëGDPRÀàËÆ£¬£¬£¬£¬Í¨¹ý¹æÔò½«Òþ˽µÄ¿ØÖÆÈ¨½»¸øÏûºÄÕߣ¬£¬£¬£¬ÒªÇóÆóÒµÆ¾Ö¤ÍøÂçµÄÊý¾ÝΪÏûºÄÕßÌṩ¡°Õýµ±¡±µÄȨÁ¦¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/nearly-half-of-us-orgs-not-ready-1/