΢Èí¶à¸ö¹©Ó¦É̵Ä40¶à¸öÇý¶¯³ÌÐò±£´æÌáȨÎó²î£»£»£» £»£»£»£»Delta ICSϵͳ»º³åÇøÒç³öÎó²î£»£»£» £»£»£»£»StockX±»µÁÊý¾Ý¿âÔÚ°µÍø³öÊÛ

Ðû²¼Ê±¼ä 2019-08-12
1¡¢Î¢Èí¶à¸ö¹©Ó¦É̵Ä40¶à¸öÇý¶¯³ÌÐò±£´æÌáȨÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

EclypsiumÑо¿Ö°Ô±Åû¶Áè¼Ý20¼Ò΢Èí¹©Ó¦ÉÌÌṩµÄ40¶à¸öWindowsÇý¶¯³ÌÐò±£´æÌáȨÎó²î£¬£¬£¬£¬£¬£¬¿ÉÄܻᱻºÚ¿ÍʹÓᣠ¡£¡£ÊÜÓ°ÏìµÄ³§Ḛ́üÀ¨×ÅÃûBIOS³§É̼°¸÷´óÓ²¼þ¹©Ó¦ÉÌ£¬£¬£¬£¬£¬£¬ÀýÈ绪˶¡¢¶«Ö¥¡¢Intel¡¢¼¼¼Î¡¢Nvidia¡¢»ªÎªµÈ¡£ ¡£¡£ÓÉÓÚÕâЩÇý¶¯¶¼¾­ÓÉÁË΢ÈíÈÏÖ¤£¬£¬£¬£¬£¬£¬Òò´Ë¶ñÒâ³ÌÐò¿ÉÒÔʹÓÃËüÃÇ´ÓÓû§¿Õ¼ä£¨Ring3£©ÌáȨÖÁÄÚºËȨÏÞ£¨Ring0£©¡£ ¡£¡£EclypsiumÌåÏÖÕâЩÇý¶¯Ó°ÏìÁËËùÓа汾µÄWindows£¬£¬£¬£¬£¬£¬ÕâÒâζ×ÅÖÁÉÙÊý°ÙÍòÓû§ÃæÁÙΣº¦¡£ ¡£¡£IntelºÍ»ªÎªµÈÒѾ­Ðû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/over-40-windows-hardware-drivers-vulnerable-to-privilege-escalation/


2¡¢Delta ICSϵͳ±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂ×°±¸±»½ÓÊÜ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Ñо¿Ö°Ô±Åû¶Delta¹¤¿ØÏµÍ³enteliBUS ManagerÖеÄÒ»¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿Éµ¼ÖÂ×°±¸±»½ÓÊÜ¡£ ¡£¡£Æ¾Ö¤McAfeeÑо¿Ö°Ô±µÄ±íÊö£¬£¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-9569£©ÊÇÓÉ»º³åÇøÒç³öµ¼ÖµÄ¡£ ¡£¡£¹¥»÷Õß¿Éͨ¹ý¹ã²¥Í¨Ñ¶Ìᳫ¹¥»÷£¬£¬£¬£¬£¬£¬ÕâÒâζÕßËûÃÇÉõÖÁÎÞÐèÖªµÀ¹¥»÷Ä¿µÄµÄÍøÂçλÖᣠ¡£¡£Delta ControlsÒѾ­Ðû²¼Á˸ÃÎó²îµÄÐÞ¸´²¹¶¡£ ¡£¡£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±³ÆÍ¨¹ýShodanËÑË÷ÈÔ¿É·¢Ã÷1600¸öÒ×Êܹ¥»÷µÄϵͳÔÚÍøÉÏ̻¶¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/def-con-2019-delta-ics-flaw-allows-total-industrial-takeover/147142/


3¡¢Ð¶ñÒâÈí¼þClipsa£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔWordPressÍøÕ¾Ìᳫ±©Á¦ÆÆ½â¹¥»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Avast·¢Ã÷Ò»¸öеĶñÒâÈí¼þ¼Ò×åClipsa£¬£¬£¬£¬£¬£¬¸Ã±äÖÖÖ÷ҪɨÃ軥ÁªÍø²¢Õë¶ÔWordPressÍøÕ¾Ìᳫ±©Á¦ÆÆ½â¹¥»÷¡£ ¡£¡£Ò»µ©Ñ¬È¾×°±¸£¬£¬£¬£¬£¬£¬Clipsa½«Ìᳫ¶àÖÖ¹¥»÷ÐÐΪ£¬£¬£¬£¬£¬£¬°üÀ¨ÇÔÈ¡¼ÓÃÜÇ®±ÒÉúÒâ¡¢×°ÖöñÒâ¿ó¹¤¡¢É¨ÃèÒ×Êܹ¥»÷µÄWordPressÍøÕ¾µÈ¡£ ¡£¡£ÊÜѬȾµÄÓû§Ö÷ҪλÓÚÓ¡¶È£¬£¬£¬£¬£¬£¬²¨¼°Áè¼Ý2.8ÍòÓû§£»£»£» £»£»£»£»Æä´ÎÊÇ·ÆÂɱöºÍ°ÍÎ÷¡£ ¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁËÓë¸Ã±äÖÖÓйصÄ9412¸ö±ÈÌØ±ÒµØµã£¬£¬£¬£¬£¬£¬·¢Ã÷·¸·¨·Ö×ÓµÄÊÕ»ñΪ3¸ö±ÈÌØ±Ò¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/89612/malware/clipsa-malware.html


4¡¢ÃÀ¹ú°ü¹Ü¹«Ë¾State FarmÔâײ¿â¹¥»÷£¬£¬£¬£¬£¬£¬²¿·ÖÓû§Æ¾Ö¤Ð¹Â¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹ú°ü¹Ü¹«Ë¾State FarmÏòÓû§·¢ËÍÊý¾Ýй¶֪ͨÓʼþ³Æ£¬£¬£¬£¬£¬£¬ÆäÔÚ7Ô·ÝÔ⵽ײ¿â¹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö²¿·ÖÓû§µÄƾ֤й¶¡£ ¡£¡£¸Ã¹«Ë¾³ÆÃ»ÓÐÓû§Òþ˽ÐÅϢй¶£¬£¬£¬£¬£¬£¬Ò²Ã»Óз¢Ã÷Ïà¹ØµÄڲƭ»î¶¯£¬£¬£¬£¬£¬£¬µ«ÒªÇóÊÜÓ°ÏìµÄÓû§ÖØÖÃÆäÃÜÂë¡£ ¡£¡£Ê״ι¥»÷±¬·¢ÔÚ7ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬Ëæºóÿ¸ô¼¸Ì챬·¢Ò»´Î£¬£¬£¬£¬£¬£¬Ò»Ö±Ò»Á¬µ½7ÔÂ22ÈÕ¡£ ¡£¡£¸Ã¹«Ë¾²¢Î´Í¸Â¶ÊÜÓ°ÏìµÄÏêϸÈËÊý¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/state-farm-accounts-compromised-in-credential-stuffing-attack/


5¡¢StockX±»µÁÊý¾Ý¿âÔÚ°µÍø³öÊÛ£¬£¬£¬£¬£¬£¬°üÀ¨684ÍòÓû§ÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Ñо¿Ö°Ô±·¢Ã÷Ò»¸ö°üÀ¨684Íò±»µÁÓû§ÐÅÏ¢µÄStockXÊý¾Ý¿âÔÚ°µÍøÉϳöÊÛ£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢ÐÕÃû¡¢×¡Ö·¡¢¹ºÖüͼÒÔ¼°MD5¹þÏ£ÃÜÂë¡£ ¡£¡£Have I been PwnedÍøÕ¾ÒѾ­ÊÕ¼Á˸ÃÊý¾Ý¿â£¬£¬£¬£¬£¬£¬Óû§¿ÉÔÚ¸ÃÍøÕ¾ÉϼìË÷×Ô¼ºµÄÕË»§ÊÇ·ñ±»µÁ¡£ ¡£¡£¸ÃÊý¾Ý¿â×îÔçÔÚApollonÊг¡ÉϳöÊÛ£¬£¬£¬£¬£¬£¬¼ÛǮΪ300ÃÀÔª£¬£¬£¬£¬£¬£¬ËæºóÔÚ°µÍøÂÛ̳ÉÏÒÔ½ö2.15ÃÀÔªµÄ¼ÛÇ®Á÷ͨ£¬£¬£¬£¬£¬£¬ÕâÒâζ×Å´ó×ÚDZÔÚ¹¥»÷Õß¿ÉÄÜÒѾ­ÓµÓÐÁ˸ÃÊý¾Ý¿â¡£ ¡£¡£ÓÐÈ˽âÃÜÁ˸ÃÊý¾Ý¿âÖеÄ36.7Íò¸öÕË»§ÃÜÂ룬£¬£¬£¬£¬£¬²¢ÒÔ400ÃÀÔªµÄ¼ÛÇ®³öÊÛ¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/database-from-stockx-hack-sold-online-check-if-youre-included/


6¡¢EmsisoftÐû²¼ÀÕË÷Èí¼þJSWorm 4.0µÄÃ⺬»ìÃܹ¤¾ß

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

EmsisoftÑо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þJSWorm 4.0µÄÃ⺬»ìÃܹ¤¾ß¡£ ¡£¡£ÓëÒÔǰµÄ°æ±¾Ò»Ñù£¬£¬£¬£¬£¬£¬JSWorm 4.0ÊÇÓÃC++±àдµÄ£¬£¬£¬£¬£¬£¬Ê¹ÓÃAES-256µÄ¶¨Öư汾¾ÙÐмÓÃÜ¡£ ¡£¡£¸Ã¶ñÒâÈí¼þ»áÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.[ID-][].JSWRMÀ©Õ¹Ãû£¬£¬£¬£¬£¬£¬²¢ÊÍ·ÅÃûΪJSWRM-DECRYPT.htaµÄÀÕË÷Ʊ¾Ý¡£ ¡£¡£Êܵ½Ñ¬È¾µÄÓû§¿Éͨ¹ýEmsisoftÐû²¼µÄÖ¸ÄϽâÃÜÆäÎļþ¡£ ¡£¡£ÔÚ5Ô·ÝÑо¿Ö°Ô±»¹Ðû²¼ÁËJSWorm 2.0µÄ½âÃܹ¤¾ß¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/89666/malware/emsisoft-decryptor-jsworm-4-0.html