AdobeÐû²¼´øÍâ¸üУ¬£¬£¬ÐÞ¸´ColdfusionÖеÄ3¸öÎó²î£»£»£»£»£»Ð¹¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯
Ðû²¼Ê±¼ä 2019-09-26
AdobeÐû²¼´øÍâÇå¾²¸üУ¬£¬£¬ÐÞ¸´ColdFusionÖеÄÈý¸öÎó²î£¬£¬£¬ÆäÖÐÁ½¸öÎó²îΪcritical¼¶±ð£¬£¬£¬ÁíÒ»¸öΪimportant¼¶±ð¡£¡£¡£Á½¸öcriticalÎó²îÊÇÏÂÁî×¢ÈëÎó²î£¬£¬£¬°üÀ¨¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÎó²î£¨CVE-2019-8073£©ºÍÔÊÐí¹¥»÷ÕßÈÆ¹ý»á¼û¿ØÖƵÄ·¾¶±éÀúÎó²î£¨CVE-2019-8074£©¡£¡£¡£Ò»¸öimportantÎó²îÊÇÈÆ¹ýÎó²î£¨CVE-2019-8072£©£¬£¬£¬¸ÃÎó²î¿Éµ¼ÖÂÐÅϢй¶¡£¡£¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨ColdFusion 2018 Update 4¼°¸üÔç°æ±¾ºÍColdFusion 2016 Update 11¼°¸üÔç°æ±¾£¬£¬£¬½¨ÒéÓû§¸üÐÂÖÁColdFusion 2018 Update 5ºÍColdFusion 2016 Update 12¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerabilities-in-coldfusion/2.Ô¼»áÓ¦ÓÃHeyyoÒâÍâй¶½ü7.2ÍòÓû§ÐÅÏ¢

ÔÚÏßÔ¼»áÓ¦ÓÃHeyyoµÄElasticsearchʵÀýÒòδÉèÃÜÂë¶øÔÚ»¥ÁªÍøÉÏ̻¶£¬£¬£¬µ¼Ö½ü7.2ÍòÓû§µÄÏêϸÒþ˽ÐÅϢй¶¡£¡£¡£¸ÃÊÂÎñÊÇÓÉWizCaseÇå¾²Ñо¿Ö°Ô±·¢Ã÷µÄ£¬£¬£¬Æ¾Ö¤ZDNetµÄ±¨µÀ£¬£¬£¬¸ÃЧÀÍÆ÷ÊÇÒ»¸öÉú²úЧÀÍÆ÷£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ð¡¢Éí¸ß¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬ¡¢Î»ÖÃÐÅÏ¢¡¢Ô¼»áÆ«ºÃµÈ¡£¡£¡£¸ÃÓ¦ÓÃËùÊôµÄÒÁ˹̹²¼¶ûÈí¼þ¹«Ë¾ÔÚ½üÒ»¸öÐÇÆÚÄÚδÄܻظ´ZDNetµÄѯÎÊ£¬£¬£¬Ð¹Â¶µÄЧÀÍÆ÷ÔÚZDNetת´ïÍÁ¶úÆäCERTºó»ñµÃ±£»£»£»£»£»¤¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/heyyo-dating-app-leaked-users-personal-data-photos-location-data-more/3.й¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯

ƾ֤Palo Alto NetworksµÄ±¨¸æ£¬£¬£¬Ò»¸öÐµĹ¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØµÄÔËÊäºÍº½ÔË×éÖ¯¡£¡£¡£xHuntÖ÷ÒªÔÚ2019Äê5ÔÂÖÁ6ÔÂÖ®¼ä¾ÙÐУ¬£¬£¬Ñо¿Ö°Ô±½«¸Ã¹¥»÷»î¶¯ÖÐʹÓõŤ¾ßÓë2018Äê7ÔÂÖÁ12ÔÂÖ®¼äÕë¶Ô¿ÆÍþÌØµÄ¹¥»÷¹ØÁªÆðÀ´¡£¡£¡£×÷Ϊй¥»÷µÄÒ»²¿·Ö£¬£¬£¬¹¥»÷ÕßʹÓÃÁËSakabota¡¢Histoka¡¢NeteroºÍKilluaµÈºóÃÅ£¬£¬£¬ÕâЩºóÃÅͨ¹ýHTTPÓëC&CͨѶ£¬£¬£¬²¿·Ö±äÌåҲʹÓÃDNSËíµÀ»òµç×ÓÓʼþ¾ÙÐÐͨѶ¡£¡£¡£¹¥»÷ÕßÒ²ÔÚÊÜѬȾµÄϵͳÉÏÊÍ·ÅÁ˶ñÒ⹤¾ßGonºÍEYE¡£¡£¡£Ö»¹Ü2018ÄêºÍ2019ÄêµÄ¹¥»÷»î¶¯ÖÐʹÓõŤ¾ß±£´æÖصþ£¬£¬£¬µ«ÏÖÔÚÉв»¿ÉÈ·¶¨ÕâÁ½¸ö»î¶¯ÊÇ·ñÓÉͳһ¹¥»÷ÕßÌᳫ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/xhunt-campaign-targets-kuwait-transportation-and-shipping-sector4.Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß

¿¨°Í˹»ùÑо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß¡£¡£¡£YatronÖ÷Òª»ùÓÚ¿ªÔ´ÀÕË÷Èí¼þHidden Tear¾ÙÐпª·¢£¬£¬£¬Æ¾Ö¤¿¨°Í˹»ùµÄͳ¼ÆÊý¾Ý£¬£¬£¬¸ÃÀÕË÷Èí¼þÔÚÒÑÍùÒ»ÄêÖÐÊÔͼÌᳫ600¶à´ÎѬȾ£¬£¬£¬ÆäÖдó´ó¶¼¹¥»÷λÓڵ¹ú¡¢Öйú¡¢¶íÂÞ˹¡¢Ó¡¶ÈºÍÃåµé¡£¡£¡£FortuneCryptµÄÖ÷ÒªÌØµãÊÇʹÓÃBlitzMax±àÒëÆ÷¾ÙÐбàÒ룬£¬£¬ÕâÊÇ¿¨°Í˹»ùÊӲ쵽µÄÊ׸öʹÓÃBlitz BASIC±àдµÄÀÕË÷Èí¼þ¡£¡£¡£È¥Ä꿨°Í˹»ù¹²¼Í¼ÁËTrojan-Ransom.Win32.Crypren¼Ò×åµÄ6000¶à´Î¹¥»÷£¬£¬£¬Êܹ¥»÷Êý×î¶àµÄ¹ú¼ÒÊǶíÂÞ˹¡¢°ÍÎ÷¡¢µÂ¹ú¡¢º«¹úºÍÒÁÀÊ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/ransomware-two-pieces-of-good-news/93355/
5.·¸·¨ÍÅ»ïTortoiseshellʹÓÃÐéÎ±ÍøÕ¾Ãé×¼ÃÀ¹úÍËÎéÎäÊ¿

˼¿ÆTalos·¢Ã÷ÓÉÒÁÀÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯TortoiseshellÕýÊÔͼʹÓÃÐéαÕÐÆ¸ÍøÕ¾Õë¶ÔÃÀ¹úÍËÎéÎäÊ¿¡£¡£¡£¸ÃÍøÕ¾µÄÓòÃûÊÇhiremilitaryheroes[.]com£¬£¬£¬ÉÏÃæÌṩһ¸ö×ÀÃæ°æÈí¼þµÄÏÂÔØ£¬£¬£¬µ«¸ÃÈí¼þ»áÏÔʾװÖÃʧ°ÜÐÅÏ¢²¢ÏÖʵÉÏ×°ÖöñÒâÈí¼þ¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬£¬¶ñÒâÈí¼þ»áÔÚºǫ́ÔËÐÐÍøÂçÓû§µÄÐÅÏ¢£¬£¬£¬È»ºó·¢Ë͵½¹¥»÷ÕßµÄGmailÓÊÏä¡£¡£¡£ÍøÂçµÄÐÅÏ¢°üÀ¨ÏµÍ³²¹¶¡¼¶±ð¡¢´¦Öóͷ£Æ÷ÊýÄ¿¡¢ÍøÂçÉèÖá¢Ó²¼þºÍ¹Ì¼þ°æ±¾¡¢Óò¿ØÖÆÆ÷¡¢ÖÎÀíÔ±Ãû³Æ¡¢ÕË»§ÁÐ±í¡¢ÈÕÆÚ¡¢Ê±¼ä¡¢Çý¶¯³ÌÐòµÈ¡£¡£¡£±ðµÄ£¬£¬£¬¶ñÒâÈí¼þ»¹»áÔÚÊܺ¦ÕßµÄϵͳÉÏ×°ÖÃÔ¶¿ØÄ¾Âí¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-military-veterans-targeted-by-iranian-state-hackers/
6.·¸·¨ÍÅ»ïMagecartÃé×¼¹«¹²Wi-Fi±³ºóµÄÉÌÓ÷ÓÉÆ÷

Magecart Group 5±»·¢Ã÷ÕýÔÚÃé×¼±¸×¢ÈëÉÌÓ÷ÓÉÆ÷ÖеĶñÒâ´úÂë¾ÙÐвâÊÔ¡£¡£¡£¸Ã´úÂëÕë¶ÔµÄ·ÓÉÆ÷Ö÷ÒªÓÃÓÚÔÚ¹«¹²³¡ºÏºÍÂùÝÖÐÌṩÃâ·Ñ»ò¸¶·ÑµÄWi-FiЧÀÍ£¬£¬£¬ÈôÊÇÀֳɣ¬£¬£¬¹¥»÷Õß½«Äܹ»Ñ¬È¾ÕâЩ·ÓÉÆ÷²¢ÔÚ»ú³¡¡¢¿§·Èµê¡¢Âùݵȹ«¹²ÉèÊ©ÖÐÇÔÈ¡ÆäWi-FiÓû§µÄÖ§¸¶Êý¾Ý¡£¡£¡£ÕâЩ´úÂë±»×¢Èëµ½Á¼ÐÔµÄJavaScriptÎļþÖУ¬£¬£¬È»ºó¼ÓÔØµ½Ö§³ÖL7ÐÒéµÄÉÌÓ÷ÓÉÆ÷¡£¡£¡£L7ÐÒéÖ¸µÄÊÇOSIµÄÓ¦ÓòãÐÒ飬£¬£¬³£ÓÃÓÚÉÌÓ÷ÓÉÆ÷ÒÔ¾ÙÐÐÁ÷Á¿¸ºÔØÆ½ºâºÍÔÚÓû§ÅþÁ¬µ½Wi-FiЧÀÍʱÏÔÊ¾Ò³Ãæ»ò¹ã¸æ¡£¡£¡£ÏÖÔÚÑо¿Ö°Ô±ÉÐδ·¢Ã÷ÏÖʵµÄ¹¥»÷°¸Àý¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/magecart-group-targets-routers-behind-public-wi-fi-networks/148662/