AdobeÐû²¼´øÍâ¸üР£¬£¬£¬ÐÞ¸´ColdfusionÖеÄ3¸öÎó²î£»£»£»£» £»Ð¹¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯

Ðû²¼Ê±¼ä 2019-09-26
1.AdobeÐû²¼´øÍâ¸üР£¬£¬£¬ÐÞ¸´ColdfusionÖеÄ3¸öÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


AdobeÐû²¼´øÍâÇå¾²¸üР£¬£¬£¬ÐÞ¸´ColdFusionÖеÄÈý¸öÎó²î £¬£¬£¬ÆäÖÐÁ½¸öÎó²îΪcritical¼¶±ð £¬£¬£¬ÁíÒ»¸öΪimportant¼¶±ð ¡£¡£¡£Á½¸öcriticalÎó²îÊÇÏÂÁî×¢ÈëÎó²î £¬£¬£¬°üÀ¨¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÎó²î£¨CVE-2019-8073£©ºÍÔÊÐí¹¥»÷ÕßÈÆ¹ý»á¼û¿ØÖƵÄ·¾¶±éÀúÎó²î£¨CVE-2019-8074£© ¡£¡£¡£Ò»¸öimportantÎó²îÊÇÈÆ¹ýÎó²î£¨CVE-2019-8072£© £¬£¬£¬¸ÃÎó²î¿Éµ¼ÖÂÐÅϢй¶ ¡£¡£¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨ColdFusion 2018 Update 4¼°¸üÔç°æ±¾ºÍColdFusion 2016 Update 11¼°¸üÔç°æ±¾ £¬£¬£¬½¨ÒéÓû§¸üÐÂÖÁColdFusion 2018 Update 5ºÍColdFusion 2016 Update 12 ¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerabilities-in-coldfusion/

2.Ô¼»áÓ¦ÓÃHeyyoÒâÍâй¶½ü7.2ÍòÓû§ÐÅÏ¢

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ÔÚÏßÔ¼»áÓ¦ÓÃHeyyoµÄElasticsearchʵÀýÒòδÉèÃÜÂë¶øÔÚ»¥ÁªÍøÉÏ̻¶ £¬£¬£¬µ¼Ö½ü7.2ÍòÓû§µÄÏêϸÒþ˽ÐÅϢй¶ ¡£¡£¡£¸ÃÊÂÎñÊÇÓÉWizCaseÇå¾²Ñо¿Ö°Ô±·¢Ã÷µÄ £¬£¬£¬Æ¾Ö¤ZDNetµÄ±¨µÀ £¬£¬£¬¸ÃЧÀÍÆ÷ÊÇÒ»¸öÉú²úЧÀÍÆ÷ £¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ð¡¢Éí¸ß¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬ¡¢Î»ÖÃÐÅÏ¢¡¢Ô¼»áÆ«ºÃµÈ ¡£¡£¡£¸ÃÓ¦ÓÃËùÊôµÄÒÁ˹̹²¼¶ûÈí¼þ¹«Ë¾ÔÚ½üÒ»¸öÐÇÆÚÄÚδÄܻظ´ZDNetµÄѯÎÊ £¬£¬£¬Ð¹Â¶µÄЧÀÍÆ÷ÔÚZDNetת´ïÍÁ¶úÆäCERTºó»ñµÃ±£»£»£»£» £»¤ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/heyyo-dating-app-leaked-users-personal-data-photos-location-data-more/

3.й¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ƾ֤Palo Alto NetworksµÄ±¨¸æ £¬£¬£¬Ò»¸öÐµĹ¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØµÄÔËÊäºÍº½ÔË×éÖ¯ ¡£¡£¡£xHuntÖ÷ÒªÔÚ2019Äê5ÔÂÖÁ6ÔÂÖ®¼ä¾ÙÐÐ £¬£¬£¬Ñо¿Ö°Ô±½«¸Ã¹¥»÷»î¶¯ÖÐʹÓõŤ¾ßÓë2018Äê7ÔÂÖÁ12ÔÂÖ®¼äÕë¶Ô¿ÆÍþÌØµÄ¹¥»÷¹ØÁªÆðÀ´ ¡£¡£¡£×÷Ϊй¥»÷µÄÒ»²¿·Ö £¬£¬£¬¹¥»÷ÕßʹÓÃÁËSakabota¡¢Histoka¡¢NeteroºÍKilluaµÈºóÃÅ £¬£¬£¬ÕâЩºóÃÅͨ¹ýHTTPÓëC&CͨѶ £¬£¬£¬²¿·Ö±äÌåҲʹÓÃDNSËíµÀ»òµç×ÓÓʼþ¾ÙÐÐͨѶ ¡£¡£¡£¹¥»÷ÕßÒ²ÔÚÊÜѬȾµÄϵͳÉÏÊÍ·ÅÁ˶ñÒ⹤¾ßGonºÍEYE ¡£¡£¡£Ö»¹Ü2018ÄêºÍ2019ÄêµÄ¹¥»÷»î¶¯ÖÐʹÓõŤ¾ß±£´æÖصþ £¬£¬£¬µ«ÏÖÔÚÉв»¿ÉÈ·¶¨ÕâÁ½¸ö»î¶¯ÊÇ·ñÓÉͳһ¹¥»÷ÕßÌᳫ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/xhunt-campaign-targets-kuwait-transportation-and-shipping-sector

4.Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

¿¨°Í˹»ùÑо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß ¡£¡£¡£YatronÖ÷Òª»ùÓÚ¿ªÔ´ÀÕË÷Èí¼þHidden Tear¾ÙÐпª·¢ £¬£¬£¬Æ¾Ö¤¿¨°Í˹»ùµÄͳ¼ÆÊý¾Ý £¬£¬£¬¸ÃÀÕË÷Èí¼þÔÚÒÑÍùÒ»ÄêÖÐÊÔͼÌᳫ600¶à´ÎѬȾ £¬£¬£¬ÆäÖдó´ó¶¼¹¥»÷λÓڵ¹ú¡¢Öйú¡¢¶íÂÞ˹¡¢Ó¡¶ÈºÍÃåµé ¡£¡£¡£FortuneCryptµÄÖ÷ÒªÌØµãÊÇʹÓÃBlitzMax±àÒëÆ÷¾ÙÐбàÒë £¬£¬£¬ÕâÊÇ¿¨°Í˹»ùÊӲ쵽µÄÊ׸öʹÓÃBlitz BASIC±àдµÄÀÕË÷Èí¼þ ¡£¡£¡£È¥Ä꿨°Í˹»ù¹²¼Í¼ÁËTrojan-Ransom.Win32.Crypren¼Ò×åµÄ6000¶à´Î¹¥»÷ £¬£¬£¬Êܹ¥»÷Êý×î¶àµÄ¹ú¼ÒÊǶíÂÞ˹¡¢°ÍÎ÷¡¢µÂ¹ú¡¢º«¹úºÍÒÁÀÊ ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securelist.com/ransomware-two-pieces-of-good-news/93355/

5.·¸·¨ÍÅ»ïTortoiseshellʹÓÃÐéÎ±ÍøÕ¾Ãé×¼ÃÀ¹úÍËÎéÎäÊ¿

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

˼¿ÆTalos·¢Ã÷ÓÉÒÁÀÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯TortoiseshellÕýÊÔͼʹÓÃÐéαÕÐÆ¸ÍøÕ¾Õë¶ÔÃÀ¹úÍËÎéÎäÊ¿ ¡£¡£¡£¸ÃÍøÕ¾µÄÓòÃûÊÇhiremilitaryheroes[.]com £¬£¬£¬ÉÏÃæÌṩһ¸ö×ÀÃæ°æÈí¼þµÄÏÂÔØ £¬£¬£¬µ«¸ÃÈí¼þ»áÏÔʾװÖÃʧ°ÜÐÅÏ¢²¢ÏÖʵÉÏ×°ÖöñÒâÈí¼þ ¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö £¬£¬£¬¶ñÒâÈí¼þ»áÔÚºǫ́ÔËÐÐÍøÂçÓû§µÄÐÅÏ¢ £¬£¬£¬È»ºó·¢Ë͵½¹¥»÷ÕßµÄGmailÓÊÏä ¡£¡£¡£ÍøÂçµÄÐÅÏ¢°üÀ¨ÏµÍ³²¹¶¡¼¶±ð¡¢´¦Öóͷ£Æ÷ÊýÄ¿¡¢ÍøÂçÉèÖá¢Ó²¼þºÍ¹Ì¼þ°æ±¾¡¢Óò¿ØÖÆÆ÷¡¢ÖÎÀíÔ±Ãû³Æ¡¢ÕË»§ÁÐ±í¡¢ÈÕÆÚ¡¢Ê±¼ä¡¢Çý¶¯³ÌÐòµÈ ¡£¡£¡£±ðµÄ £¬£¬£¬¶ñÒâÈí¼þ»¹»áÔÚÊܺ¦ÕßµÄϵͳÉÏ×°ÖÃÔ¶¿ØÄ¾Âí ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-military-veterans-targeted-by-iranian-state-hackers/

6.·¸·¨ÍÅ»ïMagecartÃé×¼¹«¹²Wi-Fi±³ºóµÄÉÌÓ÷ÓÉÆ÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Magecart Group 5±»·¢Ã÷ÕýÔÚÃé×¼±¸×¢ÈëÉÌÓ÷ÓÉÆ÷ÖеĶñÒâ´úÂë¾ÙÐвâÊÔ ¡£¡£¡£¸Ã´úÂëÕë¶ÔµÄ·ÓÉÆ÷Ö÷ÒªÓÃÓÚÔÚ¹«¹²³¡ºÏºÍÂùÝÖÐÌṩÃâ·Ñ»ò¸¶·ÑµÄWi-FiЧÀÍ £¬£¬£¬ÈôÊÇÀÖ³É £¬£¬£¬¹¥»÷Õß½«Äܹ»Ñ¬È¾ÕâЩ·ÓÉÆ÷²¢ÔÚ»ú³¡¡¢¿§·Èµê¡¢Âùݵȹ«¹²ÉèÊ©ÖÐÇÔÈ¡ÆäWi-FiÓû§µÄÖ§¸¶Êý¾Ý ¡£¡£¡£ÕâЩ´úÂë±»×¢Èëµ½Á¼ÐÔµÄJavaScriptÎļþÖÐ £¬£¬£¬È»ºó¼ÓÔØµ½Ö§³ÖL7ЭÒéµÄÉÌÓ÷ÓÉÆ÷ ¡£¡£¡£L7ЭÒéÖ¸µÄÊÇOSIµÄÓ¦ÓòãЭÒé £¬£¬£¬³£ÓÃÓÚÉÌÓ÷ÓÉÆ÷ÒÔ¾ÙÐÐÁ÷Á¿¸ºÔØÆ½ºâºÍÔÚÓû§ÅþÁ¬µ½Wi-FiЧÀÍʱÏÔÊ¾Ò³Ãæ»ò¹ã¸æ ¡£¡£¡£ÏÖÔÚÑо¿Ö°Ô±ÉÐδ·¢Ã÷ÏÖʵµÄ¹¥»÷°¸Àý ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/magecart-group-targets-routers-behind-public-wi-fi-networks/148662/