ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶´ó×ÚÓû§Êý¾Ý £»£»£»£»£»£»£»·¨¹ú¹¤Òµ¹«Ë¾Bouygues¼°5¼Ò״ʦÊÂÎñËùÔâµ½Maze¹¥»÷

Ðû²¼Ê±¼ä 2020-02-04

1.·¨¹ú¹¤Òµ¹«Ë¾Bouygues¼°5¼Ò״ʦÊÂÎñËùÔâµ½Maze¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


·¨¹ú¹¤Òµ¹«Ë¾Bouygues Construction¼°Îå¼Ò״ʦÊÂÎñËù³ÉΪÀÕË÷Èí¼þMazeµÄ×îÐÂÊܺ¦Õߣ¬ £¬ £¬¾Ý³Æ¹¥»÷ÕßÇÔÈ¡ÁËËùÓÐÕâЩ¹«Ë¾µÄÃô¸ÐÄÚ²¿Êý¾Ý ¡£¡£¡£¡£¡£Maze¹¥»÷ÕßÒѾ­ÔÚÆäÍøÕ¾ÉÏÐû²¼ÁËÁ½¼Ò״ʦÊÂÎñËùµÄ¿Í»§Êý¾Ý£¬ £¬ £¬²¢ÔÊÐíºÜ¿ì»áÐû²¼ÆäËü¹«Ë¾µÄÊý¾Ý ¡£¡£¡£¡£¡£BouyguesÔÚÉÏÖÜÎåÐû²¼ÁËÒ»·Ý¼ò¶ÌÉùÃ÷£¬ £¬ £¬ÈÏ¿ÉÔÚÆäÍøÂçÉϼì²âµ½ÀÕË÷²¡¶¾£¬ £¬ £¬µ«²¢Î´»ØÓ¦ÆäÒªº¦Êý¾ÝÊÇ·ñ±»µÁ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/maze-ransomware-law-firms-french/


2.Ó¢¹ú´ÈÉÆ»ú¹¹ÔâÍøÂçڲƭËðʧÁè¼Ý100ÍòÃÀÔª


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ó¢¹úÉçÇø×¡·¿´ÈÉÆ»ú¹¹Red KiteÖܶþÐû²¼ËüÒѳÉÎªÍøÂçÕ©Æ­µÄÊܺ¦Õߣ¬ £¬ £¬·¸·¨·Ö×Óαװ³ÉÕæÕýµÄЧÀÍÌṩÉÌÆ­È¡ÁË93.2ÍòÓ¢°÷×ʽ𠡣¡£¡£¡£¡£Æ¾Ö¤¸Ã»ú¹¹µÄÐÎò£¬ £¬ £¬·¸·¨·Ö×ÓÄ£ÄâÁËÏòRed KiteÌṩЧÀ͵ÄÒÑÖªÁªÏµÈ˵ÄÓòÃûºÍµç×ÓÓʼþÐÅÏ¢£¬ £¬ £¬µ¼ÖÂÔ±¹¤ÎóÒÔΪÕâÊÇÕæÕýµÄ¸ú½ø»á»° ¡£¡£¡£¡£¡£¸Ã»ú¹¹»¹ÈÏ¿ÉÔ±¹¤Ã»ÓнÓÄÉÃ÷È·µÄÁ÷³Ì£¬ £¬ £¬µ¼ÖÂΪ±ÜÃâڲƭÐÔÉúÒâ¶øÊµÑéµÄ¸¶¿îÑéÖ¤Á÷³ÌÎÞЧ ¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê8ÔÂÏÂÑ®£¬ £¬ £¬¾¯·½ÈÔÔڶԴ˾ÙÐÐÊÓ²ì ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/red-kite-spoofing-scam/


3.Ç÷ÊÆ¿Æ¼¼ÐÞ¸´Æä·´Íþв¹¤¾ß°üÖеĶà¸öÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ç÷ÊÆ¿Æ¼¼Ðû²¼·´Íþв¹¤¾ß°ü£¨ATTK£©µÄÇå¾²¸üУ¬ £¬ £¬ÐÞ¸´ÓëÔÚ2019Äê10ÔÂÐÞ¸´µÄÒ»¸öÎó²îÓйصĸü¶àÎó²î ¡£¡£¡£¡£¡£È¥ÄêÇå¾²Ñо¿Ô±John Page·¢Ã÷ATTKÊܵ½Îó²î£¨CVE-2019-9491£©µÄÓ°Ï죬 £¬ £¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÔÚÏàͬµÄĿ¼ÖÐÖ²ÈëÃûΪcmd.exe»òRegedit.exeµÄ¶ñÒâÎļþÀ´ÒÔÌáÉýµÄÌØÈ¨Ö´ÐÐí§Òâ´úÂë ¡£¡£¡£¡£¡£¸ÃÎó²îÔÚÈ¥Äê10Ôµİ汾1.62.0.1223ÖоÙÐÐÁËÐÞ²¹£¬ £¬ £¬µ«Ñо¿Ö°Ô±Stefan Kanthak·¢Ã÷ÁËÆäËüÈýÖÖÀàËÆµÄ¹¥»÷ÒªÁ죨°üÀ¨CVE-2019-20358ºÍCVE-2019-20358£©£¬ £¬ £¬Ç÷ÊÆ¿Æ¼¼ÔÚÉÏÖÜÐû²¼ÁËа汾1.62.0.1228ÐÞ¸´ÕâЩÎó²î ¡£¡£¡£¡£¡£Ê¹ÓÃÕâЩÎó²îÐèÒªÎïÀí»òÔ¶³Ì»á¼ûÄ¿µÄϵͳ£¬ £¬ £¬µ«Ç÷ÊÆ¿Æ¼¼½¨Òé¿Í»§¾¡¿ì×°Öò¹¶¡ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/trend-micro-patches-more-vulnerabilities-anti-threat-toolkit


4.ºÚ¿ÍÆð¾¢Ê¹ÓÃNSC²úÆ·Îó²îɨÃè²¢Ð®ÖÆÖÇÄÜÃŽûϵ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤Çå¾²³§ÉÌSonicWallµÄÒ»·Ý±¨¸æ£¬ £¬ £¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃÎó²î£¨CVE-2019-7256£©À´ËÑË÷²¢Ð®ÖÆ»¥ÁªÍøÉϵÄÖÇÄÜÃŽûϵͳ£¬ £¬ £¬²¢ÓÃÓÚÌᳫDDoS¹¥»÷ ¡£¡£¡£¡£¡£¹¥»÷ÕßÃé×¼µÄ×°±¸ÊÇNortekÇå¾²Óë¿ØÖÆ£¨NSC£©²úÆ·Linear eMerge E3£¬ £¬ £¬¸Ã²úÆ·±»¹éΪӲ¼þÖֱ𡰻á¼û¿ØÖÆÏµÍ³¡±£¬ £¬ £¬³£±»×°ÖÃÔÚ¹«Ë¾×ܲ¿¡¢¹¤³§»ò¹¤ÒµÔ°ÇøÖÐ ¡£¡£¡£¡£¡£2019Äê5ÔÂApplied RiskÅû¶ÁËÓйØÓ°ÏìNSC Linear eMerge E3×°±¸µÄÊ®¸öÎó²îµÄÏêϸÐÅÏ¢£¬ £¬ £¬Ö»¹ÜÓÐÁù¸öÎó²îµÄÑÏÖØÐÔ£¨CVSSv3£©µÃ·ÖΪ9.8»òÂú·Ö10·Ö£¬ £¬ £¬µ«NSCδÄÜÌṩ²¹¶¡ ¡£¡£¡£¡£¡£ºÚ¿ÍÕýÔÚʹÓõÄÎó²îÊÇÆäÖеÄÒ»¸öÔ¶³ÌÏÂÁîÖ´ÐÐÎó²î£¨CVE-2019-7256£©£¬ £¬ £¬ÆäCVSSv3µÃ·ÖΪ10·Ö ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýShodanËÑË÷ÒýÇæ·¢Ã÷ÓÐ2375¸öeMerge×°±¸Ì»Â¶ÔÚ»¥ÁªÍøÉÏ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-are-hijacking-smart-building-access-systems-to-launch-ddos-attacks/


5.ÐÂMagecart¹¥»÷À˳±Ö÷ÒªÕë¶Ôµç×ÓÉÌÎñÍø


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±·¢Ã÷Ò»¸öMagecart·¸·¨ÍŻﲻµ«Ñ¬È¾Á˶«¾©°ÂÔË»áÃÅÆ±¾­ÏúÉ̵ÄÍøÕ¾£¬ £¬ £¬»¹ÌᳫÁËÕë¶Ôµç×ÓÉÌÎñÍøÕ¾µÄ¹¥»÷À˳± ¡£¡£¡£¡£¡£ÉϸöÔÂÇå¾²Ñо¿Ô±Jacob PimentalºÍMax Kersten·¢Ã÷°ÂÔË»áÃÅÆ±¾­ÏúÉÌÍøÕ¾olympictickets2020[.]com¼°Å·ÖÞ±­ÃÅÆ±¾­ÏúÉÌÍøÕ¾eurotickets2020[.]com¾ùѬȾÁËMagecart´úÂ룬 £¬ £¬¸Ã¶ñÒâ´úÂ뽫ËùÓб»µÁÐÅÏ¢·¢Ë͵½opendoorcdn[.]com ¡£¡£¡£¡£¡£ÔÚ¼ÌÐøÊÓ²ìÀú³ÌÖУ¬ £¬ £¬Ñо¿Ö°Ô±·¢Ã÷¶à¸öÍøÕ¾×ÔÈ¥Äê10ÔÂÒÔÀ´¾ùѬȾÁËͳһMagecart´úÂ룬 £¬ £¬°üÀ¨supremeproducts[.]co.uk¡¢partsplaceinc[.]com¡¢zhik[.]comµÈ ¡£¡£¡£¡£¡£¶ñÒâ´úÂëÓɶíÂÞ˹ÍйÜЧÀÍÌṩÉÌSelectelÍйܣ¬ £¬ £¬ÏÖÔÚOpendoorCDNÓòÃûÒѱ»ÔÝͣЧÀÍ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/magecart-group-jumps-from-olympic-ticket-website-to-new-wave-of-e-commerce-shops/


6.ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶´ó×ÚÓû§Êý¾Ý


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤Naked SecurityµÄÒ»·Ý±¨¸æ£¬ £¬ £¬ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶ÁË´ó×ÚÓû§µÄ˽ÈËÊý¾Ý£¬ £¬ £¬°üÀ¨ÐÕÃû¡¢µØµã¡¢ÐÔÄÜÆÀ¼¶ºÍ¹«Ë¾ÅàѵÊÓÆµµÈ ¡£¡£¡£¡£¡£Ð¹Â¶µÄÔµ¹ÊÔ­ÓÉÊDz¿·ÖÓû§¹ýʧµØ½«ÆäTrelloÃæ°åÉèÖÃΪpublic£¬ £¬ £¬ÕâʹµÃÈκÎÈ˶¼¿ÉÒÔÉó²éÆäÖеÄÄÚÈÝ£¬ £¬ £¬ÉõÖÁGoogleÖ®ÀàµÄËÑË÷ÒýÇæ¿ÉÒÔ½«Ãæ°åÖеÄÄÚÈÝÄÉÈëË÷Òý£¬ £¬ £¬½öÐèҪͨ¹ýÒ»ÖÖ³ÆÎª¡°dork¡±µÄÌØÊâÀàÐͼ´¿ÉËÑË÷µ½ ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.techworm.net/2020/02/trello-search-exposes-private-data.html