Ñо¿Ö°Ô±Åû¶Microsoft WindowsÖÐ5¸ö0day£»£»£»£»£»£»ºÚ¿ÍÔÚ°µÍø³öÊÛWishboneÖÐ4000ÍòÌõÓû§ÐÅÏ¢

Ðû²¼Ê±¼ä 2020-05-22

1.Ñо¿Ö°Ô±Åû¶Microsoft WindowsÖÐ5¸ö0day£¬£¬£¬£¬ÏÖÔÚÉÐδÐÞ¸´

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Trend MicroÇ徲ר¼ÒÅû¶ÁËMicrosoft WindowsÖÐ5¸öÉÐδÐÞ¸´µÄ0day£¬£¬£¬£¬Ö÷ÒªÓ°ÏìÁËÓû§Ä£Ê½´òÓ¡»úÇý¶¯³ÌÐòµÄÀú³Ìsplwow64.exe¡£¡£¡£¡£ÆäÖÐÈý¸öÎó²î½ÏΪÑÏÖØ£¬£¬£¬£¬±»¸ú×ÙΪCVE-2020-0916¡¢CVE-2020-0986ºÍCVE-2020-0915£¬£¬£¬£¬ÕâЩÎó²î¿ÉÄܱ»ºÚ¿ÍÓÃÀ´ÌáȨ£¬£¬£¬£¬CVSSÆÀ·ÖΪ7.0¡£¡£¡£¡£µÚËĸöÊÇÓÉÓÚȱÉÙ¶ÔÓû§µÄÖµµÄÑéÖ¤µ¼ÖµĽϵÍΣº¦µÄÐÅϢй¶Îó²î£¬£¬£¬£¬×îºóÒ»¸ö0dayÊÇ´¦Öóͷ£WLANÅþÁ¬ÉèÖÃÎļþʱµÄÌØÈ¨ÌáÉýÎó²î¡£¡£¡£¡£Trend MicroÓÚ2019Äê12ÔÂÏòMicrosoft±¨¸æÁËÕâЩÎó²î£¬£¬£¬£¬µ«Î¢Èí²¢Î´ÔÚ2020Äê5ÔµIJ¹¶¡ÖÐÐÞ¸´ÕâЩÎÊÌâ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/103507/hacking/microsoft-windows-zero-days.html


2.ÈÕ±¾ÏÓÒÉÈýÁ⹫˾Ôâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬»ò½«µ¼Öµ¼µ¯Êý¾Ýй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÈÕ±¾¹ÙÔ±ÖÜÈýÌåÏÖÆäÕýÔÚÊÓ²ì¿ÉÄܱ£´æµÄÊý¾Ý×ß©ÊÂÎñ£¬£¬£¬£¬°üÀ¨ÈýÁâµç»ú¹«Ë¾Ôâµ½ÁË´ó¹æÄ£ÍøÂç¹¥»÷¿ÉÄÜй¶ÁËÔ­Ð͵¼µ¯ÏêϸÐÅÏ¢¡£¡£¡£¡£¾ÝÈÕ±¾Ã½Ì屨µÀ£¬£¬£¬£¬ÈÕ±¾¹ú·À²¿ÏÓÒÉÕâЩÐÅÏ¢¿ÉÄÜÊÇ´Ó¼¸¼Ò¹ú·À×°±¸ÖÆÔìÉÌ·¢Ë͵ÄÕбêÎļþÖÐй¶µÄ£¬£¬£¬£¬¿ÉÊÇÈýÁⲢδÖбê¡£¡£¡£¡£¶øÈýÁâÔÚÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬ËüÒÑÏò¹ú·À²¿±¨¸æÁ˽ñÄêÄêÍ·Ôâµ½ÍøÂç¹¥»÷¿ÉÄܵ¼ÖÂÏà¹ØÐÅϢй¶µÄÇéÐΣ¬£¬£¬£¬²¢ÈÏ¿ÉÆäԼĪ8000È˵ÄСÎÒ˽¼ÒÊý¾Ý¿ÉÄÜÒѾ­Ð¹Â¶¡£¡£¡£¡£½ñÄ꣬£¬£¬£¬ÈÕ±¾ÆäËû¼¸¼Ò¹ú·À³Ð°üÉÌÒ²Ôâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬°üÀ¨NEC Corp.£¬£¬£¬£¬Pasco Corp.ºÍKobe Steel Ltd.¡£¡£¡£¡£ÄÚ¸ó¹Ù·¿³¤Suga¾Ü¾ø¶Ô´ËÊÂ͸¶¸ü¶àϸ½Ú¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.seattletimes.com/business/japan-suspects-missile-data-leak-in-mitsubishi-cyberattack/


3.ºÚ¿Í͵ȡWishboneÖÐ4000ÍòÌõÓû§ÐÅÏ¢£¬£¬£¬£¬²¢ÔÚ°µÍø±ê¼Û³öÊÛ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿ÍÇÔÈ¡ÁËWishboneÖÐ4000ÍòÌõÓû§ÐÅÏ¢£¬£¬£¬£¬²¢ÒÔ0.85±ÈÌØ±Ò£¨Ô¼ºÏ8000ÃÀÔª£©µÄ¼ÛÇ®ÔÚ°µÍø¹ûÕæ³öÊÛ¡£¡£¡£¡£Æ¾Ö¤ºÚ¿ÍÌṩµÄÊý¾ÝʾÀý£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢°üÀ¨Óû§Ãû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¡¢¶¼»á/ÖÝ/¹ú¼ÒºÍ¹þÏ£ÃÜÂëµÈÓû§ÐÅÏ¢£¬£¬£¬£¬ÒÔ¼°WishboneСÎÒ˽¼Ò×ÊÁÏͼƬµÄÁ´½Ó¡£¡£¡£¡£ºÚ¿ÍÉù³ÆÕâЩÊý¾ÝÊÇͨ¹ý½ñÄêÄêÍ·µÄ¹¥»÷ÇÔÈ¡µÄ£¬£¬£¬£¬Æ¾Ö¤Êý¾ÝÑù±¾ÖеÄʱ¼ä´Á¿É×·Ëݵ½2020Äê1Ô¡£¡£¡£¡£¾ÝZDNetÊӲ죬£¬£¬£¬¸ÃºÚ¿ÍÏÖÔÚÕýÔÚ³öÊÛÊýÊ®¼ÒÆäËû¹«Ë¾µÄÊý¾Ý¿â£¬£¬£¬£¬×ܼÆÁè¼Ý15ÒÚÌõÊý¾Ý¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hacker-selling-40-million-user-records-from-popular-wishbone-app/


4.Å·ÖÞÒ½ÔºFreseniusÔâÀÕË÷Èí¼þSnake¹¥»÷£¬£¬£¬£¬»¼ÕßÐÅϢй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Å·ÖÞÒ»¼Ò´óÐ͵Ä˽Á¢Ò½ÔºFreseniusÔâÀÕË÷Èí¼þSnake¹¥»÷£¬£¬£¬£¬Æä»¼ÕßµÄÒ½ÁÆÊý¾ÝºÍСÎÒ˽¼ÒÉí·ÝÐÅϢй¶¡£¡£¡£¡£¾ÝBleepingComputerÊӲ죬£¬£¬£¬Ð¹Â¶ÐÅϢΪ¸ÃҽԺΪÂýÐÔÉöÔàË¥½ß»¼ÕßÌṩ͸ÎöЧÀ͵IJ¿·Ö£¬£¬£¬£¬ÆäÖÐй¶µÄСÎÒ˽¼ÒÐÅÏ¢°üÃû×ÖºÍÐÕÊÏ¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢»¼ÕߵĹú¼®¡¢Ö°Òµ¡¢ÓÊÕþµØµã¡¢µç»°ºÅÂëÉÐÓнüÇ×µÄÏêϸÐÅÏ¢£¨ÐÕÃûºÍµç»°£©£»£»£»£»£»£»Ð¹Â¶µÄÒ½ÁÆÊý¾ÝÊÇָȫ¿ÆÒ½ÉúµÄÐÕÃûºÍµç»°¡¢ÓйعýÃôµÄ×¢ÊÍ¡¢²âÊÔЧ¹ûÒÔ¼°ÓйØÖÎÁƵÄÒ½ÉúÒâ¼û¡£¡£¡£¡£BleepingComputerÒÑÓë¸ÃҽԺȡµÃÁªÏµÒÔÈ·ÈÏÊý¾Ý£¬£¬£¬£¬µ«ÏÖÔÚδÊÕµ½Èκλظ´¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/snake-ransomware-leaks-patient-data-from-fresenius-medical-care/


5.Å·ÖÞÒøÐÐSantander±£´æÇå¾²ÎÊÌ⣬£¬£¬£¬µ¼ÖÂÃô¸ÐÐÅϢй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Å·ÖÞÒøÐÐSantanderµÄ±ÈÀûʱ·ÖÐÐÒò±£´æÇå¾²ÎÊÌ⣬£¬£¬£¬µ¼ÖÂÃô¸ÐÐÅϢй¶¡£¡£¡£¡£Çå¾²ÆÊÎöʦ·¢Ã÷£¬£¬£¬£¬¸ÃÒøÐеIJ©¿Í×ÓÓòµÄwww¶ËµãÉèÖùýʧ£¬£¬£¬£¬ÔÊÐíËÑË÷ÒýÇæ½«ÆäËùÓÐÎļþ±àÈëË÷Òý¡£¡£¡£¡£Òò´Ë»áµ¼ÖÂÃô¸ÐÐÅϢй¶£¬£¬£¬£¬°üÀ¨SQLºÍJSONÎļþ£¬£¬£¬£¬¶øºÚ¿Í¿ÉÒÔʹÓÃÕâЩÎļþÀ´ÓÕÆ­SantanderÒøÐеĿͻ§¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷й¶ÎļþÖаüÀ¨ÆäCloudfront APIÃÜÔ¿£¬£¬£¬£¬  Õâ¿ÉÄÜ»áй¶CloudfrontÍйܵÄÄÚÈÝ¡£¡£¡£¡£ÏÖÔÚSantanderÒøÐÐÒѾ­ÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

/santander-leaking-sensitive-data.html?utm_source=rss&utm_medium=rss&utm_campaign=santander-leaking-sensitive-data


6.ºÚ¿Í×éÖ¯CyberWareΪÉìÕÅÕýÒ壬£¬£¬£¬ÓÃÀÕË÷Èí¼þ¹¥»÷Õ©Æ­¹«Ë¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿Í×éÖ¯CyberWareΪÉìÕÅÕýÒ壬£¬£¬£¬Ê¹ÓÃÀÕË÷Èí¼þMilkmanVictoryºÍDDoS¹¥»÷Õ©Æ­¹«Ë¾¡£¡£¡£¡£CyberWareÌåÏÖ£¬£¬£¬£¬ËûÃÇÒÑ×îÏȶԴû¿îÕ©Æ­¹«Ë¾Ìᳫ¹¥»÷¡£¡£¡£¡£ËûÃÇÕýÔÚ·¢ËÍÍøÂç´¹ÂÚµç×ÓÓʼþ£¬£¬£¬£¬ÆäÖаüÀ¨Î±×°ÎªPDFÎļþµÄ¿ÉÖ´ÐÐÎļþµÄÁ´½Ó£¬£¬£¬£¬ÒÔ·Ö·¢ÀÕË÷Èí¼þ¡£¡£¡£¡£ÕâЩÀÕË÷Èí¼þÊÇÒÔÆÆËðΪĿµÄµÄ£¬£¬£¬£¬ºÚ¿ÍÌåÏÖËûÃDz»ÊÇΪÁËÇ󲯡£¡£¡£¡£ËûÃÇ»¹ÌᳫÁËDDoS¹¥»÷£¬£¬£¬£¬ÒÔÆÆËð¹«Ë¾µÄÍøÕ¾¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬¸øÊܺ¦ÕßÁôϵÄÊê½ð˵Ã÷Ϊ¡°ÎÒÃÇÖªµÀÄúÊÇÆ­×Ó£¡¡±£¬£¬£¬£¬ÒÔ֤ʵ¸ÃÅÌËã»úÒѱ»ÈëÇÖ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/vigilante-hackers-target-scammers-with-ransomware-ddos-attacks/