Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ­°¸¼þ£»£»£»£» £»£»£»Ñо¿ÍŶӷ¢Ã÷StruxureWare±£´æ6¸öеÄ0day

Ðû²¼Ê±¼ä 2020-12-01
1.Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ­°¸¼þ


1.jpg


ÍøÂçÇå¾²¹«Ë¾Group-IBÓëÅ·ÖÞµÄÐÙÑÀÀû¡¢Ó¢¹úºÍÒâ´óÀûÕþ¸®ÏàÖú£¬£¬£¬£¬£¬£¬ÌᳫCarding Action 2020Ðж¯£¬£¬£¬£¬£¬£¬ÆÆ»ñÒ»Æð´ó¹æÄ£ÐÅÓÿ¨ÉúÒâÕ©Æ­°¸¼þ¡£¡£¡£¡£ ¡£¸Ã»î¶¯Õë¶Ô¶à¸ö°µÍøÊг¡£¬£¬£¬£¬£¬£¬ÔÚÐÅÓÿ¨ÉúÒâÊÐËÁºÍ°µÍøÉúÒâÆ½Ì¨ÉϲéÕÒÓëÉúÒâ±»µÁ¿¨ÏêϸÐÅÏ¢ÓйصÄڲƭÕߣ¬£¬£¬£¬£¬£¬Ö¼ÔÚ¼õÇáºÍ±ÜÃâ½ðÈÚ»ú¹¹ºÍ³Ö¿¨ÈËÔâÊÜËðʧ£¬£¬£¬£¬£¬£¬ÏÖÔÚÔ¼×èÖ¹ÁË4000ÍòÅ·ÔªµÄËðʧ¡£¡£¡£¡£ ¡£¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼¾Ð²¶ÁËÈýÃûÀ´×ÔÄáÈÕÀûÑǵÄÏÓÒÉÈË£¬£¬£¬£¬£¬£¬¾ÝÐÅËûÃÇÊÇÒ»¸ö¹¥»÷ÁË150¸öÕþ¸®×éÖ¯ºÍ¹«Ë¾µÄÍÅ»ïµÄ³ÉÔ±¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/authorities-disrupt-dark-web-credit-card-trading-scam/


2.Ñо¿ÍŶӷ¢Ã÷StruxureWare±£´æ6¸öеÄ0day


2.jpg


TIMºì¶ÓÑо¿ÍŶӣ¨RTR£©·¢Ã÷StruxureWare±£´æ6¸öеÄ0day£¬£¬£¬£¬£¬£¬ÏÖÔÚÒѱ»ÆäÖÆÔìÉÌÊ©ÄÍµÂµçÆøÐÞ¸´¡£¡£¡£¡£ ¡£´Ë´Î·¢Ã÷µÄÎó²î»®·ÖΪ²»ÊÜÏÞÖÆµÄÎļþÉÏ´«Îó²î£¨CVE-2020-7569£©£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ»£»£»£» £»£»£»XMLÍⲿʵÌåÒýÓõÄÏÞÖÆ²»µ±£¨CVE-2020-7572£©£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶£»£»£»£» £»£»£»WindowsδÒýÓÃËÑË÷·¾¶£¨CVE-2020-28209£©£»£»£»£» £»£»£»´æ´¢ÐÍ¿çÕ¾µã¾ç±¾Îó²î£¨CVE-2020-7570£©£»£»£»£» £»£»£»·´ÉäÐÍ¿çÕ¾µã¾ç±¾Îó²î£¨CVE-2020-7571£©ºÍ»á¼û¿ØÖƲ»µ±£¨CVE-2020-7573£©¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/111692/hacking/schneider-electric-zero-days.html


3.BasecampÐÞ¸´¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÑÏÖØÎó²î


3.jpg


BasecampÅû¶Æä±£´æ¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÎó²î£¬£¬£¬£¬£¬£¬ÏÖÒÑÐÞ¸´¡£¡£¡£¡£ ¡£¸ÃÎó²î±£´æÓÚͼƬÉÏ´«¹¦Ð§ÖУ¬£¬£¬£¬£¬£¬Ð§ÀÍÆ÷¶ËÔÚת»»Í¼Ïñʱ£¬£¬£¬£¬£¬£¬²»µ«½ÓÊÜͼÏñÎļþ£¬£¬£¬£¬£¬£¬»¹½ÓÊÜÖØÃüÃûΪ.gifµÄPostScript¡¢EPSÎļþ¡£¡£¡£¡£ ¡£Òò´Ë£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÉÏ´«´øÓиü¸ÄΪͼÏñÀ©Õ¹ÃûµÄ¶ñÒâÎļþÀ´Ö´ÐÐÏÂÁî¡£¡£¡£¡£ ¡£Õâ¿ÉÄÜÊÇÓÉÓÚʹÓÃÁËImageMagick»òGraphicsMagick¾ÙÐÐͼÏñת»»£¬£¬£¬£¬£¬£¬ÔÚÊäÈëÒÔ'£¥£¡'Ϊ¿ªÍ·µÄÎļþʱ£¬£¬£¬£¬£¬£¬Ôò»áŲÓÃPostScriptÚ¹ÊÍÆ÷£¨Ghostscript£©£¬£¬£¬£¬£¬£¬¶øGhostscript×Ô¼º±£´æÇå¾²Îó²î¡£¡£¡£¡£ ¡£ 


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/11/29/critical-vulnerability-in-basecamp-could-allow-remote-code-execution-attacks/


4.Unit4Ðû²¼ÓйØÈ«ÇòÆóÒµ¾ÙÐÐÊý×Ö»¯×ªÐÍµÄÆÊÎö±¨¸æ


4.jpg


ÆóÒµÔÆÓ¦Óù«Ë¾Unit4Ðû²¼ÓйØÈ«ÇòÆóÒµ¾ÙÐÐÊý×Ö»¯×ªÐÍµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ÎªÏìÓ¦Óû§Ò»Ö±ÔöÌíµÄÐèÇ󣬣¬£¬£¬£¬£¬È«Çò84£¥µÄ¾öÒéÕßÕýÔÚ¼ÓËÙÆäÊý×Ö»¯×ªÐÍÍýÏ룬£¬£¬£¬£¬£¬²¢Ï£ÍûÔÚδÀ´Óиü¶àµÄÎÞаÐÔÀ´Ô¶³ÌÊÂÇé¡£¡£¡£¡£ ¡£ÔÚCovid-19ʱ´ú£¬£¬£¬£¬£¬£¬49%µÄ¾öÒéÕß³ÆÔÚÍýÏë·½Ãæ±äµÃÔ½·¢ÎÞа£¬£¬£¬£¬£¬£¬42%ÈÏ¿ÉÁ¢ÒìµÄ³ÌÐòÒѾ­¼ÓËÙ£¬£¬£¬£¬£¬£¬35%µÄÈËÌåÏÖÕâ¼ÓËÙÁËËûÃÇÏòÔÆÅÌËã×ªÒÆµÄͶ×Ê¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ëæ×ÅÔ¶³ÌÊÂÇéµÄÌ«¹ý£¬£¬£¬£¬£¬£¬60£¥µÄÊÜ·ÃÕßÌåÏÖËûÃÇÔÚ·â±Õʱ´úÉú²úÁ¦¸ü¸ß¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.unit4.com/news/unit4-study-reveals-organizations-are-accelerating-digital-strategies-people-led


5.ThreatpostÐû²¼Covidʱ´úÒ½ÁÆÐÐÒµµÄÍþвÆÊÎö±¨¸æ


5.jpg


ThreatpostÐû²¼ÁËÓйØCovidʱ´úÒ½ÁÆÐÐÒµµÄÍþвÆÊÎö±¨¸æ¡£¡£¡£¡£ ¡£¸Ã±¨¸æÌ½ÌÖÁËÒ½ÁÆ×°±¸µÄÇå¾²ÐÔ¡¢ÀÕË÷Èí¼þµÄΣº¦ÒÔ¼°Ò½ÁÆÌع¤»î¶¯µÄÐËÆð£¬£¬£¬£¬£¬£¬ÀýÈçºÚ¿Í×éÖ¯ÕýÔÚÍøÂçÓйØCOVID-19ÒßÃçºÍÖÎÁÆÇéÐεÄÇ鱨¡£¡£¡£¡£ ¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬2020ÄêÓÉÓÚCOVID-19µÄÉìÕÅ£¬£¬£¬£¬£¬£¬ÒÅÁôµÄÍøÂçÇå¾²ÎÊÌâÓëеÄÇå¾²ÌôÕ½Èںϣ¬£¬£¬£¬£¬£¬Ò½ÁÆÐÐÒµ×îÏÈÁËÖØ´óµÄת±ä¡£¡£¡£¡£ ¡£COVID-19ÆÈʹԤËãÖ÷ÒªµÄÒ½Ôº½â¾öÕâЩϵͳÐÔÎÊÌ⣬£¬£¬£¬£¬£¬Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬Î§ÈÆÒ½ÁÆÐ§À͵ÄÊý×Ö»¯¡¢Ô¶³ÌÒ½ÁƵÄÍÆ³öºÍµÖÓùÀÕË÷Èí¼þ¹¥»÷µÄÉÏÉý¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/ebooks/healthcare-security-woes-balloon-in-a-covid-era-world/


6.±öϦ·¨ÄáÑÇÖÝÌØÀ­»ªÏØÒÑÏòDoppelÖ§¸¶50ÍòÃÀÔªµÄÊê½ð


6.jpg


ÉÏÖÜÄ©£¬£¬£¬£¬£¬£¬±öϦ·¨ÄáÑÇÖÝÌØÀ­»ªÏصÄϵͳÔâµ½DoppelPaymerÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ÏÖÒÑÖ§¸¶500000ÃÀÔªµÄÊê½ð¡£¡£¡£¡£ ¡£ÌØÀ­»ªÏØÐû²¼¾¯±¨³Æ£¬£¬£¬£¬£¬£¬¹¥»÷µ¼Ö²¿·ÖϵͳÖÐÖ¹£¬£¬£¬£¬£¬£¬µ«¸ÃÏØµÄÑ¡¾Ù¾ÖºÍ½ôÆÈЧÀͲ¿·Ö²¢Ã»ÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£ ¡£ÍâµØÃ½Ì峯£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ï¿ÉÒÔ»á¼û°üÀ¨¾¯·½±¨¸æ¡¢ÈËΪ¡¢²É¹ººÍÆäËûÊý¾Ý¿âµÄϵͳ£¬£¬£¬£¬£¬£¬²¢Ë÷Òª50ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£ ¡£·Ñ³Ç6abcµç̨³Æ¸ÃÏØÒÑ×¼±¸Ö§¸¶Êê½ð£¬£¬£¬£¬£¬£¬ÓÉÓÚÆäÒѾ­Îª´ËÀ๥»÷Ͷ±£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/pennsylvania-county-pays-500k-ransom-to-doppelpaymer-ransomware/