Ñо¿Ö°Ô±·¢Ã÷¿ÉʹÓÃChrome Sync¹¦Ð§ÇÔÈ¡Óû§Êý¾Ý£»£»£»£»£»°ÍÎ÷ÄÜÔ´¹«Ë¾CopelºÍEletrobrasÔâµ½ÀÕË÷Èí¼þ¹¥»÷
Ðû²¼Ê±¼ä 2021-02-071.Ñо¿Ö°Ô±·¢Ã÷¿ÉʹÓÃChrome Sync¹¦Ð§ÇÔÈ¡Óû§Êý¾Ý
Çå¾²Ñо¿Ö°Ô±Bojan Zdrnja·¢Ã÷ºÚ¿Í¿ÉÀÄÓÃGoogle Chrome Sync¹¦Ð§À´ÇÔÈ¡Óû§Êý¾Ý¡£¡£¡£Chrome Sync¿ÉÔÚÓû§µÇ¼GoogleÕÊ»§ºó×Ô¶¯Í¬²½ÆäÊéÇ©¡¢ÀúÊ·¼Í¼¡¢ÃÜÂëºÍÆäËûÉèÖᣡ£¡£ZdrnjaÌåÏÖºÚ¿ÍʹÓÃαװΪForcepoint Endpoint Chrome WindowsÀ©Õ¹µÄ¶ñÒ⸽¼þÓëÔ¶³ÌÏÂÁîºÍ¿ØÖÆ£¨C£¦C£©Ð§ÀÍÆ÷¾ÙÐÐͨѶ£¬£¬£¬ÒÔ´ÓÄ¿µÄä¯ÀÀÆ÷ÇÔÈ¡Óû§Êý¾Ý¡£¡£¡£±ðµÄ£¬£¬£¬ÎªÁ˱ÜÃâ¸ÃÀ©Õ¹±»Googleɾ³ý£¬£¬£¬ºÚ¿ÍûÓÐʹÓÃChrome Web Store£¬£¬£¬¶øÊǽ«À©Õ¹·ÅÔÚÍâµØµÄÒ»¸öÎļþ¼ÐÖУ¬£¬£¬È»ºóÖ±½Ó´ÓChrome¾ÙÐÐ×°Öᣡ£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/malicious-chrome-extensions-steal-data-sync-feature/
2.΢ÈíÖÒÑÔʹÓÃOAuth Office 365µÄ´¹ÂÚ¹¥»÷»î¶¯Ôö¶à
΢ÈíÖÒÑÔ½ü¼¸¸öÔÂÒÔÀ´Ê¹ÓÃOAuth Office 365µÄ´¹ÂÚ¹¥»÷»î¶¯Ôö¶à¡£¡£¡£OAuthÍøÂç´¹ÂÚÊÇÒ»ÖÖ»ùÓÚÓ¦ÓóÌÐòµÄ¹¥»÷±äÌ壬£¬£¬¹¥»÷ÕßÓÕʹĿµÄµã»÷¶ñÒâOAuthÓ¦ÓÃÒÔÇÔÈ¡ÆäOffice 365ÕÊ»§Æ¾Ö¤¡£¡£¡£ÕâЩ¹¥»÷»î¶¯Îª2020Äê9ÔÂÖÁ12ÔÂÖ®¼äµÄÁ½ÂÖ¹¥»÷»î¶¯µÄÒ»²¿·Ö£¬£¬£¬ÆäÖÐ֮һð³äÁËÄ«Î÷¸çµÄ˰ÊÕÖÎÀíЧÀÍÀ´Õë¶ÔÎ÷°àÑÀÈË£¬£¬£¬ÁíÒ»ÂÖÕë¶ÔÁË×éÖ¯µÄͶ×ÊÍŶӡ£¡£¡£Îª´Ë£¬£¬£¬Î¢Èí½ÓÄÉÁËÖ´·¨Ðж¯£¬£¬£¬¹Ø±ÕÁËÍйܶñÒâÓ¦ÓóÌÐòµÄ6¸öÓòÃû£¬£¬£¬²¢½ûÓÃÁË·¢Ã÷µÄ¶ñÒâOAuthÓ¦Óᣡ£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-warns-of-increasing-oauth-office-365-phishing-attacks/
3.°ÍÎ÷ÄÜÔ´¹«Ë¾CopelºÍEletrobrasÔâµ½ÀÕË÷Èí¼þ¹¥»÷
°ÍÎ÷Á½¼ÒÖ÷ÒªµÄÄÜÔ´¹«Ë¾CopelºÍEletrobrasÓÚÉÏÖÜÔâµ½ÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¾ÍEletrobras¶øÑÔ£¬£¬£¬¹¥»÷±¬·¢ÔÚÆäEletronuclear×Ó¹«Ë¾£¬£¬£¬Ó°ÏìÁ˲¿·ÖЧÀÍÆ÷£¬£¬£¬¿ÉÊÇÆäºËµç³§Angra 1ºÍAngra 2µÄÔËӪûÓÐÊܵ½Ó°Ïì¡£¡£¡£CopelÔòÌåÏÖÆäѬȾÁËDarksideÀÕË÷Èí¼þ£¬£¬£¬ºÚ¿Í³ÆÆäÒÑÇÔÈ¡ÁËÁè¼Ý1000GBµÄÃô¸ÐÊý¾Ý£¬£¬£¬ÀýÈç´¿Îı¾ÃÜÂë¡¢±¸·Ý¼Æ»®¡¢Ê±¼ä±íÒÔ¼°¸ß²ãÖÎÀíÖ°Ô±ºÍ¿Í»§µÄСÎÒ˽¼ÒÏêϸÐÅÏ¢¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/eletrobras-copel-energy-companies-hit-by-ransomware-attacks/
4.Realtek Wi-FiÄ£¿£¿£¿é±£´æ¶à¸öÎó²î£¬£¬£¬¿É±»ÓÃÀ´¿ØÖÆ×°±¸
ÒÔÉ«ÁÐÎïÁªÍøÇå¾²¹«Ë¾VdooµÄÑо¿Ö°Ô±ÔÚRealtek RTL8195A Wi-FiÄ£¿£¿£¿éÖз¢Ã÷ÁË6¸öÎó²î£¬£¬£¬ÕâЩÎó²î¿ÉÄÜÒѱ»ÓÃÀ´»ñµÃrootȨÏÞ²¢¿ØÖÆ×°±¸µÄÎÞÏßͨѶ¡£¡£¡£ÆäÖÐ×îΪÑÏÖØµÄÊÇÔ¶³Ì¿ÍÕ»Òç³öÎó²î£¨CVE-2020-9395£©£¬£¬£¬¿É±»ÓÃÀ´½ÓÊÜ×°±¸¡£¡£¡£±ðµÄ£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷Á˾ܾøÐ§ÀÍÎó²îºÍ¶à¸ö¿ÉÖ´ÐÐí§Òâ´úÂëµÄÎó²î£¨CVE-2020-25853¡¢CVE-2020-25854¡¢CVE-2020-25855¡¢CVE-2020-25856ºÍCVE-2020-25857£©¡£¡£¡£ÏÖÔÚ£¬£¬£¬ RealtekÒÑÐû²¼Õë¶ÔÕâЩÎó²îµÄÇå¾²¸üС£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/114280/security/realtek-rtl8195a-flaws.html
5.Unit42Ðû²¼ÓйØCVE-2020-25213Îó²îµÄÆÊÎö±¨¸æ
Unit42Ðû²¼ÁËÓйØCVE-2020-25213Îó²îµÄÆÊÎö±¨¸æ¡£¡£¡£¸ÃÎó²îÔ´ÓÚWordPress File Manager²å¼þ¿É½«elFinder¿âµÄconnector.minimal.php.distÉϵÄÎļþÀ©Õ¹ÃûÖØÃüÃûΪ.php£¬£¬£¬²¢Ö±½ÓÖ´ÐС£¡£¡£ÓÉÓÚûÓлá¼ûÏÞÖÆ£¬£¬£¬Òò´ËÈκÎä¯ÀÀWebЧÀÍÆ÷µÄÈ˶¼¿ÉÒÔÖ´ÐÐÉÏ´«µÄÎļþ¡£¡£¡£¹¥»÷Õßͨ³£Ê¹ÓÃÕâ¸öÎó²îÉÏ´«webshell£¬£¬£¬ÒÔ×°ÖÃÓÃÓÚ¼ÓÃÜÐ®ÖÆ¹¥»÷µÄ¶ñÒâÈí¼þKinsing¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/cve-2020-25213/
6.ClarotyÐû²¼2020ϰëÄê¶ÈICSΣº¦ºÍÎó²îµÄ»ØÊ×±¨¸æ
ClarotyÐû²¼ÁË2020ϰëÄê¶ÈICSΣº¦ºÍÎó²îµÄ»ØÊ×±¨¸æ¡£¡£¡£¸Ã±¨¸æÍ³¼ÆÁËÀ´×Ô59¸öICS¹©Ó¦É̵Ä449¸öÎó²î£¨ÕûÄê¹²893¸ö£©£¬£¬£¬2018ÕûÄê¹²Åû¶ÁË672¸öÎó²î£¬£¬£¬¶ø2019ÄêΪ716¸ö¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ICSÅû¶ÐÅÏ¢±È2018Äêͬ±ÈÔöÌíÁ˽ü33£¥£¬£¬£¬Åû¶×î¶àµÄÐÐҵΪҪº¦µÄÖÆÔìÒµ¡¢ÄÜÔ´ÐÐÒµ¡¢Ë®ºÍ·ÏË®ÐÐÒµÒÔ¼°ÉÌÒµÉèÊ©¡£¡£¡£±ðµÄ£¬£¬£¬ËùÅû¶µÄICSÎó²îÖÐÓÐ72£¥¿É±»Ô¶³ÌʹÓ㬣¬£¬ÓÐ47£¥µÄÎó²îÓ°ÏìÁËLevels 1ºÍ2µÄPurdueÄ£×Ó£¬£¬£¬ÓÐ76£¥µÄÎó²î²»ÐèÒªÉí·ÝÑéÖ¤¼´¿É¾ÙÐÐʹÓᣡ£¡£
ÔÎÄÁ´½Ó£º
https://security.claroty.com/biannual-ics-risk-vulnerability-report-2H-2020