AdobeÇå¾²¸üР£¬£¬£¬£¬£¬£¬ £¬ÐÞ¸´MagentoºÍConnectÖжà¸öÎó²î£»£»£» £»LockBit³ÆÒÑÇÔÈ¡°£É­ÕÜ6TBµÄÊý¾Ý²¢ÀÕË÷5000ÍòÃÀÔª

Ðû²¼Ê±¼ä 2021-08-12

1.AdobeÇå¾²¸üР£¬£¬£¬£¬£¬£¬ £¬ÐÞ¸´MagentoºÍConnectÖжà¸öÎó²î


1.jpg


AdobeÐû²¼ÁËÖܶþÇå¾²¸üР£¬£¬£¬£¬£¬£¬ £¬ÐÞ¸´Æäµç×ÓÉÌÎñƽ̨MagentoºÍConnectÖеÄ29¸öÎó²î¡£¡£¡£¡£ ¡£¡£ÆäÖÐMagentoÖÐÐÞ¸´ÁË26¸öÎó²î £¬£¬£¬£¬£¬£¬ £¬½ÏΪÑÏÖØµÄÊÇÓÉÓÚÊäÈëÑéÖ¤²»µ±µ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36021¡¢CVE-2021-36024ºÍCVE-2021-36025µÈ£©ºÍÏÂÁî×¢Èëµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36022ºÍCVE-2021-36023£©µÈÎó²î¡£¡£¡£¡£ ¡£¡£Adobe ConnectÖÐÐÞ¸´ÁË3¸öÎó²î £¬£¬£¬£¬£¬£¬ £¬°üÀ¨Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2021-36061£©ºÍ·´ÉäÐÍXSSÎó²î£¨CVE-2021-36062ºÍCVE-2021-36063£©¡£¡£¡£¡£ ¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-preauth-vulnerabilities-in-magento/


2.CiscoÅû¶Mozilla FirefoxÖдúÂëÖ´ÐÐÎó²îµÄϸ½Ú


2.jpg


Cisco TalosÅû¶ÁËMozilla FirefoxÖдúÂëÖ´ÐÐÎó²îµÄϸ½Ú¡£¡£¡£¡£ ¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-29985 £¬£¬£¬£¬£¬£¬ £¬±£´æÓÚFirefoxµÄnsBufferedStream×é¼þÖУ¨Stream»º³å¹¦Ð§µÄÒ»²¿·Ö£©¡£¡£¡£¡£ ¡£¡£¹¥»÷Õß¿ÉÒÔÓÕʹÓû§»á¼ûÌØÖÆµÄ¶ñÒâÍøÒ³À´´¥·¢¸ÃÎó²î £¬£¬£¬£¬£¬£¬ £¬À´µ¼ÖÂÔÓÂÒÇéÐΣ¨race condition£© £¬£¬£¬£¬£¬£¬ £¬´Ó¶øµ¼ÖÂÊͷźóʹÓúÍÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±³ÆFirefox°æ±¾89.0.3 x64±£´æ¸ÃÎó²î £¬£¬£¬£¬£¬£¬ £¬½¨ÒéÁ¬Ã¦¸üС£¡£¡£¡£ ¡£¡£ 

  

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/08/vuln-spotlight-firefox-code.html


3.LockBit³ÆÒÑÇÔÈ¡°£É­ÕÜ6TBµÄÊý¾Ý²¢ÀÕË÷5000ÍòÃÀÔª


3.jpg


ÀÕË÷ÍÅ»ïLockBit 2.0Éù³ÆÒÑÇÔÈ¡°£É­Õܹ«Ë¾Áè¼Ý6TBµÄÊý¾Ý £¬£¬£¬£¬£¬£¬ £¬²¢ÀÕË÷5000ÍòÃÀÔª¡£¡£¡£¡£ ¡£¡£°£É­ÕÜÊÇÈ«Çò×ÅÃûµÄIT×Éѯ¹«Ë¾ £¬£¬£¬£¬£¬£¬ £¬ÊÐÖµ443ÒÚÃÀÔª £¬£¬£¬£¬£¬£¬ £¬Ð§ÀÍÓÚÆû³µ¡¢ÒøÐС¢Õþ¸®¡¢ÊÖÒÕ¡¢ÄÜÔ´¡¢µçÐŵÈÖÚ¶àÐÐÒµ¡£¡£¡£¡£ ¡£¡£¸ÃÍÅ»ï³ÆÒÑͨ¹ý¹«Ë¾µÄ¡°ÄÚ²¿Ö°Ô±¡±»á¼û°£É­ÕܵÄÍøÂç £¬£¬£¬£¬£¬£¬ £¬²¢ÌåÏÖÈôÊÇûÓÐÖ§¸¶Êê½ðËûÃǽ«ÔÚ8ÔÂ11ÈÕÍíÉÏÐû²¼Êý¾Ý £¬£¬£¬£¬£¬£¬ £¬µ«11ÈÕÍíÉÏʺó¸ÃÍŻォй¶ʱ¼äÍÆ³Ùµ½ÁË8ÔÂ12ÈÕ20:43:00¡£¡£¡£¡£ ¡£¡£ÍþвÇ鱨¹«Ë¾Hudson RockÌåÏÖ°£É­ÕÜÓÐ2500̨Ա¹¤ºÍÏàÖúͬ°éµÄµçÄÔÒÑÔâµ½ÈëÇÖ¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121048/data-breach/accenture-lockbit-2-0-ransomware-attack.html


4.ÓÎÏ·¹«Ë¾CrytekÈÏ¿ÉÆäÔøÔâÀÕË÷Èí¼þEgregorµÄ¹¥»÷


4.jpg


ÓÎÏ·¿ª·¢É̺Ϳ¯ÐÐÉÌCrytekÈÏ¿ÉÆäÔøÓÚ2020Äê10ÔÂÔâµ½ÀÕË÷Èí¼þEgregorµÄ¹¥»÷¡£¡£¡£¡£ ¡£¡£EgregorÔø¹¥»÷¹ýÈ«ÇòÖÚ¶à×éÖ¯ £¬£¬£¬£¬£¬£¬ £¬Èçθ绪µÄTransLinkµØÌúϵͳºÍKmartµÈ £¬£¬£¬£¬£¬£¬ £¬ÆäÖ÷Òª³ÉÔ±ÓÚ2021Äê2ÔÂÔÚ·¨¹úºÍÎÚ¿ËÀ¼Ö´·¨²¿·ÖÁªºÏÐж¯Öб»²¶¡£¡£¡£¡£ ¡£¡£Crytek³Æ´Ë´Î¹¥»÷й¶Á˿ͻ§Ð¡ÎÒ˽¼ÒÐÅÏ¢ £¬£¬£¬£¬£¬£¬ £¬ÐÕÃû¡¢Ö°Îñ¡¢¹«Ë¾Ãû³Æ¡¢µç×ÓÓʼþ¡¢¹«Ë¾µØµã¡¢µç»°ºÅÂëºÍµØÇøµÈ¡£¡£¡£¡£ ¡£¡£¶øEgregor֮ǰÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾¹ûÕæµÄÊý¾Ý°üÀ¨ÓëWarFaceÏà¹ØµÄÎļþ¡¢MOBAÓÎÏ·ÔËÆø¾º¼¼³¡ºÍÓÐ¹ØÆäÍøÂçÔËÐÐÐÅÏ¢µÄÎļþ¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/crytek-confirms-egregor-ransomware-attack-customer-data-theft/


5.FireEye·¢Ã÷UNC215Õë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯


FireEye·¢Ã÷UNC215Õë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯.png


FireEye·¢Ã÷ÌØ¹¤×éÖ¯UNC215½üÆÚÕë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯¡£¡£¡£¡£ ¡£¡£MandiantÔÚ2019ÄêÍ··¢Ã÷UNC215Õë¶ÔÖж«µÄ¹¥»÷»î¶¯ £¬£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßʹÓÃSharePointÖÐÎó²îCVE-2019-0604ÔÚÖж«ºÍÖÐÑǵÄÄ¿µÄ×°±¸ÉÏ×°ÖÃweb shellºÍFOCUSFJORD payload¡£¡£¡£¡£ ¡£¡£³ýÁËÒ£²âÊý¾Ý £¬£¬£¬£¬£¬£¬ £¬Ñо¿Ö°Ô±»¹ÓëÒÔÉ«Áйú·À»ú¹¹ÏàÖú £¬£¬£¬£¬£¬£¬ £¬·¢Ã÷×Ô2019Äê1ÔÂ×îÏȵÄÕë¶ÔÒÔÉ«ÁÐÕþ¸®»ú¹¹¡¢IT¹©Ó¦É̺͵çÐŹ«Ë¾µÄ¶à¸ö²¢Ðл £¬£¬£¬£¬£¬£¬ £¬Ê±´úUNC215 ʹÓÃеÄTTPÀ´Èƹý¼ì²â¡¢Òþ²Ø¹¥»÷»î¶¯²¢Ê¹ÓÿÉÐŹØÏµºáÏòÒÆ¶¯¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2021/08/unc215-chinese-espionage-campaign-in-israel.html


6.Unit 42Ðû²¼ÀÕË÷Èí¼þeCh0raixбäÖֵįÊÎö±¨¸æ


6.jpg


Unit 42Ðû²¼ÁËÓйØÀÕË÷Èí¼þeCh0raixбäÖֵįÊÎö±¨¸æ¡£¡£¡£¡£ ¡£¡£±¨¸æÖ¸³ö £¬£¬£¬£¬£¬£¬ £¬¸Ã±äÖÖʹÓÃÁËÎó²îCVE-2021-28799 £¬£¬£¬£¬£¬£¬ £¬Ö÷ÒªÕë¶ÔSynologyÍøÂ總¼Ó´æ´¢(NAS)ºÍQuality Network Appliance Provider (QNAP)NAS×°±¸ £¬£¬£¬£¬£¬£¬ £¬ÒѾ­ÔÚÒ°Íâ»îÔ¾Á˽üÒ»Äê¡£¡£¡£¡£ ¡£¡£¸Ã±¨¸æ½¨ÒéÓû§¸üÐÂ×°±¸¹Ì¼þÒÔ±ÜÃâ´ËÀ๥»÷¡¢½¨ÉèÖØ´óµÄµÇ¼ÃÜÂëÒÔ±ÜÃⱩÁ¦ÆÆ½â £¬£¬£¬£¬£¬£¬ £¬ÒÔ¼°½öͨ¹ýÒÑʶ±ðIPµÄÓ²±àÂëÁбíÏÞÖÆÓëSOHO×°±¸µÄÅþÁ¬¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/ech0raix-ransomware-soho/