AdobeÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´MagentoºÍConnectÖжà¸öÎó²î£»£»£»£»LockBit³ÆÒÑÇÔÈ¡°£ÉÕÜ6TBµÄÊý¾Ý²¢ÀÕË÷5000ÍòÃÀÔª
Ðû²¼Ê±¼ä 2021-08-121.AdobeÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´MagentoºÍConnectÖжà¸öÎó²î
AdobeÐû²¼ÁËÖܶþÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Æäµç×ÓÉÌÎñƽ̨MagentoºÍConnectÖеÄ29¸öÎó²î¡£¡£¡£¡£¡£¡£ÆäÖÐMagentoÖÐÐÞ¸´ÁË26¸öÎó²î£¬£¬£¬£¬£¬£¬£¬½ÏΪÑÏÖØµÄÊÇÓÉÓÚÊäÈëÑéÖ¤²»µ±µ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36021¡¢CVE-2021-36024ºÍCVE-2021-36025µÈ£©ºÍÏÂÁî×¢Èëµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36022ºÍCVE-2021-36023£©µÈÎó²î¡£¡£¡£¡£¡£¡£Adobe ConnectÖÐÐÞ¸´ÁË3¸öÎó²î£¬£¬£¬£¬£¬£¬£¬°üÀ¨Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2021-36061£©ºÍ·´ÉäÐÍXSSÎó²î£¨CVE-2021-36062ºÍCVE-2021-36063£©¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-preauth-vulnerabilities-in-magento/
2.CiscoÅû¶Mozilla FirefoxÖдúÂëÖ´ÐÐÎó²îµÄϸ½Ú
Cisco TalosÅû¶ÁËMozilla FirefoxÖдúÂëÖ´ÐÐÎó²îµÄϸ½Ú¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-29985£¬£¬£¬£¬£¬£¬£¬±£´æÓÚFirefoxµÄnsBufferedStream×é¼þÖУ¨Stream»º³å¹¦Ð§µÄÒ»²¿·Ö£©¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔÓÕʹÓû§»á¼ûÌØÖÆµÄ¶ñÒâÍøÒ³À´´¥·¢¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬À´µ¼ÖÂÔÓÂÒÇéÐΣ¨race condition£©£¬£¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÊͷźóʹÓúÍÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆFirefox°æ±¾89.0.3 x64±£´æ¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬½¨ÒéÁ¬Ã¦¸üС£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2021/08/vuln-spotlight-firefox-code.html
3.LockBit³ÆÒÑÇÔÈ¡°£ÉÕÜ6TBµÄÊý¾Ý²¢ÀÕË÷5000ÍòÃÀÔª
ÀÕË÷ÍÅ»ïLockBit 2.0Éù³ÆÒÑÇÔÈ¡°£ÉÕܹ«Ë¾Áè¼Ý6TBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÀÕË÷5000ÍòÃÀÔª¡£¡£¡£¡£¡£¡£°£ÉÕÜÊÇÈ«Çò×ÅÃûµÄIT×Éѯ¹«Ë¾£¬£¬£¬£¬£¬£¬£¬ÊÐÖµ443ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬Ð§ÀÍÓÚÆû³µ¡¢ÒøÐС¢Õþ¸®¡¢ÊÖÒÕ¡¢ÄÜÔ´¡¢µçÐŵÈÖÚ¶àÐÐÒµ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï³ÆÒÑͨ¹ý¹«Ë¾µÄ¡°ÄÚ²¿Ö°Ô±¡±»á¼û°£ÉÕܵÄÍøÂ磬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÈôÊÇûÓÐÖ§¸¶Êê½ðËûÃǽ«ÔÚ8ÔÂ11ÈÕÍíÉÏÐû²¼Êý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«11ÈÕÍíÉÏʺó¸ÃÍŻォй¶ʱ¼äÍÆ³Ùµ½ÁË8ÔÂ12ÈÕ20:43:00¡£¡£¡£¡£¡£¡£ÍþвÇ鱨¹«Ë¾Hudson RockÌåÏÖ°£ÉÕÜÓÐ2500̨Ա¹¤ºÍÏàÖúͬ°éµÄµçÄÔÒÑÔâµ½ÈëÇÖ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/121048/data-breach/accenture-lockbit-2-0-ransomware-attack.html
4.ÓÎÏ·¹«Ë¾CrytekÈÏ¿ÉÆäÔøÔâÀÕË÷Èí¼þEgregorµÄ¹¥»÷
ÓÎÏ·¿ª·¢É̺Ϳ¯ÐÐÉÌCrytekÈÏ¿ÉÆäÔøÓÚ2020Äê10ÔÂÔâµ½ÀÕË÷Èí¼þEgregorµÄ¹¥»÷¡£¡£¡£¡£¡£¡£EgregorÔø¹¥»÷¹ýÈ«ÇòÖÚ¶à×éÖ¯£¬£¬£¬£¬£¬£¬£¬Èçθ绪µÄTransLinkµØÌúϵͳºÍKmartµÈ£¬£¬£¬£¬£¬£¬£¬ÆäÖ÷Òª³ÉÔ±ÓÚ2021Äê2ÔÂÔÚ·¨¹úºÍÎÚ¿ËÀ¼Ö´·¨²¿·ÖÁªºÏÐж¯Öб»²¶¡£¡£¡£¡£¡£¡£Crytek³Æ´Ë´Î¹¥»÷й¶Á˿ͻ§Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÐÕÃû¡¢Ö°Îñ¡¢¹«Ë¾Ãû³Æ¡¢µç×ÓÓʼþ¡¢¹«Ë¾µØµã¡¢µç»°ºÅÂëºÍµØÇøµÈ¡£¡£¡£¡£¡£¡£¶øEgregor֮ǰÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾¹ûÕæµÄÊý¾Ý°üÀ¨ÓëWarFaceÏà¹ØµÄÎļþ¡¢MOBAÓÎÏ·ÔËÆø¾º¼¼³¡ºÍÓÐ¹ØÆäÍøÂçÔËÐÐÐÅÏ¢µÄÎļþ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/crytek-confirms-egregor-ransomware-attack-customer-data-theft/
5.FireEye·¢Ã÷UNC215Õë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯
FireEye·¢Ã÷ÌØ¹¤×éÖ¯UNC215½üÆÚÕë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£MandiantÔÚ2019ÄêÍ··¢Ã÷UNC215Õë¶ÔÖж«µÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃSharePointÖÐÎó²îCVE-2019-0604ÔÚÖж«ºÍÖÐÑǵÄÄ¿µÄ×°±¸ÉÏ×°ÖÃweb shellºÍFOCUSFJORD payload¡£¡£¡£¡£¡£¡£³ýÁËÒ£²âÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÓëÒÔÉ«Áйú·À»ú¹¹ÏàÖú£¬£¬£¬£¬£¬£¬£¬·¢Ã÷×Ô2019Äê1ÔÂ×îÏȵÄÕë¶ÔÒÔÉ«ÁÐÕþ¸®»ú¹¹¡¢IT¹©Ó¦É̺͵çÐŹ«Ë¾µÄ¶à¸ö²¢Ðл£¬£¬£¬£¬£¬£¬£¬Ê±´úUNC215 ʹÓÃеÄTTPÀ´Èƹý¼ì²â¡¢Òþ²Ø¹¥»÷»î¶¯²¢Ê¹ÓÿÉÐŹØÏµºáÏòÒÆ¶¯¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2021/08/unc215-chinese-espionage-campaign-in-israel.html
6.Unit 42Ðû²¼ÀÕË÷Èí¼þeCh0raixбäÖֵįÊÎö±¨¸æ
Unit 42Ðû²¼ÁËÓйØÀÕË÷Èí¼þeCh0raixбäÖֵįÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬¸Ã±äÖÖʹÓÃÁËÎó²îCVE-2021-28799£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔSynologyÍøÂ總¼Ó´æ´¢(NAS)ºÍQuality Network Appliance Provider (QNAP)NAS×°±¸£¬£¬£¬£¬£¬£¬£¬ÒѾÔÚÒ°Íâ»îÔ¾Á˽üÒ»Äê¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ½¨ÒéÓû§¸üÐÂ×°±¸¹Ì¼þÒÔ±ÜÃâ´ËÀ๥»÷¡¢½¨ÉèÖØ´óµÄµÇ¼ÃÜÂëÒÔ±ÜÃⱩÁ¦ÆÆ½â£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°½öͨ¹ýÒÑʶ±ðIPµÄÓ²±àÂëÁбíÏÞÖÆÓëSOHO×°±¸µÄÅþÁ¬¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/ech0raix-ransomware-soho/