AdobeÐû²¼Çå¾²¸üÐÂÐÞ¸´¶à¿îÎó²î: ¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐÔâµ½¹¥»÷
Ðû²¼Ê±¼ä 2021-10-14¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷
ÉÏÖÜÄ©£¬£¬£¬£¬£¬¶ò¹Ï¶à¶û×î´óµÄ˽ÈËÒøÐÐBanco PichinchaÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬ÏµÍ³ÔÝʱ¹Ø±Õ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂÒøÐеÄÓªÒµ´óÃæ»ýÖÐÖ¹£¬£¬£¬£¬£¬°üÀ¨ATM¡¢ÍøÉÏÒøÐС¢Ó¦ÓóÌÐò¡¢µç×ÓÓʼþϵͳºÍ×ÔÖúЧÀÍ¡£¡£¡£¡£¡£¡£¸ÃÒøÐÐÔÚЧÀÍÖÐÖ¹µÄÁ½ÌìºóÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ«²¢Î´¹ûÕæ´Ë´Î¹¥»÷µÄÐÔ×Ó¡£¡£¡£¡£¡£¡£¾ÝÑо¿Ö°Ô±³ÆÕâÊÇÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÒøÐеÄϵͳÖÐ×°ÖÃÁËCobalt Strike beacon¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cyberattack-shuts-down-ecuadors-largest-bank-banco-pichincha/02
Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÙÔâ¹¥»÷£¬£¬£¬£¬£¬ÃÀÖÞÓªÒµÊܵ½Ó°Ïì
ÈÕ±¾Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÚ10ÔÂ10ÈÕÔâµ½¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÃÀÖÞ£¨ÃÀ¹ú¡¢¼ÓÄôóºÍÀ¶¡ÃÀÖÞ£©µÄϵͳЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³ÆÆäÔÚ¼ì²âµ½¿ÉÒɻºó£¬£¬£¬£¬£¬Á¬Ã¦½ÓÄÉÁËÏìÓ¦²½·¥£¬£¬£¬£¬£¬¹Ø±ÕÊÜÓ°ÏìµÄϵͳºó½«¸ÃÊÂÎñ×èÖ¹ÁËÔÚÃÀÖÞ¡£¡£¡£¡£¡£¡£¹«Ë¾½²»°È˳ÆÃ»ÓÐÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬£¬²¢ÔÊÐí½«¾¡¿ìÐû²¼ÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£OlympusÔøÔÚ9ÔÂ8ÈÕÔâµ½ÁËBlackMatterµÄÀÕË÷¹¥»÷£¬£¬£¬£¬£¬ÆäʱµÄ¹¥»÷Ó°ÏìÁËÆäEMEA£¨Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ£©ITϵͳ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/123263/security/olympus-us-cyberattack.html
AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ10¸öÎó²î
AdobeÔÚ10ÔÂ13ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÆäAcrobat¡¢Reader¡¢Connect¡¢CommerceºÍCampaign StandardÖеÄ10¸öÎó²î¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÊÇConnectÖеķ´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐУ¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËAcrobatºÍReaderÖеĴúÂëÖ´ÐÐÎó²îCVE-2021-40728ºÍCVE-2021-40731¡¢ÌáȨÎó²îCVE-2021-40729ºÍCVE-2021-40720£¬£¬£¬£¬£¬ÒÔ¼° Adobe ops-cliÖеķ´ÐòÁл¯Îó²îCVE-2021-40720µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/123269/security/adobe-critical-flaws.html
Ñо¿ÍŶӷ¢Ã÷FreakoutÕë¶ÔVisual Tools DVRµÄ»î¶¯
Juniper Threat LabsÔÚ10ÔÂ11ÈÕÅû¶Á˽©Ê¬ÍøÂçFreakout£¨ÓÖÃûNecro£©ÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2021Äê9ÔµÄ×îºóÒ»Öܼì²âµ½Á˴˴λ£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÆäÎäÆ÷¿âÖÐÌí¼ÓÁËÒ»¸öÐÂÎó²î£¬£¬£¬£¬£¬¸ÃÎó²îÖ÷ÒªÕë¶ÔVisual Tools DVR VX16 4.2.28.0£¬£¬£¬£¬£¬ÆäPoCÒÑÔÚ7ÔÂ6ÈÕ¹ûÕæ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÐµÄÑù±¾É¾³ýÁË֮ǰµÄ¹¥»÷ÖÐʹÓõÄSMBɨÃè³ÌÐò£¬£¬£¬£¬£¬²¢½«¾ç±¾×¢ÈëURL´Ó֮ǰµÄÓ²±àÂë¸ü¸ÄΪÁËDGA URL¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blogs.juniper.net/en-us/threat-research/necro-python-botnet-goes-after-vulnerable-visualtools-dvr
NCC Group·¢Ã÷ÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷»î¶¯
10ÔÂ11ÈÕ£¬£¬£¬£¬£¬NCC Group·¢Ã÷ÁËÒ»¸ö½öÇÔÈ¡Êý¾Ý¶ø²»¼ÓÃÜÎļþµÄÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMC¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖSnapMCÕâ¸öÃû×ÖȪԴÓÚ¹¥»÷Õß¿ìËٵĹ¥»÷·½·¨£¬£¬£¬£¬£¬Ëü¿ÉÒÔÔÚ30·ÖÖÓÄÚÈëÇÖÍøÂç¡¢ÇÔÈ¡Îļþ²¢·¢ËÍÀÕË÷Óʼþ¡£¡£¡£¡£¡£¡£SnapMCʹÓÃÎó²îɨÃèÆ÷AcunetixÀ´ËÑË÷Ä¿µÄVPNºÍWebÖеÄÎó²î£¬£¬£¬£¬£¬°üÀ¨PrintNightmareÎó²î¡¢ASPX.NETµÄTelerik UIÖеÄÔ¶³Ì´úÂëÎó²îÒÔ¼°ÖÖÖÖSQL×¢ÈëÎó²îµÈ¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£Ë¼Á¿µ½SnapMCʹÓõľùÊÇÒÑÐÞ¸´µÄÎó²î£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½¨ÒéÓû§ÊµÊ±×°Öò¹¶¡¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/snapmc-hackers-skip-file-encryption-and-just-steal-your-files/IDCÐû²¼2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡¸ú×Ù±¨¸æ
IDCÔÚ10ÔÂ12ÈÕÐû²¼ÁË2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡¸ú×Ù±¨¸æ¡£¡£¡£¡£¡£¡£IDC½ç˵µÄÍøÂçÇ徲ЧÀÍÊг¡»®·ÖÓÉÇå¾²×ÉѯЧÀÍ¡¢ITÇå¾²½ÌÓýÓëÅàѵЧÀÍ¡¢ÍйÜÇ徲ЧÀͺÍÇå¾²¼¯³ÉЧÀÍËĸö×ÓÊг¡×é³É¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡³§ÉÌÕûÌåÊÕÈëԼΪ11.1ÒÚÃÀÔª£¨Ô¼ºÏ71.5ÒÚÔªÈËÃñ±Ò£©£¬£¬£¬£¬£¬³§ÉÌÊÕÈë¹æÄ£½ÏÈ¥ÄêͬÆÚʵÏÖ·±¶ÔöÌí£¬£¬£¬£¬£¬ÕÇ·ù¸ß´ï110%£¬£¬£¬£¬£¬½Ï2019Äêͬ±ÈÔöÌí38%£¬£¬£¬£¬£¬ÖйúITÇ徲ЧÀÍÊг¡Õýʽ½øÈëÐèÇ´ÔðÃæ±¬·¢ÆÚ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.idc.com/getdoc.prCHE48302321