AdobeÐû²¼´øÍâ¸üУ¬£¬ÐÞ¸´ColdfusionÖеÄ3¸öÎó²î£»£»Ð¹¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯

Ðû²¼Ê±¼ä 2019-09-26
1.AdobeÐû²¼´øÍâ¸üУ¬£¬ÐÞ¸´ColdfusionÖеÄ3¸öÎó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


AdobeÐû²¼´øÍâÇå¾²¸üУ¬£¬ÐÞ¸´ColdFusionÖеÄÈý¸öÎó²î£¬£¬ÆäÖÐÁ½¸öÎó²îΪcritical¼¶±ð£¬£¬ÁíÒ»¸öΪimportant¼¶±ð¡£¡£¡£¡£Á½¸öcriticalÎó²îÊÇÏÂÁî×¢ÈëÎó²î£¬£¬°üÀ¨¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÎó²î£¨CVE-2019-8073£©ºÍÔÊÐí¹¥»÷ÕßÈÆ¹ý»á¼û¿ØÖƵÄ·¾¶±éÀúÎó²î£¨CVE-2019-8074£©¡£¡£¡£¡£Ò»¸öimportantÎó²îÊÇÈÆ¹ýÎó²î£¨CVE-2019-8072£©£¬£¬¸ÃÎó²î¿Éµ¼ÖÂÐÅϢй¶¡£¡£¡£¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨ColdFusion 2018 Update 4¼°¸üÔç°æ±¾ºÍColdFusion 2016 Update 11¼°¸üÔç°æ±¾£¬£¬½¨ÒéÓû§¸üÐÂÖÁColdFusion 2018 Update 5ºÍColdFusion 2016 Update 12¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerabilities-in-coldfusion/

2.Ô¼»áÓ¦ÓÃHeyyoÒâÍâй¶½ü7.2ÍòÓû§ÐÅÏ¢

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

ÔÚÏßÔ¼»áÓ¦ÓÃHeyyoµÄElasticsearchʵÀýÒòδÉèÃÜÂë¶øÔÚ»¥ÁªÍøÉÏ̻¶£¬£¬µ¼Ö½ü7.2ÍòÓû§µÄÏêϸÒþ˽ÐÅϢй¶¡£¡£¡£¡£¸ÃÊÂÎñÊÇÓÉWizCaseÇå¾²Ñо¿Ö°Ô±·¢Ã÷µÄ£¬£¬Æ¾Ö¤ZDNetµÄ±¨µÀ£¬£¬¸ÃЧÀÍÆ÷ÊÇÒ»¸öÉú²úЧÀÍÆ÷£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ð¡¢Éí¸ß¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬ¡¢Î»ÖÃÐÅÏ¢¡¢Ô¼»áÆ«ºÃµÈ¡£¡£¡£¡£¸ÃÓ¦ÓÃËùÊôµÄÒÁ˹̹²¼¶ûÈí¼þ¹«Ë¾ÔÚ½üÒ»¸öÐÇÆÚÄÚδÄܻظ´ZDNetµÄѯÎÊ£¬£¬Ð¹Â¶µÄЧÀÍÆ÷ÔÚZDNetת´ïÍÁ¶úÆäCERTºó»ñµÃ±£»£»¤¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/heyyo-dating-app-leaked-users-personal-data-photos-location-data-more/

3.й¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

ƾ֤Palo Alto NetworksµÄ±¨¸æ£¬£¬Ò»¸öÐµĹ¥»÷»î¶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØµÄÔËÊäºÍº½ÔË×éÖ¯¡£¡£¡£¡£xHuntÖ÷ÒªÔÚ2019Äê5ÔÂÖÁ6ÔÂÖ®¼ä¾ÙÐУ¬£¬Ñо¿Ö°Ô±½«¸Ã¹¥»÷»î¶¯ÖÐʹÓõŤ¾ßÓë2018Äê7ÔÂÖÁ12ÔÂÖ®¼äÕë¶Ô¿ÆÍþÌØµÄ¹¥»÷¹ØÁªÆðÀ´¡£¡£¡£¡£×÷Ϊй¥»÷µÄÒ»²¿·Ö£¬£¬¹¥»÷ÕßʹÓÃÁËSakabota¡¢Histoka¡¢NeteroºÍKilluaµÈºóÃÅ£¬£¬ÕâЩºóÃÅͨ¹ýHTTPÓëC&CͨѶ£¬£¬²¿·Ö±äÌåҲʹÓÃDNSËíµÀ»òµç×ÓÓʼþ¾ÙÐÐͨѶ¡£¡£¡£¡£¹¥»÷ÕßÒ²ÔÚÊÜѬȾµÄϵͳÉÏÊÍ·ÅÁ˶ñÒ⹤¾ßGonºÍEYE¡£¡£¡£¡£Ö»¹Ü2018ÄêºÍ2019ÄêµÄ¹¥»÷»î¶¯ÖÐʹÓõŤ¾ß±£´æÖصþ£¬£¬µ«ÏÖÔÚÉв»¿ÉÈ·¶¨ÕâÁ½¸ö»î¶¯ÊÇ·ñÓÉͳһ¹¥»÷ÕßÌᳫ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/xhunt-campaign-targets-kuwait-transportation-and-shipping-sector

4.Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

¿¨°Í˹»ùÑо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß¡£¡£¡£¡£YatronÖ÷Òª»ùÓÚ¿ªÔ´ÀÕË÷Èí¼þHidden Tear¾ÙÐпª·¢£¬£¬Æ¾Ö¤¿¨°Í˹»ùµÄͳ¼ÆÊý¾Ý£¬£¬¸ÃÀÕË÷Èí¼þÔÚÒÑÍùÒ»ÄêÖÐÊÔͼÌᳫ600¶à´ÎѬȾ£¬£¬ÆäÖдó´ó¶¼¹¥»÷λÓڵ¹ú¡¢Öйú¡¢¶íÂÞ˹¡¢Ó¡¶ÈºÍÃåµé¡£¡£¡£¡£FortuneCryptµÄÖ÷ÒªÌØµãÊÇʹÓÃBlitzMax±àÒëÆ÷¾ÙÐбàÒ룬£¬ÕâÊÇ¿¨°Í˹»ùÊӲ쵽µÄÊ׸öʹÓÃBlitz BASIC±àдµÄÀÕË÷Èí¼þ¡£¡£¡£¡£È¥Ä꿨°Í˹»ù¹²¼Í¼ÁËTrojan-Ransom.Win32.Crypren¼Ò×åµÄ6000¶à´Î¹¥»÷£¬£¬Êܹ¥»÷Êý×î¶àµÄ¹ú¼ÒÊǶíÂÞ˹¡¢°ÍÎ÷¡¢µÂ¹ú¡¢º«¹úºÍÒÁÀÊ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securelist.com/ransomware-two-pieces-of-good-news/93355/

5.·¸·¨ÍÅ»ïTortoiseshellʹÓÃÐéÎ±ÍøÕ¾Ãé×¼ÃÀ¹úÍËÎéÎäÊ¿

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

˼¿ÆTalos·¢Ã÷ÓÉÒÁÀÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯TortoiseshellÕýÊÔͼʹÓÃÐéαÕÐÆ¸ÍøÕ¾Õë¶ÔÃÀ¹úÍËÎéÎäÊ¿¡£¡£¡£¡£¸ÃÍøÕ¾µÄÓòÃûÊÇhiremilitaryheroes[.]com£¬£¬ÉÏÃæÌṩһ¸ö×ÀÃæ°æÈí¼þµÄÏÂÔØ£¬£¬µ«¸ÃÈí¼þ»áÏÔʾװÖÃʧ°ÜÐÅÏ¢²¢ÏÖʵÉÏ×°ÖöñÒâÈí¼þ¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬¶ñÒâÈí¼þ»áÔÚºǫ́ÔËÐÐÍøÂçÓû§µÄÐÅÏ¢£¬£¬È»ºó·¢Ë͵½¹¥»÷ÕßµÄGmailÓÊÏä¡£¡£¡£¡£ÍøÂçµÄÐÅÏ¢°üÀ¨ÏµÍ³²¹¶¡¼¶±ð¡¢´¦Öóͷ£Æ÷ÊýÄ¿¡¢ÍøÂçÉèÖá¢Ó²¼þºÍ¹Ì¼þ°æ±¾¡¢Óò¿ØÖÆÆ÷¡¢ÖÎÀíÔ±Ãû³Æ¡¢ÕË»§ÁÐ±í¡¢ÈÕÆÚ¡¢Ê±¼ä¡¢Çý¶¯³ÌÐòµÈ¡£¡£¡£¡£±ðµÄ£¬£¬¶ñÒâÈí¼þ»¹»áÔÚÊܺ¦ÕßµÄϵͳÉÏ×°ÖÃÔ¶¿ØÄ¾Âí¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-military-veterans-targeted-by-iranian-state-hackers/

6.·¸·¨ÍÅ»ïMagecartÃé×¼¹«¹²Wi-Fi±³ºóµÄÉÌÓ÷ÓÉÆ÷

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

Magecart Group 5±»·¢Ã÷ÕýÔÚÃé×¼±¸×¢ÈëÉÌÓ÷ÓÉÆ÷ÖеĶñÒâ´úÂë¾ÙÐвâÊÔ¡£¡£¡£¡£¸Ã´úÂëÕë¶ÔµÄ·ÓÉÆ÷Ö÷ÒªÓÃÓÚÔÚ¹«¹²³¡ºÏºÍÂùÝÖÐÌṩÃâ·Ñ»ò¸¶·ÑµÄWi-FiЧÀÍ£¬£¬ÈôÊÇÀֳɣ¬£¬¹¥»÷Õß½«Äܹ»Ñ¬È¾ÕâЩ·ÓÉÆ÷²¢ÔÚ»ú³¡¡¢¿§·Èµê¡¢Âùݵȹ«¹²ÉèÊ©ÖÐÇÔÈ¡ÆäWi-FiÓû§µÄÖ§¸¶Êý¾Ý¡£¡£¡£¡£ÕâЩ´úÂë±»×¢Èëµ½Á¼ÐÔµÄJavaScriptÎļþÖУ¬£¬È»ºó¼ÓÔØµ½Ö§³ÖL7ЭÒéµÄÉÌÓ÷ÓÉÆ÷¡£¡£¡£¡£L7ЭÒéÖ¸µÄÊÇOSIµÄÓ¦ÓòãЭÒ飬£¬³£ÓÃÓÚÉÌÓ÷ÓÉÆ÷ÒÔ¾ÙÐÐÁ÷Á¿¸ºÔØÆ½ºâºÍÔÚÓû§ÅþÁ¬µ½Wi-FiЧÀÍʱÏÔÊ¾Ò³Ãæ»ò¹ã¸æ¡£¡£¡£¡£ÏÖÔÚÑо¿Ö°Ô±ÉÐδ·¢Ã÷ÏÖʵµÄ¹¥»÷°¸Àý¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/magecart-group-targets-routers-behind-public-wi-fi-networks/148662/