Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î£»£»£»£»£»£»Apodis PharmaÊý¾Ý¿âÉèÖùýʧй¶1.7TBÉñÃØÊý¾Ý

Ðû²¼Ê±¼ä 2020-12-02
1.Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î


1.jpg


Cisco TalosÅû¶WebKitä¯ÀÀÆ÷ÒýÇæ±£´æ¶à¸öÑÏÖØµÄÎó²î¡£¡£¡£¡£ÕâЩÎó²îÓëWebKitµÄWebSocket¡¢AudioSourceProviderGStreamerºÍImageDecoderGStreamer¹¦Ð§ÓйØ¡£¡£¡£¡£»®·ÖΪWebSocket´úÂëÖ´ÐÐÎó²î£¨CVE-2020-13543£©£¬£¬¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²îÀ´Ô¶³ÌÖ´ÐдúÂ룻£»£»£»£»£»ImageDecoderGStreamerÊͷźóʹÓÃÎó²î£¨CVE-2020-13584£©£¬£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬£¬ÒÔ¼°±»×·×ÙΪCVE-2020-13543µÄÎó²î¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/webkit-vulnerabilities-allow-remote-code-execution-malicious-websites


2.Ô½ÄÏ×éÖ¯BismuthÃé×¼·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾


2.jpg


΢Èí·¢Ã÷Ô½ÄϺڿÍ×éÖ¯BismuthÃé×¼·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬²¢ÒÔ´úºÅAPT32ºÍOceanLotusµÈΪÈËËùÖª¡£¡£¡£¡£ÆäÖ÷Òª¿ªÕ¹Õë¶Ôº£ÄÚÍâµÄÖØ´óºÚ¿Í»î¶¯£¬£¬Ä¿µÄÊÇÍøÂçÐÅÏ¢ÒÔ×ÊÖúÆäÕþ¸®´¦Öóͷ£ÕþÖΡ¢¾­¼ÃºÍÍâ½»Õþ²ß¾öÒé¡£¡£¡£¡£µ«Î¢Èí·¢Ã÷£¬£¬ÔÚ2020Äê7ÔÂÖÁ2020Äê8Ô£¬£¬¸Ã×éÖ¯ÔÚÕë¶Ô·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾µÄ¹¥»÷ÖÐ×îÏÈʹÓÃMoneroÍÚ¿óÈí¼þ£¬£¬ÏÖÔÚÉв»ÇåÎúÆäΪºÎ¾ÙÐд˸ü¸Ä¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-links-vietnamese-state-hackers-to-crypto-mining-malware-campaign/


3.Ñо¿ÍŶӷ¢Ã÷GotkitÓëREvilµÄÏàÖúͬ°é¹ØÏµÖØÉú


3.jpg


Ñо¿ÍŶӷ¢Ã÷£¬£¬ÔÚ³¤´ïÒ»ÄêµÄÐÝÏ¢ºó£¬£¬ÐÅÏ¢ÇÔȡľÂíGootkitÓëREvilÒ»ÆðÔÚÕë¶ÔµÂ¹úµÄÐÂÕ½ÕùÖÐÖØÉú¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬ºÚ¿Í¹¥»÷WordPressÍøÕ¾£¬£¬²¢Ê¹ÓÃSEO²¡¶¾Ïò»á¼ûÕßչʾαÔìµÄÂÛ̳Ìû×Ó£¬£¬²¢¸½ÓжñÒâ±í¸ñ»òÏÂÔØµÄÁ´½Ó¡£¡£¡£¡£µ±Óû§µã»÷Á´½Óʱ£¬£¬½«ÏÂÔØÒ»¸ö°üÀ¨»ìÏýµÄJSÎļþµÄZIPÎļþ£¬£¬¸ÃÎļþ½«×°ÖÃGootkit¶ñÒâÈí¼þ»òREvilÀÕË÷Èí¼þ¡£¡£¡£¡£±ðµÄ£¬£¬Ê¹ÓÃÁË»ìÏýµÄÓÐÓÃÔØºÉ¿É½«ÆäÆÊÎö³ÉƬ¶Ï´æ´¢ÔÚ×¢²á±íÖУ¬£¬Ê¹µÃÇå¾²Èí¼þ¸üÄѼì²âµ½¸Ã¶ñÒâ¸ºÔØ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/gootkit-malware-returns-to-life-alongside-revil-ransomware/


4.Ñо¿ÍŶӷ¢Ã÷¿Éͨ¹ýαÔìPayPal±íµ¥ÇÔÈ¡Óû§ÐÅÏ¢


4.jpg


Ñо¿ÍŶӷ¢Ã÷еÄÐÅÓÿ¨ÇÔÈ¡Æ÷¿Éͨ¹ýαÔìPayPal±íµ¥ÇÔÈ¡Óû§ÐÅÏ¢¡£¡£¡£¡£¸ÃÇÔÈ¡Æ÷ÊÇ»ùÓÚJavaScriptµÄ¾ç±¾£¬£¬ÓÃÓÚ×¢Èëµ½µçÉÌÆ½Ì¨µÄ½áÕÊÒ³ÃæÖС£¡£¡£¡£¸Ã¾ç±¾Í¨¹ýÒþдÊõ±»Òþ²ØÔÚ±»Íйܵ½ÊÜѬȾÊÐËÁµÄЧÀÍÆ÷ÉϵÄÓ³ÏñÖС£¡£¡£¡£È»ºó£¬£¬Ëü»áʹÓÃÖ®Ç°ÍøÂçµÄ¶©µ¥Êý¾ÝÀ´Ô¤ÌîαÔìµÄPayPalÖ§¸¶±íµ¥£¬£¬ÔÙ½«Êܺ¦ÕßÖØ¶¨Ïòµ½PayPalµÄ¶©µ¥Ò³Ãæ¡£¡£¡£¡£Ò»µ©Êܺ¦ÕßÊäÈëÁ˸¶¿îÐÅÏ¢²¢µã»÷ÁËÌá½»°´Å¥£¬£¬¸ÃÇÔÈ¡Æ÷»á½«ÆäËùÓÐÐÅÏ¢´«»Øµ½¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/credit-card-skimmer-fills-fake-paypal-forms-with-stolen-order-info/


5.ResearchAndMarketsÐû²¼Î´À´5ÄêSD-WANÊг¡Õ¹Íû±¨¸æ


5.jpg


ResearchAndMarketsÐû²¼ÁËδÀ´5ÄêSD-WANÊг¡Õ¹Íû±¨¸æ¡£¡£¡£¡£±¨¸æÔ¤¼Æ£¬£¬È«ÇòSD-WANÊг¡¹æÄ£½«´Ó2020ÄêµÄ19ÒÚÃÀÔªÔöÌíµ½2025ÄêµÄ84ÒÚÃÀÔª£¬£¬ÔÚ´Ëʱ´úµÄ¸´ºÏÄêÔöÌíÂÊ£¨CAGR£©Îª34.5£¥¡£¡£¡£¡£°´×éÖ¯¹æÄ£»£»£»£»£»£»®·Ö£¬£¬ÖÐСÐÍÆóÒµ½«Õ¼Óиü¸ßµÄÊг¡·Ý¶î¡£¡£¡£¡£ÓÉÓÚ¸ü¶àµÄSD-WAN½â¾ö¼Æ»®»ùÓÚÔÆ£¬£¬Ìá¸ßÁËÆä¿ÉÔâÊÜÐÔ£¬£¬Ê¹ÖÐСÆóÒµ¶ÔSD-WAN½â¾ö¼Æ»®µÄÐèÇóÔöÌí¡£¡£¡£¡£±ðµÄ£¬£¬ÆóÒµÕýתÏò»ùÓÚÔÆµÄÓ¦ÓóÌÐò£¬£¬Òò´ËÔ¤¼ÆÔư²ÅŽ«ÔÚδÀ´Ö÷µ¼Êг¡¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.researchandmarkets.com/reports/5137053/software-defined-wide-area-network-sd-wan


6.Apodis PharmaÊý¾Ý¿âÉèÖùýʧй¶1.7TBÉñÃØÊý¾Ý


6.jpg


CyberNews·¢Ã÷Apodis PharmaµÄElasticSearchÊý¾Ý¿âÉèÖùýʧ£¬£¬Ð¹Â¶Áè¼Ý1.7TBµÄÉñÃØÊý¾Ý¡£¡£¡£¡£Apodis PharmaÊÇÒ»¼ÒΪҩ·¿¡¢Ò½ÁÆ»ú¹¹µÈ¹«Ë¾ÌṩÊý×Ö¹©Ó¦Á´ÖÎÀíÆ½Ì¨ºÍÈí¼þ½â¾ö¼Æ»®µÄ¹«Ë¾¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨´ó×ÚÓëÓªÒµÏà¹ØµÄÉñÃØÊý¾Ý£¬£¬°üÀ¨Ò©Æ·×°ÔËÊý¾ÝºÍ´æ´¢×´Ì¬¡¢Æä25000¶à¸öÏàÖúͬ°éºÍ¿Í»§µÄµµ°¸¡¢²úÆ·ÊýÄ¿ºÍIDµÈ²úÆ·Êý¾Ý¡¢ÏúÊÛÈÕÆÚºÍ¼ÛÇ®µÈÏúÊÛÐÅÏ¢¡¢¿Í»§¼°Ô±¹¤ÐÕÃûµÈÓû§Êý¾Ý¡¢ÏûºÄÕߺͿͻ§Êý¾ÝµÄ¿ÉÊÓ»¯ºÍÆÊÎöÊý¾Ý¡£¡£¡£¡£¸ÃÊý¾Ý¿âÒÑÓÚ11ÔÂ17ÈÕ±»±£»£»£»£»£»£»¤ÆðÀ´¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/111756/data-breach/apodis-pharma-data-leak.html