AdobeÐû²¼´øÍâ¸üУ¬ÐÞ¸´ColdfusionÖеÄ3¸öÎó²î £»Ð¹¥»÷Ô˶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯

Ðû²¼Ê±¼ä 2019-09-26
1.AdobeÐû²¼´øÍâ¸üУ¬ÐÞ¸´ColdfusionÖеÄ3¸öÎó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


AdobeÐû²¼´øÍâÇå¾²¸üУ¬ÐÞ¸´ColdFusionÖеÄÈý¸öÎó²î£¬ÆäÖÐÁ½¸öÎó²îΪcritical¼¶±ð£¬ÁíÒ»¸öΪimportant¼¶±ð¡£Á½¸öcriticalÎó²îÊÇÏÂÁî×¢ÈëÎó²î£¬°üÀ¨¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÎó²î£¨CVE-2019-8073£©ºÍÔÊÐí¹¥»÷ÕßÈÆ¹ý»á¼û¿ØÖƵÄ·¾¶±éÀúÎó²î£¨CVE-2019-8074£©¡£Ò»¸öimportantÎó²îÊÇÈÆ¹ýÎó²î£¨CVE-2019-8072£©£¬¸ÃÎó²î¿Éµ¼ÖÂÐÅϢй¶¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨ColdFusion 2018 Update 4¼°¸üÔç°æ±¾ºÍColdFusion 2016 Update 11¼°¸üÔç°æ±¾£¬½¨ÒéÓû§¸üÐÂÖÁColdFusion 2018 Update 5ºÍColdFusion 2016 Update 12¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerabilities-in-coldfusion/

2.Ô¼»áÓ¦ÓÃHeyyoÒâÍâй¶½ü7.2ÍòÓû§ÐÅÏ¢

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

ÔÚÏßÔ¼»áÓ¦ÓÃHeyyoµÄElasticsearchʵÀýÒòδÉèÃÜÂë¶øÔÚ»¥ÁªÍøÉÏ̻¶£¬µ¼Ö½ü7.2ÍòÓû§µÄÏêϸÒþ˽ÐÅϢй¶¡£¸ÃÊÂÎñÊÇÓÉWizCaseÇå¾²Ñо¿Ö°Ô±·¢Ã÷µÄ£¬Æ¾Ö¤ZDNetµÄ±¨µÀ£¬¸Ã·þÎñÆ÷ÊÇÒ»¸öÉú²ú·þÎñÆ÷£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ð¡¢Éí¸ß¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬ¡¢Î»ÖÃÐÅÏ¢¡¢Ô¼»áÆ«ºÃµÈ¡£¸ÃÓ¦ÓÃËùÊôµÄÒÁ˹̹²¼¶ûÈí¼þ¹«Ë¾ÔÚ½üÒ»¸öÐÇÆÚÄÚδÄܻظ´ZDNetµÄѯÎÊ£¬Ð¹Â¶µÄ·þÎñÆ÷ÔÚZDNetת´ïÍÁ¶úÆäCERTºó»ñµÃ± £»¤¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/heyyo-dating-app-leaked-users-personal-data-photos-location-data-more/

3.й¥»÷Ô˶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØÔËÊäºÍº½ÔË×éÖ¯

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

ƾ֤Palo Alto NetworksµÄ±¨¸æ£¬Ò»¸öÐµĹ¥»÷Ô˶¯xHuntÖ÷ÒªÕë¶Ô¿ÆÍþÌØµÄÔËÊäºÍº½ÔË×éÖ¯¡£xHuntÖ÷ÒªÔÚ2019Äê5ÔÂÖÁ6ÔÂÖ®¼ä¾ÙÐУ¬Ñо¿Ö°Ô±½«¸Ã¹¥»÷Ô˶¯ÖÐʹÓõŤ¾ßÓë2018Äê7ÔÂÖÁ12ÔÂÖ®¼äÕë¶Ô¿ÆÍþÌØµÄ¹¥»÷¹ØÁªÆðÀ´¡£×÷Ϊй¥»÷µÄÒ»²¿·Ö£¬¹¥»÷ÕßʹÓÃÁËSakabota¡¢Histoka¡¢NeteroºÍKilluaµÈºóÃÅ£¬ÕâЩºóÃÅͨ¹ýHTTPÓëC&CͨѶ£¬²¿·Ö±äÌåҲʹÓÃDNSËíµÀ»òµç×ÓÓʼþ¾ÙÐÐͨѶ¡£¹¥»÷ÕßÒ²ÔÚÊÜѬȾµÄϵͳÉÏÊÍ·ÅÁ˶ñÒ⹤¾ßGonºÍEYE¡£Ö»¹Ü2018ÄêºÍ2019ÄêµÄ¹¥»÷Ô˶¯ÖÐʹÓõŤ¾ß±£´æÖصþ£¬µ«ÏÖÔÚÉв»¿ÉÈ·¶¨ÕâÁ½¸öÔ˶¯ÊÇ·ñÓÉͳһ¹¥»÷ÕßÌᳫ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/xhunt-campaign-targets-kuwait-transportation-and-shipping-sector

4.Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

¿¨°Í˹»ùÑо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þYatron¼°FortuneCryptµÄ½âÃܹ¤¾ß¡£YatronÖ÷Òª»ùÓÚ¿ªÔ´ÀÕË÷Èí¼þHidden Tear¾ÙÐпª·¢£¬Æ¾Ö¤¿¨°Í˹»ùµÄͳ¼ÆÊý¾Ý£¬¸ÃÀÕË÷Èí¼þÔÚÒÑÍùÒ»ÄêÖÐÊÔͼÌᳫ600¶à´ÎѬȾ£¬ÆäÖдó´ó¶¼¹¥»÷λÓڵ¹ú¡¢Öйú¡¢¶íÂÞ˹¡¢Ó¡¶ÈºÍÃåµé¡£FortuneCryptµÄÖ÷ÒªÌØµãÊÇʹÓÃBlitzMax±àÒëÆ÷¾ÙÐбàÒ룬ÕâÊÇ¿¨°Í˹»ùÊӲ쵽µÄÊ׸öʹÓÃBlitz BASIC±àдµÄÀÕË÷Èí¼þ¡£È¥Ä꿨°Í˹»ù¹²¼Í¼ÁËTrojan-Ransom.Win32.Crypren¼Ò×åµÄ6000¶à´Î¹¥»÷£¬Êܹ¥»÷Êý×î¶àµÄ¹ú¼ÒÊǶíÂÞ˹¡¢°ÍÎ÷¡¢µÂ¹ú¡¢º«¹úºÍÒÁÀÊ¡£

Ô­ÎÄÁ´½Ó£º
https://securelist.com/ransomware-two-pieces-of-good-news/93355/

5.·¸·¨ÍÅ»ïTortoiseshellʹÓÃÐéÎ±ÍøÕ¾Ãé×¼ÃÀ¹úÍËÎéÎäÊ¿

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

˼¿ÆTalos·¢Ã÷ÓÉÒÁÀÊÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯TortoiseshellÕýÊÔͼʹÓÃÐéαÕÐÆ¸ÍøÕ¾Õë¶ÔÃÀ¹úÍËÎéÎäÊ¿¡£¸ÃÍøÕ¾µÄÓòÃûÊÇhiremilitaryheroes[.]com£¬ÉÏÃæÌṩһ¸ö×ÀÃæ°æÈí¼þµÄÏÂÔØ£¬µ«¸ÃÈí¼þ»áÏÔʾװÖÃʧ°ÜÐÅÏ¢²¢ÏÖʵÉÏ×°ÖöñÒâÈí¼þ¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬¶ñÒâÈí¼þ»áÔÚºǫ́ÔËÐÐÍøÂçÓû§µÄÐÅÏ¢£¬È»ºó·¢Ë͵½¹¥»÷ÕßµÄGmailÓÊÏä¡£ÍøÂçµÄÐÅÏ¢°üÀ¨ÏµÍ³²¹¶¡¼¶±ð¡¢´¦Öóͷ£Æ÷ÊýÄ¿¡¢ÍøÂçÉèÖá¢Ó²¼þºÍ¹Ì¼þ°æ±¾¡¢Óò¿ØÖÆÆ÷¡¢ÖÎÀíÔ±Ãû³Æ¡¢ÕË»§ÁÐ±í¡¢ÈÕÆÚ¡¢Ê±¼ä¡¢Çý¶¯³ÌÐòµÈ¡£±ðµÄ£¬¶ñÒâÈí¼þ»¹»áÔÚÊܺ¦ÕßµÄϵͳÉÏ×°ÖÃÔ¶¿ØÄ¾Âí¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-military-veterans-targeted-by-iranian-state-hackers/

6.·¸·¨ÍÅ»ïMagecartÃé×¼¹«¹²Wi-Fi±³ºóµÄÉÌÓ÷ÓÉÆ÷

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

Magecart Group 5±»·¢Ã÷ÕýÔÚÃé×¼±¸×¢ÈëÉÌÓ÷ÓÉÆ÷ÖеĶñÒâ´úÂë¾ÙÐвâÊÔ¡£¸Ã´úÂëÕë¶ÔµÄ·ÓÉÆ÷Ö÷ÒªÓÃÓÚÔÚ¹«¹²³¡ºÏºÍÂùÝÖÐÌṩÃâ·Ñ»ò¸¶·ÑµÄWi-Fi·þÎñ£¬ÈôÊÇÀֳɣ¬¹¥»÷Õß½«Äܹ»Ñ¬È¾ÕâЩ·ÓÉÆ÷²¢ÔÚ»ú³¡¡¢¿§·Èµê¡¢Âùݵȹ«¹²ÉèÊ©ÖÐÇÔÈ¡ÆäWi-FiÓû§µÄÖ§¸¶Êý¾Ý¡£ÕâЩ´úÂë±»×¢Èëµ½Á¼ÐÔµÄJavaScriptÎļþÖУ¬È»ºó¼ÓÔØµ½Ö§³ÖL7ЭÒéµÄÉÌÓ÷ÓÉÆ÷¡£L7ЭÒéÖ¸µÄÊÇOSIµÄÓ¦ÓòãЭÒ飬³£ÓÃÓÚÉÌÓ÷ÓÉÆ÷ÒÔ¾ÙÐÐÁ÷Á¿¸ºÔØÆ½ºâºÍÔÚÓû§ÅþÁ¬µ½Wi-Fi·þÎñʱÏÔÊ¾Ò³Ãæ»ò¹ã¸æ¡£ÏÖÔÚÑо¿Ö°Ô±ÉÐδ·¢Ã÷ÏÖʵµÄ¹¥»÷°¸Àý¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/magecart-group-targets-routers-behind-public-wi-fi-networks/148662/