Area1±¨¸æ¶íÂÞ˹ͨ¹ýEximÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡£»Naval Dome·¢Ã÷×Ô2ÔÂÒÔÀ´Õë¶Ôº½Ô˵Ĺ¥»÷¼¤Ôö400%
Ðû²¼Ê±¼ä 2020-06-091.Area1Ðû²¼±¨¸æ£¬¶íÂÞ˹ͨ¹ýEximÊðÀí(MTA)ÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡
Area1Ðû²¼±¨¸æ£¬ÌåÏÖ¶íÂÞ˹ͨ¹ýEximÊðÀí(MTA)ÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡¡£ÃÀ¹úÍøÂçÇå¾²×ÉѯÖÒÑԳƣ¬×Ô2019Äê8ÔÂÒÔÀ´£¬Óë¶íÂÞ˹¾ü·½ÓйصĺڿÍÒ»Ö±ÔÚʹÓÃÃÀ¹úEximÓʼþ´«ÊäÊðÀí(MTA)Èí¼þÖеÄÎó²î(CVE-2019-10149)¡£¸ÃÎó²î¿ÉÒÔÓ°ÏìEximµÄ4.87µ½4.91°æ±¾£¬Ê¹ÓÃËü¿ÉÒÔÔöÌíÌØÈ¨Óû§¡¢½ûÓÃÍøÂçÇå¾²ÉèÖá¢ÌᳫBEC´¹ÂÚÔ˶¯µÈ¡£¶øÏÖÒÑÈ·¶¨2018ÄêÃÀ¹ú´óÑ¡ÖÐÖÁÉÙ44ÃûºòÑ¡ÈËʹÓÃÁËExim·þÎñÆ÷£¬¶ø2020ÄêÃÀ¹ú´óÑ¡ÖÁÉÙ50ÃûºòÑ¡ÈËʹÓÃExim·þÎñÆ÷¡£Òò´Ë£¬Area1È·ÐÅ2020ÄêÑ¡¾ÙÖеÄÏÖÈκòÑ¡ÈËÔÚ2018ÄêÑ¡¾Ùµ½2019Äê2ÔÂÖ®¼äÒ»¶¨»áÊܵ½CVE-2019-10149µÄÓ°Ïì¡£
ÔÎÄÁ´½Ó£º
https://cdn.area1security.com/reports/Area-1-Security-EximReport.pdf
2.BolsterÐû²¼2020ÄêµÚÒ»¼¾¶ÈÍøÂç´¹ÂÚºÍÔÚÏßڲƱ¨¸æ
·Àڲƹ«Ë¾BolsterÐû²¼ÁË2020ÄêµÚÒ»¼¾¶ÈÍøÂç´¹ÂÚºÍÔÚÏßڲƱ¨¸æ£¬·¢Ã÷ÓëCOVID-19Ïà¹ØµÄÚ²ÆÍøÕ¾¼¤Ôö¡£ÔÚ2020ÄêµÚÒ»¼¾¶È£¬Bolster×ܹ²¼ì²âµ½854441¸öÍøÂç´¹ÂÚºÍÕ©ÆÍøÕ¾ºÍԼĪ400Íò¸ö¿ÉÒÉÍøÕ¾£¬ÆäÖÐÔ¼30£¥ÓëCOVID-19Óйء£³ý´ËÖ®Í⣬´ËÀàÍøÕ¾µÄÔöÌíÁ¿Ò²ÔÚÒ»Ö±ÔöÌí£¬´ÓÒ»Ô·ÝÌìÌì3142¸öеÄÍøÒ³ÔöÌíµ½ÈýÔ·Ý8342¸öÍøÒ³£¬Ö±µ½3ÔÂ19ÈÕµÖ´ïá۷壬һÌìÄÚ½¨ÉèÁËÁè¼Ý25000¸öеÄÍøÒ³¡£SaaSºÍµçÐÅÐÐÒµÊÇÊÜÍøÂç´¹ÂÚÕ©ÆÓ°Ïì×î´óµÄÐÐÒµ£¬Æä´ÎÊǽðÈÚ¡¢ÁãÊÛºÍÁ÷ýÌåÐÐÒµ¡£Bolster»¹·¢Ã÷Á˶à¸öÕ©ÆÍøÕ¾ÊÛÂôαÔìµÄCOVID-19¼ÓÃÜÇ®±ÒºÍ¼ÓÃÜÇ®°ü£¬ÆäÄ¿µÄÊÇÇÔÈ¡Êý¾ÝÒÔÓÃÓÚδÀ´µÄÍøÂç´¹ÂÚ¡¢¶ñÒâÈí¼þ·Ö·¢ºÍÇÔȡƾ֤¡£
ÔÎÄÁ´½Ó£º
https://www.businesswire.com/news/home/20200513005152/en/Bolster%E2%80%99s-Q1-2020-State-Phishing-Online-Fraud
3.Naval Dome·¢Ã÷£¬×Ô2ÔÂÒÔÀ´Õë¶Ôº½Ô˵ĺڿ͹¥»÷¼¤Ôö400%
ÒÔÉ«Áк£ÉÏÍøÂçÇ徲ר¼ÒNaval Dome³Æ£¬×Ô2020Äê2ÔÂÒÔÀ´£¬Õë¶Ôº½Ô˵ĺڿ͹¥»÷¼¤ÔöÁË400%¡£¸Ã¹«Ë¾ÒÔΪCOVID-19ʹµÃº£ÉÏÄÜÔ´²¿·Ö±ÈÒÔǰ¸üÈÝÒ×Êܵ½ÍøÂç¹¥»÷£¬Í¬Ê±Ê¹¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þºÍ´¹ÂÚÓʼþ¼¤Ôö¡£Naval DomeµÄCEO Itai SelaÌåÏÖ£¬ÓÉÓÚCovid-19µ¼ÖµÄÉç½»ÏÞÖÆºÍ¸ôÀë²½·¥£¬ÆÈʹÔʼװ±¸ÖÆÔìÉÌ£¨OEM£©¡¢ÊÖÒÕÖ°Ô±ºÍ¹©Ó¦É̽«Ô±¾×ÔÁ¦µÄϽµµÍ¬½Óµ½InternetÉÏ£¬OEMÊÖÒÕÖ°Ô±ÎÞ·¨µ½´¬Ö»ºÍ×ê»úÉÏÉý¼¶OTϵͳ£¬ÕâЩ¶¼µ¼Ö¸ÃÐÐÒµ¸üÒ×ÓÚ±»¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.offshore-energy.biz/naval-dome-400-increase-in-attempted-hacks-since-february-2020/
4.WordPress²å¼þPageLayer±£´æÎó²î£¬Ó°ÏìÁè¼Ý20Íò¸öÍøÕ¾
WordfenceÍŶӷ¢Ã÷WordPress²å¼þPageLayer±£´æÁ½¸öÎó²î£¬¿ÉÄÜ»áÓ°ÏìÁè¼Ý20Íò¸öÍøÕ¾¡£µÚÒ»¸öÎó²îµÄCVSSµÄÆÀ·ÖΪ7.4£¬¸ÃÎó²îµÄ±£´æÊÇÓÉÓÚ²å¼þµÄAJAX¶ËµãÖ»ÊÇͨ¹ýÒ»¸öÉí·ÝÑéÖ¤µÄ»á»°¼ì²éÇëÇóÊÇ·ñÀ´×Ô /wp-admin£¬¶ø²»¼ì²é·¢ËÍÇëÇóµÄÓû§µÄȨÏÞ£¬Òò´ËÈκλá¼ûȨÏÞµÄÓû§¶¼¿ÉÒÔÖ´ÐÐÈκβÙ×÷£¬¸ÃÎó²î¿É±»Ê¹ÓÃɾ³ýÄÚÈÝ»òÏòÏÖÓÐÒ³Ãæ×¢Èë¶ñÒâÄÚÈÝ¡£µÚ¶þ¸öÎó²îµÄCVSSÆÀ·ÖΪ8.8·Ö£¬ÊÇÓÉÓÚȱÉÙCSRF±£»¤£¬ºÚ¿Í¿ÉÒÔʹÓøÃÎó²îÏòÕ¾µãÒ³Ãæ×¢Èë¶ñÒâ´úÂë¡£ÏÖÔÚ£¬¿ª·¢Ö°Ô±ÒѾÐû²¼ÁËÇå¾²²¹¶¡ÒÔ¶ÔÎó²î¾ÙÐÐÐÞ¸´¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2020/06/07/pagelayer-wordpress-plugin-vulnerabilities-risked-over-200k-websites/
5.ºÚ¿ÍʹÓÃÍøÂç´¹ÂÚ¹¥»÷µÂ¹úСÎÒ˽¼Ò·À»¤×°±¸¹©Ó¦Á´
IBM X-ForceÑо¿Ö°Ô±Ðû²¼±¨¸æÌåÏÖ£¬ºÚ¿ÍÕýÔÚʹÓÃÍøÂç´¹ÂÚ¹¥»÷Ò»¼ÒµÂ¹ú¹«Ë¾µÄ¸ß²ãÖÎÀíÖ°Ô±£¬¸Ã¹«Ë¾µÄÖ÷ÒªÊÂÇéÊDzɹºÐ¡ÎÒ˽¼Ò·À»¤×°±¸£¨PPE£©£¬ÏÖÔÚºÚ¿ÍÒÑÊÔͼÇÔÈ¡100¶àλ¸ß¹ÜµÄƾ֤¡£3ÔÂ30ÈÕ£¬µÂ¹úÕþ¸®Óë¸Ã¹ú´óÐ͹«Ë¾¾ÙÐоۻᣬҪÇóÆäÐÖúµÂ¹ú¹ºÖÃPPEÖ®ºó£¬Ï®»÷¾Í×îÏÈÁË¡£Í³Ò»Ì죬ÕâЩ´óÐ͹«Ë¾ÖеÄÒ»¸ö¹«Ë¾µÄ¸ß¹ÜÊÕµ½ÁËÀ´×Ô¶íÂÞ˹IPµØµãµÄÍøÂç´¹ÂÚ¹¥»÷¡£Êܺ¦ÕßÖÐÌ©°ëΪĿµÄ¹«Ë¾ÖÐÓëÔËÓª¡¢²ÆÎñºÍ²É¹ºÏà¹ØµÄ¸ß¹Ü£¬ÁíÒ»°ëÊôÓڸù«Ë¾µÄÏàÖú¹«Ë¾µÄ¸ß¹Ü¡£¾ÝÊӲ죬ºÚ¿ÍʹÓÃǶÈëʽ³¬Á´½Ó£¬½«Êܺ¦ÕßÖØ¶¨Ïòµ½Î±×°³ÉMicrosoftµÇ¼±íµ¥µÄÍøÂç´¹ÂÚµÇÂ¼Ò³Ãæ£¬²¢½«ÍøÂçµ½µÄÊý¾Ý·¢Ë͵½¶à¸öYandexµç×ÓÓʼþÕÊ»§¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-are-attacking-the-german-ppe-supply-chain/
6.еÄÍøÂç´¹ÂÚÔ˶¯Í¨¹ýStackBlitz¹¤¾ßÍйܴ¹ÂÚÒ³Ãæ
Zscaler ThreatLabzÍŶӷ¢Ã÷£¬ÏÖÔÚ±£´æ¶àÖÖʹÓÃStackBlitz¹¤¾ßµÄÍøÂç´¹ÂÚÔ˶¯£¬ºÚ¿ÍʹÓÃÁËÔ¤Ö¸µ¼¿â¹¦Ð§½«ÍйܵÄÍøÒ³´Ó·þÎñÆ÷¶ËÖ±½Ó¹ý¶Éµ½¿Í»§¶Ë¡£ÔÚµÚÒ»ÖÖ´¹ÂÚÔ˶¯ÖУ¬ºÚ¿Íαװ³ÉÒ½ÁÆÎÀÉú×éÖ¯£¬Í¨¹ýOneDrive¹²Ïí·þÎñ·¢ËÍÎĵµ£¬Óû§Ò»µ©µã»÷ÏÂÔØÁ´½Ó£¬¾Í»á±»Öض¨Ïòµ½Outlook´¹ÂÚÒ³Ãæ¡£ÔÚÁíÒ»ÖÖ´¹ÂÚÔ˶¯ÖУ¬´¹ÂÚÓʼþÖеÄÁ´½ÓÖ¸ÏòÒ»¸öÍøÒ³£¬²¢°üÀ¨Ò»ÌõÐÂÎÅ˵Ã÷ÄúÊÕµ½ÁË´øÓÐÏà¹ØÎĵµÏÂÔØÁ´½ÓµÄ¹²ÏíÎĵµ£¬Óû§µ¥»÷ÏÂÔØÁ´½Óºó±ã»á±»Öض¨Ïòµ½OneDriveÍøÂç´¹ÂÚÍøÒ³¡£
ÔÎÄÁ´½Ó£º
https://www.zscaler.com/blogs/research/new-campaign-abusing-stackblitz-tool-host-phishing-pages


¾©¹«Íø°²±¸11010802024551ºÅ