Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ°¸¼þ£»Ñо¿ÍŶӷ¢Ã÷StruxureWare±£´æ6¸öеÄ0day
Ðû²¼Ê±¼ä 2020-12-01
ÍøÂçÇå¾²¹«Ë¾Group-IBÓëÅ·ÖÞµÄÐÙÑÀÀû¡¢Ó¢¹úºÍÒâ´óÀûÕþ¸®ÏàÖú£¬ÌᳫCarding Action 2020Ðж¯£¬ÆÆ»ñÒ»Æð´ó¹æÄ£ÐÅÓÿ¨ÉúÒâթư¸¼þ¡£¸ÃÔ˶¯Õë¶Ô¶à¸ö°µÍøÊг¡£¬ÔÚÐÅÓÿ¨ÉúÒâÊÐËÁºÍ°µÍøÉúÒâÆ½Ì¨ÉϲéÕÒÓëÉúÒâ±»µÁ¿¨ÏêϸÐÅÏ¢ÓйصÄÚ²ÆÕߣ¬Ö¼ÔÚ¼õÇáºÍ±ÜÃâ½ðÈÚ»ú¹¹ºÍ³Ö¿¨ÈËÔâÊÜËðʧ£¬ÏÖÔÚÔ¼×èÖ¹ÁË4000ÍòÅ·ÔªµÄËðʧ¡£¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼¾Ð²¶ÁËÈýÃûÀ´×ÔÄáÈÕÀûÑǵÄÏÓÒÉÈË£¬¾ÝÐÅËûÃÇÊÇÒ»¸ö¹¥»÷ÁË150¸öÕþ¸®×éÖ¯ºÍ¹«Ë¾µÄÍÅ»ïµÄ³ÉÔ±¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/authorities-disrupt-dark-web-credit-card-trading-scam/
2.Ñо¿ÍŶӷ¢Ã÷StruxureWare±£´æ6¸öеÄ0day

TIMºì¶ÓÑо¿ÍŶӣ¨RTR£©·¢Ã÷StruxureWare±£´æ6¸öеÄ0day£¬ÏÖÔÚÒѱ»ÆäÖÆÔìÉÌÊ©ÄÍµÂµçÆøÐÞ¸´¡£´Ë´Î·¢Ã÷µÄÎó²î»®·ÖΪ²»ÊÜÏÞÖÆµÄÎļþÉÏ´«Îó²î£¨CVE-2020-7569£©£¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ»XMLÍⲿʵÌåÒýÓõÄÏÞÖÆ²»µ±£¨CVE-2020-7572£©£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶£»WindowsδÒýÓÃËÑË÷·¾¶£¨CVE-2020-28209£©£»´æ´¢ÐÍ¿çÕ¾µã¾ç±¾Îó²î£¨CVE-2020-7570£©£»·´ÉäÐÍ¿çÕ¾µã¾ç±¾Îó²î£¨CVE-2020-7571£©ºÍ»á¼û¿ØÖƲ»µ±£¨CVE-2020-7573£©¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/111692/hacking/schneider-electric-zero-days.html
3.BasecampÐÞ¸´¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÑÏÖØÎó²î

BasecampÅû¶Æä±£´æ¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÎó²î£¬ÏÖÒÑÐÞ¸´¡£¸ÃÎó²î±£´æÓÚͼƬÉÏ´«¹¦Ð§ÖУ¬·þÎñÆ÷¶ËÔÚת»»Í¼Ïñʱ£¬²»µ«½ÓÊÜͼÏñÎļþ£¬»¹½ÓÊÜÖØÃüÃûΪ.gifµÄPostScript¡¢EPSÎļþ¡£Òò´Ë£¬¹¥»÷Õß¿ÉÒÔÉÏ´«´øÓиü¸ÄΪͼÏñÀ©Õ¹ÃûµÄ¶ñÒâÎļþÀ´Ö´ÐÐÏÂÁî¡£Õâ¿ÉÄÜÊÇÓÉÓÚʹÓÃÁËImageMagick»òGraphicsMagick¾ÙÐÐͼÏñת»»£¬ÔÚÊäÈëÒÔ'£¥£¡'Ϊ¿ªÍ·µÄÎļþʱ£¬Ôò»áŲÓÃPostScriptÚ¹ÊÍÆ÷£¨Ghostscript£©£¬¶øGhostscript×Ô¼º±£´æÇå¾²Îó²î¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2020/11/29/critical-vulnerability-in-basecamp-could-allow-remote-code-execution-attacks/
4.Unit4Ðû²¼ÓйØÈ«ÇòÆóÒµ¾ÙÐÐÊý×Ö»¯×ªÐÍµÄÆÊÎö±¨¸æ

ÆóÒµÔÆÓ¦Óù«Ë¾Unit4Ðû²¼ÓйØÈ«ÇòÆóÒµ¾ÙÐÐÊý×Ö»¯×ªÐÍµÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬ÎªÏìÓ¦Óû§Ò»Ö±ÔöÌíµÄÐèÇó£¬È«Çò84£¥µÄ¾öÒéÕßÕýÔÚ¼ÓËÙÆäÊý×Ö»¯×ªÐÍÍýÏ룬²¢Ï£ÍûÔÚδÀ´Óиü¶àµÄÎÞаÐÔÀ´Ô¶³ÌÊÂÇé¡£ÔÚCovid-19ʱ´ú£¬49%µÄ¾öÒéÕß³ÆÔÚÍýÏë·½Ãæ±äµÃÔ½·¢ÎÞа£¬42%ÈÏ¿ÉÁ¢ÒìµÄ³ÌÐòÒѾ¼ÓËÙ£¬35%µÄÈËÌåÏÖÕâ¼ÓËÙÁËËûÃÇÏòÔÆÅÌËã×ªÒÆµÄͶ×Ê¡£±ðµÄ£¬Ëæ×ÅÔ¶³ÌÊÂÇéµÄÌ«¹ý£¬60£¥µÄÊÜ·ÃÕßÌåÏÖËûÃÇÔÚ·â±Õʱ´úÉú²úÁ¦¸ü¸ß¡£
ÔÎÄÁ´½Ó£º
https://www.unit4.com/news/unit4-study-reveals-organizations-are-accelerating-digital-strategies-people-led
5.ThreatpostÐû²¼Covidʱ´úÒ½ÁÆÐÐÒµµÄÍþвÆÊÎö±¨¸æ

ThreatpostÐû²¼ÁËÓйØCovidʱ´úÒ½ÁÆÐÐÒµµÄÍþвÆÊÎö±¨¸æ¡£¸Ã±¨¸æÌ½ÌÖÁËÒ½ÁÆ×°±¸µÄÇå¾²ÐÔ¡¢ÀÕË÷Èí¼þµÄΣº¦ÒÔ¼°Ò½ÁÆÌع¤Ô˶¯µÄÐËÆð£¬ÀýÈçºÚ¿Í×éÖ¯ÕýÔÚÍøÂçÓйØCOVID-19ÒßÃçºÍÖÎÁÆÇéÐεÄÇ鱨¡£±¨¸æÖ¸³ö£¬2020ÄêÓÉÓÚCOVID-19µÄÉìÕÅ£¬ÒÅÁôµÄÍøÂçÇå¾²ÎÊÌâÓëеÄÇå¾²ÌôÕ½Èںϣ¬Ò½ÁÆÐÐÒµ×îÏÈÁËÖØ´óµÄת±ä¡£COVID-19ÆÈʹԤËãÖ÷ÒªµÄÒ½Ôº½â¾öÕâЩϵͳÐÔÎÊÌ⣬Óë´Ëͬʱ£¬Î§ÈÆÒ½ÁÆ·þÎñµÄÊý×Ö»¯¡¢Ô¶³ÌÒ½ÁƵÄÍÆ³öºÍµÖÓùÀÕË÷Èí¼þ¹¥»÷µÄÉÏÉý¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/ebooks/healthcare-security-woes-balloon-in-a-covid-era-world/
6.±öϦ·¨ÄáÑÇÖÝÌØÀ»ªÏØÒÑÏòDoppelÖ§¸¶50ÍòÃÀÔªµÄÊê½ð

ÉÏÖÜÄ©£¬±öϦ·¨ÄáÑÇÖÝÌØÀ»ªÏصÄϵͳÔâµ½DoppelPaymerÀÕË÷Èí¼þ¹¥»÷£¬ÏÖÒÑÖ§¸¶500000ÃÀÔªµÄÊê½ð¡£ÌØÀ»ªÏØÐû²¼¾¯±¨³Æ£¬¹¥»÷µ¼Ö²¿·ÖϵͳÖÐÖ¹£¬µ«¸ÃÏØµÄÑ¡¾Ù¾ÖºÍ½ôÆÈ·þÎñ²¿·Ö²¢Ã»ÓÐÊܵ½Ó°Ïì¡£ÍâµØÃ½Ì峯£¬ÀÕË÷Èí¼þÍÅ»ï¿ÉÒÔ»á¼û°üÀ¨¾¯·½±¨¸æ¡¢ÈËΪ¡¢²É¹ººÍÆäËûÊý¾Ý¿âµÄϵͳ£¬²¢Ë÷Òª50ÍòÃÀÔªµÄÊê½ð¡£·Ñ³Ç6abcµç̨³Æ¸ÃÏØÒÑ×¼±¸Ö§¸¶Êê½ð£¬ÓÉÓÚÆäÒѾΪ´ËÀ๥»÷Ͷ±£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/pennsylvania-county-pays-500k-ransom-to-doppelpaymer-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ