Ñо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day£»¶ò¹Ï¶à¶ûµçÐŹ«Ë¾CNTÔâµ½RansomEXXÀÕË÷¹¥»÷
Ðû²¼Ê±¼ä 2021-07-19
Ñо¿ÍŶӹûÕæÅû¶ÁËÒ»¸öеÄ0day£¬¹¥»÷ÕßʹÓøÃÎó²î¿ÉÒÔͨ¹ýÔ¶³Ì´òÓ¡·þÎñ»ñµÃWindowsÉϵÄSYSTEMȨÏÞ¡£Ñо¿Ö°Ô±Benjamin Delpy³Æ£¬¸ÃÎó²îʹÓÃÁËWindows Point and Print¹¦Ð§Öеġ°Queue-Specific Files¡±ÌØÕ÷¡£ÔÚ×°ÖôòÓ¡»úʱ£¬¹©Ó¦ÉÌÌṩµÄ×°ÖóÌÐò¿ÉÒÔÖ¸¶¨Ò»×éÓëÌØ¶¨´òÓ¡ÐÐÁÐÏà¹ØÁªµÄÈκÎÀàÐ͵ÄÎļþ£¬¸ÃÎļþ½«±»ÏÂÔØµ½Ã¿Ò»¸öÅþÁ¬µ½´Ë´òÓ¡·þÎñÆ÷µÄ¿Í»§¶Ë¡£Òò´Ë£¬µ±¿Í»§¶ËÅþÁ¬µ½¹¥»÷ÕßËù¿ØÖƵĴòÓ¡·þÎñÆ÷ʱ£¬½«×Ô¶¯ÏÂÔØ²¢ÒÔSYSTEMȨÏÞÖ´ÐжñÒâDLL¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/new-windows-print-spooler-zero-day-exploitable-via-remote-print-servers/
2.CloudflareµÄCDN JSÖÐÎó²îÓ°ÏìÈ«ÍøÉÏ12.7%µÄÍøÕ¾

CloudflareÒÑÐÞ¸´Æä¿ªÔ´CDN JSÖеÄÒ»¸öÑÏÖØÎó²î£¬¸ÃÎó²î¿ÉÓ°ÏìÈ«ÍøÉÏ12.7%µÄÍøÕ¾¡£CDN JSΪÊý°ÙÍòÍøÕ¾ÌṩÁè¼Ý4000¸öJavaScriptºÍCSS¿â£¬ÎªµÚ¶þ´óJavaScript CDN¡£Ñо¿Ö°Ô±·¢Ã÷¹ØÓÚÿ¸öÐû²¼µ½CDN JSµÄGitHub´æ´¢¿âµÄ¿â£¬Æä¸üа汾½«´ÓÁ´½ÓµÄnpm×¢²á±íÏÂÔØ£¬²¢ÇÒ¸Ãnpm°æ±¾Ò²ÓÉ¿âµÄ×÷Õßά»¤¡£µ±Ðû²¼°üÀ¨Â·¾¶±éÀúÎó²îµÄnpm°üºó£¬¸Ã°ü×îÖÕÒ²»á±»CDNJSµÄ¸üлúеÈË´¦Öóͷ££¬²¢ÔÚÏ£ÆæµÄ·¾¶ÉÏ×¢ÈëBash¾ç±¾¡£¸ÃÎó²î¿É±»ÓÃÀ´Ô¶³ÌÖ´ÐÐÏÂÁÏÖÒѱ»ÐÞ¸´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-cloudflare-cdn-flaw-allowed-compromise-of-12-percent-of-all-sites/
3.¶ò¹Ï¶à¶ûµçÐŹ«Ë¾CNTÔâµ½RansomEXXÀÕË÷¹¥»÷

¶ò¹Ï¶à¶ûµÄ¹«Ë¾Corporaci¨®n Nacional de Telecomunicaci¨®n (CNT)Ôâµ½RansomEXXÀÕË÷¹¥»÷£¬µ¼ÖÂÓªÒµÔËÓª¡¢Ö§¸¶ÍøÕ¾ºÍ¿Í»§Ö§³ÖÖÐÖ¹¡£CNTÊǶò¹Ï¶à¶ûµÄ¹úÓªµçÐÅÔËÓªÉÌ£¬ÌṩÀο¿µç»°·þÎñ¡¢Òƶ¯¡¢ÎÀÐǵçÊӺͻ¥ÁªÍøÅþÁ¬¡£7ÔÂ16ÈÕ£¬¸Ã¹«Ë¾ÔÚÆä¹ÙÍøÐû²¼Í¨¸æ£¬³ÆÒòÔâµ½¹¥»÷¿Í»§·þÎñºÍÔÚÏßÖ§¸¶ÔÝʱÖÐÖ¹£¬²¢ÌåÏÖÒÑÏòÕþ¹óÔ¢±¨Á˴˴ι¥»÷ÊÂÎñ¡£ËäÈ»CNTûÓÐÕýʽÉùÃ÷ÆäÔâµ½ÁËÀÕË÷¹¥»÷£¬µ«RansomEXXÔÚÆäÍøÕ¾³ÆËûÃÇÒѾÏÂÔØÁËCNTÁè¼Ý190GBµÄÎļþ£¬²¢×¼±¸¹ûÕæËüÃÇ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/ecuadors-state-run-cnt-telco-hit-by-ransomexx-ransomware/
4.TestcoronanuµÄCovidÊý¾Ý¿É±»¸Ä¶¯²¢Ð¹Â¶6ÍòÈËÐÅÏ¢

Covid¼ì²â¹«Ë¾TestcoronanuµÄÊý¾Ý¿É±»¸Ä¶¯²¢Ð¹Â¶Áè¼Ý6ÍòÈ˵ÄÐÅÏ¢¡£RTL NieuwsÔÚÉÏÖÜÈÕ±¨µÀ³Æ£¬Testcoronanu±¬·¢ÁËÑÏÖØµÄй¶ÊÂÎñ£¬ÈκÎÈ˶¼¿ÉÒÔ½¨Éè×Ô¼ºµÄCovidÒßÃç½ÓÖÖ»ò¼ì²âÖ¤Êé¡£Óû§¿ÉÒÔ×Ô¼ºÔÚÊý¾Ý¿âÖÐÊäÈë¾ÓÉÁËÄÄÖÖ¼ì²âÒÔ¼°¼ì²âЧ¹ûÊÇʲô£¬Ö®ºó£¬½«×Ô¶¯ÊÕµ½TestcoronanuµÄÂÃÐÐ֤ʵ£¬²¢ÇÒÓû§»¹¿ÉÒԸ͝ÆäËûÈ˵ÄÊý¾Ý¡£±ðµÄ£¬´Ë´ÎÊÂÎñ»¹Ð¹Â¶ÁË6ÍòÓû§µÄСÎÒ˽¼ÒÐÅÏ¢£¬ÀýÈçÈ«Ãû¡¢µØµã¡¢µç»°ºÅÂë¡¢Éç»áÇå¾²ºÅÂë¡¢»¤ÕÕºÅÂëºÍÒ½ÁÆÐÅÏ¢µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.databreaches.net/nl-leak-at-covid-testing-company-made-it-possible-to-fake-results-in-coronacheck-app/
5.Ñо¿Ö°Ô±Åû¶HelloKittyÕë¶ÔSonicWall×°±¸µÄ¹¥»÷

ÍøÂçÇå¾²¹«Ë¾CrowdStrikeÅû¶HelloKittyÕë¶ÔSonicWall×°±¸µÄ¹¥»÷¡£HelloKityÊÇ×Ô2020Äê11ÔÂ×îÏÈ»îÔ¾µÄÀÕË÷ÍÅ»ï£¬ÔøÇÔÈ¡ÁËCyberpunk 2077¡¢Witcher 3¡¢Gwent ºÍÆäËûÓÎÏ·µÄÔ´´úÂë¡£Ñо¿Ö°Ô±³ÆºÚ¿ÍʹÓÃÁËSonicWall SMAºÍSRA²úÆ·ÖеÄCVE-2019-7481Îó²î£¬¸ÃÎó²îÒÑÔÚ2021ÄêÍ·Ðû²¼µÄ¹Ì¼þ¸üÐÂÖоÙÐÐÁËÐÞ¸´¡£±ðµÄ£¬CrowdStrikeÖÒÑÔBabukÍŻﻹÔÚÕë¶Ô±£´æCVE-2020-5135Îó²îµÄSonicWall VPN×°±¸¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/120249/malware/hellokitty-ransomware-sonicwall-devices.html
6.PRODAFT³Æ°²×¿ToddlerÕë¶ÔÅ·Ö޵Ĺ¥»÷Ô˶¯¼¤Ôö

PRODAFTÍþвÇ鱨(PTI)ÍŶÓÌåÏÖ£¬ÐÂÐÍAndroidÒøÐÐľÂíToddler£¨Ò²³ÆTeaBot/Anatsa£©Õë¶ÔÅ·Ö޵Ĺ¥»÷Ô˶¯¼¤Ôö¡£CleafyÔÚ1Ô·ÝÊ×´ÎÅû¶ÁËToddler£¬Æä¹¥»÷ÁË60¼ÒÅ·ÖÞÒøÐеĿͻ§¡£PTIÆÊÎö·¢Ã÷£¬ToddlerÖ÷ÒªÕë¶ÔÎ÷°àÑÀ£¬µ«Æä¶ñÒâÈí¼þÑù±¾ÖÐÒ²°üÀ¨ÁËÕë¶ÔÎ÷°àÑÀÓï¡¢Ó¢Óï¡¢Òâ´óÀûÓï¡¢µÂÓï¡¢·¨ÓïºÍºÉÀ¼ÓïÓû§µÄÎı¾ÄÚÈÝ£¬×èÖ¹ÏÖÔÚ£¬ToddlerÒѾѬȾÁËÁè¼Ý7632̨װ±¸¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/toddler-mobile-banking-malware-surges-across-europe/


¾©¹«Íø°²±¸11010802024551ºÅ