eSentire·¢Ã÷Õë¶ÔLinkedInÓû§·Ö·¢more_eggsµÄ´¹Âڻ£»£»£»£»ClarotyÅû¶ÂÞ¿ËΤ¶û×Ô¶¯»¯µÄ²úÆ·ÖÐÓжà¸öÎó²î

Ðû²¼Ê±¼ä 2021-04-07

1.eSentire·¢Ã÷Õë¶ÔLinkedInÓû§·Ö·¢more_eggsµÄ´¹Âڻ


1.jpg


Çå¾²¹«Ë¾eSentire·¢Ã÷Õë¶ÔLinkedInÉÏʧҵÓû§µÄÐÂÒ»ÂÖÓã²æÊ½ÍøÂç´¹Âڻ£¬ £¬ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÁ˶ñÒâµÄZIPÎļþÀ´·Ö·¢ÖØ´óµÄÎÞÎļþºóÃÅmore_eggs¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»áÐ®ÖÆÕýµ±µÄWindowsÀú³ÌÀ´Òþ²ØÆäÉèÖÃÎļþ£¬ £¬ £¬£¬£¬£¬£¬£¬²¢¿É¼ìË÷ÆäËû¶ñÒâpayload»òÊÇÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£±ðµÄ£¬ £¬ £¬£¬£¬£¬£¬£¬¸Ã»î¶¯¿ÉÒÔÕë¶Ô²î±ðµÄÄ¿µÄÀ´Ò»Ö±µ÷½âÆä¹¥»÷£¬ £¬ £¬£¬£¬£¬£¬£¬Ê¹ÓÃÌØÖÆµÄÓÕ¶üÀ´ÓÕʹÓû§ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃºÚ¿Í×éÖ¯µÄÉí·Ý£¬ £¬ £¬£¬£¬£¬£¬£¬µ«¾ÝÍÆ²â£¬ £¬ £¬£¬£¬£¬£¬£¬¿ÉÄÜÓëFIN6¡¢Cobalt Group»òEvilnumÓйØ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.esentire.com/security-advisories/hackers-spearphish-professionals-on-linkedin-with-fake-job-offers-infecting-them-with-malware-warns-esentire


2.OnapsisÓëSAPÁªºÏÐû²¼Õë¶ÔSAPÓ¦ÓõĹ¥»÷»î¶¯µÄ¾¯±¨


2.jpg


4ÔÂ6ÈÕ£¬ £¬ £¬£¬£¬£¬£¬£¬ÔÆÇå¾²¹«Ë¾OnapsisºÍSAPÖÒÑÔÁËÕë¶ÔSAPÓ¦ÓõÄÒ»Á¬¹¥»÷£¬ £¬ £¬£¬£¬£¬£¬£¬²¢ÓëCISAºÍµÂ¹úÍøÂçÇå¾²»ú¹¹BSIÏàÖú£¬ £¬ £¬£¬£¬£¬£¬£¬ÌáÐÑSAP¿Í»§×°Öò¹¶¡³ÌÐò²¢ÊÓ²ìÆäÇéÐÎÖÐÊÇ·ñ±£´æ²»Çå¾²µÄÓ¦Óᣡ£¡£¡£¡£¡£Onapsis³Æ£¬ £¬ £¬£¬£¬£¬£¬£¬ÔÚ2020Äê6ÔÂÖÁ2021Äê3ÔÂÖ®¼ä£¬ £¬ £¬£¬£¬£¬£¬£¬±¬·¢ÁËÀ´×Ô20¸ö¹ú¼Ò»òµØÇøµÄ1500´Î¹¥»÷ʵÑ飬 £¬ £¬£¬£¬£¬£¬£¬ÆäÖÐ300´Î¹¥»÷Àֳɡ£¡£¡£¡£¡£¡£¸Ã±¨¸æ»¹ÏêϸÐÎòÁËÕâЩ¶ñÒâ»î¶¯Ê¹ÓõÄÎó²îºÍ¹¥»÷ÒªÁ죬 £¬ £¬£¬£¬£¬£¬£¬Ö¼ÔÚ×ÊÖúÓû§Ê¶±ðºÍÌá·ÀDZÔڵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://onapsis.com/active-cyberattacks-mission-critical-sap-applications


3.SensorFuÅû¶Apple MailÖмàÌýÓʼþµÄÁãµã»÷Îó²î


3.jpg


SensorFuÅû¶AppleµÄmacOS MailÖб£´æ¿ÉÓÃÀ´¼àÌýÓʼþµÄÁãµã»÷Îó²î¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-9922£¬ £¬ £¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ6.5£¬ £¬ £¬£¬£¬£¬£¬£¬¿ÉÓÃÀ´ÔÚMailµÄɳÏäÇéÐÎÖÐÌí¼Ó»òÐÞ¸Äí§ÒâÎļþ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÖ»ÐèÏòÄ¿µÄ·¢ËÍÒ»·â´øÓÐÁ½¸ö.ZIPÎļþµÄÓʼþ¼´¿É´¥·¢¸ÃÎó²î£¬ £¬ £¬£¬£¬£¬£¬£¬µÚÒ»¸ö.ZIP°üÀ¨ÃûΪMailµÄ·ûºÅÁ´½Ó£¬ £¬ £¬£¬£¬£¬£¬£¬Ö¸ÏòÊܺ¦ÕßµÄ$HOME/Library/MailºÍ1.txt£¬ £¬ £¬£¬£¬£¬£¬£¬µÚ¶þ¸ö.ZIP°üÀ¨Òª¶Ô$HOME/Library/MailËù×öµÄ¸ü¸Ä£¬ £¬ £¬£¬£¬£¬£¬£¬À´Ìṩ¶Ô¿â»òÓʼþµÄí§ÒâÎļþдÈëȨÏÞ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/apple-mail-zero-click-security-vulnerability/165238/    


4.ClarotyÅû¶ÂÞ¿ËΤ¶û×Ô¶¯»¯µÄ²úÆ·Öб£´æ¶à¸öÎó²î


4.jpg


Çå¾²¹«Ë¾ClarotyÅû¶ÁËÂÞ¿ËΤ¶û×Ô¶¯»¯µÄFactoryTalk AssetCentre²úÆ·Öб£´æµÄ9¸öÎó²î£¬ £¬ £¬£¬£¬£¬£¬£¬ËüÃǵÄCVSS 3ÆÀ·Ö¾ùΪ10¡£¡£¡£¡£¡£¡£¸Ã²úÆ·Ö÷ÒªÓÃÓÚÕû¸ö¹¤³§Óë×Ô¶¯»¯Ïà¹ØµÄ×ʲúÐÅÏ¢µÄ±£»£»£»£»¤¡¢ÖÎÀí¡¢°æ±¾¿ØÖÆ¡¢¸ú×ٺͱ¨¸æ¡£¡£¡£¡£¡£¡£ÕâЩÎó²î»®·ÖΪ²»¿ÉÐÅÊý¾ÝµÄ·´ÐòÁл¯£¨CVE-2021-27462¡¢CVE-2021-27466¡¢CVE-2021-27460ºÍCVE-20201-27470£©¡¢²Ù×÷ϵͳÏÂÁî×¢È루CVE-2021-27476£©¡¢SQL×¢È루CVE-2021-27472¡¢CVE-2021-27468ºÍCVE-2021-27464£©ÒÔ¼°ÐÅϢй¶£¨CVE-2021-27474£©¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/116391/ics-scada/rockwell-factorytalk-assetcentre-flaws.html


5.ÐÂ¼ÓÆÂ¹¤»áe2iÔâµ½´¹ÂÚ¹¥»÷£¬ £¬ £¬£¬£¬£¬£¬£¬Ð¹Â¶ÊýÍò¹«ÃñµÄÐÅÏ¢


5.jpg


ÐÂ¼ÓÆÂÌìϹ¤»á´ú±í´ó»á¾ÍÒµÓë¾ÍÒµÑо¿Ëù£¨e2i£©ÔÚ±¾ÖÜÒ»£¨4ÔÂ5ÈÕ£©Ðû²¼ÉùÃ÷³Æ£¬ £¬ £¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜÒѾ­»á¼ûÆäÓû§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢½ÌÓý×ʸñºÍNRIC¡¢ÁªÏµ·½·¨ºÍ¾Íҵϸ½ÚµÈ¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ÔÚ3ÔÂ12ÈÕ£¬ £¬ £¬£¬£¬£¬£¬£¬ÆäµÚÈý·½¹©Ó¦ÉÌ¡ª¡ªÁªÂçÖÐÐÄÕÛÎñ¹«Ë¾i-vic InternationalÔ±¹¤µÄÓÊÏäÔâµ½´¹ÂÚ¹¥»÷£¬ £¬ £¬£¬£¬£¬£¬£¬¸ÃÓÊÏäµÄÔÆ¶Ë°üÀ¨ÁËÔ¼3Íò¸ö¼ÓÈëÁËe2i»î¶¯µÄÓû§ÐÅÏ¢£¬ £¬ £¬£¬£¬£¬£¬£¬¿ÉÊǸûú¹¹¾Ü¾øÍ¸Â¶×ܹ²Óм¸¶àÈËÔøÊ¹Óùýe2iµÄЧÀÍ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.straitstimes.com/tech/tech-news/personal-data-of-30000-people-who-use-ntucs-e2i-services-may-have-been-breached


6.Unit42Ðû²¼2020ÄêÍøÂç´¹ÂÚ¹¥»÷Ç÷ÊÆµÄ»ØÊ×±¨¸æ


6.jpg


Unit42Ðû²¼ÁË2020ÄêÍøÂç´¹ÂÚ¹¥»÷Ç÷ÊÆµÄ»ØÊ×±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬ £¬ £¬£¬£¬£¬£¬£¬´Ó2019µ½2020Ä꣬ £¬ £¬£¬£¬£¬£¬£¬¶ñÒâPDFÎļþ¼±¾çÔöÌíÁË1160£¥£¬ £¬ £¬£¬£¬£¬£¬£¬´Ó411800¸ö¶ñÒâÎļþÔöÌíµ½5224056¸ö¡£¡£¡£¡£¡£¡£ÎªÁËÓÕʹÓû§´¹ÂÚPDFÎļþÖеÄǶÈëµÄÁ´½Ó£¬ £¬ £¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ2020ÄêÖ÷ҪʹÓÃÁË5ÖÖ²î±ðµÄǰÑÔ£¬ £¬ £¬£¬£¬£¬£¬£¬·ÖΪαÔìµÄÑéÖ¤Â루ռ±È38.67%£©¡¢ÓÅ»Ýȯ£¨2.16%£©¡¢´øÓв¥·Å°´Å¥µÄ¾²Ì¬Í¼Ïñ£¨1.44%£©¡¢Îļþ¹²Ïí£¨0.84%£©ºÍµç×ÓÉÌÎñ£¨0.36%£©¡£¡£¡£¡£¡£¡£ÆäÖУ¬ £¬ £¬£¬£¬£¬£¬£¬´ó´ó¶¼¹¥»÷ʹÓÃÁËÒ»ÖÖͨÓÃÊÖÒÕ£ºÁ÷Á¿Öض¨Ïò¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/phishing-trends-with-pdf-files/