AdobeÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´MagentoºÍConnectÖжà¸öÎó²î£»£»£»£»£»£»LockBit³ÆÒÑÇÔÈ¡°£É­ÕÜ6TBµÄÊý¾Ý²¢ÀÕË÷5000ÍòÃÀÔª

Ðû²¼Ê±¼ä 2021-08-12

1.AdobeÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´MagentoºÍConnectÖжà¸öÎó²î


1.jpg


AdobeÐû²¼ÁËÖܶþÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Æäµç×ÓÉÌÎñƽ̨MagentoºÍConnectÖеÄ29¸öÎó²î¡£¡£ ¡£¡£¡£ÆäÖÐMagentoÖÐÐÞ¸´ÁË26¸öÎó²î£¬£¬£¬£¬£¬£¬£¬£¬½ÏΪÑÏÖØµÄÊÇÓÉÓÚÊäÈëÑéÖ¤²»µ±µ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36021¡¢CVE-2021-36024ºÍCVE-2021-36025µÈ£©ºÍÏÂÁî×¢Èëµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36022ºÍCVE-2021-36023£©µÈÎó²î¡£¡£ ¡£¡£¡£Adobe ConnectÖÐÐÞ¸´ÁË3¸öÎó²î£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2021-36061£©ºÍ·´ÉäÐÍXSSÎó²î£¨CVE-2021-36062ºÍCVE-2021-36063£©¡£¡£ ¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-preauth-vulnerabilities-in-magento/


2.CiscoÅû¶Mozilla FirefoxÖдúÂëÖ´ÐÐÎó²îµÄϸ½Ú


2.jpg


Cisco TalosÅû¶ÁËMozilla FirefoxÖдúÂëÖ´ÐÐÎó²îµÄϸ½Ú¡£¡£ ¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-29985£¬£¬£¬£¬£¬£¬£¬£¬±£´æÓÚFirefoxµÄnsBufferedStream×é¼þÖУ¨Stream»º³å¹¦Ð§µÄÒ»²¿·Ö£©¡£¡£ ¡£¡£¡£¹¥»÷Õß¿ÉÒÔÓÕʹÓû§»á¼ûÌØÖÆµÄ¶ñÒâÍøÒ³À´´¥·¢¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬£¬À´µ¼ÖÂÔÓÂÒÇéÐΣ¨race condition£©£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÊͷźóʹÓúÍÔ¶³Ì´úÂëÖ´ÐС£¡£ ¡£¡£¡£Ñо¿Ö°Ô±³ÆFirefox°æ±¾89.0.3 x64±£´æ¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬£¬½¨ÒéÁ¬Ã¦¸üС£¡£ ¡£¡£¡£ 

  

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/08/vuln-spotlight-firefox-code.html


3.LockBit³ÆÒÑÇÔÈ¡°£É­ÕÜ6TBµÄÊý¾Ý²¢ÀÕË÷5000ÍòÃÀÔª


3.jpg


ÀÕË÷ÍÅ»ïLockBit 2.0Éù³ÆÒÑÇÔÈ¡°£É­Õܹ«Ë¾Áè¼Ý6TBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬²¢ÀÕË÷5000ÍòÃÀÔª¡£¡£ ¡£¡£¡£°£É­ÕÜÊÇÈ«Çò×ÅÃûµÄIT×Éѯ¹«Ë¾£¬£¬£¬£¬£¬£¬£¬£¬ÊÐÖµ443ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬£¬Ð§ÀÍÓÚÆû³µ¡¢ÒøÐС¢Õþ¸®¡¢ÊÖÒÕ¡¢ÄÜÔ´¡¢µçÐŵÈÖÚ¶àÐÐÒµ¡£¡£ ¡£¡£¡£¸ÃÍÅ»ï³ÆÒÑͨ¹ý¹«Ë¾µÄ¡°ÄÚ²¿Ö°Ô±¡±»á¼û°£É­ÕܵÄÍøÂ磬£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÈôÊÇûÓÐÖ§¸¶Êê½ðËûÃǽ«ÔÚ8ÔÂ11ÈÕÍíÉÏÐû²¼Êý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬µ«11ÈÕÍíÉÏʺó¸ÃÍŻォй¶ʱ¼äÍÆ³Ùµ½ÁË8ÔÂ12ÈÕ20:43:00¡£¡£ ¡£¡£¡£ÍþвÇ鱨¹«Ë¾Hudson RockÌåÏÖ°£É­ÕÜÓÐ2500̨Ա¹¤ºÍÏàÖúͬ°éµÄµçÄÔÒÑÔâµ½ÈëÇÖ¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121048/data-breach/accenture-lockbit-2-0-ransomware-attack.html


4.ÓÎÏ·¹«Ë¾CrytekÈÏ¿ÉÆäÔøÔâÀÕË÷Èí¼þEgregorµÄ¹¥»÷


4.jpg


ÓÎÏ·¿ª·¢É̺Ϳ¯ÐÐÉÌCrytekÈÏ¿ÉÆäÔøÓÚ2020Äê10ÔÂÔâµ½ÀÕË÷Èí¼þEgregorµÄ¹¥»÷¡£¡£ ¡£¡£¡£EgregorÔø¹¥»÷¹ýÈ«ÇòÖÚ¶à×éÖ¯£¬£¬£¬£¬£¬£¬£¬£¬Èçθ绪µÄTransLinkµØÌúϵͳºÍKmartµÈ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖ÷Òª³ÉÔ±ÓÚ2021Äê2ÔÂÔÚ·¨¹úºÍÎÚ¿ËÀ¼Ö´·¨²¿·ÖÁªºÏÐж¯Öб»²¶¡£¡£ ¡£¡£¡£Crytek³Æ´Ë´Î¹¥»÷й¶Á˿ͻ§Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬ÐÕÃû¡¢Ö°Îñ¡¢¹«Ë¾Ãû³Æ¡¢µç×ÓÓʼþ¡¢¹«Ë¾µØµã¡¢µç»°ºÅÂëºÍµØÇøµÈ¡£¡£ ¡£¡£¡£¶øEgregor֮ǰÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾¹ûÕæµÄÊý¾Ý°üÀ¨ÓëWarFaceÏà¹ØµÄÎļþ¡¢MOBAÓÎÏ·ÔËÆø¾º¼¼³¡ºÍÓÐ¹ØÆäÍøÂçÔËÐÐÐÅÏ¢µÄÎļþ¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/crytek-confirms-egregor-ransomware-attack-customer-data-theft/


5.FireEye·¢Ã÷UNC215Õë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯


FireEye·¢Ã÷UNC215Õë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯.png


FireEye·¢Ã÷ÌØ¹¤×éÖ¯UNC215½üÆÚÕë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯¡£¡£ ¡£¡£¡£MandiantÔÚ2019ÄêÍ··¢Ã÷UNC215Õë¶ÔÖж«µÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃSharePointÖÐÎó²îCVE-2019-0604ÔÚÖж«ºÍÖÐÑǵÄÄ¿µÄ×°±¸ÉÏ×°ÖÃweb shellºÍFOCUSFJORD payload¡£¡£ ¡£¡£¡£³ýÁËÒ£²âÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÓëÒÔÉ«Áйú·À»ú¹¹ÏàÖú£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷×Ô2019Äê1ÔÂ×îÏȵÄÕë¶ÔÒÔÉ«ÁÐÕþ¸®»ú¹¹¡¢IT¹©Ó¦É̺͵çÐŹ«Ë¾µÄ¶à¸ö²¢Ðл£¬£¬£¬£¬£¬£¬£¬£¬Ê±´úUNC215 ʹÓÃеÄTTPÀ´Èƹý¼ì²â¡¢Òþ²Ø¹¥»÷»î¶¯²¢Ê¹ÓÿÉÐŹØÏµºáÏòÒÆ¶¯¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2021/08/unc215-chinese-espionage-campaign-in-israel.html


6.Unit 42Ðû²¼ÀÕË÷Èí¼þeCh0raixбäÖֵįÊÎö±¨¸æ


6.jpg


Unit 42Ðû²¼ÁËÓйØÀÕË÷Èí¼þeCh0raixбäÖֵįÊÎö±¨¸æ¡£¡£ ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬¸Ã±äÖÖʹÓÃÁËÎó²îCVE-2021-28799£¬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔSynologyÍøÂ總¼Ó´æ´¢(NAS)ºÍQuality Network Appliance Provider (QNAP)NAS×°±¸£¬£¬£¬£¬£¬£¬£¬£¬ÒѾ­ÔÚÒ°Íâ»îÔ¾Á˽üÒ»Äê¡£¡£ ¡£¡£¡£¸Ã±¨¸æ½¨ÒéÓû§¸üÐÂ×°±¸¹Ì¼þÒÔ±ÜÃâ´ËÀ๥»÷¡¢½¨ÉèÖØ´óµÄµÇ¼ÃÜÂëÒÔ±ÜÃⱩÁ¦ÆÆ½â£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°½öͨ¹ýÒÑʶ±ðIPµÄÓ²±àÂëÁбíÏÞÖÆÓëSOHO×°±¸µÄÅþÁ¬¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/ech0raix-ransomware-soho/