AdobeÇå¾²¸üУ¬£¬£¬ÐÞ¸´MagentoºÍConnectÖжà¸öÎó²î£»£»£»LockBit³ÆÒÑÇÔÈ¡°£É­ÕÜ6TBµÄÊý¾Ý²¢ÀÕË÷5000ÍòÃÀÔª

Ðû²¼Ê±¼ä 2021-08-12

1.AdobeÇå¾²¸üУ¬£¬£¬ÐÞ¸´MagentoºÍConnectÖжà¸öÎó²î


1.jpg


AdobeÐû²¼ÁËÖܶþÇå¾²¸üУ¬£¬£¬ÐÞ¸´Æäµç×ÓÉÌÎñƽ̨MagentoºÍConnectÖеÄ29¸öÎó²î¡£¡£¡£¡£¡£¡£ÆäÖÐMagentoÖÐÐÞ¸´ÁË26¸öÎó²î£¬£¬£¬½ÏΪÑÏÖØµÄÊÇÓÉÓÚÊäÈëÑéÖ¤²»µ±µ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36021¡¢CVE-2021-36024ºÍCVE-2021-36025µÈ£©ºÍÏÂÁî×¢Èëµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36022ºÍCVE-2021-36023£©µÈÎó²î¡£¡£¡£¡£¡£¡£Adobe ConnectÖÐÐÞ¸´ÁË3¸öÎó²î£¬£¬£¬°üÀ¨Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2021-36061£©ºÍ·´ÉäÐÍXSSÎó²î£¨CVE-2021-36062ºÍCVE-2021-36063£©¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-preauth-vulnerabilities-in-magento/


2.CiscoÅû¶Mozilla FirefoxÖдúÂëÖ´ÐÐÎó²îµÄϸ½Ú


2.jpg


Cisco TalosÅû¶ÁËMozilla FirefoxÖдúÂëÖ´ÐÐÎó²îµÄϸ½Ú¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-29985£¬£¬£¬±£´æÓÚFirefoxµÄnsBufferedStream×é¼þÖУ¨Stream»º³å¹¦Ð§µÄÒ»²¿·Ö£©¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔÓÕʹÓû§»á¼ûÌØÖÆµÄ¶ñÒâÍøÒ³À´´¥·¢¸ÃÎó²î£¬£¬£¬À´µ¼ÖÂÔÓÂÒÇéÐΣ¨race condition£©£¬£¬£¬´Ó¶øµ¼ÖÂÊͷźóʹÓúÍÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆFirefox°æ±¾89.0.3 x64±£´æ¸ÃÎó²î£¬£¬£¬½¨ÒéÁ¬Ã¦¸üС£¡£¡£¡£¡£¡£ 

  

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/08/vuln-spotlight-firefox-code.html


3.LockBit³ÆÒÑÇÔÈ¡°£É­ÕÜ6TBµÄÊý¾Ý²¢ÀÕË÷5000ÍòÃÀÔª


3.jpg


ÀÕË÷ÍÅ»ïLockBit 2.0Éù³ÆÒÑÇÔÈ¡°£É­Õܹ«Ë¾Áè¼Ý6TBµÄÊý¾Ý£¬£¬£¬²¢ÀÕË÷5000ÍòÃÀÔª¡£¡£¡£¡£¡£¡£°£É­ÕÜÊÇÈ«Çò×ÅÃûµÄIT×Éѯ¹«Ë¾£¬£¬£¬ÊÐÖµ443ÒÚÃÀÔª£¬£¬£¬Ð§ÀÍÓÚÆû³µ¡¢ÒøÐС¢Õþ¸®¡¢ÊÖÒÕ¡¢ÄÜÔ´¡¢µçÐŵÈÖÚ¶àÐÐÒµ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï³ÆÒÑͨ¹ý¹«Ë¾µÄ¡°ÄÚ²¿Ö°Ô±¡±»á¼û°£É­ÕܵÄÍøÂ磬£¬£¬²¢ÌåÏÖÈôÊÇûÓÐÖ§¸¶Êê½ðËûÃǽ«ÔÚ8ÔÂ11ÈÕÍíÉÏÐû²¼Êý¾Ý£¬£¬£¬µ«11ÈÕÍíÉÏʺó¸ÃÍŻォй¶ʱ¼äÍÆ³Ùµ½ÁË8ÔÂ12ÈÕ20:43:00¡£¡£¡£¡£¡£¡£ÍþвÇ鱨¹«Ë¾Hudson RockÌåÏÖ°£É­ÕÜÓÐ2500̨Ա¹¤ºÍÏàÖúͬ°éµÄµçÄÔÒÑÔâµ½ÈëÇÖ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121048/data-breach/accenture-lockbit-2-0-ransomware-attack.html


4.ÓÎÏ·¹«Ë¾CrytekÈÏ¿ÉÆäÔøÔâÀÕË÷Èí¼þEgregorµÄ¹¥»÷


4.jpg


ÓÎÏ·¿ª·¢É̺Ϳ¯ÐÐÉÌCrytekÈÏ¿ÉÆäÔøÓÚ2020Äê10ÔÂÔâµ½ÀÕË÷Èí¼þEgregorµÄ¹¥»÷¡£¡£¡£¡£¡£¡£EgregorÔø¹¥»÷¹ýÈ«ÇòÖÚ¶à×éÖ¯£¬£¬£¬Èçθ绪µÄTransLinkµØÌúϵͳºÍKmartµÈ£¬£¬£¬ÆäÖ÷Òª³ÉÔ±ÓÚ2021Äê2ÔÂÔÚ·¨¹úºÍÎÚ¿ËÀ¼Ö´·¨²¿·ÖÁªºÏÐж¯Öб»²¶¡£¡£¡£¡£¡£¡£Crytek³Æ´Ë´Î¹¥»÷й¶Á˿ͻ§Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬ÐÕÃû¡¢Ö°Îñ¡¢¹«Ë¾Ãû³Æ¡¢µç×ÓÓʼþ¡¢¹«Ë¾µØµã¡¢µç»°ºÅÂëºÍµØÇøµÈ¡£¡£¡£¡£¡£¡£¶øEgregor֮ǰÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾¹ûÕæµÄÊý¾Ý°üÀ¨ÓëWarFaceÏà¹ØµÄÎļþ¡¢MOBAÓÎÏ·ÔËÆø¾º¼¼³¡ºÍÓÐ¹ØÆäÍøÂçÔËÐÐÐÅÏ¢µÄÎļþ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/crytek-confirms-egregor-ransomware-attack-customer-data-theft/


5.FireEye·¢Ã÷UNC215Õë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯


FireEye·¢Ã÷UNC215Õë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯.png


FireEye·¢Ã÷ÌØ¹¤×éÖ¯UNC215½üÆÚÕë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£MandiantÔÚ2019ÄêÍ··¢Ã÷UNC215Õë¶ÔÖж«µÄ¹¥»÷»î¶¯£¬£¬£¬¹¥»÷ÕßʹÓÃSharePointÖÐÎó²îCVE-2019-0604ÔÚÖж«ºÍÖÐÑǵÄÄ¿µÄ×°±¸ÉÏ×°ÖÃweb shellºÍFOCUSFJORD payload¡£¡£¡£¡£¡£¡£³ýÁËÒ£²âÊý¾Ý£¬£¬£¬Ñо¿Ö°Ô±»¹ÓëÒÔÉ«Áйú·À»ú¹¹ÏàÖú£¬£¬£¬·¢Ã÷×Ô2019Äê1ÔÂ×îÏȵÄÕë¶ÔÒÔÉ«ÁÐÕþ¸®»ú¹¹¡¢IT¹©Ó¦É̺͵çÐŹ«Ë¾µÄ¶à¸ö²¢Ðл£¬£¬£¬Ê±´úUNC215 ʹÓÃеÄTTPÀ´Èƹý¼ì²â¡¢Òþ²Ø¹¥»÷»î¶¯²¢Ê¹ÓÿÉÐŹØÏµºáÏòÒÆ¶¯¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2021/08/unc215-chinese-espionage-campaign-in-israel.html


6.Unit 42Ðû²¼ÀÕË÷Èí¼þeCh0raixбäÖֵįÊÎö±¨¸æ


6.jpg


Unit 42Ðû²¼ÁËÓйØÀÕË÷Èí¼þeCh0raixбäÖֵįÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬¸Ã±äÖÖʹÓÃÁËÎó²îCVE-2021-28799£¬£¬£¬Ö÷ÒªÕë¶ÔSynologyÍøÂ總¼Ó´æ´¢(NAS)ºÍQuality Network Appliance Provider (QNAP)NAS×°±¸£¬£¬£¬ÒѾ­ÔÚÒ°Íâ»îÔ¾Á˽üÒ»Äê¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ½¨ÒéÓû§¸üÐÂ×°±¸¹Ì¼þÒÔ±ÜÃâ´ËÀ๥»÷¡¢½¨ÉèÖØ´óµÄµÇ¼ÃÜÂëÒÔ±ÜÃⱩÁ¦ÆÆ½â£¬£¬£¬ÒÔ¼°½öͨ¹ýÒÑʶ±ðIPµÄÓ²±àÂëÁбíÏÞÖÆÓëSOHO×°±¸µÄÅþÁ¬¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/ech0raix-ransomware-soho/