¶íÂÞ˹ISP Beeline 870Íò¿Í»§Êý¾Ýй¶ £»£»£» £»£»D-LinkÌåÏÖ²»»áÐÞ¸´Â·ÓÉÆ÷RCE £»£»£» £»£»HildaCrypt¿ª·¢ÕßÐû²¼½âÃÜÃÜÔ¿

Ðû²¼Ê±¼ä 2019-10-08
1.ºÉÀ¼NCSCÌåÏÖеÄDNS´«ÊäЭÒ齫ʹDNS¼à¿ØÖØ´ó»¯

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ºÉÀ¼¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©ÔÚÒ»·Ý±¨¸æÖÐÌåÏÖеÄDNS´«ÊäЭÒ齫ʹDNS¼à¿ØÔ½·¢Öش󻯺ÍÔ½·¢ÄÑÌâ¡£¡£¡£¡£NCSCÚ¹ÊͳÆ£¬£¬£¬£¬£¬£¬ÐµÄDNS´«ÊäЭÒéʹ¼à¿Ø»òÐÞ¸ÄDNSÇëÇó±äµÃÔ½·¢ÄÑÌ⣬£¬£¬£¬£¬£¬Õâ¹ØÓÚµ±½ñ²»ÊÜÐÅÈεÄÍøÂçÊÇÓÐÒæµÄ¡£¡£¡£¡£Í¬Ê±Ô½À´Ô½¶àµØ½ÓÄÉеÄDNS´«ÊäЭÒ飬£¬£¬£¬£¬£¬ÀýÈç»ùÓÚTLSµÄDNSЭÒ飨DoT£©ºÍ»ùÓÚHTTPSµÄDNSЭÒ飨DoH£©¿ÉÄÜʹ×éÖ¯µÄÇå¾²¿ØÖÆÊ§Ð§£¬£¬£¬£¬£¬£¬Õâ»áµ¼ÖÂÄÚ²¿×ÊÔ´ÃüÃû̻¶»òÅþÁ¬¶Ï¿ªµÈ¸ºÃæÓ°Ïì¡£¡£¡£¡£ÕâЩ¸ºÃæÓ°ÏìºÜÄÑÔÚÍøÂç¼¶±ð»º½â£¬£¬£¬£¬£¬£¬²¢ÇÒÐèÒªÔÚDNS»ù´¡ÉèÊ©ºÍµ¥¸ö×°±¸ÉÏ»º½â¡£¡£¡£¡£GoogleºÍMozilla¶¼ÔÚ½üÆÚΪÆää¯ÀÀÆ÷£¨ChromeºÍFirefox£©¾ÙÐÐDoH²âÊÔ¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://english.ncsc.nl/publications/factsheets/2019/oktober/2/factsheet-dns-monitoring-will-get-harder

2.ºÚ¿ÍÈÔÔÚʹÓÃÒ»ÄêǰÐÞ¸´µÄDrupalgeddon2Îó²î·Ö·¢¶ñÒâÈí¼þ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Ñо¿Ö°Ô±·¢Ã÷¹¥»÷ÕßÈÔÔÚÆð¾¢Ê¹ÓÃÒ»ÄêǰÐÞ¸´µÄDrupalgeddon2Îó²î·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¸ÃÎó²îµÄCVE±àºÅΪCVE-2018-7600£¬£¬£¬£¬£¬£¬Ó°ÏìÁËDrupal°æ±¾6¡¢7ºÍ8£¬£¬£¬£¬£¬£¬²¢ÒÑÓÚ2018Äê3Ô±»ÐÞ¸´¡£¡£¡£¡£AkamaiÇå¾²Ñо¿Ô±Larry W. Cashdollar·¢Ã÷¸ÃÎó²îÈÔÈ»ÊÇ×î½üÊӲ쵽µÄ¶ñÒâ»î¶¯µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊÔͼʹÓøÃÎó²îÔÚδ´ò²¹¶¡µÄϵͳÉÏÔËÐÐǶÈëÔÚ.gifÎļþÖеĶñÒâ´úÂë¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯ËƺõÖ÷ÒªÕë¶Ô¸ß×ÅÃû¶ÈµÄÍøÕ¾£¬£¬£¬£¬£¬£¬²¢ÇÒûÓÐÕë¶ÔÌØ¶¨µÄÐÐÒµ¡£¡£¡£¡£¸Ã»î¶¯·Ö·¢µÄ¶ñÒâÈí¼þ¿ÉɨÃèÍâµØÎļþÖÐµÄÆ¾Ö¤¡¢Ìæ»»ÍâµØ.htaccessÎļþ¡¢É¨ÃèMySQL my.cnfÉèÖÃÎļþ¡¢Ö´ÐÐÔ¶³ÌÎļþ¡¢ÉÏ´«ÎļþÒÔ¼°Æô¶¯Web ShellµÈ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/new-campaign-targets-drupalgeddon2-flaw-install-malware

3.StreetEasyºÍSephoraй¶µÄÊý¾ÝÒѱ»HIBPÍøÕ¾ÊÕ¼

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

HIBPÒѾ­ÊÕ¼ÁËStreetEasyºÍSephoraÊý¾Ýй¶ÖеÄʧÔôÊý¾Ý£¬£¬£¬£¬£¬£¬Óû§¿ÉÒÔÔÚ¸ÃÍøÕ¾Éϼì²éÆäÐÅÏ¢ÊÇ·ñÒÑй¶¡£¡£¡£¡£Æ¾Ö¤HIBPµÄ˵·¨£¬£¬£¬£¬£¬£¬StreetEasyÔÚ2016Äê6ÔÂÔâµ½Êý¾Ýй¶£¬£¬£¬£¬£¬£¬¹²Óнü100ÍòÓû§Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢ÐÕÃû¡¢ÃÜÂëºÍÓû§Ãû¡£¡£¡£¡£HIBP»¹ÌåÏÖSephora Southeast AsiaÔÚ2017Äê1ÔÂÔâµ½Êý¾Ýй¶£¬£¬£¬£¬£¬£¬ÓÐ78ÍòÃû¿Í»§µÄÊý¾Ý±»µÁ£¬£¬£¬£¬£¬£¬°üÀ¨¿Í»§µÄÉúÈÕ¡¢µç×ÓÓʼþµØµã¡¢ÖÖ×å¡¢ÐÔ±ð¡¢ÐÕÃûºÍÉíÌåÌØÕ÷µÈÐÅÏ¢¡£¡£¡£¡£ÕâÁ½´ÎÊÂÎñÖеÄÊý¾Ý¶¼ÒÑÔÚ°µÍøÂÛ̳ÉϳöÊÛ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/check-if-you-are-in-the-sephora-and-streeteasy-data-breaches/

4.ÀÕË÷Èí¼þHildaCrypt¿ª·¢ÕßÐû²¼ÆäÖ÷½âÃÜÃÜÔ¿

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ÀÕË÷Èí¼þHildaCryptµÄ¿ª·¢ÕßÒѾöÒéÐû²¼ÆäÖ÷½âÃÜÃÜÔ¿£¬£¬£¬£¬£¬£¬Ê¹ÓøÃÃÜÔ¿¿É½¨Éè½âÃÜÆ÷£¬£¬£¬£¬£¬£¬´Ó¶ø×ÊÖúÊܺ¦Õ߻ָ´ÆäÎļþ¡£¡£¡£¡£±¾ÖÜÑо¿Ö°Ô±GrujaRS·¢Ã÷ÁËÒ»¸öеÄÀÕË÷Èí¼þ±äÖÖ²¢½«Æäʶ±ðΪSTOP£¬£¬£¬£¬£¬£¬µ«¸ÃÀÕË÷Èí¼þµÄ¿ª·¢ÕßÁªÏµÁËÑо¿Ö°Ô±²¢ÌåÏÖËüÏÖʵÉÏÊÇHildaCrypt±äÖÖ¡£¡£¡£¡£¸Ã¿ª·¢ÕßÌåÏÖ¸ÃÀÕË÷Èí¼þÖ»ÊdzöÓÚÓéÀÖÄ¿µÄ£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÖ÷½âÃÜÃÜÔ¿¡£¡£¡£¡£Michael GillespieÑо¿ÍŶÓÈ·ÈÏÁËÖ÷½âÃÜÃÜÔ¿µÄÕýµ±ÐÔ£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÏàʶÃÜÆ÷¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hildacrypt-ransomware-developer-releases-decryption-keys/

5.¶íÂÞ˹»¥ÁªÍøÐ§ÀÍÌṩÉÌBeeline870Íò¿Í»§Êý¾Ýй¶

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ƾ֤¶íÂÞ˹ýÌåµÄ±¨µÀ£¬£¬£¬£¬£¬£¬À´×Ô¶íÂÞ˹»¥ÁªÍøÐ§ÀÍÌṩÉÌBeelineµÄ870ÍòÃû¿Í»§Êý¾ÝÕýÔÚÍøÉϳöÊۺ͹²Ïí¡£¡£¡£¡£ÕâЩÊý¾Ý°üÀ¨ÏêϸµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢µØµã¡¢ÊÖ»úºÅÂëºÍ¼ÒÍ¥µç»°ºÅÂëµÈ¡£¡£¡£¡£BeelineÈ·ÈÏÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÊý¾Ýй¶±¬·¢ÔÚ2017Ä꣬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ¿Í»§ÎªÔÚ2016Äê11ÔÂ֮ǰע²á¼ÒÍ¥¿í´øµÄ¶íÂÞ˹Óû§¡£¡£¡£¡£ÆäʱBeelineÕÒµ½ÁËÊý¾Ýй¶µÄÔðÈÎÈË£¬£¬£¬£¬£¬£¬µ«Î´¹ûÕæ´ËÊÂÎñ¡£¡£¡£¡£ÕâЩÊý¾ÝÒѾ­±»ÔÚÍøÉϹ²Ïí£¬£¬£¬£¬£¬£¬°üÀ¨ÔÚTelegramƵµÀÉϹ²Ïí¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/data-breach-at-russian-isp-impacts-8-7-million-customers/

6.D-LinkÌåÏÖ²»»áÐÞ¸´½üÆÚÅû¶µÄ·ÓÉÆ÷RCEÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

FortinetÑо¿Ö°Ô±Åû¶ÁËÓ°ÏìһϵÁÐD-Link·ÓÉÆ÷µÄRCEÎó²î£¬£¬£¬£¬£¬£¬µ«D-LinkÌåÏÖ½«²»»áÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±Thanh Nguyen NguyenµÄ˵·¨£¬£¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-16920£©ÓÚ2019Äê9Ô±»·¢Ã÷£¬£¬£¬£¬£¬£¬ÊôÓÚδ¾­Éí·ÝÑéÖ¤µÄÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËDIR-655¡¢DIR-866L¡¢DIR-652ºÍDHP-1565²úƷϵÁÐÖеÄD-Link¹Ì¼þ¡£¡£¡£¡£¸ÃÎó²îµÄCVSS v3.1»ùÌìÖ°ÊýΪ9.8£¬£¬£¬£¬£¬£¬CVSS v2.0»ùÌìÖ°ÊýΪ10.0¡£¡£¡£¡£D-LinkÌåÏÖÓÉÓÚ²úÆ·ÒѵִïÉúÃüÖÜÆÚ£¨EOL£©£¬£¬£¬£¬£¬£¬Òò´Ë²»»áÐû²¼ÐÞ¸´²¹¶¡¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/d-link-routers-contain-remote-code-execution-vulnerability/