¶íÂÞ˹ISP Beeline 870Íò¿Í»§Êý¾Ýй¶£»£»£»£»£»D-LinkÌåÏÖ²»»áÐÞ¸´Â·ÓÉÆ÷RCE£»£»£»£»£»HildaCrypt¿ª·¢ÕßÐû²¼½âÃÜÃÜÔ¿

Ðû²¼Ê±¼ä 2019-10-08
1.ºÉÀ¼NCSCÌåÏÖеÄDNS´«ÊäЭÒ齫ʹDNS¼à¿ØÖØ´ó»¯

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ºÉÀ¼¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©ÔÚÒ»·Ý±¨¸æÖÐÌåÏÖеÄDNS´«ÊäЭÒ齫ʹDNS¼à¿ØÔ½·¢Öش󻯺ÍÔ½·¢ÄÑÌâ¡£¡£¡£¡£¡£¡£NCSCÚ¹ÊͳÆ£¬ £¬£¬ÐµÄDNS´«ÊäЭÒéʹ¼à¿Ø»òÐÞ¸ÄDNSÇëÇó±äµÃÔ½·¢ÄÑÌ⣬ £¬£¬Õâ¹ØÓÚµ±½ñ²»ÊÜÐÅÈεÄÍøÂçÊÇÓÐÒæµÄ¡£¡£¡£¡£¡£¡£Í¬Ê±Ô½À´Ô½¶àµØ½ÓÄÉеÄDNS´«ÊäЭÒ飬 £¬£¬ÀýÈç»ùÓÚTLSµÄDNSЭÒ飨DoT£©ºÍ»ùÓÚHTTPSµÄDNSЭÒ飨DoH£©¿ÉÄÜʹ×éÖ¯µÄÇå¾²¿ØÖÆÊ§Ð§£¬ £¬£¬Õâ»áµ¼ÖÂÄÚ²¿×ÊÔ´ÃüÃû̻¶»òÅþÁ¬¶Ï¿ªµÈ¸ºÃæÓ°Ïì¡£¡£¡£¡£¡£¡£ÕâЩ¸ºÃæÓ°ÏìºÜÄÑÔÚÍøÂç¼¶±ð»º½â£¬ £¬£¬²¢ÇÒÐèÒªÔÚDNS»ù´¡ÉèÊ©ºÍµ¥¸ö×°±¸ÉÏ»º½â¡£¡£¡£¡£¡£¡£GoogleºÍMozilla¶¼ÔÚ½üÆÚΪÆää¯ÀÀÆ÷£¨ChromeºÍFirefox£©¾ÙÐÐDoH²âÊÔ¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://english.ncsc.nl/publications/factsheets/2019/oktober/2/factsheet-dns-monitoring-will-get-harder

2.ºÚ¿ÍÈÔÔÚʹÓÃÒ»ÄêǰÐÞ¸´µÄDrupalgeddon2Îó²î·Ö·¢¶ñÒâÈí¼þ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Ñо¿Ö°Ô±·¢Ã÷¹¥»÷ÕßÈÔÔÚÆð¾¢Ê¹ÓÃÒ»ÄêǰÐÞ¸´µÄDrupalgeddon2Îó²î·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¸ÃÎó²îµÄCVE±àºÅΪCVE-2018-7600£¬ £¬£¬Ó°ÏìÁËDrupal°æ±¾6¡¢7ºÍ8£¬ £¬£¬²¢ÒÑÓÚ2018Äê3Ô±»ÐÞ¸´¡£¡£¡£¡£¡£¡£AkamaiÇå¾²Ñо¿Ô±Larry W. Cashdollar·¢Ã÷¸ÃÎó²îÈÔÈ»ÊÇ×î½üÊӲ쵽µÄ¶ñÒâ»î¶¯µÄÄ¿µÄ£¬ £¬£¬¹¥»÷ÕßÊÔͼʹÓøÃÎó²îÔÚδ´ò²¹¶¡µÄϵͳÉÏÔËÐÐǶÈëÔÚ.gifÎļþÖеĶñÒâ´úÂë¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯ËƺõÖ÷ÒªÕë¶Ô¸ß×ÅÃû¶ÈµÄÍøÕ¾£¬ £¬£¬²¢ÇÒûÓÐÕë¶ÔÌØ¶¨µÄÐÐÒµ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯·Ö·¢µÄ¶ñÒâÈí¼þ¿ÉɨÃèÍâµØÎļþÖÐµÄÆ¾Ö¤¡¢Ìæ»»ÍâµØ.htaccessÎļþ¡¢É¨ÃèMySQL my.cnfÉèÖÃÎļþ¡¢Ö´ÐÐÔ¶³ÌÎļþ¡¢ÉÏ´«ÎļþÒÔ¼°Æô¶¯Web ShellµÈ¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/new-campaign-targets-drupalgeddon2-flaw-install-malware

3.StreetEasyºÍSephoraй¶µÄÊý¾ÝÒѱ»HIBPÍøÕ¾ÊÕ¼

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

HIBPÒѾ­ÊÕ¼ÁËStreetEasyºÍSephoraÊý¾Ýй¶ÖеÄʧÔôÊý¾Ý£¬ £¬£¬Óû§¿ÉÒÔÔÚ¸ÃÍøÕ¾Éϼì²éÆäÐÅÏ¢ÊÇ·ñÒÑй¶¡£¡£¡£¡£¡£¡£Æ¾Ö¤HIBPµÄ˵·¨£¬ £¬£¬StreetEasyÔÚ2016Äê6ÔÂÔâµ½Êý¾Ýй¶£¬ £¬£¬¹²Óнü100ÍòÓû§Êܵ½Ó°Ï죬 £¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢ÐÕÃû¡¢ÃÜÂëºÍÓû§Ãû¡£¡£¡£¡£¡£¡£HIBP»¹ÌåÏÖSephora Southeast AsiaÔÚ2017Äê1ÔÂÔâµ½Êý¾Ýй¶£¬ £¬£¬ÓÐ78ÍòÃû¿Í»§µÄÊý¾Ý±»µÁ£¬ £¬£¬°üÀ¨¿Í»§µÄÉúÈÕ¡¢µç×ÓÓʼþµØµã¡¢ÖÖ×å¡¢ÐÔ±ð¡¢ÐÕÃûºÍÉíÌåÌØÕ÷µÈÐÅÏ¢¡£¡£¡£¡£¡£¡£ÕâÁ½´ÎÊÂÎñÖеÄÊý¾Ý¶¼ÒÑÔÚ°µÍøÂÛ̳ÉϳöÊÛ¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/check-if-you-are-in-the-sephora-and-streeteasy-data-breaches/

4.ÀÕË÷Èí¼þHildaCrypt¿ª·¢ÕßÐû²¼ÆäÖ÷½âÃÜÃÜÔ¿

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ÀÕË÷Èí¼þHildaCryptµÄ¿ª·¢ÕßÒѾöÒéÐû²¼ÆäÖ÷½âÃÜÃÜÔ¿£¬ £¬£¬Ê¹ÓøÃÃÜÔ¿¿É½¨Éè½âÃÜÆ÷£¬ £¬£¬´Ó¶ø×ÊÖúÊܺ¦Õ߻ָ´ÆäÎļþ¡£¡£¡£¡£¡£¡£±¾ÖÜÑо¿Ö°Ô±GrujaRS·¢Ã÷ÁËÒ»¸öеÄÀÕË÷Èí¼þ±äÖÖ²¢½«Æäʶ±ðΪSTOP£¬ £¬£¬µ«¸ÃÀÕË÷Èí¼þµÄ¿ª·¢ÕßÁªÏµÁËÑо¿Ö°Ô±²¢ÌåÏÖËüÏÖʵÉÏÊÇHildaCrypt±äÖÖ¡£¡£¡£¡£¡£¡£¸Ã¿ª·¢ÕßÌåÏÖ¸ÃÀÕË÷Èí¼þÖ»ÊdzöÓÚÓéÀÖÄ¿µÄ£¬ £¬£¬²¢Ðû²¼ÁËÖ÷½âÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£Michael GillespieÑо¿ÍŶÓÈ·ÈÏÁËÖ÷½âÃÜÃÜÔ¿µÄÕýµ±ÐÔ£¬ £¬£¬²¢Ðû²¼ÏàʶÃÜÆ÷¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hildacrypt-ransomware-developer-releases-decryption-keys/

5.¶íÂÞ˹»¥ÁªÍøÐ§ÀÍÌṩÉÌBeeline870Íò¿Í»§Êý¾Ýй¶

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ƾ֤¶íÂÞ˹ýÌåµÄ±¨µÀ£¬ £¬£¬À´×Ô¶íÂÞ˹»¥ÁªÍøÐ§ÀÍÌṩÉÌBeelineµÄ870ÍòÃû¿Í»§Êý¾ÝÕýÔÚÍøÉϳöÊۺ͹²Ïí¡£¡£¡£¡£¡£¡£ÕâЩÊý¾Ý°üÀ¨ÏêϸµÄСÎÒ˽¼ÒÐÅÏ¢£¬ £¬£¬ÈçÐÕÃû¡¢µØµã¡¢ÊÖ»úºÅÂëºÍ¼ÒÍ¥µç»°ºÅÂëµÈ¡£¡£¡£¡£¡£¡£BeelineÈ·ÈÏÁËÕâÒ»ÊÂÎñ£¬ £¬£¬²¢ÌåÏÖÊý¾Ýй¶±¬·¢ÔÚ2017Ä꣬ £¬£¬ÊÜÓ°ÏìµÄ¿Í»§ÎªÔÚ2016Äê11ÔÂ֮ǰע²á¼ÒÍ¥¿í´øµÄ¶íÂÞ˹Óû§¡£¡£¡£¡£¡£¡£ÆäʱBeelineÕÒµ½ÁËÊý¾Ýй¶µÄÔðÈÎÈË£¬ £¬£¬µ«Î´¹ûÕæ´ËÊÂÎñ¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÒѾ­±»ÔÚÍøÉϹ²Ïí£¬ £¬£¬°üÀ¨ÔÚTelegramƵµÀÉϹ²Ïí¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/data-breach-at-russian-isp-impacts-8-7-million-customers/

6.D-LinkÌåÏÖ²»»áÐÞ¸´½üÆÚÅû¶µÄ·ÓÉÆ÷RCEÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

FortinetÑо¿Ö°Ô±Åû¶ÁËÓ°ÏìһϵÁÐD-Link·ÓÉÆ÷µÄRCEÎó²î£¬ £¬£¬µ«D-LinkÌåÏÖ½«²»»áÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±Thanh Nguyen NguyenµÄ˵·¨£¬ £¬£¬¸ÃÎó²î£¨CVE-2019-16920£©ÓÚ2019Äê9Ô±»·¢Ã÷£¬ £¬£¬ÊôÓÚδ¾­Éí·ÝÑéÖ¤µÄÏÂÁî×¢ÈëÎó²î£¬ £¬£¬¸ÃÎó²îÓ°ÏìÁËDIR-655¡¢DIR-866L¡¢DIR-652ºÍDHP-1565²úƷϵÁÐÖеÄD-Link¹Ì¼þ¡£¡£¡£¡£¡£¡£¸ÃÎó²îµÄCVSS v3.1»ùÌìÖ°ÊýΪ9.8£¬ £¬£¬CVSS v2.0»ùÌìÖ°ÊýΪ10.0¡£¡£¡£¡£¡£¡£D-LinkÌåÏÖÓÉÓÚ²úÆ·ÒѵִïÉúÃüÖÜÆÚ£¨EOL£©£¬ £¬£¬Òò´Ë²»»áÐû²¼ÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/d-link-routers-contain-remote-code-execution-vulnerability/