Area1±¨¸æ¶íÂÞ˹ͨ¹ýEximÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡£¡£¡£¡£¡£¡£¡£»£»£»£»£»£»Naval Dome·¢Ã÷×Ô2ÔÂÒÔÀ´Õë¶Ôº½Ô˵Ĺ¥»÷¼¤Ôö400%

Ðû²¼Ê±¼ä 2020-06-09

1.Area1Ðû²¼±¨¸æ£¬£¬£¬£¬¶íÂÞ˹ͨ¹ýEximÊðÀí(MTA)ÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Area1Ðû²¼±¨¸æ£¬£¬£¬£¬ÌåÏÖ¶íÂÞ˹ͨ¹ýEximÊðÀí(MTA)ÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡¡£¡£¡£¡£¡£¡£¡£ÃÀ¹úÍøÂçÇå¾²×ÉѯÖÒÑԳƣ¬£¬£¬£¬×Ô2019Äê8ÔÂÒÔÀ´£¬£¬£¬£¬Óë¶íÂÞ˹¾ü·½ÓйصĺڿÍÒ»Ö±ÔÚʹÓÃÃÀ¹úEximÓʼþ´«ÊäÊðÀí(MTA)Èí¼þÖеÄÎó²î(CVE-2019-10149)¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿ÉÒÔÓ°ÏìEximµÄ4.87µ½4.91°æ±¾£¬£¬£¬£¬Ê¹ÓÃËü¿ÉÒÔÔöÌíÌØÈ¨Óû§¡¢½ûÓÃÍøÂçÇå¾²ÉèÖá¢ÌᳫBEC´¹ÂڻµÈ¡£¡£¡£¡£¡£¡£¡£¶øÏÖÒÑÈ·¶¨2018ÄêÃÀ¹ú´óÑ¡ÖÐÖÁÉÙ44ÃûºòÑ¡ÈËʹÓÃÁËEximЧÀÍÆ÷£¬£¬£¬£¬¶ø2020ÄêÃÀ¹ú´óÑ¡ÖÁÉÙ50ÃûºòÑ¡ÈËʹÓÃEximЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬Area1È·ÐÅ2020ÄêÑ¡¾ÙÖеÄÏÖÈκòÑ¡ÈËÔÚ2018ÄêÑ¡¾Ùµ½2019Äê2ÔÂÖ®¼ä¿Ï¶¨»áÊܵ½CVE-2019-10149µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cdn.area1security.com/reports/Area-1-Security-EximReport.pdf


2.BolsterÐû²¼2020ÄêµÚÒ»¼¾¶ÈÍøÂç´¹ÂÚºÍÔÚÏßڲƭ±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


·Àڲƭ¹«Ë¾BolsterÐû²¼ÁË2020ÄêµÚÒ»¼¾¶ÈÍøÂç´¹ÂÚºÍÔÚÏßڲƭ±¨¸æ£¬£¬£¬£¬·¢Ã÷ÓëCOVID-19Ïà¹ØµÄÚ²Æ­ÍøÕ¾¼¤Ôö¡£¡£¡£¡£¡£¡£¡£ÔÚ2020ÄêµÚÒ»¼¾¶È£¬£¬£¬£¬Bolster×ܹ²¼ì²âµ½854441¸öÍøÂç´¹ÂÚºÍÕ©Æ­ÍøÕ¾ºÍԼĪ400Íò¸ö¿ÉÒÉÍøÕ¾£¬£¬£¬£¬ÆäÖÐÔ¼30£¥ÓëCOVID-19ÓйØ¡£¡£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬´ËÀàÍøÕ¾µÄÔöÌíÁ¿Ò²ÔÚÒ»Ö±ÔöÌí£¬£¬£¬£¬´ÓÒ»Ô·ÝÌìÌì3142¸öеÄÍøÒ³ÔöÌíµ½ÈýÔ·Ý8342¸öÍøÒ³£¬£¬£¬£¬Ö±µ½3ÔÂ19ÈÕµÖ´ïá۷壬£¬£¬£¬Ò»ÌìÄÚ½¨ÉèÁËÁè¼Ý25000¸öеÄÍøÒ³¡£¡£¡£¡£¡£¡£¡£SaaSºÍµçÐÅÐÐÒµÊÇÊÜÍøÂç´¹ÂÚÕ©Æ­Ó°Ïì×î´óµÄÐÐÒµ£¬£¬£¬£¬Æä´ÎÊǽðÈÚ¡¢ÁãÊÛºÍÁ÷ýÌåÐÐÒµ¡£¡£¡£¡£¡£¡£¡£Bolster»¹·¢Ã÷Á˶à¸öÕ©Æ­ÍøÕ¾ÊÛÂôαÔìµÄCOVID-19¼ÓÃÜÇ®±ÒºÍ¼ÓÃÜÇ®°ü£¬£¬£¬£¬ÆäÄ¿µÄÊÇÇÔÈ¡Êý¾ÝÒÔÓÃÓÚδÀ´µÄÍøÂç´¹ÂÚ¡¢¶ñÒâÈí¼þ·Ö·¢ºÍÇÔȡƾ֤¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.businesswire.com/news/home/20200513005152/en/Bolster%E2%80%99s-Q1-2020-State-Phishing-Online-Fraud


3.Naval Dome·¢Ã÷£¬£¬£¬£¬×Ô2ÔÂÒÔÀ´Õë¶Ôº½Ô˵ĺڿ͹¥»÷¼¤Ôö400%


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÒÔÉ«Áк£ÉÏÍøÂçÇ徲ר¼ÒNaval Dome³Æ£¬£¬£¬£¬×Ô2020Äê2ÔÂÒÔÀ´£¬£¬£¬£¬Õë¶Ôº½Ô˵ĺڿ͹¥»÷¼¤ÔöÁË400%¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÔΪCOVID-19ʹµÃº£ÉÏÄÜÔ´²¿·Ö±ÈÒÔǰ¸üÈÝÒ×Êܵ½ÍøÂç¹¥»÷£¬£¬£¬£¬Í¬Ê±Ê¹¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þºÍ´¹ÂÚÓʼþ¼¤Ôö¡£¡£¡£¡£¡£¡£¡£Naval DomeµÄCEO Itai SelaÌåÏÖ£¬£¬£¬£¬ÓÉÓÚCovid-19µ¼ÖµÄÉç½»ÏÞÖÆºÍ¸ôÀë²½·¥£¬£¬£¬£¬ÆÈʹԭʼװ±¸ÖÆÔìÉÌ£¨OEM£©¡¢ÊÖÒÕÖ°Ô±ºÍ¹©Ó¦É̽«Ô­±¾×ÔÁ¦µÄϽµµÍ¬½Óµ½InternetÉÏ£¬£¬£¬£¬OEMÊÖÒÕÖ°Ô±ÎÞ·¨µ½´¬Ö»ºÍ×ê»úÉÏÉý¼¶OTϵͳ£¬£¬£¬£¬ÕâЩ¶¼µ¼Ö¸ÃÐÐÒµ¸üÒ×ÓÚ±»¹¥»÷¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.offshore-energy.biz/naval-dome-400-increase-in-attempted-hacks-since-february-2020/


4.WordPress²å¼þPageLayer±£´æÎó²î£¬£¬£¬£¬Ó°ÏìÁè¼Ý20Íò¸öÍøÕ¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


WordfenceÍŶӷ¢Ã÷WordPress²å¼þPageLayer±£´æÁ½¸öÎó²î£¬£¬£¬£¬¿ÉÄÜ»áÓ°ÏìÁè¼Ý20Íò¸öÍøÕ¾¡£¡£¡£¡£¡£¡£¡£µÚÒ»¸öÎó²îµÄCVSSµÄÆÀ·ÖΪ7.4£¬£¬£¬£¬¸ÃÎó²îµÄ±£´æÊÇÓÉÓÚ²å¼þµÄAJAX¶ËµãÖ»ÊÇͨ¹ýÒ»¸öÉí·ÝÑéÖ¤µÄ»á»°¼ì²éÇëÇóÊÇ·ñÀ´×Ô /wp-admin£¬£¬£¬£¬¶ø²»¼ì²é·¢ËÍÇëÇóµÄÓû§µÄȨÏÞ£¬£¬£¬£¬Òò´ËÈκλá¼ûȨÏÞµÄÓû§¶¼¿ÉÒÔÖ´ÐÐÈκβÙ×÷£¬£¬£¬£¬¸ÃÎó²î¿É±»Ê¹ÓÃɾ³ýÄÚÈÝ»òÏòÏÖÓÐÒ³Ãæ×¢Èë¶ñÒâÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÎó²îµÄCVSSÆÀ·ÖΪ8.8·Ö£¬£¬£¬£¬ÊÇÓÉÓÚȱÉÙCSRF±£»£»£»£»£»£»¤£¬£¬£¬£¬ºÚ¿Í¿ÉÒÔʹÓøÃÎó²îÏòÕ¾µãÒ³Ãæ×¢Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¿ª·¢Ö°Ô±ÒѾ­Ðû²¼ÁËÇå¾²²¹¶¡ÒÔ¶ÔÎó²î¾ÙÐÐÐÞ¸´¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/06/07/pagelayer-wordpress-plugin-vulnerabilities-risked-over-200k-websites/


5.ºÚ¿ÍʹÓÃÍøÂç´¹ÂÚ¹¥»÷µÂ¹úСÎÒ˽¼Ò·À»¤×°±¸¹©Ó¦Á´


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


IBM X-ForceÑо¿Ö°Ô±Ðû²¼±¨¸æÌåÏÖ£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÍøÂç´¹ÂÚ¹¥»÷Ò»¼ÒµÂ¹ú¹«Ë¾µÄ¸ß²ãÖÎÀíÖ°Ô±£¬£¬£¬£¬¸Ã¹«Ë¾µÄÖ÷ÒªÊÂÇéÊDzɹºÐ¡ÎÒ˽¼Ò·À»¤×°±¸£¨PPE£©£¬£¬£¬£¬ÏÖÔÚºÚ¿ÍÒÑÊÔͼÇÔÈ¡100¶àλ¸ß¹ÜµÄƾ֤¡£¡£¡£¡£¡£¡£¡£3ÔÂ30ÈÕ£¬£¬£¬£¬µÂ¹úÕþ¸®Óë¸Ã¹ú´óÐ͹«Ë¾¾ÙÐоۻᣬ£¬£¬£¬ÒªÇóÆäЭÖúµÂ¹ú¹ºÖÃPPEÖ®ºó£¬£¬£¬£¬Ï®»÷¾Í×îÏÈÁË¡£¡£¡£¡£¡£¡£¡£Í³Ò»Ì죬£¬£¬£¬ÕâЩ´óÐ͹«Ë¾ÖеÄÒ»¸ö¹«Ë¾µÄ¸ß¹ÜÊÕµ½ÁËÀ´×Ô¶íÂÞ˹IPµØµãµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£Êܺ¦ÕßÖÐÌ©°ëΪĿµÄ¹«Ë¾ÖÐÓëÔËÓª¡¢²ÆÎñºÍ²É¹ºÏà¹ØµÄ¸ß¹Ü£¬£¬£¬£¬ÁíÒ»°ëÊôÓڸù«Ë¾µÄÏàÖú¹«Ë¾µÄ¸ß¹Ü¡£¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬ºÚ¿ÍʹÓÃǶÈëʽ³¬Á´½Ó£¬£¬£¬£¬½«Êܺ¦ÕßÖØ¶¨Ïòµ½Î±×°³ÉMicrosoftµÇ¼±íµ¥µÄÍøÂç´¹ÂÚµÇÂ¼Ò³Ãæ£¬£¬£¬£¬²¢½«ÍøÂçµ½µÄÊý¾Ý·¢Ë͵½¶à¸öYandexµç×ÓÓʼþÕÊ»§¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-are-attacking-the-german-ppe-supply-chain/


6.еÄÍøÂç´¹Âڻͨ¹ýStackBlitz¹¤¾ßÍйܴ¹ÂÚÒ³Ãæ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Zscaler ThreatLabzÍŶӷ¢Ã÷£¬£¬£¬£¬ÏÖÔÚ±£´æ¶àÖÖʹÓÃStackBlitz¹¤¾ßµÄÍøÂç´¹Âڻ£¬£¬£¬£¬ºÚ¿ÍʹÓÃÁËÔ¤Ö¸µ¼¿â¹¦Ð§½«ÍйܵÄÍøÒ³´ÓЧÀÍÆ÷¶ËÖ±½Ó¹ý¶Éµ½¿Í»§¶Ë¡£¡£¡£¡£¡£¡£¡£ÔÚµÚÒ»ÖÖ´¹ÂڻÖУ¬£¬£¬£¬ºÚ¿Íαװ³ÉÒ½ÁÆÎÀÉú×éÖ¯£¬£¬£¬£¬Í¨¹ýOneDrive¹²ÏíЧÀÍ·¢ËÍÎĵµ£¬£¬£¬£¬Óû§Ò»µ©µã»÷ÏÂÔØÁ´½Ó£¬£¬£¬£¬¾Í»á±»Öض¨Ïòµ½Outlook´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£¡£¡£ÔÚÁíÒ»ÖÖ´¹ÂڻÖУ¬£¬£¬£¬´¹ÂÚÓʼþÖеÄÁ´½ÓÖ¸ÏòÒ»¸öÍøÒ³£¬£¬£¬£¬²¢°üÀ¨Ò»ÌõÐÂÎÅ˵Ã÷ÄúÊÕµ½ÁË´øÓÐÏà¹ØÎĵµÏÂÔØÁ´½ÓµÄ¹²ÏíÎĵµ£¬£¬£¬£¬Óû§µ¥»÷ÏÂÔØÁ´½Óºó±ã»á±»Öض¨Ïòµ½OneDriveÍøÂç´¹ÂÚÍøÒ³¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zscaler.com/blogs/research/new-campaign-abusing-stackblitz-tool-host-phishing-pages