MozillaÐû²¼À×ÄñÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÑÏÖØµÄÎó²î£»£»£»ÐÂThiefQuest±äÌå»ìÏý¹¦Ð§Ãû³Æ£¬£¬£¬£¬£¬£¬£¬×·×ÙÄѶÈÔöÌí
Ðû²¼Ê±¼ä 2020-07-201.MozillaÐû²¼À×ÄñÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÑÏÖØµÄÎó²î
MozillaΪÀ×Äñ£¨Thunderbird£©Ðû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÑÏÖØµÄÎó²î¡£¡£¡£¡£´Ë´Î¸üÐÂÖÐÖ÷ÒªÐÞ¸´µÄÎó²îΪAppCacheÇåµ¥ÖеÄÎó²îCVE-2020-12415£¬£¬£¬£¬£¬£¬£¬ÓÉURL±àÂëµÄ×Ö·û´¦Öóͷ£ÎÊÌâµ¼Ö£»£»£»WebRTC VideoBroadcasterÖеÄÎó²îCVE-2020-12416£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂʹÓÃÊͷźóÄÚ´æË𻵣¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ç±ÔڵĿÉʹÓÃÍ߽⣻£»£»ÓÉÓÚȱÉÙARM64ÉÏValueTagµÄ·ûºÅÀ©Õ¹Ãû¶øµ¼ÖµÄÄÚ´æËð»µÎó²îCVE-2020-12417£»£»£»ÐÅϢй¶Îó²îCVE-2020-12418£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÔ½½ç¶ÁÈ¡£¬£¬£¬£¬£¬£¬£¬´Ó¶øÊ¹Àú³ÌÄÚ´æ×ß©¸ø¶ñÒâJavaScript£»£»£»nsGlobalWindowInnerÖеÄÊͷźóʹÓÃÎó²îCVE-2020-12419£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÄÚ´æË𻵺ÍDZÔڵĿÉʹÓÃÍ߽⣻£»£»STUNЧÀÍÆ÷ÖÐÊͷźóʹÓÃCVE-2020-12420¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/07/17/mozilla-releases-security-update-thunderbird
2.ÐÂThiefQuest±äÌå»ìÏý¹¦Ð§Ãû³Æ£¬£¬£¬£¬£¬£¬£¬×·×ÙÄѶÈÔöÌí
Ñо¿Ö°Ô±·¢Ã÷macOS¶ñÒâÈí¼þThiefQuestµÄбäÌåÐÂÔöÁËÖڶ๦Ч£¬£¬£¬£¬£¬£¬£¬ÀýÈç»ìÏý¹¦Ð§Ãû³Æ£¬£¬£¬£¬£¬£¬£¬Ê¹×·×ÙÄѶÈÔöÌí¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ãа汾ÒѾ½«ÆäÀÕË÷Èí¼þÐÐΪ£¬£¬£¬£¬£¬£¬£¬ÈçÎļþ¼ÓÃܺÍÀÕË÷֪ͨ¹¦Ð§É¾³ý¡£¡£¡£¡£ÔÚC£¦C IPÌìÉú·½Ã棬£¬£¬£¬£¬£¬£¬Ð±äÌåŲÓÃei_getip£¨£©ÒÔÌìÉúËæ»úÊýIPµØµã£¬£¬£¬£¬£¬£¬£¬²¢ÊµÑéͨ¹ýhttp_request£¨£©ÅþÁ¬£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÀÖ³ÉÔò½«ËüÓÃ×÷C£¦CЧÀÍÆ÷µØµã¡£¡£¡£¡£Ëü»¹Ë¢ÐÂÁË¿¹ÆÊÎöÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬ÔÚº¯Êýis_virtual_mchn£¨£©ÖУ¬£¬£¬£¬£¬£¬£¬ÔöÌíÁËÌõ¼þ¼ì²é£¬£¬£¬£¬£¬£¬£¬°üÀ¨»ñÈ¡»úеµÄMACµØµã¡¢CPU¼ÆÊýºÍÎïÀíÄڴ棬£¬£¬£¬£¬£¬£¬ÔÚÆä×Ö·û´®½âÃܺ¯Êýeip_str£¨£©ÖУ¬£¬£¬£¬£¬£¬£¬»¹Ìí¼ÓÁË·´ÆÊÎö¼ì²é¡£¡£¡£¡£»£»£»¹ÔöÌíÁËй¦Ð§run_audioºÍrun_image£¬£¬£¬£¬£¬£¬£¬ÄÜͬʱÔËÐÐͼÏñºÍÉùÒôÎļþ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ½«Ä¿µÄÎļþ»®·ÖÉúÑĵ½Òþ²ØµÄ.m4aÉùÒôÎļþ»ò.jpgͼÏñÎļþÖС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/updates-on-thiefquest-the-quickly-evolving-macos-malware/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29
3.Ghost SquadÒ»ÖÜÖ®ÄÚµÚ¶þ´Î¹¥»÷ESAÕ¾µã
¼ÌÉÏÖÜGhost Squad Hackers¹¥»÷²¢ÎÛËðÁËÅ·ÖÞº½Ìì¾Ö£¨ESA£©ÍøÕ¾https://business.esa.int/ºó£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔÚÒ»ÖÜÄÚÓÖµÚ¶þ´Î¶ÔÅ·ÖÞº½Ìì¾Ö£¨ESA£©ÌᳫÁ˹¥»÷£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÆäÁíÒ»¸öÓòhttps://space4rail.esa.int/index.htmlµÄ¡£¡£¡£¡£ºÚ¿ÍÌåÏÖËûÃÇÔÚESAµÄЧÀÍÆ÷ÉÏ·¢Ã÷ÁËÓëÉϴι¥»÷ÏàͬµÄÎó²î£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂRCE (SSRFµ½RCE)£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÆäÀֳɵĹ¥»÷ÁËÁíÒ»¸öÓò¡£¡£¡£¡£¾ÝºÚ¿Í³Æ£¬£¬£¬£¬£¬£¬£¬ESAר¼ÒÉÐδÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬ËûÃÇÖ»ÊÇɾ³ýÁËCMS²¢Ìí¼ÓÁËά»¤Ë÷Òý£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î²¢²»±£´æÓÚCMS/webÓ¦ÓóÌÐòÖУ¬£¬£¬£¬£¬£¬£¬¶øÊÇÓ°ÏìÁËЧÀÍÆ÷ÉÏÕýÔÚÖ´ÐеÄЧÀÍ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/106111/hacking/esa-site-defaced-again.html?utm_source=rss&utm_medium=rss&utm_campaign=esa-site-defaced-again
4.ÔÆÐ§ÀÍÉÌBlackbaudÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÒÑÖ§¸¶Êê½ð
ÔÆÐ§ÀÍÉÌBlackbaudÔÚÉÏÖÜËÄÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÆäÓÚ2020Äê5ÔÂÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬±ØÐèÖ§¸¶Êê½ðÒÔ±£»£»£»¤¿Í»§Êý¾ÝµÄÇå¾²¡£¡£¡£¡£Blackbaud˵£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÆÆËðÁËÆäÍøÂ磬£¬£¬£¬£¬£¬£¬²¢ÊÔͼװÖÃÀÕË÷Èí¼þÒÔËø¶¨Ð§ÀÍÆ÷ºÍÓû§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬ËûÃǵÄÇå¾²ÍŶÓÔÚ·¢Ã÷¹¥»÷ºóÁ¬Ã¦×ö³öÁËÏìÓ¦²½·¥¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ±»Çý¸Ï³öÍøÂç֮ǰ£¬£¬£¬£¬£¬£¬£¬ÕÕ¾ÉÏë·¨´Ó¿Í»§ÉúÑÄÎļþµÄ×ÔÍйÜÇéÐÎÖÐÇÔÈ¡ÁËÒ»²¿·ÖÊý¾Ý¡£¡£¡£¡£BlackbaudÌåÏÖ£¬£¬£¬£¬£¬£¬£¬±£»£»£»¤¿Í»§µÄÊý¾ÝÊÇËûÃǵÄÖ÷ҪʹÃü£¬£¬£¬£¬£¬£¬£¬ÒÔÊÇËûÃÇÏòÍøÂç×ï·¸Ö§¸¶ÁËÊê½ð£¬£¬£¬£¬£¬£¬£¬²¢È·Èϸ±±¾Òѱ»Ïú»Ù¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cloud-provider-stopped-ransomware-attack-but-had-to-pay-ransom-demand-anyway/#ftag=RSSbaffb68
5.OrangeÈ·ÈÏÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¿Í»§Êý¾Ýй¶
·¨¹úµçÐŹ«Ë¾OrangeÈ·ÈÏÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢Ð¹Â¶Á˿ͻ§Êý¾Ý¡£¡£¡£¡£2020Äê7ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬Nefilim Ransomware ½«OrangeÌí¼Óµ½ÆäÊý¾Ý×ß©վµã£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖËûÃÇͨ¹ýÆäOrange Business Solutions²¿·Ö¹¥»÷Á˸ù«Ë¾£¬£¬£¬£¬£¬£¬£¬Õâ´Î¹¥»÷ÖÐNefilimÍÅ»ïÇÔÈ¡ÁË20¸öOrange Pro / SME¿Í»§Êý¾Ý¡£¡£¡£¡£ºÚ¿ÍÐû²¼ÁËÒ»¸ö339MBµÄÃûΪ Orange_leak_part1.rarµÄ´æµµÎļþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨´ÓOrangeÇÔÈ¡µÄÊý¾Ý¡¢µç×ÓÓʼþ¡¢·É»úʾÒâͼºÍ·¨¹ú·É»úÖÆÔìÉÌATR AircraftµÄÎļþ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/orange-confirms-ransomware-attack-exposing-business-customers-data/
6.GartnerÐû²¼2020ÄêÍøÂç¼ì²âºÍÏìÓ¦£¨NDR£©Êг¡Ö¸ÄÏ
GartnerÐû²¼ÁË¡¶2020ÄêÍøÂç¼ì²âºÍÏìÓ¦£¨NDR£©Êг¡Ö¸ÄÏ¡·£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ˼¿Æ±»ÈÎÃüΪ´ú±í¹©Ó¦ÉÌ¡£¡£¡£¡£GartnerÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÔÚ2019Ä꣬£¬£¬£¬£¬£¬£¬Gartner³ÆÖ®ÎªÍøÂçÁ÷Á¿ÆÊÎö£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÄ꽫ÆäÖØÃüÃûÎªÍøÂç¼ì²âºÍÏìÓ¦£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ¸ÃÊõÓï¸ü׼ȷµØ·´Ó¦ÁËÕâЩ½â¾ö¼Æ»®µÄ¹¦Ð§¡£¡£¡£¡£Gartner»¹¶ÔNDR¸ø³öÁ˽ç˵£¬£¬£¬£¬£¬£¬£¬NDR½â¾ö¼Æ»®Ö÷ҪʹÓ÷ǻùÓÚÊðÃûµÄÊÖÒÕ£¨ÀýÈ磬£¬£¬£¬£¬£¬£¬»úеѧϰ»òÆäËûÆÊÎöÊÖÒÕ£©À´¼ì²âÆóÒµÍøÂçÉϵĿÉÒÉÁ÷Á¿¡£¡£¡£¡£NDR¹¤¾ßÒ»Á¬ÆÊÎöÔʼÁ÷Á¿ºÍ/»òÁ÷Á¿¼Í¼£¨ÀýÈçNetFlow£©ÒÔ¹¹½¨·´Ó¦Õý³£ÍøÂçÐÐΪµÄÄ£×Ó¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blogs.cisco.com/security/cisco-named-a-representative-vendor-in-the-gartner-market-guide-for-ndr