AdobeÐû²¼Çå¾²¸üÐÂÐÞ¸´¶à¿îÎó²î: ¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐÔâµ½¹¥»÷
Ðû²¼Ê±¼ä 2021-10-14¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷
ÉÏÖÜÄ©£¬£¬£¬£¬£¬£¬£¬¶ò¹Ï¶à¶û×î´óµÄ˽ÈËÒøÐÐBanco PichinchaÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÏµÍ³ÔÝʱ¹Ø±Õ¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂÒøÐеÄÓªÒµ´óÃæ»ýÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬°üÀ¨ATM¡¢ÍøÉÏÒøÐС¢Ó¦ÓóÌÐò¡¢µç×ÓÓʼþϵͳºÍ×ÔÖúЧÀÍ¡£¡£¡£¸ÃÒøÐÐÔÚЧÀÍÖÐÖ¹µÄÁ½ÌìºóÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ«²¢Î´¹ûÕæ´Ë´Î¹¥»÷µÄÐÔ×Ó¡£¡£¡£¾ÝÑо¿Ö°Ô±³ÆÕâÊÇÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÒøÐеÄϵͳÖÐ×°ÖÃÁËCobalt Strike beacon¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cyberattack-shuts-down-ecuadors-largest-bank-banco-pichincha/02
Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÙÔâ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÃÀÖÞÓªÒµÊܵ½Ó°Ïì
ÈÕ±¾Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÚ10ÔÂ10ÈÕÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÃÀÖÞ£¨ÃÀ¹ú¡¢¼ÓÄôóºÍÀ¶¡ÃÀÖÞ£©µÄϵͳЧÀÍÖÐÖ¹¡£¡£¡£¸Ã¹«Ë¾³ÆÆäÔÚ¼ì²âµ½¿ÉÒɻºó£¬£¬£¬£¬£¬£¬£¬Á¬Ã¦½ÓÄÉÁËÏìÓ¦²½·¥£¬£¬£¬£¬£¬£¬£¬¹Ø±ÕÊÜÓ°ÏìµÄϵͳºó½«¸ÃÊÂÎñ×èÖ¹ÁËÔÚÃÀÖÞ¡£¡£¡£¹«Ë¾½²»°È˳ÆÃ»ÓÐÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬£¬£¬£¬²¢ÔÊÐí½«¾¡¿ìÐû²¼ÏêϸÐÅÏ¢¡£¡£¡£OlympusÔøÔÚ9ÔÂ8ÈÕÔâµ½ÁËBlackMatterµÄÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÆäʱµÄ¹¥»÷Ó°ÏìÁËÆäEMEA£¨Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ£©ITϵͳ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/123263/security/olympus-us-cyberattack.html
AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ10¸öÎó²î
AdobeÔÚ10ÔÂ13ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÆäAcrobat¡¢Reader¡¢Connect¡¢CommerceºÍCampaign StandardÖеÄ10¸öÎó²î¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÊÇConnectÖеķ´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËAcrobatºÍReaderÖеĴúÂëÖ´ÐÐÎó²îCVE-2021-40728ºÍCVE-2021-40731¡¢ÌáȨÎó²îCVE-2021-40729ºÍCVE-2021-40720£¬£¬£¬£¬£¬£¬£¬ÒÔ¼° Adobe ops-cliÖеķ´ÐòÁл¯Îó²îCVE-2021-40720µÈ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/123269/security/adobe-critical-flaws.html
Ñо¿ÍŶӷ¢Ã÷FreakoutÕë¶ÔVisual Tools DVRµÄ»î¶¯
Juniper Threat LabsÔÚ10ÔÂ11ÈÕÅû¶Á˽©Ê¬ÍøÂçFreakout£¨ÓÖÃûNecro£©ÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2021Äê9ÔµÄ×îºóÒ»Öܼì²âµ½Á˴˴λ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÆäÎäÆ÷¿âÖÐÌí¼ÓÁËÒ»¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÖ÷ÒªÕë¶ÔVisual Tools DVR VX16 4.2.28.0£¬£¬£¬£¬£¬£¬£¬ÆäPoCÒÑÔÚ7ÔÂ6ÈÕ¹ûÕæ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÐµÄÑù±¾É¾³ýÁË֮ǰµÄ¹¥»÷ÖÐʹÓõÄSMBɨÃè³ÌÐò£¬£¬£¬£¬£¬£¬£¬²¢½«¾ç±¾×¢ÈëURL´Ó֮ǰµÄÓ²±àÂë¸ü¸ÄΪÁËDGA URL¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blogs.juniper.net/en-us/threat-research/necro-python-botnet-goes-after-vulnerable-visualtools-dvr
NCC Group·¢Ã÷ÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷»î¶¯
10ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬NCC Group·¢Ã÷ÁËÒ»¸ö½öÇÔÈ¡Êý¾Ý¶ø²»¼ÓÃÜÎļþµÄÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMC¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖSnapMCÕâ¸öÃû×ÖȪԴÓÚ¹¥»÷Õß¿ìËٵĹ¥»÷·½·¨£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÒÔÔÚ30·ÖÖÓÄÚÈëÇÖÍøÂç¡¢ÇÔÈ¡Îļþ²¢·¢ËÍÀÕË÷Óʼþ¡£¡£¡£SnapMCʹÓÃÎó²îɨÃèÆ÷AcunetixÀ´ËÑË÷Ä¿µÄVPNºÍWebÖеÄÎó²î£¬£¬£¬£¬£¬£¬£¬°üÀ¨PrintNightmareÎó²î¡¢ASPX.NETµÄTelerik UIÖеÄÔ¶³Ì´úÂëÎó²îÒÔ¼°ÖÖÖÖSQL×¢ÈëÎó²îµÈ¡£¡£¡£¿£¿£Ë¼Á¿µ½SnapMCʹÓõľùÊÇÒÑÐÞ¸´µÄÎó²î£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½¨ÒéÓû§ÊµÊ±×°Öò¹¶¡¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/snapmc-hackers-skip-file-encryption-and-just-steal-your-files/IDCÐû²¼2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡¸ú×Ù±¨¸æ
IDCÔÚ10ÔÂ12ÈÕÐû²¼ÁË2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡¸ú×Ù±¨¸æ¡£¡£¡£IDC½ç˵µÄÍøÂçÇ徲ЧÀÍÊг¡»®·ÖÓÉÇå¾²×ÉѯЧÀÍ¡¢ITÇå¾²½ÌÓýÓëÅàѵЧÀÍ¡¢ÍйÜÇ徲ЧÀͺÍÇå¾²¼¯³ÉЧÀÍËĸö×ÓÊг¡×é³É¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡³§ÉÌÕûÌåÊÕÈëԼΪ11.1ÒÚÃÀÔª£¨Ô¼ºÏ71.5ÒÚÔªÈËÃñ±Ò£©£¬£¬£¬£¬£¬£¬£¬³§ÉÌÊÕÈë¹æÄ£½ÏÈ¥ÄêͬÆÚʵÏÖ·±¶ÔöÌí£¬£¬£¬£¬£¬£¬£¬ÕÇ·ù¸ß´ï110%£¬£¬£¬£¬£¬£¬£¬½Ï2019Äêͬ±ÈÔöÌí38%£¬£¬£¬£¬£¬£¬£¬ÖйúITÇ徲ЧÀÍÊг¡Õýʽ½øÈëÐèÇ´ÔðÃæ±¬·¢ÆÚ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.idc.com/getdoc.prCHE48302321