AdobeÐû²¼Çå¾²¸üÐÂÐÞ¸´¶à¿îÎó²î: ¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐÔâµ½¹¥»÷

Ðû²¼Ê±¼ä 2021-10-14

¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷


¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷.png


ÉÏÖÜÄ©£¬£¬£¬£¬ £¬£¬£¬¶ò¹Ï¶à¶û×î´óµÄ˽ÈËÒøÐÐBanco PichinchaÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬ £¬£¬£¬ÏµÍ³ÔÝʱ¹Ø±Õ¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂÒøÐеÄÓªÒµ´óÃæ»ýÖÐÖ¹£¬£¬£¬£¬ £¬£¬£¬°üÀ¨ATM¡¢ÍøÉÏÒøÐС¢Ó¦ÓóÌÐò¡¢µç×ÓÓʼþϵͳºÍ×ÔÖúЧÀÍ¡£¡£¡£¸ÃÒøÐÐÔÚЧÀÍÖÐÖ¹µÄÁ½ÌìºóÐû²¼ÉùÃ÷£¬£¬£¬£¬ £¬£¬£¬³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬ £¬£¬£¬µ«²¢Î´¹ûÕæ´Ë´Î¹¥»÷µÄÐÔ×Ó¡£¡£¡£¾ÝÑо¿Ö°Ô±³ÆÕâÊÇÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÔÚÒøÐеÄϵͳÖÐ×°ÖÃÁËCobalt Strike beacon¡£¡£¡£


Ô­ÎÄÁ´½Ó£º


https://www.bleepingcomputer.com/news/security/cyberattack-shuts-down-ecuadors-largest-bank-banco-pichincha/02


Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÙÔâ¹¥»÷£¬£¬£¬£¬ £¬£¬£¬ÃÀÖÞÓªÒµÊܵ½Ó°Ïì


Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÙÔâ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÃÀÖÞÓªÒµÊܵ½Ó°Ïì.png


ÈÕ±¾Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÚ10ÔÂ10ÈÕÔâµ½¹¥»÷£¬£¬£¬£¬ £¬£¬£¬µ¼ÖÂÃÀÖÞ£¨ÃÀ¹ú¡¢¼ÓÄôóºÍÀ­¶¡ÃÀÖÞ£©µÄϵͳЧÀÍÖÐÖ¹¡£¡£¡£¸Ã¹«Ë¾³ÆÆäÔÚ¼ì²âµ½¿ÉÒɻºó£¬£¬£¬£¬ £¬£¬£¬Á¬Ã¦½ÓÄÉÁËÏìÓ¦²½·¥£¬£¬£¬£¬ £¬£¬£¬¹Ø±ÕÊÜÓ°ÏìµÄϵͳºó½«¸ÃÊÂÎñ×èÖ¹ÁËÔÚÃÀÖÞ¡£¡£¡£¹«Ë¾½²»°È˳ÆÃ»ÓÐÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬ £¬£¬£¬²¢ÔÊÐí½«¾¡¿ìÐû²¼ÏêϸÐÅÏ¢¡£¡£¡£OlympusÔøÔÚ9ÔÂ8ÈÕÔâµ½ÁËBlackMatterµÄÀÕË÷¹¥»÷£¬£¬£¬£¬ £¬£¬£¬ÆäʱµÄ¹¥»÷Ó°ÏìÁËÆäEMEA£¨Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ£©ITϵͳ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123263/security/olympus-us-cyberattack.html



AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬ £¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ10¸öÎó²î


AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ10¸öÎó²î.png


AdobeÔÚ10ÔÂ13ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬ £¬£¬£¬ÐÞ¸´ÆäAcrobat¡¢Reader¡¢Connect¡¢CommerceºÍCampaign StandardÖеÄ10¸öÎó²î¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÊÇConnectÖеķ´ÐòÁл¯Îó²î£¬£¬£¬£¬ £¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐУ¬£¬£¬£¬ £¬£¬£¬CVSSÆÀ·ÖΪ9.8¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬£¬»¹ÐÞ¸´ÁËAcrobatºÍReaderÖеĴúÂëÖ´ÐÐÎó²îCVE-2021-40728ºÍCVE-2021-40731¡¢ÌáȨÎó²îCVE-2021-40729ºÍCVE-2021-40720£¬£¬£¬£¬ £¬£¬£¬ÒÔ¼° Adobe ops-cliÖеķ´ÐòÁл¯Îó²îCVE-2021-40720µÈ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123269/security/adobe-critical-flaws.html


Ñо¿ÍŶӷ¢Ã÷FreakoutÕë¶ÔVisual Tools DVRµÄ»î¶¯


Ñо¿ÍŶӷ¢Ã÷FreakoutÕë¶ÔVisual Tools DVRµÄ»î¶¯.png


Juniper Threat LabsÔÚ10ÔÂ11ÈÕÅû¶Á˽©Ê¬ÍøÂçFreakout£¨ÓÖÃûNecro£©ÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2021Äê9ÔµÄ×îºóÒ»Öܼì²âµ½Á˴˴λ£¬£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÔÚÆäÎäÆ÷¿âÖÐÌí¼ÓÁËÒ»¸öÐÂÎó²î£¬£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÖ÷ÒªÕë¶ÔVisual Tools DVR VX16 4.2.28.0£¬£¬£¬£¬ £¬£¬£¬ÆäPoCÒÑÔÚ7ÔÂ6ÈÕ¹ûÕæ¡£¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬£¬ÐµÄÑù±¾É¾³ýÁË֮ǰµÄ¹¥»÷ÖÐʹÓõÄSMBɨÃè³ÌÐò£¬£¬£¬£¬ £¬£¬£¬²¢½«¾ç±¾×¢ÈëURL´Ó֮ǰµÄÓ²±àÂë¸ü¸ÄΪÁËDGA URL¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blogs.juniper.net/en-us/threat-research/necro-python-botnet-goes-after-vulnerable-visualtools-dvr


NCC Group·¢Ã÷ÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷»î¶¯


NCC Group·¢Ã÷ÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷»î¶¯.png


10ÔÂ11ÈÕ£¬£¬£¬£¬ £¬£¬£¬NCC Group·¢Ã÷ÁËÒ»¸ö½öÇÔÈ¡Êý¾Ý¶ø²»¼ÓÃÜÎļþµÄÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMC¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖSnapMCÕâ¸öÃû×ÖȪԴÓÚ¹¥»÷Õß¿ìËٵĹ¥»÷·½·¨£¬£¬£¬£¬ £¬£¬£¬Ëü¿ÉÒÔÔÚ30·ÖÖÓÄÚÈëÇÖÍøÂç¡¢ÇÔÈ¡Îļþ²¢·¢ËÍÀÕË÷Óʼþ¡£¡£¡£SnapMCʹÓÃÎó²îɨÃèÆ÷AcunetixÀ´ËÑË÷Ä¿µÄVPNºÍWebÖеÄÎó²î£¬£¬£¬£¬ £¬£¬£¬°üÀ¨PrintNightmareÎó²î¡¢ASPX.NETµÄTelerik UIÖеÄÔ¶³Ì´úÂëÎó²îÒÔ¼°ÖÖÖÖSQL×¢ÈëÎó²îµÈ¡£¡£¡£¿£¿£Ë¼Á¿µ½SnapMCʹÓõľùÊÇÒÑÐÞ¸´µÄÎó²î£¬£¬£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±½¨ÒéÓû§ÊµÊ±×°Öò¹¶¡¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/snapmc-hackers-skip-file-encryption-and-just-steal-your-files/


IDCÐû²¼2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡¸ú×Ù±¨¸æ


IDCÐû²¼2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡¸ú×Ù±¨¸æ.png


IDCÔÚ10ÔÂ12ÈÕÐû²¼ÁË2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡¸ú×Ù±¨¸æ¡£¡£¡£IDC½ç˵µÄÍøÂçÇ徲ЧÀÍÊг¡»®·ÖÓÉÇå¾²×ÉѯЧÀÍ¡¢ITÇå¾²½ÌÓýÓëÅàѵЧÀÍ¡¢ÍйÜÇ徲ЧÀͺÍÇå¾²¼¯³ÉЧÀÍËĸö×ÓÊг¡×é³É¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬ £¬£¬£¬2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡³§ÉÌÕûÌåÊÕÈëԼΪ11.1ÒÚÃÀÔª£¨Ô¼ºÏ71.5ÒÚÔªÈËÃñ±Ò£©£¬£¬£¬£¬ £¬£¬£¬³§ÉÌÊÕÈë¹æÄ£½ÏÈ¥ÄêͬÆÚʵÏÖ·­±¶ÔöÌí£¬£¬£¬£¬ £¬£¬£¬ÕÇ·ù¸ß´ï110%£¬£¬£¬£¬ £¬£¬£¬½Ï2019Äêͬ±ÈÔöÌí38%£¬£¬£¬£¬ £¬£¬£¬ÖйúITÇ徲ЧÀÍÊг¡Õýʽ½øÈëÐèÇ´ÔðÃæ±¬·¢ÆÚ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.idc.com/getdoc.prCHE48302321