Jenkins³ÆÆúÓÃConfluence·þÎñÆ÷Ôâµ½¹¥»÷£ºVictureÓ¤¶ùÄþ¾²´æÔÚ©¶´
Ðû²¼Ê±¼ä 2021-09-09΢ÈíÐû²¼MSHTMLÖÐRCE©¶´£¨CVE-2021-40444£©µÄͨ¸æ
΢ÈíÍŶÓÔÚ9ÔÂ7ÈÕÐû²¼ÁËÕë¶ÔWindowsÖеÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2021-40444£©µÄ»º½â´ëÊ©¡£¸Ã©¶´´æÔÚÓÚMicrosoft OfficeÎĵµÊ¹ÓõÄä¯ÀÀÆ÷äÖȾÒýÇæMSHTMLÖУ¬ÒÑÔÚÕë¶ÔWindows 10ÉϵÄOffice 365ºÍOffice 2019µÄ¹¥»÷»î¶¯Öб»ÀûÓá£Ä¿Ç°ÉÐÎÞ¿ÉÓõÄÄþ¾²¸üУ¬Microsoft½¨Òé½ûÓÃInternet ExplorerÖÐËùÓеÄActiveX¿Ø¼þ×÷Ϊ»º½â´ëÊ©¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-shares-temp-fix-for-ongoing-office-365-zero-day-attacks/
Jenkins³ÆÆäÒÑÆúÓõÄConfluence·þÎñÆ÷Ôâµ½¹¥»÷
JenkinsÍŶÓÔÚÉÏÖÜÁùÐû²¼ÁËÒ»·ÝÉùÃ÷£¬³ÆÆäConfluence·þÎñÆ÷Ôâµ½¹¥»÷¡£´Ë´Î¹¥»÷»î¶¯ÀûÓÃÁËConfluenceÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýºÍÃüÁî×¢Èë©¶´CVE-2021-26084£¬²¢ÔÚ±»ºÚ·þÎñÆ÷Öа²×°Á˶ñÒâÍÚ¿óÈí¼þ¡£Jenkins¹ÜÀíÔ±ÌåÏÖ£¬¸Ã·þÎñÆ÷×Ô2019Äê10ÔÂÒѱ»ÆúÓã¬ÆäʱÒѽ«¸ÃAtlassian Confluence·þÎñÆ÷ÉÏÍйܵÄwikiÍøÕ¾ºÍÍŶÓÐ×÷ÏµÍ³Ç¨ÒÆÖÁGitHubƽ̨£¬Òò´ËûÓÐÈκÎJenkins°æ±¾¡¢²å¼þ»òÔ´´úÂëÊܵ½Ó°Ïì¡£
ÔÎÄÁ´½Ó£º
https://therecord.media/jenkins-project-discloses-security-breach-following-confluence-server-hack/
¶ñÒâÈí¼þTrickBotµÄ¿ª·¢ÈËÔ±ÔÚº«¹úÊ×¶û»ú³¡±»²¶
ÉÏÖÜ£¬Ò»Ãû¶íÂÞ˹ÄÐ×ÓÔÚÊ×¶û¹ú¼Ê»ú³¡±»²¶£¬×ïÃûÊÇΪTrickBot¿ª·¢´úÂ롣ƾ¾Ýµ±µØÃ½Ì屨µÀ£¬ÏÓÒÉÈËÓÚ2020Äê2Ôµִﺫ¹ú£¬ÒòCOVID-19È¡Ïû¹ú¼ÊÂÃÐкó±»À§ÔڸùúÒ»Äê¶à£¬ÔÚ·âËø½â³ýºó×¼±¸·µ»Ø¶íÂÞ˹ʱ±»²¶¡£¾ÝϤ£¬ÆäÔÚ2016ÄêÔøµ£ÈÎTrickBotµÄÍøÂçä¯ÀÀÆ÷¿ª·¢ÈËÔ±¡£º«¹úKBS³Æ£¬¸ÃÄÐ×ÓÓÚ9ÔÂ2ÈÕÔÚÊ×¶û·¨Ôº±»´«Ñ¶£¬²¢ÒªÇóÒý¶Éµ½ÃÀ¹ú£¬µ«Æä±ç»¤ÂÉʦ×èµ²ÁËÕâÒ»¾ö¶¨¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/121909/cyber-crime/trickbot-gang-developer-arrested.html
VictureÓ¤¶ùÄþ¾²¼à¿ØÖдæÔÚÔ¶³Ì´úÂëÖ´ÐеÈ5¸ö©¶´
BitdefenderÑо¿ÈËÔ±·¢ÏÖVictureÓ¤¶ùÄþ¾²¼à¿ØÖдæÔÚ5Äþ¾²¸ö©¶´¡£ÀûÓÃÕâЩ©¶´¿É·ÃÎÊ¼à¿ØÊÓÆµ£¬ÉõÖÁÍêÈ«½Ó¹ÜÉ豸¡£ÆäÖнÏΪÑÏÖØµÄÊǵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеĻùÓÚµ±µØ¶ÑÕ»µÄ»º³åÇøÒç³ö©¶´£¬¿ÉÒÔͨ¹ýÆôÓÃONVIF·þÎñ£¨Ä¬ÈϽûÓã©À´ÀûÓã»ÒÔ¼°Ó²±àÂëµÄRTSPƾ¾Ý©¶´£¬·Ã¿ÍÕÊ»§ÎÞ·¨¸ü¸ÄĬÈÏÆ¾¾Ýadmin:123456¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2021/09/06/vulnerabilities-in-victure-baby-monitor-allow-access-to-camera-feeds/
ÃÀ¹ú´ïÀË¹Ñ§ÇøÈ·ÈÏÒÑй¶ÊýÊ®ÍòѧÉúºÍÔ±¹¤ÐÅÏ¢
ÃÀ¹ú×î´óµÄÑ§ÇøÖ®Ò»´ïÀ˹¶ÀÁ¢Ñ§Çø£¨ISD£©ÔÚ9ÔÂ3ÈÕÈ·ÈÏÒÑй¶ѧÉúºÍÔ±¹¤ÐÅÏ¢¡£¸ÃÑ§ÇøÉù³ÆÔڸõØÓòµÄ230ËùѧУÖÐÓÐ145000ÃûѧÉúºÍ22000ÃûÔ±¹¤¡£ISD͸¶£¬ ËüÔÚ8ÔÂ8ÈÕÊÕµ½ÁËÓйØÊý¾Ýй¶Ê¼þµÄ֪ͨ£¬Î´¾ÊÚȨµÄµÚÈý·½·ÃÎÊÆäÍøÂç²¢ÏÂÔØÁËÊý¾Ý£¬½«Êý¾ÝÁÙʱ´æ´¢ÔÚÁËÔÆÉÏ¡£Ä¿Ç°£¬ÕâЩÊý¾ÝÒѱ»É¾³ý£¬µ«´Ó2010ÄêÖÁ½ñµÄѧÉú¡¢Ô±¹¤ºÍ³Ð°üÉ̵ÄÐÅÏ¢¿ÉÄܶ¼ÊÐÊܵ½Ó°Ïì¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/dallas-school-district-data-breach/
KELAÐû²¼ÓйØÀÕË÷ÔËÓªÉÌÈçºÎѰÕÒÄ¿±êµÄ·ÖÎö³ÂËß
KELAÓÚ9ÔÂ6ÈÕÐû²¼ÁËÓйØÀÕË÷ÔËÓªÉÌÈçºÎѰÕÒÄ¿±êµÄ·ÖÎö³ÂËß¡£³ÂËß·ÖÎöÁË7Ô·ݴ´½¨µÄ48¸öºÚ¿ÍÂÛ̳µÄÌû×Ó£¬ÒÔ̽Ë÷ÀÕË÷ÔËÓªÉÌÈçºÎѰÕÒÄ¿±ê¡£³ÂËßÖ¸³ö£¬¹¥»÷ÕßµÄÒªÇóͨ³£°üÂÞ£ºÖ÷ҪλÓÚÃÀ¹ú¡¢¼ÓÄô󡢰ĴóÀûÑǺÍÅ·Ö޵ȹú£»Æ½¾ùÊÕÈëÁè¼Ý1ÒÚÃÀÔª£»±Ü¿ªÒ½ÁÆ¡¢½ÌÓý¡¢Õþ¸®ºÍ·ÇÓ¯Àû»ú¹¹£»ÖÆÖ¹Î»ÓÚ¶ÀÁ¢¹ú¼ÒÁªºÏÌå (CIS) µÄ¹«Ë¾£¬Èç¶íÂÞ˹¡¢ÎÚ¿ËÀ¼¡¢Ä¦¶û¶àÍß¡¢°×¶íÂÞ˹µÈ¹ú¡£´ËÍ⣬¹¥»÷ÕßÔ¸ÒâÖ§¸¶¸ß´ï10ÍòÃÀÔª¹ºÖ÷ÃÎÊȨÏÞ£¬ÆäÖÐRDPºÍVPNÊÇ×î»ù±¾µÄÐèÇó¡£
ÔÎÄÁ´½Ó£º
https://ke-la.com/the-ideal-ransomware-victim-what-attackers-are-looking-for/