AvertX IPϵÁÐÉãÏñÍ·´æÔÚ3¸ö·ì϶ £¬¿ÉÌáÒ鱩Á¦¹¥»÷£»ÒÔÉ«ÁÐÁ½´¦Ë®Àû»ù´¡ÉèÊ©Ôâµ½ÍøÂç¹¥»÷

°ä²¼¹¦·ò 2020-07-21

1.AvertX IPϵÁÐÉãÏñÍ·´æÔÚ3¸ö·ì϶ £¬¿É±»ÀûÓÃÌáÒ鱩Á¦¹¥»÷


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Palo Alto Networks Unit 42·¢ÏÖÁË×îа汾µÄAvertX IPÉãÏñ»úÖдæÔÚµÄÈý¸ö·ì϶ £¬¿É±»ÀûÓÃÌáÒ鱩Á¦¹¥»÷¡£ÕâЩ·ì϶±ðÀëΪÓû§Ã¶¾Ù·ì϶£¨CVE-2020-11625£© £¬ÃýÎóµÄwebÓû§½çÃæ(UI)µÇ¼²»´æÔÚµÄÕÊ»§Ê±»áµ¼ÖÂ·ÖÆçµÄÁË¾Ö £¬¿É±»ÀûÓÃÌáÒ鱩Á¦¹¥»÷£»ÈõÃÜÂ루CVE-2020-11624£© £¬²»ÒªÇóÓû§¸ü¸ÄĬÈÏÃÜÂë £¬µ±Óû§Ê¹ÓÃĬÈÏÃÜÂëµÇ¼ʱ»áÌáÐÑÃÜÂëÒѸü¸Ä £¬µ«ÈÔÔÊÐíÓû§µÇ¼£»ÐÅϢй¶£¨CVE-2020-11623£© £¬´æÔÚÒ»¸ö¹«¿ªµÄUART½Ó¿Ú £¬¹¥»÷ÕßÄܹ»ÀûÓÃËü¶ÔUART½øÐÐÎïÀí½Ó¼û²¢¸ü¸ÄÅäÖÃÖ°ÄÜ¡£¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩ·ì϶½øÐб©Á¦¹¥»÷ £¬ÀûÓÃĬÈÏÃÜÂë½Ó¼ûÉãÏñ»ú²¢Ïνӵ½IoTÉ豸 £¬ÎïÀí½Ó¼ûUATRÀ´¸ü¸ÄÅäÖÃÉõÖÁ¹Ø¹ØÏà»ú¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/07/vulnerabilities-with-avertx-ip-security.html


2.ESET·¢ÏÖWelcome Chat¿É¼à¶½ºÍй¶Óû§Êý¾Ý


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ESET×êÑз¢ÏÖÖж«µÄAndroidÀûÓÃWelcome Chat £¬¿É¼à¶½ºÍй¶Óû§Êý¾Ý £¬»òÓë¼ÓɳºÚ¿Í×éÖ¯MoleratsÓйØ¡£¶ñÒâÍøÕ¾Ðû³Æ¸ÃÀûÓÃÊÇGoogle PlayÉ̵êÖÐÌṩµÄ°²È«Ì¸ÌìÆ½Ì¨ £¬µ«ÏÖʵÉÏËü²¢²»ÔÚ¹Ù·½ÀûÓÃÉ̵ê¡£×°ÖøÃÈí¼þºó £¬Æä»áÒªÇóÊܺ¦ÕßÔÊÐíȨÏÞ £¬ÀýÈç·¢ËͺͲ鿴SMSÐÂÎÅ¡¢½Ó¼ûÎļþ¡¢¼Í¹àÒôƵÒÔ¼°½Ó¼ûÁªÏµÈ˺ÍÉ豸µØÎ»¡£ÔÞ³ÉÕâЩÐí¿Éºó £¬¸ÃÈí¼þ»áÁ¢¼´½«ÓйØÉ豸µÄÐÅÏ¢·¢Ë͵½ÆäºÅÁîºÍ½ÚÔ죨C£¦C£©·þÎñÆ÷ £¬²¢Ã¿Îå·ÖÖÓÓëC£¦C·þÎñÆ÷ÁªÏµÒ»´Î¡£ESETÒÔΪ £¬¸Ã¼äµý·¨Ê½ÓëAndroid¶ñÒâÈí¼þ¼Ò×åBadPatchÓйØ¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/07/14/welcome-chat-secure-messaging-app-nothing-further-truth/


3.ÒÔÉ«ÁÐË®Îñ¾ÖÈ·ÈÏÆäÁ½´¦Ë®Àû»ù´¡ÉèÊ©Ôâµ½ÍøÂç¹¥»÷


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ÒÔÉ«ÁÐË®Îñ¾Ö¹ÙÔ±ÉÏÖܰµÊ¾ £¬ÆäÁ½´¦Ë®Àû»ù´¡ÉèÊ©ÓÚÁùÔÂÔâµ½ÍøÂç¹¥»÷ £¬Êܺ¦µØÖ·±ðÀëΪÉϼÓÀûÀûµØÓòµÄũҵˮ±ÃºÍÖв¿Ê¡·ÝMateh YehudaµÄË®±Ã¡£Ë®Îñ¾Ö°µÊ¾ £¬ÕâЩ¶¼ÊÇũҵ²¿ÃÅרÓõÄÓ×ÐÍÅÅË®×°Öà £¬Óɱ¾µØÈ˶ÀÁ¢Î¬½¨ £¬Òò¶ø²»»áÔì³ÉÑϳÁµÄÓ°Ïì¡£¾ÍÔÚ½ñÄê4Ô £¬ÒÔÉ«Áй©Ë®ÏµÍ³Ôâµ½Á˳õ´ÎÍøÂç¹¥»÷¡£¶øÔÚ6ÔÂ·Ý £¬Æ¾¾Ý¡¶½ðÈÚʱ±¨¡·±¨Â· £¬ºÚ¿ÍÒѾ­»ñµÃÁËÒÔÉ«ÁÐijЩˮ´¦ÖÃϵͳµÄ½Ó¼ûȨ £¬²¢ÊÔͼŤתˮÂȺ¬Á¿ £¬ÈôÊǹ¥»÷³É¹¦¿ÉÄܻᵼÖ±¾µØ¾ÓÃñÇá¶ÈÖж¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/two-more-cyber-attacks-hit-israels-water-system/#ftag=RSSbaffb68


4.°¢¸ùÍ¢µçÐŹ«Ë¾1.8ÍòÌ¨ÍÆËã»úϰȾÀÕË÷Èí¼þREVil


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


7ÔÂ18ÈÕ£¨ÐÇÆÚÁù£©°¢¸ùÍ¢µçÐŹ«Ë¾Ôâµ½ÀÕË÷Èí¼þREVil¹¥»÷ £¬1.8ÍòÌ¨ÍÆËã»ú±»Ï°È¾ £¬²¢±»ÀÕË÷109345.35 Monero´ú±ÒÊê½ð£¨Ô¼753ÍòÃÀÔª£©¡£¹¥»÷ÕßÊ×ÏÈ»ñµÃÁ˶Թ«Ë¾ÍøÂçµÄ½Ó¼ûȨ £¬¶øºóËûÃǽÚÔìÁËÄÚ²¿µÄDomain Admin £¬²¢Ê¹ÓøýӼûȨÏÞϰȾÁËÉÏÍòÌ¨ÍÆËã»ú £¬µ¼Ö°¢¸ùÍ¢µçÐÅÔËÓªµÄºÜ¶àÍøÕ¾¶¼ÍÑ»ú¡£¸Ã¹«Ë¾µÄITÈËÔ±¼ì²âµ½¹¥»÷ºó £¬±ãÁ¢¼´ÖÒ¸æÆäÔ±¹¤²»ÒªÏÎ½ÓÆäÄÚ²¿VPNÍøÂç £¬²¢Ô¤·À´ò¿ª´øÓпÉÒÉ´æµµ¸½¼þµÄµç×ÓÓʼþ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/106147/cyber-crime/telecom-argentina-revil-ransomware.html?utm_source=rss&utm_medium=rss&utm_campaign=telecom-argentina-revil-ransomware


5.IDC°ä²¼2019ÄêÖйúÈËΪÖÇÄܲúÒµ×êÑл㱨


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


È«ÇòȨÍþÕ÷ѯ»ú¹¹IDC°ä²¼¡¶ÖйúÈËΪÖÇÄÜÔÆ·þÎñÊг¡×êÑл㱨(2019)¡·¡£»ã±¨ÏÔʾ £¬ÔÚÖйúAI¹«ÓÐÔÆ·þÎñÕûÌåÊг¡¸ñ¾ÖÖÐ £¬°Ù¶ÈÖÇÄÜÔÆÔÚÕûÌåŲÓÃÁ¿¡¢Êг¡·Ý¶î·½Ãæ¾ùÃûÁеÚÒ» £¬Õ¼ÓÐ×î¶àµÄAI²úÆ·ÊýÁ¿¡£IDCÒÔΪ £¬AIÄÜÁ¦ÒѳÉΪÓû§Ñ¡ÔñÔÆ·þÎñ³§ÉÌʱµÄ³ÁÒª¿¼Á¿³É·Ö¡£¾Ýͳ¼Æ £¬ÖйúAIÔÆ·þÎñÊг¡2019ÄêÊг¡¹æÄ£´ï1.66ÒÚÃÀÔª £¬2018ÖÁ2024Ä긴ºÏÄê¾ùÔö³¤Âʽ«´ïµ½93.6%¡£


Ô­ÎÄÁ´½Ó£º

http://science.china.com.cn/2020-07/14/content_41219348.htm


6.Fireeye°ä²¼»ã±¨ £¬Õë¶Ô¹¤¿ØÐÐÒµµÄ7¿îÀÕË÷Èí¼þ


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


FireeyeµÄMandiantÍþвµý±¨²¿ÃŰ䲼»ã±¨ £¬·¢ÏÖÕë¶Ô¹¤¿ØÐÐÒµµÄ7¿îÀÕË÷Èí¼þ¡£MandiantÊ×ÏÈÈ·¶¨ÁËÁù¸öÀÕË÷Èí¼þϵÁеÄÑù±¾ £¬±ðÀëΪDoppelPaymer¡¢LockerGoga¡¢Maze¡¢MegaCortex¡¢NefilimºÍSNAKEHOSE £¬ÕâЩÑù±¾ÔÚ´ÓǰÁ½ÄêÖж¼ÓëÓ°Ï칤ҵ×éÖ¯µÄ³Á´óÊÂÎñÓйØ¡£MandiantÓÖ·ÖÎöÁËCLOPϵÁеĵڶþ¸öÀÕË÷Èí¼þÑù±¾£¨MD5£º3b980d2af222ec909b948b6bbdd46319£© £¬²¢Ê¹ÓÃÓ²±àÂëÁбíÀ´Ã¶¾ÙÔ̺¬OT×Ö·û´®µÄ¹ý³Ì £¬¸ÃÁбíÔ̺¬1425¸ö¹ý³Ì £¬ÆäÖÐÖÁÉÙÓÐ150¸öÊôÓÚOTÓйصÄÈí¼þÌ×¼þ¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2020/07/financially-motivated-actors-are-expanding-access-into-ot.html