TrustwaveÅû¶»ªÎªUSB LTE donglesÖÐÌáȨÎó²î£»ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð
Ðû²¼Ê±¼ä 2021-06-041.TrustwaveÅû¶»ªÎªUSB LTE donglesÖеÄÌáȨÎó²î

TrustwaveµÄÑо¿Ö°Ô±Åû¶ÁË»ªÎªE3372ÐÍUSB LTE donglesÖеÄÌáȨÎó²î¡£USB donglesÊÇÒ»ÖÖ¿ÉÒÔ²åÈëÌõ¼Ç±¾µçÄÔºĮ́ʽµçÄÔµÄÓ²¼þ£¬Íâ¹ÛÏñuÅÌ£¬¿ÉÒÔ»á¼û»¥ÁªÍø¡£Ñо¿Ö°Ô±³ÆÆäÔÚä¯ÀÀdongles×°ÖõÄÇý¶¯³ÌÐòÎļþʱ·¢Ã÷£¬Ã¿´Î²åÈë¸Ã×°±¸¶¼»á×Ô¶¯ÔËÐÐmbbserviceopen£¬ÔÚWebä¯ÀÀÆ÷·¿ª»ªÎª×°±¸ÖÎÀí½çÃæ£¬¶øÕâ¸öÎļþÊÇÒÔÍêȫȨÏÞ£¨777£©ÔËÐеġ£ÏÖÔÚ£¬»ªÎªÒÑÐû²¼ÓйظÃÎó²îµÄÇå¾²×Éѯ»ººÍ½â²½·¥¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/huawei-usb-lte-dongles-are-vulnerable-to-privilege-escalation-attacks/
2.CiscoÐû²¼Çå¾²¸üУ¬ÐÞ¸´Æä¶à¿î²úÆ·ÖÐÑÏÖØµÄÎó²î

CiscoÐû²¼Çå¾²¸üУ¬ÐÞ¸´ÁËWebex Player¡¢SD-WANºÍASR 5000 ϵÁÐÖеĶà¸öÎó²î¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îÊÇWebex PlayerÖеĿɵ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÄÚ´æËð»µÎó²î£¨CVE-2021-1526¡¢CVE-2021-1502ºÍCVE-2021-1503£©ÒÔ¼°SD-WANÈí¼þÖеÄÌáȨÎó²î£¨CVE-2021-1528£©¡£»¹ÐÞ¸´ÁËASR 5000ϵÁÐÈí¼þ(StarOS) ÖеÄÁ½¸öÊÚÈ¨ÈÆ¹ýÎó²î£¨CVE-2021-1539ºÍCVE-2021-1540£©µÈÎó²î¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118564/security/cisco-webex-player-sd-wan-asr-5000-flaws.html
3.AMT GamesÔÆ´æ´¢ÉèÖùýʧй¶½ü600ÍòÓû§µÄÐÅÏ¢

WizCaseÑо¿Ö°Ô±·¢Ã÷AMT GamesµÄElasticSearch·þÎñÆ÷ÉèÖùýʧй¶590ÍòÓû§µÄÐÅÏ¢¡£AMT GamesÊÇ×ܲ¿Î»ÓÚÖйúµÄÒ»¼ÒÓÎÏ·¿ª·¢ÉÌ£¬ËüµÄÃâ·ÑÊÖ»úÓÎÏ·Battle for the Galaxy£¨ÒøºÓÖ®Õ½£©ÔÚ103¸ö¹ú¼Ò/µØÇøÓµÓÐÊý°ÙÍòÓû§¡£´Ë´Î×ܹ²Ð¹Â¶ÁË1.47TBÊý¾Ý£¬°üÀ¨590Íò¸öÍæ¼Ò×ÊÁÏ¡¢200Íò±ÊÉúÒâºÍ587000 Ìõ·´ÏìÐÂÎÅ£¬Éæ¼°ÕÊ»§ID¡¢µç×ÓÓʼþµØµã¡¢ÓÎÏ·ÄÚ¹ºÖüÛÇ®ºÍÖ§¸¶ÌṩÉ̵ÈÐÅÏ¢¡£ÏÖÔÚ£¬¸Ã¹«Ë¾Î´¶Ô´ËʾÙÐÐ˵Ã÷£¬µ«½ûÓÃÁ˶ԷþÎñÆ÷µÄ»á¼û¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118529/data-breach/amt-games-data-leak.html
4.±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬Æä·þÎñÒÑÑÓ³Ù»òÖÐÖ¹

±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬Õâ¿Éµ¼ÖÂÒ»Ð©Íæ¼ÒµÄ·þÎñ·ºÆðÑÏÖØµÄÑÓ³ÙºÍÅþÁ¬ÖÐÖ¹¡£¸Ã¹«Ë¾ÓÚ6ÔÂ1ÈÕÐû²¼ÍÆÎĹûÕæ´Ë´Î¹¥»÷£¬²¢ÌåÏÖÆäÕýÔÚÆð¾¢»º½âÕâ¸öÎÊÌâ¡£µ«ÓÐTwitterÓû§¶Ô´ËÉùÃ÷×ö³ö̸ÂÛ£¬³ÆÕâ¿ÉÄÜÊÇÓÉÓÚËûÃÇϵͳµÄ¸ºÔØÆ½ºâ²»¼Ñµ¼Öµģ¬¶ø²»ÊÇDDoS¹¥»÷¡£Õâ¿ÉÄÜÓëÔçЩʱ¼äÐû²¼µÄȼÉÕµÄÔ¶Õ÷£¨The Burning Crusade£©Óйأ¬ÔçÔÚ½ñÄê1Ô£¬Íæ¼ÒÔÚÍæÄ§ÊÞÌìÏÂʱҲÓöµ½ÁËͬÑùµÄÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/blizzard-experiencing-ddos-attack-possible-high-latency-and-disconnections-533100.shtml
5.ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð

±¸·Ý×°±¸¹©Ó¦ÉÌExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬ÔÚ5ÔÂ13ÈÕÖ§¸¶ÁË260ÍòÃÀÔªÊê½ð¡£ºÚ¿ÍÔÚ̸ÅÐÖÐÉù³ÆÆäÒÑÔڸù«Ë¾µÄµÄÍøÂçÖÐÍ£ÁôÒ»¸ö¶àÔ£¬¼ÓÃÜÁËËùÓÐÎļþ·þÎñÆ÷ºÍSQL ·þÎñÆ÷£¬²¢ÏÂÔØÁËÁè¼Ý800GBµÄÐÅÏ¢¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨¿Í»§ºÍÔ±¹¤µÄСÎÒ˽¼ÒÊý¾Ý¡¢ÉÌÒµÌõÔ¼¡¢±£ÃÜÐÒé±í¸ñ¡¢²ÆÎñÊý¾Ý¡¢ÄÉ˰É걨±íºÍÔ´´úÂë¡£ºÚ¿Í×î³õÒªÇóµÄÊê½ð½ð¶îΪ7480000ÃÀÔª£¬¾¶à´Î̸ÅкóΪ260ÍòÃÀÔª¡£ExaGridÔÚÊÕµ½½âÃܹ¤¾ßÁ½Ììºó³Æ²»Ð¡ÐÄɾ³ýÁËËü£¬²¢ÒªÇóºÚ¿ÍÓÖ·¢ÁËÒ»±é¡£
ÔÎÄÁ´½Ó£º
https://www.computerweekly.com/news/252501665/Exagrid-pays-26m-to-Conti-ransomware-attackers
6.Ñо¿Ö°Ô±ÑÝʾÔõÑùÈÆ¹ý΢ÈíAMSIµÄͨÀýÇå¾²Õ½ÂÔ

SophosµÄÑо¿Ö°Ô±ÑÝʾÁËÔõÑùÈÆ¹ý΢Èí·´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) µÄͨÀýÇå¾²Õ½ÂÔ¡£Ñо¿Ö°Ô±³ÆÒ»ÖÖÒªÁìÊÇÈÆ¹ýɨÃè³ÌÐò£¬Ê¹ÓûìÏý¡¢¼ÓÃÜ¡¢ÒþдÊõºÍÆäËûÊÖÒÕ£¬Ê¹É±¶¾Èí¼þ¸üÄÑ·¢Ã÷payloadµÄ¹¥»÷Òâͼ£»ÁíÒ»ÖÖÊÇÒ»×îÏȾÍÍêÈ«×èÖ¹¶ñÒâÈí¼þ±»É¨Ãè¡£SophosÌåÏÖ£¬Áè¼Ý98%µÄAMSIʵÑé¶¼ÊÇͨ¹ý¸Ä¶¯AMSI¿âÀ´ÊµÏֵģ¬ÓжàÖÖ¶ñÒâÈí¼þ»áÊÔͼÕÒµ½ÒѼÓÔØµ½ÄÚ´æÖеÄAmsiScanBuffer£¬È»ºóÁýÕÖÆäÖ¸ÁîÒÔÈ·±£É¨ÃèÇëÇóʧ°Ü¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/this-is-how-attackers-bypass-microsoft-antimalware-scan-software-amsi/


¾©¹«Íø°²±¸11010802024551ºÅ