Ñо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day£»¶ò¹Ï¶à¶ûµçÐŹ«Ë¾CNTÔâµ½RansomEXXÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2021-07-19
1.Ñо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day


1.jpg


Ñо¿ÍŶӹûÕæÅû¶ÁËÒ»¸öеÄ0day £¬¹¥»÷ÕßʹÓøÃÎó²î¿ÉÒÔͨ¹ýÔ¶³Ì´òÓ¡·þÎñ»ñµÃWindowsÉϵÄSYSTEMȨÏÞ ¡£Ñо¿Ö°Ô±Benjamin Delpy³Æ £¬¸ÃÎó²îʹÓÃÁËWindows Point and Print¹¦Ð§Öеġ°Queue-Specific Files¡±ÌØÕ÷ ¡£ÔÚ×°ÖôòÓ¡»úʱ £¬¹©Ó¦ÉÌÌṩµÄ×°ÖóÌÐò¿ÉÒÔÖ¸¶¨Ò»×éÓëÌØ¶¨´òÓ¡ÐÐÁÐÏà¹ØÁªµÄÈκÎÀàÐ͵ÄÎļþ £¬¸ÃÎļþ½«±»ÏÂÔØµ½Ã¿Ò»¸öÅþÁ¬µ½´Ë´òÓ¡·þÎñÆ÷µÄ¿Í»§¶Ë ¡£Òò´Ë £¬µ±¿Í»§¶ËÅþÁ¬µ½¹¥»÷ÕßËù¿ØÖƵĴòÓ¡·þÎñÆ÷ʱ £¬½«×Ô¶¯ÏÂÔØ²¢ÒÔSYSTEMȨÏÞÖ´ÐжñÒâDLL ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/new-windows-print-spooler-zero-day-exploitable-via-remote-print-servers/


2.CloudflareµÄCDN JSÖÐÎó²îÓ°ÏìÈ«ÍøÉÏ12.7%µÄÍøÕ¾


2.jpg


CloudflareÒÑÐÞ¸´Æä¿ªÔ´CDN JSÖеÄÒ»¸öÑÏÖØÎó²î £¬¸ÃÎó²î¿ÉÓ°ÏìÈ«ÍøÉÏ12.7%µÄÍøÕ¾ ¡£CDN JSΪÊý°ÙÍòÍøÕ¾ÌṩÁè¼Ý4000¸öJavaScriptºÍCSS¿â £¬ÎªµÚ¶þ´óJavaScript CDN ¡£Ñо¿Ö°Ô±·¢Ã÷¹ØÓÚÿ¸öÐû²¼µ½CDN JSµÄGitHub´æ´¢¿âµÄ¿â £¬Æä¸üа汾½«´ÓÁ´½ÓµÄnpm×¢²á±íÏÂÔØ £¬²¢ÇÒ¸Ãnpm°æ±¾Ò²ÓÉ¿âµÄ×÷Õßά»¤ ¡£µ±Ðû²¼°üÀ¨Â·¾¶±éÀúÎó²îµÄnpm°üºó £¬¸Ã°ü×îÖÕÒ²»á±»CDNJSµÄ¸üлúеÈË´¦Öóͷ£ £¬²¢ÔÚÏ£ÆæµÄ·¾¶ÉÏ×¢ÈëBash¾ç±¾ ¡£¸ÃÎó²î¿É±»ÓÃÀ´Ô¶³ÌÖ´ÐÐÏÂÁî £¬ÏÖÒѱ»ÐÞ¸´ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-cloudflare-cdn-flaw-allowed-compromise-of-12-percent-of-all-sites/


3.¶ò¹Ï¶à¶ûµçÐŹ«Ë¾CNTÔâµ½RansomEXXÀÕË÷¹¥»÷


3.jpg


¶ò¹Ï¶à¶ûµÄ¹«Ë¾Corporaci¨®n Nacional de Telecomunicaci¨®n (CNT)Ôâµ½RansomEXXÀÕË÷¹¥»÷ £¬µ¼ÖÂÓªÒµÔËÓª¡¢Ö§¸¶ÍøÕ¾ºÍ¿Í»§Ö§³ÖÖÐÖ¹ ¡£CNTÊǶò¹Ï¶à¶ûµÄ¹úÓªµçÐÅÔËÓªÉÌ £¬ÌṩÀο¿µç»°·þÎñ¡¢Òƶ¯¡¢ÎÀÐǵçÊӺͻ¥ÁªÍøÅþÁ¬ ¡£7ÔÂ16ÈÕ £¬¸Ã¹«Ë¾ÔÚÆä¹ÙÍøÐû²¼Í¨¸æ £¬³ÆÒòÔâµ½¹¥»÷¿Í»§·þÎñºÍÔÚÏßÖ§¸¶ÔÝʱÖÐÖ¹ £¬²¢ÌåÏÖÒÑÏòÕþ¹óÔ¢±¨Á˴˴ι¥»÷ÊÂÎñ ¡£ËäÈ»CNTûÓÐÕýʽÉùÃ÷ÆäÔâµ½ÁËÀÕË÷¹¥»÷ £¬µ«RansomEXXÔÚÆäÍøÕ¾³ÆËûÃÇÒѾ­ÏÂÔØÁËCNTÁè¼Ý190GBµÄÎļþ £¬²¢×¼±¸¹ûÕæËüÃÇ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ecuadors-state-run-cnt-telco-hit-by-ransomexx-ransomware/


4.TestcoronanuµÄCovidÊý¾Ý¿É±»¸Ä¶¯²¢Ð¹Â¶6ÍòÈËÐÅÏ¢


4.jpg


Covid¼ì²â¹«Ë¾TestcoronanuµÄÊý¾Ý¿É±»¸Ä¶¯²¢Ð¹Â¶Áè¼Ý6ÍòÈ˵ÄÐÅÏ¢ ¡£RTL NieuwsÔÚÉÏÖÜÈÕ±¨µÀ³Æ £¬Testcoronanu±¬·¢ÁËÑÏÖØµÄй¶ÊÂÎñ £¬ÈκÎÈ˶¼¿ÉÒÔ½¨Éè×Ô¼ºµÄCovidÒßÃç½ÓÖÖ»ò¼ì²âÖ¤Êé ¡£Óû§¿ÉÒÔ×Ô¼ºÔÚÊý¾Ý¿âÖÐÊäÈë¾­ÓÉÁËÄÄÖÖ¼ì²âÒÔ¼°¼ì²âЧ¹ûÊÇʲô £¬Ö®ºó £¬½«×Ô¶¯ÊÕµ½TestcoronanuµÄÂÃÐÐ֤ʵ £¬²¢ÇÒÓû§»¹¿ÉÒԸ͝ÆäËûÈ˵ÄÊý¾Ý ¡£±ðµÄ £¬´Ë´ÎÊÂÎñ»¹Ð¹Â¶ÁË6ÍòÓû§µÄСÎÒ˽¼ÒÐÅÏ¢ £¬ÀýÈçÈ«Ãû¡¢µØµã¡¢µç»°ºÅÂë¡¢Éç»áÇå¾²ºÅÂë¡¢»¤ÕÕºÅÂëºÍÒ½ÁÆÐÅÏ¢µÈ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/nl-leak-at-covid-testing-company-made-it-possible-to-fake-results-in-coronacheck-app/


5.Ñо¿Ö°Ô±Åû¶HelloKittyÕë¶ÔSonicWall×°±¸µÄ¹¥»÷


5.jpg


ÍøÂçÇå¾²¹«Ë¾CrowdStrikeÅû¶HelloKittyÕë¶ÔSonicWall×°±¸µÄ¹¥»÷ ¡£HelloKityÊÇ×Ô2020Äê11ÔÂ×îÏÈ»îÔ¾µÄÀÕË÷ÍÅ»ï £¬ÔøÇÔÈ¡ÁËCyberpunk 2077¡¢Witcher 3¡¢Gwent ºÍÆäËûÓÎÏ·µÄÔ´´úÂë ¡£Ñо¿Ö°Ô±³ÆºÚ¿ÍʹÓÃÁËSonicWall SMAºÍSRA²úÆ·ÖеÄCVE-2019-7481Îó²î £¬¸ÃÎó²îÒÑÔÚ2021ÄêÍ·Ðû²¼µÄ¹Ì¼þ¸üÐÂÖоÙÐÐÁËÐÞ¸´ ¡£±ðµÄ £¬CrowdStrikeÖÒÑÔBabukÍŻﻹÔÚÕë¶Ô±£´æCVE-2020-5135Îó²îµÄSonicWall VPN×°±¸ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/120249/malware/hellokitty-ransomware-sonicwall-devices.html


6.PRODAFT³Æ°²×¿ToddlerÕë¶ÔÅ·Ö޵Ĺ¥»÷Ô˶¯¼¤Ôö


6.jpg


PRODAFTÍþвÇ鱨(PTI)ÍŶÓÌåÏÖ £¬ÐÂÐÍAndroidÒøÐÐľÂíToddler£¨Ò²³ÆTeaBot/Anatsa£©Õë¶ÔÅ·Ö޵Ĺ¥»÷Ô˶¯¼¤Ôö ¡£CleafyÔÚ1Ô·ÝÊ×´ÎÅû¶ÁËToddler £¬Æä¹¥»÷ÁË60¼ÒÅ·ÖÞÒøÐеĿͻ§ ¡£PTIÆÊÎö·¢Ã÷ £¬ToddlerÖ÷ÒªÕë¶ÔÎ÷°àÑÀ £¬µ«Æä¶ñÒâÈí¼þÑù±¾ÖÐÒ²°üÀ¨ÁËÕë¶ÔÎ÷°àÑÀÓï¡¢Ó¢Óï¡¢Òâ´óÀûÓï¡¢µÂÓï¡¢·¨ÓïºÍºÉÀ¼ÓïÓû§µÄÎı¾ÄÚÈÝ £¬×èÖ¹ÏÖÔÚ £¬ToddlerÒѾ­Ñ¬È¾ÁËÁè¼Ý7632̨װ±¸ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/toddler-mobile-banking-malware-surges-across-europe/