AdobeÐû²¼Çå¾²¸üÐÂÐÞ¸´¶à¿îÎó²î: ¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐÔâµ½¹¥»÷

Ðû²¼Ê±¼ä 2021-10-14

¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷


¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷.png


ÉÏÖÜÄ© £¬¶ò¹Ï¶à¶û×î´óµÄ˽ÈËÒøÐÐBanco PichinchaÔâµ½ÁËÍøÂç¹¥»÷ £¬ÏµÍ³ÔÝʱ¹Ø±Õ¡£´Ë´Î¹¥»÷µ¼ÖÂÒøÐеÄÓªÒµ´óÃæ»ýÖÐÖ¹ £¬°üÀ¨ATM¡¢ÍøÉÏÒøÐС¢Ó¦ÓóÌÐò¡¢µç×ÓÓʼþϵͳºÍ×ÔÖú·þÎñ¡£¸ÃÒøÐÐÔÚ·þÎñÖÐÖ¹µÄÁ½ÌìºóÐû²¼ÉùÃ÷ £¬³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷ £¬µ«²¢Î´¹ûÕæ´Ë´Î¹¥»÷µÄÐÔ×Ó¡£¾ÝÑо¿Ö°Ô±³ÆÕâÊÇÒ»´ÎÀÕË÷Èí¼þ¹¥»÷ £¬¹¥»÷ÕßÔÚÒøÐеÄϵͳÖÐ×°ÖÃÁËCobalt Strike beacon¡£


Ô­ÎÄÁ´½Ó£º


https://www.bleepingcomputer.com/news/security/cyberattack-shuts-down-ecuadors-largest-bank-banco-pichincha/02


Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÙÔâ¹¥»÷ £¬ÃÀÖÞÓªÒµÊܵ½Ó°Ïì


Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÙÔâ¹¥»÷£¬ÃÀÖÞÓªÒµÊܵ½Ó°Ïì.png


ÈÕ±¾Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÚ10ÔÂ10ÈÕÔâµ½¹¥»÷ £¬µ¼ÖÂÃÀÖÞ£¨ÃÀ¹ú¡¢¼ÓÄôóºÍÀ­¶¡ÃÀÖÞ£©µÄϵͳ·þÎñÖÐÖ¹¡£¸Ã¹«Ë¾³ÆÆäÔÚ¼ì²âµ½¿ÉÒÉÔ˶¯ºó £¬Á¬Ã¦½ÓÄÉÁËÏìÓ¦²½·¥ £¬¹Ø±ÕÊÜÓ°ÏìµÄϵͳºó½«¸ÃÊÂÎñ×èÖ¹ÁËÔÚÃÀÖÞ¡£¹«Ë¾½²»°È˳ÆÃ»ÓÐÊý¾Ýй¶ÎÊÌâ £¬²¢ÔÊÐí½«¾¡¿ìÐû²¼ÏêϸÐÅÏ¢¡£OlympusÔøÔÚ9ÔÂ8ÈÕÔâµ½ÁËBlackMatterµÄÀÕË÷¹¥»÷ £¬ÆäʱµÄ¹¥»÷Ó°ÏìÁËÆäEMEA£¨Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ£©ITϵͳ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123263/security/olympus-us-cyberattack.html



AdobeÐû²¼Çå¾²¸üР£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ10¸öÎó²î


AdobeÐû²¼Çå¾²¸üÐÂ£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ10¸öÎó²î.png


AdobeÔÚ10ÔÂ13ÈÕÐû²¼Çå¾²¸üР£¬ÐÞ¸´ÆäAcrobat¡¢Reader¡¢Connect¡¢CommerceºÍCampaign StandardÖеÄ10¸öÎó²î¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÊÇConnectÖеķ´ÐòÁл¯Îó²î £¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐÐ £¬CVSSÆÀ·ÖΪ9.8¡£±ðµÄ £¬»¹ÐÞ¸´ÁËAcrobatºÍReaderÖеĴúÂëÖ´ÐÐÎó²îCVE-2021-40728ºÍCVE-2021-40731¡¢ÌáȨÎó²îCVE-2021-40729ºÍCVE-2021-40720 £¬ÒÔ¼° Adobe ops-cliÖеķ´ÐòÁл¯Îó²îCVE-2021-40720µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123269/security/adobe-critical-flaws.html


Ñо¿ÍŶӷ¢Ã÷FreakoutÕë¶ÔVisual Tools DVRµÄÔ˶¯


Ñо¿ÍŶӷ¢Ã÷FreakoutÕë¶ÔVisual Tools DVRµÄÔ˶¯.png


Juniper Threat LabsÔÚ10ÔÂ11ÈÕÅû¶Á˽©Ê¬ÍøÂçFreakout£¨ÓÖÃûNecro£©ÐÂÒ»ÂֵĹ¥»÷Ô˶¯¡£Ñо¿Ö°Ô±ÔÚ2021Äê9ÔµÄ×îºóÒ»Öܼì²âµ½ÁË´Ë´ÎÔ˶¯ £¬¹¥»÷ÕßÔÚÆäÎäÆ÷¿âÖÐÌí¼ÓÁËÒ»¸öÐÂÎó²î £¬¸ÃÎó²îÖ÷ÒªÕë¶ÔVisual Tools DVR VX16 4.2.28.0 £¬ÆäPoCÒÑÔÚ7ÔÂ6ÈÕ¹ûÕæ¡£±ðµÄ £¬ÐµÄÑù±¾É¾³ýÁË֮ǰµÄ¹¥»÷ÖÐʹÓõÄSMBɨÃè³ÌÐò £¬²¢½«¾ç±¾×¢ÈëURL´Ó֮ǰµÄÓ²±àÂë¸ü¸ÄΪÁËDGA URL¡£


Ô­ÎÄÁ´½Ó£º

https://blogs.juniper.net/en-us/threat-research/necro-python-botnet-goes-after-vulnerable-visualtools-dvr


NCC Group·¢Ã÷ÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷Ô˶¯


NCC Group·¢Ã÷ÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷Ô˶¯.png


10ÔÂ11ÈÕ £¬NCC Group·¢Ã÷ÁËÒ»¸ö½öÇÔÈ¡Êý¾Ý¶ø²»¼ÓÃÜÎļþµÄÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMC¡£Ñо¿Ö°Ô±ÌåÏÖSnapMCÕâ¸öÃû×ÖȪԴÓÚ¹¥»÷Õß¿ìËٵĹ¥»÷·½·¨ £¬Ëü¿ÉÒÔÔÚ30·ÖÖÓÄÚÈëÇÖÍøÂç¡¢ÇÔÈ¡Îļþ²¢·¢ËÍÀÕË÷Óʼþ¡£SnapMCʹÓÃÎó²îɨÃèÆ÷AcunetixÀ´ËÑË÷Ä¿µÄVPNºÍWebÖеÄÎó²î £¬°üÀ¨PrintNightmareÎó²î¡¢ASPX.NETµÄTelerik UIÖеÄÔ¶³Ì´úÂëÎó²îÒÔ¼°ÖÖÖÖSQL×¢ÈëÎó²îµÈ¡£Ë¼Á¿µ½SnapMCʹÓõľùÊÇÒÑÐÞ¸´µÄÎó²î £¬Ñо¿Ö°Ô±½¨ÒéÓû§ÊµÊ±×°Öò¹¶¡¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/snapmc-hackers-skip-file-encryption-and-just-steal-your-files/


IDCÐû²¼2021ÉϰëÄêÖйúITÇå¾²·þÎñÊг¡¸ú×Ù±¨¸æ


IDCÐû²¼2021ÉϰëÄêÖйúITÇå¾²·þÎñÊг¡¸ú×Ù±¨¸æ.png


IDCÔÚ10ÔÂ12ÈÕÐû²¼ÁË2021ÉϰëÄêÖйúITÇå¾²·þÎñÊг¡¸ú×Ù±¨¸æ¡£IDC½ç˵µÄÍøÂçÇå¾²·þÎñÊг¡»®·ÖÓÉÇå¾²×Éѯ·þÎñ¡¢ITÇå¾²½ÌÓýÓëÅàѵ·þÎñ¡¢ÍйÜÇå¾²·þÎñºÍÇå¾²¼¯³É·þÎñËĸö×ÓÊг¡×é³É¡£±¨¸æÏÔʾ £¬2021ÉϰëÄêÖйúITÇå¾²·þÎñÊг¡³§ÉÌÕûÌåÊÕÈëԼΪ11.1ÒÚÃÀÔª£¨Ô¼ºÏ71.5ÒÚÔªÈËÃñ±Ò£© £¬³§ÉÌÊÕÈë¹æÄ£½ÏÈ¥ÄêͬÆÚʵÏÖ·­±¶ÔöÌí £¬ÕÇ·ù¸ß´ï110% £¬½Ï2019Äêͬ±ÈÔöÌí38% £¬ÖйúITÇå¾²·þÎñÊг¡Õýʽ½øÈëÐèÇ´ÔðÃæ±¬·¢ÆÚ¡£


Ô­ÎÄÁ´½Ó£º

https://www.idc.com/getdoc.prCHE48302321