eSentire·¢ÏÖÕë¶ÔLinkedInÓû§·Ö·¢more_eggsµÄµöÓã»î¶¯£»ClarotyÅû¶ÂÞ¿ËΤ¶û×Ô¶¯»¯µÄ²úÎïÖÐÓжà¸ö©¶´
Ðû²¼Ê±¼ä 2021-04-071.eSentire·¢ÏÖÕë¶ÔLinkedInÓû§·Ö·¢more_eggsµÄµöÓã»î¶¯
Äþ¾²¹«Ë¾eSentire·¢ÏÖÕë¶ÔLinkedInÉÏʧҵÓû§µÄÐÂÒ»ÂÖÓã²æÊ½ÍøÂçµöÓã»î¶¯£¬ÀûÓÃÁ˶ñÒâµÄZIPÎļþÀ´·Ö·¢ÅÓ´óµÄÎÞÎļþºóÃÅmore_eggs¡£¸Ã¶ñÒâÈí¼þ»á½Ù³ÖºÏ·¨µÄWindows½ø³ÌÀ´Òþ²ØÆäÅäÖÃÎļþ£¬²¢¿É¼ìË÷ÆäËû¶ñÒâpayload»òÊÇÇÔÈ¡Êý¾Ý¡£´ËÍ⣬¸Ã»î¶¯¿ÉÒÔÕë¶Ô²îÒìµÄÄ¿±êÀ´²»Í£µ÷ÕûÆä¹¥»÷£¬ÀûÓÃÌØÖÆµÄÓÕ¶üÀ´ÓÕʹÓû§ÏÂÔØ¶ñÒâÈí¼þ¡£Ä¿Ç°Éв»Çå³þ¸ÃºÚ¿Í×éÖ¯µÄÉí·Ý£¬µ«¾ÝÍÆ²â£¬¿ÉÄÜÓëFIN6¡¢Cobalt Group»òEvilnumÓйء£
ÔÎÄÁ´½Ó£º
https://www.esentire.com/security-advisories/hackers-spearphish-professionals-on-linkedin-with-fake-job-offers-infecting-them-with-malware-warns-esentire
2.OnapsisÓëSAPÁªºÏÐû²¼Õë¶ÔSAPÓ¦ÓõĹ¥»÷»î¶¯µÄ¾¯±¨
4ÔÂ6ÈÕ£¬ÔÆÄþ¾²¹«Ë¾OnapsisºÍSAP¾¯¸æÁËÕë¶ÔSAPÓ¦ÓõÄÁ¬Ðø¹¥»÷£¬²¢ÓëCISAºÍµÂ¹úÍøÂçÄþ¾²»ú¹¹BSIºÏ×÷£¬ÌáÐÑSAP¿Í»§°²×°²¹¶¡·¨Ê½²¢ÊÓ²ìÆä»·¾³ÖÐÊÇ·ñ´æÔÚ²»Äþ¾²µÄÓ¦Óá£Onapsis³Æ£¬ÔÚ2020Äê6ÔÂÖÁ2021Äê3ÔÂÖ®¼ä£¬·¢ÉúÁËÀ´×Ô20¸ö¹ú¼Ò»òµØÓòµÄ1500´Î¹¥»÷ʵÑ飬ÆäÖÐ300´Î¹¥»÷Àֳɡ£¸Ã³ÂËß»¹ÏêϸÃèÊöÁËÕâЩ¶ñÒâ»î¶¯Ê¹ÓõÄ©¶´ºÍ¹¥»÷ÒªÁ죬ּÔÚ×ÊÖúÓû§Ê¶±ðºÍ·À·¶Ç±ÔڵĹ¥»÷»î¶¯¡£
ÔÎÄÁ´½Ó£º
https://onapsis.com/active-cyberattacks-mission-critical-sap-applications
3.SensorFuÅû¶Apple MailÖмàÌýÓʼþµÄÁãµã»÷©¶´
SensorFuÅû¶AppleµÄmacOS MailÖдæÔÚ¿ÉÓÃÀ´¼àÌýÓʼþµÄÁãµã»÷©¶´¡£¸Ã©¶´±»×·×ÙΪCVE-2020-9922£¬CVSSÆÀ·ÖΪ6.5£¬¿ÉÓÃÀ´ÔÚMailµÄɳÏä»·¾³ÖÐÌí¼Ó»òÐÞ¸ÄÈÎÒâÎļþ¡£¹¥»÷ÕßÖ»ÐèÏòÄ¿±ê·¢ËÍÒ»·â´øÓÐÁ½¸ö.ZIPÎļþµÄÓʼþ¼´¿É´¥·¢¸Ã©¶´£¬µÚÒ»¸ö.ZIP°üÂÞÃûΪMailµÄ·ûºÅÁ´½Ó£¬Ö¸ÏòÊܺ¦ÕßµÄ$HOME/Library/MailºÍ1.txt£¬µÚ¶þ¸ö.ZIP°üÂÞÒª¶Ô$HOME/Library/MailËù×öµÄ¸ü¸Ä£¬À´Ìṩ¶Ô¿â»òÓʼþµÄÈÎÒâÎļþдÈëȨÏÞ¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/apple-mail-zero-click-security-vulnerability/165238/
4.ClarotyÅû¶ÂÞ¿ËΤ¶û×Ô¶¯»¯µÄ²úÎïÖдæÔÚ¶à¸ö©¶´
Äþ¾²¹«Ë¾ClarotyÅû¶ÁËÂÞ¿ËΤ¶û×Ô¶¯»¯µÄFactoryTalk AssetCentre²úÎïÖдæÔÚµÄ9¸ö©¶´£¬ËüÃǵÄCVSS 3ÆÀ·Ö¾ùΪ10¡£¸Ã²úÎïÖ÷ÒªÓÃÓÚÕû¸ö¹¤³§Óë×Ô¶¯»¯Ïà¹ØµÄ×ʲúÐÅÏ¢µÄ±£»¤¡¢¹ÜÀí¡¢°æ±¾¿ØÖÆ¡¢¸ú×ٺͳÂËß¡£ÕâЩ©¶´·Ö±ðΪ²»ÐÐÐÅÊý¾ÝµÄ·´ÐòÁл¯£¨CVE-2021-27462¡¢CVE-2021-27466¡¢CVE-2021-27460ºÍCVE-20201-27470£©¡¢²Ù×÷ϵͳÃüÁî×¢È루CVE-2021-27476£©¡¢SQL×¢È루CVE-2021-27472¡¢CVE-2021-27468ºÍCVE-2021-27464£©ÒÔ¼°ÐÅϢй¶£¨CVE-2021-27474£©¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/116391/ics-scada/rockwell-factorytalk-assetcentre-flaws.html
5.ÐÂ¼ÓÆÂ¹¤»áe2iÔâµ½µöÓã¹¥»÷£¬Ð¹Â¶ÊýÍò¹«ÃñµÄÐÅÏ¢
ÐÂ¼ÓÆÂÈ«¹ú¹¤»á´ú±í´ó»á¾ÍÒµÓë¾ÍÒµÑо¿Ëù£¨e2i£©ÔÚ±¾ÖÜÒ»£¨4ÔÂ5ÈÕ£©Ðû²¼ÉùÃ÷³Æ£¬¹¥»÷Õß¿ÉÄÜÒѾ·ÃÎÊÆäÓû§µÄ¸öÈËÐÅÏ¢¡£´Ë´Îй¶µÄÐÅÏ¢°üÂÞÓû§µÄÐÕÃû¡¢½ÌÓý×ʸñºÍNRIC¡¢ÁªÏµ·½Ê½ºÍ¾Íҵϸ½ÚµÈ¡£Ê¼þ·¢ÉúÔÚ3ÔÂ12ÈÕ£¬ÆäµÚÈý·½¹©Ó¦ÉÌ¡ª¡ªÁªÂçÖÐÐÄ·þÎñ¹«Ë¾i-vic InternationalÔ±¹¤µÄÓÊÏäÔâµ½µöÓã¹¥»÷£¬¸ÃÓÊÏäµÄÔÆ¶Ë°üÂÞÁËÔ¼3Íò¸ö¼ÓÈëÁËe2i»î¶¯µÄÓû§ÐÅÏ¢£¬µ«ÊǸûú¹¹¾Ü¾øÍ¸Â¶×ܹ²Óм¸¶àÈËÔøÊ¹Óùýe2iµÄ·þÎñ¡£
ÔÎÄÁ´½Ó£º
https://www.straitstimes.com/tech/tech-news/personal-data-of-30000-people-who-use-ntucs-e2i-services-may-have-been-breached
6.Unit42Ðû²¼2020ÄêÍøÂçµöÓã¹¥»÷Ç÷ÊÆµÄ»Ø¹Ë³ÂËß
Unit42Ðû²¼ÁË2020ÄêÍøÂçµöÓã¹¥»÷Ç÷ÊÆµÄ»Ø¹Ë³ÂËß¡£³ÂËßÏÔʾ£¬´Ó2019µ½2020Ä꣬¶ñÒâPDFÎļþ¼±¾çÔö¼ÓÁË1160£¥£¬´Ó411800¸ö¶ñÒâÎļþÔö¼Óµ½5224056¸ö¡£ÎªÁËÓÕʹÓû§µöÓãPDFÎļþÖеÄǶÈëµÄÁ´½Ó£¬¹¥»÷ÕßÔÚ2020ÄêÖ÷ҪʹÓÃÁË5ÖÖ²îÒìµÄý½é£¬·ÖΪαÔìµÄÑéÖ¤Â루ռ±È38.67%£©¡¢ÓÅ»Ýȯ£¨2.16%£©¡¢´øÓв¥·Å°´Å¥µÄ¾²Ì¬Í¼Ïñ£¨1.44%£©¡¢Îļþ¹²Ïí£¨0.84%£©ºÍµç×ÓÉÌÎñ£¨0.36%£©¡£ÆäÖУ¬´ó¶àÊý¹¥»÷ʹÓÃÁËÒ»ÖÖͨÓü¼Êõ£ºÁ÷Á¿Öض¨Ïò¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/phishing-trends-with-pdf-files/