Ñо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day£»¶ò¹Ï¶à¶ûµçÐŹ«Ë¾CNTÔâµ½RansomEXXÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2021-07-19
1.Ñо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day


1.jpg


Ñо¿ÍŶӹûÈ»Åû¶ÁËÒ»¸öеÄ0day£¬¹¥»÷ÕßÀûÓøÃ©¶´¿ÉÒÔͨ¹ýÔ¶³Ì´òÓ¡·þÎñ»ñµÃWindowsÉϵÄSYSTEMȨÏÞ¡£Ñо¿ÈËÔ±Benjamin Delpy³Æ£¬¸Ã©¶´ÀûÓÃÁËWindows Point and Print¹¦Ð§Öеġ°Queue-Specific Files¡±ÌØÐÔ¡£ÔÚ°²×°´òÓ¡»úʱ£¬¹©Ó¦ÉÌÌṩµÄ°²×°·¨Ê½¿ÉÒÔÖ¸¶¨Ò»×éÓëÌØ¶¨´òÓ¡ÐÐÁÐÏà¹ØÁªµÄÈκÎÀàÐ͵ÄÎļþ£¬¸ÃÎļþ½«±»ÏÂÔØµ½Ã¿Ò»¸öÁ¬½Óµ½´Ë´òÓ¡·þÎñÆ÷µÄ¿Í»§¶Ë¡£Òò´Ë£¬µ±¿Í»§¶ËÁ¬½Óµ½¹¥»÷ÕßËù¿ØÖƵĴòÓ¡·þÎñÆ÷ʱ£¬½«×Ô¶¯ÏÂÔØ²¢ÒÔSYSTEMȨÏÞÖ´ÐжñÒâDLL¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/new-windows-print-spooler-zero-day-exploitable-via-remote-print-servers/


2.CloudflareµÄCDN JSÖЩ¶´Ó°ÏìÈ«ÍøÉÏ12.7%µÄÍøÕ¾


2.jpg


CloudflareÒÑÐÞ¸´Æä¿ªÔ´CDN JSÖеÄÒ»¸öÑÏÖØÂ©¶´£¬¸Ã©¶´¿ÉÓ°ÏìÈ«ÍøÉÏ12.7%µÄÍøÕ¾¡£CDN JSΪÊý°ÙÍòÍøÕ¾ÌṩÁè¼Ý4000¸öJavaScriptºÍCSS¿â£¬ÎªµÚ¶þ´óJavaScript CDN¡£Ñо¿ÈËÔ±·¢ÏÖ¶ÔÓÚÿ¸öÐû²¼µ½CDN JSµÄGitHub´æ´¢¿âµÄ¿â£¬Æä¸üа汾½«´ÓÁ´½ÓµÄnpm×¢²á±íÏÂÔØ£¬¶øÇÒ¸Ãnpm°æ±¾Ò²ÓÉ¿âµÄ×÷Õßά»¤¡£µ±Ðû²¼°üÂÞ·¾¶±éÀú©¶´µÄnpm°üºó£¬¸Ã°ü×îÖÕÒ²»á±»CDNJSµÄ¸üлúÆ÷ÈË´¦Ö㬲¢ÔÚÆæ¹ÖµÄ·¾¶ÉÏ×¢ÈëBash½Å±¾¡£¸Ã©¶´¿É±»ÓÃÀ´Ô¶³ÌÖ´ÐÐÃüÁÏÖÒѱ»ÐÞ¸´¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-cloudflare-cdn-flaw-allowed-compromise-of-12-percent-of-all-sites/


3.¶ò¹Ï¶à¶ûµçÐŹ«Ë¾CNTÔâµ½RansomEXXÀÕË÷¹¥»÷


3.jpg


¶ò¹Ï¶à¶ûµÄ¹«Ë¾Corporaci¨®n Nacional de Telecomunicaci¨®n (CNT)Ôâµ½RansomEXXÀÕË÷¹¥»÷£¬µ¼ÖÂÒµÎñÔËÓª¡¢Ö§¸¶ÍøÕ¾ºÍ¿Í»§Ö§³ÖÖжÏ¡£CNTÊǶò¹Ï¶à¶ûµÄ¹úÓªµçÐÅÔËÓªÉÌ£¬ÌṩÀι̵绰·þÎñ¡¢Òƶ¯¡¢ÎÀÐǵçÊӺͻ¥ÁªÍøÁ¬½Ó¡£7ÔÂ16ÈÕ£¬¸Ã¹«Ë¾ÔÚÆä¹ÙÍøÐû²¼Í¨¸æ£¬³ÆÒòÔâµ½¹¥»÷¿Í»§·þÎñºÍÔÚÏßÖ§¸¶ÔÝʱÖжÏ£¬²¢ÌåÏÖÒÑÏòÕþ¹óÔ¢±¨Á˴˴ι¥»÷ʼþ¡£ËäÈ»CNTûÓÐÕýʽÉùÃ÷ÆäÔâµ½ÁËÀÕË÷¹¥»÷£¬µ«RansomEXXÔÚÆäÍøÕ¾³ÆËûÃÇÒѾ­ÏÂÔØÁËCNTÁè¼Ý190GBµÄÎļþ£¬²¢×¼±¸¹ûÈ»ËüÃÇ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ecuadors-state-run-cnt-telco-hit-by-ransomexx-ransomware/


4.TestcoronanuµÄCovidÊý¾Ý¿É±»¸Ä¶¯²¢Ð¹Â¶6ÍòÈËÐÅÏ¢


4.jpg


Covid¼ì²â¹«Ë¾TestcoronanuµÄÊý¾Ý¿É±»¸Ä¶¯²¢Ð¹Â¶Áè¼Ý6ÍòÈ˵ÄÐÅÏ¢¡£RTL NieuwsÔÚÉÏÖÜÈÕ±¨µÀ³Æ£¬Testcoronanu·¢ÉúÁËÑÏÖØµÄй¶Ê¼þ£¬ÈκÎÈ˶¼¿ÉÒÔ´´½¨×Ô¼ºµÄCovidÒßÃç½ÓÖÖ»ò¼ì²âÖ¤Êé¡£Óû§¿ÉÒÔ×Ô¼ºÔÚÊý¾Ý¿âÖÐÊäÈë¾­¹ýÁËÄÄÖÖ¼ì²âÒÔ¼°¼ì²â½á¹ûÊÇʲô£¬Ö®ºó£¬½«×Ô¶¯ÊÕµ½TestcoronanuµÄÂÃÐÐÖ¤Ã÷£¬¶øÇÒÓû§»¹¿ÉÒԸ͝ÆäËûÈ˵ÄÊý¾Ý¡£´ËÍ⣬´Ë´Îʼþ»¹Ð¹Â¶ÁË6ÍòÓû§µÄ¸öÈËÐÅÏ¢£¬ÀýÈçÈ«Ãû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢Éç»áÄþ¾²ºÅÂë¡¢»¤ÕÕºÅÂëºÍÒ½ÁÆÐÅÏ¢µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/nl-leak-at-covid-testing-company-made-it-possible-to-fake-results-in-coronacheck-app/


5.Ñо¿ÈËÔ±Åû¶HelloKittyÕë¶ÔSonicWallÉ豸µÄ¹¥»÷


5.jpg


ÍøÂçÄþ¾²¹«Ë¾CrowdStrikeÅû¶HelloKittyÕë¶ÔSonicWallÉ豸µÄ¹¥»÷¡£HelloKityÊÇ×Ô2020Äê11Ô¿ªÊ¼»îÔ¾µÄÀÕË÷ÍÅ»ï£¬ÔøÇÔÈ¡ÁËCyberpunk 2077¡¢Witcher 3¡¢Gwent ºÍÆäËûÓÎÏ·µÄÔ´´úÂë¡£Ñо¿ÈËÔ±³ÆºÚ¿ÍÀûÓÃÁËSonicWall SMAºÍSRA²úÎïÖеÄCVE-2019-7481©¶´£¬¸Ã©¶´ÒÑÔÚ2021Äê³õÐû²¼µÄ¹Ì¼þ¸üÐÂÖнøÐÐÁËÐÞ¸´¡£´ËÍ⣬CrowdStrike¾¯¸æBabukÍŻﻹÔÚÕë¶Ô´æÔÚCVE-2020-5135©¶´µÄSonicWall VPNÉ豸¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/120249/malware/hellokitty-ransomware-sonicwall-devices.html


6.PRODAFT³Æ°²×¿ToddlerÕë¶ÔÅ·Ö޵Ĺ¥»÷»î¶¯¼¤Ôö


6.jpg


PRODAFTÍþвÇ鱨(PTI)ÍŶÓÌåÏÖ£¬ÐÂÐÍAndroidÒøÐÐľÂíToddler£¨Ò²³ÆTeaBot/Anatsa£©Õë¶ÔÅ·Ö޵Ĺ¥»÷»î¶¯¼¤Ôö¡£CleafyÔÚ1Ô·ÝÊ×´ÎÅû¶ÁËToddler£¬Æä¹¥»÷ÁË60¼ÒÅ·ÖÞÒøÐеĿͻ§¡£PTI·ÖÎö·¢ÏÖ£¬ToddlerÖ÷ÒªÕë¶ÔÎ÷°àÑÀ£¬µ«Æä¶ñÒâÈí¼þÑù±¾ÖÐÒ²°üÂÞÁËÕë¶ÔÎ÷°àÑÀÓï¡¢Ó¢Óï¡¢Òâ´óÀûÓï¡¢µÂÓï¡¢·¨ÓïºÍºÉÀ¼ÓïÓû§µÄÎı¾ÄÚÈÝ£¬½ØÖÁÏÖÔÚ£¬ToddlerÒѾ­Ñ¬È¾ÁËÁè¼Ý7632̨É豸¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/toddler-mobile-banking-malware-surges-across-europe/