Hyper-VÐé¹¹»úÌÓÒÝ·´ÏòRDP·ì϶£»×êÑÐÈËÔ±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸ö°²È«·ì϶

°ä²¼¹¦·ò 2019-08-09
1¡¢×êÑÐÈËÔ±Åû¶¿Éµ¼ÖÂHyper-VÐé¹¹»úÌÓÒݵķ´ÏòRDP·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Check Point×êÑÐÈËÔ±Eyal ItkinÔÚBlackHat USA 2019ÉÏÅû¶Á˿ɵ¼Ö·´ÏòRDP¹¥»÷µÄÒ»¸ö·ì϶£¬¸Ã·ì϶£¨CVE-2019-0887£©¿ÉÓÃÓÚÌÓÒÝHyper-VÐé¹¹»ú¡£Æ¾¾Ý×êÑÐÈËÔ±µÄ±íÊö£¬Hyper-VÖÎÀíÆ÷µÄ¼ÓÇ¿»á»°Ä£Ê½Ê¹ÓÃÁËRDPÒ»ÑùµÄʵÏÖ£¬ÓÃÓÚÔÚÖ÷»úºÍÐé¹¹»úÖ®¼ä¹²Ïí×ÊÔ´£¬ÀýÈç¼ôÌù°åµÈ¡£ÕâÒâζ×ÅHyper-VÖÎÀíÆ÷Ò²Êܵ½RDPÖеķì϶ӰÏì¡£¶ñÒâRDP·þÎñÆ÷¿Éͨ¹ýÏò¼ôÌù°å·¢ËͶñÒâÄÚÈÝ×îÖÕÔÚËÞÖ÷»úÉÏ´¥·¢õè¾¶±éÀú¡£Î¢ÈíÔÚ7Ô·ݰ䲼µÄWindows°²È«¸üÐÂÖо²Ä¬½¨¸´Á˸÷ì϶¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/reverse-rdp-windows-hyper-v.html


2¡¢×êÑÐÈËÔ±ÔÚ6ÖÔìóÒµ´òÓ¡»úÖз¢ÏÖ³¬¹ý35¸ö°²È«·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

NCC Group×êÑÐÈËÔ±ÔÚ6ÖÖÖ÷Á÷ÐÍºÅµÄÆóÒµ´òÓ¡»úÖз¢ÏÖÖÁÉÙ35¸ö°²È«·ì϶¡£ÕâЩ·ì϶µÄÓ°ÏìÁìÓòÔ̺¬´òÓ¡»ú±ÀÀ££¨»Ø¾ø·þÎñ£©¡¢¼à¿Ø´òÓ¡×÷ÒµÒÔ¼°Î´ÊÚȨ·¢ËÍ´òÓ¡×÷ÒµµÈ¡£ÊÜÓ°ÏìµÄ³§ÉÌÆ·ÅÆÔ̺¬»ÝÆÕ¡¢Àí¹â¡¢Xerox¡¢ÀûÃË¡¢KyoceraºÍBrother¡£ËùÓеķì϶ҪôÒѾ­±»½¨¸´£¬ÒªÃ´¼´½«°ä²¼½¨¸´²¹¶¡£¬×êÑÐÈËÔ±½«ÔÚÖÜÁùµÄDEF CON´ó»áÉÏÅû¶¸ü¶à¼¼Êõϸ½Ú¡£


Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/office-printers-hackers-open-door/147083/


3¡¢×êÑÐÈËÔ±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸ö°²È«·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

IOActive×êÑÐÈËÔ±Ruben SantamartaÔÚBlack Hat´ó»áÉÏÅû¶Á˲¨Òô787ÃλÿͻúÖеĶà¸ö°²È«·ì϶¡£ÕâЩ·ì϶Óë·É»úµÄ³ÉÔ±ÐÅÏ¢·þÎñ/ÊØ»¤ÏµÍ³£¨CIS/MS£©ÓйØ£¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ·ì϶Ïò·É»úµÄ¹Ø¼ü°²Õûϵͳ£¨ÀýÈçÒýÇæ¡¢Ô춯ϵͳ¡¢´«¸ÐÆ÷£©·¢ËͶñÒâºÅÁî¡£´Ë±í£¬¹¥»÷Õß»¹¿Éͨ¹ýÈëÇÖ·É»úµÄÎÀÐÇÉ豸¼°ÎÞÏßͨѶÇþ·ÏòÊØ»¤¹¤³ÌʦÌṩÃýÎóµÄϵͳÐÅÏ¢¡£²¨ÒôÐû³ÆÕâЩÎÊÌâ²»»á×é³ÉÍøÂçÍþв£¬ÓÉÓÚÆä·À»¤´ëÊ©Äܹ»×èÖ¹´ËÀ๥»÷¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.wired.com/story/boeing-787-code-leak-security-flaws/?verso=true


4¡¢PearsonÊý¾Ýй¶²¨¼°Indian Prairie 204Ñ§Çø½ü5ÍòÃûѧÉú

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ƾ¾ÝIndian Prairie 204Ñ§Çø°ä²¼µÄÊý¾Ýй¶֪ͨ£¬Pearson¹«Ë¾Ôâ·êµÄÊý¾Ýй¶ÊÂÎñ²¨¼°µ½¸ÃÑ§ÇøµÄ4.9ÍòÃûѧÉúÒÔ¼°2300ÃûÔ±¹¤¡£ÊÜÓ°ÏìµÄѧÉúÊÇÔÚ2001ÖÁ2016ѧÄêÆÚ¼ä×¢²áµÄѧÉú£¬Ð¹Â¶µÄѧÉúÐÅÏ¢½öÔ̺¬ÐÕÃûÒÔ¼°µ®ÉúÈÕÆÚ£¬²»Ô̺¬Èκγɾ͡¢Ñ§ºÅµÈÐÅÏ¢¡£ÊÜÓ°ÏìµÄÔ±¹¤ÐÅÏ¢ÔòÔ̺¬ÐÕÃû¼°Ñ§Ìõç×ÓÓʼþµØÖ·¡£Pearson½«ÎªÊÜÓ°ÏìµÄѧÉúºÍÔ±¹¤ÌṩÃâ·ÑµÄÐÅÓþ±£»¤·þÎñ¡£


Ô­ÎÄÁ´½Ó£ºhttp://www.ipsd.org/news.aspx?id=104263


5¡¢SuperINNÔâºÚ¿ÍÈëÇÖ£¬³¬¹ý4.3Íò¿Í»§µÄÒþÖÔÐÅϢй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Sark Technologies¹«Ë¾¿ª·¢µÄÔ¤Ô¼ÖÎÀíÈí¼þSuperINN´æÔÚ·ì϶£¬µ¼ÖÂÆäÊý¾Ý¿â±»ºÚ¿ÍÈëÇÖ£¬³¬¹ý4.3ÍòÓû§µÄÐÅÏ¢±»ÇÔ¡£¸Ã¹«Ë¾ÓÚ2019Äê5ÔÂ26ÈÕ·¢ÏÖÈëÇÖÊÂÎñ£¬Æ¾¾Ý¸Ã¹«Ë¾µÄµ÷²é£¬SuperINNµÄͼÏñÉÏ´«Ö°ÄÜ´æÔÚ·ì϶£¬µ¼Ö¹¥»÷ÕßÔÚ2018Äê9ÔÂ23ÈÕÉÏ´«ÁËPHP web shell£¬²¢×îÖÕÓÚ2019Äê1ÔÂ1ÈÕÖÁ5ÔÂ30ÈÕÆÚ¼ä½Ó¼ûÁËÓû§Êý¾Ý¿â¡£Ð¹Â¶µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢ÓʼþµØÖ·¡¢¼ÓÃܵÄÐÅÓþ¿¨ºÅµÈ¡£´Ë±í£¬¹¥»÷Õß»¹ÀûÓÃSuperINNÖеÄÒ»¸öSQL×¢Èë·ì϶ÇÔÈ¡Á˼ÓÃܵijֿ¨ÈËÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://oag.ca.gov/system/files/Sark%20Notice%20of%20Data%20Security%20Incident%20%28California%29_1.PDF

6¡¢ÃÀ¹ú¹ú¶È°ôÇòÃûÈËÌùÙÍøÏ°È¾MageCart¾ç±¾£¬¿Í»§ÐÅÓþ¿¨ÐÅÏ¢ÔâÇÔ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

λÓÚŦԼ¿â²®Ë¹¶ÙµÄÃÀ¹ú¹ú¶È°ôÇòÃûÈËÌÃ×î½üÔâ·êÊý¾Ýй¶ÊÂÎñ£¬ÆðÒòÊÇÆä¹ÙÍø±»Ö²Èë¶ñÒâMageCart¾ç±¾£¬µ¼ÖÂÔÚÍøÕ¾ÉϹºÎïµÄÏû·ÑÕßÐÅÓþ¿¨ÐÅÏ¢±»ÇÔ¡£ÕâÒ»ÊÂÎñ²úÉúÔÚ2018Äê11ÔÂ15ÈÕÖÁ2019Äê5ÔÂ14ÈÕÆÚ¼ä£¬¸Ã¹«Ë¾ÓÚ2019Äê6ÔÂ18Èղŷ¢ÏÖÎÊÌâ¡£±»ÇÔµÄÐÅÏ¢Ô̺¬Ïû·ÑÕßµÄÐÕÃû¡¢µØÖ·ÒÔ¼°ÐÅÓþ¿¨/½è¼Ç¿¨ÐÅÏ¢£¬Ô̺¬CVVÂ롣ĿǰÉв»Ã÷ÏÔ¾ßÌåµÄÊÜÓ°ÏìÈËÊý¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/national-baseball-hall-of-fame-hit-by-payment-card-stealing-attack/