AvertX IPϵÁÐÉãÏñÍ·´æÔÚ3¸ö·ì϶£¬¿ÉÌáÒ鱩Á¦¹¥»÷£»ÒÔÉ«ÁÐÁ½´¦Ë®Àû»ù´¡ÉèÊ©Ôâµ½ÍøÂç¹¥»÷
°ä²¼¹¦·ò 2020-07-211.AvertX IPϵÁÐÉãÏñÍ·´æÔÚ3¸ö·ì϶£¬¿É±»ÀûÓÃÌáÒ鱩Á¦¹¥»÷
Palo Alto Networks Unit 42·¢ÏÖÁË×îа汾µÄAvertX IPÉãÏñ»úÖдæÔÚµÄÈý¸ö·ì϶£¬¿É±»ÀûÓÃÌáÒ鱩Á¦¹¥»÷¡£ÕâЩ·ì϶±ðÀëΪÓû§Ã¶¾Ù·ì϶£¨CVE-2020-11625£©£¬ÃýÎóµÄwebÓû§½çÃæ(UI)µÇ¼²»´æÔÚµÄÕÊ»§Ê±»áµ¼ÖÂ·ÖÆçµÄÁ˾֣¬¿É±»ÀûÓÃÌáÒ鱩Á¦¹¥»÷£»ÈõÃÜÂ루CVE-2020-11624£©£¬²»ÒªÇóÓû§¸ü¸ÄĬÈÏÃÜÂ룬µ±Óû§Ê¹ÓÃĬÈÏÃÜÂëµÇ¼ʱ»áÌáÐÑÃÜÂëÒѸü¸Ä£¬µ«ÈÔÔÊÐíÓû§µÇ¼£»ÐÅϢй¶£¨CVE-2020-11623£©£¬´æÔÚÒ»¸ö¹«¿ªµÄUART½Ó¿Ú£¬¹¥»÷ÕßÄܹ»ÀûÓÃËü¶ÔUART½øÐÐÎïÀí½Ó¼û²¢¸ü¸ÄÅäÖÃÖ°ÄÜ¡£¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩ·ì϶½øÐб©Á¦¹¥»÷£¬ÀûÓÃĬÈÏÃÜÂë½Ó¼ûÉãÏñ»ú²¢Ïνӵ½IoTÉ豸£¬ÎïÀí½Ó¼ûUATRÀ´¸ü¸ÄÅäÖÃÉõÖÁ¹Ø¹ØÏà»ú¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2020/07/vulnerabilities-with-avertx-ip-security.html
2.ESET·¢ÏÖWelcome Chat¿É¼à¶½ºÍй¶Óû§Êý¾Ý
ESET×êÑз¢ÏÖÖж«µÄAndroidÀûÓÃWelcome Chat£¬¿É¼à¶½ºÍй¶Óû§Êý¾Ý£¬»òÓë¼ÓɳºÚ¿Í×éÖ¯MoleratsÓйء£¶ñÒâÍøÕ¾Ðû³Æ¸ÃÀûÓÃÊÇGoogle PlayÉ̵êÖÐÌṩµÄ°²È«Ì¸ÌìÆ½Ì¨£¬µ«ÏÖʵÉÏËü²¢²»ÔÚ¹Ù·½ÀûÓÃÉ̵ꡣװÖøÃÈí¼þºó£¬Æä»áÒªÇóÊܺ¦ÕßÔÊÐíȨÏÞ£¬ÀýÈç·¢ËͺͲ鿴SMSÐÂÎÅ¡¢½Ó¼ûÎļþ¡¢¼Í¹àÒôƵÒÔ¼°½Ó¼ûÁªÏµÈ˺ÍÉ豸µØÎ»¡£ÔÞ³ÉÕâЩÐí¿Éºó£¬¸ÃÈí¼þ»áµ±¼´½«ÓйØÉ豸µÄÐÅÏ¢·¢Ë͵½ÆäºÅÁîºÍ½ÚÔ죨C£¦C£©·þÎñÆ÷£¬²¢Ã¿Îå·ÖÖÓÓëC£¦C·þÎñÆ÷ÁªÏµÒ»´Î¡£ESETÒÔΪ£¬¸Ã¼äµý·¨Ê½ÓëAndroid¶ñÒâÈí¼þ¼Ò×åBadPatchÓйء£
ÔÎÄÁ´½Ó£º
https://www.welivesecurity.com/2020/07/14/welcome-chat-secure-messaging-app-nothing-further-truth/
3.ÒÔÉ«ÁÐË®Îñ¾ÖÈ·ÈÏÆäÁ½´¦Ë®Àû»ù´¡ÉèÊ©Ôâµ½ÍøÂç¹¥»÷
ÒÔÉ«ÁÐË®Îñ¾Ö¹ÙÔ±ÉÏÖܰµÊ¾£¬ÆäÁ½´¦Ë®Àû»ù´¡ÉèÊ©ÓÚÁùÔÂÔâµ½ÍøÂç¹¥»÷£¬Êܺ¦µØÖ·±ðÀëΪÉϼÓÀûÀûµØÓòµÄũҵˮ±ÃºÍÖв¿Ê¡·ÝMateh YehudaµÄË®±Ã¡£Ë®Îñ¾Ö°µÊ¾£¬ÕâЩ¶¼ÊÇũҵ²¿ÃÅרÓõÄÓ×ÐÍÅÅË®×°Öã¬Óɱ¾µØÈ˶ÀÁ¢Î¬½¨£¬Òò¶ø²»»áÔì³ÉÑϳÁµÄÓ°Ïì¡£¾ÍÔÚ½ñÄê4Ô£¬ÒÔÉ«Áй©Ë®ÏµÍ³Ôâµ½Á˳õ´ÎÍøÂç¹¥»÷¡£¶øÔÚ6Ô·ݣ¬Æ¾¾Ý¡¶½ðÈÚʱ±¨¡·±¨Â·£¬ºÚ¿ÍÒѾ»ñµÃÁËÒÔÉ«ÁÐijЩˮ´¦ÖÃϵͳµÄ½Ó¼ûȨ£¬²¢ÊÔͼŤתˮÂȺ¬Á¿£¬ÈôÊǹ¥»÷³É¹¦¿ÉÄܻᵼÖ±¾µØ¾ÓÃñÇá¶ÈÖж¾¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/two-more-cyber-attacks-hit-israels-water-system/#ftag=RSSbaffb68
4.°¢¸ùÍ¢µçÐŹ«Ë¾1.8ÍòÌ¨ÍÆËã»úϰȾÀÕË÷Èí¼þREVil
7ÔÂ18ÈÕ£¨ÐÇÆÚÁù£©°¢¸ùÍ¢µçÐŹ«Ë¾Ôâµ½ÀÕË÷Èí¼þREVil¹¥»÷£¬1.8ÍòÌ¨ÍÆËã»ú±»Ï°È¾£¬²¢±»ÀÕË÷109345.35 Monero´ú±ÒÊê½ð£¨Ô¼753ÍòÃÀÔª£©¡£¹¥»÷ÕßÊ×ÏÈ»ñµÃÁ˶Թ«Ë¾ÍøÂçµÄ½Ó¼ûȨ£¬¶øºóËûÃǽÚÔìÁËÄÚ²¿µÄDomain Admin£¬²¢Ê¹ÓøýӼûȨÏÞϰȾÁËÉÏÍòÌ¨ÍÆËã»ú£¬µ¼Ö°¢¸ùÍ¢µçÐÅÔËÓªµÄºÜ¶àÍøÕ¾¶¼ÍÑ»ú¡£¸Ã¹«Ë¾µÄITÈËÔ±¼ì²âµ½¹¥»÷ºó£¬·½±ã¼´ÖÒ¸æÆäÔ±¹¤²»ÒªÏÎ½ÓÆäÄÚ²¿VPNÍøÂ磬²¢Ô¤·À´ò¿ª´øÓпÉÒÉ´æµµ¸½¼þµÄµç×ÓÓʼþ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/106147/cyber-crime/telecom-argentina-revil-ransomware.html?utm_source=rss&utm_medium=rss&utm_campaign=telecom-argentina-revil-ransomware
5.IDC°ä²¼2019ÄêÖйúÈËΪÖÇÄܲúÒµ×êÑл㱨
È«ÇòȨÍþÕ÷ѯ»ú¹¹IDC°ä²¼¡¶ÖйúÈËΪÖÇÄÜÔÆ·þÎñÊг¡×êÑл㱨(2019)¡·¡£»ã±¨ÏÔʾ£¬ÔÚÖйúAI¹«ÓÐÔÆ·þÎñÕûÌåÊг¡¸ñ¾ÖÖУ¬°Ù¶ÈÖÇÄÜÔÆÔÚÕûÌåŲÓÃÁ¿¡¢Êг¡·Ý¶î·½Ãæ¾ùÃûÁеÚÒ»£¬Õ¼ÓÐ×î¶àµÄAI²úÆ·ÊýÁ¿¡£IDCÒÔΪ£¬AIÄÜÁ¦ÒѳÉΪÓû§Ñ¡ÔñÔÆ·þÎñ³§ÉÌʱµÄ³ÁÒª¿¼Á¿³É·Ö¡£¾Ýͳ¼Æ£¬ÖйúAIÔÆ·þÎñÊг¡2019ÄêÊг¡¹æÄ£´ï1.66ÒÚÃÀÔª£¬2018ÖÁ2024Ä긴ºÏÄê¾ùÔö³¤Âʽ«´ïµ½93.6%¡£
ÔÎÄÁ´½Ó£º
http://science.china.com.cn/2020-07/14/content_41219348.htm
6.Fireeye°ä²¼»ã±¨£¬Õë¶Ô¹¤¿ØÐÐÒµµÄ7¿îÀÕË÷Èí¼þ
FireeyeµÄMandiantÍþвµý±¨²¿ÃŰ䲼»ã±¨£¬·¢ÏÖÕë¶Ô¹¤¿ØÐÐÒµµÄ7¿îÀÕË÷Èí¼þ¡£MandiantÊ×ÏÈÈ·¶¨ÁËÁù¸öÀÕË÷Èí¼þϵÁеÄÑù±¾£¬±ðÀëΪDoppelPaymer¡¢LockerGoga¡¢Maze¡¢MegaCortex¡¢NefilimºÍSNAKEHOSE£¬ÕâЩÑù±¾ÔÚ´ÓǰÁ½ÄêÖж¼ÓëÓ°Ï칤ҵ×éÖ¯µÄ³Á´óÊÂÎñÓйء£MandiantÓÖ·ÖÎöÁËCLOPϵÁеĵڶþ¸öÀÕË÷Èí¼þÑù±¾£¨MD5£º3b980d2af222ec909b948b6bbdd46319£©£¬²¢Ê¹ÓÃÓ²±àÂëÁбíÀ´Ã¶¾ÙÔ̺¬OT×Ö·û´®µÄ¹ý³Ì£¬¸ÃÁбíÔ̺¬1425¸ö¹ý³Ì£¬ÆäÖÐÖÁÉÙÓÐ150¸öÊôÓÚOTÓйصÄÈí¼þÌ×¼þ¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2020/07/financially-motivated-actors-are-expanding-access-into-ot.html


¾©¹«Íø°²±¸11010802024551ºÅ