eSentire·¢ÏÖÕë¶ÔLinkedInÓû§·Ö·¢more_eggsµÄ´¹µö»î¶¯£»ClarotyÅû¶ÂÞ¿ËΤ¶û×Ô¶¯»¯µÄ²úÆ·ÖÐÓжà¸ö·ì϶
°ä²¼¹¦·ò 2021-04-071.eSentire·¢ÏÖÕë¶ÔLinkedInÓû§·Ö·¢more_eggsµÄ´¹µö»î¶¯

°²È«¹«Ë¾eSentire·¢ÏÖÕë¶ÔLinkedInÉÏʧҵÓû§µÄÐÂÒ»ÂÖÓã²æÊ½ÍøÂç´¹µö»î¶¯£¬ÀûÓÃÁ˶ñÒâµÄZIPÎļþÀ´·Ö·¢¸´ÔÓµÄÎÞÎļþºóÃÅmore_eggs¡£¸Ã¶ñÒâÈí¼þ»á½Ù³ÖºÏ·¨µÄWindows¹ý³ÌÀ´°µ²ØÆäÅäÖÃÎļþ£¬²¢¿É¼ìË÷ÆäËû¶ñÒâpayload»òÊÇÇÔÈ¡Êý¾Ý¡£´Ë±í£¬¸Ã»î¶¯Äܹ»Õë¶Ô·ÖÆçµÄÖ¸±êÀ´²»Ðݵ÷ÕûÆä¹¥»÷£¬ÀûÓÃÌØÔìµÄµö¶üÀ´ÓÕʹÓû§ÏÂÔØ¶ñÒâÈí¼þ¡£Ä¿Ç°Éв»Ã÷ÏԸúڿÍ×éÖ¯µÄÉí·Ý£¬µ«¾Ý´§Ä¦£¬¿ÉÄÜÓëFIN6¡¢Cobalt Group»òEvilnumÓйء£
ÔÎÄÁ´½Ó£º
https://www.esentire.com/security-advisories/hackers-spearphish-professionals-on-linkedin-with-fake-job-offers-infecting-them-with-malware-warns-esentire
2.OnapsisÓëSAP½áºÏ°ä²¼Õë¶ÔSAPÀûÓõĹ¥»÷»î¶¯µÄ¾¯±¨

4ÔÂ6ÈÕ£¬Ôư²È«¹«Ë¾OnapsisºÍSAPÖÒ¸æÁËÕë¶ÔSAPÀûÓõijÖÐø¹¥»÷£¬²¢ÓëCISAºÍµÂ¹úÍøÂ簲ȫ»ú¹¹BSIºÏ×÷£¬ÌáÐÑSAP¿Í»§×°Öò¹¶¡·¨Ê½²¢µ÷²éÆä»·¾³ÖÐÊÇ·ñ´æÔÚ²»°²È«µÄÀûÓá£Onapsis³Æ£¬ÔÚ2020Äê6ÔÂÖÁ2021Äê3ÔÂÖ®¼ä£¬²úÉúÁËÀ´×Ô20¸ö¹ú¶È»òµØÓòµÄ1500´Î¹¥»÷³¢ÊÔ£¬ÆäÖÐ300´Î¹¥»÷³É¹¦¡£¸Ã»ã±¨»¹¾ßÌåÃèÊöÁËÕâЩ¶ñÒâ»î¶¯Ê¹Óõķì϶ºÍ¹¥»÷²½Ö裬ּÔÚÔ®ÊÖÓû§¼ø±ðºÍ·À±¸Ç±ÔڵĹ¥»÷»î¶¯¡£
ÔÎÄÁ´½Ó£º
https://onapsis.com/active-cyberattacks-mission-critical-sap-applications
3.SensorFuÅû¶Apple MailÖмàÌýÓʼþµÄÁãµã»÷·ì϶

SensorFuÅû¶AppleµÄmacOS MailÖдæÔÚ¿ÉÓÃÀ´¼àÌýÓʼþµÄÁãµã»÷·ì϶¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-9922£¬CVSSÆÀ·ÖΪ6.5£¬¿ÉÓÃÀ´ÔÚMailµÄɳÏä»·¾³ÖÐÔö³¤»òÅú¸ÄËÁÒâÎļþ¡£¹¥»÷ÕßÖ»ÐèÏòÖ¸±ê·¢ËÍÒ»·â´øÓÐÁ½¸ö.ZIPÎļþµÄÓʼþ¼´¿É´¥·¢¸Ã·ì϶£¬µÚÒ»¸ö.ZIPÔ̺¬ÃûΪMailµÄ·ûºÅÁ´½Ó£¬Ö¸ÏòÊܺ¦ÕßµÄ$HOME/Library/MailºÍ1.txt£¬µÚ¶þ¸ö.ZIPÔ̺¬Òª¶Ô$HOME/Library/MailËù×öµÄ¸ü¸Ä£¬À´Ìṩ¶Ô¿â»òÓʼþµÄËÁÒâÎļþдÈëȨÏÞ¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/apple-mail-zero-click-security-vulnerability/165238/
4.ClarotyÅû¶ÂÞ¿ËΤ¶û×Ô¶¯»¯µÄ²úÆ·ÖдæÔÚ¶à¸ö·ì϶

°²È«¹«Ë¾ClarotyÅû¶ÁËÂÞ¿ËΤ¶û×Ô¶¯»¯µÄFactoryTalk AssetCentre²úÆ·ÖдæÔÚµÄ9¸ö·ì϶£¬ËüÃǵÄCVSS 3ÆÀ·Ö¾ùΪ10¡£¸Ã²úÆ·ÖØÒªÓÃÓÚÕû¸ö¹¤³§Óë×Ô¶¯»¯ÓйصÄ×ʲúÐÅÏ¢µÄ±£»¤¡¢ÖÎÀí¡¢°æ±¾½ÚÔì¡¢¸ú×ٺͻ㱨¡£ÕâЩ·ì϶±ðÀëΪ²»³ÉÐÅÊý¾ÝµÄ·´ÐòÁл¯£¨CVE-2021-27462¡¢CVE-2021-27466¡¢CVE-2021-27460ºÍCVE-20201-27470£©¡¢²Ù×÷ϵͳºÅÁî×¢È루CVE-2021-27476£©¡¢SQL×¢È루CVE-2021-27472¡¢CVE-2021-27468ºÍCVE-2021-27464£©ÒÔ¼°ÐÅϢй¶£¨CVE-2021-27474£©¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/116391/ics-scada/rockwell-factorytalk-assetcentre-flaws.html
5.ÐÂ¼ÓÆÂ¹¤»áe2iÔâµ½´¹µö¹¥»÷£¬Ð¹Â¶ÊýÍò¹«ÃñµÄÐÅÏ¢

ÐÂ¼ÓÆÂÈ«¹ú¹¤»á´ú±í´ó»á¾ÍÒµÓë¾ÍÒµ×êÑÐËù£¨e2i£©ÔÚ±¾ÖÜÒ»£¨4ÔÂ5ÈÕ£©°ä²¼ÉêÃ÷³Æ£¬¹¥»÷Õß¿ÉÄÜÒѾ½Ó¼ûÆäÓû§µÄÓ×ÎÒÐÅÏ¢¡£Õâ´Îй¶µÄÐÅÏ¢Ô̺¬Óû§µÄÐÕÃû¡¢½ÌÓý×ʸñºÍNRIC¡¢ÁªÏµ·½Ê½ºÍ¾Íҵϸ½ÚµÈ¡£ÊÂÎñ²úÉúÔÚ3ÔÂ12ÈÕ£¬ÆäµÚÈý·½¹©¸øÉÌ¡ª¡ªÁªÏµÖÐÐÄ·þÎñ¹«Ë¾i-vic InternationalÔ±¹¤µÄÓÊÏäÔâµ½´¹µö¹¥»÷£¬¸ÃÓÊÏäµÄÔÆ¶ËÔ̺¬ÁËÔ¼3Íò¸ö²ÎÓëÁËe2i»î¶¯µÄÓû§ÐÅÏ¢£¬µ«ÊǸûú¹¹»Ø¾øÐ¹Â©×ܹ²Óм¸¶àÈËÔøÊ¹Óùýe2iµÄ·þÎñ¡£
ÔÎÄÁ´½Ó£º
https://www.straitstimes.com/tech/tech-news/personal-data-of-30000-people-who-use-ntucs-e2i-services-may-have-been-breached
6.Unit42°ä²¼2020ÄêÍøÂç´¹µö¹¥»÷Ç÷ÏòµÄ»ØÊ׻㱨

Unit42°ä²¼ÁË2020ÄêÍøÂç´¹µö¹¥»÷Ç÷ÏòµÄ»ØÊ׻㱨¡£»ã±¨ÏÔʾ£¬´Ó2019µ½2020Ä꣬¶ñÒâPDFÎļþ¼±¾çÔö³¤ÁË1160£¥£¬´Ó411800¸ö¶ñÒâÎļþÔö³¤µ½5224056¸ö¡£ÎªÁËÓÕʹÓû§´¹µöPDFÎļþÖеÄǶÈëµÄÁ´½Ó£¬¹¥»÷ÕßÔÚ2020ÄêÖØÒªÊ¹ÓÃÁË5ÖÖ·ÖÆçµÄý½é£¬·ÖΪαÔìµÄÑéÖ¤Â루ռ±È38.67%£©¡¢ÓÅ»Ýȯ£¨2.16%£©¡¢´øÓв¥·Å°´Å¥µÄ¾²Ì¬Í¼Ïñ£¨1.44%£©¡¢Îļþ¹²Ïí£¨0.84%£©ºÍµç×ÓÉÌÎñ£¨0.36%£©¡£ÆäÖУ¬´óÎÞÊý¹¥»÷ʹÓÃÁËÒ»ÖÖͨÓü¼Êõ£ºÁ÷Á¿³Á¶¨Ïò¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/phishing-trends-with-pdf-files/


¾©¹«Íø°²±¸11010802024551ºÅ