×êÑÐÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day£»¶ò¹Ï¶à¶ûµçÐŹ«Ë¾CNTÔâµ½RansomEXXÀÕË÷¹¥»÷
°ä²¼¹¦·ò 2021-07-19
×êÑÐÍŶӹ«¿ªÅû¶ÁËÒ»¸öеÄ0day£¬¹¥»÷ÕßÀûÓø÷ì϶Äܹ»Í¨¹ýÔ¶³Ì´òÓ¡·þÎñ»ñµÃWindowsÉϵÄSYSTEMȨÏÞ¡£×êÑÐÈËÔ±Benjamin Delpy³Æ£¬¸Ã·ì϶ÀûÓÃÁËWindows Point and PrintÖ°ÄÜÖеġ°Queue-Specific Files¡±¸öÐÔ¡£ÔÚ×°ÖôòÓ¡»úʱ£¬¹©¸øÉÌÌṩµÄ×°Ö÷¨Ê½Äܹ»Ö¸¶¨Ò»×éÓëÌØ¶¨´òÓ¡¶ÓÁÐÓйØÁªµÄÈκÎÀàÐ͵ÄÎļþ£¬¸ÃÎļþ½«±»ÏÂÔØµ½Ã¿Ò»¸öÏνӵ½´Ë´òÓ¡·þÎñÆ÷µÄ¿Í»§¶Ë¡£Òò¶ø£¬µ±¿Í»§¶ËÏνӵ½¹¥»÷ÕßËù½ÚÔìµÄ´òÓ¡·þÎñÆ÷ʱ£¬½«×Ô¶¯ÏÂÔØ²¢ÒÔSYSTEMȨÏÞÖ´ÐжñÒâDLL¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/new-windows-print-spooler-zero-day-exploitable-via-remote-print-servers/
2.CloudflareµÄCDN JSÖзì϶ӰÏìÈ«ÍøÉÏ12.7%µÄÍøÕ¾

CloudflareÒѽ¨¸´Æä¿ªÔ´CDN JSÖеÄÒ»¸öÑϳÁ·ì϶£¬¸Ã·ì϶¿ÉÓ°ÏìÈ«ÍøÉÏ12.7%µÄÍøÕ¾¡£CDN JSΪÊý°ÙÍòÍøÕ¾Ìṩ³¬¹ý4000¸öJavaScriptºÍCSS¿â£¬ÎªµÚ¶þ´óJavaScript CDN¡£×êÑÐÈËÔ±·¢ÏÖ¶ÔÓÚÿ¸ö°ä²¼µ½CDN JSµÄGitHub´æ´¢¿âµÄ¿â£¬Æä¸üа汾½«´ÓÁ´½ÓµÄnpm×¢²á±íÏÂÔØ£¬²¢ÇÒ¸Ãnpm°æ±¾Ò²ÓÉ¿âµÄ×÷ÕßÊØ»¤¡£µ±°ä²¼Ô̺¬õè¾¶±éÀú·ì϶µÄnpm°üºó£¬¸Ã°ü×îÖÕÒ²»á±»CDNJSµÄ¸üлúеÈË´¦Ö㬲¢ÔÚÆæ¹ÖµÄõè¾¶ÉÏ×¢ÈëBash¾ç±¾¡£¸Ã·ì϶¿É±»ÓÃÀ´Ô¶³ÌÖ´ÐкÅÁÏÖÒѱ»½¨¸´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-cloudflare-cdn-flaw-allowed-compromise-of-12-percent-of-all-sites/
3.¶ò¹Ï¶à¶ûµçÐŹ«Ë¾CNTÔâµ½RansomEXXÀÕË÷¹¥»÷

¶ò¹Ï¶à¶ûµÄ¹«Ë¾Corporaci¨®n Nacional de Telecomunicaci¨®n (CNT)Ôâµ½RansomEXXÀÕË÷¹¥»÷£¬µ¼ÖÂÒµÎñÔËÓª¡¢Ö§¸¶ÍøÕ¾ºÍ¿Í»§Ö§³ÖÖжϡ£CNTÊǶò¹Ï¶à¶ûµÄ¹úÓªµçÐÅÔËÓªÉÌ£¬Ìṩ¹Ì¶¨µç»°·þÎñ¡¢Òƶ¯¡¢ÎÀÐǵçÊӺͻ¥ÁªÍøÏνӡ£7ÔÂ16ÈÕ£¬¸Ã¹«Ë¾ÔÚÆä¹ÙÍø°ä²¼²¼¸æ£¬³ÆÒòÔâµ½¹¥»÷¿Í»§·þÎñºÍÔÚÏßÖ§¸¶ÁÙʱÖжϣ¬²¢°µÊ¾ÒÑÏòµ±¾ÖÉϱ¨ÁËÕâ´Î¹¥»÷ÊÂÎñ¡£¹ÌÈ»CNTûÓÐÕýʽÉêÃ÷ÆäÔâµ½ÁËÀÕË÷¹¥»÷£¬µ«RansomEXXÔÚÆäÍøÕ¾³ÆËûÃÇÒѾÏÂÔØÁËCNT³¬¹ý190GBµÄÎļþ£¬²¢³ï±¸¹«¿ªËüÃÇ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/ecuadors-state-run-cnt-telco-hit-by-ransomexx-ransomware/
4.TestcoronanuµÄCovidÊý¾Ý¿É±»´Û¸Ä²¢Ð¹Â¶6ÍòÈËÐÅÏ¢

Covid¼ì²â¹«Ë¾TestcoronanuµÄÊý¾Ý¿É±»´Û¸Ä²¢Ð¹Â¶³¬¹ý6ÍòÈ˵ÄÐÅÏ¢¡£RTL NieuwsÔÚÉÏÖÜÈÕ±¨Â·³Æ£¬Testcoronanu²úÉúÁËÑϳÁµÄй¶ÊÂÎñ£¬ÈκÎÈ˶¼Äܹ»´´½¨×Ô¼ºµÄCovidÒßÃç½ÓÖÖ»ò¼ì²âÖ¤Êé¡£Óû§Äܹ»×Ô¼ºÔÚÊý¾Ý¿âÖÐÊäÈë¾¹ýÁËÄÄÖÖ¼ì²âÒÔ¼°¼ì²âÁ˾ÖÊÇʲô£¬Ö®ºó£¬½«×Ô¶¯ÊÕµ½TestcoronanuµÄ¹Û¹âÖ¤Ã÷£¬²¢ÇÒÓû§»¹Äܹ»´Û¸ÄÆäËûÈ˵ÄÊý¾Ý¡£´Ë±í£¬Õâ´ÎÊÂÎñ»¹Ð¹Â¶ÁË6ÍòÓû§µÄÓ×ÎÒÐÅÏ¢£¬ÀýÈçÈ«Ãû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢Éç»á°²È«ºÅÂë¡¢»¤ÕÕºÅÂëºÍÒ½ÁÆÐÅÏ¢µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.databreaches.net/nl-leak-at-covid-testing-company-made-it-possible-to-fake-results-in-coronacheck-app/
5.×êÑÐÈËÔ±Åû¶HelloKittyÕë¶ÔSonicWallÉ豸µÄ¹¥»÷

ÍøÂ簲ȫ¹«Ë¾CrowdStrikeÅû¶HelloKittyÕë¶ÔSonicWallÉ豸µÄ¹¥»÷¡£HelloKityÊÇ×Ô2020Äê11ÔÂÆðÍ·»îÔ¾µÄÀÕË÷ÍÅ»ï£¬ÔøÇÔÈ¡ÁËCyberpunk 2077¡¢Witcher 3¡¢Gwent ºÍÆäËûÓÎÏ·µÄÔ´´úÂë¡£×êÑÐÈËÔ±³ÆºÚ¿ÍÀûÓÃÁËSonicWall SMAºÍSRA²úÆ·ÖеÄCVE-2019-7481·ì϶£¬¸Ã·ì϶ÒÑÔÚ2021ËêÊ×°ä²¼µÄ¹Ì¼þ¸üÐÂÖнøÐÐÁ˽¨¸´¡£´Ë±í£¬CrowdStrikeÖÒ¸æBabukÍŻﻹÔÚÕë¶Ô´æÔÚCVE-2020-5135·ì϶µÄSonicWall VPNÉ豸¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/120249/malware/hellokitty-ransomware-sonicwall-devices.html
6.PRODAFT³Æ°²×¿ToddlerÕë¶ÔÅ·Ö޵Ĺ¥»÷»î¶¯¼¤Ôö

PRODAFTÍþвµý±¨(PTI)ÍŶӰµÊ¾£¬ÐÂÐÍAndroidÒøÐÐľÂíToddler£¨Ò²³ÆTeaBot/Anatsa£©Õë¶ÔÅ·Ö޵Ĺ¥»÷»î¶¯¼¤Ôö¡£CleafyÔÚ1Ô·ݳõ´ÎÅû¶ÁËToddler£¬Æä¹¥»÷ÁË60¼ÒÅ·ÖÞÒøÐеĿͻ§¡£PTI·ÖÎö·¢ÏÖ£¬ToddlerÖØÒªÕë¶ÔÎ÷°àÑÀ£¬µ«Æä¶ñÒâÈí¼þÑù±¾ÖÐÒ²Ô̺¬ÁËÕë¶ÔÎ÷°àÑÀÓï¡¢Ó¢Óï¡¢Òâ´óÀûÓï¡¢µÂÓï¡¢·¨ÓïºÍºÉÀ¼ÓïÓû§µÄÎı¾ÄÚÈÝ£¬½ØÖÁ´Ë¿Ì£¬ToddlerÒѾϰȾÁ˳¬¹ý7632̨É豸¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/toddler-mobile-banking-malware-surges-across-europe/


¾©¹«Íø°²±¸11010802024551ºÅ