AdobeÐû²¼Çå¾²¸üÐÂÐÞ¸´¶à¿îÎó²î: ¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐÔâµ½¹¥»÷

Ðû²¼Ê±¼ä 2021-10-14

¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷


¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷.png


ÉÏÖÜÄ©£¬£¬£¬£¬£¬ £¬¶ò¹Ï¶à¶û×î´óµÄ˽ÈËÒøÐÐBanco PichinchaÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬ £¬ÏµÍ³ÔÝʱ¹Ø±Õ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼ÖÂÒøÐеÄÓªÒµ´óÃæ»ýÖÐÖ¹£¬£¬£¬£¬£¬ £¬°üÀ¨ATM¡¢ÍøÉÏÒøÐС¢Ó¦ÓóÌÐò¡¢µç×ÓÓʼþϵͳºÍ×ÔÖúЧÀÍ¡£¡£¡£¡£¡£¸ÃÒøÐÐÔÚЧÀÍÖÐÖ¹µÄÁ½ÌìºóÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬ £¬³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬ £¬µ«²¢Î´¹ûÕæ´Ë´Î¹¥»÷µÄÐÔ×Ó¡£¡£¡£¡£¡£¾ÝÑо¿Ö°Ô±³ÆÕâÊÇÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßÔÚÒøÐеÄϵͳÖÐ×°ÖÃÁËCobalt Strike beacon¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º


https://www.bleepingcomputer.com/news/security/cyberattack-shuts-down-ecuadors-largest-bank-banco-pichincha/02


Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÙÔâ¹¥»÷£¬£¬£¬£¬£¬ £¬ÃÀÖÞÓªÒµÊܵ½Ó°Ïì


Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÙÔâ¹¥»÷£¬£¬£¬£¬£¬£¬ÃÀÖÞÓªÒµÊܵ½Ó°Ïì.png


ÈÕ±¾Ò½ÁÆÊÖÒÕ¹«Ë¾OlympusÔÚ10ÔÂ10ÈÕÔâµ½¹¥»÷£¬£¬£¬£¬£¬ £¬µ¼ÖÂÃÀÖÞ£¨ÃÀ¹ú¡¢¼ÓÄôóºÍÀ­¶¡ÃÀÖÞ£©µÄϵͳЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¸Ã¹«Ë¾³ÆÆäÔÚ¼ì²âµ½¿ÉÒɻºó£¬£¬£¬£¬£¬ £¬Á¬Ã¦½ÓÄÉÁËÏìÓ¦²½·¥£¬£¬£¬£¬£¬ £¬¹Ø±ÕÊÜÓ°ÏìµÄϵͳºó½«¸ÃÊÂÎñ×èÖ¹ÁËÔÚÃÀÖÞ¡£¡£¡£¡£¡£¹«Ë¾½²»°È˳ÆÃ»ÓÐÊý¾Ýй¶ÎÊÌ⣬£¬£¬£¬£¬ £¬²¢ÔÊÐí½«¾¡¿ìÐû²¼ÏêϸÐÅÏ¢¡£¡£¡£¡£¡£OlympusÔøÔÚ9ÔÂ8ÈÕÔâµ½ÁËBlackMatterµÄÀÕË÷¹¥»÷£¬£¬£¬£¬£¬ £¬ÆäʱµÄ¹¥»÷Ó°ÏìÁËÆäEMEA£¨Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ£©ITϵͳ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123263/security/olympus-us-cyberattack.html



AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ £¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ10¸öÎó²î


AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ10¸öÎó²î.png


AdobeÔÚ10ÔÂ13ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ £¬ÐÞ¸´ÆäAcrobat¡¢Reader¡¢Connect¡¢CommerceºÍCampaign StandardÖеÄ10¸öÎó²î¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÊÇConnectÖеķ´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬ £¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐУ¬£¬£¬£¬£¬ £¬CVSSÆÀ·ÖΪ9.8¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬»¹ÐÞ¸´ÁËAcrobatºÍReaderÖеĴúÂëÖ´ÐÐÎó²îCVE-2021-40728ºÍCVE-2021-40731¡¢ÌáȨÎó²îCVE-2021-40729ºÍCVE-2021-40720£¬£¬£¬£¬£¬ £¬ÒÔ¼° Adobe ops-cliÖеķ´ÐòÁл¯Îó²îCVE-2021-40720µÈ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123269/security/adobe-critical-flaws.html


Ñо¿ÍŶӷ¢Ã÷FreakoutÕë¶ÔVisual Tools DVRµÄ»î¶¯


Ñо¿ÍŶӷ¢Ã÷FreakoutÕë¶ÔVisual Tools DVRµÄ»î¶¯.png


Juniper Threat LabsÔÚ10ÔÂ11ÈÕÅû¶Á˽©Ê¬ÍøÂçFreakout£¨ÓÖÃûNecro£©ÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2021Äê9ÔµÄ×îºóÒ»Öܼì²âµ½Á˴˴λ£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßÔÚÆäÎäÆ÷¿âÖÐÌí¼ÓÁËÒ»¸öÐÂÎó²î£¬£¬£¬£¬£¬ £¬¸ÃÎó²îÖ÷ÒªÕë¶ÔVisual Tools DVR VX16 4.2.28.0£¬£¬£¬£¬£¬ £¬ÆäPoCÒÑÔÚ7ÔÂ6ÈÕ¹ûÕæ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬ÐµÄÑù±¾É¾³ýÁË֮ǰµÄ¹¥»÷ÖÐʹÓõÄSMBɨÃè³ÌÐò£¬£¬£¬£¬£¬ £¬²¢½«¾ç±¾×¢ÈëURL´Ó֮ǰµÄÓ²±àÂë¸ü¸ÄΪÁËDGA URL¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blogs.juniper.net/en-us/threat-research/necro-python-botnet-goes-after-vulnerable-visualtools-dvr


NCC Group·¢Ã÷ÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷»î¶¯


NCC Group·¢Ã÷ÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷»î¶¯.png


10ÔÂ11ÈÕ£¬£¬£¬£¬£¬ £¬NCC Group·¢Ã÷ÁËÒ»¸ö½öÇÔÈ¡Êý¾Ý¶ø²»¼ÓÃÜÎļþµÄÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMC¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖSnapMCÕâ¸öÃû×ÖȪԴÓÚ¹¥»÷Õß¿ìËٵĹ¥»÷·½·¨£¬£¬£¬£¬£¬ £¬Ëü¿ÉÒÔÔÚ30·ÖÖÓÄÚÈëÇÖÍøÂç¡¢ÇÔÈ¡Îļþ²¢·¢ËÍÀÕË÷Óʼþ¡£¡£¡£¡£¡£SnapMCʹÓÃÎó²îɨÃèÆ÷AcunetixÀ´ËÑË÷Ä¿µÄVPNºÍWebÖеÄÎó²î£¬£¬£¬£¬£¬ £¬°üÀ¨PrintNightmareÎó²î¡¢ASPX.NETµÄTelerik UIÖеÄÔ¶³Ì´úÂëÎó²îÒÔ¼°ÖÖÖÖSQL×¢ÈëÎó²îµÈ¡£¡£¡£¡£¡£¿£¿£¿£Ë¼Á¿µ½SnapMCʹÓõľùÊÇÒÑÐÞ¸´µÄÎó²î£¬£¬£¬£¬£¬ £¬Ñо¿Ö°Ô±½¨ÒéÓû§ÊµÊ±×°Öò¹¶¡¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/snapmc-hackers-skip-file-encryption-and-just-steal-your-files/


IDCÐû²¼2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡¸ú×Ù±¨¸æ


IDCÐû²¼2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡¸ú×Ù±¨¸æ.png


IDCÔÚ10ÔÂ12ÈÕÐû²¼ÁË2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡¸ú×Ù±¨¸æ¡£¡£¡£¡£¡£IDC½ç˵µÄÍøÂçÇ徲ЧÀÍÊг¡»®·ÖÓÉÇå¾²×ÉѯЧÀÍ¡¢ITÇå¾²½ÌÓýÓëÅàѵЧÀÍ¡¢ÍйÜÇ徲ЧÀͺÍÇå¾²¼¯³ÉЧÀÍËĸö×ÓÊг¡×é³É¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬ £¬2021ÉϰëÄêÖйúITÇ徲ЧÀÍÊг¡³§ÉÌÕûÌåÊÕÈëԼΪ11.1ÒÚÃÀÔª£¨Ô¼ºÏ71.5ÒÚÔªÈËÃñ±Ò£©£¬£¬£¬£¬£¬ £¬³§ÉÌÊÕÈë¹æÄ£½ÏÈ¥ÄêͬÆÚʵÏÖ·­±¶ÔöÌí£¬£¬£¬£¬£¬ £¬ÕÇ·ù¸ß´ï110%£¬£¬£¬£¬£¬ £¬½Ï2019Äêͬ±ÈÔöÌí38%£¬£¬£¬£¬£¬ £¬ÖйúITÇ徲ЧÀÍÊг¡Õýʽ½øÈëÐèÇ´ÔðÃæ±¬·¢ÆÚ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.idc.com/getdoc.prCHE48302321