ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ34ÖÜ
Ðû²¼Ê±¼ä 2019-09-02>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2019Äê8ÔÂ26ÈÕÖÁ9ÔÂ01ÈÕ¹²ÊÕ¼Çå¾²Îó²î49¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco REST API ContainerÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»BloodHound components/Modals/HelpModal.jsxí§ÒâÏÂÁîÖ´ÐÐÎó²î£»£»£»£»£»Datalogic AV7000 Linear Barcode ScannerÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»Delta Controls enteliBUS Controllers»º³åÇøÒç³öÎó²î£»£»£»£»£»Linux kernel net/wireless/marvell/mwifiex»º³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÍйÜЧÀÍÉÌHostinger½ü1400ÍòÓû§ÐÅÏ¢±»ÍϿ⣻£»£»£»£»2019ÄêÉϰëÄ걨¸æµÄÎó²îÖÐÁè¼Ý34%δÐÞ¸´£»£»£»£»£»Android¶ñÒâÓ¦ÓÃCamScannerÏÂÔØÁ¿³¬1ÒÚ£»£»£»£»£»2024ÄêÈ«ÇòÊý¾Ýй¶±¾Ç®Ô¤¼Æ½«´ï5ÍòÒÚÃÀÔª£»£»£»£»£»ÃÀ¹úÊý°Ù¼ÒÑÀ¿ÆÕïËùÔâÀÕË÷Èí¼þSodinokibi¹¥»÷¡£¡£¡£¡£¡£¡£
>Ö÷ÒªÇå¾²Îó²îÁбí
1. Cisco REST API ContainerÑéÖ¤ÈÆ¹ýÎó²î
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypass
2. BloodHound components/Modals/HelpModal.jsxí§ÒâÏÂÁîÖ´ÐÐÎó²î
https://github.com/BloodHoundAD/BloodHound
3. Datalogic AV7000 Linear Barcode ScannerÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î
https://www.us-cert.gov/ics/advisories/icsa-19-239-02
4. Delta Controls enteliBUS Controllers»º³åÇøÒç³öÎó²î
https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9569
5. Linux kernel net/wireless/marvell/mwifiex»º³åÇøÒç³öÎó²î
https://vigilance.fr/vulnerability/Linux-kernel-buffer-overflow-via-net-wireless-marvell-mwifiex-30180
>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hostinger-resets-customer-passwords-after-security-incident/
2¡¢2019ÄêÉϰëÄ걨¸æµÄÎó²îÖÐÁè¼Ý34%δÐÞ¸´
ÔÎÄÁ´½Ó£º
https://pages.riskbasedsecurity.com/2019-midyear-vulnerability-quickview-report
3¡¢Android¶ñÒâÓ¦ÓÃCamScannerÏÂÔØÁ¿³¬1ÒÚ
¿¨°Í˹»ùÑо¿Ö°Ô±·¢Ã÷CamScannerµÄÃâ·Ñ°æ±£´æÒ»¸öÒþ²ØµÄTrojan DropperÄ£¿£¿é£¬£¬£¬£¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷ÕßÔÚÓû§²»ÖªÇéµÄÇéÐÎÏÂÏÂÔØºÍ×°ÖöñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£CamScannerÊÇÒ»¿îÊܽӴýµÄÊÖ»úPDF½¨ÉèAPP£¬£¬£¬£¬£¬ËüÔÚGoogle PlayÊÐËÁµÄÏÂÔØÁ¿Áè¼Ý1ÒÚ¡£¡£¡£¡£¡£¡£¶ñÒâÄ£¿£¿éÏÖʵÉϲ¢²»±£´æÓÚCamScanner×Ô¼ºµÄ´úÂëÖУ¬£¬£¬£¬£¬¶øÊÇÔÚµÚÈý·½¹ã¸æ¿âÖУ¬£¬£¬£¬£¬Òò´Ë¿ÉÒÔÍÆ¶ÏÕâÊÇÈí¼þ¿ª·¢ÕߺͲ»Æ·µÂµÄ¹ã¸æÉÌÏàÖúµÄЧ¹û¡£¡£¡£¡£¡£¡£¸ÃÄ£¿£¿é¿ÉÒÔͨ¹ý¶àÖÖ·½·¨Ê¹ÓÃÊÜѬȾµÄ×°±¸£¬£¬£¬£¬£¬´ÓÏÔʾÇÖÈëÐÔ¹ã¸æµ½¸¶·Ñ¶©ÔÄÇÔÈ¡»°·ÑµÈ¡£¡£¡£¡£¡£¡£Ó¦¸Ã×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬CamScannerµÄ¸¶·Ñ°æ±¾²»°üÀ¨µÚÈý·½¹ã¸æ¿â¡£¡£¡£¡£¡£¡£GoogleÒѾ´Ó¹Ù·½PlayÊÐËÁÖÐɾ³ýÁ˸ÃAPP¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/08/android-camscanner-malware.html
4¡¢2024ÄêÈ«ÇòÊý¾Ýй¶±¾Ç®Ô¤¼Æ½«´ï5ÍòÒÚÃÀÔª
ƾ֤հ²©ÍøÂçµÄ×îÐÂÕ¹Íû£¬£¬£¬£¬£¬Ëæ×Åî¿Ïµ·£¿£¿îµÄʵÑéÒÔ¼°ÆóÒµÔ½·¢ÒÀÀµÓÚÊý×Öϵͳ£¬£¬£¬£¬£¬µ½2024ÄêÈ«ÇòÊý¾Ýй¶µÄ±¾Ç®Ô¤¼Æ½«ÔöÌíµ½5ÍòÒÚÃÀÔªÒÔÉÏ¡£¡£¡£¡£¡£¡£ÕâÒ»Êý¾ÝÀ´×ÔÓڸù«Ë¾Ðû²¼µÄ×îб¨¸æ¡¶ÍøÂç·¸·¨ºÍÇå¾²µÄδÀ´£º2019-2024ÍþвÆÊÎö¡¢Ó°ÏìÆÀ¹À»ººÍ½âÕ½ÂÔ±¨¸æ¡·¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Éù³Æ£¬£¬£¬£¬£¬ÔÚ±¨¸æÊ±´úÄÚÔ¤¼ÆÊý¾Ýй¶±¾Ç®½«´Ó2019ÄêµÄ3ÍòÒÚÃÀԪÿÄêÔöÌí11%¡£¡£¡£¡£¡£¡£±¨¸æÖл¹³ÆËäÈ»´ó¹æÄ£µÄÊý¾Ýй¶¿ÉÄܳÉΪͷÌõÐÂÎÅ£¬£¬£¬£¬£¬µ«ËüÃDz¢·×Æç¶¨»áÖ±½ÓÓ°Ï챾Ǯ£¬£¬£¬£¬£¬ÓÉÓÚ·£¿£¿îºÍÓªÒµËðʧÓëÊý¾Ýй¶µÄ¹æÄ£²¢²»Ï¸ÃÜÏà¹Ø¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/breach-costs-trillion/
5¡¢ÃÀ¹úÊý°Ù¼ÒÑÀ¿ÆÕïËùÔâÀÕË÷Èí¼þSodinokibi¹¥»÷
8ÔÂ26ÈÕÃÀ¹úÊý°Ù¼ÒÑÀ¿ÆÕïËùÔâÀÕË÷Èí¼þSodinokibi¹¥»÷£¬£¬£¬£¬£¬»¼ÕßÐÅÏ¢±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£ÕâÊǹ¥»÷Õßͨ¹ýÈëÇÖÈí¼þ¹©Ó¦É̲¢Ê¹ÓÃÆä²úÆ·ÔÚ¿Í»§ÏµÍ³ÉÏÖ²ÈëÀÕË÷Èí¼þµÄÁíÒ»¸ö°¸Àý¡£¡£¡£¡£¡£¡£ÔÚ±¾ÆðÊÂÎñÖУ¬£¬£¬£¬£¬Èí¼þ¹©Ó¦ÉÌÊÇThe Digital Dental RecordºÍPerCSoft£¬£¬£¬£¬£¬ËûÃÇÏàÖú¿ª·¢ÁËÒ½ÁƼͼÉúÑĺͱ¸·ÝÈí¼þDDS Safe¡£¡£¡£¡£¡£¡£ÉÏÖÜÄ©ºÚ¿ÍÍÅ»ïÈëÇÖÁ˸ÃÈí¼þ±³ºóµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬²¢Ê¹ÓÃËüÔÚÊý°Ù¸öÑÀÒ½ÕïËùµÄÅÌËã»úÉϰ²ÅÅÁËÀÕË÷Èí¼þSodinokibi¡£¡£¡£¡£¡£¡£ÕâÁ½¼Ò¹«Ë¾Ñ¡ÔñÖ§¸¶Êê½ð»ñÈ¡½âÃÜÆ÷£¬£¬£¬£¬£¬µ«ÏÖÔÚ»Ö¸´½ø¶È»ºÂý£¬£¬£¬£¬£¬Ò»Ð©ÑÀ¿ÆÕïËùÉù³Æ½âÃÜÆ÷Ҫô²»Æð×÷Ó㬣¬£¬£¬£¬ÒªÃ´Ã»Óлָ´ËùÓÐÊý¾Ý¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-hits-hundreds-of-dentist-offices-in-the-us/