WPA3Ò²²»Çå¾²£¿£¿£¿£¿£¿DragonbloodÎó²î¿ÉÆÆ½âWi-FiÃÜÂ룻£»£»£»ICS¶ñÒâÈí¼þTriton¾íÍÁÖØÀ´£»£»£»£»Ð¶ñÒâÈí¼þTajMahal
Ðû²¼Ê±¼ä 2019-04-11
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/04/wpa3-hack-wifi-password.html2.ICS¶ñÒâÈí¼þTriton¾íÍÁÖØÀ´£¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÖж«µØÇøµÄÒªº¦»ù´¡ÉèÊ©
ƾ֤FireEyeµÄÒ»·Ýб¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬ICS¶ñÒâÈí¼þTriton·ºÆðÁ˵ڶþÃûÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬£¬Õâ´ÎÊÇÖж«µØÇøµÄÒ»¸öÒªº¦»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬£¬µ«FireEye²¢Î´Í¸Â¶Ä¿µÄÆóÒµµÄÃû×Ö¡£¡£¡£¡£¡£¡£¡£¡£TritonÊ×´ÎÆØ¹âÓÚ2017ÄêÕë¶ÔÉ³ÌØÊ¯Ó͹«Ë¾Petro RabighµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÕâÒ»´Î¹¥»÷ÕßÔÚÄ¿µÄÍøÂçÖÐDZÔÚÁ˽üÒ»ÄêµÄʱ¼ä£¬£¬£¬£¬£¬£¬£¬£¬È»ºó²Å½øÈ빤³ÌÊÂÇéÕ¾¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁ˶àÖÖ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨MimikatzºÍSecHackÀ´ÍøÂçÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐһЩ¹¤¾ß¿ÉÒÔ×·ËÝÖÁ2014Äê¡£¡£¡£¡£¡£¡£¡£¡£FireEye²¢Î´Í¸Â¶´Ë´Î¹¥»÷Ôì³ÉµÄË𺦡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/triton-ics-malware-second-victim/143658/3.ÐÂÍøÂçÌØ¹¤Ì×¼þTajMahal£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ô¼80¸ö¶ñÒâÄ£¿£¿£¿£¿£¿é
¿¨°Í˹»ù·¢Ã÷Ò»¸öеÄÍøÂçÌØ¹¤Æ½Ì¨TajMahal£¬£¬£¬£¬£¬£¬£¬£¬TajMahalÖÁÉÙ×Ô2013ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬£¬£¬×îÔçµÄÑù½ñÈÕÆÚΪ2013Äê4Ô£¬£¬£¬£¬£¬£¬£¬£¬×î½üµÄÔòΪ2018Äê8Ô¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÉÐδÄܽ«TajMahalÓëÈκκڿÍ×éÖ¯¾ÙÐйØÁª¡£¡£¡£¡£¡£¡£¡£¡£TajMahalÊÇÒ»¸ö¶à½×¶Î¹¥»÷¿ò¼Ü£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Á½¸ö¶ñÒâÈí¼þ°ü£ºTokyoºÍYokohama¡£¡£¡£¡£¡£¡£¡£¡£ºóÕß¾ßÓÐÔ¼80¸ö¶ñÒâÄ£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¼ÓÔØÆ÷¡¢Ðµ÷Ä£¿£¿£¿£¿£¿é¡¢C&CͨѶģ¿£¿£¿£¿£¿é¡¢ÒôƵ¼Í¼¡¢¼üÅ̼ͼ¡¢½ØÆÁ¡¢ÉãÏñÍ·¡¢ÎļþºÍÃÜÔ¿ÇÔÈ¡µÈ¡£¡£¡£¡£¡£¡£¡£¡£Yokohama»á½«ÇÔÈ¡µ½µÄÐÅÏ¢ÒÔÃûΪTajMahalµÄXMLÎļþµÄÐÎʽ·¢ËÍÖÁC&CЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÑо¿Ö°Ô±·¢Ã÷µÄΨһÊܺ¦ÕßΪÖÐÑǵØÇøµÄÍâ½»»ú¹¹¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-tajmahal-cyberespionage-kit-includes-80-malicious-modules/4.Ã÷ÄáËÕ´ïÖÝÈËÀàЧÀͲ¿ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬1.1Íò¹«ÃñÐÅÏ¢ÒÉÔâй¶
ÃÀ¹úÃ÷ÄáËÕ´ïÖÝÈËÀàЧÀͲ¿Ôâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬Ô¼1.1Íò¹«ÃñµÄСÎÒ˽¼ÒÐÅÏ¢»òÔâй¶¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã»ú¹¹Ðû²¼µÄ֪ͨ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ2018Äê3ÔÂ26ÈÕ×óÓÒ»á¼ûÁËÒ»ÃûÔ±¹¤µÄµç×ÓÓʼþÕË»§£¬£¬£¬£¬£¬£¬£¬£¬²¢ÏòÆäͬÊ·¢ËÍÁËÁ½·âÒªÇó»ã¿îÖ§¸¶µÄ´¹ÂÚÓʼþ¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ´Ëʱ´ú£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÉó²é¡¢ÏÂÔØ»òÒÔÆäËü·½·¨»ñȡijЩÕË»§µÄÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬£¬MNITÎÞ·¨È·ÈϹ¥»÷ÕßÉó²é»ò»ñÈ¡µ½µÄÐÅÏ¢£¨ÈôÊÇÓеϰ£©¡£¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹Ö¸³ö£¬£¬£¬£¬£¬£¬£¬£¬Ã»ÓÐÖ¤¾ÝÅú×¢±»ºÚµç×ÓÓʼþÕË»§ÖеÄСÎÒ˽¼ÒÐÅÏ¢ÒÔÈκη½·¨Ôâµ½¡°Éó²é¡¢ÏÂÔØ»òÀÄÓᱡ£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/83609/data-breach/minnesota-department-of-human-services-breach.html5.SAPÐû²¼4ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´6¸öÇå¾²Îó²î
±¾ÖÜSAPÐû²¼4ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á˶à¸ö²úÆ·ÖеÄ6¸öÎó²î¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖÐÐÞ¸´ÁËCrystal ReportsÖеÄÐÅϢй¶Îó²î£¨CVE-2019-0285£¬£¬£¬£¬£¬£¬£¬£¬ CVSSÆÀ·Ö7.5£©£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷Õß»á¼ûϵͳÊý¾Ý¡¢µ÷ÊÔÐÅÏ¢µÈÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²îÊÇNetWeaver Java Application ServerÖеÄαÔì¹¥»÷Îó²î£¨CVE-2019-0283£¬£¬£¬£¬£¬£¬£¬£¬CVSS 7.1·Ö£©£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷ÕßαÔìÏòÓû§ÏÔʾµÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£ÆäËüÎó²î°üÀ¨È±ÉÙÊÚȨ¼ì²é£¨CVE-2019-0279£¬£¬£¬£¬£¬£¬£¬£¬CVSS 5.5£©¡¢ÐÅϢй¶£¨CVE-2019-0282£¬£¬£¬£¬£¬£¬£¬£¬CVSS 5.3£»£»£»£»CVE-2019-0278£¬£¬£¬£¬£¬£¬£¬£¬CVSS 5.1£©ºÍXXEÎó²î£¨CVE-2019-0284£¬£¬£¬£¬£¬£¬£¬£¬ CVSS 5.1£©¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/sap-patches-high-severity-flaws-crystal-reports-netweaver6.AdobeÐû²¼4ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´8¸ö²úÆ·ÖеÄÇå¾²Îó²î
±¾ÖܶþAdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Bridge CCµÈ8¿î²úÆ·ÖеĶà¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Bridge CCÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨¶ÑÒç³öCVE-2019-7130ºÍÔ½½çдCVE-2019-7132£©¡¢Experience Manager FormsÖеÄÐÅϢй¶Îó²î£¨CVE-2019-7129£¨XSS£©£©¡¢InDesignÖеÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2019-7107¡¢CVE-2019-7105ºÍCVE-2019-7106£©µÈ¡£¡£¡£¡£¡£¡£¡£¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/adobe-patch-update-squashes-critical-code-execution-bugs/


¾©¹«Íø°²±¸11010802024551ºÅ