ºÚ¿ÍÔÚ°µÍøÐ¹Â¶Áè¼Ý50Íǫ̀װ±¸µÄTelnetƾ֤£»£»£»£»£»£»£»CitrixÐû²¼´úÂëÖ´ÐÐÎó²îCVE-2019-19781µÄÐÞ¸´²¹¶¡
Ðû²¼Ê±¼ä 2020-01-20
1.ºÚ¿ÍÔÚ°µÍøÐ¹Â¶Áè¼Ý50Íǫ̀װ±¸µÄTelnetƾ֤
ºÚ¿ÍÔÚÒ»¸ö°µÍøÂÛ̳ÉÏй¶ÁËÁè¼Ý51.5Íǫ̀ЧÀÍÆ÷¡¢¼ÒÓ÷ÓÉÆ÷ºÍIoT×°±¸µÄTelnetƾ֤ÁÐ±í£¬£¬£¬£¬£¬£¬£¬ÁбíÖаüÀ¨Ã¿¸ö×°±¸µÄIPµØµãÒÔ¼°ÆäTelnetЧÀ͵ÄÓû§ÃûºÍÃÜÂë¡£¡£¡£¡£¡£ÕâÊÇÆù½ñΪֹÒÑÖªµÄ×î´óTelnetÃÜÂë×ß©¡£¡£¡£¡£¡£¾ÝZDNetÏàʶ£¬£¬£¬£¬£¬£¬£¬¸ÃÁбíÊÇÓÉDDoS³ö×âЧÀ͵ÄÔËÓªÕßÔÚÏßÐû²¼µÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýɨÃèÕû¸öInternetÀ´²éÕÒTelnet¶Ë¿Ú̻¶µÄ×°±¸£¬£¬£¬£¬£¬£¬£¬²¢ÇÒʵÑéʹÓã¨1£©³ö³§ÉèÖõÄĬÈÏÓû§ÃûºÍÃÜÂë»ò£¨2£©×Ô½ç˵µ«Ò×ÓÚÍÆ²âµÄÃÜÂë×éºÏ¾ÙÐб¬ÆÆÌåÀýÁ˸ÃÁÐ±í¡£¡£¡£¡£¡£ÁбíÖÐËùÓÐÌõÄ¿µÄÈÕÆÚΪ2019Äê10ÔÂÖÁ11Ô£¬£¬£¬£¬£¬£¬£¬ÆäÖÐһЩװ±¸¿ÉÄÜÒÑ¾Ìæ»»ÁËIPµØµã»òƾ֤¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hacker-leaks-passwords-for-more-than-500000-servers-routers-and-iot-devices/
2.ÎÚ¿ËÀ¼Õþ¸®ÊÂÇéÃÅ»§ÍøÕ¾Ð¹Â¶²¿·Ö¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý
¾Ý·͸É籨µÀ£¬£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¹ú¼Ò×î¸ßÇå¾²»ú¹¹ÉÏÖÜÎåÈϿɲ¿·Ö¹«ÃñµÄСÎÒ˽¼ÒÊý¾ÝÔÚÕþ¸®ÊÂÇéÃÅ»§ÍøÕ¾ÖÐй¶¡£¡£¡£¡£¡£¹ú¼ÒÇå¾²ºÍ¹ú·ÀίԱ»áûÓÐ֤ʵ×ß©ÊÇ·ñÊÇÍøÂç¹¥»÷µÄЧ¹û£¬£¬£¬£¬£¬£¬£¬Ò²Ã»ÓÐ͸¶Óм¸´ó¶¼¾ÝÊܵ½Ó°ÏìºÍÊÂÎñÓÉËÈÏÕæ£¬£¬£¬£¬£¬£¬£¬µ«ÌåÏÖÒѾ¡°È·¶¨ÁËÎó²î¡±²¢ÇÒÃÅ»§ÍøÕ¾ÒѾ»ñµÃ±£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞ¸ü¶àϸ½ÚÅû¶¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://in.reuters.com/article/ukraine-cyber-leak/ukraine-says-personal-data-leaked-from-government-jobs-portal-idINKBN1ZG1OP
3.Õë¶Ô±±´ï¿ÆËûÖÝÕþ¸®µÄÍøÂç¹¥»÷¼¤ÔöÖÁÿÔÂ1500Íò´Î
¾Ý¡¶Grand Forks Herald¡·±¨µÀ£¬£¬£¬£¬£¬£¬£¬2019ÄêÕë¶Ô±±´ï¿ÆËûÖÝÕþ¸®µÄÍøÂç¹¥»÷ʵÑéÏÕЩ·ÁËÈý±¶¡£¡£¡£¡£¡£±±´ï¿ÆËûÖÝÊ×ϯÐÅÏ¢¹Ù¼æÐÅÏ¢ÊÖÒÕ²¿·ÖÈÏÕæÈËФ¶÷¡¤ÀµÀû£¨Shawn Riley£©ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬2019ÄêÿÔÂÓÐÁè¼Ý1500Íò´ÎÕë¶Ô¸ÃÖÝÕþ¸®µÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬×Ô2018ÄêÒÔÀ´ÔöÌíÁË300£¥¡£¡£¡£¡£¡£ÔÚ2018Ä꣬£¬£¬£¬£¬£¬£¬Ã¿ÔÂÔ¼ÓÐ500Íò´ÎδËìµÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£Ììϸ÷µØµÄµØ·½Õþ¸®¶¼·¢Ã÷ÍøÂç¹¥»÷ÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬£¬µ«±±´ï¿ÆËûÖݵÄÇ÷ÊÆÒª±ÈÆäËü×éÖ¯ÑÏÖØÒ»Ð©£¬£¬£¬£¬£¬£¬£¬×ÜÌå¶øÑÔ£¬£¬£¬£¬£¬£¬£¬ÔöÌíÏ൱¿É¹Û¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehill.com/policy/cybersecurity/478936-cyber-attacks-against-north-dakota-state-government-skyrocket-to-15m-a
4.µç×ÓÉÌÎñƽ̨Zen Cart×¢Èë¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡PayPalÕÊ»§ÃÜÂë
Çå¾²Ñо¿Ô±Christopher Morrow¿ËÈÕ·¢Ã÷Õë¶Ô¿ªÔ´µç×ÓÉÌÎñƽ̨Zen CartµÄ×¢Èë¹¥»÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÇÔÈ¡Óû§µÄPayPalÕË»§ºÍÃÜÂë¡£¡£¡£¡£¡£Zen Cart×Ô¼ºÊǾɰæOsCommerceµÄ·ÖÖ§£¬£¬£¬£¬£¬£¬£¬¸Ãƽ̨ºÜÉÙÔâµ½ÐÅÓÿ¨Æ²ÔüÆ÷µÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÆ¾Ö¤W3µÄ×îÐÂÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Ïà±ÈMagento£¨0.8£¥£©»òPrestashop£¨0.6£¥£©µÈÆäËû¿ªÔ´Æ½Ì¨£¬£¬£¬£¬£¬£¬£¬Zen CartµÄÓû§ÈººÜС£¡£¡£¡£¡£¨0.1£¥£©¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄ¶ñÒâ´úÂë×¢Èëµ½Zen CartµÄPHPÎļþÖУ¬£¬£¬£¬£¬£¬£¬ËüרÃÅÕë¶ÔPayPal Payments Pro¸¶¿îÄ£¿£¿£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬²¶»ñÓû§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©ºÍÖ§¸¶¿¨ÏêϸÐÅÏ¢¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.sucuri.net/2020/01/zen-cart-paypal-skimmer.html
5.Ñо¿ÍŶÓÐû²¼Êý¾Ý²Á³ýÆ÷DustmanµÄÆÊÎö±¨¸æ
2019Äê12Ô£¬£¬£¬£¬£¬£¬£¬IBM X-ForceÍŶÓÐû²¼ÁËÓйØÕë¶ÔÖж«µØÇøµÄÆÆËðÐÔ¹¥»÷ÖеÄÊý¾Ý²Á³ý¶ñÒâÈí¼þZeroCleareµÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬Ô¼Ò»¸öÔºóÉ³ÌØ¹ú¼ÒÍøÂçÇå¾²¾Ö£¨NCA£©±¨¸æÁËÕë¶ÔͳһµØÇøµÄZeroCleare±äÌ壬£¬£¬£¬£¬£¬£¬¸Ã±äÌå±»³ÆÎªDustman¡£¡£¡£¡£¡£DustmanµÄ×é¼þÓëZeroCleareʹÓõÄ×é¼þÏàËÆ£¬£¬£¬£¬£¬£¬£¬Õâ°üÀ¨Æä´úÂë¿âºÍ¶ÔTurlaÇý¶¯³ÌÐòµÄʹÓ㬣¬£¬£¬£¬£¬£¬ÒÔ¼°ÓÃÓÚ²Á³ýÊÜѬȾ»úе´ÅÅ̵ÄEldoS RawDiskÇý¶¯³ÌÐòºÍÏàͬµÄEldoSÈí¼þÔÊÐíÖ¤ÃÜÔ¿¡£¡£¡£¡£¡£ZeroCleareºÍDustmanÖ®¼äµÄÇø±ðÔÚÓÚÎļþÃûºÍ°²ÅÅÁ÷³ÌµÄϸСת±ä¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityintelligence.com/posts/enter-dustman-new-wiper-takes-after-zerocleare-targets-organizations-in-saudi-arabia/
6.CitrixÐû²¼´úÂëÖ´ÐÐÎó²îCVE-2019-19781µÄÐÞ¸´²¹¶¡
CitrixÕë¶ÔÒѱ»Æð¾¢Ê¹ÓõÄCVE-2019-19781Îó²îÐû²¼ÓÀÊÀÐÞ¸´²¹¶¡£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËCitrix Application Delivery Controller£¨ADC£©¡¢CitrixÍø¹ØºÍCitrix SD-WAN WANOP×°±¸£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£CitrixÒѾÐû²¼ÁËADC°æ±¾11.1ºÍ12.0µÄÓÀÊÀÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÕâЩ²¹¶¡»¹ÊÊÓÃÓÚÍйÜÔÚESX¡¢Hyper-V¡¢KVM¡¢XenServer¡¢Azure¡¢AWS¡¢GCP»òCitrix ADCЧÀͽ»¸¶×°±¸£¨SDX£©ÉϵÄCitrix ADCºÍCitrix GatewayÐéÄâ×°±¸£¨VPX£©¡£¡£¡£¡£¡£SDXÉϵÄSVM²»ÐèÒª¸üС£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬£¬Citrix»¹¼ÓËÙÁ˽«¸Ã²¹¶¡ÍÆË͵½ÆäËüADC°æ±¾ºÍSD-WAN WANOPµÄÀú³Ì£¬£¬£¬£¬£¬£¬£¬ÐµĹ̼þ½«ÔÚ1ÔÂ24ÈÕÐû²¼¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/citrix-patches-cve-2019-19781-flaw-in-citrix-adc-111-and-120/


¾©¹«Íø°²±¸11010802024551ºÅ