Area1±¨¸æ¶íÂÞ˹ͨ¹ýEximÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡£¡£¡£¡£¡£ ¡£»£»£»£»£» £»£»Naval Dome·¢Ã÷×Ô2ÔÂÒÔÀ´Õë¶Ôº½Ô˵Ĺ¥»÷¼¤Ôö400%

Ðû²¼Ê±¼ä 2020-06-09

1.Area1Ðû²¼±¨¸æ£¬£¬£¬£¬£¬¶íÂÞ˹ͨ¹ýEximÊðÀí(MTA)ÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Area1Ðû²¼±¨¸æ£¬£¬£¬£¬£¬ÌåÏÖ¶íÂÞ˹ͨ¹ýEximÊðÀí(MTA)ÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡¡£¡£¡£¡£¡£ ¡£ÃÀ¹úÍøÂçÇå¾²×ÉѯÖÒÑԳƣ¬£¬£¬£¬£¬×Ô2019Äê8ÔÂÒÔÀ´£¬£¬£¬£¬£¬Óë¶íÂÞ˹¾ü·½ÓйصĺڿÍÒ»Ö±ÔÚʹÓÃÃÀ¹úEximÓʼþ´«ÊäÊðÀí(MTA)Èí¼þÖеÄÎó²î(CVE-2019-10149)¡£¡£¡£¡£¡£ ¡£¸ÃÎó²î¿ÉÒÔÓ°ÏìEximµÄ4.87µ½4.91°æ±¾£¬£¬£¬£¬£¬Ê¹ÓÃËü¿ÉÒÔÔöÌíÌØÈ¨Óû§¡¢½ûÓÃÍøÂçÇå¾²ÉèÖá¢ÌᳫBEC´¹ÂڻµÈ¡£¡£¡£¡£¡£ ¡£¶øÏÖÒÑÈ·¶¨2018ÄêÃÀ¹ú´óÑ¡ÖÐÖÁÉÙ44ÃûºòÑ¡ÈËʹÓÃÁËEximЧÀÍÆ÷£¬£¬£¬£¬£¬¶ø2020ÄêÃÀ¹ú´óÑ¡ÖÁÉÙ50ÃûºòÑ¡ÈËʹÓÃEximЧÀÍÆ÷¡£¡£¡£¡£¡£ ¡£Òò´Ë£¬£¬£¬£¬£¬Area1È·ÐÅ2020ÄêÑ¡¾ÙÖеÄÏÖÈκòÑ¡ÈËÔÚ2018ÄêÑ¡¾Ùµ½2019Äê2ÔÂÖ®¼ä¿Ï¶¨»áÊܵ½CVE-2019-10149µÄÓ°Ïì¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://cdn.area1security.com/reports/Area-1-Security-EximReport.pdf


2.BolsterÐû²¼2020ÄêµÚÒ»¼¾¶ÈÍøÂç´¹ÂÚºÍÔÚÏßڲƭ±¨¸æ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


·Àڲƭ¹«Ë¾BolsterÐû²¼ÁË2020ÄêµÚÒ»¼¾¶ÈÍøÂç´¹ÂÚºÍÔÚÏßڲƭ±¨¸æ£¬£¬£¬£¬£¬·¢Ã÷ÓëCOVID-19Ïà¹ØµÄÚ²Æ­ÍøÕ¾¼¤Ôö¡£¡£¡£¡£¡£ ¡£ÔÚ2020ÄêµÚÒ»¼¾¶È£¬£¬£¬£¬£¬Bolster×ܹ²¼ì²âµ½854441¸öÍøÂç´¹ÂÚºÍÕ©Æ­ÍøÕ¾ºÍԼĪ400Íò¸ö¿ÉÒÉÍøÕ¾£¬£¬£¬£¬£¬ÆäÖÐÔ¼30£¥ÓëCOVID-19ÓйØ¡£¡£¡£¡£¡£ ¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬´ËÀàÍøÕ¾µÄÔöÌíÁ¿Ò²ÔÚÒ»Ö±ÔöÌí£¬£¬£¬£¬£¬´ÓÒ»Ô·ÝÌìÌì3142¸öеÄÍøÒ³ÔöÌíµ½ÈýÔ·Ý8342¸öÍøÒ³£¬£¬£¬£¬£¬Ö±µ½3ÔÂ19ÈÕµÖ´ïá۷壬£¬£¬£¬£¬Ò»ÌìÄÚ½¨ÉèÁËÁè¼Ý25000¸öеÄÍøÒ³¡£¡£¡£¡£¡£ ¡£SaaSºÍµçÐÅÐÐÒµÊÇÊÜÍøÂç´¹ÂÚÕ©Æ­Ó°Ïì×î´óµÄÐÐÒµ£¬£¬£¬£¬£¬Æä´ÎÊǽðÈÚ¡¢ÁãÊÛºÍÁ÷ýÌåÐÐÒµ¡£¡£¡£¡£¡£ ¡£Bolster»¹·¢Ã÷Á˶à¸öÕ©Æ­ÍøÕ¾ÊÛÂôαÔìµÄCOVID-19¼ÓÃÜÇ®±ÒºÍ¼ÓÃÜÇ®°ü£¬£¬£¬£¬£¬ÆäÄ¿µÄÊÇÇÔÈ¡Êý¾ÝÒÔÓÃÓÚδÀ´µÄÍøÂç´¹ÂÚ¡¢¶ñÒâÈí¼þ·Ö·¢ºÍÇÔȡƾ֤¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.businesswire.com/news/home/20200513005152/en/Bolster%E2%80%99s-Q1-2020-State-Phishing-Online-Fraud


3.Naval Dome·¢Ã÷£¬£¬£¬£¬£¬×Ô2ÔÂÒÔÀ´Õë¶Ôº½Ô˵ĺڿ͹¥»÷¼¤Ôö400%


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÒÔÉ«Áк£ÉÏÍøÂçÇ徲ר¼ÒNaval Dome³Æ£¬£¬£¬£¬£¬×Ô2020Äê2ÔÂÒÔÀ´£¬£¬£¬£¬£¬Õë¶Ôº½Ô˵ĺڿ͹¥»÷¼¤ÔöÁË400%¡£¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾ÒÔΪCOVID-19ʹµÃº£ÉÏÄÜÔ´²¿·Ö±ÈÒÔǰ¸üÈÝÒ×Êܵ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬Í¬Ê±Ê¹¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þºÍ´¹ÂÚÓʼþ¼¤Ôö¡£¡£¡£¡£¡£ ¡£Naval DomeµÄCEO Itai SelaÌåÏÖ£¬£¬£¬£¬£¬ÓÉÓÚCovid-19µ¼ÖµÄÉç½»ÏÞÖÆºÍ¸ôÀë²½·¥£¬£¬£¬£¬£¬ÆÈʹԭʼװ±¸ÖÆÔìÉÌ£¨OEM£©¡¢ÊÖÒÕÖ°Ô±ºÍ¹©Ó¦É̽«Ô­±¾×ÔÁ¦µÄϽµµÍ¬½Óµ½InternetÉÏ£¬£¬£¬£¬£¬OEMÊÖÒÕÖ°Ô±ÎÞ·¨µ½´¬Ö»ºÍ×ê»úÉÏÉý¼¶OTϵͳ£¬£¬£¬£¬£¬ÕâЩ¶¼µ¼Ö¸ÃÐÐÒµ¸üÒ×ÓÚ±»¹¥»÷¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.offshore-energy.biz/naval-dome-400-increase-in-attempted-hacks-since-february-2020/


4.WordPress²å¼þPageLayer±£´æÎó²î£¬£¬£¬£¬£¬Ó°ÏìÁè¼Ý20Íò¸öÍøÕ¾


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


WordfenceÍŶӷ¢Ã÷WordPress²å¼þPageLayer±£´æÁ½¸öÎó²î£¬£¬£¬£¬£¬¿ÉÄÜ»áÓ°ÏìÁè¼Ý20Íò¸öÍøÕ¾¡£¡£¡£¡£¡£ ¡£µÚÒ»¸öÎó²îµÄCVSSµÄÆÀ·ÖΪ7.4£¬£¬£¬£¬£¬¸ÃÎó²îµÄ±£´æÊÇÓÉÓÚ²å¼þµÄAJAX¶ËµãÖ»ÊÇͨ¹ýÒ»¸öÉí·ÝÑéÖ¤µÄ»á»°¼ì²éÇëÇóÊÇ·ñÀ´×Ô /wp-admin£¬£¬£¬£¬£¬¶ø²»¼ì²é·¢ËÍÇëÇóµÄÓû§µÄȨÏÞ£¬£¬£¬£¬£¬Òò´ËÈκλá¼ûȨÏÞµÄÓû§¶¼¿ÉÒÔÖ´ÐÐÈκβÙ×÷£¬£¬£¬£¬£¬¸ÃÎó²î¿É±»Ê¹ÓÃɾ³ýÄÚÈÝ»òÏòÏÖÓÐÒ³Ãæ×¢Èë¶ñÒâÄÚÈÝ¡£¡£¡£¡£¡£ ¡£µÚ¶þ¸öÎó²îµÄCVSSÆÀ·ÖΪ8.8·Ö£¬£¬£¬£¬£¬ÊÇÓÉÓÚȱÉÙCSRF±£»£»£»£»£» £»£»¤£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÒÔʹÓøÃÎó²îÏòÕ¾µãÒ³Ãæ×¢Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±ÒѾ­Ðû²¼ÁËÇå¾²²¹¶¡ÒÔ¶ÔÎó²î¾ÙÐÐÐÞ¸´¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/06/07/pagelayer-wordpress-plugin-vulnerabilities-risked-over-200k-websites/


5.ºÚ¿ÍʹÓÃÍøÂç´¹ÂÚ¹¥»÷µÂ¹úСÎÒ˽¼Ò·À»¤×°±¸¹©Ó¦Á´


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


IBM X-ForceÑо¿Ö°Ô±Ðû²¼±¨¸æÌåÏÖ£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÍøÂç´¹ÂÚ¹¥»÷Ò»¼ÒµÂ¹ú¹«Ë¾µÄ¸ß²ãÖÎÀíÖ°Ô±£¬£¬£¬£¬£¬¸Ã¹«Ë¾µÄÖ÷ÒªÊÂÇéÊDzɹºÐ¡ÎÒ˽¼Ò·À»¤×°±¸£¨PPE£©£¬£¬£¬£¬£¬ÏÖÔÚºÚ¿ÍÒÑÊÔͼÇÔÈ¡100¶àλ¸ß¹ÜµÄƾ֤¡£¡£¡£¡£¡£ ¡£3ÔÂ30ÈÕ£¬£¬£¬£¬£¬µÂ¹úÕþ¸®Óë¸Ã¹ú´óÐ͹«Ë¾¾ÙÐоۻᣬ£¬£¬£¬£¬ÒªÇóÆäЭÖúµÂ¹ú¹ºÖÃPPEÖ®ºó£¬£¬£¬£¬£¬Ï®»÷¾Í×îÏÈÁË¡£¡£¡£¡£¡£ ¡£Í³Ò»Ì죬£¬£¬£¬£¬ÕâЩ´óÐ͹«Ë¾ÖеÄÒ»¸ö¹«Ë¾µÄ¸ß¹ÜÊÕµ½ÁËÀ´×Ô¶íÂÞ˹IPµØµãµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£ ¡£Êܺ¦ÕßÖÐÌ©°ëΪĿµÄ¹«Ë¾ÖÐÓëÔËÓª¡¢²ÆÎñºÍ²É¹ºÏà¹ØµÄ¸ß¹Ü£¬£¬£¬£¬£¬ÁíÒ»°ëÊôÓڸù«Ë¾µÄÏàÖú¹«Ë¾µÄ¸ß¹Ü¡£¡£¡£¡£¡£ ¡£¾ÝÊӲ죬£¬£¬£¬£¬ºÚ¿ÍʹÓÃǶÈëʽ³¬Á´½Ó£¬£¬£¬£¬£¬½«Êܺ¦ÕßÖØ¶¨Ïòµ½Î±×°³ÉMicrosoftµÇ¼±íµ¥µÄÍøÂç´¹ÂÚµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬²¢½«ÍøÂçµ½µÄÊý¾Ý·¢Ë͵½¶à¸öYandexµç×ÓÓʼþÕÊ»§¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-are-attacking-the-german-ppe-supply-chain/


6.еÄÍøÂç´¹Âڻͨ¹ýStackBlitz¹¤¾ßÍйܴ¹ÂÚÒ³Ãæ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Zscaler ThreatLabzÍŶӷ¢Ã÷£¬£¬£¬£¬£¬ÏÖÔÚ±£´æ¶àÖÖʹÓÃStackBlitz¹¤¾ßµÄÍøÂç´¹Âڻ£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÁËÔ¤Ö¸µ¼¿â¹¦Ð§½«ÍйܵÄÍøÒ³´ÓЧÀÍÆ÷¶ËÖ±½Ó¹ý¶Éµ½¿Í»§¶Ë¡£¡£¡£¡£¡£ ¡£ÔÚµÚÒ»ÖÖ´¹ÂڻÖУ¬£¬£¬£¬£¬ºÚ¿Íαװ³ÉÒ½ÁÆÎÀÉú×éÖ¯£¬£¬£¬£¬£¬Í¨¹ýOneDrive¹²ÏíЧÀÍ·¢ËÍÎĵµ£¬£¬£¬£¬£¬Óû§Ò»µ©µã»÷ÏÂÔØÁ´½Ó£¬£¬£¬£¬£¬¾Í»á±»Öض¨Ïòµ½Outlook´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£ ¡£ÔÚÁíÒ»ÖÖ´¹ÂڻÖУ¬£¬£¬£¬£¬´¹ÂÚÓʼþÖеÄÁ´½ÓÖ¸ÏòÒ»¸öÍøÒ³£¬£¬£¬£¬£¬²¢°üÀ¨Ò»ÌõÐÂÎÅ˵Ã÷ÄúÊÕµ½ÁË´øÓÐÏà¹ØÎĵµÏÂÔØÁ´½ÓµÄ¹²ÏíÎĵµ£¬£¬£¬£¬£¬Óû§µ¥»÷ÏÂÔØÁ´½Óºó±ã»á±»Öض¨Ïòµ½OneDriveÍøÂç´¹ÂÚÍøÒ³¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zscaler.com/blogs/research/new-campaign-abusing-stackblitz-tool-host-phishing-pages