AdobeÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´MagentoºÍConnectÖжà¸öÎó²î£»£»£»£»£»£»£»LockBit³ÆÒÑÇÔÈ¡°£ÉÕÜ6TBµÄÊý¾Ý²¢ÀÕË÷5000ÍòÃÀÔª
Ðû²¼Ê±¼ä 2021-08-121.AdobeÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´MagentoºÍConnectÖжà¸öÎó²î

AdobeÐû²¼ÁËÖܶþÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´Æäµç×ÓÉÌÎñƽ̨MagentoºÍConnectÖеÄ29¸öÎó²î¡£¡£¡£¡£¡£ÆäÖÐMagentoÖÐÐÞ¸´ÁË26¸öÎó²î£¬£¬£¬£¬½ÏΪÑÏÖØµÄÊÇÓÉÓÚÊäÈëÑéÖ¤²»µ±µ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36021¡¢CVE-2021-36024ºÍCVE-2021-36025µÈ£©ºÍÏÂÁî×¢Èëµ¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36022ºÍCVE-2021-36023£©µÈÎó²î¡£¡£¡£¡£¡£Adobe ConnectÖÐÐÞ¸´ÁË3¸öÎó²î£¬£¬£¬£¬°üÀ¨Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2021-36061£©ºÍ·´ÉäÐÍXSSÎó²î£¨CVE-2021-36062ºÍCVE-2021-36063£©¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-preauth-vulnerabilities-in-magento/
2.CiscoÅû¶Mozilla FirefoxÖдúÂëÖ´ÐÐÎó²îµÄϸ½Ú

Cisco TalosÅû¶ÁËMozilla FirefoxÖдúÂëÖ´ÐÐÎó²îµÄϸ½Ú¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-29985£¬£¬£¬£¬±£´æÓÚFirefoxµÄnsBufferedStream×é¼þÖУ¨Stream»º³å¹¦Ð§µÄÒ»²¿·Ö£©¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔÓÕʹÓû§»á¼ûÌØÖÆµÄ¶ñÒâÍøÒ³À´´¥·¢¸ÃÎó²î£¬£¬£¬£¬À´µ¼ÖÂÔÓÂÒÇéÐΣ¨race condition£©£¬£¬£¬£¬´Ó¶øµ¼ÖÂÊͷźóʹÓúÍÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆFirefox°æ±¾89.0.3 x64±£´æ¸ÃÎó²î£¬£¬£¬£¬½¨ÒéÁ¬Ã¦¸üС£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2021/08/vuln-spotlight-firefox-code.html
3.LockBit³ÆÒÑÇÔÈ¡°£ÉÕÜ6TBµÄÊý¾Ý²¢ÀÕË÷5000ÍòÃÀÔª

ÀÕË÷ÍÅ»ïLockBit 2.0Éù³ÆÒÑÇÔÈ¡°£ÉÕܹ«Ë¾Áè¼Ý6TBµÄÊý¾Ý£¬£¬£¬£¬²¢ÀÕË÷5000ÍòÃÀÔª¡£¡£¡£¡£¡£°£ÉÕÜÊÇÈ«Çò×ÅÃûµÄIT×Éѯ¹«Ë¾£¬£¬£¬£¬ÊÐÖµ443ÒÚÃÀÔª£¬£¬£¬£¬Ð§ÀÍÓÚÆû³µ¡¢ÒøÐС¢Õþ¸®¡¢ÊÖÒÕ¡¢ÄÜÔ´¡¢µçÐŵÈÖÚ¶àÐÐÒµ¡£¡£¡£¡£¡£¸ÃÍÅ»ï³ÆÒÑͨ¹ý¹«Ë¾µÄ¡°ÄÚ²¿Ö°Ô±¡±»á¼û°£ÉÕܵÄÍøÂ磬£¬£¬£¬²¢ÌåÏÖÈôÊÇûÓÐÖ§¸¶Êê½ðËûÃǽ«ÔÚ8ÔÂ11ÈÕÍíÉÏÐû²¼Êý¾Ý£¬£¬£¬£¬µ«11ÈÕÍíÉÏʺó¸ÃÍŻォй¶ʱ¼äÍÆ³Ùµ½ÁË8ÔÂ12ÈÕ20:43:00¡£¡£¡£¡£¡£ÍþвÇ鱨¹«Ë¾Hudson RockÌåÏÖ°£ÉÕÜÓÐ2500̨Ա¹¤ºÍÏàÖúͬ°éµÄµçÄÔÒÑÔâµ½ÈëÇÖ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/121048/data-breach/accenture-lockbit-2-0-ransomware-attack.html
4.ÓÎÏ·¹«Ë¾CrytekÈÏ¿ÉÆäÔøÔâÀÕË÷Èí¼þEgregorµÄ¹¥»÷

ÓÎÏ·¿ª·¢É̺Ϳ¯ÐÐÉÌCrytekÈÏ¿ÉÆäÔøÓÚ2020Äê10ÔÂÔâµ½ÀÕË÷Èí¼þEgregorµÄ¹¥»÷¡£¡£¡£¡£¡£EgregorÔø¹¥»÷¹ýÈ«ÇòÖÚ¶à×éÖ¯£¬£¬£¬£¬Èçθ绪µÄTransLinkµØÌúϵͳºÍKmartµÈ£¬£¬£¬£¬ÆäÖ÷Òª³ÉÔ±ÓÚ2021Äê2ÔÂÔÚ·¨¹úºÍÎÚ¿ËÀ¼Ö´·¨²¿·ÖÁªºÏÐж¯Öб»²¶¡£¡£¡£¡£¡£Crytek³Æ´Ë´Î¹¥»÷й¶Á˿ͻ§Ð¡ÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ÐÕÃû¡¢Ö°Îñ¡¢¹«Ë¾Ãû³Æ¡¢µç×ÓÓʼþ¡¢¹«Ë¾µØµã¡¢µç»°ºÅÂëºÍµØÇøµÈ¡£¡£¡£¡£¡£¶øEgregor֮ǰÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾¹ûÕæµÄÊý¾Ý°üÀ¨ÓëWarFaceÏà¹ØµÄÎļþ¡¢MOBAÓÎÏ·ÔËÆø¾º¼¼³¡ºÍÓÐ¹ØÆäÍøÂçÔËÐÐÐÅÏ¢µÄÎļþ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/crytek-confirms-egregor-ransomware-attack-customer-data-theft/
5.FireEye·¢Ã÷UNC215Õë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯

FireEye·¢Ã÷ÌØ¹¤×éÖ¯UNC215½üÆÚÕë¶ÔÒÔÉ«ÁÐÕþ¸®ÍøÂçµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£MandiantÔÚ2019ÄêÍ··¢Ã÷UNC215Õë¶ÔÖж«µÄ¹¥»÷»î¶¯£¬£¬£¬£¬¹¥»÷ÕßʹÓÃSharePointÖÐÎó²îCVE-2019-0604ÔÚÖж«ºÍÖÐÑǵÄÄ¿µÄ×°±¸ÉÏ×°ÖÃweb shellºÍFOCUSFJORD payload¡£¡£¡£¡£¡£³ýÁËÒ£²âÊý¾Ý£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÓëÒÔÉ«Áйú·À»ú¹¹ÏàÖú£¬£¬£¬£¬·¢Ã÷×Ô2019Äê1ÔÂ×îÏȵÄÕë¶ÔÒÔÉ«ÁÐÕþ¸®»ú¹¹¡¢IT¹©Ó¦É̺͵çÐŹ«Ë¾µÄ¶à¸ö²¢Ðл£¬£¬£¬£¬Ê±´úUNC215 ʹÓÃеÄTTPÀ´Èƹý¼ì²â¡¢Òþ²Ø¹¥»÷»î¶¯²¢Ê¹ÓÿÉÐŹØÏµºáÏòÒÆ¶¯¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2021/08/unc215-chinese-espionage-campaign-in-israel.html
6.Unit 42Ðû²¼ÀÕË÷Èí¼þeCh0raixбäÖֵįÊÎö±¨¸æ

Unit 42Ðû²¼ÁËÓйØÀÕË÷Èí¼þeCh0raixбäÖֵįÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬¸Ã±äÖÖʹÓÃÁËÎó²îCVE-2021-28799£¬£¬£¬£¬Ö÷ÒªÕë¶ÔSynologyÍøÂ總¼Ó´æ´¢(NAS)ºÍQuality Network Appliance Provider (QNAP)NAS×°±¸£¬£¬£¬£¬ÒѾÔÚÒ°Íâ»îÔ¾Á˽üÒ»Äê¡£¡£¡£¡£¡£¸Ã±¨¸æ½¨ÒéÓû§¸üÐÂ×°±¸¹Ì¼þÒÔ±ÜÃâ´ËÀ๥»÷¡¢½¨ÉèÖØ´óµÄµÇ¼ÃÜÂëÒÔ±ÜÃⱩÁ¦ÆÆ½â£¬£¬£¬£¬ÒÔ¼°½öͨ¹ýÒÑʶ±ðIPµÄÓ²±àÂëÁбíÏÞÖÆÓëSOHO×°±¸µÄÅþÁ¬¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/ech0raix-ransomware-soho/


¾©¹«Íø°²±¸11010802024551ºÅ