AdobeÐÞ¸´AcrobatºÍReader±»Ê¹ÓÃÎó²îCVE-2023-26369
Ðû²¼Ê±¼ä 2023-09-141¡¢AdobeÐÞ¸´AcrobatºÍReader±»Ê¹ÓÃÎó²îCVE-2023-26369
9ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬AdobeÒÑÐû²¼±¾ÔµÄÖܶþ²¹¶¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËAcrobatºÍReaderÖÐÒѱ»Ê¹ÓõÄÎó²î£¨CVE-2023-26369£©¡£¡£¡£¡£ÕâÊÇÒ»¸öÔ½½çдÈëÎó²î£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉʹÓÿÉÔÚÄ¿µÄÅÌËã»úÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐÅû¶Óйع¥»÷µÄ¸ü¶àÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«½¨ÒéÓû§×îÐÒ¿÷72СʱÄÚ×°ÖøüС£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Adobe»¹ÐÞ¸´ÁËConnectÖеÄXSSÎó²î£¨CVE-2023-29305ºÍCVE-2023-29306£©ºÍExperience ManagerÖеÄXSSÎó²î£¨CVE-2023-38214ºÍCVE-2023-38215£©¡£¡£¡£¡£
https://thehackernews.com/2023/09/update-adobe-acrobat-and-reader-to.html
2¡¢Microsoft TeamsЧÀÍÖÐÖ¹Ö÷ÒªÓ°Ïì±±ÃÀµØÇøµÄÓû§
¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬MicrosoftÕýÔÚÊӲ쵼Ö¿ͻ§ÎÞ·¨Ê¹ÓÃMicrosoft TeamsÊÕ·¢ÐÂÎŵÄÖÐÖ¹ÎÊÌâ¡£¡£¡£¡£´Ó8µã×óÓÒ×îÏÈ£¬£¬£¬£¬£¬£¬£¬²¿·ÖÓû§·´Ó¦ÔÚÅþÁ¬TeamsЧÀÍÆ÷»òWebÓ¦ÓÃʱÓöµ½ÁËÎÊÌâ¡£¡£¡£¡£Î¢ÈíÏÖÔÚÒѾȷ¶¨£¬£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâ½ö±£´æÓÚͨ¹ý±±ÃÀÊÜÓ°Ïì»ù´¡ÉèÊ©ÌṩЧÀ͵IJ¿·ÖÓû§£¬£¬£¬£¬£¬£¬£¬ËûÃÇÕýÔÚ½«±»Ó°ÏìµÄЧÀÍÁ÷Á¿Â·Óɵ½ÎȽ¡µÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬ÒÔ¼õ»ºÓ°Ïì¡£¡£¡£¡£×èÖ¹ÃÀ¹ú¶«²¿Ê±¼ä9ÔÂ13ÈÕ13:25£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÌåÏÖTeamsÐÂÎÅת´ïÎÊÌâÏÖÒѽâ¾ö¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-down-ongoing-outage-behind-message-failures-delays/
3¡¢GitHubÖÐÎó²î¿Éµ¼ÖÂ4ǧ¶à´æ´¢¿âÔâµ½Repojacking¹¥»÷
CheckmarxÔÚ9ÔÂ12ÈÕ³ÆÆä·¢Ã÷ÁËGitHubÖеÄÒ»¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂ4000¶à¸ö´æ´¢¿âÔâµ½Repojacking¹¥»÷¡£¡£¡£¡£ÔÚRepoJacking¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÔÚÕýµ±½¨ÉèÕ߸ü¸ÄÓû§ÃûºóʹÓô洢¿âµÄ¾ÉÓû§Ãû£¬£¬£¬£¬£¬£¬£¬È»ºóÐû²¼Í¬ÃûµÄ¶ñÒâ´æ´¢¿âÒÔÓÕÆÓû§ÏÂÔØÆäÄÚÈÝ¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÐ®ÖÆGo¡¢PHPºÍSwiftµÈÓïÑÔµÄ4000¶à¸ö´úÂë°üÒÔ¼°GitHub»î¶¯¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ3ÔÂ1ÈÕÅû¶Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬´úÂëÍÐ¹ÜÆ½Ì¨ÒÑÓÚ9ÔÂ1ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£
https://checkmarx.com/blog/persistent-threat-new-exploit-puts-thousands-of-github-repositories-and-millions-of-users-at-risk/
4¡¢ºÚ¿ÍUSDoDÔÚ°µÍø¹ûÕæAirbusÊýǧ¼Ò¹©Ó¦É̵ÄÊý¾Ý
¾Ý9ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬º½¿Õ¹«Ë¾AirbusÕýÔÚÊÓ²ìÉæ¼°3200¼Ò¹©Ó¦É̵ÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£ÃûΪUSDoDµÄºÚ¿ÍÓÚ±¾ÖÜÒ»ÔÚBreachForumsÉÏ·¢Ìû³Æ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÈëÇÖÁËÒ»ÃûÍÁ¶úÆäº½¿Õ¹«Ë¾Ô±¹¤µÄÕË»§²¢»ñµÃÁËAirbusÃÅ»§ÍøÕ¾µÄ»á¼ûȨÏÞ¡£¡£¡£¡£»£»£»£»£»¹Í¸Â¶ÓµÓÐÊýǧ¼ÒAirbus¹©Ó¦É̵ÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂëºÍµç×ÓÓʼþµÈ¡£¡£¡£¡£USDoD×Ô³ÆÊÇRansomedµÄÕýʽ³ÉÔ±£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖLockheed MartinºÍRaytheon¿ÉÄÜ»áÊÇÏÂÒ»¸öûĿµÄ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïÔÚÈ¥Äê12Ô·ݻ¹Ôø³öÊÛÁËFBI¹²ÏíϵͳInfraGardµÄÊý¾Ý¿â¡£¡£¡£¡£
https://therecord.media/airbus-data-leak-suppliers-breachedforums
5¡¢Symantec·¢Ã÷RedflyÕë¶ÔÑÇÖÞij¹ú¼ÒµçÍøµÄ¹¥»÷»î¶¯
9ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬SymantecÅû¶ÁËRedflyÕë¶ÔÑÇÖÞij¹ú¼ÒµçÍøµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¹¥»÷»î¶¯×îÔçµÄ¼£ÏóÓÚ2ÔÂ23ÈÕ±»¼Í¼£¬£¬£¬£¬£¬£¬£¬ÆäʱShadowPadÔÚһ̨ÅÌËã»úÉÏÖ´ÐУ¬£¬£¬£¬£¬£¬£¬ºóÓÚ5ÔÂ17ÈÕÔٴα»Ö´ÐУ¬£¬£¬£¬£¬£¬£¬×îºóµÄ»î¶¯¼£Ïó·ºÆðÓÚ8ÔÂ3ÈÕ¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓõŤ¾ß°üÀ¨£ºÄ£¿£¿£¿£¿£¿é»¯RAT ShadowPad£¬£¬£¬£¬£¬£¬£¬Ëüαװ³ÉVMwareÎļþ£¬£¬£¬£¬£¬£¬£¬Ö§³ÖÊý¾Ýй¶¡¢»÷¼ü¼Í¼¡¢ÎļþËÑË÷ÒÔ¼°Ô¶³ÌÏÂÁîÖ´Ðеȣ»£»£»£»£»Packerloader£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÔÚÄܹ»ÈƹýAV¼ì²âµÄAES¼ÓÃÜÎļþÖмÓÔØºÍÖ´ÐÐshellcode£»£»£»£»£»ÒÔ¼°¼üÅ̼ͼ³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÔÚÄ¿µÄϵͳÉϵÄÈÕÖ¾ÎļþÖв¶»ñ»÷¼ü¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÓëAPT41£¨ÓÖÃûWinnti£©µÄ»î¶¯ÓÐÖØµþ¡£¡£¡£¡£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/critical-infrastructure-attacks
6¡¢KasperskyÅû¶Free Download Manager¹©Ó¦Á´¹¥»÷
9ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬Kaspersky±¨¸æ³ÆFree Download Manager¹©Ó¦Á´¹¥»÷½«LinuxÓû§Öض¨Ïòµ½×°ÖÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ¶ñÒâDebianÈí¼þ°ü´æ´¢¿â¡£¡£¡£¡£KasperskyÔÚÊÓ²ì¿ÉÒÉÓòʱ·¢Ã÷Á˸û£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÒѾ¾ÙÐÐÁËÈýÄê¶à¡£¡£¡£¡£¸Ã¶ñÒâDebianÈí¼þ°üÓÃÓÚ×°ÖûùÓÚDebianµÄLinux¿¯Ðа棬£¬£¬£¬£¬£¬£¬Ëü»á·Ö·¢Ò»¸öBashÐÅÏ¢ÇÔÈ¡¾ç±¾ºÍÒ»¸ö´ÓC2½¨Éè·´ÏòshellµÄcrondºóÃÅ¡£¡£¡£¡£crond×é¼þÔÚϵͳÉϽ¨ÉèÒ»¸öеÄcronʹÃü£¬£¬£¬£¬£¬£¬£¬¿ÉÔÚϵͳÆô¶¯Ê±ÔËÐÐÇÔÈ¡¾ç±¾¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÑÏòÈí¼þ¹©Ó¦ÉÌת´ïÁË´ËÊ£¬£¬£¬£¬£¬£¬£¬µ«ÉÐδÊÕµ½»Ø¸´£¬£¬£¬£¬£¬£¬£¬Òò´ËÈ·ÇеÄÈëÇÖ·½·¨ÈÔ²»ÇåÎú¡£¡£¡£¡£
https://securelist.com/backdoored-free-download-manager-linux-malware/110465/


¾©¹«Íø°²±¸11010802024551ºÅ