Area1±¨¸æ¶íÂÞ˹ͨ¹ýEximÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡£¡£¡£»£» £»Naval Dome·¢Ã÷×Ô2ÔÂÒÔÀ´Õë¶Ôº½Ô˵Ĺ¥»÷¼¤Ôö400%

Ðû²¼Ê±¼ä 2020-06-09

1.Area1Ðû²¼±¨¸æ £¬£¬£¬£¬£¬¶íÂÞ˹ͨ¹ýEximÊðÀí(MTA)ÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Area1Ðû²¼±¨¸æ £¬£¬£¬£¬£¬ÌåÏÖ¶íÂÞ˹ͨ¹ýEximÊðÀí(MTA)ÖÐÎó²î×ÌÈÅÃÀ¹ú´óÑ¡¡£¡£¡£ÃÀ¹úÍøÂçÇå¾²×ÉѯÖÒÑÔ³Æ £¬£¬£¬£¬£¬×Ô2019Äê8ÔÂÒÔÀ´ £¬£¬£¬£¬£¬Óë¶íÂÞ˹¾ü·½ÓйصĺڿÍÒ»Ö±ÔÚʹÓÃÃÀ¹úEximÓʼþ´«ÊäÊðÀí(MTA)Èí¼þÖеÄÎó²î(CVE-2019-10149)¡£¡£¡£¸ÃÎó²î¿ÉÒÔÓ°ÏìEximµÄ4.87µ½4.91°æ±¾ £¬£¬£¬£¬£¬Ê¹ÓÃËü¿ÉÒÔÔöÌíÌØÈ¨Óû§¡¢½ûÓÃÍøÂçÇå¾²ÉèÖá¢ÌᳫBEC´¹ÂڻµÈ¡£¡£¡£¶øÏÖÒÑÈ·¶¨2018ÄêÃÀ¹ú´óÑ¡ÖÐÖÁÉÙ44ÃûºòÑ¡ÈËʹÓÃÁËEximЧÀÍÆ÷ £¬£¬£¬£¬£¬¶ø2020ÄêÃÀ¹ú´óÑ¡ÖÁÉÙ50ÃûºòÑ¡ÈËʹÓÃEximЧÀÍÆ÷¡£¡£¡£Òò´Ë £¬£¬£¬£¬£¬Area1È·ÐÅ2020ÄêÑ¡¾ÙÖеÄÏÖÈκòÑ¡ÈËÔÚ2018ÄêÑ¡¾Ùµ½2019Äê2ÔÂÖ®¼ä¿Ï¶¨»áÊܵ½CVE-2019-10149µÄÓ°Ïì¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cdn.area1security.com/reports/Area-1-Security-EximReport.pdf


2.BolsterÐû²¼2020ÄêµÚÒ»¼¾¶ÈÍøÂç´¹ÂÚºÍÔÚÏßڲƭ±¨¸æ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


·Àڲƭ¹«Ë¾BolsterÐû²¼ÁË2020ÄêµÚÒ»¼¾¶ÈÍøÂç´¹ÂÚºÍÔÚÏßڲƭ±¨¸æ £¬£¬£¬£¬£¬·¢Ã÷ÓëCOVID-19Ïà¹ØµÄÚ²Æ­ÍøÕ¾¼¤Ôö¡£¡£¡£ÔÚ2020ÄêµÚÒ»¼¾¶È £¬£¬£¬£¬£¬Bolster×ܹ²¼ì²âµ½854441¸öÍøÂç´¹ÂÚºÍÕ©Æ­ÍøÕ¾ºÍԼĪ400Íò¸ö¿ÉÒÉÍøÕ¾ £¬£¬£¬£¬£¬ÆäÖÐÔ¼30£¥ÓëCOVID-19Óйء£¡£¡£³ý´ËÖ®Íâ £¬£¬£¬£¬£¬´ËÀàÍøÕ¾µÄÔöÌíÁ¿Ò²ÔÚÒ»Ö±ÔöÌí £¬£¬£¬£¬£¬´ÓÒ»Ô·ÝÌìÌì3142¸öеÄÍøÒ³ÔöÌíµ½ÈýÔ·Ý8342¸öÍøÒ³ £¬£¬£¬£¬£¬Ö±µ½3ÔÂ19ÈÕµÖ´ïáÛ·å £¬£¬£¬£¬£¬Ò»ÌìÄÚ½¨ÉèÁËÁè¼Ý25000¸öеÄÍøÒ³¡£¡£¡£SaaSºÍµçÐÅÐÐÒµÊÇÊÜÍøÂç´¹ÂÚÕ©Æ­Ó°Ïì×î´óµÄÐÐÒµ £¬£¬£¬£¬£¬Æä´ÎÊǽðÈÚ¡¢ÁãÊÛºÍÁ÷ýÌåÐÐÒµ¡£¡£¡£Bolster»¹·¢Ã÷Á˶à¸öÕ©Æ­ÍøÕ¾ÊÛÂôαÔìµÄCOVID-19¼ÓÃÜÇ®±ÒºÍ¼ÓÃÜÇ®°ü £¬£¬£¬£¬£¬ÆäÄ¿µÄÊÇÇÔÈ¡Êý¾ÝÒÔÓÃÓÚδÀ´µÄÍøÂç´¹ÂÚ¡¢¶ñÒâÈí¼þ·Ö·¢ºÍÇÔȡƾ֤¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.businesswire.com/news/home/20200513005152/en/Bolster%E2%80%99s-Q1-2020-State-Phishing-Online-Fraud


3.Naval Dome·¢Ã÷ £¬£¬£¬£¬£¬×Ô2ÔÂÒÔÀ´Õë¶Ôº½Ô˵ĺڿ͹¥»÷¼¤Ôö400%


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÒÔÉ«Áк£ÉÏÍøÂçÇ徲ר¼ÒNaval Dome³Æ £¬£¬£¬£¬£¬×Ô2020Äê2ÔÂÒÔÀ´ £¬£¬£¬£¬£¬Õë¶Ôº½Ô˵ĺڿ͹¥»÷¼¤ÔöÁË400%¡£¡£¡£¸Ã¹«Ë¾ÒÔΪCOVID-19ʹµÃº£ÉÏÄÜÔ´²¿·Ö±ÈÒÔǰ¸üÈÝÒ×Êܵ½ÍøÂç¹¥»÷ £¬£¬£¬£¬£¬Í¬Ê±Ê¹¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þºÍ´¹ÂÚÓʼþ¼¤Ôö¡£¡£¡£Naval DomeµÄCEO Itai SelaÌåÏÖ £¬£¬£¬£¬£¬ÓÉÓÚCovid-19µ¼ÖµÄÉç½»ÏÞÖÆºÍ¸ôÀë²½·¥ £¬£¬£¬£¬£¬ÆÈʹԭʼװ±¸ÖÆÔìÉÌ£¨OEM£©¡¢ÊÖÒÕÖ°Ô±ºÍ¹©Ó¦É̽«Ô­±¾×ÔÁ¦µÄϽµµÍ¬½Óµ½InternetÉÏ £¬£¬£¬£¬£¬OEMÊÖÒÕÖ°Ô±ÎÞ·¨µ½´¬Ö»ºÍ×ê»úÉÏÉý¼¶OTϵͳ £¬£¬£¬£¬£¬ÕâЩ¶¼µ¼Ö¸ÃÐÐÒµ¸üÒ×ÓÚ±»¹¥»÷¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.offshore-energy.biz/naval-dome-400-increase-in-attempted-hacks-since-february-2020/


4.WordPress²å¼þPageLayer±£´æÎó²î £¬£¬£¬£¬£¬Ó°ÏìÁè¼Ý20Íò¸öÍøÕ¾


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


WordfenceÍŶӷ¢Ã÷WordPress²å¼þPageLayer±£´æÁ½¸öÎó²î £¬£¬£¬£¬£¬¿ÉÄÜ»áÓ°ÏìÁè¼Ý20Íò¸öÍøÕ¾¡£¡£¡£µÚÒ»¸öÎó²îµÄCVSSµÄÆÀ·ÖΪ7.4 £¬£¬£¬£¬£¬¸ÃÎó²îµÄ±£´æÊÇÓÉÓÚ²å¼þµÄAJAX¶ËµãÖ»ÊÇͨ¹ýÒ»¸öÉí·ÝÑéÖ¤µÄ»á»°¼ì²éÇëÇóÊÇ·ñÀ´×Ô /wp-admin £¬£¬£¬£¬£¬¶ø²»¼ì²é·¢ËÍÇëÇóµÄÓû§µÄȨÏÞ £¬£¬£¬£¬£¬Òò´ËÈκλá¼ûȨÏÞµÄÓû§¶¼¿ÉÒÔÖ´ÐÐÈκβÙ×÷ £¬£¬£¬£¬£¬¸ÃÎó²î¿É±»Ê¹ÓÃɾ³ýÄÚÈÝ»òÏòÏÖÓÐÒ³Ãæ×¢Èë¶ñÒâÄÚÈÝ¡£¡£¡£µÚ¶þ¸öÎó²îµÄCVSSÆÀ·ÖΪ8.8·Ö £¬£¬£¬£¬£¬ÊÇÓÉÓÚȱÉÙCSRF±£»£» £»¤ £¬£¬£¬£¬£¬ºÚ¿Í¿ÉÒÔʹÓøÃÎó²îÏòÕ¾µãÒ³Ãæ×¢Èë¶ñÒâ´úÂë¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬£¬¿ª·¢Ö°Ô±ÒѾ­Ðû²¼ÁËÇå¾²²¹¶¡ÒÔ¶ÔÎó²î¾ÙÐÐÐÞ¸´¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/06/07/pagelayer-wordpress-plugin-vulnerabilities-risked-over-200k-websites/


5.ºÚ¿ÍʹÓÃÍøÂç´¹ÂÚ¹¥»÷µÂ¹úСÎÒ˽¼Ò·À»¤×°±¸¹©Ó¦Á´


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


IBM X-ForceÑо¿Ö°Ô±Ðû²¼±¨¸æÌåÏÖ £¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÍøÂç´¹ÂÚ¹¥»÷Ò»¼ÒµÂ¹ú¹«Ë¾µÄ¸ß²ãÖÎÀíÖ°Ô± £¬£¬£¬£¬£¬¸Ã¹«Ë¾µÄÖ÷ÒªÊÂÇéÊDzɹºÐ¡ÎÒ˽¼Ò·À»¤×°±¸£¨PPE£© £¬£¬£¬£¬£¬ÏÖÔÚºÚ¿ÍÒÑÊÔͼÇÔÈ¡100¶àλ¸ß¹ÜµÄƾ֤¡£¡£¡£3ÔÂ30ÈÕ £¬£¬£¬£¬£¬µÂ¹úÕþ¸®Óë¸Ã¹ú´óÐ͹«Ë¾¾ÙÐÐ¾Û»á £¬£¬£¬£¬£¬ÒªÇóÆäЭÖúµÂ¹ú¹ºÖÃPPEÖ®ºó £¬£¬£¬£¬£¬Ï®»÷¾Í×îÏÈÁË¡£¡£¡£Í³Ò»Ìì £¬£¬£¬£¬£¬ÕâЩ´óÐ͹«Ë¾ÖеÄÒ»¸ö¹«Ë¾µÄ¸ß¹ÜÊÕµ½ÁËÀ´×Ô¶íÂÞ˹IPµØµãµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£Êܺ¦ÕßÖÐÌ©°ëΪĿµÄ¹«Ë¾ÖÐÓëÔËÓª¡¢²ÆÎñºÍ²É¹ºÏà¹ØµÄ¸ß¹Ü £¬£¬£¬£¬£¬ÁíÒ»°ëÊôÓڸù«Ë¾µÄÏàÖú¹«Ë¾µÄ¸ß¹Ü¡£¡£¡£¾ÝÊÓ²ì £¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃǶÈëʽ³¬Á´½Ó £¬£¬£¬£¬£¬½«Êܺ¦ÕßÖØ¶¨Ïòµ½Î±×°³ÉMicrosoftµÇ¼±íµ¥µÄÍøÂç´¹ÂÚµÇÂ¼Ò³Ãæ £¬£¬£¬£¬£¬²¢½«ÍøÂçµ½µÄÊý¾Ý·¢Ë͵½¶à¸öYandexµç×ÓÓʼþÕÊ»§¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-are-attacking-the-german-ppe-supply-chain/


6.еÄÍøÂç´¹Âڻͨ¹ýStackBlitz¹¤¾ßÍйܴ¹ÂÚÒ³Ãæ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Zscaler ThreatLabzÍŶӷ¢Ã÷ £¬£¬£¬£¬£¬ÏÖÔÚ±£´æ¶àÖÖʹÓÃStackBlitz¹¤¾ßµÄÍøÂç´¹Âڻ £¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÁËÔ¤Ö¸µ¼¿â¹¦Ð§½«ÍйܵÄÍøÒ³´ÓЧÀÍÆ÷¶ËÖ±½Ó¹ý¶Éµ½¿Í»§¶Ë¡£¡£¡£ÔÚµÚÒ»ÖÖ´¹ÂڻÖÐ £¬£¬£¬£¬£¬ºÚ¿Íαװ³ÉÒ½ÁÆÎÀÉú×éÖ¯ £¬£¬£¬£¬£¬Í¨¹ýOneDrive¹²ÏíЧÀÍ·¢ËÍÎĵµ £¬£¬£¬£¬£¬Óû§Ò»µ©µã»÷ÏÂÔØÁ´½Ó £¬£¬£¬£¬£¬¾Í»á±»Öض¨Ïòµ½Outlook´¹ÂÚÒ³Ãæ¡£¡£¡£ÔÚÁíÒ»ÖÖ´¹ÂڻÖÐ £¬£¬£¬£¬£¬´¹ÂÚÓʼþÖеÄÁ´½ÓÖ¸ÏòÒ»¸öÍøÒ³ £¬£¬£¬£¬£¬²¢°üÀ¨Ò»ÌõÐÂÎÅ˵Ã÷ÄúÊÕµ½ÁË´øÓÐÏà¹ØÎĵµÏÂÔØÁ´½ÓµÄ¹²ÏíÎĵµ £¬£¬£¬£¬£¬Óû§µ¥»÷ÏÂÔØÁ´½Óºó±ã»á±»Öض¨Ïòµ½OneDriveÍøÂç´¹ÂÚÍøÒ³¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zscaler.com/blogs/research/new-campaign-abusing-stackblitz-tool-host-phishing-pages