AdobeÐû²¼Äþ¾²¸üÐÂÐÞ¸´¶à¿î©¶´: ¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐÔâµ½¹¥»÷
Ðû²¼Ê±¼ä 2021-10-14¶ò¹Ï¶à¶û×î´ó˽ÈËÒøÐÐBanco PichinchaÔâµ½¹¥»÷
ÉÏÖÜÄ©£¬¶ò¹Ï¶à¶û×î´óµÄ˽ÈËÒøÐÐBanco PichinchaÔâµ½ÁËÍøÂç¹¥»÷£¬ÏµÍ³ÔÝʱ¹Ø±Õ¡£´Ë´Î¹¥»÷µ¼ÖÂÒøÐеÄÒµÎñ´óÃæ»ýÖжϣ¬°üÂÞATM¡¢ÍøÉÏÒøÐС¢Ó¦Ó÷¨Ê½¡¢µç×ÓÓʼþϵͳºÍ×ÔÖú·þÎñ¡£¸ÃÒøÐÐÔÚ·þÎñÖжϵÄÁ½ÌìºóÐû²¼ÉùÃ÷£¬³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬µ«²¢Î´¹ûÈ»´Ë´Î¹¥»÷µÄÐÔÖÊ¡£¾ÝÑо¿ÈËÔ±³ÆÕâÊÇÒ»´ÎÀÕË÷Èí¼þ¹¥»÷£¬¹¥»÷ÕßÔÚÒøÐеÄϵͳÖа²×°ÁËCobalt Strike beacon¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cyberattack-shuts-down-ecuadors-largest-bank-banco-pichincha/02
Ò½ÁƼ¼Êõ¹«Ë¾OlympusÔÙÔâ¹¥»÷£¬ÃÀÖÞÒµÎñÊܵ½Ó°Ïì
ÈÕ±¾Ò½ÁƼ¼Êõ¹«Ë¾OlympusÔÚ10ÔÂ10ÈÕÔâµ½¹¥»÷£¬µ¼ÖÂÃÀÖÞ£¨ÃÀ¹ú¡¢¼ÓÄôóºÍÀ¶¡ÃÀÖÞ£©µÄϵͳ·þÎñÖжϡ£¸Ã¹«Ë¾³ÆÆäÔÚ¼ì²âµ½¿ÉÒɻºó£¬Á¢¼´½ÓÄÉÁËÏìÓ¦´ëÊ©£¬¹Ø±ÕÊÜÓ°ÏìµÄϵͳºó½«¸ÃʼþÍ£Ö¹ÁËÔÚÃÀÖÞ¡£¹«Ë¾·¢ÑÔÈ˳ÆÃ»ÓÐÊý¾Ýй¶ÎÊÌ⣬²¢ÔÊÐí½«¾¡¿ìÐû²¼ÏêϸÐÅÏ¢¡£OlympusÔøÔÚ9ÔÂ8ÈÕÔâµ½ÁËBlackMatterµÄÀÕË÷¹¥»÷£¬ÆäʱµÄ¹¥»÷Ó°ÏìÁËÆäEMEA£¨Å·ÖÞ¡¢Öж«¡¢·ÇÖÞ£©ITϵͳ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/123263/security/olympus-us-cyberattack.html
AdobeÐû²¼Äþ¾²¸üУ¬ÐÞ¸´¶à¿î²úÎïÖеÄ10¸ö©¶´
AdobeÔÚ10ÔÂ13ÈÕÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ÆäAcrobat¡¢Reader¡¢Connect¡¢CommerceºÍCampaign StandardÖеÄ10¸ö©¶´¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÊÇConnectÖеķ´ÐòÁл¯Â©¶´£¬¿Éµ¼ÖÂÈÎÒâ´úÂëÖ´ÐУ¬CVSSÆÀ·ÖΪ9.8¡£´ËÍ⣬»¹ÐÞ¸´ÁËAcrobatºÍReaderÖеĴúÂëÖ´ÐЩ¶´CVE-2021-40728ºÍCVE-2021-40731¡¢ÌáȨ©¶´CVE-2021-40729ºÍCVE-2021-40720£¬ÒÔ¼° Adobe ops-cliÖеķ´ÐòÁл¯Â©¶´CVE-2021-40720µÈ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/123269/security/adobe-critical-flaws.html
Ñо¿ÍŶӷ¢ÏÖFreakoutÕë¶ÔVisual Tools DVRµÄ»î¶¯
Juniper Threat LabsÔÚ10ÔÂ11ÈÕÅû¶Á˽©Ê¬ÍøÂçFreakout£¨ÓÖÃûNecro£©ÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£Ñо¿ÈËÔ±ÔÚ2021Äê9ÔµÄ×îºóÒ»Öܼì²âµ½Á˴˴λ£¬¹¥»÷ÕßÔÚÆäÎäÆ÷¿âÖÐÌí¼ÓÁËÒ»¸öЩ¶´£¬¸Ã©¶´Ö÷ÒªÕë¶ÔVisual Tools DVR VX16 4.2.28.0£¬ÆäPoCÒÑÔÚ7ÔÂ6ÈÕ¹ûÈ»¡£´ËÍ⣬еÄÑù±¾É¾³ýÁË֮ǰµÄ¹¥»÷ÖÐʹÓõÄSMBɨÃ跨ʽ£¬²¢½«½Å±¾×¢ÈëURL´Ó֮ǰµÄÓ²±àÂë¸ü¸ÄΪÁËDGA URL¡£
ÔÎÄÁ´½Ó£º
https://blogs.juniper.net/en-us/threat-research/necro-python-botnet-goes-after-vulnerable-visualtools-dvr
NCC Group·¢ÏÖÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMCµÄ¹¥»÷»î¶¯
10ÔÂ11ÈÕ£¬NCC Group·¢ÏÖÁËÒ»¸ö½öÇÔÈ¡Êý¾Ý¶ø²»¼ÓÃÜÎļþµÄÐÂÀÕË÷ÔËÓªÍÅ»ïSnapMC¡£Ñо¿ÈËÔ±ÌåÏÖSnapMCÕâ¸öÃû×ÖÀ´Ô´ÓÚ¹¥»÷Õß¿ìËٵĹ¥»÷·½Ê½£¬Ëü¿ÉÒÔÔÚ30·ÖÖÓÄÚÈëÇÖÍøÂç¡¢ÇÔÈ¡Îļþ²¢·¢ËÍÀÕË÷Óʼþ¡£SnapMCʹÓ鶴ɨÃèÆ÷AcunetixÀ´ËÑË÷Ä¿±êVPNºÍWebÖеÄ©¶´£¬°üÂÞPrintNightmare©¶´¡¢ASPX.NETµÄTelerik UIÖеÄÔ¶³Ì´úÂë©¶´ÒÔ¼°ÖÖÖÖSQL×¢Èë©¶´µÈ¡£¿¼Âǵ½SnapMCÀûÓõľùÊÇÒÑÐÞ¸´µÄ©¶´£¬Ñо¿ÈËÔ±½¨ÒéÓû§¼°Ê±°²×°²¹¶¡¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/snapmc-hackers-skip-file-encryption-and-just-steal-your-files/IDCÐû²¼2021ÉϰëÄêÖйúITÄþ¾²·þÎñÊг¡¸ú×Ù³ÂËß
IDCÔÚ10ÔÂ12ÈÕÐû²¼ÁË2021ÉϰëÄêÖйúITÄþ¾²·þÎñÊг¡¸ú×Ù³ÂËß¡£IDC½ç˵µÄÍøÂçÄþ¾²·þÎñÊг¡·Ö±ðÓÉÄþ¾²×Éѯ·þÎñ¡¢ITÄþ¾²½ÌÓýÓëÅàѵ·þÎñ¡¢ÍйÜÄþ¾²·þÎñºÍÄþ¾²¼¯³É·þÎñËĸö×ÓÊг¡×é³É¡£³ÂËßÏÔʾ£¬2021ÉϰëÄêÖйúITÄþ¾²·þÎñÊг¡³§ÉÌÕûÌåÊÕÈëԼΪ11.1ÒÚÃÀÔª£¨Ô¼ºÏ71.5ÒÚÔªÈËÃñ±Ò£©£¬³§ÉÌÊÕÈë¹æÄ£½ÏÈ¥ÄêͬÆÚʵÏÖ·±¶Ôö³¤£¬ÕÇ·ù¸ß´ï110%£¬½Ï2019Äêͬ±ÈÔö³¤38%£¬ÖйúITÄþ¾²·þÎñÊг¡Õýʽ½øÈëÐèÇóÈ«Ãæ·¢×÷ÆÚ¡£
ÔÎÄÁ´½Ó£º
https://www.idc.com/getdoc.prCHE48302321