ÃÀ¹ú´ó¹æÄ£DDoS¹¥»÷ʵΪT-MobileÉèÖùýʧµ¼Ö£»£» £» £»£»£»TCP/IPÈí¼þ¿âÖÐÎó²îRipple20Ó°ÏìÊýÊ®ÒÚIoT×°±¸

Ðû²¼Ê±¼ä 2020-06-18

1.ÃÀ¹ú´ó¹æÄ£DDoS¹¥»÷ʵΪT-MobileÉèÖùýʧµ¼ÖÂ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ǰ¼¸ÌìÔÚTwitterÉÏÈö²¥ÓÐÃÀ¹úÕýÔâÊÜ´ó¹æÄ£µÄDDoS¹¥»÷µÄÒ¥ÑÔ£¬£¬£¬£¬£¬£¬£¬ÏÖʵÊÇÓÉÓÚÉèÖùýʧµ¼ÖµÄT-MobileÖÐÖ¹¡£¡£ ¡£CloudflareµÄCEO Matthew PrinceÍÆÎÄÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚT-Mobile¶ÔÆäÍøÂçÉèÖþÙÐÐÁËһЩ¸ü¸Ä£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÁËÔÚ6¸öСʱÖзºÆðÁËһϵÁеÄÍøÂç¹ÊÕÏ£¬£¬£¬£¬£¬£¬£¬Ëû»¹Ðû²¼ ÁËCloudflareͳ¼ÆµÄÏêϸÐÅϢͼÒÔÐðÊö´ËÊÂÎñ¡£¡£ ¡£T-MobileÊÖÒÕ×ܲÃNeville RayÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÕýÔÚÆð¾¢½â¾ö¸ÃÎÊÌâ¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÓïÒôºÍÎı¾´«ÊäÎÊÌâÒѾ­½â¾ö¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/t-mobile-outage-caused-by-configuration-error-not-a-ddos-attack/


2.TCP/IPÈí¼þ¿âÖÐÐÂÎó²îRipple20£¬£¬£¬£¬£¬£¬£¬»ò½«Ó°ÏìÊýÊ®ÒÚÍøÂç×°±¸


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ÃÀ¹úÁìÍÁÇå¾²²¿ºÍCISA ICS-CERTÓÚ6ÔÂ16ÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬ÔÚTCP/IPÈí¼þ¿âÖеÄÐÂÎó²îRipple20£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜ»áÓ°ÏìÀ´×ÔÌìϸ÷µØµÄ500¶àÃû¹©Ó¦ÉÌÉú²úµÄÊýÊ®ÒÚ£¨ÉõÖÁ¸ü¶à£©IoT×°±¸¡£¡£ ¡£¸ÃÎó²îÊÇÒÔÉ«ÁÐÍøÂçÇå¾²¹«Ë¾JSOFµÄÑо¿Ö°Ô±·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬£¬Î»ÓÚTreck£¬£¬£¬£¬£¬£¬£¬Inc.¿ª·¢µÄTCP/IPÈí¼þ¿âÖУ¬£¬£¬£¬£¬£¬£¬¹²ÓÐ19¸ö0dayÎó²î£¬£¬£¬£¬£¬£¬£¬±»Í³³ÆÎª¡°Ripple20¡±¡£¡£ ¡£Õâ19¸öÎó²î¶¼ÊÇÄÚ´æËð»µÎÊÌ⣬£¬£¬£¬£¬£¬£¬Ô´ÓÚʹÓòî±ðЭÒ飨°üÀ¨IPv4£¬£¬£¬£¬£¬£¬£¬ICMPv4£¬£¬£¬£¬£¬£¬£¬IPv6£¬£¬£¬£¬£¬£¬£¬IPv6OverIPv4£¬£¬£¬£¬£¬£¬£¬TCP£¬£¬£¬£¬£¬£¬£¬UDP£¬£¬£¬£¬£¬£¬£¬ARP£¬£¬£¬£¬£¬£¬£¬DHCP£¬£¬£¬£¬£¬£¬£¬DNS»òÒÔÌ«ÍøÁ´Â·²ã£©ÔÚÍøÂçÉÏ·¢Ë͵ÄÊý¾Ý°üµÄ´¦Öóͷ£¹ýʧ¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2020/06/new-critical-flaws-put-billions-of.html


3.ºÚ¿ÍʹÓÃAppleÖÐDLLÐ®ÖÆÎó²î·Ö·¢¶ñÒâÍÚ¿óÈí¼þ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ÍøÂçÇå¾²¹«Ë¾Morphisec·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃAppleÍÆËÍЧÀÍÖеÄDLLÐ®ÖÆÎó²î·Ö·¢¶ñÒâÍÚ¿óÈí¼þ¡£¡£ ¡£Æ»¹ûÔÚÖ´ÐÐÍÆËÍ֪ͨЧÀÍ¿ÉÖ´ÐÐÎļþ(APSDaemon.exe)ʱ»á¼ÓÔØapplevertion.DLL£¬£¬£¬£¬£¬£¬£¬ÓÉÓڸÿÉÖ´ÐÐÎļþ²»¼ì²éÕýÔÚ¼ÓÔØµÄÊÇ·ñΪÕýµ±µÄappleverations .dll£¬£¬£¬£¬£¬£¬£¬ÕâʹµÃºÚ¿Í¿ÉÒÔ½«ËûÌæ»»³É¶ñÒâµÄDLLÎļþ¡£¡£ ¡£MorphisecÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÔÚ´ËÂÖ¹¥»÷ÖкڿÍʹÓÃÁËڲƭÐÔÈí¼þ°üÀ´Ê¹ÓÃÆ»¹ûµÄAPSDaemon.exe¡¢AnyToIsoºÍCrystalBitÈí¼þÖеÄDLLÐ®ÖÆÎó²îÀ´×°ÖÃÍÚ¿óÈí¼þ¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/coinminer-exploits-apple-apsdaemon-vulnerability-to-evade-detection/


4.GraphikaÐû²¼±¨¸æ½ÒÆÆ¶íSecondary Infektion 6ÄêÀ´¹¥»÷»î¶¯


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ð¡×éGraphikaÐû²¼ÁËÒ»·Ý³¤´ï120Ò³µÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬½ÒÆÆÁ˶íÂÞ˹ºÚ¿Í×éÖ¯Secondary Infektion 6ÄêÀ´µÄ¹¥»÷»î¶¯¡£¡£ ¡£GraphikaÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯×Ô2014Ä꽨ÉèÒÔÀ´£¬£¬£¬£¬£¬£¬£¬Ò»Ö±ÒÀÀµÈö²¥ÐéαÐÂÎÅ¡¢×ß©ÊÂÎñºÍαÔìÎļþÔÚÅ·Ö޺ͱ±ÃÀ¹ú¼ÒÒý·¢ÕþÖγóÎÅ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÏÖÒÑ×·×ÙÁËSecondary InfektionÔÚÍøÉÏÐû²¼µÄ2500¶àÖÖÄÚÈÝ¡£¡£ ¡£ÓÉÓڸúڿÍ×éÖ¯µÄÉí·ÝÒÀȻδ֪£¬£¬£¬£¬£¬£¬£¬ÒÔÊÇGraphikaÔ¤¼ÆËü»á¼ÌÐø»îÔ¾ÏÂÈ¥¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/super-secretive-russian-disinfo-operation-discovered-dating-back-to-2014/


5.AdobeÐû²¼´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеĴúÂëÖ´ÐÐÎó²î


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


AdobeÐû²¼ÁË´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËWindowsºÍmacOS°æ±¾µÄAdobe After Effects¡¢Illustrator¡¢Premiere Pro¡¢remiere RushºÍAuditionÖеÄ18¸öí§Òâ´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²î¶¼ÊÇÓɶÁдÁè¼Ý¹æÄ£¡¢¶ÑÒç³öºÍÄÚ´æË𻵹ýʧÒýÆðµÄ¡£¡£ ¡£Adobe½¨ÒéÓû§Ê¹ÓÃCreative Cloud½«Ó¦ÓóÌÐò¸üе½×îа汾¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-flaws-in-illustrator-after-effects-more/


6.˼¿ÆÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Webex MeetingsÁ½¸ö´úÂëÖ´ÐÐÎó²î


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


˼¿ÆÓÚ6ÔÂ17ÈÕÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËWindowsºÍmacOS°æ±¾µÄCisco Webex MeetingsÖÐÁ½¸öÑÏÖØµÄÎó²î£¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²îÔÊÐíûÓÐȨÏ޵Ĺ¥»÷ÕßÖ´ÐгÌÐòºÍ´úÂë¡£¡£ ¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬Windows¿Í»§¶ËµÄÎó²î±»¸ú×ÙΪCVE-2020-3263£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ýÓÕʹÊܺ¦Õß·­¿ª¶ñÒâURLÀ´Ê¹ÓôËÎó²î£¬£¬£¬£¬£¬£¬£¬ÒÔÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£macOS¿Í»§¶ËÖеÄÎó²î±»¸ú×ÙΪCVE-2020-3342£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²î¾ùÒѱ»ÐÞ¸´£¬£¬£¬£¬£¬£¬£¬ÉÐûÓз¢Ã÷±»Ê¹ÓõÄÇéÐΡ£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cisco-fixes-severe-flaws-in-webex-meetings-for-windows-macos/