Ô¶³Ì×ÀÃæµÄUSBÇý¶¯±£´æÎó²î£¬£¬£¬ £¬£¬£¬£¬¿É¾ÙÐÐÌáȨ£»£»£»£»Plex Media Server±£´æ3¸öÎó²î£¬£¬£¬ £¬£¬£¬£¬Á¬ÏµÊ¹ÓÿɽÓÊÜϵͳ

Ðû²¼Ê±¼ä 2020-06-19

1.Ô¶³Ì×ÀÃæµÄUSBÇý¶¯±£´æÎó²î£¬£¬£¬ £¬£¬£¬£¬¿ÉʹÓôËÎó²î¾ÙÐÐÌáȨ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ÍøÂçÇå¾²¹«Ë¾SentinelOne·¢Ã÷Ô¶³Ì×ÀÃæµÄUSBÇý¶¯±£´æÎó²î£¬£¬£¬ £¬£¬£¬£¬ºÚ¿Í¿ÉÒÔʹÓôËÎó²î¾ÙÐÐÌáȨ ¡£¡£ ¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-9332£¬£¬£¬ £¬£¬£¬£¬Î»ÓÚFabulaTech¿ª·¢µÄ¡°ÓÃÓÚÔ¶³Ì×ÀÃæµÄUSB¡±µÄÇý¶¯³ÌÐòÖУ¬£¬£¬ £¬£¬£¬£¬Æä¿Í»§°üÀ¨Google¡¢Î¢Èí¡¢ÍòÊ´│¡¢ÃÀ¹úÓ¾Ö¡¢Â·Í¸Éç¡¢Ó¢ÌØ¶ûµÈ¹«Ë¾ ¡£¡£ ¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬ £¬£¬£¬£¬FabulaTechµÄÇý¶¯³ÌÐòŲÓÃÁËIoCreateDevice£¬£¬£¬ £¬£¬£¬£¬¸Ã³ÌÐò²»»áͨ¹ýÇå¾²¼ì²éÀ´×èÖ¹µÍȨÏÞµÄʵÌåµÄ»á¼û£¬£¬£¬ £¬£¬£¬£¬ÕâÔÊÐí·ÇÌØÈ¨Óû§Ìí¼Ó²¢¿ØÖÆOSÐÅÈεÄÈí¼þ×°±¸ ¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬£¬£¬¸ÃÎó²îÉÐδ±»ÐÞ¸´ ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/bug-in-usb-for-remote-desktop-lets-hackers-add-fake-devices/


2.Plex Media Server±£´æ3¸öÎó²î£¬£¬£¬ £¬£¬£¬£¬Á¬ÏµÊ¹ÓÿɽÓÊÜϵͳ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


TenableµÄÇå¾²Ñо¿Ô±Chris Lyne·¢Ã÷ÁËPlex Media Server±£´æ3¸öÑÏÖØµÄÎó²î£¬£¬£¬ £¬£¬£¬£¬ºÚ¿ÍÁ¬ÏµÊ¹ÓÃÕâЩÎó²î¿ÉÒÔÍêÈ«½ÓÊÜÕû¸öϵͳ ¡£¡£ ¡£¡£Õâ3¸öÎó²î»®·Ö±»¸ú×ÙΪCVE-2020-5740¡¢CVE-2020-5741ºÍCVE-2020-5742 ¡£¡£ ¡£¡£¹¥»÷ÕßÈôÊÇͬʱʹÓÃÕâ3¸öÎó²î£¬£¬£¬ £¬£¬£¬£¬Ôò¿ÉÏñSYSTEMÒ»ÑùÔ¶³ÌÖ´ÐдúÂë¡¢ÍêÈ«½ÓÊܲÙ×÷ϵͳ¡¢»ñµÃ¶ÔËùÓÐÎļþµÄ»á¼ûȨ¡¢°²ÅźóÃÅ»òºáÏòÒÆ¶¯µ½Í³Ò»ÍøÂçÉÏµÄÆäËû×°±¸ÖÐ ¡£¡£ ¡£¡£ÏÖÔÚÕâ3¸öÎó²î¾ùÒѱ»ÐÞ¸´ ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.itsecurityguru.org/2020/06/17/vulnerabilities-in-plex-that-could-enable-full-system-takeover-has-now-been-patched/


3.ºÚ¿ÍÕýÔÚ³öÊÛÊý¾Ý¿â£¬£¬£¬ £¬£¬£¬£¬Éæ¼°11.5Íò¶íÂÞ˹¹«ÃñÐÅÏ¢


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


DeviceLockÊÖÒÕ×ܼàAshot HovhannisyanÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬ºÚ¿ÍÕýÔÚÒÔ66.6±ÈÌØ±Ò£¨Ô¼ºÏ62.7ÍòÃÀÔª£©µÄ¼ÛÇ®³öÊÛ11.5Íò¶íÂÞ˹¹«ÃñµÄÐÅÏ¢ ¡£¡£ ¡£¡£¸ÃÊý¾Ý¿â°üÀ¨È«Ãû¡¢³öÉúÈÕÆÚ¡¢»¤ÕÕÊý¾Ý¡¢µØµã£¬£¬£¬ £¬£¬£¬£¬µç»°ºÅÂë¡¢µç×ÓÓʼþ¡¢¶íÂÞ˹ÊÕÖ§¾³ÈÕÆÚ¡¢¹«¹²Ð§ÀÍÃÅ»§ÍøÕ¾ÉϵÄÓ¦ÓóÌÐò¡¢ÒÔ¼°ÒøÐп¨ºÍÕÊ»§Êý¾Ý¡¢»¤ÕÕÊý¾ÝºÍËùÔÚ¹ú¼Ò/µØÇøµÈÐÅÏ¢ ¡£¡£ ¡£¡£Ç徲ר¼ÒÌåÏÖ£¬£¬£¬ £¬£¬£¬£¬ÓÉÓÚÏÖÔÚÖ»ÓÐ34ÌõÊý¾ÝµÄ½ØÍ¼£¬£¬£¬ £¬£¬£¬£¬ÒÔÊÇÉÐÎÞ·¨È·¶¨ÕâЩÊý¾ÝµÄÕæÊµÐÔ ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/06/devicelock-data-from-115-thousand.html


4.ºÚ¿ÍÐ®ÖÆÁËÅ£½ò´óѧÓʼþϵͳ¾ÙÐÐOffice 365ÍøÂç´¹ÂÚ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Check PointÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ £¬£¬£¬£¬ºÚ¿ÍÐ®ÖÆÁËÅ£½ò´óѧµÄµç×ÓÓʼþϵͳÀ´¾ÙÐÐÍøÂç´¹Âڻ£¬£¬£¬ £¬£¬£¬£¬Ö¼ÔÚÇÔȡŷÖÞ¡¢ÑÇÖÞºÍÖж«Óû§µÄMicrosoft Office 365µÇ¼ƾ֤ ¡£¡£ ¡£¡£ºÚ¿Í·¢ËÍαÔìµÄÓïÒôÓʼþÌáÐÑÉù³ÆÊܺ¦ÕßµÄÓïÒôÓÊÏäÖÐÓÐÒ»ÌõÓïÒôÐÅÏ¢£¬£¬£¬ £¬£¬£¬£¬²¢ÓÕʹÆä·­¿ªÓʼþÖеĶñÒâÁ´½Ó£¬£¬£¬ £¬£¬£¬£¬Ö®ºóÓû§»á±»Öض¨Ïòµ½´¹ÂÚÒ³Ãæ ¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬´ó²¿·ÖµÄ´¹ÂÚÓʼþÀ´×ÔÅ£½ò´óѧ²î±ð²¿·ÖµÄÕýµ±×ÓÓò£¬£¬£¬ £¬£¬£¬£¬²¢ÇÒºÚ¿Í»¹Ê¹ÓÃÁËAdobeЧÀÍÆ÷ÉÏÍйܵÄÓò£¬£¬£¬ £¬£¬£¬£¬ÒÔÌӱܴ¹ÂÚÓʼþ¼ì²âϵͳ ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hijacked-oxford-server-used-by-hackers-for-office-365-phishing/


5.ºÚ¿Íð³äÁìÓ¢ÕÐÆ¸Ö°Ô±£¬£¬£¬ £¬£¬£¬£¬Õë¶ÔÅ·ÖÞºÍÖж«¾üʺͺ½¿Õ×éÖ¯


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾



ÍøÂçÇå¾²¹«Ë¾ESETµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÐÂÐ͵ĸ߶ÈÖØ´óµÄÌØ¹¤»î¶¯£¬£¬£¬ £¬£¬£¬£¬ºÚ¿Íð³äÁìÓ¢ÕÐÆ¸Ö°Ô±Õë¶ÔÅ·ÖÞºÍÖж«¾üʺͺ½¿Õº½Ìì×éÖ¯£¬£¬£¬ £¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÎļþ ¡£¡£ ¡£¡£´Ë´Î»î¶¯ÖУ¬£¬£¬ £¬£¬£¬£¬ºÚ¿Íð³äCollins AerospaceºÍGeneral DynamicsµÄÕÐÆ¸Ö°Ô±£¬£¬£¬ £¬£¬£¬£¬Ïòº½¿Õº½ÌìºÍ¹ú·À¹«Ë¾Ïà¹ØµÄÔ±¹¤·¢ËÍÐÂÎźÍαװ³Éн×ÊÐÅÏ¢µÄ¶ñÒâÎļþ ¡£¡£ ¡£¡£Êܺ¦ÕßÏÂÔØ¸Ã¶ñÒâÎļþºó£¬£¬£¬ £¬£¬£¬£¬ºÚ¿Í»áʵÑéʹÓÃÆäÈëÇÖÍøÂ磬£¬£¬ £¬£¬£¬£¬Àֳɺó±ã»áÌᳫ±©Á¦¹¥»÷£¬£¬£¬ £¬£¬£¬£¬ÒÔÇÔÈ¡ÖÎÀíÕÊ»§µÄµÇ¼ƾ֤ ¡£¡£ ¡£¡£¿ £¿£¿£Ë¼Á¿µ½Ä¿µÄ¹«Ë¾µÄÀàÐÍ£¬£¬£¬ £¬£¬£¬£¬ESETÒÔΪ¹¥»÷ÕßµÄÄ¿µÄ¿ÉÄÜÊÇÃô¸ÐµÄÓªÒµºÍÊÖÒÕÐÅÏ¢ ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/hackers-linkedin-recruiters-scam-military-aerospace-firms/


6.InvisiMoleÕýÔڲ߻®Õë¶Ô¶«Å·¾üʺÍÍâ½»×éÖ¯µÄÌØ¹¤»î¶¯


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ÍøÂçÇå¾²¹«Ë¾ESETÅû¶ÁËÌØ¹¤×éÖ¯InvisiMoleµÄ×÷°¸ÊÖ·¨£¬£¬£¬ £¬£¬£¬£¬ÆäÕýÔÚ¶Ô¶«Å·±¸ÊÜÖõÄ¿µÄ¾üʺÍÍâ½»×éÖ¯Ìá³«ÌØ¹¤»î¶¯£¬£¬£¬ £¬£¬£¬£¬»¹·¢Ã÷Á˸Ã×éÖ¯ÓÃÓÚ½»¸¶¡¢ºáÏòÒÆ¶¯ºÍÖ´ÐÐInvisiMoleºóÃŵŤ¾ß¼¯ ¡£¡£ ¡£¡£Ñо¿·¢Ã÷£¬£¬£¬ £¬£¬£¬£¬ÏÖÔÚInvisiMoleÕýÔÚÓëºÚ¿Í×éÖ¯GamaredonÏàÖú£¬£¬£¬ £¬£¬£¬£¬ºóÕßÒ»Ö±»îÔ¾ÓÚÕë¶ÔÎÚ¿ËÀ¼ºÍ¶íÂÞ˹µÄÍøÂçÌØ¹¤»î¶¯ÖÐ ¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬£¬InvisiMole¶ÔÆäÓÐÓøºÔØRC2CLºÍRC2FM¾ÙÐÐÁËÉý¼¶£¬£¬£¬ £¬£¬£¬£¬Ê¹Æä¾ßÓвî±ðµÄÌÓ±Üɱ¶¾Èí¼þ¼ì²âµÄÒªÁì ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2020/06/invisimole-hackers.html