Pulse SecureÐû²¼ÆóÒµÍÆ½øÁãÐÅÈÎÍøÂçµÄÆÊÎö±¨¸æ£»£»£»£»OracleÐû²¼²¹¶¡ÒÔÐÞ¸´WebLogic ServerÖеÄRCEÎó²î

Ðû²¼Ê±¼ä 2020-11-03
1.Pulse SecureÐû²¼ÆóÒµÍÆ½øÁãÐÅÈÎÍøÂçµÄÆÊÎö±¨¸æ


1.jpg


Pulse SecureÐû²¼ÁËÓÐ¹ØÆóÒµÍÆ½øÁãÐÅÈÎÍøÂçµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ÄÇÐ©ÍÆ¶¯ºÍÍýÏëÁãÐÅÈÎÁ÷³ÌºÍÊÖÒÕʵÑ鯫ÏòµÄ×éÖ¯£¬£¬£¬½«×ßÔÚÊý×ÖתÐÍÇúÏßµÄÇ°Ãæ¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬ÁãÐÅÈÎÏîÄ¿ÍùÍùÊÇ¿çѧ¿ÆµÄ£¬£¬£¬ËѼ¯ÁËÇå¾²ºÍÍøÂçÍŶӡ£¡£¡£¡£ËûÃÇͨ³£Ê¹ÓÃÈýÖÖЭ×÷·½·¨£¬£¬£¬»®·ÖÊÇЭµ÷²î±ðϵͳ֮¼äµÄ»á¼ûÇå¾²¿ØÖÆ(48%)¡¢ÆÀ¹À»á¼ûÇå¾²¿ØÖÆÐèÇó(41%)ºÍƾ֤Óû§¡¢½ÇÉ«¡¢Êý¾ÝºÍÓ¦ÓóÌÐò½ç˵»á¼ûÐèÇó(40%)¡£¡£¡£¡£ÆóÒµÖÎÀíЭ»á¸±×ÜShamus McGillicuddyÌåÏÖ£¬£¬£¬ÆóÒµÏÔÈ»ÕýÔÚ¼ÓËÙ½ÓÄÉÁãÐÅÈÎÍøÂçµÄ³ÌÐò¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.pulsesecure.net/resource/pulse-zero-trust-access-defense-in-depth/


2.OracleÐû²¼²¹¶¡ÒÔÐÞ¸´WebLogic ServerÖеÄRCEÎó²î


2.jpg


OracleÔÚÖÜÄ©Ðû²¼ÁË´øÍâÇå¾²¸üУ¬£¬£¬ÒÔÐÞ¸´Ó°ÏìOracle WebLogic Server¶à¸ö°æ±¾µÄÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-14750£¬£¬£¬ÑÏÖØ¶È»ù´¡ÆÀ·ÖΪ9.8¡£¡£¡£¡£Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔͨ¹ýHTTPÔ¶³ÌÔÚЧÀÍÆ÷¿ØÖÆÌ¨×é¼þÖÐʹÓøÃÎó²î£¬£¬£¬²¢ÎÞÐèÓëÓû§½»»¥¡£¡£¡£¡£ÕâÊǵÍÖØÆ¯ºó¹¥»÷µÄÒ»²¿·Ö£¬£¬£¬ÓпÉÄܵ¼ÖÂÄ¿µÄЧÀÍÆ÷½ÓÊÜ¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËOracle WebLogic ServerµÄ°æ±¾10.3.6.0.0¡¢12.1.3.0.0¡¢12.2.1.3.0¡¢12.2.1.4.0ºÍ14.1.1.0.0¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/oracle-issues-emergency-patch-for-critical-weblogic-server-flaw/


3.ÃÀ¹úCISAºÍFBIÅû¶¶íÂÞ˹ºÚ¿ÍÕýÔÚʹÓõÄ8¸ö¹¤¾ß


3.jpg


ÃÀ¹úÍøÂç˾ÁÓëCISAºÍFBIÅû¶Á˶íÂÞ˹ºÚ¿ÍÕýÔÚʹÓõÄ8ÖÖеĶñÒâÈí¼þÑù±¾¡£¡£¡£¡£ÆäÖÐÓÐ6¸öÓÃÓÚComRAT¶ñÒâÈí¼þ£¬£¬£¬ÓÉTurlaʹÓ㬣¬£¬ÁíÍâ2¸öÓÃÓÚÊÇZebrocy¶ñÒâÈí¼þ£¬£¬£¬ÓÉAPT28ʹÓᣡ£¡£¡£TurlaºÍAPT28Ò»Ö±ÔÚÒ»Ö±¸üÐÂÕâЩ¹¤¾ß£¬£¬£¬ÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£ÕýÈçÍøÂçÇå¾²¹«Ë¾ESETËù³Æ£¬£¬£¬´Ë´ÎÁªºÏ¾¯±¨±ê¼Ç×ÅComRATºÍZebrocyÊ×´ÎÕýʽÓë¶íÂÞ˹Õþ¸®µÄÍøÂçÌØ¹¤²¿·Ö½¨ÉèÁªÏµ¡£¡£¡£¡£ÔÚÒÑÍù£¬£¬£¬ComRATÔø±»±»ÓÃÓÚ¹¥»÷Íâ½»ÊÂÎñºÍ¹úÃñÒé»á£¬£¬£¬¶øZebrocyÔø±»ÓÃÓÚ¹¥»÷´óʹ¹ÝºÍÍâ½»²¿¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/us-cyber-command-exposes-new-russian-malware/


4.ÈÕ±¾ºËî¿Ïµ¾Ö£¨NRA£©Ôâµ½¹¥»÷£¬£¬£¬µç×ÓÓʼþϵͳÖÐÖ¹


4.jpg


ÈÕ±¾ºËî¿Ïµ¾Ö£¨NRA£©³ÆÆäÔâµ½¹¥»÷£¬£¬£¬µç×ÓÓʼþϵͳÔÝʱÖÐÖ¹¡£¡£¡£¡£NRAÔÚÆä¹ÙÍøÌåÏÖ£¬£¬£¬10ÔÂ27ÈÕ17:00ÆðÆäµç×ÓÓʼþÊÕ·¢ÒÑÔÝʱÖÐÖ¹¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬Õþ¸®ÒѶԸÃÊÂÎñ¾ÙÐÐÁËÊӲ죬£¬£¬¾ÝýÌ屨µÀ£¬£¬£¬Õâ¶ÔÈÕ±¾ºËµçÕ¾µÄÔËӪûÓÐÓ°Ïì¡£¡£¡£¡£±ðµÄ£¬£¬£¬¸ÔÌ︱¹úÎñÇäÔÚ26ÈÕµÄÐÂÎÅÐû²¼»áÉϳƣ¬£¬£¬ÓÐδ¾­ÊÚȨµÄºÚ¿Í½øÈëÁ˺Ëî¿Ïµ¾ÖµÄÍøÂçϵͳ£¬£¬£¬»ò½«µ¼ÖÂÐÅÏ¢×ß©¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/110284/hacking/nuclear-regulation-authority-cyber-attack.html


5.ºÚ¿ÍʹÓÃBEC¹¥»÷´ÓÍþ˹¿µÐÇÖݹ²ºÍµ³ÍµÈ¡230ÍòÃÀÔª


5.png


Íþ˹¿µÐÇÖݹ²ºÍµ³£¨WisGOP£©³ÆÆäÔâµ½ÆóÒµµç×ÓÓʼþÍ×Э£¨BEC£©¹¥»÷£¬£¬£¬ºÚ¿ÍÔÚÖ§³ÖÌØÀÊÆÕÁ¬ÈεľºÑ¡»î¶¯µÄÕÊ»§ÖÐ͵×ßÁËÔ¼230ÍòÃÀÔª¡£¡£¡£¡£¾Ý¸Ãµ³Ö÷ϯAndrew Hitt½ÒÏþµÄÉùÃ÷£¬£¬£¬ÆäÓÚ10ÔÂ22ÈÕ×¢ÖØµ½ÕâÒ»»î¶¯£¬£¬£¬ÍøÂç×ﷸʹÓÃÁËÖØ´óµÄ´¹ÂÚ¹¥»÷£¬£¬£¬Î±ÔìÁË·¢Æ±£¬£¬£¬²¢ÒÔWisGOPÕæÕýµÄ¹©Ó¦É̵ÄÃûÒå·¢Ë͸ø¸Ã×éÖ¯¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬WisGOPÒѽ«´ËÊÂ֪ͨÁËFBI£¬£¬£¬ÊÂÎñÔµ¹ÊÔ­ÓÉ»¹ÔÚÊÓ²ìÖС£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/scammers-stole-from-republican-party-wisconsin/


6.JM BullionÔâµ½¹¥»÷µ¼ÖÂÆä¿Í»§ÐÅÓÿ¨ÐÅϢй¶


6.png


¹ó½ðÊôÔÚÏßÁãÊÛÉÌJM Bullion³ÆÆä¹ÙÍøÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬µ¼ÖÂÆä¿Í»§ÐÅÓÿ¨ÐÅϢй¶¡£¡£¡£¡£JM BullionÊǽð¡¢Òø¡¢Í­¡¢²¬ºÍîÙ²úÆ·£¨°üÀ¨Ó²±ÒºÍ½ðÌõ£©µÄÔÚÏßÁãÊÛÉÌ¡£¡£¡£¡£2020Äê7ÔÂ6ÈÕ£¬£¬£¬JM Bullion·¢Ã÷ÁËÕâÒ»¿ÉÒɻ£¬£¬£¬²¢ÔÚµÚÈý·½µÄЭÖúÏÂÕö¿ªÊӲ졣¡£¡£¡£¾­ÊӲ죬£¬£¬´Ó2020Äê2ÔÂ18ÈÕÖÁ7ÔÂ17ÈÕ£¬£¬£¬¸ÃÍøÕ¾Éϱ£´æ¶ñÒâ´úÂë¿É²¶»ñÓû§ÔÚ¹ºÖÃʱÊäÈëµÄÐÅÏ¢¡£¡£¡£¡£´ËÊÂÎñ¿ÉÄÜй¶Á˿ͻ§µÄÐÕÃû¡¢µØµãºÍÖ§¸¶¿¨ÐÅÏ¢£¬£¬£¬°üÀ¨Õʺš¢ÓÐÓÃÆÚºÍÇå¾²´úÂë¡£¡£¡£¡£¸ÃÉ̳ÇÒÑÓÚ2020Äê7ÔÂ17ÈÕÐÞ¸´¸ÃÎÊÌâ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/gold-seller-jm-bullion-hacked-to-steal-customers-credit-cards/