Pulse SecureÐû²¼ÆóÒµÍÆ½øÁãÐÅÈÎÍøÂçµÄÆÊÎö±¨¸æ£»£»£»£»£»£»£»OracleÐû²¼²¹¶¡ÒÔÐÞ¸´WebLogic ServerÖеÄRCEÎó²î
Ðû²¼Ê±¼ä 2020-11-03
Pulse SecureÐû²¼ÁËÓÐ¹ØÆóÒµÍÆ½øÁãÐÅÈÎÍøÂçµÄÆÊÎö±¨¸æ¡£¡£¡£¡£ÄÇÐ©ÍÆ¶¯ºÍÍýÏëÁãÐÅÈÎÁ÷³ÌºÍÊÖÒÕʵÑ鯫ÏòµÄ×éÖ¯£¬£¬£¬£¬½«×ßÔÚÊý×ÖתÐÍÇúÏßµÄÇ°Ãæ¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬ÁãÐÅÈÎÏîÄ¿ÍùÍùÊÇ¿çѧ¿ÆµÄ£¬£¬£¬£¬ËѼ¯ÁËÇå¾²ºÍÍøÂçÍŶӡ£¡£¡£¡£ËûÃÇͨ³£Ê¹ÓÃÈýÖÖÐ×÷·½·¨£¬£¬£¬£¬»®·ÖÊÇе÷²î±ðϵͳ֮¼äµÄ»á¼ûÇå¾²¿ØÖÆ(48%)¡¢ÆÀ¹À»á¼ûÇå¾²¿ØÖÆÐèÇó(41%)ºÍƾ֤Óû§¡¢½ÇÉ«¡¢Êý¾ÝºÍÓ¦ÓóÌÐò½ç˵»á¼ûÐèÇó(40%)¡£¡£¡£¡£ÆóÒµÖÎÀíлḱ×ÜShamus McGillicuddyÌåÏÖ£¬£¬£¬£¬ÆóÒµÏÔÈ»ÕýÔÚ¼ÓËÙ½ÓÄÉÁãÐÅÈÎÍøÂçµÄ³ÌÐò¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.pulsesecure.net/resource/pulse-zero-trust-access-defense-in-depth/
2.OracleÐû²¼²¹¶¡ÒÔÐÞ¸´WebLogic ServerÖеÄRCEÎó²î

OracleÔÚÖÜÄ©Ðû²¼ÁË´øÍâÇå¾²¸üУ¬£¬£¬£¬ÒÔÐÞ¸´Ó°ÏìOracle WebLogic Server¶à¸ö°æ±¾µÄÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-14750£¬£¬£¬£¬ÑÏÖØ¶È»ù´¡ÆÀ·ÖΪ9.8¡£¡£¡£¡£Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔͨ¹ýHTTPÔ¶³ÌÔÚЧÀÍÆ÷¿ØÖÆÌ¨×é¼þÖÐʹÓøÃÎó²î£¬£¬£¬£¬²¢ÎÞÐèÓëÓû§½»»¥¡£¡£¡£¡£ÕâÊǵÍÖØÆ¯ºó¹¥»÷µÄÒ»²¿·Ö£¬£¬£¬£¬ÓпÉÄܵ¼ÖÂÄ¿µÄЧÀÍÆ÷½ÓÊÜ¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËOracle WebLogic ServerµÄ°æ±¾10.3.6.0.0¡¢12.1.3.0.0¡¢12.2.1.3.0¡¢12.2.1.4.0ºÍ14.1.1.0.0¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/oracle-issues-emergency-patch-for-critical-weblogic-server-flaw/
3.ÃÀ¹úCISAºÍFBIÅû¶¶íÂÞ˹ºÚ¿ÍÕýÔÚʹÓõÄ8¸ö¹¤¾ß

ÃÀ¹úÍøÂç˾ÁÓëCISAºÍFBIÅû¶Á˶íÂÞ˹ºÚ¿ÍÕýÔÚʹÓõÄ8ÖÖеĶñÒâÈí¼þÑù±¾¡£¡£¡£¡£ÆäÖÐÓÐ6¸öÓÃÓÚComRAT¶ñÒâÈí¼þ£¬£¬£¬£¬ÓÉTurlaʹÓ㬣¬£¬£¬ÁíÍâ2¸öÓÃÓÚÊÇZebrocy¶ñÒâÈí¼þ£¬£¬£¬£¬ÓÉAPT28ʹÓᣡ£¡£¡£TurlaºÍAPT28Ò»Ö±ÔÚÒ»Ö±¸üÐÂÕâЩ¹¤¾ß£¬£¬£¬£¬ÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£ÕýÈçÍøÂçÇå¾²¹«Ë¾ESETËù³Æ£¬£¬£¬£¬´Ë´ÎÁªºÏ¾¯±¨±ê¼Ç×ÅComRATºÍZebrocyÊ×´ÎÕýʽÓë¶íÂÞ˹Õþ¸®µÄÍøÂçÌØ¹¤²¿·Ö½¨ÉèÁªÏµ¡£¡£¡£¡£ÔÚÒÑÍù£¬£¬£¬£¬ComRATÔø±»±»ÓÃÓÚ¹¥»÷Íâ½»ÊÂÎñºÍ¹úÃñÒé»á£¬£¬£¬£¬¶øZebrocyÔø±»ÓÃÓÚ¹¥»÷´óʹ¹ÝºÍÍâ½»²¿¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-cyber-command-exposes-new-russian-malware/
4.ÈÕ±¾ºËî¿Ïµ¾Ö£¨NRA£©Ôâµ½¹¥»÷£¬£¬£¬£¬µç×ÓÓʼþϵͳÖÐÖ¹

ÈÕ±¾ºËî¿Ïµ¾Ö£¨NRA£©³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬µç×ÓÓʼþϵͳÔÝʱÖÐÖ¹¡£¡£¡£¡£NRAÔÚÆä¹ÙÍøÌåÏÖ£¬£¬£¬£¬10ÔÂ27ÈÕ17:00ÆðÆäµç×ÓÓʼþÊÕ·¢ÒÑÔÝʱÖÐÖ¹¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬Õþ¸®ÒѶԸÃÊÂÎñ¾ÙÐÐÁËÊӲ죬£¬£¬£¬¾ÝýÌ屨µÀ£¬£¬£¬£¬Õâ¶ÔÈÕ±¾ºËµçÕ¾µÄÔËӪûÓÐÓ°Ïì¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¸ÔÌ︱¹úÎñÇäÔÚ26ÈÕµÄÐÂÎÅÐû²¼»áÉϳƣ¬£¬£¬£¬ÓÐδ¾ÊÚȨµÄºÚ¿Í½øÈëÁ˺Ëî¿Ïµ¾ÖµÄÍøÂçϵͳ£¬£¬£¬£¬»ò½«µ¼ÖÂÐÅÏ¢×ß©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110284/hacking/nuclear-regulation-authority-cyber-attack.html
5.ºÚ¿ÍʹÓÃBEC¹¥»÷´ÓÍþ˹¿µÐÇÖݹ²ºÍµ³ÍµÈ¡230ÍòÃÀÔª

Íþ˹¿µÐÇÖݹ²ºÍµ³£¨WisGOP£©³ÆÆäÔâµ½ÆóÒµµç×ÓÓʼþÍ×У¨BEC£©¹¥»÷£¬£¬£¬£¬ºÚ¿ÍÔÚÖ§³ÖÌØÀÊÆÕÁ¬ÈεľºÑ¡»î¶¯µÄÕÊ»§ÖÐ͵×ßÁËÔ¼230ÍòÃÀÔª¡£¡£¡£¡£¾Ý¸Ãµ³Ö÷ϯAndrew Hitt½ÒÏþµÄÉùÃ÷£¬£¬£¬£¬ÆäÓÚ10ÔÂ22ÈÕ×¢ÖØµ½ÕâÒ»»î¶¯£¬£¬£¬£¬ÍøÂç×ﷸʹÓÃÁËÖØ´óµÄ´¹ÂÚ¹¥»÷£¬£¬£¬£¬Î±ÔìÁË·¢Æ±£¬£¬£¬£¬²¢ÒÔWisGOPÕæÕýµÄ¹©Ó¦É̵ÄÃûÒå·¢Ë͸ø¸Ã×éÖ¯¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬WisGOPÒѽ«´ËÊÂ֪ͨÁËFBI£¬£¬£¬£¬ÊÂÎñÔµ¹ÊÔÓÉ»¹ÔÚÊÓ²ìÖС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/scammers-stole-from-republican-party-wisconsin/
6.JM BullionÔâµ½¹¥»÷µ¼ÖÂÆä¿Í»§ÐÅÓÿ¨ÐÅϢй¶

¹ó½ðÊôÔÚÏßÁãÊÛÉÌJM Bullion³ÆÆä¹ÙÍøÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬µ¼ÖÂÆä¿Í»§ÐÅÓÿ¨ÐÅϢй¶¡£¡£¡£¡£JM BullionÊǽð¡¢Òø¡¢Í¡¢²¬ºÍîÙ²úÆ·£¨°üÀ¨Ó²±ÒºÍ½ðÌõ£©µÄÔÚÏßÁãÊÛÉÌ¡£¡£¡£¡£2020Äê7ÔÂ6ÈÕ£¬£¬£¬£¬JM Bullion·¢Ã÷ÁËÕâÒ»¿ÉÒɻ£¬£¬£¬£¬²¢ÔÚµÚÈý·½µÄÐÖúÏÂÕö¿ªÊӲ졣¡£¡£¡£¾ÊӲ죬£¬£¬£¬´Ó2020Äê2ÔÂ18ÈÕÖÁ7ÔÂ17ÈÕ£¬£¬£¬£¬¸ÃÍøÕ¾Éϱ£´æ¶ñÒâ´úÂë¿É²¶»ñÓû§ÔÚ¹ºÖÃʱÊäÈëµÄÐÅÏ¢¡£¡£¡£¡£´ËÊÂÎñ¿ÉÄÜй¶Á˿ͻ§µÄÐÕÃû¡¢µØµãºÍÖ§¸¶¿¨ÐÅÏ¢£¬£¬£¬£¬°üÀ¨Õʺš¢ÓÐÓÃÆÚºÍÇå¾²´úÂë¡£¡£¡£¡£¸ÃÉ̳ÇÒÑÓÚ2020Äê7ÔÂ17ÈÕÐÞ¸´¸ÃÎÊÌâ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/gold-seller-jm-bullion-hacked-to-steal-customers-credit-cards/


¾©¹«Íø°²±¸11010802024551ºÅ