ÃÀ¹úÕþ¸®È·ÈÏSolarWinds¹¥»÷Óë¶íÂÞ˹Ç鱨¾ÖSVRÓйØ£»£»£»Ó¡¶ÈBizongoµÄ´æ´¢Í°ÉèÖùýʧ£¬£¬£¬£¬£¬ £¬Ð¹Â¶643 GBµÄÊý¾Ý

Ðû²¼Ê±¼ä 2021-04-16

1.ÃÀ¹úÕþ¸®È·ÈÏSolarWinds¹¥»÷Óë¶íÂÞ˹Ç鱨¾ÖSVRÓйØ


1.jpg


ÃÀ¹úÕþ¸®Õýʽָ¿Ø¶íÂÞ˹Õþ¸®ÌᳫÁËSolarWinds¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬ £¬Ó°ÏìÁËÃÀ¹úµÄ¶à¸ö×éÖ¯ºÍ¹«Ë¾ÊÖÒÕ²¿·ÖµÄÍøÂç ¡£¡£¡£¡£½ñÄê1Ô³õ£¬£¬£¬£¬£¬ £¬ÍøÂçͳһЭµ÷С×飨UCG£©½«´Ë´Î¹¥»÷¹éÒòÓÚ¶íÂÞ˹Åä¾°µÄºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬ £¬µ«Î´Ö¸³öÏêϸÃû³Æ ¡£¡£¡£¡£4ÔÂ15ÈÕ£¬£¬£¬£¬£¬ £¬°×¹¬ÕýʽȷÈ϶íÂÞ˹Íâ¹úÇ鱨¾ÖSVRÊǴ˴ι¥»÷µÄÄ»ºóºÚÊÖ£¬£¬£¬£¬£¬ £¬Í¨¹ýÆäºÚ¿Í²¿·ÖAPT29£¨ÓÖ³ÆCozy Bear£©¿ªÕ¹µÄÍøÂçÌØ¹¤»î¶¯ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬ÃÀ¹úNSA¡¢CISAºÍFBIÁªºÏÐû²¼ÁËÇå¾²×Éѯ£¬£¬£¬£¬£¬ £¬ÖÒÑÔSVRÔÚ¹¥»÷ÖÐʹÓõÄÎå¸öÖ÷ÒªµÄÎó²î ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-government-confirms-russian-svr-behind-the-solarwinds-hack/


2.Ó¡¶ÈBizongoµÄ´æ´¢Í°ÉèÖùýʧ£¬£¬£¬£¬£¬ £¬Ð¹Â¶643 GBµÄÊý¾Ý


2.jpg


Ó¡¶ÈB2B°ü×°Êг¡BizongoÒòAWS S3´æ´¢Í°ÉèÖùýʧ£¬£¬£¬£¬£¬ £¬Ð¹Â¶643 GBµÄÊý¾Ý ¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÉæ¼°Óû§µÄPIIºÍBizongoµÄ¸¶¿îÐÅÏ¢£¬£¬£¬£¬£¬ £¬°üÀ¨Óû§µÄÐÕÃû¡¢µç»°ºÅÂë¡¢Õʵ¥µØµã¡¢ÊÕ»õµØµã¡¢ÔËËͺ͸ú×Ù±àºÅ¡¢Õʵ¥Ã÷ϸºÍ¿Í»§µÄ²ÆÎñÃ÷ϸµÈ ¡£¡£¡£¡£Website PlanetµÄÑо¿Ö°Ô±ÓÚ2020Äê12ÔÂÏÂÑ®·¢Ã÷¸Ã´æ´¢Í°£¬£¬£¬£¬£¬ £¬²¢Á¬Ã¦¾Í´ËÊÂÎñÓëBizongoÁªÏµ£¬£¬£¬£¬£¬ £¬µ«ÏÖÔÚÈÔδÊÕµ½ÈκλØÓ¦ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/india-bizongo-supply-chain-exposed-data/


3.SAPÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ £¬ÐÞ¸´Æä²úÆ·ÖеĶà¸öÑÏÖØµÄÎó²î


3.jpg


±¾Öܶþ£¬£¬£¬£¬£¬ £¬SAPÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ £¬ÐÞ¸´ÁËBusiness Client¡¢CommerceºÍNetWeaverÖеÄ×ܼƶà¸öÎó²î ¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÊÇCommerceÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-27602£©£¬£¬£¬£¬£¬ £¬µÃ·ÖΪ9.8£»£»£»ÒÔ¼°NetWeaver¿ÍÕ»µÄMigration Service×é¼þÖеÄCVE-2021-21481£¬£¬£¬£¬£¬ £¬µÃ·ÖΪ9.6£¬£¬£¬£¬£¬ £¬Î´¾­ÊÚȨµÄ¹¥»÷Õß¿ÉÒÔ»á¼ûÉèÖù¤¾ßÒÔ»ñµÃϵͳÉϵÄÖÎÀíȨÏÞ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬»¹ÐÞ¸´ÁËCVE-2021-21482¡¢CVE-2021-21483ºÍCVE-2020-26832µÈÎó²î ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sap-fixes-critical-bugs-in-business-client-commerce-and-netweaver/


4.Census LabsÅû¶°²×¿°æ±¾WhatsAppµÄ´úÂëÖ´ÐÐÎó²î


4.jpg


Census LabsµÄÑо¿Ö°Ô±Åû¶Á˰²×¿°æ±¾µÄWhatsAppÖеÄÁ½¸ö´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬ £¬¿É±»ÓÃÀ´ÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐжñÒâ´úÂë²¢ÇÔÌýͨѶ ¡£¡£¡£¡£ÕâÁ½¸öÎó²î¿ÉÓÃÀ´Ô¶³ÌÍøÂçTLS 1.3ºÍTLS 1.2»á»°µÄTLS¼ÓÃÜÐÅÏ¢£¬£¬£¬£¬£¬ £¬²¢ÌᳫÖÐÐÄÈË£¨MitM£©¹¥»÷ ¡£¡£¡£¡£ÓÈÆäÊÇCVE-2021-24027Îó²î£¬£¬£¬£¬£¬ £¬Ê¹ÓÃÁËChrome¶ÔAndroidÖÐÄÚÈÝÌṩÕßµÄÖ§³ÖÒÔ¼°ä¯ÀÀÆ÷ÖеÄͬԴսÂÔÈÆ¹ýÎó²î£¨CVE-2020-6516£©£¬£¬£¬£¬£¬ £¬Í¨¹ýWhatsApp½«ÌØÖƵÄHTMLÎļþ·¢Ë͸øÊܺ¦Õߣ¬£¬£¬£¬£¬ £¬µ±Êܺ¦ÕßÔÚä¯ÀÀÆ÷Öз­¿ªºó£¬£¬£¬£¬£¬ £¬½«Ö´ÐиÃÎļþÖаüÀ¨µÄ´úÂë ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/116833/hacking/whatsapp-flaws-remote-hack.html


5.FireEyeÐû²¼ÃûΪM-Trend 2021µÄÄê¶ÈÆÊÎö±¨¸æ


5.jpg


FireEye»ùÓÚ¶ÔÆäÖÎÀíµÄÇå¾²ÊÂÎñ¾ÙÐÐÊÓ²ìʱ´úÍøÂçµÄÊý¾Ý£¬£¬£¬£¬£¬ £¬Ðû²¼ÁËÃûΪM-Trend 2021µÄÄêÆÊÎö¶È±¨¸æ ¡£¡£¡£¡£FireEye MandiantÊÓ²ìÁË246¸öºÚ¿Í×éÖ¯µÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬ £¬ÆäÖаüÀ¨4¸ö²ÆÎñÍþв£¨FIN£©×éÖ¯£¬£¬£¬£¬£¬ £¬6¸ö¸ß¼¶Ò»Á¬Íþв£¨APT£©×éÖ¯ºÍ236¸öδ·ÖÀàÍþв£¨UNC£©×éÖ¯ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬Ç°5ÖÖ¶ñÒâÈí¼þÖÖ±ðÊǺóÃÅ£¨36£¥£©¡¢ÏÂÔØÆ÷£¨16£¥£©¡¢droppers£¨8£¥£©¡¢Æô¶¯Æ÷£¨7£¥£©ºÍÀÕË÷Èí¼þ£¨5£¥£©£¬£¬£¬£¬£¬ £¬Ç°5¸ö¶ñÒâÈí¼þ¼Ò×å»®·ÖÊÇBEACON¡¢EMPIRE¡¢MAZE¡¢NETWALKERºÍMetasploit ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://content.fireeye.com/m-trends/rpt-m-trends-2021


6.CISAÐû²¼Õë¶ÔÍøÂçÇå¾²Ñо¿Ö°Ô±µÄAPT»î¶¯µÄ¾¯±¨


6.jpg


CISAÐû²¼ÁËÕë¶ÔÍøÂçÇå¾²Ñо¿Ö°Ô±µÄAPT»î¶¯µÄ¾¯±¨ ¡£¡£¡£¡£¾¯±¨Ö¸³öAPT¹¥»÷ÕßÕýÔÚʹÓÃαÔìµÄÉ罻ýÌå×ÊÁϺÍÃ²ËÆÕýµ±µÄÍøÕ¾À´ÓÕ»óÇå¾²Ñо¿Ö°Ô±»á¼û¶ñÒâÍøÕ¾£¬£¬£¬£¬£¬ £¬ÒÔÇÔÈ¡°üÀ¨Îó²îʹÓúÍÁãÈÕÎó²îÔÚÄÚµÄÐÅÏ¢ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬GoogleºÍMicrosoft×î½ü¶¼Ðû²¼ÁËÕë¶Ô´ËÀ๥»÷µÄ±¨¸æ ¡£¡£¡£¡£CISA½¨ÒéÍøÂçÇå¾²´ÓÒµÖ°Ô±ÔÚ»á¼û²»ÊÜÐÅÈεĴúÂë»òÍøÕ¾Ê±£¬£¬£¬£¬£¬ £¬Ê¹ÓÃÓëÊÜÐÅÈεÄϵͳºÍÍøÂç¸ôÀëµÄɳºÐÇéÐÎ ¡£¡£¡£¡£ 


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/04/14/threat-actors-targeting-cybersecurity-researchers