¶íÂÞ˹ISP Beeline 870Íò¿Í»§Êý¾Ýй¶£»£»D-LinkÌåÏÖ²»»áÐÞ¸´Â·ÓÉÆ÷RCE£»£»HildaCrypt¿ª·¢ÕßÐû²¼½âÃÜÃÜÔ¿

Ðû²¼Ê±¼ä 2019-10-08
1.ºÉÀ¼NCSCÌåÏÖеÄDNS´«ÊäЭÒ齫ʹDNS¼à¿ØÖØ´ó»¯

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

ºÉÀ¼¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©ÔÚÒ»·Ý±¨¸æÖÐÌåÏÖеÄDNS´«ÊäЭÒ齫ʹDNS¼à¿ØÔ½·¢Öش󻯺ÍÔ½·¢ÄÑÌâ¡£¡£¡£ ¡£¡£¡£NCSCÚ¹ÊͳÆ£¬£¬£¬£¬£¬ÐµÄDNS´«ÊäЭÒéʹ¼à¿Ø»òÐÞ¸ÄDNSÇëÇó±äµÃÔ½·¢ÄÑÌ⣬£¬£¬£¬£¬Õâ¹ØÓÚµ±½ñ²»ÊÜÐÅÈεÄÍøÂçÊÇÓÐÒæµÄ¡£¡£¡£ ¡£¡£¡£Í¬Ê±Ô½À´Ô½¶àµØ½ÓÄÉеÄDNS´«ÊäЭÒ飬£¬£¬£¬£¬ÀýÈç»ùÓÚTLSµÄDNSЭÒ飨DoT£©ºÍ»ùÓÚHTTPSµÄDNSЭÒ飨DoH£©¿ÉÄÜʹ×éÖ¯µÄÇå¾²¿ØÖÆÊ§Ð§£¬£¬£¬£¬£¬Õâ»áµ¼ÖÂÄÚ²¿×ÊÔ´ÃüÃû̻¶»òÅþÁ¬¶Ï¿ªµÈ¸ºÃæÓ°Ïì¡£¡£¡£ ¡£¡£¡£ÕâЩ¸ºÃæÓ°ÏìºÜÄÑÔÚÍøÂç¼¶±ð»º½â£¬£¬£¬£¬£¬²¢ÇÒÐèÒªÔÚDNS»ù´¡ÉèÊ©ºÍµ¥¸ö×°±¸ÉÏ»º½â¡£¡£¡£ ¡£¡£¡£GoogleºÍMozilla¶¼ÔÚ½üÆÚΪÆää¯ÀÀÆ÷£¨ChromeºÍFirefox£©¾ÙÐÐDoH²âÊÔ¡£¡£¡£ ¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://english.ncsc.nl/publications/factsheets/2019/oktober/2/factsheet-dns-monitoring-will-get-harder

2.ºÚ¿ÍÈÔÔÚʹÓÃÒ»ÄêǰÐÞ¸´µÄDrupalgeddon2Îó²î·Ö·¢¶ñÒâÈí¼þ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

Ñо¿Ö°Ô±·¢Ã÷¹¥»÷ÕßÈÔÔÚÆð¾¢Ê¹ÓÃÒ»ÄêǰÐÞ¸´µÄDrupalgeddon2Îó²î·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£ ¡£¡£¡£¸ÃÎó²îµÄCVE±àºÅΪCVE-2018-7600£¬£¬£¬£¬£¬Ó°ÏìÁËDrupal°æ±¾6¡¢7ºÍ8£¬£¬£¬£¬£¬²¢ÒÑÓÚ2018Äê3Ô±»ÐÞ¸´¡£¡£¡£ ¡£¡£¡£AkamaiÇå¾²Ñо¿Ô±Larry W. Cashdollar·¢Ã÷¸ÃÎó²îÈÔÈ»ÊÇ×î½üÊӲ쵽µÄ¶ñÒâ»î¶¯µÄÄ¿µÄ£¬£¬£¬£¬£¬¹¥»÷ÕßÊÔͼʹÓøÃÎó²îÔÚδ´ò²¹¶¡µÄϵͳÉÏÔËÐÐǶÈëÔÚ.gifÎļþÖеĶñÒâ´úÂë¡£¡£¡£ ¡£¡£¡£¸Ã¹¥»÷»î¶¯ËƺõÖ÷ÒªÕë¶Ô¸ß×ÅÃû¶ÈµÄÍøÕ¾£¬£¬£¬£¬£¬²¢ÇÒûÓÐÕë¶ÔÌØ¶¨µÄÐÐÒµ¡£¡£¡£ ¡£¡£¡£¸Ã»î¶¯·Ö·¢µÄ¶ñÒâÈí¼þ¿ÉɨÃèÍâµØÎļþÖÐµÄÆ¾Ö¤¡¢Ìæ»»ÍâµØ.htaccessÎļþ¡¢É¨ÃèMySQL my.cnfÉèÖÃÎļþ¡¢Ö´ÐÐÔ¶³ÌÎļþ¡¢ÉÏ´«ÎļþÒÔ¼°Æô¶¯Web ShellµÈ¡£¡£¡£ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/new-campaign-targets-drupalgeddon2-flaw-install-malware

3.StreetEasyºÍSephoraй¶µÄÊý¾ÝÒѱ»HIBPÍøÕ¾ÊÕ¼

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

HIBPÒѾ­ÊÕ¼ÁËStreetEasyºÍSephoraÊý¾Ýй¶ÖеÄʧÔôÊý¾Ý£¬£¬£¬£¬£¬Óû§¿ÉÒÔÔÚ¸ÃÍøÕ¾Éϼì²éÆäÐÅÏ¢ÊÇ·ñÒÑй¶¡£¡£¡£ ¡£¡£¡£Æ¾Ö¤HIBPµÄ˵·¨£¬£¬£¬£¬£¬StreetEasyÔÚ2016Äê6ÔÂÔâµ½Êý¾Ýй¶£¬£¬£¬£¬£¬¹²Óнü100ÍòÓû§Êܵ½Ó°Ï죬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢ÐÕÃû¡¢ÃÜÂëºÍÓû§Ãû¡£¡£¡£ ¡£¡£¡£HIBP»¹ÌåÏÖSephora Southeast AsiaÔÚ2017Äê1ÔÂÔâµ½Êý¾Ýй¶£¬£¬£¬£¬£¬ÓÐ78ÍòÃû¿Í»§µÄÊý¾Ý±»µÁ£¬£¬£¬£¬£¬°üÀ¨¿Í»§µÄÉúÈÕ¡¢µç×ÓÓʼþµØµã¡¢ÖÖ×å¡¢ÐÔ±ð¡¢ÐÕÃûºÍÉíÌåÌØÕ÷µÈÐÅÏ¢¡£¡£¡£ ¡£¡£¡£ÕâÁ½´ÎÊÂÎñÖеÄÊý¾Ý¶¼ÒÑÔÚ°µÍøÂÛ̳ÉϳöÊÛ¡£¡£¡£ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/check-if-you-are-in-the-sephora-and-streeteasy-data-breaches/

4.ÀÕË÷Èí¼þHildaCrypt¿ª·¢ÕßÐû²¼ÆäÖ÷½âÃÜÃÜÔ¿

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

ÀÕË÷Èí¼þHildaCryptµÄ¿ª·¢ÕßÒѾöÒéÐû²¼ÆäÖ÷½âÃÜÃÜÔ¿£¬£¬£¬£¬£¬Ê¹ÓøÃÃÜÔ¿¿É½¨Éè½âÃÜÆ÷£¬£¬£¬£¬£¬´Ó¶ø×ÊÖúÊܺ¦Õ߻ָ´ÆäÎļþ¡£¡£¡£ ¡£¡£¡£±¾ÖÜÑо¿Ö°Ô±GrujaRS·¢Ã÷ÁËÒ»¸öеÄÀÕË÷Èí¼þ±äÖÖ²¢½«Æäʶ±ðΪSTOP£¬£¬£¬£¬£¬µ«¸ÃÀÕË÷Èí¼þµÄ¿ª·¢ÕßÁªÏµÁËÑо¿Ö°Ô±²¢ÌåÏÖËüÏÖʵÉÏÊÇHildaCrypt±äÖÖ¡£¡£¡£ ¡£¡£¡£¸Ã¿ª·¢ÕßÌåÏÖ¸ÃÀÕË÷Èí¼þÖ»ÊdzöÓÚÓéÀÖÄ¿µÄ£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÖ÷½âÃÜÃÜÔ¿¡£¡£¡£ ¡£¡£¡£Michael GillespieÑо¿ÍŶÓÈ·ÈÏÁËÖ÷½âÃÜÃÜÔ¿µÄÕýµ±ÐÔ£¬£¬£¬£¬£¬²¢Ðû²¼ÏàʶÃÜÆ÷¡£¡£¡£ ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hildacrypt-ransomware-developer-releases-decryption-keys/

5.¶íÂÞ˹»¥ÁªÍøÐ§ÀÍÌṩÉÌBeeline870Íò¿Í»§Êý¾Ýй¶

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

ƾ֤¶íÂÞ˹ýÌåµÄ±¨µÀ£¬£¬£¬£¬£¬À´×Ô¶íÂÞ˹»¥ÁªÍøÐ§ÀÍÌṩÉÌBeelineµÄ870ÍòÃû¿Í»§Êý¾ÝÕýÔÚÍøÉϳöÊۺ͹²Ïí¡£¡£¡£ ¡£¡£¡£ÕâЩÊý¾Ý°üÀ¨ÏêϸµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬ÈçÐÕÃû¡¢µØµã¡¢ÊÖ»úºÅÂëºÍ¼ÒÍ¥µç»°ºÅÂëµÈ¡£¡£¡£ ¡£¡£¡£BeelineÈ·ÈÏÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬²¢ÌåÏÖÊý¾Ýй¶±¬·¢ÔÚ2017Ä꣬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ¿Í»§ÎªÔÚ2016Äê11ÔÂ֮ǰע²á¼ÒÍ¥¿í´øµÄ¶íÂÞ˹Óû§¡£¡£¡£ ¡£¡£¡£ÆäʱBeelineÕÒµ½ÁËÊý¾Ýй¶µÄÔðÈÎÈË£¬£¬£¬£¬£¬µ«Î´¹ûÕæ´ËÊÂÎñ¡£¡£¡£ ¡£¡£¡£ÕâЩÊý¾ÝÒѾ­±»ÔÚÍøÉϹ²Ïí£¬£¬£¬£¬£¬°üÀ¨ÔÚTelegramƵµÀÉϹ²Ïí¡£¡£¡£ ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/data-breach-at-russian-isp-impacts-8-7-million-customers/

6.D-LinkÌåÏÖ²»»áÐÞ¸´½üÆÚÅû¶µÄ·ÓÉÆ÷RCEÎó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

FortinetÑо¿Ö°Ô±Åû¶ÁËÓ°ÏìһϵÁÐD-Link·ÓÉÆ÷µÄRCEÎó²î£¬£¬£¬£¬£¬µ«D-LinkÌåÏÖ½«²»»áÐÞ¸´¸ÃÎó²î¡£¡£¡£ ¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±Thanh Nguyen NguyenµÄ˵·¨£¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-16920£©ÓÚ2019Äê9Ô±»·¢Ã÷£¬£¬£¬£¬£¬ÊôÓÚδ¾­Éí·ÝÑéÖ¤µÄÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËDIR-655¡¢DIR-866L¡¢DIR-652ºÍDHP-1565²úƷϵÁÐÖеÄD-Link¹Ì¼þ¡£¡£¡£ ¡£¡£¡£¸ÃÎó²îµÄCVSS v3.1»ùÌìÖ°ÊýΪ9.8£¬£¬£¬£¬£¬CVSS v2.0»ùÌìÖ°ÊýΪ10.0¡£¡£¡£ ¡£¡£¡£D-LinkÌåÏÖÓÉÓÚ²úÆ·ÒѵִïÉúÃüÖÜÆÚ£¨EOL£©£¬£¬£¬£¬£¬Òò´Ë²»»áÐû²¼ÐÞ¸´²¹¶¡¡£¡£¡£ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/d-link-routers-contain-remote-code-execution-vulnerability/