ºÚ¿ÍÔÚ°µÍøÐ¹Â¶Áè¼Ý50Íǫ̀װ±¸µÄTelnetƾ֤£»£»£»£»CitrixÐû²¼´úÂëÖ´ÐÐÎó²îCVE-2019-19781µÄÐÞ¸´²¹¶¡

Ðû²¼Ê±¼ä 2020-01-20


1.ºÚ¿ÍÔÚ°µÍøÐ¹Â¶Áè¼Ý50Íǫ̀װ±¸µÄTelnetƾ֤


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ºÚ¿ÍÔÚÒ»¸ö°µÍøÂÛ̳ÉÏй¶ÁËÁè¼Ý51.5Íǫ̀ЧÀÍÆ÷¡¢¼ÒÓ÷ÓÉÆ÷ºÍIoT×°±¸µÄTelnetƾ֤ÁÐ±í £¬£¬£¬£¬ÁбíÖаüÀ¨Ã¿¸ö×°±¸µÄIPµØµãÒÔ¼°ÆäTelnetЧÀ͵ÄÓû§ÃûºÍÃÜÂë¡£¡£¡£¡£¡£ÕâÊÇÆù½ñΪֹÒÑÖªµÄ×î´óTelnetÃÜÂë×ß©¡£¡£¡£¡£¡£¾ÝZDNetÏàʶ £¬£¬£¬£¬¸ÃÁбíÊÇÓÉDDoS³ö×âЧÀ͵ÄÔËÓªÕßÔÚÏßÐû²¼µÄ £¬£¬£¬£¬¹¥»÷Õßͨ¹ýɨÃèÕû¸öInternetÀ´²éÕÒTelnet¶Ë¿Ú̻¶µÄ×°±¸ £¬£¬£¬£¬²¢ÇÒʵÑéʹÓã¨1£©³ö³§ÉèÖõÄĬÈÏÓû§ÃûºÍÃÜÂë»ò£¨2£©×Ô½ç˵µ«Ò×ÓÚÍÆ²âµÄÃÜÂë×éºÏ¾ÙÐб¬ÆÆÌåÀýÁ˸ÃÁбí¡£¡£¡£¡£¡£ÁбíÖÐËùÓÐÌõÄ¿µÄÈÕÆÚΪ2019Äê10ÔÂÖÁ11Ô £¬£¬£¬£¬ÆäÖÐһЩװ±¸¿ÉÄÜÒѾ­Ìæ»»ÁËIPµØµã»òƾ֤¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hacker-leaks-passwords-for-more-than-500000-servers-routers-and-iot-devices/


2.ÎÚ¿ËÀ¼Õþ¸®ÊÂÇéÃÅ»§ÍøÕ¾Ð¹Â¶²¿·Ö¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¾Ý·͸É籨µÀ £¬£¬£¬£¬ÎÚ¿ËÀ¼¹ú¼Ò×î¸ßÇå¾²»ú¹¹ÉÏÖÜÎåÈϿɲ¿·Ö¹«ÃñµÄСÎÒ˽¼ÒÊý¾ÝÔÚÕþ¸®ÊÂÇéÃÅ»§ÍøÕ¾ÖÐй¶¡£¡£¡£¡£¡£¹ú¼ÒÇå¾²ºÍ¹ú·ÀίԱ»áûÓÐ֤ʵ×ß©ÊÇ·ñÊÇÍøÂç¹¥»÷µÄЧ¹û £¬£¬£¬£¬Ò²Ã»ÓÐ͸¶Óм¸´ó¶¼¾ÝÊܵ½Ó°ÏìºÍÊÂÎñÓÉË­ÈÏÕæ £¬£¬£¬£¬µ«ÌåÏÖÒѾ­¡°È·¶¨ÁËÎó²î¡±²¢ÇÒÃÅ»§ÍøÕ¾ÒѾ­»ñµÃ±£»£»£»£»¤¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞ¸ü¶àϸ½ÚÅû¶¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://in.reuters.com/article/ukraine-cyber-leak/ukraine-says-personal-data-leaked-from-government-jobs-portal-idINKBN1ZG1OP


3.Õë¶Ô±±´ï¿ÆËûÖÝÕþ¸®µÄÍøÂç¹¥»÷¼¤ÔöÖÁÿÔÂ1500Íò´Î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¾Ý¡¶Grand Forks Herald¡·±¨µÀ £¬£¬£¬£¬2019ÄêÕë¶Ô±±´ï¿ÆËûÖÝÕþ¸®µÄÍøÂç¹¥»÷ʵÑéÏÕЩ·­ÁËÈý±¶¡£¡£¡£¡£¡£±±´ï¿ÆËûÖÝÊ×ϯÐÅÏ¢¹Ù¼æÐÅÏ¢ÊÖÒÕ²¿·ÖÈÏÕæÈËФ¶÷¡¤ÀµÀû£¨Shawn Riley£©ÌåÏÖ £¬£¬£¬£¬2019ÄêÿÔÂÓÐÁè¼Ý1500Íò´ÎÕë¶Ô¸ÃÖÝÕþ¸®µÄÍøÂç¹¥»÷ £¬£¬£¬£¬×Ô2018ÄêÒÔÀ´ÔöÌíÁË300£¥¡£¡£¡£¡£¡£ÔÚ2018Äê £¬£¬£¬£¬Ã¿ÔÂÔ¼ÓÐ500Íò´ÎδËìµÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£Ììϸ÷µØµÄµØ·½Õþ¸®¶¼·¢Ã÷ÍøÂç¹¥»÷ÓÐËùÔöÌí £¬£¬£¬£¬µ«±±´ï¿ÆËûÖݵÄÇ÷ÊÆÒª±ÈÆäËü×éÖ¯ÑÏÖØÒ»Ð© £¬£¬£¬£¬×ÜÌå¶øÑÔ £¬£¬£¬£¬ÔöÌíÏ൱¿É¹Û¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://thehill.com/policy/cybersecurity/478936-cyber-attacks-against-north-dakota-state-government-skyrocket-to-15m-a


4.µç×ÓÉÌÎñƽ̨Zen Cart×¢Èë¹¥»÷ £¬£¬£¬£¬ÇÔÈ¡PayPalÕÊ»§ÃÜÂë


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Çå¾²Ñо¿Ô±Christopher Morrow¿ËÈÕ·¢Ã÷Õë¶Ô¿ªÔ´µç×ÓÉÌÎñƽ̨Zen CartµÄ×¢Èë¹¥»÷ £¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÇÔÈ¡Óû§µÄPayPalÕË»§ºÍÃÜÂë¡£¡£¡£¡£¡£Zen Cart×Ô¼ºÊǾɰæOsCommerceµÄ·ÖÖ§ £¬£¬£¬£¬¸Ãƽ̨ºÜÉÙÔâµ½ÐÅÓÿ¨Æ²ÔüÆ÷µÄ¹¥»÷ £¬£¬£¬£¬ÓÉÓÚÆ¾Ö¤W3µÄ×îÐÂÊý¾Ý £¬£¬£¬£¬Ïà±ÈMagento£¨0.8£¥£©»òPrestashop£¨0.6£¥£©µÈÆäËû¿ªÔ´Æ½Ì¨ £¬£¬£¬£¬Zen CartµÄÓû§ÈººÜС£¡£¡£¡£¡£¨0.1£¥£©¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄ¶ñÒâ´úÂë×¢Èëµ½Zen CartµÄPHPÎļþÖÐ £¬£¬£¬£¬ËüרÃÅÕë¶ÔPayPal Payments Pro¸¶¿îÄ£¿£¿é £¬£¬£¬£¬²¶»ñÓû§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©ºÍÖ§¸¶¿¨ÏêϸÐÅÏ¢¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://blog.sucuri.net/2020/01/zen-cart-paypal-skimmer.html


5.Ñо¿ÍŶÓÐû²¼Êý¾Ý²Á³ýÆ÷DustmanµÄÆÊÎö±¨¸æ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


2019Äê12Ô £¬£¬£¬£¬IBM X-ForceÍŶÓÐû²¼ÁËÓйØÕë¶ÔÖж«µØÇøµÄÆÆËðÐÔ¹¥»÷ÖеÄÊý¾Ý²Á³ý¶ñÒâÈí¼þZeroCleareµÄÆÊÎö±¨¸æ £¬£¬£¬£¬Ô¼Ò»¸öÔºóÉ³ÌØ¹ú¼ÒÍøÂçÇå¾²¾Ö£¨NCA£©±¨¸æÁËÕë¶ÔͳһµØÇøµÄZeroCleare±äÌå £¬£¬£¬£¬¸Ã±äÌå±»³ÆÎªDustman¡£¡£¡£¡£¡£DustmanµÄ×é¼þÓëZeroCleareʹÓõÄ×é¼þÏàËÆ £¬£¬£¬£¬Õâ°üÀ¨Æä´úÂë¿âºÍ¶ÔTurlaÇý¶¯³ÌÐòµÄʹÓà £¬£¬£¬£¬ÒÔ¼°ÓÃÓÚ²Á³ýÊÜѬȾ»úе´ÅÅ̵ÄEldoS RawDiskÇý¶¯³ÌÐòºÍÏàͬµÄEldoSÈí¼þÔÊÐíÖ¤ÃÜÔ¿¡£¡£¡£¡£¡£ZeroCleareºÍDustmanÖ®¼äµÄÇø±ðÔÚÓÚÎļþÃûºÍ°²ÅÅÁ÷³ÌµÄϸСת±ä¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://securityintelligence.com/posts/enter-dustman-new-wiper-takes-after-zerocleare-targets-organizations-in-saudi-arabia/


6.CitrixÐû²¼´úÂëÖ´ÐÐÎó²îCVE-2019-19781µÄÐÞ¸´²¹¶¡


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


CitrixÕë¶ÔÒѱ»Æð¾¢Ê¹ÓõÄCVE-2019-19781Îó²îÐû²¼ÓÀÊÀÐÞ¸´²¹¶¡ £¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËCitrix Application Delivery Controller£¨ADC£©¡¢CitrixÍø¹ØºÍCitrix SD-WAN WANOP×°±¸ £¬£¬£¬£¬²¢ÇÒÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£CitrixÒѾ­Ðû²¼ÁËADC°æ±¾11.1ºÍ12.0µÄÓÀÊÀÐÞ¸´³ÌÐò £¬£¬£¬£¬ÕâЩ²¹¶¡»¹ÊÊÓÃÓÚÍйÜÔÚESX¡¢Hyper-V¡¢KVM¡¢XenServer¡¢Azure¡¢AWS¡¢GCP»òCitrix ADCЧÀͽ»¸¶×°±¸£¨SDX£©ÉϵÄCitrix ADCºÍCitrix GatewayÐéÄâ×°±¸£¨VPX£©¡£¡£¡£¡£¡£SDXÉϵÄSVM²»ÐèÒª¸üС£¡£¡£¡£¡£³ý´ËÖ®Íâ £¬£¬£¬£¬Citrix»¹¼ÓËÙÁ˽«¸Ã²¹¶¡ÍÆË͵½ÆäËüADC°æ±¾ºÍSD-WAN WANOPµÄÀú³Ì £¬£¬£¬£¬ÐµĹ̼þ½«ÔÚ1ÔÂ24ÈÕÐû²¼¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/citrix-patches-cve-2019-19781-flaw-in-citrix-adc-111-and-120/