Pulse SecureÐû²¼ÆóÒµÍÆ½øÁãÐÅÈÎÍøÂçµÄÆÊÎö±¨¸æ£»£»£»OracleÐû²¼²¹¶¡ÒÔÐÞ¸´WebLogic ServerÖеÄRCEÎó²î
Ðû²¼Ê±¼ä 2020-11-03
Pulse SecureÐû²¼ÁËÓÐ¹ØÆóÒµÍÆ½øÁãÐÅÈÎÍøÂçµÄÆÊÎö±¨¸æ¡£¡£ÄÇÐ©ÍÆ¶¯ºÍÍýÏëÁãÐÅÈÎÁ÷³ÌºÍÊÖÒÕʵÑ鯫ÏòµÄ×éÖ¯£¬£¬½«×ßÔÚÊý×ÖתÐÍÇúÏßµÄÇ°Ãæ¡£¡£Ñо¿·¢Ã÷£¬£¬ÁãÐÅÈÎÏîÄ¿ÍùÍùÊÇ¿çѧ¿ÆµÄ£¬£¬ËѼ¯ÁËÇå¾²ºÍÍøÂçÍŶӡ£¡£ËûÃÇͨ³£Ê¹ÓÃÈýÖÖÐ×÷·½·¨£¬£¬»®·ÖÊÇе÷²î±ðϵͳ֮¼äµÄ»á¼ûÇå¾²¿ØÖÆ(48%)¡¢ÆÀ¹À»á¼ûÇå¾²¿ØÖÆÐèÇó(41%)ºÍƾ֤Óû§¡¢½ÇÉ«¡¢Êý¾ÝºÍÓ¦ÓóÌÐò½ç˵»á¼ûÐèÇó(40%)¡£¡£ÆóÒµÖÎÀíлḱ×ÜShamus McGillicuddyÌåÏÖ£¬£¬ÆóÒµÏÔÈ»ÕýÔÚ¼ÓËÙ½ÓÄÉÁãÐÅÈÎÍøÂçµÄ³ÌÐò¡£¡£
ÔÎÄÁ´½Ó£º
https://www.pulsesecure.net/resource/pulse-zero-trust-access-defense-in-depth/
2.OracleÐû²¼²¹¶¡ÒÔÐÞ¸´WebLogic ServerÖеÄRCEÎó²î

OracleÔÚÖÜÄ©Ðû²¼ÁË´øÍâÇå¾²¸üУ¬£¬ÒÔÐÞ¸´Ó°ÏìOracle WebLogic Server¶à¸ö°æ±¾µÄÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-14750£¬£¬ÑÏÖØ¶È»ù´¡ÆÀ·ÖΪ9.8¡£¡£Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔͨ¹ýHTTPÔ¶³ÌÔÚЧÀÍÆ÷¿ØÖÆÌ¨×é¼þÖÐʹÓøÃÎó²î£¬£¬²¢ÎÞÐèÓëÓû§½»»¥¡£¡£ÕâÊǵÍÖØÆ¯ºó¹¥»÷µÄÒ»²¿·Ö£¬£¬ÓпÉÄܵ¼ÖÂÄ¿µÄЧÀÍÆ÷½ÓÊÜ¡£¡£¸ÃÎó²îÓ°ÏìÁËOracle WebLogic ServerµÄ°æ±¾10.3.6.0.0¡¢12.1.3.0.0¡¢12.2.1.3.0¡¢12.2.1.4.0ºÍ14.1.1.0.0¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/oracle-issues-emergency-patch-for-critical-weblogic-server-flaw/
3.ÃÀ¹úCISAºÍFBIÅû¶¶íÂÞ˹ºÚ¿ÍÕýÔÚʹÓõÄ8¸ö¹¤¾ß

ÃÀ¹úÍøÂç˾ÁÓëCISAºÍFBIÅû¶Á˶íÂÞ˹ºÚ¿ÍÕýÔÚʹÓõÄ8ÖÖеĶñÒâÈí¼þÑù±¾¡£¡£ÆäÖÐÓÐ6¸öÓÃÓÚComRAT¶ñÒâÈí¼þ£¬£¬ÓÉTurlaʹÓ㬣¬ÁíÍâ2¸öÓÃÓÚÊÇZebrocy¶ñÒâÈí¼þ£¬£¬ÓÉAPT28ʹÓᣡ£TurlaºÍAPT28Ò»Ö±ÔÚÒ»Ö±¸üÐÂÕâЩ¹¤¾ß£¬£¬ÒÔÈÆ¹ý¼ì²â¡£¡£ÕýÈçÍøÂçÇå¾²¹«Ë¾ESETËù³Æ£¬£¬´Ë´ÎÁªºÏ¾¯±¨±ê¼Ç×ÅComRATºÍZebrocyÊ×´ÎÕýʽÓë¶íÂÞ˹Õþ¸®µÄÍøÂçÌØ¹¤²¿·Ö½¨ÉèÁªÏµ¡£¡£ÔÚÒÑÍù£¬£¬ComRATÔø±»±»ÓÃÓÚ¹¥»÷Íâ½»ÊÂÎñºÍ¹úÃñÒé»á£¬£¬¶øZebrocyÔø±»ÓÃÓÚ¹¥»÷´óʹ¹ÝºÍÍâ½»²¿¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-cyber-command-exposes-new-russian-malware/
4.ÈÕ±¾ºËî¿Ïµ¾Ö£¨NRA£©Ôâµ½¹¥»÷£¬£¬µç×ÓÓʼþϵͳÖÐÖ¹

ÈÕ±¾ºËî¿Ïµ¾Ö£¨NRA£©³ÆÆäÔâµ½¹¥»÷£¬£¬µç×ÓÓʼþϵͳÔÝʱÖÐÖ¹¡£¡£NRAÔÚÆä¹ÙÍøÌåÏÖ£¬£¬10ÔÂ27ÈÕ17:00ÆðÆäµç×ÓÓʼþÊÕ·¢ÒÑÔÝʱÖÐÖ¹¡£¡£ÏÖÔÚ£¬£¬Õþ¸®ÒѶԸÃÊÂÎñ¾ÙÐÐÁËÊӲ죬£¬¾ÝýÌ屨µÀ£¬£¬Õâ¶ÔÈÕ±¾ºËµçÕ¾µÄÔËӪûÓÐÓ°Ïì¡£¡£±ðµÄ£¬£¬¸ÔÌ︱¹úÎñÇäÔÚ26ÈÕµÄÐÂÎÅÐû²¼»áÉϳƣ¬£¬ÓÐδ¾ÊÚȨµÄºÚ¿Í½øÈëÁ˺Ëî¿Ïµ¾ÖµÄÍøÂçϵͳ£¬£¬»ò½«µ¼ÖÂÐÅÏ¢×ß©¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/110284/hacking/nuclear-regulation-authority-cyber-attack.html
5.ºÚ¿ÍʹÓÃBEC¹¥»÷´ÓÍþ˹¿µÐÇÖݹ²ºÍµ³ÍµÈ¡230ÍòÃÀÔª

Íþ˹¿µÐÇÖݹ²ºÍµ³£¨WisGOP£©³ÆÆäÔâµ½ÆóÒµµç×ÓÓʼþÍ×У¨BEC£©¹¥»÷£¬£¬ºÚ¿ÍÔÚÖ§³ÖÌØÀÊÆÕÁ¬ÈεľºÑ¡»î¶¯µÄÕÊ»§ÖÐ͵×ßÁËÔ¼230ÍòÃÀÔª¡£¡£¾Ý¸Ãµ³Ö÷ϯAndrew Hitt½ÒÏþµÄÉùÃ÷£¬£¬ÆäÓÚ10ÔÂ22ÈÕ×¢ÖØµ½ÕâÒ»»î¶¯£¬£¬ÍøÂç×ﷸʹÓÃÁËÖØ´óµÄ´¹ÂÚ¹¥»÷£¬£¬Î±ÔìÁË·¢Æ±£¬£¬²¢ÒÔWisGOPÕæÕýµÄ¹©Ó¦É̵ÄÃûÒå·¢Ë͸ø¸Ã×éÖ¯¡£¡£ÏÖÔÚ£¬£¬WisGOPÒѽ«´ËÊÂ֪ͨÁËFBI£¬£¬ÊÂÎñÔµ¹ÊÔÓÉ»¹ÔÚÊÓ²ìÖС£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/scammers-stole-from-republican-party-wisconsin/
6.JM BullionÔâµ½¹¥»÷µ¼ÖÂÆä¿Í»§ÐÅÓÿ¨ÐÅϢй¶

¹ó½ðÊôÔÚÏßÁãÊÛÉÌJM Bullion³ÆÆä¹ÙÍøÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬µ¼ÖÂÆä¿Í»§ÐÅÓÿ¨ÐÅϢй¶¡£¡£JM BullionÊǽð¡¢Òø¡¢Í¡¢²¬ºÍîÙ²úÆ·£¨°üÀ¨Ó²±ÒºÍ½ðÌõ£©µÄÔÚÏßÁãÊÛÉÌ¡£¡£2020Äê7ÔÂ6ÈÕ£¬£¬JM Bullion·¢Ã÷ÁËÕâÒ»¿ÉÒɻ£¬£¬²¢ÔÚµÚÈý·½µÄÐÖúÏÂÕö¿ªÊӲ졣¡£¾ÊӲ죬£¬´Ó2020Äê2ÔÂ18ÈÕÖÁ7ÔÂ17ÈÕ£¬£¬¸ÃÍøÕ¾Éϱ£´æ¶ñÒâ´úÂë¿É²¶»ñÓû§ÔÚ¹ºÖÃʱÊäÈëµÄÐÅÏ¢¡£¡£´ËÊÂÎñ¿ÉÄÜй¶Á˿ͻ§µÄÐÕÃû¡¢µØµãºÍÖ§¸¶¿¨ÐÅÏ¢£¬£¬°üÀ¨Õʺš¢ÓÐÓÃÆÚºÍÇå¾²´úÂë¡£¡£¸ÃÉ̳ÇÒÑÓÚ2020Äê7ÔÂ17ÈÕÐÞ¸´¸ÃÎÊÌâ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/gold-seller-jm-bullion-hacked-to-steal-customers-credit-cards/


¾©¹«Íø°²±¸11010802024551ºÅ