GoogleÐû²¼3ÔÂAndroidÇå¾²¸üУ¬£¬ £¬£¬ £¬×ܼÆÐÞ¸´37¸öÎó²î£»£»£»£»ÂíÀ´Î÷ÑǺ½¿Õ¹«Ë¾³ÆÆä»áÔ±ÐÅÏ¢ÒÑй¶³¤´ï¾ÅÄêÖ®¾Ã

Ðû²¼Ê±¼ä 2021-03-04

1.GoogleÐû²¼3ÔÂAndroidÇå¾²¸üУ¬£¬ £¬£¬ £¬×ܼÆÐÞ¸´37¸öÎó²î


1.png


GoogleÓÚ2021Äê3ÔÂÐû²¼ÁËAndroidÇå¾²¸üУ¬£¬ £¬£¬ £¬×ܼÆÐÞ¸´ÁË37¸öÎó²î¡£ ¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖØµÄÎó²îÊÇϵͳÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-0397£©£¬£¬ £¬£¬ £¬Ó°ÏìÁËAndroid 8.1¡¢9¡¢10ºÍ11°æ±¾¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬»¹ÐÞ¸´ÁË¿ò¼ÜÖпɵ¼ÖÂÊý¾Ýй¶µÄCVE-2021-0391ºÍCVE-2021-0398Îó²î£¬£¬ £¬£¬ £¬ÒÔ¼°Ó°ÏìÁËQualcomm±ÕÔ´×é¼þµÄ¶à¸öÑÏÖØµÄÎó²î£¨CVE-2020-11192¡¢ CVE-2020-11204¡¢CVE-2020-11218¡¢CVE-2020-11227ºÍCVE-2020-11228£©µÈ¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115189/mobile-2/google-android-rce-2.html


2.SEC Consult·¢Ã÷GenuaµÄ·À»ðǽ±£´æÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


2.png


°ÂµØÀûÍøÂçÇå¾²×Éѯ¹«Ë¾SEC Consult·¢Ã÷Á˵¹úÇå¾²¹«Ë¾Genua¿ª·¢µÄ·À»ðǽװ±¸Öб£´æÑÏÖØµÄÎó²î¡£ ¡£¡£¡£¡£Genua GenugateÊÇÌìÏÂÉÏΨһ»ñµÃµÂ¹úÕþ¸®¸ß¿¹ÆÀ¼¶µÄ·À»ðǽ£¬£¬ £¬£¬ £¬Çкϱ±Ô¼ÏÞÖÆºÍÅ·Ã˵ÄRESTREINT UE/EU RESTRICTEDÊý¾ÝÇå¾²¹æÔò¡£ ¡£¡£¡£¡£¸ÃÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î±»×·×ÙΪCVE-2021-27215£¬£¬ £¬£¬ £¬Î»ÓÚ·À»ðǽµÄÖÎÀí½Ó¿Ú£¬£¬ £¬£¬ £¬Ê¹ÓøÃÎó²îºÚ¿ÍÎÞÐèÊäÈëµÇ¼ƾ֤¼´¿ÉµÇ¼µ½ÖÎÀíÔ±Ò³Ãæ³ÉΪrootÓû§£¬£¬ £¬£¬ £¬²¢¸ü¸Ä·À»ðǽÉèÖᣠ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/authentication-bypass-vulnerability-nato-eu-firewall/


3.ÂíÀ´Î÷ÑǺ½¿Õ¹«Ë¾³ÆÆä»áÔ±ÐÅÏ¢ÒÑй¶³¤´ï¾ÅÄêÖ®¾Ã


3.png


ÂíÀ´Î÷ÑǺ½¿Õ¹«Ë¾³ÆÆäEnrich³£ÓοÍÍýÏëÖлáÔ±µÄСÎÒ˽¼ÒÐÅÏ¢ÒÑй¶³¤´ï¾ÅÄêÖ®¾Ã¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÆäÊÕµ½À´×ÔµÚÈý·½ITЧÀÍÌṩÉ̵Ä֪ͨ£¬£¬ £¬£¬ £¬Ö¸³ö¸Ã¹«Ë¾ÔÚ2010Äê3ÔÂÖÁ2019Äê6ÔÂʱ´ú±¬·¢ÁËÊý¾Ýй¶£¬£¬ £¬£¬ £¬Ð¹Â¶µÄÊý¾Ý°üÀ¨»áÔ±µÄÃû³Æ¡¢ÁªÏµÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢ÐԱ𡢳£ÓοͺÅÂ롢״̬ºÍ½±ÀøÆ·¼¶¡£ ¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÊÜÓ°Ïì»áÔ±µÄ¹æÄ££¬£¬ £¬£¬ £¬¸Ã¹«Ë¾Ò²Î´Ðû²¼¸ü¶àÓйش˴ÎÊÂÎñµÄÐÅÏ¢¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/malaysia-airlines-discloses-a-nine-year-long-data-breach/


4.Êý¾ÝÆÊÎö¹«Ë¾PolecatÒòÉèÖùýʧй¶30TBÊý¾Ý


4.png


Ó¢¹úÊý¾ÝÆÊÎö¹«Ë¾PolecatÒòElasticsearchЧÀÍÆ÷ÉèÖùýʧй¶30TBÊý¾Ý¡£ ¡£¡£¡£¡£WizcaseÑо¿Ö°Ô±ÓÚ2020Äê10ÔÂ29ÈÕ·¢Ã÷ÁË̻¶µÄЧÀÍÆ÷£¬£¬ £¬£¬ £¬PolecatÓÚ11ÔÂ2ÈÕ¶ÔÆä¾ÙÐÐÁ˱£»£»£»£»¤¡£ ¡£¡£¡£¡£ÊÓ²ìÏÔʾ¸ÃЧÀÍÆ÷´æ´¢ÁË2007ÄêÖÁ½ñµÄÓªÒµ¼Í¼£¬£¬ £¬£¬ £¬°üÀ¨Ô±¹¤µÄÓû§ÃûºÍÃÜÂë¡¢Áè¼Ý65ÒÚÌõÍÆÎÄ¡¢Áè¼Ý10ÒÚÌõÌû×ÓÒÔ¼°É罻ýÌå¼Í¼¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬ £¬¸ÃÊý¾Ý¿âÓÚ2020Äê10ÔÂ30ÈÕÔâµ½ÁËMeow¹¥»÷£¬£¬ £¬£¬ £¬Êý¾Ý¿âË÷Òý±»Ì滻Ϊgg-meowºó׺£¬£¬ £¬£¬ £¬µ¼Ö´ó×ÚÊý¾Ý±»ÆÆËð¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/polecat-data-analytics-data-breach-30tb-data-exposed/


5.ºÚ¿ÍʹÓÃеĶñÒâNPMÈí¼þ°üÕë¶ÔAmazonºÍSlackµÈÓ¦ÓÃ


5.png


¿ªÔ´Çå¾²¹«Ë¾Sonatype·¢Ã÷ºÚ¿ÍʹÓÃеĶñÒâNPMÈí¼þ°üÕë¶ÔAmazon¡¢Zillow¡¢LyftºÍSlackµÈÓ¦ÓóÌÐò¡£ ¡£¡£¡£¡£ÕâÖÖ¹¥»÷ʹÓÃÁËÒÀÀµ¹ØÏµ»ìÏýµÄ·½·¨£¬£¬ £¬£¬ £¬ºÚ¿ÍʹÓÃÓ빫˾ÄÚ²¿´æ´¢¿â»ò×é¼þÏàͬµÄÃû³ÆÀ´ÃüÃûÈí¼þ°ü£¬£¬ £¬£¬ £¬²¢ÍйÜÔÚ¹«¹²´æ´¢¿â(°üÀ¨npm¡¢PyPIºÍRubyGems)ÉÏ£¬£¬ £¬£¬ £¬¶øÒÀÀµÖÎÀíÆ÷ÔÚ¹¹½¨Ó¦ÓÃʱ½«Ê¹Óù«¹²´æ´¢¿âÉϵİü£¬£¬ £¬£¬ £¬¶ø·Ç¹«Ë¾ÄÚ²¿µÄ°ü¡£ ¡£¡£¡£¡£Í¨¹ýÕâÖÖ·½·¨£¬£¬ £¬£¬ £¬ºÚ¿Í¿ÉÒÔÔÚ¹©Ó¦Á´¹¥»÷Öн«×Ô¼ºµÄ¶ñÒâ´úÂë×¢ÈëÄÚ²¿Ó¦ÓóÌÐò¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/malicious-npm-packages-target-amazon-slack-with-new-dependency-attacks/


6.Cisco TalosÐû²¼¶ñÒâÈí¼þObliqueRATµÄÆÊÎö±¨¸æ


6.png


Cisco TalosÐû²¼ÁËÓйضñÒâÈí¼þObliqueRATµÄÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£Talos×î½ü·¢Ã÷ÁËÐµĹ¥»÷»î¶¯£¬£¬ £¬£¬ £¬¸Ã»î¶¯·Ö·¢Á˶ñÒâÔ¶³Ì»á¼ûľÂí£¨RAT£©ObliqueRAT£¬£¬ £¬£¬ £¬Ö÷ÒªÕë¶ÔÄÏÑǵÄ×éÖ¯¡£ ¡£¡£¡£¡£ÔÚÒÔÍùµÄ¹¥»÷»î¶¯ÖУ¬£¬ £¬£¬ £¬ºÚ¿ÍʹÓöñÒâµÄMicrosoft OfficeÎĵµ£¨maldocs£©Èö²¥¸ÃRAT¡£ ¡£¡£¡£¡£µ«ÐµĹ¥»÷»î¶¯Ôò½«payloadÒþ²ØÔÚ°üÀ¨ÓÐZIPÎļþµÄBMPͼÏñÖУ¬£¬ £¬£¬ £¬¶ñÒâºêÈÏÕæÌáÈ¡ZIP£¬£¬ £¬£¬ £¬È»ºóÏÂÔØObliqueRAT¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/02/obliquerat-new-campaign.html