ºÚ¿Í×éÖ¯TeamTNTʹÓüÓÃÜÈ䳿ÇÔÈ¡AWSƾ֤£»£»£»£»£»TinyMCE±à¼Æ÷±£´æÑÏÖØµÄXSSÎó²î£¬£¬£¬£¬£¬£¬£¬ÏÖÒÑÐÞ¸´
Ðû²¼Ê±¼ä 2020-08-18
TeamTNTÊÇÒ»¸öÕë¶ÔDocker×°ÖõÄÍøÂç·¸·¨×éÖ¯£¬£¬£¬£¬£¬£¬£¬»òÐíΪµÚÒ»¸öʹÓþßÓÐÇÔÈ¡AWSƾ֤¹¦Ð§µÄ¼ÓÃÜÍÚ¾ò¶ñÒâÈí¼þµÄ×éÖ¯¡£¡£¡£¡£¡£¡£Trend Micro½ñÄêÔçЩʱ¼ä·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯´Ó4ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÔÚ»¥ÁªÍøÉÏɨÃèÉèÖùýʧµÄDockerϵͳ»á¼û̻¶µÄAPI£¬£¬£¬£¬£¬£¬£¬²¢ÔÚDocker°²ÅÅЧÀÍÆ÷À´ÔËÐÐDDoSºÍ¼ÓÃܶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷Ëû»¹¿ÉÒÔɨÃèÔËÐÐÔÚAWS»ù´¡¼Ü¹¹ÉÏЧÀÍÆ÷ÖÐµÄ ~/.aws/credentials and ~/.aws/configÎļþ£¬£¬£¬£¬£¬£¬£¬À´»ñÈ¡Amazon Web Services£¨AWS£©Æ¾Ö¤¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/crypto-mining-worm-steal-aws-credentials/
2.TinyMCE±à¼Æ÷±£´æÑÏÖØµÄXSSÎó²î£¬£¬£¬£¬£¬£¬£¬ÏÖÒÑÐÞ¸´

TinyMCΪTiny Technologies¹«Ë¾¿ª·¢µÄWYSIWYG HTML±à¼Æ÷£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚ±»·¢Ã÷±£´æÑÏÖØµÄXSSÎó²î£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˰汾5.2.1ºÍ¸üÔç°æ±¾¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-12648£¬£¬£¬£¬£¬£¬£¬¿É±»¹¥»÷ÕßʹÓÃͨ¹ýÌØÖÆHTML±ê¼ÇÈÆ¹ýɱ¶¾Èí¼þ¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÒÔʹ¹¥»÷ÕßÌáÉýÌØÈ¨¡¢»ñÊØÐÅÏ¢¡¢ÉõÖÁÐ®ÖÆÄ¿µÄÓû§µÄÕÊ»§¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÔÚ2020Äê4ÔÂ7ÈÕ±»·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬£¬ÒÔºóÆäÉú²úÉÌÐû²¼Á˲¹¶¡³ÌÐò£¬£¬£¬£¬£¬£¬£¬²¢ÓÚ±¾ÖܹûÕæÅû¶¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/high-severity-tinymce-cross-site-scripting-flaw-fixed/158306/
3.Windows Defender½«Citrix×é¼þ±ê¼ÇΪ¶ñÒâÈí¼þ²¢Îóɾ

Windows Defender½«CitrixÊðÀíЧÀÍ£¨BrokerService.exeºÍHighAvailabilityService.exe£©¹ýʧµØ¼ì²âΪÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þAgent Tesla£¬£¬£¬£¬£¬£¬£¬²¢¶ÔÆä¾ÙÐиôÀë¡£¡£¡£¡£¡£¡£ÉÏÖÜËÄ£¬£¬£¬£¬£¬£¬£¬¶àλCitrixϵͳÖÎÀíÔ±±¨¸æÁËDelivery ControllerÉϵÄÊðÀíЧÀÍ·ºÆðÁ˹ÊÕÏ£¬£¬£¬£¬£¬£¬£¬¸ÃÎÊÌâÒ»Á¬ÁË7¸ö¶àСʱ£¬£¬£¬£¬£¬£¬£¬Ö±µ½Î¢ÈíÍÆ³öɱ¶¾Èí¼þ1.321.1341.0°æ±¾¡£¡£¡£¡£¡£¡£Citrix ½¨ÒéÊÜÓ°ÏìµÄÖÎÀíÔ±Á¬Ã¦É¨³ýÄ¿½ñ»º´æ²¢×°ÖøüÐÂÒÔ½â¾ö¸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/windows-defender-deletes-citrix-components-mislabeled-as-malware/
4.SANSÐû²¼ÆäÔâµ½µÄ´¹ÂÚ¹¥»÷µÄIOC¼°¹¥»÷ϸ½Ú

SANSÐû²¼ÆäÔâµ½µÄ´¹ÂÚ¹¥»÷µÄΣº¦Ö¸±ê£¨IOC£©¼°¹¥»÷ϸ½Ú¡£¡£¡£¡£¡£¡£Æ¾Ö¤SANSµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬×î³õµÄ¹¥»÷ʼÓÚð³äΪSANS SharePointЧÀ͹²ÏíµÄÎļþÍøÂç´¹ÂÚµç×ÓÓʼþ¡£¡£¡£¡£¡£¡£¸ÃÓʼþ°üÀ¨ÖøÃûΪ7Ô½±½ð¸±±¾24JUL2020.xlsµÄ¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬£¬²¢ÒªÇóÓû§µã»÷·¿ª°´Å¥ÒÔ»á¼û¸ÃÎļþ¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬£¬Óû§»á±»Öض¨Ïòµ½´¹ÂÚÍøÒ³²¢±»ÒªÇóÊäÈëOffice 365ƾ֤£¬£¬£¬£¬£¬£¬£¬Í¬Ê±×°ÖÃÃûΪEnable4ExcelµÄMicrosoft Office OAuth²å¼þ¡£¡£¡£¡£¡£¡£×°Öòå¼þºó»á½¨ÉèÃûΪ·´À¬»øÓʼþ¹æÔòµÄת·¢¹æÔò£¬£¬£¬£¬£¬£¬£¬À´¼àÊÓÌØ¶¨µÄÒªº¦×Ö¡£¡£¡£¡£¡£¡£Ò»µ©¼ì²âµ½Æ¥ÅäµÄÒªº¦×Ö£¬£¬£¬£¬£¬£¬£¬Ôò¸Ãµç×ÓÓʼþ½«±»×ª·¢µ½ÍⲿµØµã daemon[@]daemongr5yenh53ci0w6cjbbh1gy1l61fxpd.com¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/sans-shares-details-on-attack-that-led-to-their-data-breach/
5.Õë¶ÔÓ¢¹ú³¬ÊÐAsdaµÄ´¹ÂÚ¹¥»÷ÇÔÈ¡Óû§ÐÅÓÿ¨ÐÅÏ¢

ºÚ¿ÍʹÓÃFacebookºÍTwitterÌᳫÓã¹¥»÷£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÓ¢¹ú³¬ÊÐAsdaµÄÓû§£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÆäÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£¡£ºÚ¿ÍÊ×ÏÈÔÚÍøÕ¾Ðû²¼¹ã¸æ£¬£¬£¬£¬£¬£¬£¬ÎªÊ®Ô³öÉúµÄ¸¾Å®Ãâ·ÑÌṩ1000Ó¢°÷µÄÀñÎ│¡£¡£¡£¡£¡£¡£µã»÷¸Ã¹ã¸æÁ´½ÓµÄÊܺ¦Õß»á±»ÖØ¶¨Ïòµ½Î±×°³É³¬ÊйÙÍøµÄ¶ñÒâÍøÕ¾£¬£¬£¬£¬£¬£¬£¬²¢±»ÒªÇóÊäÈëÆäСÎÒ˽¼ÒÏêϸÐÅÏ¢ÒÔ»ñÈ¡ÀñÎ│£¬£¬£¬£¬£¬£¬£¬°üÀ¨°üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢ÊÖ»úºÅÂë¡¢ÒøÐÐÕÊ»§ÏêϸÐÅÏ¢ºÍÒøÐп¨Çå¾²ºÅ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/phishing-scam-targets-asda-shoppers/
6.¿ÂÄῨÃÀÄÜ´ïϵͳѬȾÀÕË÷Èí¼þEXXÖÂÍ£»£»£»£»£»úÒ»ÖÜ

ÉÌÒµÊÖÒÕ¹«Ë¾¿ÂÄῨÃÀÄܴKonica Minolta£©µÄϵͳÔÚ7ÔÂβѬȾÀÕË÷Èí¼þEXX£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÍ£»£»£»£»£»ú½üÒ»ÖÜ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌṩÖÖÖÖЧÀͺͲúÆ·£¬£¬£¬£¬£¬£¬£¬´Ó´òÓ¡½â¾ö¼Æ»®¡¢Ò½ÁÆÊÖÒÕµ½ÎªÆóÒµÌṩÍйÜITЧÀÍ¡£¡£¡£¡£¡£¡£2020Äê7ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬£¬¹«Ë¾¿Í»§×îÏÈ·´Ó¦ÆäÎÞ·¨»á¼û¿ÂÄῨÃÀÄÜ´ïµÄ¹ÙÍø£¬£¬£¬£¬£¬£¬£¬¶øÄ³Ð©Konica Minolta´òÓ¡»úÒ²ÏÔʾЧÀÍ֪ͨʧ°ÜµÄ¹ýʧ¡£¡£¡£¡£¡£¡£ÓÐÐÂÎÅȪԴ³Æ£¬£¬£¬£¬£¬£¬£¬Konica MinoltaÔâµ½ÁËÀÕË÷Èí¼þEXXµÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Æä×°±¸Ò²Òѱ»¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬²¢±»Ìí¼ÓÀ©Õ¹Ãû.K0N1M1N0¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/business-technology-giant-konica-minolta-hit-by-new-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ