GoogleÐû²¼3ÔÂAndroidÇå¾²¸üУ¬£¬£¬×ܼÆÐÞ¸´37¸öÎó²î£»£»£»£»£»£»ÂíÀ´Î÷ÑǺ½¿Õ¹«Ë¾³ÆÆä»áÔ±ÐÅÏ¢ÒÑй¶³¤´ï¾ÅÄêÖ®¾Ã

Ðû²¼Ê±¼ä 2021-03-04

1.GoogleÐû²¼3ÔÂAndroidÇå¾²¸üУ¬£¬£¬×ܼÆÐÞ¸´37¸öÎó²î


1.png


GoogleÓÚ2021Äê3ÔÂÐû²¼ÁËAndroidÇå¾²¸üУ¬£¬£¬×ܼÆÐÞ¸´ÁË37¸öÎó²î¡£¡£¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖØµÄÎó²îÊÇϵͳÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-0397£©£¬£¬£¬Ó°ÏìÁËAndroid 8.1¡¢9¡¢10ºÍ11°æ±¾¡£¡£¡£±ðµÄ£¬£¬£¬»¹ÐÞ¸´ÁË¿ò¼ÜÖпɵ¼ÖÂÊý¾Ýй¶µÄCVE-2021-0391ºÍCVE-2021-0398Îó²î£¬£¬£¬ÒÔ¼°Ó°ÏìÁËQualcomm±ÕÔ´×é¼þµÄ¶à¸öÑÏÖØµÄÎó²î£¨CVE-2020-11192¡¢ CVE-2020-11204¡¢CVE-2020-11218¡¢CVE-2020-11227ºÍCVE-2020-11228£©µÈ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115189/mobile-2/google-android-rce-2.html


2.SEC Consult·¢Ã÷GenuaµÄ·À»ðǽ±£´æÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


2.png


°ÂµØÀûÍøÂçÇå¾²×Éѯ¹«Ë¾SEC Consult·¢Ã÷Á˵¹úÇå¾²¹«Ë¾Genua¿ª·¢µÄ·À»ðǽװ±¸Öб£´æÑÏÖØµÄÎó²î¡£¡£¡£Genua GenugateÊÇÌìÏÂÉÏΨһ»ñµÃµÂ¹úÕþ¸®¸ß¿¹ÆÀ¼¶µÄ·À»ðǽ£¬£¬£¬Çкϱ±Ô¼ÏÞÖÆºÍÅ·Ã˵ÄRESTREINT UE/EU RESTRICTEDÊý¾ÝÇå¾²¹æÔò¡£¡£¡£¸ÃÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î±»×·×ÙΪCVE-2021-27215£¬£¬£¬Î»ÓÚ·À»ðǽµÄÖÎÀí½Ó¿Ú£¬£¬£¬Ê¹ÓøÃÎó²îºÚ¿ÍÎÞÐèÊäÈëµÇ¼ƾ֤¼´¿ÉµÇ¼µ½ÖÎÀíÔ±Ò³Ãæ³ÉΪrootÓû§£¬£¬£¬²¢¸ü¸Ä·À»ðǽÉèÖᣡ£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/authentication-bypass-vulnerability-nato-eu-firewall/


3.ÂíÀ´Î÷ÑǺ½¿Õ¹«Ë¾³ÆÆä»áÔ±ÐÅÏ¢ÒÑй¶³¤´ï¾ÅÄêÖ®¾Ã


3.png


ÂíÀ´Î÷ÑǺ½¿Õ¹«Ë¾³ÆÆäEnrich³£ÓοÍÍýÏëÖлáÔ±µÄСÎÒ˽¼ÒÐÅÏ¢ÒÑй¶³¤´ï¾ÅÄêÖ®¾Ã¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖÆäÊÕµ½À´×ÔµÚÈý·½ITЧÀÍÌṩÉ̵Ä֪ͨ£¬£¬£¬Ö¸³ö¸Ã¹«Ë¾ÔÚ2010Äê3ÔÂÖÁ2019Äê6ÔÂʱ´ú±¬·¢ÁËÊý¾Ýй¶£¬£¬£¬Ð¹Â¶µÄÊý¾Ý°üÀ¨»áÔ±µÄÃû³Æ¡¢ÁªÏµÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢ÐԱ𡢳£ÓοͺÅÂ롢״̬ºÍ½±ÀøÆ·¼¶¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÊÜÓ°Ïì»áÔ±µÄ¹æÄ££¬£¬£¬¸Ã¹«Ë¾Ò²Î´Ðû²¼¸ü¶àÓйش˴ÎÊÂÎñµÄÐÅÏ¢¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/malaysia-airlines-discloses-a-nine-year-long-data-breach/


4.Êý¾ÝÆÊÎö¹«Ë¾PolecatÒòÉèÖùýʧй¶30TBÊý¾Ý


4.png


Ó¢¹úÊý¾ÝÆÊÎö¹«Ë¾PolecatÒòElasticsearchЧÀÍÆ÷ÉèÖùýʧй¶30TBÊý¾Ý¡£¡£¡£WizcaseÑо¿Ö°Ô±ÓÚ2020Äê10ÔÂ29ÈÕ·¢Ã÷ÁË̻¶µÄЧÀÍÆ÷£¬£¬£¬PolecatÓÚ11ÔÂ2ÈÕ¶ÔÆä¾ÙÐÐÁ˱£»£»£»£»£»£»¤¡£¡£¡£ÊÓ²ìÏÔʾ¸ÃЧÀÍÆ÷´æ´¢ÁË2007ÄêÖÁ½ñµÄÓªÒµ¼Í¼£¬£¬£¬°üÀ¨Ô±¹¤µÄÓû§ÃûºÍÃÜÂë¡¢Áè¼Ý65ÒÚÌõÍÆÎÄ¡¢Áè¼Ý10ÒÚÌõÌû×ÓÒÔ¼°É罻ýÌå¼Í¼¡£¡£¡£±ðµÄ£¬£¬£¬¸ÃÊý¾Ý¿âÓÚ2020Äê10ÔÂ30ÈÕÔâµ½ÁËMeow¹¥»÷£¬£¬£¬Êý¾Ý¿âË÷Òý±»Ì滻Ϊgg-meowºó׺£¬£¬£¬µ¼Ö´ó×ÚÊý¾Ý±»ÆÆË𡣡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/polecat-data-analytics-data-breach-30tb-data-exposed/


5.ºÚ¿ÍʹÓÃеĶñÒâNPMÈí¼þ°üÕë¶ÔAmazonºÍSlackµÈÓ¦ÓÃ


5.png


¿ªÔ´Çå¾²¹«Ë¾Sonatype·¢Ã÷ºÚ¿ÍʹÓÃеĶñÒâNPMÈí¼þ°üÕë¶ÔAmazon¡¢Zillow¡¢LyftºÍSlackµÈÓ¦ÓóÌÐò¡£¡£¡£ÕâÖÖ¹¥»÷ʹÓÃÁËÒÀÀµ¹ØÏµ»ìÏýµÄ·½·¨£¬£¬£¬ºÚ¿ÍʹÓÃÓ빫˾ÄÚ²¿´æ´¢¿â»ò×é¼þÏàͬµÄÃû³ÆÀ´ÃüÃûÈí¼þ°ü£¬£¬£¬²¢ÍйÜÔÚ¹«¹²´æ´¢¿â(°üÀ¨npm¡¢PyPIºÍRubyGems)ÉÏ£¬£¬£¬¶øÒÀÀµÖÎÀíÆ÷ÔÚ¹¹½¨Ó¦ÓÃʱ½«Ê¹Óù«¹²´æ´¢¿âÉϵİü£¬£¬£¬¶ø·Ç¹«Ë¾ÄÚ²¿µÄ°ü¡£¡£¡£Í¨¹ýÕâÖÖ·½·¨£¬£¬£¬ºÚ¿Í¿ÉÒÔÔÚ¹©Ó¦Á´¹¥»÷Öн«×Ô¼ºµÄ¶ñÒâ´úÂë×¢ÈëÄÚ²¿Ó¦ÓóÌÐò¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/malicious-npm-packages-target-amazon-slack-with-new-dependency-attacks/


6.Cisco TalosÐû²¼¶ñÒâÈí¼þObliqueRATµÄÆÊÎö±¨¸æ


6.png


Cisco TalosÐû²¼ÁËÓйضñÒâÈí¼þObliqueRATµÄÆÊÎö±¨¸æ¡£¡£¡£Talos×î½ü·¢Ã÷ÁËÐµĹ¥»÷»î¶¯£¬£¬£¬¸Ã»î¶¯·Ö·¢Á˶ñÒâÔ¶³Ì»á¼ûľÂí£¨RAT£©ObliqueRAT£¬£¬£¬Ö÷ÒªÕë¶ÔÄÏÑǵÄ×éÖ¯¡£¡£¡£ÔÚÒÔÍùµÄ¹¥»÷»î¶¯ÖУ¬£¬£¬ºÚ¿ÍʹÓöñÒâµÄMicrosoft OfficeÎĵµ£¨maldocs£©Èö²¥¸ÃRAT¡£¡£¡£µ«ÐµĹ¥»÷»î¶¯Ôò½«payloadÒþ²ØÔÚ°üÀ¨ÓÐZIPÎļþµÄBMPͼÏñÖУ¬£¬£¬¶ñÒâºêÈÏÕæÌáÈ¡ZIP£¬£¬£¬È»ºóÏÂÔØObliqueRAT¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2021/02/obliquerat-new-campaign.html