KaseyaÇå¾²¸üÐÂÐÞ¸´REvilÔÚ¹©Ó¦Á´¹¥»÷ÖÐÓõÄ0day£»£»£»£»£»Ð¶ñÒâÈí¼þBIOPASSʹÓÃÖ±²¥Ó¦ÓÃOBSÂ¼ÖÆÄ¿µÄµÄÆÁÄ»
Ðû²¼Ê±¼ä 2021-07-13
KaseyaÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´REvilÔÚ¹©Ó¦Á´¹¥»÷ÖÐÓõÄ0day¡£¡£¡£¡£4Ô£¬£¬£¬£¬ºÉÀ¼Îó²îÅû¶Ñо¿Ëù (DIVD)Åû¶ÁËKaseyaµÄ7¸öÎó²î¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬Kaseya¶ÔÆäVSA SaaSЧÀÍÉϵĴ󲿷ÖÎó²îÐû²¼Á˲¹¶¡£¡£¡£¡£¬£¬£¬£¬µ«ÉÐδÍê³ÉÄÚ²¿°æ±¾VSAµÄ²¹¶¡¡£¡£¡£¡£¶øREvilÍÅ»ïÏÈÒ»²½Ê¹ÓÃÁËÕâЩÎó²î£¬£¬£¬£¬ÓÚ7ÔÂ2ÈÕ¶ÔԼĪ60¸öMSPºÍ1500¼ÒÆóÒµ¿Í»§ÌᳫÁË´ó¹æÄ£¹¥»÷¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬KaseyaÐû²¼ÁËVSA 9.5.7a (9.5.7.2994) ¸üÐÂÒÔÐÞ¸´REvilʹÓõÄÎó²î£¬£¬£¬£¬°üÀ¨CVE-2021-30116¡¢CVE-2021-30119ºÍCVE-2021-30120µÈ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/kaseya-patches-vsa-vulnerabilities-used-in-revil-ransomware-attack/
2.жñÒâÈí¼þBIOPASSʹÓÃÖ±²¥Ó¦ÓÃOBSÂ¼ÖÆÄ¿µÄµÄÆÁÄ»

Çå¾²¹«Ë¾Ç÷ÊÆ¿Æ¼¼·¢Ã÷жñÒâÈí¼þBIOPASSʹÓÃÖ±²¥Ó¦ÓÃOBSÂ¼ÖÆÄ¿µÄÅÌËã»úµÄÆÁÄ»¡£¡£¡£¡£BIOPASSÊÇÓÃPython±àдµÄÔ¶³Ì»á¼ûľÂí (RAT)£¬£¬£¬£¬ÔÚ×î½üÕë¶ÔÔÚÏ߶IJ©¹«Ë¾µÄ¹¥»÷Öб»·¢Ã÷£¬£¬£¬£¬±»Òþ²ØÔÚÕýµ±µÄAdobe Flash Player»òMicrosoft SilverlightµÄ×°ÖóÌÐòÖС£¡£¡£¡£BIOPASS RAT¾ßÓÐÔÚÆäËû¶ñÒâÈí¼þµÄ»ù±¾¹¦Ð§£¬£¬£¬£¬µ«ÉÐÓÐÒ»Ïîй¦Ð§£¬£¬£¬£¬¼´ÔÚÄ¿µÄϵͳÉÏ×°ÖÃOBS StudioÈí¼þ£¬£¬£¬£¬²¢Ê¹ÓøÃÈí¼þµÄ RTMP£¨ÊµÊ±ÐÂÎÅת´ïÐÒ飩Á÷ýÌ幦ЧÀ´Â¼ÖÆÓû§µÄÆÁÄ»²¢½«Æä¹ã²¥µ½¹¥»÷ÕߵĿØÖÆÌ¨¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://therecord.media/malware-abuses-obs-live-streaming-software-to-record-victims-screens/
3.ÃÀ¹úÏðÊ÷ÁëÒøÐÐ֪ͨÆä¿Í»§ÒòÍøÂç¹¥»÷СÎÒ˽¼ÒÐÅϢй¶

ÃÀ¹úÏðÊ÷ÁëÒøÐУ¨Bank Of Oak Ridge£©ÓÚ7ÔÂ9ÈÕÐÇÆÚÎå֪ͨÆä¿Í»§ÒòÍøÂç¹¥»÷СÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¸ÃÒøÐÐ³ÆÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬µ¼ÖÂÒøÐеIJ¿·ÖЧÀÍÔÝʱÖÐÖ¹£¬£¬£¬£¬¾ÊӲ췢Ã÷ÉÐÓÐδ¾ÊÚȨµÄ¹¥»÷Õß»á¼ûÁËÆäϵͳ¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚ4ÔÂ26ÈÕºÍ4ÔÂ27ÈÕ£¬£¬£¬£¬ÔÚ2009Äê9ÔÂ30ÈÕ֮ǰ¿ªÉèÕË»§µÄºã¾Ã¿Í»§µÄÐÅÏ¢¿ÉÄÜÒѾй¶£¬£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕʺš¢³öÉúÈÕÆÚºÍ¼ÝʻִÕÕºÅÂëµÈ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.rhinotimes.com/featured-article/hackers-steal-critical-customer-data-from-bank-of-oak-ridge/
4.CISAÖÒÑÔForgeRock»á¼ûÖÎÀíÖÐÒѱ»Ê¹ÓõÄRECÎó²î

CISAÖÒÑÔ¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃForgeRock»á¼ûÖÎÀí(AM)ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î (CVE-2021-35464)¡£¡£¡£¡£ForgeRock»á¼ûÖÎÀíÊÇÒ»¸ö»ùÓÚ¿ªÔ´»á¼ûÖÎÃ÷È·¾ö¼Æ»®OpenAMµÄÉÌÒµ¿ª·Å»á¼ûÖÎÀíµÄ½â¾ö¼Æ»®¡£¡£¡£¡£Ê¹ÓôËÎó²îµÄ¹¥»÷Õß¿ÉÒÔÔÚÄ¿½ñÓû§µÄϵͳÖÐÖ´ÐÐÏÂÁ£¬£¬£¬Ó°ÏìÁËAM°æ±¾6.0.0.x¡¢6.5.0.x¡¢6.5.1¡¢6.5.2.xºÍ6.5.3¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸Ã¹«Ë¾ÒÑÐû²¼ÁËÕë¶Ô¸ÃÎó²îµÄ»º½â²½·¥¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2021/07/12/critical-forgerock-access-management-vulnerability
5.Security CompassÐû²¼2021ÄêÍþв½¨Ä£µÄÌ¬ÊÆ±¨¸æ

Security CompassÐû²¼ÁË2021ÄêÍþв½¨Ä£Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã±¨¸æÖ¼ÔÚÏàʶÍþв½¨Ä£µÄÄ¿½ñÌ¬ÊÆ£¬£¬£¬£¬ÒÔ¼°´óÐÍÆóÒµÔÚ¹¹½¨ºÍ°²ÅÅÓ¦ÓóÌÐòʱÓöµ½µÄÌôÕ½¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬Ö»ÓÐ25%µÄÊÜ·ÃÕßÌåÏÖËûÃǵÄ×éÖ¯ÔÚÈí¼þ¿ª·¢µÄÐèÇóÍøÂçºÍÉè¼ÆÔçÆÚ½×¶Î¾ÙÐÐÁËÍþв½¨Ä££¬£¬£¬£¬²»µ½10%µÄÊÜ·ÃÕßÌåÏÖËûÃǶÔ90%Ö®ÉϵÄÓ¦ÓþÙÐÐÁËÍþв½¨Ä£¡£¡£¡£¡£¿ÉÊÇÓÉÓÚCOVID-19£¬£¬£¬£¬Áè¼Ý80%µÄ×éÖ¯²»µÃ²î³ØÆäÍøÂçÇå¾²²½·¥¾ÙÐиı䡣¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://resources.securitycompass.com/research/2021-state-of-threatmodeling
6.BetterCloudÐû²¼2021ÄêÎļþÇå¾²µÄΣº¦ÆÊÎö±¨¸æ

BetterCloudÐû²¼ÁË2021ÄêÎļþÇå¾²µÄΣº¦ÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã±¨¸æÊÓ²ìÁË500¶àÃûITºÍÇå¾²Ö°Ô±ÒÔÏàʶµ±½ñSaaSÎļþÇå¾²¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬½üÒ»°ëµÄ×éÖ¯ÌåÏÖËûÃÇ×îÌåÌùµÄÇå¾²ÎÊÌâÊDz»ÖªµÀÃô¸ÐÊý¾ÝµÄλÖ㻣»£»£»£»Áè¼Ý70%µÄ×éÖ¯ÌåÏÖ×î´óµÄÊý¾Ýй¶Σº¦ÊÇÔ±¹¤£»£»£»£»£»Ö»ÓÐ35%µÄÊÜ·ÃÕßÏàÐÅÖÕ¶ËÓû§»áÈÏÕæÈεطÖÏíºÍ´æ´¢¹«Ë¾Êý¾Ý¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬2021ÄêËæ×ÅÈ«ÇòÓªÒµµÄ»Ö¸´£¬£¬£¬£¬ÎļþÇå¾²ÊÂÎñìÉýÁË134%¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bettercloud.com/monitor/file-security-report-2021/


¾©¹«Íø°²±¸11010802024551ºÅ