AdobeÐÞ¸´AcrobatºÍReader±»Ê¹ÓÃÎó²îCVE-2023-26369

Ðû²¼Ê±¼ä 2023-09-14

1¡¢AdobeÐÞ¸´AcrobatºÍReader±»Ê¹ÓÃÎó²îCVE-2023-26369


9ÔÂ12ÈÕ£¬ £¬ £¬£¬ £¬AdobeÒÑÐû²¼±¾ÔµÄÖܶþ²¹¶¡£¡£¡£¬ £¬ £¬£¬ £¬ÐÞ¸´ÁËAcrobatºÍReaderÖÐÒѱ»Ê¹ÓõÄÎó²î£¨CVE-2023-26369£©¡£¡£¡£ÕâÊÇÒ»¸öÔ½½çдÈëÎó²î£¬ £¬ £¬£¬ £¬ÀÖ³ÉʹÓÿÉÔÚÄ¿µÄÅÌËã»úÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐÅû¶Óйع¥»÷µÄ¸ü¶àÐÅÏ¢£¬ £¬ £¬£¬ £¬µ«½¨ÒéÓû§×îÐÒ¿÷72СʱÄÚ×°ÖøüС£¡£¡£±ðµÄ£¬ £¬ £¬£¬ £¬Adobe»¹ÐÞ¸´ÁËConnectÖеÄXSSÎó²î£¨CVE-2023-29305ºÍCVE-2023-29306£©ºÍExperience ManagerÖеÄXSSÎó²î£¨CVE-2023-38214ºÍCVE-2023-38215£©¡£¡£¡£


https://thehackernews.com/2023/09/update-adobe-acrobat-and-reader-to.html


2¡¢Microsoft TeamsЧÀÍÖÐÖ¹Ö÷ÒªÓ°Ïì±±ÃÀµØÇøµÄÓû§


¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ£¬ £¬ £¬£¬ £¬MicrosoftÕýÔÚÊӲ쵼Ö¿ͻ§ÎÞ·¨Ê¹ÓÃMicrosoft TeamsÊÕ·¢ÐÂÎŵÄÖÐÖ¹ÎÊÌâ¡£¡£¡£´Ó8µã×óÓÒ×îÏÈ£¬ £¬ £¬£¬ £¬²¿·ÖÓû§·´Ó¦ÔÚÅþÁ¬TeamsЧÀÍÆ÷»òWebÓ¦ÓÃʱÓöµ½ÁËÎÊÌâ¡£¡£¡£Î¢ÈíÏÖÔÚÒѾ­È·¶¨£¬ £¬ £¬£¬ £¬¸ÃÎÊÌâ½ö±£´æÓÚͨ¹ý±±ÃÀÊÜÓ°Ïì»ù´¡ÉèÊ©ÌṩЧÀ͵IJ¿·ÖÓû§£¬ £¬ £¬£¬ £¬ËûÃÇÕýÔÚ½«±»Ó°ÏìµÄЧÀÍÁ÷Á¿Â·Óɵ½ÎȽ¡µÄ»ù´¡ÉèÊ©£¬ £¬ £¬£¬ £¬ÒÔ¼õ»ºÓ°Ïì¡£¡£¡£×èÖ¹ÃÀ¹ú¶«²¿Ê±¼ä9ÔÂ13ÈÕ13:25£¬ £¬ £¬£¬ £¬Î¢ÈíÌåÏÖTeamsÐÂÎÅת´ïÎÊÌâÏÖÒѽâ¾ö¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-down-ongoing-outage-behind-message-failures-delays/


3¡¢GitHubÖÐÎó²î¿Éµ¼ÖÂ4ǧ¶à´æ´¢¿âÔâµ½Repojacking¹¥»÷


CheckmarxÔÚ9ÔÂ12ÈÕ³ÆÆä·¢Ã÷ÁËGitHubÖеÄÒ»¸öÐÂÎó²î£¬ £¬ £¬£¬ £¬¿ÉÄܵ¼ÖÂ4000¶à¸ö´æ´¢¿âÔâµ½Repojacking¹¥»÷¡£¡£¡£ÔÚRepoJacking¹¥»÷ÖУ¬ £¬ £¬£¬ £¬¹¥»÷Õß¿ÉÔÚÕýµ±½¨ÉèÕ߸ü¸ÄÓû§ÃûºóʹÓô洢¿âµÄ¾ÉÓû§Ãû£¬ £¬ £¬£¬ £¬È»ºóÐû²¼Í¬ÃûµÄ¶ñÒâ´æ´¢¿âÒÔÓÕÆ­Óû§ÏÂÔØÆäÄÚÈÝ¡£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÐ®ÖÆGo¡¢PHPºÍSwiftµÈÓïÑÔµÄ4000¶à¸ö´úÂë°üÒÔ¼°GitHub»î¶¯¡£¡£¡£Ñо¿Ö°Ô±ÓÚ3ÔÂ1ÈÕÅû¶Á˸ÃÎó²î£¬ £¬ £¬£¬ £¬´úÂëÍÐ¹ÜÆ½Ì¨ÒÑÓÚ9ÔÂ1ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£


https://checkmarx.com/blog/persistent-threat-new-exploit-puts-thousands-of-github-repositories-and-millions-of-users-at-risk/


4¡¢ºÚ¿ÍUSDoDÔÚ°µÍø¹ûÕæAirbusÊýǧ¼Ò¹©Ó¦É̵ÄÊý¾Ý


¾Ý9ÔÂ13ÈÕ±¨µÀ£¬ £¬ £¬£¬ £¬º½¿Õ¹«Ë¾AirbusÕýÔÚÊÓ²ìÉæ¼°3200¼Ò¹©Ó¦É̵ÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£ÃûΪUSDoDµÄºÚ¿ÍÓÚ±¾ÖÜÒ»ÔÚBreachForumsÉÏ·¢Ìû³Æ£¬ £¬ £¬£¬ £¬ËûÃÇÈëÇÖÁËÒ»ÃûÍÁ¶úÆäº½¿Õ¹«Ë¾Ô±¹¤µÄÕË»§²¢»ñµÃÁËAirbusÃÅ»§ÍøÕ¾µÄ»á¼ûȨÏÞ¡£¡£¡£»£»£»£»£»£»¹Í¸Â¶ÓµÓÐÊýǧ¼ÒAirbus¹©Ó¦É̵ÄÏêϸÐÅÏ¢£¬ £¬ £¬£¬ £¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂëºÍµç×ÓÓʼþµÈ¡£¡£¡£USDoD×Ô³ÆÊÇRansomedµÄÕýʽ³ÉÔ±£¬ £¬ £¬£¬ £¬²¢ÌåÏÖLockheed MartinºÍRaytheon¿ÉÄÜ»áÊÇÏÂÒ»¸öûĿµÄ¡£¡£¡£±ðµÄ£¬ £¬ £¬£¬ £¬¸ÃÍÅ»ïÔÚÈ¥Äê12Ô·ݻ¹Ôø³öÊÛÁËFBI¹²ÏíϵͳInfraGardµÄÊý¾Ý¿â¡£¡£¡£


https://therecord.media/airbus-data-leak-suppliers-breachedforums


5¡¢Symantec·¢Ã÷RedflyÕë¶ÔÑÇÖÞij¹ú¼ÒµçÍøµÄ¹¥»÷»î¶¯


9ÔÂ12ÈÕ£¬ £¬ £¬£¬ £¬SymantecÅû¶ÁËRedflyÕë¶ÔÑÇÖÞij¹ú¼ÒµçÍøµÄ¹¥»÷»î¶¯¡£¡£¡£¹¥»÷»î¶¯×îÔçµÄ¼£ÏóÓÚ2ÔÂ23ÈÕ±»¼Í¼£¬ £¬ £¬£¬ £¬ÆäʱShadowPadÔÚһ̨ÅÌËã»úÉÏÖ´ÐУ¬ £¬ £¬£¬ £¬ºóÓÚ5ÔÂ17ÈÕÔٴα»Ö´ÐУ¬ £¬ £¬£¬ £¬×îºóµÄ»î¶¯¼£Ïó·ºÆðÓÚ8ÔÂ3ÈÕ¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓõŤ¾ß°üÀ¨£ºÄ£¿£¿£¿£¿ £¿é»¯RAT ShadowPad£¬ £¬ £¬£¬ £¬Ëüαװ³ÉVMwareÎļþ£¬ £¬ £¬£¬ £¬Ö§³ÖÊý¾Ýй¶¡¢»÷¼ü¼Í¼¡¢ÎļþËÑË÷ÒÔ¼°Ô¶³ÌÏÂÁîÖ´ÐеÈ£»£»£»£»£»£»Packerloader£¬ £¬ £¬£¬ £¬ÓÃÓÚÔÚÄܹ»ÈƹýAV¼ì²âµÄAES¼ÓÃÜÎļþÖмÓÔØºÍÖ´ÐÐshellcode£»£»£»£»£»£»ÒÔ¼°¼üÅ̼ͼ³ÌÐò£¬ £¬ £¬£¬ £¬ÔÚÄ¿µÄϵͳÉϵÄÈÕÖ¾ÎļþÖв¶»ñ»÷¼ü¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬ £¬ £¬£¬ £¬´Ë´Î¹¥»÷ÓëAPT41£¨ÓÖÃûWinnti£©µÄ»î¶¯ÓÐÖØµþ¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/critical-infrastructure-attacks


6¡¢KasperskyÅû¶Free Download Manager¹©Ó¦Á´¹¥»÷


9ÔÂ12ÈÕ£¬ £¬ £¬£¬ £¬Kaspersky±¨¸æ³ÆFree Download Manager¹©Ó¦Á´¹¥»÷½«LinuxÓû§Öض¨Ïòµ½×°ÖÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ¶ñÒâDebianÈí¼þ°ü´æ´¢¿â¡£¡£¡£KasperskyÔÚÊÓ²ì¿ÉÒÉÓòʱ·¢Ã÷Á˸û£¬ £¬ £¬£¬ £¬ÏÖÔÚÒѾ­¾ÙÐÐÁËÈýÄê¶à¡£¡£¡£¸Ã¶ñÒâDebianÈí¼þ°üÓÃÓÚ×°ÖûùÓÚDebianµÄLinux¿¯Ðа棬 £¬ £¬£¬ £¬Ëü»á·Ö·¢Ò»¸öBashÐÅÏ¢ÇÔÈ¡¾ç±¾ºÍÒ»¸ö´ÓC2½¨Éè·´ÏòshellµÄcrondºóÃÅ¡£¡£¡£crond×é¼þÔÚϵͳÉϽ¨ÉèÒ»¸öеÄcronʹÃü£¬ £¬ £¬£¬ £¬¿ÉÔÚϵͳÆô¶¯Ê±ÔËÐÐÇÔÈ¡¾ç±¾¡£¡£¡£Ñо¿Ö°Ô±ÒÑÏòÈí¼þ¹©Ó¦ÉÌת´ïÁË´ËÊ£¬ £¬ £¬£¬ £¬µ«ÉÐδÊÕµ½»Ø¸´£¬ £¬ £¬£¬ £¬Òò´ËÈ·ÇеÄÈëÇÖ·½·¨ÈÔ²»ÇåÎú¡£¡£¡£


https://securelist.com/backdoored-free-download-manager-linux-malware/110465/