AdobeÐÞ¸´AcrobatºÍReader±»Ê¹ÓÃÎó²îCVE-2023-26369

Ðû²¼Ê±¼ä 2023-09-14

1¡¢AdobeÐÞ¸´AcrobatºÍReader±»Ê¹ÓÃÎó²îCVE-2023-26369


9ÔÂ12ÈÕ£¬£¬ £¬£¬£¬£¬AdobeÒÑÐû²¼±¾ÔµÄÖܶþ²¹¶¡£¡£¡£¬£¬ £¬£¬£¬£¬ÐÞ¸´ÁËAcrobatºÍReaderÖÐÒѱ»Ê¹ÓõÄÎó²î£¨CVE-2023-26369£©¡£¡£¡£ÕâÊÇÒ»¸öÔ½½çдÈëÎó²î£¬£¬ £¬£¬£¬£¬ÀÖ³ÉʹÓÿÉÔÚÄ¿µÄÅÌËã»úÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐÅû¶Óйع¥»÷µÄ¸ü¶àÐÅÏ¢£¬£¬ £¬£¬£¬£¬µ«½¨ÒéÓû§×îÐÒ¿÷72СʱÄÚ×°ÖøüС£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬Adobe»¹ÐÞ¸´ÁËConnectÖеÄXSSÎó²î£¨CVE-2023-29305ºÍCVE-2023-29306£©ºÍExperience ManagerÖеÄXSSÎó²î£¨CVE-2023-38214ºÍCVE-2023-38215£©¡£¡£¡£


https://thehackernews.com/2023/09/update-adobe-acrobat-and-reader-to.html


2¡¢Microsoft TeamsЧÀÍÖÐÖ¹Ö÷ÒªÓ°Ïì±±ÃÀµØÇøµÄÓû§


¾ÝýÌå9ÔÂ13ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬MicrosoftÕýÔÚÊӲ쵼Ö¿ͻ§ÎÞ·¨Ê¹ÓÃMicrosoft TeamsÊÕ·¢ÐÂÎŵÄÖÐÖ¹ÎÊÌâ¡£¡£¡£´Ó8µã×óÓÒ×îÏÈ£¬£¬ £¬£¬£¬£¬²¿·ÖÓû§·´Ó¦ÔÚÅþÁ¬TeamsЧÀÍÆ÷»òWebÓ¦ÓÃʱÓöµ½ÁËÎÊÌâ¡£¡£¡£Î¢ÈíÏÖÔÚÒѾ­È·¶¨£¬£¬ £¬£¬£¬£¬¸ÃÎÊÌâ½ö±£´æÓÚͨ¹ý±±ÃÀÊÜÓ°Ïì»ù´¡ÉèÊ©ÌṩЧÀ͵IJ¿·ÖÓû§£¬£¬ £¬£¬£¬£¬ËûÃÇÕýÔÚ½«±»Ó°ÏìµÄЧÀÍÁ÷Á¿Â·Óɵ½ÎȽ¡µÄ»ù´¡ÉèÊ©£¬£¬ £¬£¬£¬£¬ÒÔ¼õ»ºÓ°Ïì¡£¡£¡£×èÖ¹ÃÀ¹ú¶«²¿Ê±¼ä9ÔÂ13ÈÕ13:25£¬£¬ £¬£¬£¬£¬Î¢ÈíÌåÏÖTeamsÐÂÎÅת´ïÎÊÌâÏÖÒѽâ¾ö¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-down-ongoing-outage-behind-message-failures-delays/


3¡¢GitHubÖÐÎó²î¿Éµ¼ÖÂ4ǧ¶à´æ´¢¿âÔâµ½Repojacking¹¥»÷


CheckmarxÔÚ9ÔÂ12ÈÕ³ÆÆä·¢Ã÷ÁËGitHubÖеÄÒ»¸öÐÂÎó²î£¬£¬ £¬£¬£¬£¬¿ÉÄܵ¼ÖÂ4000¶à¸ö´æ´¢¿âÔâµ½Repojacking¹¥»÷¡£¡£¡£ÔÚRepoJacking¹¥»÷ÖУ¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÔÚÕýµ±½¨ÉèÕ߸ü¸ÄÓû§ÃûºóʹÓô洢¿âµÄ¾ÉÓû§Ãû£¬£¬ £¬£¬£¬£¬È»ºóÐû²¼Í¬ÃûµÄ¶ñÒâ´æ´¢¿âÒÔÓÕÆ­Óû§ÏÂÔØÆäÄÚÈÝ¡£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÐ®ÖÆGo¡¢PHPºÍSwiftµÈÓïÑÔµÄ4000¶à¸ö´úÂë°üÒÔ¼°GitHub»î¶¯¡£¡£¡£Ñо¿Ö°Ô±ÓÚ3ÔÂ1ÈÕÅû¶Á˸ÃÎó²î£¬£¬ £¬£¬£¬£¬´úÂëÍÐ¹ÜÆ½Ì¨ÒÑÓÚ9ÔÂ1ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£


https://checkmarx.com/blog/persistent-threat-new-exploit-puts-thousands-of-github-repositories-and-millions-of-users-at-risk/


4¡¢ºÚ¿ÍUSDoDÔÚ°µÍø¹ûÕæAirbusÊýǧ¼Ò¹©Ó¦É̵ÄÊý¾Ý


¾Ý9ÔÂ13ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬º½¿Õ¹«Ë¾AirbusÕýÔÚÊÓ²ìÉæ¼°3200¼Ò¹©Ó¦É̵ÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£ÃûΪUSDoDµÄºÚ¿ÍÓÚ±¾ÖÜÒ»ÔÚBreachForumsÉÏ·¢Ìû³Æ£¬£¬ £¬£¬£¬£¬ËûÃÇÈëÇÖÁËÒ»ÃûÍÁ¶úÆäº½¿Õ¹«Ë¾Ô±¹¤µÄÕË»§²¢»ñµÃÁËAirbusÃÅ»§ÍøÕ¾µÄ»á¼ûȨÏÞ¡£¡£¡£»£» £»£»£»¹Í¸Â¶ÓµÓÐÊýǧ¼ÒAirbus¹©Ó¦É̵ÄÏêϸÐÅÏ¢£¬£¬ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂëºÍµç×ÓÓʼþµÈ¡£¡£¡£USDoD×Ô³ÆÊÇRansomedµÄÕýʽ³ÉÔ±£¬£¬ £¬£¬£¬£¬²¢ÌåÏÖLockheed MartinºÍRaytheon¿ÉÄÜ»áÊÇÏÂÒ»¸öûĿµÄ¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬¸ÃÍÅ»ïÔÚÈ¥Äê12Ô·ݻ¹Ôø³öÊÛÁËFBI¹²ÏíϵͳInfraGardµÄÊý¾Ý¿â¡£¡£¡£


https://therecord.media/airbus-data-leak-suppliers-breachedforums


5¡¢Symantec·¢Ã÷RedflyÕë¶ÔÑÇÖÞij¹ú¼ÒµçÍøµÄ¹¥»÷»î¶¯


9ÔÂ12ÈÕ£¬£¬ £¬£¬£¬£¬SymantecÅû¶ÁËRedflyÕë¶ÔÑÇÖÞij¹ú¼ÒµçÍøµÄ¹¥»÷»î¶¯¡£¡£¡£¹¥»÷»î¶¯×îÔçµÄ¼£ÏóÓÚ2ÔÂ23ÈÕ±»¼Í¼£¬£¬ £¬£¬£¬£¬ÆäʱShadowPadÔÚһ̨ÅÌËã»úÉÏÖ´ÐУ¬£¬ £¬£¬£¬£¬ºóÓÚ5ÔÂ17ÈÕÔٴα»Ö´ÐУ¬£¬ £¬£¬£¬£¬×îºóµÄ»î¶¯¼£Ïó·ºÆðÓÚ8ÔÂ3ÈÕ¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓõŤ¾ß°üÀ¨£ºÄ£¿£¿£¿£¿£¿é»¯RAT ShadowPad£¬£¬ £¬£¬£¬£¬Ëüαװ³ÉVMwareÎļþ£¬£¬ £¬£¬£¬£¬Ö§³ÖÊý¾Ýй¶¡¢»÷¼ü¼Í¼¡¢ÎļþËÑË÷ÒÔ¼°Ô¶³ÌÏÂÁîÖ´Ðеȣ»£» £»£»£»Packerloader£¬£¬ £¬£¬£¬£¬ÓÃÓÚÔÚÄܹ»ÈƹýAV¼ì²âµÄAES¼ÓÃÜÎļþÖмÓÔØºÍÖ´ÐÐshellcode£»£» £»£»£»ÒÔ¼°¼üÅ̼ͼ³ÌÐò£¬£¬ £¬£¬£¬£¬ÔÚÄ¿µÄϵͳÉϵÄÈÕÖ¾ÎļþÖв¶»ñ»÷¼ü¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬ £¬£¬£¬£¬´Ë´Î¹¥»÷ÓëAPT41£¨ÓÖÃûWinnti£©µÄ»î¶¯ÓÐÖØµþ¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/critical-infrastructure-attacks


6¡¢KasperskyÅû¶Free Download Manager¹©Ó¦Á´¹¥»÷


9ÔÂ12ÈÕ£¬£¬ £¬£¬£¬£¬Kaspersky±¨¸æ³ÆFree Download Manager¹©Ó¦Á´¹¥»÷½«LinuxÓû§Öض¨Ïòµ½×°ÖÃÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄ¶ñÒâDebianÈí¼þ°ü´æ´¢¿â¡£¡£¡£KasperskyÔÚÊÓ²ì¿ÉÒÉÓòʱ·¢Ã÷Á˸û£¬£¬ £¬£¬£¬£¬ÏÖÔÚÒѾ­¾ÙÐÐÁËÈýÄê¶à¡£¡£¡£¸Ã¶ñÒâDebianÈí¼þ°üÓÃÓÚ×°ÖûùÓÚDebianµÄLinux¿¯Ðа棬£¬ £¬£¬£¬£¬Ëü»á·Ö·¢Ò»¸öBashÐÅÏ¢ÇÔÈ¡¾ç±¾ºÍÒ»¸ö´ÓC2½¨Éè·´ÏòshellµÄcrondºóÃÅ¡£¡£¡£crond×é¼þÔÚϵͳÉϽ¨ÉèÒ»¸öеÄcronʹÃü£¬£¬ £¬£¬£¬£¬¿ÉÔÚϵͳÆô¶¯Ê±ÔËÐÐÇÔÈ¡¾ç±¾¡£¡£¡£Ñо¿Ö°Ô±ÒÑÏòÈí¼þ¹©Ó¦ÉÌת´ïÁË´ËÊ£¬£¬ £¬£¬£¬£¬µ«ÉÐδÊÕµ½»Ø¸´£¬£¬ £¬£¬£¬£¬Òò´ËÈ·ÇеÄÈëÇÖ·½·¨ÈÔ²»ÇåÎú¡£¡£¡£


https://securelist.com/backdoored-free-download-manager-linux-malware/110465/