每日安全资讯-2020.11.25

声明:本文所有内容仅用于学习和研究目的,且不能违反《网络安全法》、《刑法》等相关要求,尤其禁止传播,或用于非善良目的。您查看本文,即视为遵守以上约定,否则责任自负。

今日导读:掘金行动目标瞄准前沿科技行业、H2Miner新变种,利用Redis高危漏洞入侵云服务器挖矿、详细介绍SaltStack Salt命令注入漏洞、攻击SCADA第二部分-Schneider Electric EcoStruxure Machine Expert和M221 PLC中的漏洞等。

【病毒区】
1、the Banker Trojan BBtok Active in Mexico

2、掘金行动(Operation Gold Hunting) – 目标瞄准前沿科技行业
https://xz.aliyun.com/t/8536

3、H2Miner新变种,利用Redis高危漏洞入侵云服务器挖矿
http://cp0.win/myblog/usercenter/edit/1226

【漏洞分析区】
4、Detailing SaltStack Salt Command Injection Vulnerabilities

5、CVE-2020-7378: OpenCRX Unverified Password Change (FIXED)

6、WebLogic UniversalExtrac tor 反序列化漏洞(CVE-2020-14645)的复现和分析
https://www.anquanke.com/post/id/223445

【技术分享区】
7、Attacking SCADA Part II: Vulnerabilities in Schneider Electric EcoStruxure Machine Expert and M221 PLC
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/attacking-scada-part-ii-vulnerabilities-in-schneider-electric-ecostruxure-machine-expert-and-m221-plc/

8、how .NET DLL exports work behind the scenes, and how we can use the portal created to invoke managed code
https://blog.xpnsec.com/the-net-export-portal/

2 1