¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180912

Ðû²¼Ê±¼ä 2018-09-12
1¡¢Ñо¿»ú¹¹½«Ó¢¹úº½¿Õ¹«Ë¾µÄÊý¾Ýй¶ÊÂÎñ¹éÒòÓÚ·¸·¨¼¯ÍÅMagecart

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

ƾ֤RiskIQµÄÑо¿£¬£¬Ó¢¹úº½¿Õ¹«Ë¾Êý¾Ýй¶ÊÂÎñµÄ±³ºóÊÇ·¸·¨¼¯ÍÅMageCart¡£¡£¡£¡£MageCart×Ô2015ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬Ö÷ÒªÕë¶Ôµç×ÓÉÌÎñÍøÕ¾£¬£¬ÇÔÈ¡Óû§µÄÒøÐп¨ÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£Æ¾Ö¤RiskIQµÄ˵·¨£¬£¬MageCart¶ÔÓ¢¹úº½¿Õ¹«Ë¾¾ÙÐÐÁËÕë¶ÔÐÔ¹¥»÷£¬£¬²¢Ê¹ÓÃÁ˶¨ÖƵľ籾ºÍרÓõĻù´¡ÉèÊ©¡£¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎúMageCartÔõÑùÔÚÓ¢¹úº½¿Õ¹«Ë¾µÄÍøÕ¾ÉÏ×¢Èë¶ñÒâ´úÂë¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/labs/magecart-british-airways-breach/

2¡¢Ñо¿Ö°Ô±·¢Ã÷Ð®ÖÆÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Çå¾²Ñо¿Ö°Ô±Troy Mursch·¢Ã÷Ò»¸öʹÓÃÎó²î£¨CVE-2018-14847£©Ð®ÖÆMikroTik·ÓÉÆ÷¾ÙÐÐÍÚ¿óµÄ¹¥»÷»î¶¯¡£¡£¡£¡£ËäÈ»¸Ã·ÓÉÆ÷µÄ³§ÉÌÒÑÔÚ4Ô·ÝÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡£¬£¬µ«ÈÔÓв¿·ÖÓû§Ã»ÓоÙÐÐÉý¼¶¡£¡£¡£¡£Æ¾Ö¤Mursch±¨¸æµÄÍÚ¿ó¾ç±¾£¬£¬ÔÚShodanÉÏ¿ÉËÑË÷µ½3734¸öMikroTik×°±¸¡£¡£¡£¡£´ó´ó¶¼ÊÜѬȾµÄ×°±¸¶¼¼¯ÖÐÔÚÄÏÃÀÖÞ£¬£¬Ö÷ÒªÊǰÍÎ÷£¨2612£©ºÍ°¢¸ùÍ¢£¨480£©¡£¡£¡£¡£¸ÃÍÚ¿ó¾ç±¾½«MikroTik·ÓÉÆ÷µÄCPUʹÓÃÂÊÔöÌíµ½80%²¢Ò»Á¬¾ÙÐÐÍڿ󡣡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/over-3-700-mikrotik-routers-abused-in-cryptojacking-campaigns/

3¡¢Ñо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíKRONOSµÄбäÌåOsiris

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

2018Äê7ÔÂSecuronixÑо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíKRONOSµÄбäÌåOsiris¡£¡£¡£¡£Osiris¹²ÌᳫÁËÈý¸ö»®·ÖÕë¶ÔµÂ¹ú¡¢ÈÕ±¾ºÍ²¨À¼µÄ¹¥»÷»î¶¯£¬£¬ÆäÖ÷Òª·Ö·¢·½·¨ÊÇ´¹ÂÚÓʼþ£¬£¬ÔÚÐí¶àÇéÐÎÏÂҲͨ¹ýRIG EKµÈÎó²îʹÓù¤¾ß°ü¾ÙÐзַ¢¡£¡£¡£¡£´¹ÂÚÓʼþÖеĸ½¼þʹÓÃÁËÒÑÖªµÄOffice¹«Ê½±à¼­Æ÷Îó²î£¨CVE-2017-11882£©¡£¡£¡£¡£ÐµÄOsiris¶ñÒâÈí¼þÆÕ±éʹÓÃTORÍøÂç¾ÙÐÐÏÂÁîºÍ¿ØÖÆ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securonix.com/securonix-threat-research-kronos-osiris-banking-trojan-attack

4¡¢IBMÐû²¼¹ØÓÚAndroidÒøÐÐľÂíExoBotµÄÔ´ÂëÆÊÎö±¨¸æ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

ÓÉÓÚAndroidÒøÐÐľÂíExoBotµÄÔ´´úÂëÔÚ×î½üй¶£¬£¬IBM X-ForceÑо¿ÍŶÓÉîÈëÑо¿Á˸öñÒâÈí¼þµÄÄÚ²¿ÊÂÇé¡£¡£¡£¡£ExoBotÖ÷Ҫͨ¹ýÀ¬»ø¶ÌÐÅÒÔ¼°¹Ù·½Ó¦ÓÃÊÐËÁµÄapp¾ÙÐÐÈö²¥£¬£¬Ê×´ÎÔÚ×°±¸ÉÏÔËÐÐʱ»áɾ³ýͼ±ê¡¢×îС»¯ËùÓÐÕýÔÚÔËÐеÄÓ¦Óò¢ÏÔʾÖ÷ÆÁÄ»£¬£¬ÒÔ±ãÓû§²»»á·¢Ã÷ÈκÎÒì³£¡£¡£¡£¡£ÎªÁËÌÓ±ÜɳÏäºÍ¼ì²â£¬£¬ExoBotÔÚÔËÐÐǰ»á¾ÙÐз´É³Ïä¼ì²é¡¢·´ÆÊÎöÆ÷¼ì²éÒÔ¼°¹ú¼Ò/µØÇø/ÓïÑÔ¹ýÂË¡£¡£¡£¡£ExoBotµÄ»ìÏýÊÖÒÕ°üÀ¨×Ö·û´®±£»£»£»¤ºÍ¶ÔC2ͨѶ¾ÙÐÐAES¼ÓÃÜ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityintelligence.com/ibm-x-force-delves-into-exobots-leaked-source-code/


5¡¢Î¢ÈíÐû²¼9ÔÂÇå¾²¸üУ¬£¬ÐÞ¸´°üÀ¨17¸ö¸ßΣÎó²îÔÚÄÚµÄ61¸öÎó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

΢Èí±¾ÔÂÐÞ¸´µÄÎó²îÖÐÓÐËĸö±»±ê¼ÇΪ¿ÉÄÜÔÚÒ°ÍⱻʹÓ㬣¬°üÀ¨Ó°ÏìÁËËùÓÐWindows°æ±¾µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-8475£©¡¢Windows ALPCÌáȨÎó²î£¨CVE-2018-8440£©¡¢¾ç±¾ÒýÇæÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-8457£©ÒÔ¼°¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2018-8409£©¡£¡£¡£¡£ÁíÍâÁ½¸öÖµµÃ×¢ÖØµÄÎó²îÊÇWindowsÌáȨÎó²î£¨CVE-2018-0868ºÍCVE-2018-8339£©£¬£¬¿ÉÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃWindowsÍýÏëʹÃüAPIÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/microsoft-software-updates.html


6¡¢Ç÷ÊÆ¿Æ¼¼ÈÏ¿ÉÆä¶à¿îMacÓ¦ÓÃÎ¥¹æÍøÂçÓû§µÄÊý¾Ý

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

Ñо¿Ö°Ô±·¢Ã÷Ç÷ÊÆ¿Æ¼¼µÄ¶à¿îMacÓ¦ÓÃÍøÂçÓû§µÄä¯ÀÀÆ÷ÀúÊ·¼Í¼ºÍϵͳÐÅÏ¢£¬£¬ÏÖÔÚÕâЩӦÓÃÒÑÔÚMac App StoreÖÐϼÜ¡£¡£¡£¡£ÕâЩӦÓðüÀ¨Dr. Antivirus¡¢Dr. CleanerºÍDr. UnarchiverµÈ£¬£¬ËùÓÐÓ¦ÓÃµÄÆÀ¼ÛÊý¶¼´ïÊýǧÌõ¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÕâЩӦÓÃÍøÂçµ½µÄÐÅÏ¢×îÖÕ¶¼·¢Ë͵½trendmicro.com¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/trend-micro-apps-leak-user-data-removed-from-mac-app-store/



ÉùÃ÷£º±¾×ÊѶÓÉÈËÉú¾ÍÊDz©Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí