¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190318

Ðû²¼Ê±¼ä 2019-03-18
1¡¢gnosticplayersÔÚ°µÍø³öÊÛµÚËÄÅú¹²2600ÍòÕË»§ÐÅÏ¢


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


gnosticplayersÔÙ´ÎÔÚ°µÍø³öÊÛÓû§ÕË»§£¬ £¬£¬£¬£¬ÕâÊǽñÄê2ÔÂÒÔÀ´µÄµÚËÄÅúÊý¾Ý£¬ £¬£¬£¬£¬¹²°üÀ¨´Ó6¸öÍøÕ¾ÇÔÈ¡µÄ2600Íò¸öÕË»§ÐÅÏ¢¡£¡£¡£¡£¡£Éæ¼°ÍøÕ¾°üÀ¨Ó¡¶ÈÄáÎ÷ÑÇ´óѧºÍ¾Íҵƽ̨Youthmanual£¨112Íò£©¡¢ÔÚÏßѧϰƽ̨GameSalad£¨1.5Íò£©¡¢ÔÚÏß¹ºÎïÍøÕ¾Bukalapak£¨1300Íò£©¡¢ÈÕ±¾ÔÚÏßÌõ¼Ç±¾Lifebear£¨386Íò£©¡¢ÔÚÏßÊéµêEstanteVirtual£¨545Íò£©ºÍÔ¤Ô¼ÖÎÀíÍøÕ¾Coubic£¨150Íò£©¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÊÛ¼ÛΪ1.2431¸ö±ÈÌØ±Ò£¨Ô¼5000ÃÀÔª£©¡£¡£¡£¡£¡£

  

 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82539/data-breach/gnosticplayers-4-round.html

2¡¢JS Sniffer GMO¶ñÒâ¹¥»÷£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶ÔÓ¢¹úºÍÃÀ¹ú


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Group-IBÑо¿ÍŶӷ¢Ã÷еĶñÒâ´úÂëJS Sniffer GMOµÄ¹¥»÷»î¶¯£¬ £¬£¬£¬£¬¹¥»÷Õß½«¶ñÒâ´úÂë×¢ÈëµçÉÌÍøÕ¾ÒÔÇÔ×÷·ÏºÄÕßµÄÖ§¸¶ÐÅÏ¢£¬ £¬£¬£¬£¬°üÀ¨ÒøÐп¨ÐÅÏ¢¡¢ÐÕÃû¡¢Æ¾Ö¤µÈ¡£¡£¡£¡£¡£ÖÁÉÙÓÐÆß¼ÒÓ¢¹úºÍÃÀ¹úµÄµçÉÌÍøÕ¾Êܵ½Ë𺦣¬ £¬£¬£¬£¬°üÀ¨¹ú¼ÊÌåÓýÓÃÆ·¹«Ë¾FILA UK¡¢¼Ò¾ÓÉè¼ÆÊÐËÁjungleeny[.]com¡¢º¦³æÖÎÀí²úÆ·ÊÐËÁforshaw[.]com¡¢»¯×±Æ·ÊÐËÁabsolutenewyork[.]com¡¢ÔÓ»õµêcajungrocer[.]com¡¢ÑµÁ·×°±¸ÊÐËÁgetrxd[.]comºÍÊÓÆµ±à¼­´ò°çµêsharbor[.]com¡£¡£¡£¡£¡£GMO×Ô2018Äê11ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬ £¬£¬£¬£¬ÆðÔ´Ô¤¼ÆÖÁÉÙÓÐ5600Ãû¿Í»§µÄÐÅÏ¢ÒѾ­±»µÁ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82403/cyber-crime/payment-data-security-breach.html

3¡¢ÐÂÎÞÎļþ´¹ÂÚ¹¥»÷»î¶¯£¬ £¬£¬£¬£¬Ö÷Òª·Ö·¢NETWIREºóÃÅ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

FireEyeÔÚ2019Äê2Ô·ݷ¢Ã÷Ò»¸öеĴ¹ÂÚ¹¥»÷»î¶¯£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓÃVBScript¡¢PowerShellºÍ.NET¿ò¼Üͨ¹ýÀú³ÌÍÚ¿ÕÊÖÒÕÀ´ÊµÑé×¢Èë¹¥»÷£¬ £¬£¬£¬£¬¶ø²»»áÔÚÓ²ÅÌÉϽ¨ÉèÈκÎPEÎļþ¡£¡£¡£¡£¡£Æä·Ö·¢µÄ×îÖÕpayloadÊÇNETWIREºóÃÅ£¬ £¬£¬£¬£¬¸ÃºóÃÅ¿ÉÒÔÎüÊÕC2ЧÀÍÆ÷µÄÏÂÁ £¬£¬£¬£¬Ö´ÐаüÀ¨¼Í¼ÃÜÔ¿¡¢·´µ¯shell¡¢ÇÔÈ¡ÃÜÂë¡¢½ØÆÁµÈ¹¦Ð§¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2019/03/dissecting-netwire-phishing-campaign-usage-of-process-hollowing.html

4¡¢Õë¶ÔÔÆÕË»§µÄ´ó¹æÄ£¹¥»÷£¬ £¬£¬£¬£¬Ê¹ÓÃIMAPЭÒéÈÆ¹ýMFA


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ProofpointÊӲ쵽2018Äê9ÔÂÖÁ2019Äê2ÔÂʱ´úµÄÕë¶ÔÔÆÕË»§µÄ´ó¹æÄ£¹¥»÷£¬ £¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÕë¶ÔOffice 365ºÍG SuiteÔÆÕÊ»§£¬ £¬£¬£¬£¬²¢Ê¹ÓÃIMAPЭÒéÈÆ¹ý¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©±£»£»£»¤¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬¹¥»÷Õß»¹Ê¹ÓÃÒѾ­ÔÚÍøÉÏй¶µÄÓû§Æ¾Ö¤×ª´¢À´¾ÙÐÐÃÜÂëÅçÉä¹¥»÷¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬ £¬£¬£¬£¬10%µÄ»îԾĿµÄÕË»§Ôâµ½¹¥»÷£¬ £¬£¬£¬£¬¶ø1%µÄÄ¿µÄÕË»§±»ÀÖ³ÉÉøÍ¸¡£¡£¡£¡£¡£40%µÄ¹¥»÷ÕßIPµØµãȪԴÓÚÄáÈÕÀûÑÇ£¬ £¬£¬£¬£¬26%ȪԴÓÚÖйú¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82480/hacking/imap-protocol-attacks.html

5¡¢VMwareÐû²¼Çå¾²¸üУ¬ £¬£¬£¬£¬ÐÞ¸´WorkstationºÍHorizon¶à¸öÎó²î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


VMwareÐû²¼Çå¾²¸üУ¬ £¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î£¬ £¬£¬£¬£¬°üÀ¨WorkstationÖеÄÌáȨÎó²î£¨CVE-2019-5511ºÍCVE-2019-5512£©£¬ £¬£¬£¬£¬ÕâÁ½¸öÎó²îÓ°ÏìÁËWindowsƽ̨µÄWorkstation°æ±¾14.x¼°15.x£¬ £¬£¬£¬£¬Linuxƽ̨δÊÜÓ°Ï죬 £¬£¬£¬£¬Workstationа汾14.1.6ºÍ15.0.3ÖÐÐÞ¸´ÁËÕâÁ½¸öÎó²î£»£»£»Horizon Connection ServerÖеÄÐÅϢй¶Îó²î£¨CVE-2019-5513£©£¬ £¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËHorizon°æ±¾6.x¡¢7.xºÍ7.5.x£¬ £¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ°æ±¾6.2.8¡¢7.8ºÍ7.5.2¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.us-cert.gov/ncas/current-activity/2019/03/15/VMware-Releases-Security-Updates-Workstation-and-Horizon

6¡¢¸»Ê¿Í¨LXÎÞÏß¼üÅÌÒ×ÊÜ×¢Èë¹¥»÷£¬ £¬£¬£¬£¬ÉÐÎÞ²¹¶¡Ðû²¼


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


µÂ¹úÉøÍ¸²âÊÔ¹«Ë¾SySS GmbH·¢Ã÷¸»Ê¿Í¨LXÎÞÏß¼üÅÌÒ×ÊÜ×¢Èë¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±Matthias DeegµÄ±íÊö£¬ £¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÏò¼üÅ̵ÄUSBÎüÊÕÆ÷·¢ËͶñÒâÐźÅÀ´ÏòÅÌËã»ú×¢Èë»÷¼üÐÅÏ¢¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚUSBÎüÊÕÆ÷Ö®ÖУ¬ £¬£¬£¬£¬USBÎüÊÕÆ÷³ýÁËÎüÊÕ¼üÅ̵ļÓÃÜͨѶ֮Í⣬ £¬£¬£¬£¬»¹ÎüÊÕδ¼ÓÃܵÄÊý¾Ý°ü¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚÈ¥Äê10ÔÂÏò¸»Ê¿Í¨±¨¸æÁ˸ÃÎó²î£¬ £¬£¬£¬£¬µ«¸»Ê¿Í¨ÉÐδÐû²¼¹Ì¼þ²¹¶¡¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fujitsu-wireless-keyboard-model-vulnerable-to-keystroke-injection-attacks/

ÉùÃ÷£º±¾×ÊѶÓÉÈËÉú¾ÍÊDz©Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí