ÍòºÀÒòÊý¾ÝÐ¹Â¶ÃæÁÙÓ¢¹úî¿Ïµ»ú¹¹1.23ÒÚÃÀÔª· £¿ £¿£¿£¿£¿î£» £»GEº½¿Õ¹«Ë¾JenkinsЧÀÍÆ÷й¶´ó×ÚÃô¸ÐÐÅÏ¢£» £»ÊÓÆµÈí¼þZoom RCEÎó²î

Ðû²¼Ê±¼ä 2019-07-10
1¡¢ÍòºÀÒòÊý¾ÝÐ¹Â¶ÃæÁÙÓ¢¹úî¿Ïµ»ú¹¹1.23ÒÚÃÀÔª· £¿ £¿£¿£¿£¿î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Ó¢¹úÊý¾Ý±£» £»¤»ú¹¹ÖܶþÌåÏÖ½«ÏòÍòºÀ´¦ÒÔ9900ÍòÓ¢°÷£¨ºÏ1.23ÒÚÃÀÔª£©µÄ· £¿ £¿£¿£¿£¿î£¬£¬£¬£¬Ôµ¹ÊÔ­ÓÉÊÇ2018Äê11ÔÂÍòºÀÆìÏÂϲ´ïÎÝÂùݵĻáÔ±Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¾ÝÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©³Æ£¬£¬£¬£¬Å·ÖÞ31¸ö¹ú¼ÒµÄ½ü3000ÍòסÃñºÍ700ÍòÓ¢¹úסÃñÊܵ½ÍòºÀÊý¾Ýй¶µÄÓ°Ïì¡£¡£¡£¡£ÕâÊÇÒÑÍùÁ½ÌìÄÚ±¬·¢µÄµÚ¶þÆðÕë¶ÔÊý¾Ýй¶µÄÖØ´ó· £¿ £¿£¿£¿£¿î֪ͨ¡£¡£¡£¡£ÍòºÀÌåÏÖ¶ÔÐÅϢרԱ°ì¹«ÊҵľöÒé¸ÐӦʧÍû£¬£¬£¬£¬ÔÚ±»´¦ÒÔ· £¿ £¿£¿£¿£¿î֮ǰ£¬£¬£¬£¬Ëü¡°ÓÐȨ×ö³ö»ØÓ¦¡±£¬£¬£¬£¬²¢¡°ÍýÏë×ö³ö»ØÓ¦ÇÒÆð¾¢º´ÎÀ¡±×Ô¼ºµÄ̬¶È¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/marriott-data-breach-gdpr.html

2¡¢GEº½¿Õ¹«Ë¾JenkinsЧÀÍÆ÷й¶´ó×ÚÃô¸ÐÐÅÏ¢

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Çå¾²Ñо¿Ô±Bob Diachenko·¢Ã÷GEº½¿Õ¹«Ë¾µÄJenkinsЧÀÍÆ÷¿É¹ûÕæ»á¼û£¬£¬£¬£¬µ¼Ö¹«Ë¾µÄ´ó×ÚÃô¸ÐÐÅϢй¶£¬£¬£¬£¬°üÀ¨¹«Ë¾ÄÚ²¿ÉÌÒµ»ù´¡ÉèÊ©µÄÔ´´úÂë¡¢Ã÷ÎÄÃÜÂ롢ȫÇòϵͳµÄÉèÖÃÎļþºÍ˽Կ¡¢APIÁîÅÆ¡¢Êý¾Ý¿âƾ֤µÈ¡£¡£¡£¡£GEº½¿Õ¹«Ë¾ÊÇͨÓÃµçÆøÆìϵÄ×Ó¹«Ë¾£¬£¬£¬£¬ÊÇÈ«ÇòÉÌÓ÷ɻú·¢ÄîÍ·µÄ¶¥¼¶¹©Ó¦ÉÌÖ®Ò»¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖûÓÐÖ¤¾ÝÅú×¢ÆäËüÈË»á¼ûÁËЧÀÍÆ÷ÉϵÄÊý¾Ý£¬£¬£¬£¬²¢ÒѽÓÄÉÔ¤·À²½·¥ÖØÖÃÁËËùÓÐÆ¾Ö¤¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/ge-aviation-passwords-jenkins-server/146302/

3¡¢Î¢ÈíÖÒÑÔÎÞÎļþ¶ñÒâÈí¼þAstarothµÄ¹¥»÷»î¶¯

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
΢ÈíÇå¾²ÍŶÓÐû²¼Ò»Ôòת´ï£¬£¬£¬£¬ÖÒÑÔʹÓÃÎÞÎļþÊÖÒÕ·Ö·¢¶ñÒâÈí¼þAstarothµÄ¹¥»÷»î¶¯¡£¡£¡£¡£Windows Defender ATPÍŶӼì²âµ½Á˸öñÒâ»î¶¯£¬£¬£¬£¬¹¥»÷Õßͨ¹ý´ó¹æÄ£À¬»øÓʼþ»î¶¯ÏòÓû§·Ö·¢AstarothľÂí¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÐÅÏ¢ÇÔȡľÂí£¬£¬£¬£¬¿Éת´¢ÖÖÖÖÓ¦ÓóÌÐòµÄƾ֤£¬£¬£¬£¬²¢½«±»µÁÊý¾ÝÉÏ´«µ½Ô¶³ÌЧÀÍÆ÷¡£¡£¡£¡£Î¢Èí½²»°ÈËÌåÏÖÁè¼Ý95£¥µÄAstarothѬȾ±¬·¢ÔÚ°ÍÎ÷¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/microsoft-warns-about-astaroth-malware-campaign/

4¡¢DDoS½©Ê¬ÍøÂçGoBotKR£¬£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹ú

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
ƾ֤ESETµÄ±¨¸æ£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚ¹¹½¨Ò»¸ö¿ÉÓÃÓÚÖ´ÐÐÖÖÖÖDDoS¹¥»÷µÄ½©Ê¬ÍøÂçGoBotKR¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÖ÷ÒªÃé×¼º«¹úµçÊÓ½ÚÄ¿µÄ·ÛË¿£¬£¬£¬£¬Í¨¹ýµÁ°æÍøÕ¾ÉϵĵÁ°æÓ°Ï·¡¢ÓÎÏ·ºÍµçÊÓ½ÚÄ¿ÖÖ×ÓÏÂÔØ¾ÙÐÐÈö²¥¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒÑÖªºóÃÅGoBot2µÄˢа汾£¬£¬£¬£¬´úÂëºÜ¼òÆÓ£¬£¬£¬£¬´ó´ó¶¼¹¦Ð§¶¼ÊÇʹÓÃGoLang¿âʵÏֵ쬣¬£¬£¬²¢ÇÒÖ´ÐÐWindowsÏÂÁîºÍµÚÈý·½¹¤¾ß£¬£¬£¬£¬ÈçBitTorrentºÍuTorrent¿Í»§¶Ë¡£¡£¡£¡£Ñо¿Ö°Ô±Ôö²¹Ëµ¸Ã¶ñÒâÈí¼þ¶ÔÔ´´úÂëµÄÐÞ¸ÄÖ÷ÒªÊǺ«¹úÌØÓеÄÌÓ±ÜÊÖÒÕ£¬£¬£¬£¬°üÀ¨¼ì²âIPÐÅÏ¢ÒÔÈ·¶¨ÊÇ·ñÔÚº«¹úµÄһЩÇ徲ɳÏäÖÐÔËÐС¢É¨ÃèÀú³ÌÒÔ¼ì²â·À²¡¶¾²úÆ·µÈ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/gobotkr-pirate-torrents-ddos-botnet/146285/

5¡¢¶ñÒâÈí¼þAnubis»Ø¹é£¬£¬£¬£¬¼ì²âµ½Áè¼Ý1.7Íò¸öÑù±¾

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Ç÷ÊÆ¿Æ¼¼¼ì²âµ½Android¶ñÒâÈí¼þAnubis»Ø¹é£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚÁ½¸öÏà¹ØµÄЧÀÍÆ÷Éϼì²âµ½17490¸öÑù±¾¡£¡£¡£¡£ÔÚÕâЩÑù±¾ÖÐÕÒµ½ÁËÁ½¸ö±êÇ©£ºOperat?rG¨¹ncellemesiºÍGoogle Services£¬£¬£¬£¬Ç°ÕßÔÚÍÁ¶úÆäÓïÖеÄÒâ˼ÊÇ¡°²Ù×÷Ö°Ô±¸üС±£¬£¬£¬£¬ÕâЩ±êÇ©¿ÉÄÜÊÇÉç½»¹¤³ÌÓÕ¶ü£¬£¬£¬£¬ÓÃÓÚÓÕÆ­Óû§ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£Anubis×ܹ²Õë¶Ô188¸öÓëÒøÐкͽðÈÚÏà¹ØµÄÓ¦ÓóÌÐò£¬£¬£¬£¬´ÓÖÐÇÔȡСÎÒ˽¼ÒºÍ²ÆÎñÊý¾Ý¡£¡£¡£¡£ÕâЩ³ÌÐòÀ´×ÔÓÚ²¨À¼¡¢°Ä´óÀûÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢·¨¹ú¡¢Òâ´óÀû¡¢Î÷°àÑÀ¡¢ÃÀ¹úºÍÓ¡¶ÈµÈ¹ú¼Ò¡£¡£¡£¡£AnubisµÄC£¦CЧÀÍÆ÷Ò²ÂþÑÜÔÚ²î±ðµÄ¹ú¼Ò¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/anubis-android-malware-returns-with-over-17000-samples/

6¡¢ÊÓÆµ¾Û»áÈí¼þZoom RCEÎó²î£¬£¬£¬£¬¿ÉÐ®ÖÆMacÉãÏñÍ·

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Çå¾²Ñо¿Ö°Ô±Jonathan LeitschuhÅû¶ÊÓÆµ¾Û»áÈí¼þZoomÖеÄÒ»¸öRCEÎó²î£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËMacƽ̨ÉϵÄZoom app°æ±¾4.4.4£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÓû§»á¼ûÍøÕ¾Ê±½ÓÊÜÍøÂçÉãÏñÍ·¡£¡£¡£¡£Æ¾Ö¤LeitschuhµÄ˵·¨£¬£¬£¬£¬Áè¼Ý400ÍòÓû§ÃæÁÙΣº¦¡£¡£¡£¡£¸ÃÎó²îʹÓÃÁËZoomÈí¼þµÄµã»÷¼ÓÈ빦Ч£¬£¬£¬£¬¼´Ö»Ðèµã»÷Ô¼ÇëÁ´½Ó¼´¿É×Ô¶¯¼¤»îϵͳÉÏ×°ÖõÄÓ¦ÓóÌÐò²¢Í¨¹ýWebä¯ÀÀÆ÷¼ÓÈëÊÓÆµ¾Û»á¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý´¹ÂÚÓʼþ·Ö·¢ÕâÖÖ¶ñÒâÁ´½Ó¡£¡£¡£¡£Leitschuh»¹ÌåÏÖZoomµÄÐÞ¸´Ö»ÊÇ×èÖ¹¹¥»÷Õß·­¿ªÓû§µÄÉãÏñÍ·£¬£¬£¬£¬¹¥»÷ÕßÈÔ¿ÉÒÔͨ¹ý¶ñÒâÁ´½ÓÓÕʹÓû§¼ÓÈë¾Û»á¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88147/hacking/zoom-mac-software-flaw.html