¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180912

Ðû²¼Ê±¼ä 2018-09-12
1¡¢Ñо¿»ú¹¹½«Ó¢¹úº½¿Õ¹«Ë¾µÄÊý¾Ýй¶ÊÂÎñ¹éÒòÓÚ·¸·¨¼¯ÍÅMagecart

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

ƾ֤RiskIQµÄÑо¿£¬£¬ £¬Ó¢¹úº½¿Õ¹«Ë¾Êý¾Ýй¶ÊÂÎñµÄ±³ºóÊÇ·¸·¨¼¯ÍÅMageCart¡£¡£¡£¡£¡£¡£MageCart×Ô2015ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬ £¬Ö÷ÒªÕë¶Ôµç×ÓÉÌÎñÍøÕ¾£¬£¬ £¬ÇÔÈ¡Óû§µÄÒøÐп¨ÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£Æ¾Ö¤RiskIQµÄ˵·¨£¬£¬ £¬MageCart¶ÔÓ¢¹úº½¿Õ¹«Ë¾¾ÙÐÐÁËÕë¶ÔÐÔ¹¥»÷£¬£¬ £¬²¢Ê¹ÓÃÁ˶¨ÖƵľ籾ºÍרÓõĻù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎúMageCartÔõÑùÔÚÓ¢¹úº½¿Õ¹«Ë¾µÄÍøÕ¾ÉÏ×¢Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/labs/magecart-british-airways-breach/

2¡¢Ñо¿Ö°Ô±·¢Ã÷Ð®ÖÆÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±Troy Mursch·¢Ã÷Ò»¸öʹÓÃÎó²î£¨CVE-2018-14847£©Ð®ÖÆMikroTik·ÓÉÆ÷¾ÙÐÐÍÚ¿óµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ËäÈ»¸Ã·ÓÉÆ÷µÄ³§ÉÌÒÑÔÚ4Ô·ÝÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡£¡£¡£¡£¡£¡£¬£¬ £¬µ«ÈÔÓв¿·ÖÓû§Ã»ÓоÙÐÐÉý¼¶¡£¡£¡£¡£¡£¡£Æ¾Ö¤Mursch±¨¸æµÄÍÚ¿ó¾ç±¾£¬£¬ £¬ÔÚShodanÉÏ¿ÉËÑË÷µ½3734¸öMikroTik×°±¸¡£¡£¡£¡£¡£¡£´ó´ó¶¼ÊÜѬȾµÄ×°±¸¶¼¼¯ÖÐÔÚÄÏÃÀÖÞ£¬£¬ £¬Ö÷ÒªÊǰÍÎ÷£¨2612£©ºÍ°¢¸ùÍ¢£¨480£©¡£¡£¡£¡£¡£¡£¸ÃÍÚ¿ó¾ç±¾½«MikroTik·ÓÉÆ÷µÄCPUʹÓÃÂÊÔöÌíµ½80%²¢Ò»Á¬¾ÙÐÐÍڿ󡣡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/over-3-700-mikrotik-routers-abused-in-cryptojacking-campaigns/

3¡¢Ñо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíKRONOSµÄбäÌåOsiris

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

2018Äê7ÔÂSecuronixÑо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíKRONOSµÄбäÌåOsiris¡£¡£¡£¡£¡£¡£Osiris¹²ÌᳫÁËÈý¸ö»®·ÖÕë¶ÔµÂ¹ú¡¢ÈÕ±¾ºÍ²¨À¼µÄ¹¥»÷»î¶¯£¬£¬ £¬ÆäÖ÷Òª·Ö·¢·½·¨ÊÇ´¹ÂÚÓʼþ£¬£¬ £¬ÔÚÐí¶àÇéÐÎÏÂҲͨ¹ýRIG EKµÈÎó²îʹÓù¤¾ß°ü¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£´¹ÂÚÓʼþÖеĸ½¼þʹÓÃÁËÒÑÖªµÄOffice¹«Ê½±à¼­Æ÷Îó²î£¨CVE-2017-11882£©¡£¡£¡£¡£¡£¡£ÐµÄOsiris¶ñÒâÈí¼þÆÕ±éʹÓÃTORÍøÂç¾ÙÐÐÏÂÁîºÍ¿ØÖÆ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securonix.com/securonix-threat-research-kronos-osiris-banking-trojan-attack

4¡¢IBMÐû²¼¹ØÓÚAndroidÒøÐÐľÂíExoBotµÄÔ´ÂëÆÊÎö±¨¸æ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

ÓÉÓÚAndroidÒøÐÐľÂíExoBotµÄÔ´´úÂëÔÚ×î½üй¶£¬£¬ £¬IBM X-ForceÑо¿ÍŶÓÉîÈëÑо¿Á˸öñÒâÈí¼þµÄÄÚ²¿ÊÂÇé¡£¡£¡£¡£¡£¡£ExoBotÖ÷Ҫͨ¹ýÀ¬»ø¶ÌÐÅÒÔ¼°¹Ù·½Ó¦ÓÃÊÐËÁµÄapp¾ÙÐÐÈö²¥£¬£¬ £¬Ê×´ÎÔÚ×°±¸ÉÏÔËÐÐʱ»áɾ³ýͼ±ê¡¢×îС»¯ËùÓÐÕýÔÚÔËÐеÄÓ¦Óò¢ÏÔʾÖ÷ÆÁÄ»£¬£¬ £¬ÒÔ±ãÓû§²»»á·¢Ã÷ÈκÎÒì³£¡£¡£¡£¡£¡£¡£ÎªÁËÌÓ±ÜɳÏäºÍ¼ì²â£¬£¬ £¬ExoBotÔÚÔËÐÐǰ»á¾ÙÐз´É³Ïä¼ì²é¡¢·´ÆÊÎöÆ÷¼ì²éÒÔ¼°¹ú¼Ò/µØÇø/ÓïÑÔ¹ýÂË¡£¡£¡£¡£¡£¡£ExoBotµÄ»ìÏýÊÖÒÕ°üÀ¨×Ö·û´®±£»£»£»¤ºÍ¶ÔC2ͨѶ¾ÙÐÐAES¼ÓÃÜ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityintelligence.com/ibm-x-force-delves-into-exobots-leaked-source-code/


5¡¢Î¢ÈíÐû²¼9ÔÂÇå¾²¸üУ¬£¬ £¬ÐÞ¸´°üÀ¨17¸ö¸ßΣÎó²îÔÚÄÚµÄ61¸öÎó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

΢Èí±¾ÔÂÐÞ¸´µÄÎó²îÖÐÓÐËĸö±»±ê¼ÇΪ¿ÉÄÜÔÚÒ°ÍⱻʹÓ㬣¬ £¬°üÀ¨Ó°ÏìÁËËùÓÐWindows°æ±¾µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-8475£©¡¢Windows ALPCÌáȨÎó²î£¨CVE-2018-8440£©¡¢¾ç±¾ÒýÇæÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-8457£©ÒÔ¼°¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2018-8409£©¡£¡£¡£¡£¡£¡£ÁíÍâÁ½¸öÖµµÃ×¢ÖØµÄÎó²îÊÇWindowsÌáȨÎó²î£¨CVE-2018-0868ºÍCVE-2018-8339£©£¬£¬ £¬¿ÉÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃWindowsÍýÏëʹÃüAPIÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/microsoft-software-updates.html


6¡¢Ç÷ÊÆ¿Æ¼¼ÈÏ¿ÉÆä¶à¿îMacÓ¦ÓÃÎ¥¹æÍøÂçÓû§µÄÊý¾Ý

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

Ñо¿Ö°Ô±·¢Ã÷Ç÷ÊÆ¿Æ¼¼µÄ¶à¿îMacÓ¦ÓÃÍøÂçÓû§µÄä¯ÀÀÆ÷ÀúÊ·¼Í¼ºÍϵͳÐÅÏ¢£¬£¬ £¬ÏÖÔÚÕâЩӦÓÃÒÑÔÚMac App StoreÖÐϼÜ¡£¡£¡£¡£¡£¡£ÕâЩӦÓðüÀ¨Dr. Antivirus¡¢Dr. CleanerºÍDr. UnarchiverµÈ£¬£¬ £¬ËùÓÐÓ¦ÓÃµÄÆÀ¼ÛÊý¶¼´ïÊýǧÌõ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÕâЩӦÓÃÍøÂçµ½µÄÐÅÏ¢×îÖÕ¶¼·¢Ë͵½trendmicro.com¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/trend-micro-apps-leak-user-data-removed-from-mac-app-store/



ÉùÃ÷£º±¾×ÊѶÓÉ¿­·¢k8άËûÃüÇ徲С×é·­ÒëºÍÕûÀí