¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181108
Ðû²¼Ê±¼ä 2018-11-08
¶íÂÞ˹Îó²îÑо¿Ö°Ô±Sergey ZelenyukÅû¶VirtualBoxÖеÄÒ»¸öÐéÄâ»úÌÓÒÝ0day£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËVirtualBox 5.2.20¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÊÓÃÓÚÍø¿¨ÎªIntel PRO/1000 MT Desktop (82540EM) ²¢´¦ÓÚNATģʽµÄÐéÄâ»ú£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÌÓÒÝÖÁÖ÷»úring3ȨÏÞ£¬£¬£¬£¬²¢Ê¹ÓÃÆäËüÊÖÒÕÌáȨÖÁring0¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚGithubÉÏÏêϸÐÎòÁ˸ÃÎó²î±³ºóµÄ»úÖÆ£¬£¬£¬£¬²¢Ðû²¼ÁËÏà¹ØPoCÊÓÆµ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/virtualbox-zero-day-vulnerability-details-and-exploit-are-publicly-available/2¡¢WordPress²å¼þWooCommerceÐÞ¸´Ò»¸öí§ÒâÎļþɾ³ýÎó²î
RIPSÑо¿Ö°Ô±Simon Scannell·¢Ã÷WordPress²å¼þWooCommerce±£´æÒ»¸öí§ÒâÎļþɾ³ýÎó²î£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¶ñÒâ¹¥»÷ÕßÖØÖÃÖÎÀíÔ±ÕË»§µÄÃÜÂë²¢ÍêÈ«½ÓÊÜÍøÕ¾¡£¡£¡£¡£¡£¡£¡£WooCommerceÊÇWordPressÉÏ×îÊܽӴýµÄµç×ÓÉÌÎñ²å¼þÖ®Ò»£¬£¬£¬£¬Æä×°ÖôÎÊýÁè¼Ý400Íò£¬£¬£¬£¬Îª»¥ÁªÍøÉϽü35%µÄµç×ÓÉÌÎñÍøÕ¾Ìṩ֧³Ö¡£¡£¡£¡£¡£¡£¡£WooCommerce¿ª·¢ÍŶÓÒÑÔÚ°æ±¾3.4.6ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/woocommerce-wordpress-hacking.html3¡¢Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§

˼¿ÆÐû²¼Á˶à¿î²úÆ·µÄ15¸öÇå¾²¸üУ¬£¬£¬£¬ÆäÖаüÀ¨É¾³ýÁËСÐÍÆóÒµ½»Á÷»úÖеÄÒ»¸öºóÃÅÕË»§¡£¡£¡£¡£¡£¡£¡£ÕâÊǽñÄêÀ´Ë¼¿ÆµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§¡£¡£¡£¡£¡£¡£¡£ÕâЩºóÃÅÕË»§Îó²î°üÀ¨3Ô·ݵÄCVE-2018-0141ºÍCVE-2018-0150¡¢5Ô·ݵÄCVE-2018-0222¡¢6Ô·ݵÄCVE-2018-0329¡¢7Ô·ݵÄCVE-2018-0375¡¢9Ô·ݵÄCVE-2018-15427ÒÔ¼°±¾Ô£¨11Ô·ݣ©µÄCVE-2018-15439¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing/4¡¢Ñо¿ÍŶӷ¢Ã÷¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioÔâµ½¹©Ó¦Á´¹¥»÷
ESETÑо¿ÍŶӷ¢Ã÷¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioÔâµ½¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬¸Ã¹¥»÷ÊÇͨ¹ýÍøÂçÆÊÎöƽ̨StatCounter¾ÙÐеġ£¡£¡£¡£¡£¡£¡£StatCounterЧÀͱ»Áè¼Ý200Íò¸öÍøÕ¾Ê¹ÓÃÒÔÊÕ¾Û»á¼ûÕßµÄͳ¼ÆÐÅÏ¢£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚStatCounterµÄJS¾ç±¾ÖÐÌí¼Ó¶ñÒâ´úÂ룬£¬£¬£¬¿ÉÒÔÔÚËùÓеÄÕâÐ©ÍøÕ¾Öж¼×¢Èë¶ñÒâJS´úÂë¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¶Ô¶ñÒâ´úÂëµÄÆÊÎö£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioËÆºõÊÇÕâ´Î¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£¡£¡£¡£¡£¡£µ«ÓÉÓÚ¶ñÒâ¾ç±¾»áÒ»Ö±ÌìÉúеıÈÌØ±ÒµØµã£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±ÎÞ·¨µÃÖªÏêϸÓм¸¶à×ʽ𱻵Á¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.welivesecurity.com/2018/11/06/supply-chain-attack-cryptocurrency-exchange-gate-io/5¡¢Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÎ÷°àÑÀµÄÐéÎ±ÒøÐÐÓ¦ÓÃMovil Secure
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±ÔÚGoogle PlayÉÏ·¢Ã÷Ö÷ÒªÕë¶ÔÎ÷°àÑÀÓû§µÄ¶ñÒâÒøÐÐÓ¦ÓÃMovil Secure¡£¡£¡£¡£¡£¡£¡£Movil Secureð³äÓëÎ÷°àÑÀ¶ÔÍâÒøÐÐBBVAÓйأ¬£¬£¬£¬²¢ÇÒ¾ßÓÐרҵµÄÍâ¹ÛºÍϸÄåµÄÓû§½çÃæ¡£¡£¡£¡£¡£¡£¡£¸ÃÓ¦ÓÃÖ÷ÒªÓÃÓÚÍøÂçÓû§µÄÐÅÏ¢£¬£¬£¬£¬°üÀ¨¶ÌÐź͵绰ºÅÂëµÈ£¬£¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ¶ÌÐÅ´¹Âڻ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÓ¦ÓÃÔÚ10ÔÂ19ÈÕÐû²¼£¬£¬£¬£¬²¢ÔÚ6ÌìÄÚÏÂÔØÁËÁè¼Ý100´Î¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹ÔÚͳһ¸ö¿ª·¢Ö°Ô±ÃûÏ·¢Ã÷ÁËÆäËüÈý¸öÀàËÆµÄ¶ñÒâÓ¦Ó㬣¬£¬£¬ÏÖÔÚÕâЩӦÓÃÒѱ»Googleɾ³ý¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/fake-banking-app-found-on-google-play-used-in-smishing-scheme/
6¡¢Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÊ¥µ®ÓÃÆ·¹©Ó¦É̵ÄÎÞÎļþ¶ñÒâÈí¼þ¹¥»÷
CyrenÑо¿Ö°Ô±·¢Ã÷ÒѾ±£´æÕë¶ÔÊ¥µ®ÓÃÆ·¹©Ó¦É̵ÄжñÒâ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£Ã¿ÄêµÄºÚÎåºÍÊ¥µ®½Úʱ´ú£¬£¬£¬£¬ÍøÂç´¹ÂÚºÍթƻ¶¼»áµÖ´ïÒ»¸öá¯Áë¡£¡£¡£¡£¡£¡£¡£½ñÄêµÄÊ¥µ®×¼±¸ÊÂÇéÕýÔÚ¾ÙÐÐÖ®ÖУ¬£¬£¬£¬¶øÑо¿Ö°Ô±ÒѾ·¢Ã÷ÁËÒ»ÖÖеÄÎÞÎļþ¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ´¹ÂÚÓʼþÒÔÊ¥µ®¶©µ¥ÎªÖ÷Ì⣬£¬£¬£¬ÓÃÓÚ·Ö·¢NetwiredRCºóÃÅ¡£¡£¡£¡£¡£¡£¡£¸ÃºóÃÅ¿ÉÒÔ¾ÙÐмüÅ̼ͼ¡¢ÇÔÈ¡ä¯ÀÀÆ÷ƾ֤ÒÔ¼°µç×ÓÓʼþƾ֤µÈ¡£¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þµÄÕû¸ö×°ÖÃÀú³ÌÊDZ»×¢ÈëÄ¿µÄÀú³Ì£¬£¬£¬£¬Ã»ÓÐÉúÑĵ½´ÅÅÌÉÏ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.cyren.com/blog/articles/fileless-malware-already-targeting-holiday-suppliersÉùÃ÷£º±¾×ÊѶÓÉ¿·¢k8άËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ