¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181213
Ðû²¼Ê±¼ä 2018-12-13
McAfeeÑо¿Ö°Ô±·¢Ã÷жñÒâ»î¶¯¡°ÉñǹÊÖÐж¯¡±£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Õë¶ÔÈ«ÇòµÄ¹ú·ÀºÍÒªº¦»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ºËÄÜ¡¢¹ú·À¡¢ÄÜÔ´ºÍ½ðÈÚÆóÒµ¡£¡£¡£¡£×Ô2018Äê10ÔÂ25ÈÕÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬Ôڶ̶ÌÁ½¸öÔÂÄÚÉñǹÊÖÐж¯ÒÑÓ°ÏìÁËÈ«Çò87¸öÆóÒµ¡£¡£¡£¡£¹¥»÷Õßαװ³ÉÕÐÆ¸»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýDropbox·Ö·¢°üÀ¨¶ñÒâºêµÄWordÎĵµ£¬£¬£¬£¬£¬£¬£¬£¬²¢×îÖÕ½»¸¶Rising SunºóÃÅ¡£¡£¡£¡£¸ÃºóÃÅÓëAPT×éÖ¯LazarusÔÚ2015ÄêʹÓõĶñÒâÈí¼þDuuzer¾ßÓÐÏàͬµÄ´úÂë¡£¡£¡£¡£Ö»¹ÜÐí¶àÏßË÷¶¼Ö¸ÏòÁËLazarus£¬£¬£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪÕâЩ¹ýÓÚÏÔ×ŵÄÖ¤¾Ý¿ÉÄÜÖ»Êǹ¥»÷Õß¾ÓÐÄÉèÖõÄfalse flag¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/operation-sharpshooter-targets-global-defense-critical-infrastructure/2¡¢ÐÂÎó²îʹÓù¤¾ß°üNovidade£¬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔSOHOºÍ¼ÒÓ÷ÓÉ
Ç÷ÊÆ¿Æ¼¼·¢Ã÷¼ÒÍ¥ºÍСÐͰ칫·ÓÉÆ÷£¨SOHO£©ÕýÔÚ³ÉΪ¹¥»÷ÕßµÄÄ¿µÄ¡£¡£¡£¡£Ñо¿ÍŶӷ¢Ã÷Ò»¸öÃûΪNovidadeµÄÐÂÎó²îʹÓù¤¾ß°üÕýÔÚ°ÍÎ÷Ìᳫ´ó¹æÄ£¹¥»÷»î¶¯¡£¡£¡£¡£NovidadeÖ÷Ҫͨ¹ýCSRFÎó²îÀ´¸ü¸Ä·ÓÉÆ÷ÉϵÄDNSÉèÖ㬣¬£¬£¬£¬£¬£¬£¬½«Óû§µÄÉÏÍøÁ÷Á¿Ð®ÖƵ½¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£¡£NovidadeµÄ¹¥»÷»î¶¯¿ÉÄÜ×îÏÈÓÚ2017Äê8Ô£¬£¬£¬£¬£¬£¬£¬£¬×Ô2018Äê3ÔÂÒÔÀ´Ñо¿ÍŶӹ²¼à²âµ½ÁË2400Íò´Î¹¥»÷¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/new-exploit-kit-novidade-found-targeting-home-and-soho-routers/3¡¢CobaltÍÆ³öˢеÄThreadKit£¬£¬£¬£¬£¬£¬£¬£¬ÈÔÔÚÆð¾¢¾ÙÐжñÒâ»î¶¯
Ö»¹ÜÔÚ½ñÄêÔçЩʱ¼ä·¸·¨ÍÅ»ïCobalt GroupµÄÍ·Ä¿±»¾Ð²¶£¬£¬£¬£¬£¬£¬£¬£¬µ«CobaltÈÔÔÚÆð¾¢¾ÙÐжñÒâ»î¶¯¡£¡£¡£¡£Æ¾Ö¤Çå¾²³§ÉÌFidelisÖܶþÐû²¼µÄÑо¿±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬2018Äê10ÔÂ×îÏÈCobaltÕýÔÚÆð¾¢·Ö·¢Ð°汾µÄ¶ñÒâÈí¼þThreadKit¡£¡£¡£¡£ThreadKitÈÔͨ¹ý´¹ÂÚÓʼþÈö²¥£¬£¬£¬£¬£¬£¬£¬£¬ÓʼþÖаüÀ¨¶ñÒâµÄRFT¸½¼þ¡£¡£¡£¡£ThreadKit½ÓÄÉÁËһЩеĻìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬ÆäpayloadÊÇCoblntľÂí¡£¡£¡£¡£¸Ã°æ±¾µÄCoblntľÂíʹÓÃÁËXOR»ìÏýÊÖÒÕ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cobalt-bank-robbers-use-new-threadkit-malicious-doc-builder/4¡¢AdobeÐû²¼12ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬Ò»´ÎÐÔÐÞ¸´87¸öÎó²î
AdobeÔÚ2018Äêµ×Ðû²¼ÁË12ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËMacOSºÍWindowsƽ̨ÉϵÄAcrobat ReaderÖеÄ87¸öÎó²î¡£¡£¡£¡£ÆäÖÐ39¸öÎó²îµÄΣÏÕˮƽΪcritical£¬£¬£¬£¬£¬£¬£¬£¬48¸öÎó²îΪimportant¡£¡£¡£¡£criticalµÄÎó²î°üÀ¨3¸ö¶ÑÒç³ö¡¢5¸öÔ½½çд¡¢2¸ö²»ÊÜÐÅÈεÄÖ¸Õë½âÒýÓá¢2¸ö»º³åÇø¹ýʧÒÔ¼°24¸öuse-after-freeÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²î¶¼¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐС£¡£¡£¡£importantµÄÎó²î°üÀ¨43¸öÔ½½ç¶Á¡¢4¸öÕûÊýÒç³öºÍ2¸öÇå¾²ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²î¶¼¿Éµ¼ÖÂÐÅϢй¶¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐÅû¶ÈκÎÎó²îµÄÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬£¬£¬£¬µ«½«ËùÓеÄÎó²î¶¼¹éÀàΪÓÅÏȼ¶2¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/adobe-acrobat-update.html5¡¢Î¢ÈíÐû²¼39¸öÎó²îµÄÐÞ¸´²¹¶¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸öWindows 0day
΢ÈíÔÚ12ÔµÄÇå¾²¸üÐÂÖÐÐÞ¸´ÁË39¸öÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ10¸öÎó²îµÄÑÏÖØÐÔΪcritical£¬£¬£¬£¬£¬£¬£¬£¬ÆäÓàµÄΪimportant¡£¡£¡£¡£ÆäÖÐWindows 0day£¨CVE-2018-8611£©Òѱ»·¢Ã÷ÔÚÒ°ÍâʹÓ㬣¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤¿¨°Í˹»ùµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã0dayÊÇWindowsÄںˣ¨ntoskrnl.exe£©ÖеÄÌáȨÎó²î£¨EoP£©£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐí¶ñÒâ³ÌÐòÔÚÄ¿µÄϵͳÉÏÒÔ¸ü¸ßȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£APT×éÖ¯FruityArmorºÍSandCatÒÑÔÚÒ°ÍâÆð¾¢Ê¹ÓøÃÎó²î¡£¡£¡£¡£ÁíÒ»¸öÖ÷ÒªµÄÎó²î£¨CVE-2018-8517£©ÊÇ.NET Framework¹¹½¨µÄWebÓ¦ÓóÌÐòÖеÄDoSÎÊÌâ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/microsoft-patch-updates.html6¡¢WebЧÀÍÆ÷ÉèÖò»µ±£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂ1.2ÒÚ°ÍÎ÷¹«ÃñСÎÒ˽¼ÒÐÅϢй¶
InfoArmorÔÚ2018Äê3Ô·¢Ã÷Ò»¸öÉèÖò»µ±µÄApache WebЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷ÉÏ´æ´¢µÄÊý¾Ý´æµµÌ»Â¶ÁË1.2ÒÚ°ÍÎ÷¹«ÃñµÄСÎÒ˽¼Ò˰Îñ¹ÒºÅºÅ£¨CPF£©¡£¡£¡£¡£Æ¾Ö¤InfoArmorµÄÐÎò£¬£¬£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷ÉϵÄ27MBµ½82GBÖ®¼äµÄ¶à¸öÎļþ¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»¸öÊý¾Ý¿âÎļþ°üÀ¨ÁËCPF¡¢ÐÕÃû¡¢µç×ÓÓʼþ¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¾ÍÒµ¡¢Ð¡ÎÒ˽¼Ò´û¿î¡¢ÐÅÓÃÀúÊ·µÈÐÅÏ¢¡£¡£¡£¡£¸ÃĿ¼ºÜ¿ÉÄÜÓÃÓÚ´æ´¢Êý¾Ý¿âµÄ±¸·Ý£¬£¬£¬£¬£¬£¬£¬£¬µ«ÆäËùÓÐÕßûÓÐÒâʶµ½Æä¿É¹ûÕæ»á¼û¡£¡£¡£¡£InfoArmor²»¿ÉÈ·¶¨Ãü¾Ý¿âµÄËùÓÐÕߣ¬£¬£¬£¬£¬£¬£¬£¬µ«ËûÃÇ֪ͨÁËÍйÜЧÀÍÉÌ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷ÓÚ3ÔÂβ»ñµÃ±£»£»£»£»¤¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/taxpayer-id-numbers-for-120-million-brazilians-exposed-online/ÉùÃ÷£º±¾×ÊѶÓÉ¿·¢k8άËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ