¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181221
Ðû²¼Ê±¼ä 2018-12-21
Ñо¿Ö°Ô±SandboxEscaperµÚÈý´ÎÔÚTwitterÉÏÅû¶δÐÞ¸´µÄWindows 0day£¬£¬£¬£¬£¬£¬²¢ÇÒÐû²¼ÁËÏà¹ØPoC¡£¡£¡£Õâ¸öеÄÎó²î±£´æÓÚWindowsµÄMsiAdvertiseProduct¹¦Ð§ÖУ¬£¬£¬£¬£¬£¬Æ¾Ö¤¸ÃÑо¿Ö°Ô±µÄ˵·¨£¬£¬£¬£¬£¬£¬ÓÉÓÚûÓÐ׼ȷÑéÖ¤£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøù¦Ð§Ç¿ÆÈ×°ÖÃЧÀÍÒÔSYSTEMȨÏÞ¸´ÖÆí§ÒâÎļþ²¢¶ÁÈ¡ÆäÄÚÈÝ£¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂí§ÒâÎļþ¶ÁÈ¡Îó²î¡£¡£¡£SandboxEscaper»¹ÔÚGithubÉÏÐû²¼Á˸ÃÎó²îµÄPoC£¬£¬£¬£¬£¬£¬µ«¸ÃGithubÕË»§ÏÖÔÚÒѱ»É¾³ý¡£¡£¡£SandboxEscaperÔøÔÚ2018Äê8Ô·ݺÍ10Ô·ݻ®·ÖÔÚTwitterÉÏÅû¶ÁËÁ½¸öWindows 0day¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/windows-zero-day-exploit.html2¡¢McAfee³Æ×î½üµÄShamoon¹¥»÷»î¶¯ÒÉÓëÒÁÀÊAPT33ÓйØ
ƾ֤McAfeeʵÑéÊÒ¶Ô×î½üµÄShamoon¹¥»÷»î¶¯µÄÆÊÎö£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪÆä¹¤¾ß¡¢ÊÖÒպͳÌÐò£¨TTP£©Óë2016ÖÁ2017ÄêµÄShamoon v2¼á³ÖÒ»Ö£¬£¬£¬£¬£¬£¬2018ÄêµÄShamoon¹¥»÷»î¶¯¿ÉÄÜÓëÒÁÀʺڿÍ×éÖ¯APT33Óйأ¬£¬£¬£¬£¬£¬µ«Ò²ÓпÉÄÜÊÇÆäËü¹¥»÷Õßαװ³ÉAPT33¡£¡£¡£ÔÚÒÑÍùµÄ¼¸ÖÜÀ£¬£¬£¬£¬£¬Shamoon v3ͨ¹ýÇóÖ°Àà´¹ÂÚÍøÕ¾¹¥»÷ʯÓÍ¡¢×ÔÈ»Æø¡¢ÄÜÔ´¡¢µçÐÅÆóÒµºÍÕþ¸®»ú¹¹£¬£¬£¬£¬£¬£¬ÕâЩÓÃÓÚÍøÂçÊܺ¦Õ߯¾Ö¤µÄÆðÔ´´¹ÂÚ¹¥»÷ËÆºõÔçÔÚ2018Äê8ÔÂβ¾ÍÒÑ×îÏÈ¡£¡£¡£ÔÚеÄ.Net°æ±¾µÄÊý¾Ý²Á³ýÆ÷ÖУ¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Á˰üÀ¨Ò»¶Î¹ÅÀ¼¾ÎĵÄASCII×Ö·û£¨Surah Masad, Ayat 1£¬£¬£¬£¬£¬£¬´óÒâÎªÕæÖ÷±Ø½«´¦·Ö£©¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/shamoon-attackers-employ-new-tool-kit-to-wipe-infected-systems/3¡¢15¸öAndroid±ÚÖ½Ó¦Óñ£´æ¹ã¸æÚ²ÆÐÐΪ£¬£¬£¬£¬£¬£¬×ÜÏÂÔØÁ¿Áè¼Ý22Íò´Î
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±ÔÚGoogle PlayÖмì²âµ½15¸öÉæ¼°¹ã¸æÚ²Æ»î¶¯µÄAndroid±ÚÖ½Ó¦Ó㬣¬£¬£¬£¬£¬ÕâЩӦÓõÄ×ÜÌåÏÂÔØÁ¿Áè¼Ý22.22Íò´Î¡£¡£¡£Ò£²âÊý¾ÝÅú×¢Êܵ½Ñ¬È¾×î¶àµÄ¹ú¼Ò/µØÇøÊÇÒâ´óÀû¡¢Öйų́Íå¡¢ÃÀ¹ú¡¢µÂ¹úºÍÓ¡¶ÈÄáÎ÷ÑÇ¡£¡£¡£GoogleÏÖÔÚÒÑ´ÓPlay StoreÖÐɾ³ýÁËÕâЩ¶ñÒâÓ¦Óᣡ£¡£ÕâЩӦÓÃ×Ô¼ºÒ²¾ßÓкܸߵÄÓû§ºÃÆÀ£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±¸ß¶ÈÏÓÒÉÕâЩ̸ÂÛÊǼٵ쬣¬£¬£¬£¬£¬Ö»ÊÇΪÁËÎüÒýÓû§ÏÂÔØ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/android-wallpaper-apps-found-running-ad-fraud-scheme/4¡¢MiraiбäÖÖMioriͨ¹ýPHP¿ò¼ÜÖеÄRCEÎó²îÈö²¥
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷IoT½©Ê¬ÍøÂçMiraiµÄÒ»¸ö±äÖÖMioriͨ¹ýPHP¿ò¼ÜThinkPHPÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îÈö²¥¡£¡£¡£¸ÃÎó²îÊÇ12ÔÂ11ÈÕÆØ¹âµÄÒ»¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬Ó°ÏìÁËThinkPHP v5.0.23/5.1.31¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£Ò»µ©Óû§µÄLinuxЧÀÍÆ÷ѬȾÁËMiori£¬£¬£¬£¬£¬£¬Ëü½«»á³ÉΪ½©Ê¬ÍøÂçµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬ÓÃÓÚÌᳫDDoS¹¥»÷¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÁíÍâµÄÁ½¸öÒÑÖªµÄMirai±äÖÖIZ1H9ºÍAPEPͬÑùʹÓøÃÎó²î¾ÙÐÐÈö²¥¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/with-mirai-comes-miori-iot-botnet-delivered-via-thinkphp-remote-code-execution-exploit/5¡¢ÃÀ¹úºÍÓ¢¹úÔâÓöÐÂÒ»ÂÖ¶ñÒâÓʼþ¹¥»÷£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô½ðÈÚ¹«Ë¾
Menlo Labs·¢Ã÷Õë¶ÔÒøÐкͽðÈÚЧÀ͹«Ë¾µÄ¶ñÒâµç×ÓÓʼþ»î¶¯£¬£¬£¬£¬£¬£¬¸Ã»î¶¯×Ô2018Äê8ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¡£¡£¡£¸Ã»î¶¯ÖеĶñÒâpayloadÍйÜÔÚGoogleÔÆÐ§ÀÍ£¨storage.googleapis.com£©ÉÏ£¬£¬£¬£¬£¬£¬ÒÔÈÆ¹ýÇå¾²²úÆ·µÄÇå¾²¿ØÖÆ¡£¡£¡£µÚÒ»½×¶ÎµÄdropper°üÀ¨vbsÎļþºÍjarÎļþ£¬£¬£¬£¬£¬£¬ÕâЩvbsÎļþ¾ÙÐÐÁ˸߶ȻìÏý£¬£¬£¬£¬£¬£¬²¢ÇÒ¿ÉÄÜÊÇÓÉÏàͬµÄ¹¤¾ß°ü½¨ÉèµÄ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.menlosecurity.com/blog/a-jar-full-of-problems-for-financial-services-companies6¡¢Î¢ÈíÐû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Ò»¸öÐÂIE 0day
΢ÈíÐû²¼½ôÆÈ´øÍâ¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´IEä¯ÀÀÆ÷ÖеÄÒ»¸ö¸ßΣ0day¡£¡£¡£¸ÃÎó²î£¨CVE-2018-8653£©ÊÇÓɹȸèÍþвÆÊÎöС×éµÄÇå¾²Ñо¿Ô±Clement Lecigne·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬ÊÇIE JScript¾ç±¾ÒýÇæÖеÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¬£¬£¬£¬£¬£¬ÀÖ³ÉʹÓôËÎó²îµÄ¹¥»÷Õß¿ÉÒÔÔÚÄ¿½ñÓû§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËWindows Server 2008ÖеÄIE9£¬£¬£¬£¬£¬£¬Windows Server 2012ÖеÄIE10ÒÔ¼°¶à¸öWindows°æ±¾ÖеÄIE 11¡£¡£¡£ÓÉÓÚ´ËÎó²îÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Ó㬣¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì×°ÖøüС£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/internet-explorer-zero-day.htmlÉùÃ÷£º±¾×ÊѶÓÉ¿·¢k8άËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ