ά»ù½âÃÜÊ×´´È˱»²¶£»£»£»£»£»£»£»Apache TomcatÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»EMOTETй¥»÷»î¶¯
Ðû²¼Ê±¼ä 2019-04-12
ά»ù½âÃÜÊ×´´È˰¢É£Ææ£¨Julian Assange£©ÔÚ¶ò¹Ï¶à¶ûפÂ×¶Ø´óʹ¹Ý±»²¶£¬£¬£¬£¬£¬£¬Ö®Ç°°¢É£ÆæÔøÔڸôóʹ¹Ý±ÜÄѳ¤´ï7ÄêµÄʱ¼ä¡£¡£¡£¡£Æ¾Ö¤Â׶ش󶼻ᾯԱ¾ÖÐû²¼µÄÒ»·Ý¼ò¶Ì˵Ã÷£¬£¬£¬£¬£¬£¬ÔÚ¶ò¹Ï¶à¶ûÕþ¸®³·»ØÆäÕþÖκǻ¤ºó£¬£¬£¬£¬£¬£¬Ó¢¹ú¾¯Ô±½øÈëʹ¹Ý½«°¢É£Ææ¾Ð²¶¡£¡£¡£¡£Ó¢¹ú¾¯·½ÌåÏÖ½«¾¡¿ìÈð¢É£ÆæÔÚÂ×¶ØÎ÷ÃôÇøµÄ·¨Í¥³öÍ¥¡£¡£¡£¡£ÃÀ¹ú˾·¨²¿Ò²³Æ°¢É£Ææ½«ÃæÁÙÒý¶ÉËßËÏ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/04/wikileaks-julian-assange-arrested.html
2¡¢Apache TomcatÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-0232£©
4ÔÂ10ÈÕApache¹Ù·½Ðû²¼Í¨¸æ³Æ½«ÔÚа汾ÖÐÐÞ¸´Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-0232£©¡£¡£¡£¡£ÓÉÓÚJREÔÚ½«²ÎÊýת´ïµ½WindowsÇéÐÎʱCGI ServletÖб£´æÊäÈëÑéÖ¤¹ýʧ£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÇëÇóÒÔTomcatµÄȨÏÞÔÚϵͳÉÏ×¢ÈëºÍÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£ÊÜÓ°ÏìµÄTomcat°æ±¾°üÀ¨9.0.13¡¢9.0.14ºÍ9.0.16¡£¡£¡£¡£Apache¹Ù·½ÉÐδÐû²¼ÐÞ¸´²¹¶¡£¡£¡£¡£¬£¬£¬£¬£¬£¬µ«Óû§¿Éͨ¹ý½ûÓÃenableCmdLineArgumentsÑ¡ÏîÔÝʱ¾ÙÐзÀ»¤¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.cybersecurity-help.cz/vdb/SB2019041101?affChecked=1
3¡¢VSDC¹ÙÍøÔÙÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬±»ÓÃÓÚ·Ö·¢ÒøÐÐľÂíºÍÐÅϢ͵ÇÔľÂí
Ãâ·ÑÊÓÆµ±à¼Æ÷VSDCµÄ¹ÙÍøÔÙ´ÎÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐ®ÖÆÁËÍøÕ¾ÉϵÄÈí¼þÏÂÔØÁ´½Ó£¬£¬£¬£¬£¬£¬ÓÃÓÚ·Ö·¢ÒøÐÐľÂíWin32.Bolik.2ºÍÐÅϢ͵ÇÔľÂíTrojan.PWS.Stealer£¨KPOT Stealer£©¡£¡£¡£¡£Õâ²»ÊÇVSDC¹ÙÍøµÚÒ»´ÎÔâµ½ÈëÇÖ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔøÔÚ2018Äê6ÔºÍ7ÔÂÈëÇÖ¹ý¸ÃÍøÕ¾£¬£¬£¬£¬£¬£¬²¢½«Èí¼þÏÂÔØÁ´½ÓÌæ»»ÎªAZORult Stealer¡¢X-Key KeyloggerºÍDarkVNCºóÃŵÄÏÂÔØÁ´½Ó¡£¡£¡£¡£ÕâÒ»´ÎÈëÇÖ±¬·¢ÔÚ2ÔÂ21ÈÕÖÁ3ÔÂ23ÈÕÖ®¼ä£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÕë¶ÔÓ¢¹ú¡¢ÃÀ¹ú¡¢¼ÓÄôóºÍ°Ä´óÀûÑǵÄÓû§£¬£¬£¬£¬£¬£¬ÖÁÉÙÓÐ565ÃûÓû§Ñ¬È¾ÁËWin32.Bolik.2£¬£¬£¬£¬£¬£¬ÁíÍâ83ÃûÓû§Ñ¬È¾ÁËKPOT Stealer¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/vsdc-site-hacked-again-to-spread-password-stealing-malware/
4¡¢ÃÀ¹úDHSÖÒÑÔÓëAPT×éÖ¯LazarusÓйصÄжñÒâÈí¼þHoplight
DHSºÍFBIÕë¶ÔÒ»¸öеĶñÒâÈí¼þHoplightÐû²¼ÖÒÑÔ£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÓëÎÛÃûÕÑÖøµÄ³¯ÏÊAPT×éÖ¯LazarusÓйء£¡£¡£¡£HoplightÊÇPE32Îļþ£¬£¬£¬£¬£¬£¬¿ÉÍøÂçÄ¿µÄϵͳµÄÏà¹ØÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨OS°æ±¾¡¢¾íÐÅÏ¢¡¢ÏµÍ³Ê±¼ä¼°Ã¶¾ÙÇý¶¯Æ÷ºÍ·ÖÇøÐÅÏ¢¡£¡£¡£¡£Hoplight»¹¾ßÓÐÒÔϹ¦Ð§£º¶ÁÈ¡¡¢Ð´ÈëºÍÒÆ¶¯Îļþ£»£»£»£»£»£»£»½¨ÉèºÍɱËÀÀú³Ì£»£»£»£»£»£»£»Àú³Ì×¢È룻£»£»£»£»£»£»½¨Éè¡¢Æô¶¯ºÍ×èֹЧÀÍ£»£»£»£»£»£»£»ÐÞ¸Ä×¢²á±í£»£»£»£»£»£»£»ÅþÁ¬Ô¶³ÌÖ÷»ú£»£»£»£»£»£»£»ÉÏ´«ºÍÏÂÔØÎļþ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓú«¹úÍøÂ繫˾NaverµÄSSLÖ¤Êé¾ÙÐÐͨѶ£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÊðÀíÀ´»ìÏýÆä»î¶¯¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/us-government-warns-north-korean-1-1/
5¡¢Áè¼Ý6Íò¸ö±»µÁÉèÖÃÎļþÔÚGenesis StoreÉϳöÊÛ
¿¨°Í˹»ùÑо¿ÍŶӷ¢Ã÷Áè¼Ý6Íò¸ö±»µÁµÄÉèÖÃÎļþÔÚ°µÍøÊг¡Genesis StoreÉϳöÊÛ¡£¡£¡£¡£ÕâЩÉèÖÃÎļþÖаüÀ¨ä¯ÀÀÆ÷Ö¸ÎÆ¡¢Óû§µÇ¼ÃûºÍÃÜÂë¡¢cookies¼°ÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬µ¥¸öÉèÖÃÎļþµÄÊÛ¼Û´Ó5µ½200ÃÀÔª²»µÈ¡£¡£¡£¡£Genesis Store»¹ÎªÓû§ÌṩÁËÒ»¸öÌØÊâµÄ.crx²å¼þ£¬£¬£¬£¬£¬£¬¿É×ÊÖú·¸·¨·Ö×ÓʹÓÃÕâЩÉèÖÃÎļþαװ³ÉÕýµ±Óû§µÄÉí·Ý¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83630/deep-web/genesis-store-fingerprints.html
6¡¢EMOTETй¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖÇÀûµÄ½ðÈÚºÍÒøÐÐЧÀÍ
SI-LAB·¢Ã÷EMOTETµÄÐÂÒ»²¨¹¥»÷À˳±Ö÷ÒªÕë¶ÔÖÇÀûµÄ½ðÈÚºÍÒøÐÐЧÀÍ£¬£¬£¬£¬£¬£¬ÔÚ3ÔÂ18ÈÕÖÁ26ÈÕʱ´úÒÑÓÐ176ÃûÊܺ¦ÕßÔâµ½¹¥»÷¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯ÈÔÒÔ´¹ÂÚÓʼþµÄÐÎʽ¾ÙÐУ¬£¬£¬£¬£¬£¬µÚÒ»½×¶ÎÊͷŶñÒâ¾ç±¾__Denuncia_Activa_CL.PDF.bat£¬£¬£¬£¬£¬£¬¸Ã¾ç±¾¿ÉÈÆ¹ýÇå¾²½â¾ö¼Æ»®µÄ¼ì²â¡£¡£¡£¡£µÚ¶þ½×¶ÎµÄ¶ñÒâÎļþdenuncias.rarÔòʹÓÃÁËWinRARÖеÄACEÎó²î£¨CVE-2018-20250£©À´·Ö·¢EMOTET¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83620/breaking-news/emotet-targets-chile.html


¾©¹«Íø°²±¸11010802024551ºÅ