ά»ù½âÃÜÐû²¼Êýǧ·ÝÃô¸ÐÎļþ£»£»£»ÓÌËûÖݼӷƶûµÂÏØÔâÀÕË÷Èí¼þ¹¥»÷£»£»£»ÐÂÍÚ¿óľÂíPS1.LUDICROUZ.A

Ðû²¼Ê±¼ä 2019-04-16
1.ά»ù½âÃÜÐû²¼Êýǧ·ÝÃô¸ÐÎļþµÄÏÂÔØºÏ¼¯

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

4ÔÂ13ÈÕά»ù½âÃÜÔÚTwitterÉÏÐû²¼ÁËÊýǧ·ÝÃô¸ÐÎļþµÄºÏ¼¯ÏÂÔØÁ´½Ó£¬£¬£¬£¬£¬£¬Æ¾Ö¤Î¬»ù½âÃܵĹٷ½ËµÃ÷£¬£¬£¬£¬£¬£¬¸ÃÁ´½ÓÊÇÒÑÐû²¼ÎļþµÄºÏ¼¯£¬£¬£¬£¬£¬£¬±ãÓÚÓû§½¨Éè¾µÏñ¡¢ÍÑʱ»ú¼û»òʹÓÃԭʼÊý¾Ý£¬£¬£¬£¬£¬£¬²¢²»ÊǶ԰¢É£Ææ±»²¶µÄ»ØÓ¦¡£¡£¡£¸ÃÁ´½ÓµÄÍøÖ·Îªhttps://file.wikileaks.org/£¬£¬£¬£¬£¬£¬½öfileÎļþ¼Ð¾Í°üÀ¨1763·ÝÎļþ£¬£¬£¬£¬£¬£¬ÎļþµÄʱ¼ä¶¼ÏÔʾΪ1984Äê1ÔÂ1ÈÕ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://twitter.com/wikileaks

2.ApacheÐû²¼Tomcatа汾£¬£¬£¬£¬£¬£¬ÐÞ¸´RCEÎó²î£¨CVE-2019-0232£©

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

ApacheÈí¼þ»ù½ð»á£¨ASF£©Ðû²¼TomcatµÄа汾£¬£¬£¬£¬£¬£¬ÐÞ¸´Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-0232£©¡£¡£¡£¸ÃÎó²î±£´æÓÚÆôÓÃÁËenableCmdLineArgumentsÑ¡ÏîµÄCGI ServletÖУ¬£¬£¬£¬£¬£¬ÓëJREÏòWindowsת´ï²ÎÊýÀú³ÌÖеÄbugÓйء£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÔÊÐíÔ¶³Ì¹¥»÷ÕßÔÚÄ¿µÄЧÀÍÆ÷ÉÏÖ´ÐÐí§ÒâÏÂÁ£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂЧÀÍÆ÷±»ÍêÈ«¿ØÖÆ¡£¡£¡£ApacheÔÚTomcat 9.0.18¡¢8.5.40¡¢7.0.94¼°¸ü¸ß°æ±¾ÖÐÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ì¸üС£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/04/apache-tomcat-security-flaw.html

3.ÓÌËûÖݼӷƶûµÂÏØÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ÒÑÏò¹¥»÷ÕßÖ§¸¶Êê½ð

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

ÃÀ¹úÓÌËûÖݼӷƶûµÂÏØÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Ò»ÃûÔ±¹¤µã»÷ÁË´¹ÂÚÁ´½Ó£¬£¬£¬£¬£¬£¬µ¼Ö·¸·¨·Ö×Ó»ñµÃÁËÄÚ²¿ÍøÂçµÄ»á¼ûȨ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÀÕË÷Èí¼þ¶ÔÏà¹ØÓªÒµÏµÍ³µÄÎļþ¾ÙÐÐÁ˼ÓÃÜ¡£¡£¡£¸ÃÏØÕþ¸®±»ÆÈתÏòʹÓÃÖ½ÕžÙÐа칫¡£¡£¡£ËæºóÏØÕþ¸®Ö§¸¶ÁËÊê½ð£¬£¬£¬£¬£¬£¬ÏÖÔÚϵͳÒѾ­»Ö¸´Õý³£¡£¡£¡£¸ÃÏØÕþ¸®²¢Î´Í¸Â¶Ïà¹Ø¹¥»÷ϸ½Ú£¬£¬£¬£¬£¬£¬°üÀ¨ÀÕË÷Èí¼þµÄÃû³Æ¼°Ö§¸¶µÄÊê½ð½ð¶îµÈ¡£¡£¡£ÕâÒ»ÊÂÎñÅú×¢£¬£¬£¬£¬£¬£¬µØ·½Õþ¸®ÒòÆä¶ÔÐÅÏ¢ÊÖÒյĸ߶ÈÒÀÀµºÍÆÕ±é½Ï²îµÄÇå¾²ÐÔ¶ø³ÉΪ·¸·¨·Ö×ÓÔ½À´Ô½ÓÐÎüÒýÁ¦µÄÄ¿µÄ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

http://www.securityweek.com/utah-county-struck-ransomware

4.д¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Ö¼ÔÚÈö²¥Õë¶ÔÁ¢ÌÕÍð¹ú·À²¿³¤µÄÐéαÐÂÎÅ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

4ÔÂ10ÈÕ·ºÆðÁËÕë¶ÔÁ¢ÌÕÍðµÄÒ»¸öд¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬¹¥»÷Õß´ÓÒ»¸öαװ³É¹ú·À²¿Ô±¹¤µÄÓʼþµØµã·¢ËÍÖ¼ÔÚÈö²¥ÐéαÐÂÎŵĴ¹ÂÚÓʼþ¡£¡£¡£¸ÃÓʼþ³ÆÁ¢ÌÕÍð¹ú·À²¿³¤Raimundas KaroblisÔÚÎäÆ÷²É¹ºÀú³ÌÖÐÊÕÊÜÁË58.6ÍòÃÀÔªµÄÐлߣ¬£¬£¬£¬£¬£¬²¢ÇÒÁ¢ÌÕÍðµÄÒ»¼ÒÒøÐÐÌṩÁËÏà¹ØÖ¤ÊµÎļþ¡£¡£¡£¸ÃÐéαÐÂÎÅÔÚÉ罻ýÌåÉÏÆÕ±éÈö²¥¡£¡£¡£¹ú·ÀÊÖÏÂÊôµÄ¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©ÒÑ×îÏȶԴ˴δ¹ÂÚ¹¥»÷Õö¿ªÊӲ죬£¬£¬£¬£¬£¬²¢ÖÒÑÔ¹«ÖÚ²»Òª×ª·¢ÕâЩÓʼþºÍµã»÷ÓʼþÖеĴ¹ÂÚÁ´½Ó¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/spear-phishing-campaign-uses-misinformation-tactics-aimed-at-the-lithuanian-defense-minister-31f9bef7

5.¹¥»÷ÕßʹÓÃSaaSƽ̨Land LordzÌᳫ´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔAirbnb¿Í»§

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

¹¥»÷ÕßʹÓÃSaaSƽ̨Land LordzÏòAirbnbÓû§Ìᳫ´¹ÂÚ¹¥»÷¡£¡£¡£Land LordzÊÇÒ»¸öÈí¼þ¼´Ð§ÀÍÆ½Ì¨£¬£¬£¬£¬£¬£¬¿É×Ô¶¯½¨ÉèºÍÖÎÀíÐéαµÄAirbnbÍøÕ¾¡£¡£¡£ÐéαµÄÍøÕ¾ÉϰüÀ¨Áè¼Ý500´¦·¿²úÁбí£¬£¬£¬£¬£¬£¬Ò»µ©Êܺ¦Õßµã»÷¸ÃÁбí£¬£¬£¬£¬£¬£¬¾Í»áÌø×ªµ½´¹ÂÚÍøÕ¾airbnb.longterm-airbnb[.]co[.]uk£¬£¬£¬£¬£¬£¬¶øÕýµ±ÍøÕ¾µÄÓòÃûÊÇAirbnb.com¡£¡£¡£¸Ã´¹ÂÚÍøÕ¾»áÇÔÈ¡Óû§µÄAirbnbµÇ¼ÃûºÍÃÜÂ룬£¬£¬£¬£¬£¬²¢ÊÔͼƭȡÓû§µÄ×ʽ𡣡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/scammers-leverage-land-lordz-software-as-a-service-to-dupe-airbnb-customers-56265f3b

6.ÐÂÍÚ¿óľÂíPS1.LUDICROUZ.A£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°Ä´óÀûÑǺͶ«ÄÏÑÇ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷Ò»¸öеÄÍÚ¿óľÂíTrojan.PS1.LUDICROUZ.A£¬£¬£¬£¬£¬£¬¸ÃľÂíÖ÷ÒªÕë¶Ô°Ä´óÀûÑÇ¡¢Öйų́Íå¡¢Ô½ÄÏ¡¢ÖйúÏã¸Û¡¢Ó¡¶ÈºÍÖйúµÄÓû§£¬£¬£¬£¬£¬£¬ÊÔͼÍÚÈ¡ÃÅÂÞ±Ò¡£¡£¡£¸ÃľÂíͨ¹ý¶àÖÖÈö²¥·½·¨»ñȡϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬°üÀ¨ÈõÃÜÂë¡¢¹þϣת´ï¡¢WindowsÖÎÀí¹¤¾ßºÍ±©Á¦¹¥»÷¡£¡£¡£¸ÃľÂí»¹Ê¹ÓÃEternalBlueÎó²î¼°Ê¹ÓÃPowerShellÀ´Ìӱܼì²âºÍ¾²Ä¬Èö²¥¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/new-miner-malware-leverages-variety-of-propagation-techniques-to-infect-windows-systems-d0060543