IE RCE 0day¼°Defender DoSÎó²î£»£»£»£»£»£»£»2019ÄêÍøÂç¹¥»÷ÈËΪÒòËØ±¨¸æ£»£»£»£»£»£»£»D-Link DNS-320 RCEÎó²î

Ðû²¼Ê±¼ä 2019-09-24
1.΢Èí½ôÆÈÐÞ¸´IEÖеÄRCE 0day¼°DefenderÖеÄDoSÎó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

΢ÈíÐû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬ £¬£¬£¬ÐÞ¸´IEÖеÄRCE 0day¼°Windows DefenderÖеÄDoSÎó²î¡£¡£¡£¡£¡£ÆäÖÐIE 0dayΪ¹È¸èÑо¿Ö°Ô±Cl¨¦mentLecigne·¢Ã÷µÄ¾ç±¾ÒýÇæÄÚ´æËð»µÎó²î£¨CVE-2019-1367£©£¬£¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÄ¿½ñÓû§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¸ÃÎó²î¿ÉÒÔͨ¹ý½«Ä¿µÄÓû§Öض¨ÏòÖÁ¶ñÒâÍøÕ¾À´Ê¹Ó㬣¬£¬£¬£¬ £¬£¬£¬ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨IE9¡¢10ºÍ11¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²îÊÇWindows DefenderÖеľܾøÐ§ÀÍÎó²î£¨CVE-2019-1255£©£¬£¬£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÓëDefender´¦Öóͷ£ÎļþµÄ·½·¨ÓйØ£¬£¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²î×èÖ¹Õýµ±ÕË»§Ö´ÐÐÕýµ±µÄϵͳÎļþ¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄDefender°æ±¾Îª1.1.16300.1£¬£¬£¬£¬£¬ £¬£¬£¬²¢ÒÑÔÚ1.1.16400.2ÖÐÐÞ¸´¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-releases-out-of-band-security-update-to-fix-ie-zero-day-defender-bug/

2.Ñо¿Ö°Ô±Åû¶D-Link DNS-320×°±¸ÖеÄRCEÎó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


CyStack SecurityÑо¿Ö°Ô±·¢Ã÷D-Link DNS-320 ShareCenter×°±¸±£´æÒ»¸öÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔ¶³Ì¿ØÖÆ×°±¸²¢»á¼û×°±¸ÉÏ´æ´¢µÄÎļþ¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-16057£©µÄCVSSÆÀ·ÖΪ10·Ö£¬£¬£¬£¬£¬ £¬£¬£¬ËüÓ°ÏìÁ˹̼þ°æ±¾Îª2.05b10¼°¸üµÍµÄDNS-320×°±¸¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÓëDNS-320ÖÎÀí½çÃæµÄµÇ¼ģ¿£¿£¿£¿éÓйØ£¬£¬£¬£¬£¬ £¬£¬£¬ÊÜÓ°ÏìµÄÄ£¿£¿£¿£¿é/cgi/login_mgr.cgi°üÀ¨Ò»¸ö¿ÉÄܱ»Ê¹ÓõIJÎÊýport£¬£¬£¬£¬£¬ £¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚrootȨÏÞÏÂÖ´ÐÐí§ÒâÏÂÁ£¬£¬£¬£¬ £¬£¬£¬´Ó¶øµ¼ÖÂ×°±¸±»½ÓÊÜ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.cystack.net/d-link-dns-320-rce/

3.ProofpointÐû²¼¡¶2019ÄêÍøÂç¹¥»÷ÖеÄÈËΪÒòËØ¡·ÆÊÎö±¨¸æ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

ƾ֤ProofpointµÄ¡¶2019ÄêÍøÂç¹¥»÷ÖеÄÈËΪÒòËØ¡·ÆÊÎö±¨¸æ£¬£¬£¬£¬£¬ £¬£¬£¬ÔÚÒÑÍù¼¸ÄêÖй¥»÷Õß½«´¹ÂÚ¹¥»÷ÌáÉýµ½ÁËÒ»¸öȫеÄˮƽ£¬£¬£¬£¬£¬ £¬£¬£¬ËûÃÇÆð¾¢Ê¹ÓÃÏûºÄÕßµÄÇéÐ÷£¬£¬£¬£¬£¬ £¬£¬£¬ÔÚÈËÃDz»ÖªÇéµÄÇéÐÎÏÂÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£Êг¡ÓªÏúÐÐÒµÊÇ2018ÄêÖÁ2019ÄêµÄÖ÷Òª¹¥»÷Ä¿µÄÖ®Ò»¡£¡£¡£¡£¡£ÕâЩ¹«Ë¾ÓµÓÐÓë¿Í»§ÓйصĴó×ÚÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬£¬°üÀ¨ÐÕÃû¡¢ËùÔÚµØÒÔ¼°ÊÂÇéϰ¹ßµÈ£¬£¬£¬£¬£¬ £¬£¬£¬ÕâʹµÃËüÃdzÉΪ·¸·¨·Ö×ÓÓмÛÖµµÄÄ¿µÄ¡£¡£¡£¡£¡£³ýÁ˸߹ÜÖ®Í⣬£¬£¬£¬£¬ £¬£¬£¬Éç½»¹¤³Ì¹¥»÷µÄÄ¿µÄ»¹°üÀ¨ÆóÒµÖеÄÊÖÒÕÖ§³ÖÍŶӡ¢HRÒÔ¼°²ÆÎñ»á¼ÆµÈ¡£¡£¡£¡£¡£¸Ã±¨¸æ»¹Ç¿µ÷³Æ£¬£¬£¬£¬£¬ £¬£¬£¬·¸·¨·Ö×ÓҲͨ¹ýÔÚÉ罻ýÌåÉϽ¨Éè×Ô¼ºµÄÆ·ÅÆ¡¢ÐÎÏóµÈÓÕÆ­¸ü¶àµÄÊܺ¦Õß¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.proofpoint.com/us/resources/threat-reports/human-factor

4.ÐÂMac¶ñÒâÈí¼þGMERA.Aαװ³ÉÉúÒâÈí¼þÇÔÈ¡Óû§ÐÅÏ¢


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷Ò»¸öαװ³ÉMacƽ̨Õýµ±ÉúÒâÈí¼þStockfolioµÄ¶ñÒâÈí¼þ¼Ò×åGMERA£¬£¬£¬£¬£¬ £¬£¬£¬¸Ã¼Ò×å°üÀ¨Á½¸ö±äÌ壬£¬£¬£¬£¬ £¬£¬£¬»®·ÖΪTrojan.MacOS.GMERA.AºÍTrojan.MacOS.GMERA.B£¬£¬£¬£¬£¬ £¬£¬£¬µÚÒ»¸ö±äÌåÊÇÒ»¸öZIP´æµµÎļþ£¬£¬£¬£¬£¬ £¬£¬£¬ÆäÖаüÀ¨Ò»¸öÀ¦°ó°üStockfoli.appºÍÒ»¸öÒþ²ØµÄ¼ÓÃÜÎļþ.app¡£¡£¡£¡£¡£¸ÃStockfoli.app¾­ÓɶñÒâÈí¼þ¿ª·¢ÕßµÄÊý×ÖÖ¤ÊéÊðÃû£¬£¬£¬£¬£¬ £¬£¬£¬AppleÌåÏÖ´ËÖ¤ÊéÒÑÓÚ2019Äê7Ô±»µõÏú¡£¡£¡£¡£¡£µÚ¶þ¸ö±äÌå»áÔÚ¶Ë¿Ú25733-25736ÉϽ¨ÉèÅþÁ¬ÖÁC£¦CЧÀÍÆ÷µÄ·´Ïòshell£¬£¬£¬£¬£¬ £¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÔÚÄ¿µÄ»úеÉÏÖ´ÐÐshellÏÂÁî¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/mac-malware-that-spoofs-trading-app-steals-user-information-uploads-it-to-website/

5.ÃÀTCADÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬£¬µç»°ºÍµç×ÓÓʼþµÈЧÀÍÖÐÖ¹

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÃÀ¹úÌØÀ­Î¬Ë¹ÏØÖÐÑëÆÀ¹ÀÇø£¨TCAD£©ÓÚ9ÔÂ19ÈÕÈ·ÈϳÆÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ £¬£¬£¬µ¼Ö¶àÏîЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£TCADÈÏÕæ¶Ô¸ÃÏØµÄ·¿µØ²ú¾ÙÐÐÆÀ¹À£¬£¬£¬£¬£¬ £¬£¬£¬¸Ã»ú¹¹È·ÈϹ¥»÷ÊÂÎñ±¬·¢ÔÚ9ÔÂ11ÈÕÍíÉÏ9:30£¬£¬£¬£¬£¬ £¬£¬£¬¸Ã¹¥»÷Ó°ÏìÁËÍøÕ¾µÄ·¿²úËÑË÷¹¦Ð§ÒÔ¼°µç×ÓÓʼþ¡¢µç»°ºÍÅÌËã»ú¸¨ÖúÆÀ¹Àϵͳ£¬£¬£¬£¬£¬ £¬£¬£¬µ«¿Í»§Ð§ÀÍºÍÆÀ¹ÀÉê±çµÈÒ»Ñùƽ³£²Ù×÷²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£Ð§ÀÍÆ÷ÉϵÄÐí¶àÎļþ±»ÀÕË÷²¡¶¾¼ÓÃÜ£¬£¬£¬£¬£¬ £¬£¬£¬µ¼Ö¸ûú¹¹µÄ²¿·ÖЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¸Ã»ú¹¹¾Ü¾øÖ§¸¶Êê½ð£¬£¬£¬£¬£¬ £¬£¬£¬²¢ÕýÔÚÓëר¼ÒÏàÖúÒÔ´Ó±¸·ÝÊý¾ÝÖлָ´ÔËÓª¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.traviscad.org/wp-content/uploads/2019/09/Cyber-Attack-FAQs.pdf

6.PhishLabs·¢Ã÷αװ³É·çͶºÍ˽ļµÄд¹ÂÚ¹¥»÷

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


PhishLabsÑо¿Ö°Ô±·¢Ã÷·¸·¨·Ö×ÓÕýÔÚð³ä˽ļ¹«Ë¾Crossplane CapitalºÍEdgemont PartnersµÄÔ±¹¤À´ÓÕÆ­Êܺ¦Õß¡£¡£¡£¡£¡£ÎªÁËÓªÔìÕæÊµÐԺͽôÆÈ¸Ð£¬£¬£¬£¬£¬ £¬£¬£¬·¸·¨·Ö×ÓʹÓÃÁËÕæÊµÔ±¹¤¡¢PE»òVCµÄÃû×Ö£¬£¬£¬£¬£¬ £¬£¬£¬²¢ÇÒ°üÀ¨Ò»¸öÒÑÊðÃûµÄ±£ÃÜЭÒ飨NDA£©¡£¡£¡£¡£¡£¸ÃNDAλÓÚÒ»¸öͼƬÁ´½Óºó£¬£¬£¬£¬£¬ £¬£¬£¬ÆäURLʹÓÃÁË×î½ü×¢²áµÄÄ£ÄâÁËÕæÊµË½Ä¼¹«Ë¾µÄαÔìÓòÃû£¬£¬£¬£¬£¬ £¬£¬£¬²¢×îÖÕ½«Êܺ¦ÕßÖØ¶¨ÏòÖÁhxxps://serversecuredhttp[.]com¡£¡£¡£¡£¡£¸ÃÍøÕ¾ÒªÇóÊܺ¦ÕߵǼÆäOffice 365ÕÊ»§ÒÔÏÂÔØÎĵµ£¬£¬£¬£¬£¬ £¬£¬£¬ÕâÒ²ÕýÊÇ·¸·¨·Ö×ӵĴ¹ÂÚÄ¿µÄ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://info.phishlabs.com/blog/spear-phishing-campaign-impersonates-vcs-and-pe-firms