IE RCE 0day¼°Defender DoSÎó²î£»£»£»£»£»£»£»2019ÄêÍøÂç¹¥»÷ÈËΪÒòËØ±¨¸æ£»£»£»£»£»£»£»D-Link DNS-320 RCEÎó²î
Ðû²¼Ê±¼ä 2019-09-24
΢ÈíÐû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´IEÖеÄRCE 0day¼°Windows DefenderÖеÄDoSÎó²î¡£¡£¡£¡£¡£ÆäÖÐIE 0dayΪ¹È¸èÑо¿Ö°Ô±Cl¨¦mentLecigne·¢Ã÷µÄ¾ç±¾ÒýÇæÄÚ´æËð»µÎó²î£¨CVE-2019-1367£©£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÄ¿½ñÓû§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¸ÃÎó²î¿ÉÒÔͨ¹ý½«Ä¿µÄÓû§Öض¨ÏòÖÁ¶ñÒâÍøÕ¾À´Ê¹Ó㬣¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨IE9¡¢10ºÍ11¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²îÊÇWindows DefenderÖеľܾøÐ§ÀÍÎó²î£¨CVE-2019-1255£©£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓëDefender´¦Öóͷ£ÎļþµÄ·½·¨Óйأ¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²î×èÖ¹Õýµ±ÕË»§Ö´ÐÐÕýµ±µÄϵͳÎļþ¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄDefender°æ±¾Îª1.1.16300.1£¬£¬£¬£¬£¬£¬£¬£¬²¢ÒÑÔÚ1.1.16400.2ÖÐÐÞ¸´¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-releases-out-of-band-security-update-to-fix-ie-zero-day-defender-bug/2.Ñо¿Ö°Ô±Åû¶D-Link DNS-320×°±¸ÖеÄRCEÎó²î
ÔÎÄÁ´½Ó£º
https://blog.cystack.net/d-link-dns-320-rce/3.ProofpointÐû²¼¡¶2019ÄêÍøÂç¹¥»÷ÖеÄÈËΪÒòËØ¡·ÆÊÎö±¨¸æ
ƾ֤ProofpointµÄ¡¶2019ÄêÍøÂç¹¥»÷ÖеÄÈËΪÒòËØ¡·ÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚÒÑÍù¼¸ÄêÖй¥»÷Õß½«´¹ÂÚ¹¥»÷ÌáÉýµ½ÁËÒ»¸öȫеÄˮƽ£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÆð¾¢Ê¹ÓÃÏûºÄÕßµÄÇéÐ÷£¬£¬£¬£¬£¬£¬£¬£¬ÔÚÈËÃDz»ÖªÇéµÄÇéÐÎÏÂÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£Êг¡ÓªÏúÐÐÒµÊÇ2018ÄêÖÁ2019ÄêµÄÖ÷Òª¹¥»÷Ä¿µÄÖ®Ò»¡£¡£¡£¡£¡£ÕâЩ¹«Ë¾ÓµÓÐÓë¿Í»§ÓйصĴó×ÚÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢ËùÔÚµØÒÔ¼°ÊÂÇéϰ¹ßµÈ£¬£¬£¬£¬£¬£¬£¬£¬ÕâʹµÃËüÃdzÉΪ·¸·¨·Ö×ÓÓмÛÖµµÄÄ¿µÄ¡£¡£¡£¡£¡£³ýÁ˸߹ÜÖ®Í⣬£¬£¬£¬£¬£¬£¬£¬Éç½»¹¤³Ì¹¥»÷µÄÄ¿µÄ»¹°üÀ¨ÆóÒµÖеÄÊÖÒÕÖ§³ÖÍŶӡ¢HRÒÔ¼°²ÆÎñ»á¼ÆµÈ¡£¡£¡£¡£¡£¸Ã±¨¸æ»¹Ç¿µ÷³Æ£¬£¬£¬£¬£¬£¬£¬£¬·¸·¨·Ö×ÓҲͨ¹ýÔÚÉ罻ýÌåÉϽ¨Éè×Ô¼ºµÄÆ·ÅÆ¡¢ÐÎÏóµÈÓÕÆ¸ü¶àµÄÊܺ¦Õß¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.proofpoint.com/us/resources/threat-reports/human-factor4.ÐÂMac¶ñÒâÈí¼þGMERA.Aαװ³ÉÉúÒâÈí¼þÇÔÈ¡Óû§ÐÅÏ¢
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷Ò»¸öαװ³ÉMacƽ̨Õýµ±ÉúÒâÈí¼þStockfolioµÄ¶ñÒâÈí¼þ¼Ò×åGMERA£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¼Ò×å°üÀ¨Á½¸ö±äÌ壬£¬£¬£¬£¬£¬£¬£¬»®·ÖΪTrojan.MacOS.GMERA.AºÍTrojan.MacOS.GMERA.B£¬£¬£¬£¬£¬£¬£¬£¬µÚÒ»¸ö±äÌåÊÇÒ»¸öZIP´æµµÎļþ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸öÀ¦°ó°üStockfoli.appºÍÒ»¸öÒþ²ØµÄ¼ÓÃÜÎļþ.app¡£¡£¡£¡£¡£¸ÃStockfoli.app¾ÓɶñÒâÈí¼þ¿ª·¢ÕßµÄÊý×ÖÖ¤ÊéÊðÃû£¬£¬£¬£¬£¬£¬£¬£¬AppleÌåÏÖ´ËÖ¤ÊéÒÑÓÚ2019Äê7Ô±»µõÏú¡£¡£¡£¡£¡£µÚ¶þ¸ö±äÌå»áÔÚ¶Ë¿Ú25733-25736ÉϽ¨ÉèÅþÁ¬ÖÁC£¦CЧÀÍÆ÷µÄ·´Ïòshell£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÔÚÄ¿µÄ»úеÉÏÖ´ÐÐshellÏÂÁî¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/mac-malware-that-spoofs-trading-app-steals-user-information-uploads-it-to-website/
5.ÃÀTCADÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µç»°ºÍµç×ÓÓʼþµÈЧÀÍÖÐÖ¹
ÔÎÄÁ´½Ó£º
https://www.traviscad.org/wp-content/uploads/2019/09/Cyber-Attack-FAQs.pdf
6.PhishLabs·¢Ã÷αװ³É·çͶºÍ˽ļµÄд¹ÂÚ¹¥»÷
ÔÎÄÁ´½Ó£º
https://info.phishlabs.com/blog/spear-phishing-campaign-impersonates-vcs-and-pe-firms


¾©¹«Íø°²±¸11010802024551ºÅ