¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·£»£» £»£»Imperva³ÆÆäÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿±»µÁ£»£» £»£»NemtyµÄ½âÃܹ¤¾ß

Ðû²¼Ê±¼ä 2019-10-12
1¡¢°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄÐû²¼¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©Ðû²¼¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÖ¸ÄÏÐðÊöÁ˳£¼ûµÄÍøÂçÍþвÒÔ¼°ÆóÒµ¿ÉÒÔ½ÓÄÉÄÄЩ²½·¥À´±£»£» £»£»¤×Ô¼ºÃâÊÜË𺦡£ ¡£¡£¸ÃÖ¸ÄÏרΪÖÐСÐÍÆóÒµÉè¼Æ£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚʹÆäÏàʶ¡¢½ÓÄÉÐж¯²¢ÔöÇ¿ÆäÍøÂçÇå¾²·ÀÓùÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÓ¦¶ÔÒ»Ö±Éú³¤µÄÍøÂçÇå¾²Íþв¡£ ¡£¡£¸ÃÖ¸ÄÏÏÈÈÝÁ˶ñÒâÈí¼þ¡¢´¹ÂÚÓʼþºÍÀÕË÷Èí¼þµÈ³£¼ûÍþв£¬£¬£¬£¬£¬£¬£¬£¬»¹Ã¶¾ÙÁ˶àÖÖÕë¶ÔÍþвµÄÔ¤·À²½·¥¡£ ¡£¡£¸ÃÖ¸Äϲ»½¨ÒéÆóÒµÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÎÞ·¨°ü¹ÜÄܹ»ÖØÐ»ñµÃ»á¼ûȨ£»£» £»£»½¨ÒéÆóÒµ½ÓÄÉ×Ô¶¯¸üС¢×Ô¶¯±¸·ÝºÍ¶àÒòËØÉí·ÝÑéÖ¤µÈ²½·¥£»£» £»£»½¨ÒéÔÚÖ°Ô±ºÍÁ÷³ÌÖнÓÄÉ»á¼û¿ØÖÆ¡¢ÃÜÂë¶ÌÓï¼°Ô±¹¤Åàѵ£»£» £»£»¸ÃÖ¸ÄÏ»¹¸½´øÁËÓÃÓڲο¼µÄÇå¾²ÊõÓï´Ê»ã±í¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.us-cert.gov/ncas/current-activity/2019/10/10/acsc-releases-small-business-cybersecurity-guide

2¡¢ÐÂMacOS¶ñÒâÈí¼þTarmacÖ÷ÒªÕë¶ÔÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ConfiantÇå¾²Ñо¿Ö°Ô±Taha Karim·¢Ã÷Õë¶ÔmacOSÓû§µÄжñÒâÈí¼þTarmac£¨OSX / Tarmac£©¡£ ¡£¡£¸Ã¶ñÒâÈí¼þµÄ·Ö·¢»î¶¯×Ô2019Äê1ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÆäʱÑо¿Ö°Ô±Ö»·¢Ã÷Á˶ñÒâpayload Shlayer¡£ ¡£¡£ÔÚÁ½ÖÜǰÐû²¼µÄÒ»·ÝºóÐø±¨¸æÖУ¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ·¢Ã÷ÁËShlayerѬȾµÄµÚ¶þ½×¶Îpayload Tarmac¡£ ¡£¡£ÏÖÔÚÖ»ÖªµÀShlayerÔÚÊÜѬȾµÄÖ÷»úÉÏÏÂÔØ²¢×°ÖÃÁËTarmacÖ®ºó£¬£¬£¬£¬£¬£¬£¬£¬Tarmac»áÍøÂçÓйØÓ²¼þÉèÖõÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬²¢½«´ËÐÅÏ¢·¢Ë͵½ÆäÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£ ¡£¡£È»ºóTarmac½«ÆÚ´ýÐÂÏÂÁ£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇÓÉÓÚC2ЧÀÍÆ÷²»¿ÉÓ㬣¬£¬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±ÎÞ·¨È·¶¨ÆäËùÓй¦Ð§¡£ ¡£¡£¸Ã¶ñÒâ»î¶¯Ö÷ÒªÕë¶ÔµÄÊÇÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾µÄÓû§¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/macos-users-targeted-with-new-tarmac-malware/

3¡¢·¸·¨ÍÅ»ïFIN7¿ª·¢Ð¶ñÒ⹤¾ßBOOSTWRITEºÍRDFSNIFFER

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

ƾ֤FireEyeµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬·¸·¨ÍÅ»ïFIN7ÔÚÆä¹¥»÷¹¤¾ß¿âÖÐÌí¼ÓÁËÁ½¸öеijÉÔ±-BOOSTWRITEºÍRDFSNIFFER¡£ ¡£¡£BOOSTWRITEÊÇÒ»¸ö½öÔËÐÐÔÚÄÚ´æÖеÄÊÍ·ÅÆ÷£¬£¬£¬£¬£¬£¬£¬£¬ÆäʹÓÃÔËÐÐʱ´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡µÄÃÜÔ¿À´½âÃÜÄÚǶµÄpayload£¬£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÆÊÎöµÄÒ»¸öÑù±¾ÊÇÓÉÓÐÓõÄÖ¤ÊéÊðÃûµÄ¡£ ¡£¡£BOOSTWRITE»á½âÃܲ¢¼ÓÔØÁ½¸öpayloadµÄDLL£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨CARBANAKºóÃźÍRDFSNIFFER¡£ ¡£¡£RDFSNIFFER¿ÉÒÔʹ¹¥»÷Õß¼àÊӺ͸Ķ¯Í¨¹ýNCR¹«Ë¾µÄRDFClient½¨ÉèµÄÕýµ±ÅþÁ¬¡£ ¡£¡£Ñо¿Ö°Ô±×Ü½á³ÆÐ¹¤¾ßºÍÊÖÒÕµÄÒýÈëÅú×¢FIN7ÕýÔÚÒ»Ö±Éú³¤ÒÔ˳ӦÇå¾²ÐÔÒ»Ö±ÔöÇ¿µÄÇéÐΡ£ ¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2019/10/mahalo-fin7-responding-to-new-tools-and-techniques.html

4¡¢Imperva³ÆÆäÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿±»µÁ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ImpervaÔÚ8Ô·ÝÅû¶ÁËÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ½ñÌìÐû²¼ÁËÒ»·ÝÏêϸµÄʺ󱨸æ¡£ ¡£¡£¸Ã¹«Ë¾³Æ´Ë´ÎÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿µÄ±»µÁ£¬£¬£¬£¬£¬£¬£¬£¬¶ø¸ÃÃÜÔ¿ÊǺڿʹÓÒ»¸öÒâÍâÅþÁ¬µ½»¥ÁªÍøµÄÄÚ²¿ÏµÍ³ÇÔÈ¡µÄ¡£ ¡£¡£ºÚ¿ÍʹÓøÃAWS APIÃÜÔ¿»á¼ûImpervaµÄÔÆ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬£¬²¢ÕÒµ½Á˸ù«Ë¾ÓÃÓÚ²âÊÔµÄAWS RDSЧÀÍ¡£ ¡£¡£Imperva²¢Î´Åû¶ÉÏÊöÊÂÎñ¼òÖ±ÇÐÈÕÆÚ£¬£¬£¬£¬£¬£¬£¬£¬Òò´ËÉÐÎÞ·¨È·ÈϺڿͻá¼ûÁ˸ù«Ë¾µÄЧÀÍÆ÷¶à³¤Ê±¼ä¡£ ¡£¡£ImpervaÊ×ϯִÐйټòª¹ÀËãÁËÊÜÓ°ÏìµÄÓû§ÊýÄ¿£¬£¬£¬£¬£¬£¬£¬£¬³ÆÔÚ¹«Ë¾Í¨ÖªÊÜÓ°ÏìµÄ¿Í»§ºó£¬£¬£¬£¬£¬£¬£¬£¬¿Í»§Ìæ»»ÁË1.3Íò¸öÃÜÂë¼°1.35Íò¸öSSLÖ¤Ê飬£¬£¬£¬£¬£¬£¬£¬²¢ÖØÐÂÌìÉúÁË1400¶à¸öImperva APIÃÜÔ¿¡£ ¡£¡£Ö»ÓÐÔÚ2017Äê9ÔÂ15ÈÕ֮ǰÓëImperva×¢²áµÄ¿Í»§²Å»áÊܵ½Ó°Ïì¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/imperva-blames-data-breach-on-stolen-aws-api-key/

5¡¢Çå¾²Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þNemtyµÄ½âÃܹ¤¾ß


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


TesorionÑо¿Ö°Ô±½¨ÉèÁË¿ÉÔÚÀÕË÷Èí¼þNemty 1.4ºÍ1.6°æ±¾ÉÏÊÂÇéµÄ½âÃÜÆ÷£¬£¬£¬£¬£¬£¬£¬£¬²¢ÕýÔÚ¿ª·¢1.5°æ±¾µÄ½âÃÜÆ÷¡£ ¡£¡£ÏÖÔÚ½âÃÜÆ÷½öÖ§³ÖÓÐÏÞÊýÄ¿µÄÎļþÀ©Õ¹Ãû£¬£¬£¬£¬£¬£¬£¬£¬·Ç±ê×¼ÎļþÃûÌõļÓÃÜÎļþÈÔÎÞ·¨½âÃÜ£¬£¬£¬£¬£¬£¬£¬£¬µ«TesorionÌìÌì¶¼ÔÚ¼ÌÐøÖ§³ÖеÄÎļþÀàÐÍ¡£ ¡£¡£Tesorion²¢Î´Ìṩ½âÃÜÆ÷µÄ¿Í»§¶Ë°æ±¾£¬£¬£¬£¬£¬£¬£¬£¬¶øÊÇÑ¡ÔñÔÚ×Ô¼ºµÄЧÀÍÆ÷ÉÏÍê³É½âÃÜÃÜÔ¿µÄÌìÉú£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏִ˾ÙÊÇΪÁ˱ÜÃâÀÕË÷Èí¼þ¿ª·¢Ö°Ô±ÆÊÎö½âÃܳÌÐò²¢ÏàʶÆäËã·¨µÄÎó²îËùÔÚ¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/nemty-ransomware-decryptor-released-recover-files-for-free/

6¡¢SAPÐû²¼10ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á½¸öÒªº¦Îó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


SAPÐû²¼10ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÇå¾²Îó²î¡£ ¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îΪSAP NetWeaver Process IntegrationµÄB2B×é¼þAS2ÊÊÅäÆ÷ÖеÄÉí·ÝÑé֤ȱʧÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2019-0379£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õß»á¼ûÖÎÀí¹¦Ð§¼°ÇÔÈ¡ºÍʹÓÃÃô¸ÐÊý¾Ý¡£ ¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ9.3¡£ ¡£¡£µÚ¶þ¸öÑÏÖØÎó²îÊÇSAP Landscape ManagementÆóÒµ°æÖеÄÒ»¸öÐÅϢй¶Îó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2019-0380£¬£¬£¬£¬£¬£¬£¬£¬ÆäCVSSÆÀ·ÖΪ9.1¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬SAP»¹ÐÞ¸´ÁËAnywhere¡¢SAP IQºÍSAP Dynamic TieringµÈ²úÆ·µÄÎļþËÑË÷Ëã·¨ÖеÄBinary PlantingÎó²î£¨CVE-2019-0381£©£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îµÄCVSSÆÀ·ÖΪ7.8¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/92335/security/sap-october-2019-security-patch-day.html