MITRE CWE 4.0°æÐÂÔöÓ²¼þÇå¾²Îó²î£»£»£»£»Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ
Ðû²¼Ê±¼ä 2020-02-281.MITREÐû²¼Çå¾²Îó²îÁбíCWE 4.0°æ£¬£¬£¬£¬ÐÂÔöÓ²¼þÇå¾²Îó²î
MitreÐû²¼³£¼ûÇå¾²Îó²îÁбíCWE 4.0°æ£¬£¬£¬£¬¸ÃÁбíÒÑÀ©Õ¹Îªº¸ÇÓ²¼þÇå¾²Îó²î£¬£¬£¬£¬ÆäÖаüÀ¨£ºÖÆÔìºÍÉúÃüÖÜÆÚÖÎÀíÎÊÌ⣻£»£»£»Çå¾²Á÷³ÌÎÊÌ⣻£»£»£»¼¯³ÉÎÊÌ⣻£»£»£»È¨ÏÞÊèÉ¢ºÍ»á¼û¿ØÖÆÎÊÌ⣻£»£»£»Ò»Ñùƽ³£µç·ºÍÂß¼Éè¼ÆÎÊÌ⣻£»£»£»½¹µãºÍÅÌËãÎÊÌ⣻£»£»£»ÄÚ´æºÍ´æ´¢ÎÊÌ⣻£»£»£»ÍâΧװ±¸¡¢Æ¬ÉϽṹºÍ½Ó¿Ú/IOÎÊÌ⣻£»£»£»Çå¾²ÔÓïºÍ¼ÓÃÜÎÊÌ⣻£»£»£»µçÔ´¡¢Ê±ÖӺ͸´Î»ÎÊÌ⣻£»£»£»µ÷ÊԺͲâÊÔÎÊÌ⣻£»£»£»¿çÁìÓòÎÊÌâ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/02/27/hardware-security-weaknesses/
2.Magecart¹¥»÷ÕßʹÓÃαÔìµÄCDNÀ´Èƹý¼ì²â
Magecart¹¥»÷ÕßʹÓÃαÔìµÄÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©ÓòÃûÀ´Èƹý¼ì²â¡£¡£¡£¡£¡£¡£¡£Malwarebytes LabsµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬¸ÃMagecart¶ñÒâ¾ç±¾Î±×°³ÉÕýµ±µÄjQuery¿â£¬£¬£¬£¬²¢ÇÒͨ¹ýαÔìµÄCDNÓòÃûÊ¿´«£¬£¬£¬£¬ÆäÇëÇóÀàËÆÓÚ//cdn-sources.org/jquery.unveil.js£¬£¬£¬£¬ÁíÒ»¸öαÔìµÄCDNÓòÃûÇëÇóΪ//cdn-mediafiles.org/cache.php¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÃâ·ÑµÄngrokЧÀÍ£¨¿É½¨ÉèÇå¾²ËíµÀµÄ·´ÏòÊðÀíÈí¼þ£©À´ÍøÂç±»µÁµÄÊý¾Ý£¬£¬£¬£¬Õâͨ³£°üÀ¨¹ºÎïÕßµÄÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/credit-card-skimmer-uses-fake-cdns-to-evade-detection/
3.Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ£¬£¬£¬£¬ÒÉΪ¹ú¼ÒÖ§³Ö
SophosÑо¿Ö°Ô±·¢Ã÷Õë¶ÔÔÆÐ§ÀÍÆ÷µÄCloud Snooper¹¥»÷»î¶¯£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÈÆ¹ýÄ¿µÄ×éÖ¯µÄAWSºÍÆä·À»ðǽ£¬£¬£¬£¬²¢ÊÍ·ÅÔ¶¿ØÄ¾Âí¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ¼ì²éÔËÐÐÔÚAWSÖеÄÊÜѬȾLinuxºÍWindows EC2ÔÆÐ§ÀÍÆ÷ʱ·¢Ã÷Á˴˹¥»÷¡£¡£¡£¡£¡£¡£¡£SophosÌåÏÖÕâÖÖ¹¥»÷ºÜ¿ÉÄÜÊǹú¼ÒÖ§³ÖµÄ¹¥»÷£¬£¬£¬£¬ËüʹÓõÄRootkit²»µ«Ê¹¹¥»÷Õß¿ÉÒÔÔ¶³Ì¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬²¢ÇÒ»¹Îª¶ñÒâÈí¼þÌṩÁËÓëÆäC2ЧÀÍÆ÷¾ÙÐÐͨѶµÄÇþµÀ¡£¡£¡£¡£¡£¡£¡£Sophos¾Ü¾øÍ¸Â¶Êܺ¦×éÖ¯£¬£¬£¬£¬µ«ÌåÏÖÕâ´Î¹¥»÷ËÆºõÊǹ©Ó¦Á´¹¥»÷£¬£¬£¬£¬Æä·Ö·¢µÄRATÊÇ»ùÓÚGh0st RATµÄÔ´´úÂë¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171
4.RiskIQÐû²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ±¨¸æ¡·
RiskIQÐû²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ±¨¸æ¡·£¬£¬£¬£¬¸Ã±¨¸æÖ¸³öÒÆ¶¯Éú̬ϵͳÕýÔÚ´ó·ùÔöÌí£¬£¬£¬£¬µ«¹È¸èµÄÆð¾¢Ê¹µÃ¶ñÒâAPPµÄÊýÄ¿ÕýÔÚϽµ¡£¡£¡£¡£¡£¡£¡£2018Äê¸Ã±¨¸æÍ³¼ÆµÄºÚÃûµ¥Ó¦ÓÃÊýĿΪ213279¸ö£¬£¬£¬£¬¶øÔÚ2019Äê¸ÃÊý×ÖΪ170796¸ö£¬£¬£¬£¬Ï½µÁË20%¡£¡£¡£¡£¡£¡£¡£Òƶ¯APPÈÔÈ»ÊÇÆóÒµ¹¥»÷ÃæµÄÖ÷Òª×é³É²¿·Ö£¬£¬£¬£¬ÓÈÆäÊǷǹٷ½ÈªÔ´µÄAPP£¬£¬£¬£¬¸Ã±¨¸æ»¹Í³¼ÆÁË2019ÄêºÚÃûµ¥APP×î¶àµÄ6¸öÓ¦ÓÃÊÐËÁ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.riskiq.com/blog/external-threat-management/2019-mobile-app-threat-landscape-report/
5.ÐÂÒøÐÐľÂíCerberus¿ÉÇÔÈ¡Google AuthenticatorÑéÖ¤Âë
AndroidÒøÐÐľÂíCerberusµÄбäÌåÄܹ»ÇÔÈ¡Google AuthenticatorÌìÉúµÄÒ»´ÎÐÔÑéÖ¤Â루OTP£©£¬£¬£¬£¬²¢Èƹý2FA±£»£»£»£»¤»á¼ûÓû§µÄÒøÐÐÕË»§¡£¡£¡£¡£¡£¡£¡£GoogleÓÚ2010ÄêÍÆ³öÁËAuthenticator£¬£¬£¬£¬¸ÃÓ¦ÓÃÊÇΪÁËÌæ»»¶ÌÐÅÑéÖ¤Âë¡£¡£¡£¡£¡£¡£¡£ºÉÀ¼Òƶ¯Çå¾²¹«Ë¾ThreatFabricµÄÇå¾²Ñо¿Ö°Ô±ÔÚCerberusµÄ×îÐÂÑù±¾Öз¢Ã÷ÁËAuthenticator OTPÇÔÈ¡¹¦Ð§£¬£¬£¬£¬¸ÃľÂíÀÄÓÃAccessibilityÌØÈ¨À´»ñµÃAuthenticator½çÃæµÄÄÚÈݲ¢½«Æä·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã±äÌåÈÔ´¦ÓÚ²âÊԽ׶Σ¬£¬£¬£¬µ«¿ÉÄܺܿì¾Í»áÐû²¼¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/
6.Ó¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGR±»ÍϿ⣬£¬£¬£¬ÒÑÔÚºÚ¿ÍÂÛ̳Èö²¥
ºÚ¿ÍÕýÔÚµØÏÂÂÛ̳ÉϹ²ÏíÓ¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGRµÄSQLת´¢£¬£¬£¬£¬¾Ý³Æ¸ÃÊý¾Ý¿âÊǴӿɹûÕæ»á¼ûµÄAWS S3´æ´¢Í°»ñÈ¡µÄ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ðû²¼ÏÂÔØÁ´½ÓµÄºÚ¿ÍÂÛ̳³ÉÔ±µÄ˵·¨£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨ÖÁÉÙ3.6Íò·âµç×ÓÓʼþºÍÓйØÊÜÓ°ÏìÍøÕ¾£¨tradinggame.au.com¡¢bgr.inºÍS3 Production£©µÄµÇ¼ÐÅÏ¢£¬£¬£¬£¬×ܹ²ÔÚ7¸öZIPÎļþÖд浵ÁË16¸öSQLת´¢¡£¡£¡£¡£¡£¡£¡£Î´¾Ñ¹ËõµÄÊý¾Ý¿â×ܾÞϸΪ21.5GB¡£¡£¡£¡£¡£¡£¡£Under BreachÑо¿Ö°Ô±Ö¸³öÕâÊÇÒ»¸öÍêÕûµÄSQLת´¢£¬£¬£¬£¬ÆäÖаüÀ¨Óû§Ãû¡¢µç×ÓÓʼþºÍ¹þÏ£ÃÜÂëµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/sql-dump-from-bgr-india-shared-on-hacker-forum/


¾©¹«Íø°²±¸11010802024551ºÅ