¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180912

°ä²¼¹¦·ò 2018-09-12
1¡¢×êÑлú¹¹½«Ó¢¹úº½¿Õ¹«Ë¾µÄÊý¾Ýй¶ÊÂÎñ¹éÒòÓÚ·¸×OÍÅMagecart

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ƾ¾ÝRiskIQµÄ×êÑУ¬Ó¢¹úº½¿Õ¹«Ë¾Êý¾Ýй¶ÊÂÎñµÄ±³ºóÊÇ·¸×OÍÅMageCart¡£MageCart×Ô2015ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬ÖØÒªÕë¶Ôµç×ÓÉÌÎñÍøÕ¾£¬ÇÔÈ¡Óû§µÄÒøÐп¨ÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£Æ¾¾ÝRiskIQµÄ˵·¨£¬MageCart¶ÔÓ¢¹úº½¿Õ¹«Ë¾½øÐÐÁËÕë¶ÔÐÔ¹¥»÷£¬²¢Ê¹ÓÃÁ˶¨ÔìµÄ¾ç±¾ºÍרÓõĻù´¡ÉèÊ©¡£Ä¿Ç°»¹²»Ã÷ÏÔMageCartÈôºÎÔÚÓ¢¹úº½¿Õ¹«Ë¾µÄÍøÕ¾ÉÏ×¢Èë¶ñÒâ´úÂë¡£


 Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/labs/magecart-british-airways-breach/

2¡¢×êÑÐÈËÔ±·¢ÏÖ½Ù³Ö³¬¹ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÈËÔ±Troy Mursch·¢ÏÖÒ»¸öÀûÓ÷ì϶£¨CVE-2018-14847£©½Ù³ÖMikroTik·ÓÉÆ÷½øÐÐÍÚ¿óµÄ¹¥»÷»î¶¯¡£¹ÌÈ»¸Ã·ÓÉÆ÷µÄ³§ÉÌÒÑÔÚ4Ô·ݰ䲼ÁËÓйؽ¨¸´²¹¶¡£¬µ«ÈÔÓв¿ÃÅÓû§Ã»ÓнøÐÐÉý¼¶¡£Æ¾¾ÝMursch»ã±¨µÄÍÚ¿ó¾ç±¾£¬ÔÚShodanÉÏ¿ÉËÑË÷µ½3734¸öMikroTikÉ豸¡£´óÎÞÊýÊÜϰȾµÄÉ豸¶¼¼¯ÖÐÔÚÄÏÃÀÖÞ£¬ÖØÒªÊǰÍÎ÷£¨2612£©ºÍ°¢¸ùÍ¢£¨480£©¡£¸ÃÍÚ¿ó¾ç±¾½«MikroTik·ÓÉÆ÷µÄCPUʹÓÃÂÊÔö³¤µ½80%²¢³ÖÐø½øÐÐÍÚ¿ó¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/over-3-700-mikrotik-routers-abused-in-cryptojacking-campaigns/

3¡¢×êÑÐÍŶӷ¢ÏÖÒøÐÐľÂíKRONOSµÄбäÌåOsiris

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

2018Äê7ÔÂSecuronix×êÑÐÍŶӷ¢ÏÖÒøÐÐľÂíKRONOSµÄбäÌåOsiris¡£Osiris¹²ÌáÒéÁËÈý¸ö±ðÀëÕë¶ÔµÂ¹ú¡¢ÈÕ±¾ºÍ²¨À¼µÄ¹¥»÷»î¶¯£¬ÆäÖØÒª·Ö·¢·½Ê½ÊÇ´¹µöÓʼþ£¬ÔںܶàÇé¿öÏÂҲͨ¹ýRIG EKµÈ·ì϶ÀûÓù¤¾ß°ü½øÐзַ¢¡£´¹µöÓʼþÖеĸ½¼þÀûÓÃÁËÒÑÖªµÄOffice¹«Ê½±à×ëÆ÷·ì϶£¨CVE-2017-11882£©¡£ÐµÄOsiris¶ñÒâÈí¼þ¿í·ºÀûÓÃTORÍøÂç½øÐкÅÁîºÍ½ÚÔì¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securonix.com/securonix-threat-research-kronos-osiris-banking-trojan-attack

4¡¢IBM°ä²¼¹ØÓÚAndroidÒøÐÐľÂíExoBotµÄÔ´Âë·ÖÎö»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ÓÉÓÚAndroidÒøÐÐľÂíExoBotµÄÔ´´úÂëÔÚ×î½üй¶£¬IBM X-Force×êÑÐÍŶÓÉî¿Ì×êÑÐÁ˸öñÒâÈí¼þµÄÄÚ²¿¹¤×÷¡£ExoBotÖØÒªÍ¨¹ýÀ¬»ø¶ÌÐÅÒÔ¼°¹Ù·½ÀûÓÃÉ̵êµÄapp½øÐд«²¼£¬³õ´ÎÔÚÉ豸ÉÏÔËÐÐʱ»áɾ³ýͼ±ê¡¢×îÓ×»¯ËùÓÐÔÚÔËÐеÄÀûÓò¢ÏÔʾÖ÷ÆÁÄ»£¬ÒÔ±ãÓû§²»»á·¢ÏÖÈκÎÒì³£¡£ÎªÁËÌÓ±ÜɳÏäºÍ¼ì²â£¬ExoBotÔÚÔËÐÐǰ»á½øÐз´É³Ïä²é³­¡¢·´·ÖÎöÆ÷²é³­ÒÔ¼°¹ú¶È/µØÓò/˵»°¹ýÂË¡£ExoBotµÄ»ìºÏ¼¼ÊõÔ̺¬×Ö·û´®± £»¤ºÍ¶ÔC2ͨѶ½øÐÐAES¼ÓÃÜ¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityintelligence.com/ibm-x-force-delves-into-exobots-leaked-source-code/


5¡¢Î¢Èí°ä²¼9Ô°²È«¸üУ¬½¨¸´Ô̺¬17¸ö¸ßΣ·ì϶ÔÚÄÚµÄ61¸ö·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

΢Èí±¾Ô½¨¸´µÄ·ì϶ÖÐÓÐËĸö±»ÏóÕ÷Ϊ¿ÉÄÜÔÚÒ°±í±»ÀûÓã¬Ô̺¬Ó°ÏìÁËËùÓÐWindows°æ±¾µÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2018-8475£©¡¢Windows ALPCÌáȨ·ì϶£¨CVE-2018-8440£©¡¢¾ç±¾ÒýÇæÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2018-8457£©ÒÔ¼°»Ø¾ø·þÎñ·ì϶£¨CVE-2018-8409£©¡£Áí±íÁ½¸öÖµÍ×ÌùÐĵķì϶ÊÇWindowsÌáȨ·ì϶£¨CVE-2018-0868ºÍCVE-2018-8339£©£¬¿ÉÔÊÐí±¾µØ¹¥»÷ÕßÀûÓÃWindows´òË㹤×÷APIÖ´ÐÐËÁÒâ´úÂë¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/microsoft-software-updates.html


6¡¢Ç÷Ïò¿Æ¼¼ÈÏ¿ÉÆä¶à¿îMacÀûÓÃÎ¥¹æÍøÂçÓû§µÄÊý¾Ý

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

×êÑÐÈËÔ±·¢ÏÖÇ÷Ïò¿Æ¼¼µÄ¶à¿îMacÀûÓÃÍøÂçÓû§µÄä¯ÀÀÆ÷º¹Çà¼Í¼ºÍϵͳÐÅÏ¢£¬Ä¿Ç°ÕâЩÀûÓÃÒÑÔÚMac App StoreÖÐϼÜ¡£ÕâЩÀûÓÃÔ̺¬Dr. Antivirus¡¢Dr. CleanerºÍDr. UnarchiverµÈ£¬ËùÓÐÀûÓÃµÄÆÀ¼ÛÊý¶¼´ïÊýǧÌõ¡£×êÑÐÈËÔ±³ÆÕâЩÀûÓÃÍøÂçµ½µÄÐÅÏ¢×îÖÕ¶¼·¢Ë͵½trendmicro.com¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/trend-micro-apps-leak-user-data-removed-from-mac-app-store/



ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù