¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181108
°ä²¼¹¦·ò 2018-11-08
¶íÂÞ˹·ì϶×êÑÐÈËÔ±Sergey ZelenyukÅû¶VirtualBoxÖеÄÒ»¸öÐé¹¹»úÌÓÒÝ0day£¬¸Ã·ì϶ӰÏìÁËVirtualBox 5.2.20¼°Ö®Ç°µÄ°æ±¾¡£¸Ã·ì϶ºÏÓÃÓÚÍø¿¨ÎªIntel PRO/1000 MT Desktop (82540EM) ²¢´¦ÓÚNATģʽµÄÐé¹¹»ú£¬¹¥»÷Õß¿ÉÀûÓø÷ì϶ÌÓÒÝÖÁÖ÷»úring3ȨÏÞ£¬²¢ÀûÓÃÆäËü¼¼ÊõÌáȨÖÁring0¡£×êÑÐÈËÔ±ÔÚGithubÉϾßÌåÃèÊöÁ˸÷ì϶±³ºóµÄ»úÔ죬²¢°ä²¼ÁËÓйØPoCÊÓÆµ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/virtualbox-zero-day-vulnerability-details-and-exploit-are-publicly-available/2¡¢WordPress²å¼þWooCommerce½¨¸´Ò»¸öËÁÒâÎļþɾ³ý·ì϶
RIPS×êÑÐÈËÔ±Simon Scannell·¢ÏÖWordPress²å¼þWooCommerce´æÔÚÒ»¸öËÁÒâÎļþɾ³ý·ì϶£¬¸Ã·ì϶¿ÉÔÊÐí¶ñÒâ¹¥»÷Õß³ÁÖÃÖÎÀíÔ¹ØË»§µÄÃÜÂë²¢ÆëÈ«ÊÕÊÜÍøÕ¾¡£WooCommerceÊÇWordPressÉÏ×îÊÜӽӵĵç×ÓÉÌÎñ²å¼þÖ®Ò»£¬Æä×°ÖôÎÊý³¬¹ý400Íò£¬Îª»¥ÁªÍøÉϽü35%µÄµç×ÓÉÌÎñÍøÕ¾Ìṩ֧³Ö¡£WooCommerce¿ª·¢ÍŶÓÒÑÔÚ°æ±¾3.4.6Öн¨¸´Á˸÷ì϶¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/woocommerce-wordpress-hacking.html3¡¢Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§

˼¿Æ°ä²¼Á˶à¿î²úÆ·µÄ15¸ö°²È«¸üУ¬ÆäÖÐÔ̺¬É¾³ýÁËÓ×ÐÍÆóÒµ»¥»»»úÖеÄÒ»¸öºóÃÅÕË»§¡£ÕâÊǽñÄêÀ´Ë¼¿ÆµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§¡£ÕâЩºóÃÅÕË»§·ì϶Ô̺¬3Ô·ݵÄCVE-2018-0141ºÍCVE-2018-0150¡¢5Ô·ݵÄCVE-2018-0222¡¢6Ô·ݵÄCVE-2018-0329¡¢7Ô·ݵÄCVE-2018-0375¡¢9Ô·ݵÄCVE-2018-15427ÒÔ¼°±¾Ô£¨11Ô·ݣ©µÄCVE-2018-15439¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing/4¡¢×êÑÐÍŶӷ¢ÏÖ¼ÓÃÜÇ®±ÒÂòÂôËùgate.ioÔâµ½¹©¸øÁ´¹¥»÷
ESET×êÑÐÍŶӷ¢ÏÖ¼ÓÃÜÇ®±ÒÂòÂôËùgate.ioÔâµ½¹©¸øÁ´¹¥»÷£¬¸Ã¹¥»÷ÊÇͨ¹ýÍøÂç·ÖÎöƽ̨StatCounter½øÐеġ£StatCounter·þÎñ±»³¬¹ý200Íò¸öÍøÕ¾Ê¹ÓÃÒÔÍøÂç½Ó¼ûÕßµÄͳ¼ÆÐÅÏ¢£¬¹¥»÷Õßͨ¹ýÔÚStatCounterµÄJS¾ç±¾ÖÐÔö³¤¶ñÒâ´úÂ룬Äܹ»ÔÚËùÓеÄÕâÐ©ÍøÕ¾Öж¼×¢Èë¶ñÒâJS´úÂ롣ƾ¾Ý¶Ô¶ñÒâ´úÂëµÄ·ÖÎö£¬¼ÓÃÜÇ®±ÒÂòÂôËùgate.ioËÆºõÊÇÕâ´Î¹¥»÷µÄÖØÒªÖ¸±ê¡£µ«ÓÉÓÚ¶ñÒâ¾ç±¾»á²»ÐÝÌìÉúеıÈÌØ±ÒµØÖ·£¬Òò¶ø×êÑÐÈËÔ±ÎÞ·¨µÃÖª¾ßÌåÓм¸¶à×ʽ𱻵Á¡£
ÔÎÄÁ´½Ó£º
https://www.welivesecurity.com/2018/11/06/supply-chain-attack-cryptocurrency-exchange-gate-io/5¡¢×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶ÔÎ÷°àÑÀµÄÐéÎ±ÒøÐÐÀûÓÃMovil Secure
Ç÷Ïò¿Æ¼¼×êÑÐÈËÔ±ÔÚGoogle PlayÉÏ·¢ÏÖÖØÒªÕë¶ÔÎ÷°àÑÀÓû§µÄ¶ñÒâÒøÐÐÀûÓÃMovil Secure¡£Movil Secure¼Ù×°ÓëÎ÷°àÑÀ¶Ô±íÒøÐÐBBVAÓйأ¬²¢ÇÒÓµÓÐרҵµÄ±í¹ÛºÍ¾«²ÊµÄÓû§½çÃæ¡£¸ÃÀûÓÃÖØÒªÓÃÓÚÍøÂçÓû§µÄÐÅÏ¢£¬Ô̺¬¶ÌÐź͵绰ºÅÂëµÈ£¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ¶ÌÐÅ´¹µö»î¶¯¡£¸Ã¶ñÒâÀûÓÃÔÚ10ÔÂ19ÈÕ°ä²¼£¬²¢ÔÚ6ÌìÄÚÏÂÔØÁ˳¬¹ý100´Î¡£×êÑÐÈËÔ±»¹ÔÚͳһ¸ö¿ª·¢ÈËÔ±ÃûÏ·¢ÏÖÁËÆäËüÈý¸öÀàËÆµÄ¶ñÒâÀûÓã¬Ä¿Ç°ÕâЩÀûÓÃÒѱ»Googleɾ³ý¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/fake-banking-app-found-on-google-play-used-in-smishing-scheme/
6¡¢×êÑÐÈËÔ±·¢ÏÖÕë¶ÔÊ¥µ®ÓÃÆ·¹©¸øÉ̵ÄÎÞÎļþ¶ñÒâÈí¼þ¹¥»÷
Cyren×êÑÐÈËÔ±·¢ÏÖÒѾ´æÔÚÕë¶ÔÊ¥µ®ÓÃÆ·¹©¸øÉ̵ÄжñÒâ¹¥»÷»î¶¯¡£Ã¿ÄêµÄºÚÎåºÍÊ¥µ®½ÚÆÚ¼ä£¬ÍøÂç´¹µöºÍڿƻ³ÇÊдﵽһ¸ö¶¥·å¡£½ñÄêµÄÊ¥µ®³ï±¸¹¤×÷ÔÚ½øÐÐÖ®ÖУ¬¶ø×êÑÐÈËÔ±ÒѾ·¢ÏÖÁËÒ»ÖÖеÄÎÞÎļþ¹¥»÷¡£ÕâÖÖ´¹µöÓʼþÒÔÊ¥µ®¶©µ¥ÎªÖ÷Ì⣬ÓÃÓÚ·Ö·¢NetwiredRCºóÃÅ¡£¸ÃºóÃÅÄܹ»½øÐмüÅ̼ͼ¡¢ÇÔÈ¡ä¯ÀÀÆ÷Í´´¦ÒÔ¼°µç×ÓÓʼþÍ´´¦µÈ¡£¶ñÒâÈí¼þµÄÕû¸ö×°Öùý³ÌÊDZ»×¢ÈëÖ¸±ê¹ý³Ì£¬Ã»Óб£Áôµ½´ÅÅÌÉÏ¡£
ÔÎÄÁ´½Ó£º
https://www.cyren.com/blog/articles/fileless-malware-already-targeting-holiday-suppliersÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ