¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181203

°ä²¼¹¦·ò 2018-12-03
1¡¢APT×éÖ¯Tropic TrooperжñÒâ»î¶¯ £¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³Æ·ÐÐÒµ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Windows Defender ATPÍŶӷ¢ÏÖÒ»¸öÕë¶ÔÑÇÖÞÄÜÔ´¡¢Ê³Æ·ºÍÒûÁÏÐÐÒµµÄжñÒâ¹¥»÷»î¶¯ £¬»ùÓڶԸûµÄÖ¸±êÑ¡Ôñ¡¢¹¥»÷Á´ÒÔ¼°¹¤¾ß¼¯µÄ·ÖÎö £¬×êÑÐÍŶÓÒÔΪ¸Ã»î¶¯ÊÇÓÉAPT×éÖ¯Tropic TrooperÌáÒéµÄ¡£¹¥»÷µÄ³õʼÏòÁ¿ÊÇÒ»¸öÀûÓÃÁËOffice¹«Ê½±à×ëÆ÷·ì϶CVE-2018-0802µÄ¶ñÒâÎĵµ £¬¹¥»÷ÕßËæºóʹÓÃbitsadmin.exe´ÓÔ¶³Ì·þÎñÆ÷ÏÂÔØ²¢Ö´ÐÐËæ»ú¶¨ÃûµÄpayload¡£×êÑÐÈËÔ±ÒÔΪÕâЩpayloadµÄÖØÒªÖ÷ÕÅÊÇÇÔÈ¡Êý¾Ý¡£

   

Ô­ÎÄÁ´½Ó£º

https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/


2¡¢¾ÉƿװоÆ £¬¶ñÒâ¹¥»÷»î¶¯Butter²ÎÓëÐÂsambaľÂí

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


GuardiCore×êÑÐÍŶӷ¢ÏÖ¶ñÒâ¹¥»÷»î¶¯butter²ÎÓëÁËÐÂpayload£ºsambaľÂí¡£butter×îÔç³öÏÖÓÚ2015ÄêÖÐÆÚ £¬Æä¹¥»÷À´×ÔÓÚÓÐÏ޵öIP £¬¾ßÌåÀ´Ëµ £¬Ö»ÓÐ4¸öIP±»ÓÃÓÚ·ÖÆç½×¶ÎµÄ¹¥»÷»î¶¯¡£ÕâЩIPÀ´×ÔÓÚÏã¸ÛºÍÐÂ¼ÓÆÂ £¬²¢ÇÒ×Ô2016ÄêÒÔÀ´Ò»ÏòÓë¶ñÒâ»î¶¯ÓйØÁª¡£butterÔçÆÚµÄpayloadÊÇ80 RAT £¬µ«×Ô2018Äê7ÔÂÆðÆðͷʹÓÃsambaľÂí¡£sambaľÂíÊǵäÐ͵ÄRAT £¬Äܹ»ÏÂÔØÎļþ¡¢Ö´ÐÐshellºÅÁî¡¢ÌáÒéDDoS¹¥»÷ÒÔ¼°ÓµÓÐÉý¼¶»úÔì¡£×êÑÐÈËÔ±ÒѾ­¹Û²ìµ½Á˸ÃľÂíµÄ7¸ö·ÖÆçµÄ°æ±¾¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.guardicore.com/2018/11/butter-brute-force-ssh-attack-tool-evolution


3¡¢Õ°Íû½«À´ £¬McAfee°ä²¼2019ÄêÍøÂçÍþвԤ²â»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


McAfee³¢ÊÔÊÒ¹ØÓÚ2019ÄêÍøÂçÍþвµÄÔ¤²âÔ̺¬£º·¸×ï·Ö×ӵĵØÏÂͬÃ˹ØÏµ½«Ô½·¢ÀιÌ £¬²¢½«³ÉÁ¢¸ü¶àºÏ×÷ͬ°é¹ØÏµ £¬¼ÓÇ¿ÆäÍþвÐÔ £»ÈËΪÖÇÄÜÊÇÌӱܼ¼ÊõµÄ½«À´ £»Ð­Í¬ÐÔÍþв½«Ôö³¤ £¬Òò¶ø±ØÒª¸ü¶àµÄ×ÛºÏÐÔÏìÓ¦´ëÊ© £»·¸×ï·Ö×ÓÀûÓÃÉ罻ýÌå´«²¼ÐéαÐÅÏ¢ £¬²¢Õë¶ÔÉÌ¼ÒÆ·ÅÆÌáÒéڲƭ»î¶¯ £»Êý¾ÝÉøÂ©¸ü¶àµØÕë¶ÔÔÆ¶Ë £»ÓïÒô¸±ÊÖ³ÉΪIoT¹¥»÷µÄÏÂÒ»¸öÔØÌå £»·¸×ï·Ö×Ó½«¸ü¶àµØÕë¶ÔÉí·Ýƽ̨ºÍÌìǵÉ豸ÌáÒé¹¥»÷¡£

  

Ô­ÎÄÁ´½Ó£º

https://securingtomorrow.mcafee.com/mcafee-labs/mcafee-labs-2019-threats-predictions/


4¡¢´ÓδͣϢ £¬ÒøÐÐľÂíBackSwap3ÔÂÖÁ11Ô¶ñÒâ»î¶¯·ÖÎö

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Check Point×êÑÐÍŶӰ䲼¹ØÓÚÒøÐÐľÂíBackSwapµÄÑݱäÇ÷ÏòµÄ·ÖÎö»ã±¨¡£BackSwap×îÔçÓÚ2018Äê3ÔÂÖÐÑ®±»·¢ÏÖ £¬ÆäʱµÄÑù±¾½ÏΪµ¥Ò» £¬ÖØÒªÕë¶Ô²¨À¼ÒøÐÐipko.pl¡¢24.plºÍmbank.pl¡£4Ô·Ý £¬ÐµÄÑù±¾Öн«¸ü¶àµÄÒøÐÐÔö³¤ÎªÖ¸±ê £¬²¢ÆðÍ·ÔÚÖ¸±êÍøÕ¾µÄDOMÖд´½¨ÐéαµÄÊäÈë±í¸ñ £¬¸²¸ÇԭʼÊäÈë×ֶΡ£5Ô·Ý £¬BackSwapÆðÍ·¸ú×ÙÊÜϰȾ»úеµÄÊýÁ¿¡£6Ô·Ý £¬BackSwap½«ÆäÓÐЧºÉÔØÇ¶ÈëBMPͼÏñÖС£7Ô·ÝBackSwapûÓÐÈκλ £¬µ«ÔÚ8ÔÂ·ÝÆðͷתÏòÕë¶ÔÎ÷°àÑÀÒøÐС£9Ôµ½11Ô·ÝBackSwapÖØÒªÊǶÔͼÏñÌåʽµÄpayload½øÐÐÅú¸Ä £¬²¢Ôö³¤Á˸ü¶à¼ÓÃܲãºÍ´óÁ¿À¬»ø´úÂë¡£

  

Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/the-evolution-of-backswap/


5¡¢Êý¾Ý¿â²»ÉèÃÜÂë £¬Urban¹«Ë¾³¬¹ý30ÍòÓû§ÐÅϢй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


UrbanÊÇÒ»¼ÒÓ¢¹úµÄÍÆÄô´Òµ¹«Ë¾ £¬ÆäÊý¾Ý¿âÒòδÉèÃÜÂëµ¼Ö³¬¹ý30Íò¿Í»§ÐÅϢй¶¡£×êÑÐÈËÔ±Oliver Houghͨ¹ýShodan·¢ÏÖÁ˸ÃÊý¾Ý¿â £¬Ä¿Ç°¸ÃÊý¾Ý¿âÒÑÏÂÏß £¬µ«²»ÖªÂ·¸ÃÊý¾Ý¿â¶³öÁ˶೤¹¦·ò¡£¸ÃÊý¾Ý¿âÖÐÔ̺¬³¬¹ý30.9ÍòÓû§¼Í¼ £¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëµÈ¡£´Ë±í £¬Êý¾Ý¿âÖл¹´æ´¢Á˳¬¹ý35.1Íò¸ö·þÎñÔ¤Ô¼¼Í¼ £¬ÒÔ¼°³¬¹ý2000¸öÍÆÄÃʦµÄÓйØÐÅÏ¢¡£

 

 Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2018/11/27/urban-massage-data-exposed-customers-creepy-clients/


6¡¢Ë¼¿Æ½¨¸´PrimeÐí¿ÉÖ¤ÖÎÀíÆ÷ÖеÄSQL×¢Èë·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿Æ½¨¸´ÁËPrimeÐí¿ÉÖ¤ÖÎÀíÆ÷£¨PLM£©ÖеÄÒ»¸öSQL×¢Èë·ì϶ £¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÀûÓø÷ì϶ִÐÐËÁÒâSQL²éÎÊ¡£¸Ã·ì϶£¨CVE-2018-15441£©ÓëPLMµÄWeb¿ò¼Ü´úÂëÓйØ £¬Æ¾¾Ý˼¿ÆµÄÃèÊö £¬¸Ã·ì϶ÊÇÓÉÓÚSQL²éÎÊÖжÌȱ¶ÔÓû§ÊäÈë½øÐÐÑéÖ¤µ¼ÖµÄ £¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÔ̺¬SQLÓï¾äµÄ¶ñÒâHTTP POSTÒªÇó´¥·¢¸Ã·ì϶ £¬´Ó¶ø»ñµÃshellȨÏÞ»òÅú¸Ä¼°É¾³ýPLMÊý¾Ý¿âÖеÄÊý¾Ý¡£PLM 11.0.1¼°Ö®ºóµÄ°æ±¾Êܵ½Ó°Ïì £¬½¨ÒéÓû§¾¡¿ì×°Öý¨¸´²¹¶¡¡£

  

Ô­ÎÄÁ´½Ó£º

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù