¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20190118
°ä²¼¹¦·ò 2019-01-18
UpGuard×êÑÐÈËÔ±Greg Pollock·¢ÏÖÊôÓÚÃÀ¹ú¶í¿ËÀºÉÂíÖÝ֤ȯ²¿ODSµÄһ̨·þÎñÆ÷¿É¹«¿ª½Ó¼û£¬µ¼ÖÂÔ̺¬Êý°ÙÍòÃô¸ÐÎļþµÄÔ¼3TBµÐÔÖÊý¾Ý¶³ö¡£ÕâЩÊý¾ÝÔ̺¬Ö¤È¯Î¯Ô±»áÊýÊ®ÄêµÄ»úÃÜÎļþºÍºÜ¶àÃô¸ÐµÄFBIµ÷²éÎļþ£¬ÒÔ¼°Ô¼1ÍòÃû¹ÉƱ¾¼ÍÈ˵ĵç×ÓÓʼþ¡¢Éç»á°²È«ºÅÂë¡¢ÐÕÃûºÍµØÖ·ÐÅÏ¢µÈ¡£ShodanÏÔʾ¸Ã·þÎñÆ÷ÖÁÉÙ´Ó2018Äê11ÔÂ30ÈÕÆðÍ·¿É¹«¿ª½Ó¼û£¬Ô¼Ò»ÖܺóODSÊÕµ½Í¨Öª²¢¶Ô¸Ã·þÎñÆ÷Ö´ÐÐÁ˱£»¤´ëÊ©¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/oklahoma-fbi-data-leak.html2¡¢º«¹ú¹ú·À²¿DAPAÔâºÚ¿ÍÈëÇÖ£¬²¿ÃÅ»úÃÜÎļþ±»ÇÔ
¾Ý±¾µØÃ½Ì屨·£¬2018Äê10Ôº«¹ú¹ú·ÀÊÖÏÂÊô»ú¹¹DAPAÔâºÚ¿ÍÈëÇÖ£¬²¿ÃÅ»úÃÜÎļþ±»ÇÔ¡£DAPAµÄÈ«³ÆÊǹú·À²É°ì´òËãÖÎÀí¾Ö£¬Õƹܼල¾ü¶ÓµÄ±øÆ÷ºÍµ¯Ò©²É¹º¡£±¾µØÃ½Ì峯ºÚ¿ÍÈëÇÖÁ˸ò¿ÃŵÄ30Ì¨ÍÆËã»ú²¢ÇÔÈ¡ÁËÖÁÉÙ10Ì¨ÍÆËã»úµÄÄÚ²¿Îļþ£¬ÕâЩÎļþÉõÖÁÔ̺¬¸Ã¹úÏÂÒ»´úÕ½¶·»úµÄ²É¹ºÐÅÏ¢¡£¾Ý³ÆºÚ¿ÍÊ×ÏÈ»ñµÃÁË×°ÖÃÔÚËùÓе±¾ÖÍÆËã»úÉϵݲȫÈí¼þ¡°Êý¾Ý´æ´¢·À»¤½â¾ö¹æ»®¡±µÄ·þÎñÆ÷ÖÎÀíԱȨÏÞ£¬¶øºó´ÓÏàÁ¬µÄ¹¤×÷Õ¾ÖÐÇÔÈ¡ÁËÕâЩÎļþ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hackers-breach-and-steal-data-from-south-koreas-defense-ministry/3¡¢Õë¶ÔÎ÷·ÇÒøÐеĹ¥»÷»î¶¯£¬ÖØÒªÊ¹ÓÃNanoCoreµÈ¶ñÒâÈí¼þ
ƾ¾ÝÈüÃÅÌú¿ËµÄ»ã±¨£¬×Ô2017ÄêÖÐÆÚÒÔÀ´Õë¶ÔÎ÷·ÇµØÓòÒøÐлú¹¹µÄÂŴι¥»÷»î¶¯ÖØÒªÒÀÀµÓÚÏÖÓеĶñÒâÈí¼þºÍÃâ·ÑµÄºÚ¿Í¹¤¾ß£¬Ô̺¬NanoCoreľÂí¡¢PsExec¡¢Cobalt Strike¡¢UltraVNC¡¢MimikatzºÍImminent Monitor RATµÈ¡£×êÑÐÈËÔ±Ôڻ㱨ÖзÖÎöÁËÕë¶Ô¿¦Âó¡¡¢¸Õ¹û¡¢¼ÓÄÉ¡¢³à·¼¸ÄÚÑǺͿÆÌصÏÍߵȹú¶ÈÒøÐлú¹¹µÄËĴι¥»÷»î¶¯£¬ÕâЩ¹¥»÷»î¶¯±³ºóµÄ¹¥»÷ÕßÉí·ÝÈÔ²»Ã÷È·¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/banks-in-west-africa-hit-with-off-the-shelf-malware-free-tools/4¡¢Drupal¿ª·¢ÍŶӰ䲼°²È«¸üУ¬½¨¸´Á½¸öËÁÒâ´úÂëÖ´Ðзì϶
Drupal¿ª·¢ÍŶӰ䲼°²È«¸üУ¬½¨¸´Á½¸ö¿Éµ¼ÖÂËÁÒâ´úÂëÖ´Ðеݲȫ·ì϶¡£µÚÒ»¸ö·ì϶£¨SA-CORE-2019-002£©ÓëPHPÄÚÖõÄÁ÷°ü×°Æ÷pharÓйأ¬µÚ¶þ¸ö·ì϶£¨CVE-2018-1000888£©ÔòÓëPHP´¦ÖÃ.tarÎļþµÄµÚÈý·½¿âPEAR Archive_TarÓйأ¬¹¥»÷Õß¿ÉÀûÓöñÒâ.tarÎļþɾ³ýϵͳÉϵÄËÁÒâÎļþ£¬ÉõÖÁ¿ÉÖ´ÐÐÔ¶³Ì´úÂë¡£DrupalÔÚа汾8.6.6¡¢8.5.9ºÍ7.62Öн¨¸´ÁËÕâÁ½¸ö·ì϶£¬Çë°ÑÎÈ8.5.x֮ǰµÄDrupal 8°æ±¾ÒѾ´ïµ½ÐÔÃüÖÜÆÚ£¬½«²»»áÔٽӹܵ½°²È«¸üС£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/80001/security/drupal-critical-flaws.html5¡¢ÎÚ¿ËÀ¼¾¯·½µ·»ÙÁ½¸öºÚ¿ÍÍŻ6ÃûÏÓ·¸±»²¶
±¾ÖÜÎÚ¿ËÀ¼¾¯·½±ðÀëµ·»ÙÁËÁ½¸öºÚ¿ÍÍŻ¹²¿ÛÁôÁË6Ãû·¸×ï·Ö×Ó¡£µÚÒ»¸öºÚ¿ÍÍÅ»ïÓÉ26ËêÖÁ30ËêµÄ4ÃûÏÓ·¸×é³É£¬ËûÃÇÀûÓö¨ÔìµÄľÂíºÍ¼üÅ̼ͼÆ÷´ÓÎÚ¿ËÀ¼¹«ÃñµÄÍÆËã»úÖÐÇÔÈ¡ÒøÐÐÕË»§Í´´¦£¬¹²Íµ×ßÁË500¶àÍòHryvnia£¨ÎÚ¿ËÀ¼Ç®±Ò£¬×ܼÛÖµÔ¼17.8ÍòÃÀÔª£©¡£µÚ¶þ¸öºÚ¿ÍÍÅ»ïÓÉÁ½ÃûÏÓ·¸×é³É£¬ËûÃÇͨ¹ý×Ô¼º¿ª·¢µÄDDoS¹¤¾ß¶ÔÎÚ¿ËÀ¼µÄ¼¸¸ö³ÁÒª×ÊÔ´½øÐÐDDoS¹¥»÷£¬Ô̺¬MariupolÊеÄÐÂÎÅÍøÕ¾ºÍ¶à¼Ò½ÌÓý»ú¹¹µÈ¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/ukrainian-cybercriminals.html6¡¢ESÎļþä¯ÀÀÆ÷Á½¸ö·ì϶ʹµÃ³¬¹ý1ÒÚAndroidÓû§Ãæ¶Ô·çÏÕ
°²È«×êÑÐÔ±Robert BaptisteÔÚESÎļþä¯ÀÀÆ÷Öз¢ÏÖÒ»¸öʼÖÕÔÚºó¶ÜÔËÐеݵ²ØWeb·þÎñÆ÷£¨¶Ë¿Ú59777£©£¬ÓëÊܺ¦Õß´¦ÓÚͳһ±¾µØÍøÂçµÄ¹¥»÷Õ߿ɻñÈ¡Êܺ¦ÕßÊÖ»úµÄ´óÁ¿ÓÐЧÐÅÏ¢£¨Ô̺¬É豸ÐÅÏ¢¡¢app×°ÖÃÐÅÏ¢¡¢ÎļþµÈ)£¬ÉõÖÁÄܹ»Ô¶³ÌÆô¶¯app¡£¸Ã·ì϶±»¸ú×ÙΪCVE-2019-6447£¬×êÑÐÈËÔ±»¹°ä²¼ÁËPOC¾ç±¾¡£´Ë±í£¬ESET×êÑÐÈËÔ±Lukas Stefanko·¢ÏÖÁËÁíÒ»¸öÖÐÑëÈË£¨MitM£©¹¥»÷·ì϶£¬Ó°ÏìÁË4.1.9.7.4¼°Ö®Ç°µÄ°æ±¾¡£ESÎļþä¯ÀÀÆ÷¿ª·¢ÍŶӰµÊ¾½¨¸´²¹¶¡½«ÔÚԼĪÁ½ÌìºóÍÆ³ö¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/es-file-explorer-flaws-put-100-million-users-data-at-risk-fix-promised/ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ