¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20190221
°ä²¼¹¦·ò 2019-02-21
Check Point×êÑÐÍŶÓÅû¶WinRARÖеĴúÂëÖ´Ðзì϶£¬¸Ã·ì϶ÒÑ´æÔÚÁ˳¬¹ý19ÄêµÄ¹¦·ò£¬Ó°ÏìÁ˳¬¹ý5ÒÚÓû§¡£¸Ã·ì϶£¨CVE-2018-20250¡¢CVE-2018-20251¡¢CVE-2018-20252ºÍCVE-2018-20253£©´æÔÚÓÚWinRARµÄUNACEV2.DLL¿âÖУ¬Õâ¸ö¿âÕÆ¹Ü½âѹËõACEÌåʽµÄѹËõÎļþ¡£×êÑÐÈËÔ±·¢ÏÖ¸Ã¿â´æÔÚ±àÂëȱµã£¬¹¥»÷Õß¿ÉÀûÓöñÒâACEÎļþÔÚ½âѹËõµÄÖ÷ÕÅõè¾¶Ö®±íÖ²Èë¶ñÒâÈí¼þ¡£WinRARÍŶӰµÊ¾ÓÉÓÚUNACEV2.DLL´Ó2005ÄêÆð¾ÍÖÕ³¡Á˸üУ¬¿ª·¢ÈËÔ±ÒѾʧȥÁ˸ÿâÔ´´úÂëµÄ½Ó¼ûȨÏÞ£¬Òò¶øËûÃÇÑ¡ÔñÉÕ»Ù¶ÔACEÌåʽµÄÖ§³Ö¡£WinRAR¿ª·¢ÕßÔÚ1ÔÂ28ÈÕ°ä²¼ÁËWinRAR 5.70 Beta 1ÒÔ½¨¸´´Ë·ì϶¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/extracting-code-execution-from-winrar/2¡¢WordPressÍŶӽ¨¸´Ò»¸öÓµÓÐ6Ä꺹ÇàµÄRCE·ì϶
RIPS¹«Ë¾µÄ°²È«×êÑÐÈËÔ±ÔÚWordPress 5.0.3֮ǰµÄ°æ±¾Öз¢ÏÖÒ»¸ö¿Éµ¼ÖÂRCEµÄ°²È«·ì϶£¬¸Ã·ì϶ӰÏìÁË´Óǰ6Äê¼ä°ä²¼µÄËùÓÐWordPress°æ±¾¡£ÓµÓÐÖÁÉÙÒ»¸ö¡°×÷Õß¡¹ØË»§µÄ¹¥»÷Õß¿ÉÀûÓø÷ì϶Ôڵײã·þÎñÆ÷ÉÏÖ´ÐÐËÁÒâ´úÂë¡£¸Ã·ì϶ÊÇõè¾¶±éÀú·ì϶ºÍÎļþÔ̺¬·ì϶µÄ×éºÏ£¬ÔÚ×êÑÐÈËÔ±°ä²¼µÄPoCÊÓÆµÖУ¬¹¥»÷ÕßÄܹ»ÔÚ¼¸ÃëÖÓÄÚ»ñµÃÖ¸±êWordPress²©¿ÍµÄÆëÈ«½ÚÔìȨ¡£WordPress°æ±¾5.0.1ºÍ4.9.9Öеݲȫ´ëÊ©¿É×èÖ¹¸Ã·ì϶ÀûÓá£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/02/wordpress-remote-code-execution.html3¡¢ÈüÃÅÌú¿Ë°ä²¼ISTR 24Äê¶ÈÍþв»ã±¨£¬2018Ä깩¸øÁ´¹¥»÷Ôö³¤78£¥
ÈüÃÅÌú¿Ë°ä²¼»¥ÁªÍø°²È«Íþв»ã±¨£¨ISTR£©Volume 24£¬¸Ã»ã±¨Ö¸³ö±íµ¥½Ù³Ö¹¥»÷£¨formjacking£©È¡´úÁËÀÕË÷Èí¼þºÍ¶ñÒâÍÚ¿óÈí¼þ£¬³ÉΪ2018Äê×îÖØÒªµÄÍþв¡£formjacking¹¥»÷ÖØÒªÕë¶ÔÔÚÏßÁãÊÛÉ̺͵ç×ÓÉÌÎñÍøÕ¾£¬Í¨¹ý¶ñÒâ´úÂëÀ´ÇÔÈ¡¿Í»§µÄÖ§¸¶ÐÅÏ¢£¬ÕâÖÖ¹¥»÷½øÒ»²½Ö¤ÁËÈ»¹©¸øÁ´¹¥»÷µÄ·çÏÕ¡£Æ¾¾Ý¸Ã»ã±¨µÄÊý¾Ý£¬2018Ä깩¸øÁ´¹¥»÷µÄÊýÁ¿±È2017ÄêÓâÔ½78%¡£´Ë±í£¬Óë2017ÄêÏà±È£¬2018ÄêÀÕË÷Èí¼þ¹¥»÷½µÂäÁË20%£¬µ«Õë¶ÔÆóÒµµÄ¹¥»÷Ôö³¤ÁË12%£¬²¢ÇÒÒÆ¶¯ÀÕË÷Èí¼þìÉý33%¡£ÔÚ2018Äê1ÔÂÖÁ12ÔÂÆÚ¼ä£¬¼ÓÃܽٳֹ¥»÷½µÂäÁË52%¡£
ÔÎÄÁ´½Ó£º
https://www.symantec.com/blogs/threat-intelligence/istr-24-cyber-security-threat-landscape4¡¢Î¢ÈíÅû¶APT28й¥»÷»î¶¯£¬ÖØÒªÕë¶ÔÅ·ÖÞÕþÖÎʵÌå

΢ÈíÅû¶¶íÂÞ˹APT×éÖ¯Fancy Bear£¨ÓÖ³ÆAPT28£©µÄй¥»÷»î¶¯£¬Æ¾¾Ý΢ÈíµÄ±íÊö£¬APT28µÄÖ¸±êÊÇÓë2019ÄêÅ·ÖÞÒé»áÑ¡¾ÙÓйصÄÕþÖÎʵÌå¡£APT28ÀûÓÃÓã²æÊ½´¹µöÓʼþ£¬ÔÚ2018Äê9ÔÂÖÁ12ÔÂÆÚ¼äÕë¶Ô104¸öÕË»§ÌáÒéÁ˹¥»÷¡£ÕâЩÕË»§ÊôÓÚ±ÈÀûʱ¡¢·¨¹ú¡¢µÂ¹ú¡¢²¨À¼¡¢ÂÞÂíÄáÑǺÍÈû¶ûάÑǵÄÕþÖλú¹¹¡£ÕâЩ´¹µöÓʼþÖ¼ÔÚÍøÂçÖ¸±êµÄµÇ¼ʹ´¦»ò´«²¼¶ñÒâÈí¼þ¡£Î¢Èí°µÊ¾Ëü½«°ÑAccountGuard·þÎñÀ©´óµ½12¸öеÄÅ·Ã˹ú¶È¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-reveals-new-apt28-cyber-attacks-against-european-political-entities/5¡¢³¯ÏÊAPT×éÖ¯Lazarus£¬ÀûÓÃKEYMARBLEºóÃŹ¥»÷¶íÂÞ˹ÆóÒµ
³¯ÏÊAPT×éÖ¯LazarusµÄ·ÖÖ§»ú¹¹BluenoroffÕë¶Ô¶íÂÞ˹ÆóÒµÌáÒéÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¸Ã¹¥»÷»î¶¯ÀûÓÃOfficeÎĵµ×÷Ϊ³õʼϰȾý½é£¬²¢×îÖÕ¿ªÊÍÁËKEYMARBLEºóÃÅ¡£Æ¾¾ÝUS-CERTµÄÓйضñÒâÈí¼þ·ÖÎö»ã±¨£¬¸ÃºóÃÅľÂí¿ÉÓÃÓÚ½Ó¼ûÉ豸µÄÅäÖÃÊý¾Ý¡¢ÏÂÔØÆäËüÎļþ¡¢Ö´ÐкÅÁî¡¢Åú¸Ä×¢²á±í¡¢½ØÈ¡ÆÁÄ»ÐÅÏ¢ºÍÊý¾ÝÉøÂ©µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-apt-lazarus-targets-russian-entities-with-keymarble-backdoor/6¡¢ATM¶ñÒâÈí¼þWinPot£¬ÀûÓÃUSB½Ó¿Ú½øÐд«²¼
¿¨°Í˹»ù×êÑÐÈËÔ±Konstantin Zykov·¢ÏÖATM¶ñÒâÈí¼þWinPotµÄбäÌåv.3ÒѾÔÚ°µÍøÉϳöÏÖ£¬Æä±¨¼ÛΪ500ÃÀÔªµ½1000ÃÀÔªÖ®¼ä¡£WinPotͨ¹ýÎïÀí½Ó¼û½øÐд«²¼£¬¼´Í¨¹ýATMµÄUSB½Ó¿Ú´«²¼¡£¹¥»÷Õßͨ³£Õë¶ÔÐÐÈ˽ÏÉٵĽÖ·¡¢Ò©µê¡¢¾ÆµêÀàÉ̵êµÈÅԱߵĵ¥¸öATM£¬Ò»µ©ATMϰȾÁ˸öñÒâÈí¼þ£¬¹¥»÷Õß¼´¿Éͨ¹ýÏÔʾÆÁĻǿÔìATMͳöÏֽ𡣰µÍøÂô¼ÒÔÚÆäÑÝʾÊÓÆµÖÐÑÝʾÁËWinPot v.3µÄ¹¤×÷¹ý³Ì£¬²¢Õ¹Ê¾ÁËÒ»¶ÎShowMeMoneyµÄ´úÂë¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/atm-jackpotting-malware-winpot/141960/ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ