Microsoft Teams¸üлúÔì¿Éµ¼ÖºڿÍÖ´ÐÐËÁÒâÎļþ£»¶þάÂëÈÆ¹ýÓʼþ°²È«Õ½Êõ
°ä²¼¹¦·ò 2019-07-01
°²È«×êÑÐÈËÔ±·¢ÏÖMicrosoft Teams×ÀÃæÀûÓ÷¨Ê½ÖеĸüлúÔì¿ÉÓÃÓÚÏÂÔØºÍÖ´ÐжñÒâÎļþ¡£Í¬ÑùµÄÎÊÌâÒ²Ó°ÏìÁËGitHub¡¢WhatAppºÍUiPathµÄ×ÀÃæ°æ£¬µ«ËüÃÇÖ»ÄÜÏÂÔØÎļþ¡£¸ÃÎÊÌâÓëʹÓÃNuGetÀ´ÖÎÀí×°Öú͸üаüµÄ¿ªÔ´ÏîÄ¿SquirrelÓйأ¬×êÑÐÈËÔ±·¢ÏÖupdateºÅÁî¼°squirrelºÅÁî¿ÉÔÚµ±Ç°Óû§µÄ¸ßµÍÎÄÖÐÖ´ÐÐËÁÒâ¶þ½øÔìÎļþ£¬½áºÏdownload²ÎÊý£¬Ëü»¹ÔÊÐí´ÓÔ¶³ÌµØÎ»ÒÔNuGet°üµÄ´ó¾Ö»ñÈ¡payload¡£Î¢Èí°µÊ¾½«ÔÚ½«À´µÄÈí¼þ°æ±¾Öн¨¸´¸ÃÎÊÌâ¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-teams-can-be-used-to-download-and-run-malicious-packages/
2¡¢°²È«³§É̽ü5¸öÔÂÄÚÀ¹½Ø500Íò´ÎÕë¶ÔIPÉãÏñÍ·µÄ¹¥»÷
Ç÷Ïò¿Æ¼¼°µÊ¾ËüÔÚ½ü5¸öÔÂÄÚ×èÖ¹ÁËÕë¶ÔIPÉãÏñÍ·µÄ500Íò´Î¹¥»÷¡£Æ¾¾Ý¶Ô7000¸öIPÉãÏñÍ·µÄ·ÖÎö£¬°²È«³§ÉÌ·¢ÏÖIP¼à¿ØÐÐÒµÃæ¶Ô×Å´óÁ¿µÄ¹¥»÷¡£Ç÷Ïò¿Æ¼¼³ÆÕâЩ¹¥»÷ÖÐ75%µÄ¹¥»÷¶¼ÊǶԵǼʹ´¦µÄ±©Á¦ÆÆ½â³¢ÊÔ£¬²¢°µÊ¾´æÔÚÃ÷È·µÄÀûÓó£¼û¶ñÒâÈí¼þ£¨ÈçMirai±äÌ壩µÄ¹¥»÷ģʽ¡£Ç÷Ïò¿Æ¼¼Ö´Ðи±×ܲüæÊ×ϯ¿ª·¢¹ÙOscar Chang°µÊ¾£º¡°Ô½À´Ô½¶àµÄ´¹Ö±ÐÐÒµÔÚ×·Çó»¥Á¬µÄ¡¢»ùÓÚAIµÄÊÓÆµ¼à¿ØÀûÓ㬴ÓÏà¶Ô·â¹ØµÄÍøÂçתÏòÔ½·¢»¥ÁªµÄ»ùÓÚÔÆµÄÍøÂç¡£ÓÉÓÚÕâÖÖת±ä£¬Ôì×÷É̺ÍÓû§±ØÐë¹Ø×¢ÕâЩÎïÁªÍøÉ豸µÄ°²È«ÐÔ¡£¡±
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/five-million-camera-cyberattacks-1/
3¡¢ÒÁÀÊAPT33ÔÚ×êÑÐÍŶӰ䲼Æä×êÑл㱨ºó×ªÒÆÖÁлù´¡ÉèÊ©
ƾ¾ÝRecorded FutureµÄ»ã±¨£¬ÔÚ2019Äê3ÔÂ×êÑÐÈËÔ±°ä²¼¹ØÓÚAPT33µÄµ÷Ñл㱨ºó£¬¸ÃAPT×éÖ¯ÒÑ¾×ªÒÆÖÁеĻù´¡ÉèÊ©¡£Ôڻ㱨°ä²¼ºó£¬´óÎÞÊý¶³öµÄÓòÃû¶¼±»Í£Óûò²»ÔÙ½âÎöµ½ÕæÊµµÄIPµØÖ·¡£ÕâÅú×¢¹¥»÷ÕßÏàʼû½Ìå¶ÔÆä»î¶¯µÄ±¨Â·£¬²¢ÇÒÕ¼Óм±¾ç·´Ó³ËùÐèµÄ×ÊÔ´¡£È»¶ø£¬Ö»¹Ü±»ÆØ¹â£¬¸Ã×éÖ¯ÒÀÈ»¶Ô×¼É³ÌØ°¢À²®µÄ×éÖ¯£¬ÓëÆäº¹ÇàÖ¸±êά³ÖÒ»Ö¡£×Ô3ÔÂÏÂÑ®ÒÔÀ´£¬×êÑÐÈËÔ±¹Û²ìµ½¸Ã×é֯ʹÓÃÁ˳¬¹ý1200¸öÓòÃûÒÔ¼°¶ñÒâÈí¼þ£¬×êÑÐÈËÔ±»¹ÒÔΪAPT33¡¢APT35ºÍMUDDYWATERµÄ¹¥»÷»î¶¯¿ÉÄÜ´æÔÚ³Áµþ¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/iranian-cyberspies-update-infrastructure-following-recent-report
4¡¢Ð´¹µö¹¥»÷»î¶¯ÀûÓöþάÂëÈÆ¹ýÓʼþ°²È«Õ½Êõ
·¨¹úCofense×êÑÐÈËÔ±·¢ÏÖÒ»¸öеĴ¹µö¹¥»÷»î¶¯ÀûÓöþάÂ뽫ָ±ê³Á¶¨ÏòÖÁ´¹µöÒ³Ãæ£¬ÕâÖÖ²½ÖèÓÐЧ¶ã±ÜÁËÖ¼ÔÚ×èÖ¹´¹µö¹¥»÷µÄÓʼþ°²È«½ÚÔì´ëÊ©¡£¸Ã¶þάÂë±àÂëµÄÄÚÈÝÊǶñÒâURL£¬´óÎÞÊýÖÇÄÜÊÖ»úµÄ¶þάÂëɨÃèÆ÷½«µ±¼´Í¨¹ýÊÖ»úä¯ÀÀÆ÷½«Óû§³Á¶¨ÏòÖÁ´¹µöÍøÕ¾¡£¸Ã´¹µöÒ³Ãæ»áÓÕʹÓû§ÊäÈëAOL¡¢Microsoft»òÆäËûÀàÐ͵ÄÕÊ»§Í´´¦À´²é¿´µö¶üÎĵµ¡£ÕâÖÖ¹¥»÷¼¿Á©±»³ÆÎªQRishing£¬ÊÇÒ»ÖÖÒÑÖªµÄ¡¢¾¹ýÑéÖ¤µÄ¹¥»÷²½Ö裬2017ÄêµÄһƪÂÛÎÄÌá³öÁËÒ»ÖÖ¿ÉÄܵķÀÓù´ëÊ©£ºQRCS£¨¼±¾çÏìÓ¦´úÂ밲ȫ£©¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/phishing-security-controls-fully-bypassed-using-qr-codes/
5¡¢×êÑÐÈËÔ±ÑÝʾÈôºÎÀûÓÃExcel Power QueryÖ°ÄÜÖ²Èë¶ñÒâÈí¼þ
Mimecast×êÑÐÈËÔ±·¢ÏÖMicrosoft ExcelÖеÄPower QueryÖ°Äܿɱ»ÓÃÓÚÔ¶³ÌÖ²Èë¶ñÒâÈí¼þ¡£Power QueryÔÊÐíÓû§½«±í²¿Êý¾ÝÔ´£¨Èç±í²¿Êý¾Ý¿â»ò»ùÓÚWebµÄÊý¾Ý£©µ¼ÈëExcelÖУ¬×êÑÐÈËÔ±¿ª·¢ÁËÒ»ÖÖ¼¼Êõ£¬Äܹ»Í¨¹ýPower QueryÏòExcel±í¸ñÌáÒéÔ¶³Ì¶¯Ì¬Êý¾Ý»¥»»£¨DDE£©¹¥»÷£¬½»¸¶¶ñÒâpayload²¢×Ô¶¯½ÚÔì¸Ãpayload¡£Î¢Èí°µÊ¾²»»á°ä²¼½¨¸´·¨Ê½£¬ÓÉÓÚËùÓÐÊÜÖ§³ÖµÄMicrosoft Excel°æ±¾³ÇÊÐÏòÓû§ÌáÐÑÊÇ·ñÔÊÐí¼ÓÔØ±í²¿Êý¾Ý¡£µ«×êÑÐÈËÔ±°µÊ¾£¬Ôھɰ汾µÄMicrosoft Excel 2010ÖУ¬payload»á×Ô¶¯Ö´ÐУ¬ÎÞÐèÓû§½»»¥¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/microsoft-excel-attack-vector/146062/
6¡¢×êÑÐÈËÔ±Åû¶UltraloqÖÇÄÜËøÖеĶà¸ö°²È«·ì϶
×êÑÐÈËÔ±·¢ÏÖU-tecÔì×÷µÄUltraloqÖÇÄÜËø´æÔÚ¶à¸ö°²È«·ì϶£¬Ô̺¬API²»×ãÉí·ÝÈÏÖ¤¡¢À¶ÑÀBLEÃÜÔ¿±©Á¦ÆÆ½âµÈ¡£UltraloqÊÇÒ»¿îÊÛ¼ÛÔ¼200ÃÀÔªµÄÀ¶ÑÀ¡¢Ö¸Îƺʹ¥ÃþÆÁÖÇÄÜÃÅËø£¬Ëü»¹ÅäÌ×Ò»¸öÒÆ¶¯APP¡£×êÑÐÈËÔ±·¢ÏÖ¸ÃÒÆ¶¯APPʹÓõÄAPIй¶ÁËÓû§Êý¾Ý£¬¿ÉÔÊÐí¹¥»÷Õß³ÁÖÃPIN¡¢Ëø¶¨Óû§»ò´ò¿ªÃÅËø¡£¹¥»÷Õß»¹¿Éͨ¹ýBLE½Ó¿Ú½øÐб©Á¦¹¥»÷£¬ÒÔÆÆ½âBLEÃÜÔ¿¡£¸ÃÖÇÄÜËøÔÚÎïÀíÉÏÒ²²»°²È«£¬Äܹ»Í¨¹ý²åÈëºÜ±¡µÄÌúƬÊÖ¶¯´ò¿ªËø¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/smart-lock-turns-out-to-be-not-so-smart-or-secure/146091/


¾©¹«Íø°²±¸11010802024551ºÅ