ÍòºÀÒòÊý¾Ýй¼ûæ¶ÔÓ¢¹ú¼à¹Ü»ú¹¹1.23ÒÚÃÀÔª·£¿î£»GEº½¿Õ¹«Ë¾Jenkins·þÎñÆ÷й¶´óÁ¿Ãô¸ÐÐÅÏ¢£»ÊÓÆµÈí¼þZoom RCE·ì϶
°ä²¼¹¦·ò 2019-07-10
Ó¢¹úÊý¾Ý±£»¤»ú¹¹Öܶþ°µÊ¾½«ÏòÍòºÀ´¦ÒÔ9900ÍòÓ¢°÷£¨ºÏ1.23ÒÚÃÀÔª£©µÄ·£¿î£¬ÔÒòÊÇ2018Äê11ÔÂÍòºÀÆìÏÂϲ´ïÎݾƵêµÄ»áÔ±Êý¾Ýй¶ÊÂÎñ¡£¾ÝÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©³Æ£¬Å·ÖÞ31¸ö¹ú¶ÈµÄ½ü3000Íò¾ÓÃñºÍ700ÍòÓ¢¹ú¾ÓÃñÊܵ½ÍòºÀÊý¾Ýй¶µÄÓ°Ïì¡£ÕâÊÇ´ÓǰÁ½ÌìÄÚ²úÉúµÄµÚ¶þÆðÕë¶ÔÊý¾Ýй¶µÄ³Á´ó·£¿î֪ͨ¡£ÍòºÀ°µÊ¾¶ÔÐÅϢרԱ°ì¹«Êҵľö¶¨¸ÐÓ¦¾øÍû£¬ÔÚ±»´¦ÒÔ·£¿î֮ǰ£¬Ëü¡°ÓÐȨ×ö³ö»ØÓ¦¡±£¬²¢¡°³ïËã×ö³ö»ØÓ¦ÇÒ»ý¼«±£ÎÀ¡±×Ô¼ºµÄ̬¶È¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/marriott-data-breach-gdpr.html
2¡¢GEº½¿Õ¹«Ë¾Jenkins·þÎñÆ÷й¶´óÁ¿Ãô¸ÐÐÅÏ¢
°²È«×êÑÐÔ±Bob Diachenko·¢ÏÖGEº½¿Õ¹«Ë¾µÄJenkins·þÎñÆ÷¿É¹«¿ª½Ó¼û£¬µ¼Ö¹«Ë¾µÄ´óÁ¿Ãô¸ÐÐÅϢй¶£¬Ô̺¬¹«Ë¾ÄÚ²¿Ã³Ò×»ù´¡ÉèÊ©µÄÔ´´úÂë¡¢Ã÷ÎÄÃÜÂ롢ȫÇòϵͳµÄÅäÖÃÎļþºÍ˽Կ¡¢APIÁîÅÆ¡¢Êý¾Ý¿âÍ´´¦µÈ¡£GEº½¿Õ¹«Ë¾ÊÇͨÓÃµçÆøÆìϵÄ×Ó¹«Ë¾£¬ÊÇÈ«ÇòÉÌÓ÷ɻú·¢Æð»úµÄ¶¥¼¶¹©¸øÉÌÖ®Ò»¡£¸Ã¹«Ë¾°µÊ¾Ã»ÓÐÖ¤¾ÝÅú×¢ÆäËüÈ˽ӼûÁË·þÎñÆ÷ÉϵÄÊý¾Ý£¬²¢ÒѲÉȡԤ·À´ëÊ©³ÁÖÃÁËËùÓÐÍ´´¦¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/ge-aviation-passwords-jenkins-server/146302/
3¡¢Î¢ÈíÖÒ¸æÎÞÎļþ¶ñÒâÈí¼þAstarothµÄ¹¥»÷»î¶¯
΢Èí°²È«ÍŶӰ䲼һÔò´«µÝ£¬ÖÒ¸æÀûÓÃÎÞÎļþ¼¼Êõ·Ö·¢¶ñÒâÈí¼þAstarothµÄ¹¥»÷»î¶¯¡£Windows Defender ATPÍŶӼì²âµ½Á˸öñÒâ»î¶¯£¬¹¥»÷Õßͨ¹ý´ó¹æÄ£À¬»øÓʼþ»î¶¯ÏòÓû§·Ö·¢AstarothľÂí¡£¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÐÅÏ¢ÇÔȡľÂí£¬¿Éת´¢¸÷ÀàÀûÓ÷¨Ê½µÄÍ´´¦£¬²¢½«±»µÁÊý¾ÝÉÏ´«µ½Ô¶³Ì·þÎñÆ÷¡£Î¢Èí½²»°È˰µÊ¾³¬¹ý95£¥µÄAstarothϰȾ²úÉúÔÚ°ÍÎ÷¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/microsoft-warns-about-astaroth-malware-campaign/
4¡¢DDoS½©Ê¬ÍøÂçGoBotKR£¬ÖØÒªÕë¶Ôº«¹ú
ƾ¾ÝESETµÄ»ã±¨£¬ÍøÂç·¸×ï·Ö×ÓÔÚ¹¹½¨Ò»¸ö¿ÉÓÃÓÚÖ´Ðи÷ÀàDDoS¹¥»÷µÄ½©Ê¬ÍøÂçGoBotKR¡£¸Ã½©Ê¬ÍøÂçÖØÒª¶Ô×¼º«¹úµçÊÓ½ÚÖ÷ÕÅ·ÛË¿£¬Í¨¹ýµÁ°æÍøÕ¾ÉϵĵÁ°æµçÓ°¡¢ÓÎÏ·ºÍµçÊÓ½ÚÄ¿ÖÖ×ÓÏÂÔØ½øÐд«²¼¡£¸Ã¶ñÒâÈí¼þÊÇÒÑÖªºóÃÅGoBot2µÄ¸Ä½ø°æ±¾£¬´úÂëºÜµ¥Ò»£¬´óÎÞÊýÖ°Äܶ¼ÊÇʹÓÃGoLang¿âʵÏֵ쬲¢ÇÒÖ´ÐÐWindowsºÅÁîºÍµÚÈý·½¹¤¾ß£¬ÈçBitTorrentºÍuTorrent¿Í»§¶Ë¡£×êÑÐÈËÔ±²¹³ä˵¸Ã¶ñÒâÈí¼þ¶ÔÔ´´úÂëµÄÅú¸ÄÖØÒªÊǺ«¹úÌØÓеÄÌӱܼ¼Êõ£¬Ô̺¬¼ì²âIPÐÅÏ¢ÒÔÈ·¶¨ÊÇ·ñÔÚº«¹úµÄһЩ°²È«É³ÏäÖÐÔËÐÓעɨÃè¹ý³ÌÒÔ¼ì²â·À²¡¶¾²úÆ·µÈ¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/gobotkr-pirate-torrents-ddos-botnet/146285/
5¡¢¶ñÒâÈí¼þAnubis»Ø¹é£¬¼ì²âµ½³¬¹ý1.7Íò¸öÑù±¾
Ç÷Ïò¿Æ¼¼¼ì²âµ½Android¶ñÒâÈí¼þAnubis»Ø¹é£¬×êÑÐÈËÔ±ÔÚÁ½¸öÓйصķþÎñÆ÷Éϼì²âµ½17490¸öÑù±¾¡£ÔÚÕâЩÑù±¾ÖÐÕÒµ½ÁËÁ½¸ö±êÇ©£ºOperat?rG¨¹ncellemesiºÍGoogle Services£¬Ç°ÕßÔÚÍÁ¶úÆäÓïÖеÄÒâ˼ÊÇ¡°²Ù×÷ÈËÔ±¸üС±£¬ÕâЩ±êÇ©¿ÉÄÜÊÇÉç½»¹¤³Ìµö¶ü£¬ÓÃÓÚºýŪÓû§ÏÂÔØ¶ñÒâÈí¼þ¡£Anubis×ܹ²Õë¶Ô188¸öÓëÒøÐкͽðÈÚÓйصÄÀûÓ÷¨Ê½£¬´ÓÖÐÇÔÈ¡Ó×ÎҺͲÆÕþÊý¾Ý¡£ÕâЩ·¨Ê½À´×ÔÓÚ²¨À¼¡¢°Ä´óÀûÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢·¨¹ú¡¢Òâ´óÀû¡¢Î÷°àÑÀ¡¢ÃÀ¹úºÍÓ¡¶ÈµÈ¹ú¶È¡£AnubisµÄC£¦C·þÎñÆ÷Ҳɢ²¼ÔÚ·ÖÆçµÄ¹ú¶È¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/anubis-android-malware-returns-with-over-17000-samples/
6¡¢ÊÓÆµ»áÒéÈí¼þZoom RCE·ì϶£¬¿É½Ù³ÖMacÉãÏñÍ·
°²È«×êÑÐÈËÔ±Jonathan LeitschuhÅû¶ÊÓÆµ»áÒéÈí¼þZoomÖеÄÒ»¸öRCE·ì϶£¬¸Ã·ì϶ӰÏìÁËMacƽ̨ÉϵÄZoom app°æ±¾4.4.4£¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÓû§½Ó¼ûÍøÕ¾Ê±ÊÕÊÜÍøÂçÉãÏñÍ·¡£Æ¾¾ÝLeitschuhµÄ˵·¨£¬³¬¹ý400ÍòÓû§Ãæ¶Ô·çÏÕ¡£¸Ã·ì϶ÀûÓÃÁËZoomÈí¼þµÄµã»÷²ÎÓëÖ°ÄÜ£¬¼´Ö»Ðèµã»÷Ô¼ÇëÁ´½Ó¼´¿É×Ô¶¯¼¤»îϵͳÉÏ×°ÖõÄÀûÓ÷¨Ê½²¢Í¨¹ýWebä¯ÀÀÆ÷²ÎÓëÊÓÆµ»áÒé¡£¹¥»÷Õß¿Éͨ¹ý´¹µöÓʼþ·Ö·¢ÕâÖÖ¶ñÒâÁ´½Ó¡£Leitschuh»¹°µÊ¾ZoomµÄ½¨¸´Ö»ÊÇ×èÖ¹¹¥»÷Õß´ò¿ªÓû§µÄÉãÏñÍ·£¬¹¥»÷ÕßÈÔÄܹ»Í¨¹ý¶ñÒâÁ´½ÓÓÕʹÓû§²ÎÓë»áÒé¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88147/hacking/zoom-mac-software-flaw.html


¾©¹«Íø°²±¸11010802024551ºÅ