˼¿ÆTalosÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄRCE·ì϶£»ÃÀµÂµý±¨²¿ÃŽÚÔìÈðÊ¿¹«Ë¾ÊýÊ®Ä꣬ÇÔÈ¡120¹ú»úÃܵý±¨

°ä²¼¹¦·ò 2020-02-14

1.˼¿ÆTalosÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄRCE·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalosÍŶÓÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´Ðзì϶(CVE-2020-3868)£¬µ±Óû§ÔÚSafariÖдò¿ª¶ñÒâÍøÒ³Ê±£¬¿ÉÄܻᴥ·¢ÀàÐÍ»ìºÏ£¬´Ó¶øµ¼ÖÂÄÚ´æ°Ü»µºÍÖ´ÐÐËÁÒâ´úÂë¡£¹¥»÷Õß±ØÒªÍ¨¹ýijÖÖ·½Ê½ÓÕʹÓû§½Ó¼û¶ñÒâÍøÒ³À´´¥·¢´Ë·ì϶¡£¸Ã·ì϶´æÔÚÓÚSafariµÄ¡°×ÖÌ塱ְÄÜÖУ¬Talos²âÊÔ²¢È·ÈÏ´Ë·ì϶ӰÏìSafari°æ±¾13.0.3£¨15608.3.10.1.4£©¡¢Safari¼¼ÊõÔ¤ÀÀ°æ96£¨Safari 13.1£¬WebKit 15609.1.9.7£©ºÍWebkit GIT e4cd3b4fab6166d1288984ded40c588439dab925£¬½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ×îа汾¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/02/vuln-spotlight-apple-safari-code-execution-feb-2020.html


2.Î÷ÃÅ×Ó°ä²¼2Ô°²È«¸üУ¬½¨¸´¶à¸ö²úÆ·ÖеÄDoS·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Î÷ÃÅ×Ó°ä²¼2020Äê2Եݲȫ¸üУ¬¸Ã¸üн¨¸´ÁËÓ°Ïì¶à¸ö²úÆ·µÄDoS·ì϶¡£Æ¾¾ÝÎ÷ÃÅ×Ó°ä²¼µÄ´«µÝ£¬¸Ã·ì϶£¨CVE-2019-19282£©Ó°ÏìÁËÆôÓüÓÃÜͨѶµÄSiemens SIMATIC PCS 7¡¢SIMATIC WinCCºÍSIMATIC NET PC²úÆ·¡£¸Ã·ì϶¿ÉÄÜʹӵÓÐÍøÂç½Ó¼ûȨÏ޵Ĺ¥»÷ÕßÔÚijЩÇé¿öϵ¼Ö»ؾø·þÎñ״̬£¨SIMATIC WinCC V7.3»òSIMATIC PCS 7 V8.1֮ǰµÄ°æ±¾²»ÊÜÓ°Ï죬ÓÉÓÚ¼ÓÃÜͨѶ²»³ÉÓã©¡£¹¥»÷ÕßÎÞÐèÏµÍ³ÌØÈ¨»òÓû§½»»¥¼´¿ÉÀûÓôËÎÊÌâ¡£¸Ã·ì϶µÄCVSSÆÀ·ÖΪ7.5¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/97742/security/siemens-dos-flaws-2.html


3.¿¨°Í˹»ù°ä²¼2019ÄêµÚËÄʱ¶ÈµÄDDoS¹¥»÷»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ù°ä²¼2019ÄêQ4 DDoS¹¥»÷»ã±¨£¬¸Ã»ã±¨Ö¸³öQ4µÄDDoS¹¥»÷´ÎÊýÏà¶ÔÓÚÉÏÒ»¸ö»ã±¨ÆÚÓÐËùÔö³¤£¬µ«ÉÏÉý·ù¶È²»´ó£¬¶øÓë2018ÄêQ4Ïà±ÈÔòÏÕЩ·­ÁËÒ»·¬¡£Ö»¹ÜQ4DDoS¹¥»÷µÄÊýÁ¿ºÍ³ÖÐø¹¦·òÏà¶ÔÓÚÉÏÒ»¸ö»ã±¨ÆÚÓÐËùÔö³¤£¬µ«×êÑÐÈËÔ±ÒÔΪDDoSÊг¡ÒѾ­³ÁÐÂÇ÷ÓÚ²»±ä£¬Ô¤¼Æ2020ÄêQ1¹¥»÷ÊýÁ¿½«ÂÔÓнµÂ䣬µ«ÓпÉÄܾø¶ÔÖµÈÔ½«¸ßÓÚ2019ÄêͬÆÚ¡£Q4¹¥»÷ÊýÁ¿ÅÅÃûǰÈýµÄ¹ú¶È±ðÀëÊÇÖйú¡¢ÃÀ¹úºÍÈÕ±¾¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/ddos-report-q4-2019/96154/


4.ÃÀµÂµý±¨²¿ÃŽÚÔìÈðÊ¿¹«Ë¾ÊýÊ®Ä꣬ÇÔÈ¡120¹ú»úÃܵý±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾ÝÃÀ¹ú¡¶»ªÊ¢¶ÙÓʱ¨¡·±¨Â·£¬ÃÀµÂµý±¨²¿ÃÅÊýÊ®Äê¼äͨ¹ý½ÚÔìÈðÊ¿¼ÓÃܹ«Ë¾Crypto AG£¬ÇÔÈ¡ÁËÈ«ÇòÔ¼120¹úµ±¾ÖµÄ×î¸ß»úÃÜͨѶµý±¨¡£¾ÝϤ£¬µÚ¶þ´ÎÊÀ½ç´óÕ½Õ½ºóµ½±¾ÊÀ¼Í³õ£¬Crypto AG¹«Ë¾ÎªÔ¼120¸ö¹ú¶ÈÈ·µ±¾ÖÌṩ¼ÓÃÜͨѶװÖã¬ÒÁÀÊ¡¢ÄÏÃÀ¶à¹úµ±¾Ö¡¢Ó¡¶Å×ë°Í»ù˹̹½ÔΪ·þÎñ¶ÔÏó¡£µ«Crypto AGÄ»ºóÀϰåÆäʵÊÇÃÀ¹úÖÐÑëµý±¨¾Ö£¨CIA£©ÒÔ¼°µÂ¹úÁª¹úµý±¨¾Ö£¨BND£©¡£ÕâÁ½¸öµý±¨²¿ÃŶÔCrypto×°Öö¯Êֽţ¬ÈÃ×°ÖÿɵÈÏб»ÆÆ½â£¬½ø¶ø½â¶ÁÊý¾Ý¡£±¨Â·³Æ£¬ÖÐÇé¾ÖÄÚ²¿ÓйØÓÚÕâ¸ö×î¸ß»úÃÜ´òËãµÄº¹Çà»úÃܵµ°¸£¬µµ°¸Ö¸³öCrypto AG¿¿×ÅÈÃÎ÷·½µý±¨»ú¹Ø»ñµÃ¿Í»§»úÃÜ£¬×¬½øÊýÒÔ°ÙÍò¼ÆÃÀÔª¡£Í¬Ê±£¬µµ°¸Ò²Ö¸³ö£¬Ö»¹ÜʹÓÃCrypto AG²úÆ·µÄ¹ú¶È²»ÉÙ£¬µ«ËÕÁª/¶íÂÞ˹ºÍÖйú£¬È´´ÓÀ´¶¼²»ÊǸù«Ë¾µÄ¿Í»§¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/us-german-spies-plundered-global-secrets-swiss-encryption-firm-report


5.Gaza groupÐÂÍøÂç¹¥»÷º£³±£¬ÖØÒªÕë¶Ô°ÍÀÕ˹̹


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Cybereason NocturnusÍŶÓÔÚÖж«·¢ÏÖÒ»¸öеÄÍøÂç¼äµý»î¶¯£¬¸Ã¹¥»÷»î¶¯ÖØÒªÕë¶Ô°ÍÀÕ˹̹¡£×êÑÐÈËÔ±³Æ·¸×ïÍÅ»ïGaza groupµÄÆäÖÐÒ»¸ö×éÖ¯£¨±»³ÆÎªMoleRATs£©Ëƺõ¶Ô´ËÊÂÕÆ¹Ü¡£Ö»¹ÜÔÚ´ÓǰµÄ¼¸¸öÔÂÖÐMoleRATsÒ»ÏòÊÔÍ¼ÉøÈëµ½×éÖ¯ºÍÓ×ÎÒµÄϵͳÖУ¬µ«Ëƺõͬʱ²úÉúÁËÁ½¸öµ¥¶ÀµÄ¹¥»÷»î¶¯¡£µÚÒ»¸ö¹¥»÷»î¶¯ÖØÒªÀûÓÃÉç»á¹¤³Ìѧ·Ö·¢SparkºóÃÅ¡£Æä´¹µöÓʼþÊÔIJÀûÓÃÕþÖÎÉÏÃô¸ÐµÄÄÚÈÝÀ´ÎüÒýÊܺ¦Õߣ¬ÀýÈçÒÔ°Íì¶Ü¡¢¹þÂí˹Óë°£¼°µ±¾ÖÖ®¼äµÄÑÏÖØ´óÊÆÒÔ¼°¿¨ÈûÄ·¡¤Ë÷À³ÂíÄá±»°µËã¡£µÚ¶þ¸öÔòÖØÒª·Ö·¢Pierogi£¬Ö»¹ÜËüÒ²ÀûÓÃÁËÉç»á¹¤³Ìѧ£¬µ«Ê¹ÓÃÁË·ÖÆçµÄµö¶üÎļþÒÔ¼°È«ÐµĺóÃÅ·¨Ê½¡£CybereasonÒÉ»óÕâÁ½¸ö¹¥»÷»î¶¯µÄÖ÷ÕŶ¼ÊÇ¡°´ÓÊܺ¦ÕßÄÇÀïÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬²¢½«ÆäÓÃÓÚÕþÖÎÖ÷ÕÅ¡±¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/gaza-group-strikes-targets-in-palestinian-territories-in-new-cyberattack-wave/


6.ÃÀ¹úÁ¬ËøÉ̵êRutter 71¼ÒµêÆÌϰȾPoS¶ñÒâÈí¼þ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹úÁ¬ËøÉ̵êRutterÅû¶ÓÐ71¼ÒµêÆÌϰȾÁËPoS¶ñÒâÈí¼þ£¬¿Í»§µÄÐÅÓþ¿¨ÐÅÏ¢±»ÇÔ¡£Æ¾¾ÝRutter°ä²¼µÄ²¼¸æ£¬¸Ã¶ñÒâÈí¼þͨ¹ý·½±ãµêÄÚÒÔ¼°Ò»Ð©È¼ÓͱÃÉϵÄPoSÉè±¸ÍøÂç¿Í»§µÄÖ§¸¶¿¨ÐÅÏ¢¡£´óÎÞÊýÇé¿öϸöñÒâÈí¼þÍøÂçÁ˿ͻ§µÄÐÕÃû¡¢¿¨ºÅ¡¢ÓÐЧÆÚºÍÄÚ²¿ÑéÖ¤ÂëÐÅÏ¢£¬µ«¶ÔÓÚÔÚÓµÓÐEMVÖ°ÄܵÄPoSÉ豸ÉÏË¢¿¨µÄÓû§£¬Rutter°µÊ¾Ö»Óп¨ºÅºÍÓÐЧÆÚÊÜÓ°Ïì¡£¹ÌÈ»ÊÂÎñ²úÉúµÄ¹¦·òÁìÓòÒòÿ¸öµêÆÌµÄµØÎ»¶øÒ죬µ«×ÜÌåµÄ¹¦·òÁìÓòÊÇ´Ó2018Äê10ÔÂ1ÈÕµ½2019Äê5ÔÂ29ÈÕ¡£Rutter°µÊ¾ÒÑ´ÓÆäÖ§¸¶ÏµÍ³ÖÐɾ³ýÁ˸öñÒâÈí¼þ£¬²¢½«´ËÊ»㱨¸øÁË·¨Âɲ¿ÃźÍÔÚ֪ͨÊÜÓ°ÏìµÄ¿Í»§¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-store-chain-rutter-s-hit-by-credit-card-stealing-malware/