¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180912

Ðû²¼Ê±¼ä 2018-09-12
1¡¢Ñо¿»ú¹¹½«Ó¢¹úº½¿Õ¹«Ë¾µÄÊý¾Ýй¶ÊÂÎñ¹éÒòÓÚ·¸·¨¼¯ÍÅMagecart

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

ƾ֤RiskIQµÄÑо¿ £¬Ó¢¹úº½¿Õ¹«Ë¾Êý¾Ýй¶ÊÂÎñµÄ±³ºóÊÇ·¸·¨¼¯ÍÅMageCart¡£MageCart×Ô2015ÄêÒÔÀ´Ò»Ö±»îÔ¾ £¬Ö÷ÒªÕë¶Ôµç×ÓÉÌÎñÍøÕ¾ £¬ÇÔÈ¡Óû§µÄÒøÐп¨ÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£Æ¾Ö¤RiskIQµÄ˵·¨ £¬MageCart¶ÔÓ¢¹úº½¿Õ¹«Ë¾¾ÙÐÐÁËÕë¶ÔÐÔ¹¥»÷ £¬²¢Ê¹ÓÃÁ˶¨ÖƵľ籾ºÍרÓõĻù´¡ÉèÊ©¡£ÏÖÔÚ»¹²»ÇåÎúMageCartÔõÑùÔÚÓ¢¹úº½¿Õ¹«Ë¾µÄÍøÕ¾ÉÏ×¢Èë¶ñÒâ´úÂë¡£


 Ô­ÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/labs/magecart-british-airways-breach/

2¡¢Ñо¿Ö°Ô±·¢Ã÷Ð®ÖÆÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿óÔ˶¯

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Çå¾²Ñо¿Ö°Ô±Troy Mursch·¢Ã÷Ò»¸öʹÓÃÎó²î£¨CVE-2018-14847£©Ð®ÖÆMikroTik·ÓÉÆ÷¾ÙÐÐÍÚ¿óµÄ¹¥»÷Ô˶¯¡£ËäÈ»¸Ã·ÓÉÆ÷µÄ³§ÉÌÒÑÔÚ4Ô·ÝÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡ £¬µ«ÈÔÓв¿·ÖÓû§Ã»ÓоÙÐÐÉý¼¶¡£Æ¾Ö¤Mursch±¨¸æµÄÍÚ¿ó¾ç±¾ £¬ÔÚShodanÉÏ¿ÉËÑË÷µ½3734¸öMikroTik×°±¸¡£´ó´ó¶¼ÊÜѬȾµÄ×°±¸¶¼¼¯ÖÐÔÚÄÏÃÀÖÞ £¬Ö÷ÒªÊǰÍÎ÷£¨2612£©ºÍ°¢¸ùÍ¢£¨480£©¡£¸ÃÍÚ¿ó¾ç±¾½«MikroTik·ÓÉÆ÷µÄCPUʹÓÃÂÊÔöÌíµ½80%²¢Ò»Á¬¾ÙÐÐÍÚ¿ó¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/over-3-700-mikrotik-routers-abused-in-cryptojacking-campaigns/

3¡¢Ñо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíKRONOSµÄбäÌåOsiris

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

2018Äê7ÔÂSecuronixÑо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíKRONOSµÄбäÌåOsiris¡£Osiris¹²ÌᳫÁËÈý¸ö»®·ÖÕë¶ÔµÂ¹ú¡¢ÈÕ±¾ºÍ²¨À¼µÄ¹¥»÷Ô˶¯ £¬ÆäÖ÷Òª·Ö·¢·½·¨ÊÇ´¹ÂÚÓʼþ £¬ÔÚÐí¶àÇéÐÎÏÂҲͨ¹ýRIG EKµÈÎó²îʹÓù¤¾ß°ü¾ÙÐзַ¢¡£´¹ÂÚÓʼþÖеĸ½¼þʹÓÃÁËÒÑÖªµÄOffice¹«Ê½±à¼­Æ÷Îó²î£¨CVE-2017-11882£©¡£ÐµÄOsiris¶ñÒâÈí¼þÆÕ±éʹÓÃTORÍøÂç¾ÙÐÐÏÂÁîºÍ¿ØÖÆ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securonix.com/securonix-threat-research-kronos-osiris-banking-trojan-attack

4¡¢IBMÐû²¼¹ØÓÚAndroidÒøÐÐľÂíExoBotµÄÔ´ÂëÆÊÎö±¨¸æ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

ÓÉÓÚAndroidÒøÐÐľÂíExoBotµÄÔ´´úÂëÔÚ×î½üй¶ £¬IBM X-ForceÑо¿ÍŶÓÉîÈëÑо¿Á˸öñÒâÈí¼þµÄÄÚ²¿ÊÂÇé¡£ExoBotÖ÷Ҫͨ¹ýÀ¬»ø¶ÌÐÅÒÔ¼°¹Ù·½Ó¦ÓÃÊÐËÁµÄapp¾ÙÐÐÈö²¥ £¬Ê×´ÎÔÚ×°±¸ÉÏÔËÐÐʱ»áɾ³ýͼ±ê¡¢×îС»¯ËùÓÐÕýÔÚÔËÐеÄÓ¦Óò¢ÏÔʾÖ÷ÆÁÄ» £¬ÒÔ±ãÓû§²»»á·¢Ã÷ÈκÎÒì³£¡£ÎªÁËÌÓ±ÜɳÏäºÍ¼ì²â £¬ExoBotÔÚÔËÐÐǰ»á¾ÙÐз´É³Ïä¼ì²é¡¢·´ÆÊÎöÆ÷¼ì²éÒÔ¼°¹ú¼Ò/µØÇø/ÓïÑÔ¹ýÂË¡£ExoBotµÄ»ìÏýÊÖÒÕ°üÀ¨×Ö·û´®±£»¤ºÍ¶ÔC2ͨѶ¾ÙÐÐAES¼ÓÃÜ¡£


Ô­ÎÄÁ´½Ó£ºhttps://securityintelligence.com/ibm-x-force-delves-into-exobots-leaked-source-code/


5¡¢Î¢ÈíÐû²¼9ÔÂÇå¾²¸üР£¬ÐÞ¸´°üÀ¨17¸ö¸ßΣÎó²îÔÚÄÚµÄ61¸öÎó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

΢Èí±¾ÔÂÐÞ¸´µÄÎó²îÖÐÓÐËĸö±»±ê¼ÇΪ¿ÉÄÜÔÚÒ°ÍⱻʹÓà £¬°üÀ¨Ó°ÏìÁËËùÓÐWindows°æ±¾µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-8475£©¡¢Windows ALPCÌáȨÎó²î£¨CVE-2018-8440£©¡¢¾ç±¾ÒýÇæÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-8457£©ÒÔ¼°¾Ü¾ø·þÎñÎó²î£¨CVE-2018-8409£©¡£ÁíÍâÁ½¸öÖµµÃ×¢ÖØµÄÎó²îÊÇWindowsÌáȨÎó²î£¨CVE-2018-0868ºÍCVE-2018-8339£© £¬¿ÉÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃWindowsÍýÏëʹÃüAPIÖ´ÐÐí§Òâ´úÂë¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/microsoft-software-updates.html


6¡¢Ç÷ÊÆ¿Æ¼¼ÈÏ¿ÉÆä¶à¿îMacÓ¦ÓÃÎ¥¹æÍøÂçÓû§µÄÊý¾Ý

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

Ñо¿Ö°Ô±·¢Ã÷Ç÷ÊÆ¿Æ¼¼µÄ¶à¿îMacÓ¦ÓÃÍøÂçÓû§µÄä¯ÀÀÆ÷ÀúÊ·¼Í¼ºÍϵͳÐÅÏ¢ £¬ÏÖÔÚÕâЩӦÓÃÒÑÔÚMac App StoreÖÐϼÜ¡£ÕâЩӦÓðüÀ¨Dr. Antivirus¡¢Dr. CleanerºÍDr. UnarchiverµÈ £¬ËùÓÐÓ¦ÓÃµÄÆÀ¼ÛÊý¶¼´ïÊýǧÌõ¡£Ñо¿Ö°Ô±³ÆÕâЩӦÓÃÍøÂçµ½µÄÐÅÏ¢×îÖÕ¶¼·¢Ë͵½trendmicro.com¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/trend-micro-apps-leak-user-data-removed-from-mac-app-store/



ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿­Ê±Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí