¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181213
Ðû²¼Ê±¼ä 2018-12-13
McAfeeÑо¿Ö°Ô±·¢Ã÷жñÒâÔ˶¯¡°ÉñǹÊÖÐж¯¡±£¬¸ÃÔ˶¯Õë¶ÔÈ«ÇòµÄ¹ú·ÀºÍÒªº¦»ù´¡ÉèÊ©£¬°üÀ¨ºËÄÜ¡¢¹ú·À¡¢ÄÜÔ´ºÍ½ðÈÚÆóÒµ¡£×Ô2018Äê10ÔÂ25ÈÕÒÔÀ´£¬Ôڶ̶ÌÁ½¸öÔÂÄÚÉñǹÊÖÐж¯ÒÑÓ°ÏìÁËÈ«Çò87¸öÆóÒµ¡£¹¥»÷Õßαװ³ÉÕÐÆ¸Ô˶¯£¬Í¨¹ýDropbox·Ö·¢°üÀ¨¶ñÒâºêµÄWordÎĵµ£¬²¢×îÖÕ½»¸¶Rising SunºóÃÅ¡£¸ÃºóÃÅÓëAPT×éÖ¯LazarusÔÚ2015ÄêʹÓõĶñÒâÈí¼þDuuzer¾ßÓÐÏàͬµÄ´úÂë¡£Ö»¹ÜÐí¶àÏßË÷¶¼Ö¸ÏòÁËLazarus£¬µ«Ñо¿Ö°Ô±ÒÔΪÕâЩ¹ýÓÚÏÔ×ŵÄÖ¤¾Ý¿ÉÄÜÖ»Êǹ¥»÷Õß¾ÓÐÄÉèÖõÄfalse flag¡£
ÔÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/operation-sharpshooter-targets-global-defense-critical-infrastructure/2¡¢ÐÂÎó²îʹÓù¤¾ß°üNovidade£¬Ö÷ÒªÕë¶ÔSOHOºÍ¼ÒÓ÷ÓÉ
Ç÷ÊÆ¿Æ¼¼·¢Ã÷¼ÒÍ¥ºÍСÐͰ칫·ÓÉÆ÷£¨SOHO£©ÕýÔÚ³ÉΪ¹¥»÷ÕßµÄÄ¿µÄ¡£Ñо¿ÍŶӷ¢Ã÷Ò»¸öÃûΪNovidadeµÄÐÂÎó²îʹÓù¤¾ß°üÕýÔÚ°ÍÎ÷Ìᳫ´ó¹æÄ£¹¥»÷Ô˶¯¡£NovidadeÖ÷Ҫͨ¹ýCSRFÎó²îÀ´¸ü¸Ä·ÓÉÆ÷ÉϵÄDNSÉèÖ㬽«Óû§µÄÉÏÍøÁ÷Á¿Ð®ÖƵ½¹¥»÷ÕߵķþÎñÆ÷¡£NovidadeµÄ¹¥»÷Ô˶¯¿ÉÄÜ×îÏÈÓÚ2017Äê8Ô£¬×Ô2018Äê3ÔÂÒÔÀ´Ñо¿ÍŶӹ²¼à²âµ½ÁË2400Íò´Î¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/new-exploit-kit-novidade-found-targeting-home-and-soho-routers/3¡¢CobaltÍÆ³öˢеÄThreadKit£¬ÈÔÔÚÆð¾¢¾ÙÐжñÒâÔ˶¯
Ö»¹ÜÔÚ½ñÄêÔçЩʱ¼ä·¸·¨ÍÅ»ïCobalt GroupµÄÍ·Ä¿±»¾Ð²¶£¬µ«CobaltÈÔÔÚÆð¾¢¾ÙÐжñÒâÔ˶¯¡£Æ¾Ö¤Çå¾²³§ÉÌFidelisÖܶþÐû²¼µÄÑо¿±¨¸æ£¬2018Äê10ÔÂ×îÏÈCobaltÕýÔÚÆð¾¢·Ö·¢Ð°汾µÄ¶ñÒâÈí¼þThreadKit¡£ThreadKitÈÔͨ¹ý´¹ÂÚÓʼþÈö²¥£¬ÓʼþÖаüÀ¨¶ñÒâµÄRFT¸½¼þ¡£ThreadKit½ÓÄÉÁËһЩеĻìÏýÊÖÒÕ£¬ÆäpayloadÊÇCoblntľÂí¡£¸Ã°æ±¾µÄCoblntľÂíʹÓÃÁËXOR»ìÏýÊÖÒÕ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cobalt-bank-robbers-use-new-threadkit-malicious-doc-builder/4¡¢AdobeÐû²¼12ÔÂÇå¾²¸üУ¬Ò»´ÎÐÔÐÞ¸´87¸öÎó²î
AdobeÔÚ2018Äêµ×Ðû²¼ÁË12ÔÂÇå¾²¸üУ¬ÐÞ¸´ÁËMacOSºÍWindowsƽ̨ÉϵÄAcrobat ReaderÖеÄ87¸öÎó²î¡£ÆäÖÐ39¸öÎó²îµÄΣÏÕˮƽΪcritical£¬48¸öÎó²îΪimportant¡£criticalµÄÎó²î°üÀ¨3¸ö¶ÑÒç³ö¡¢5¸öÔ½½çд¡¢2¸ö²»ÊÜÐÅÍеÄÖ¸Õë½âÒýÓá¢2¸ö»º³åÇø¹ýʧÒÔ¼°24¸öuse-after-freeÎó²î£¬ÕâЩÎó²î¶¼¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐС£importantµÄÎó²î°üÀ¨43¸öÔ½½ç¶Á¡¢4¸öÕûÊýÒç³öºÍ2¸öÇå¾²ÈÆ¹ýÎó²î£¬ÕâЩÎó²î¶¼¿Éµ¼ÖÂÐÅϢй¶¡£¸Ã¹«Ë¾Ã»ÓÐÅû¶ÈκÎÎó²îµÄÊÖÒÕϸ½Ú£¬µ«½«ËùÓеÄÎó²î¶¼¹éÀàΪÓÅÏȼ¶2¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/adobe-acrobat-update.html5¡¢Î¢ÈíÐû²¼39¸öÎó²îµÄÐÞ¸´²¹¶¡£¬ÆäÖаüÀ¨Ò»¸öWindows 0day
΢ÈíÔÚ12ÔµÄÇå¾²¸üÐÂÖÐÐÞ¸´ÁË39¸öÎó²î£¬ÆäÖÐ10¸öÎó²îµÄÑÏÖØÐÔΪcritical£¬ÆäÓàµÄΪimportant¡£ÆäÖÐWindows 0day£¨CVE-2018-8611£©Òѱ»·¢Ã÷ÔÚÒ°ÍâʹÓã¬Æ¾Ö¤¿¨°Í˹»ùµÄ±¨¸æ£¬¸Ã0dayÊÇWindowsÄںˣ¨ntoskrnl.exe£©ÖеÄÌáȨÎó²î£¨EoP£©£¬¿ÉÔÊÐí¶ñÒâ³ÌÐòÔÚÄ¿µÄϵͳÉÏÒÔ¸ü¸ßȨÏÞÖ´ÐÐí§Òâ´úÂë¡£APT×éÖ¯FruityArmorºÍSandCatÒÑÔÚÒ°ÍâÆð¾¢Ê¹ÓøÃÎó²î¡£ÁíÒ»¸öÖ÷ÒªµÄÎó²î£¨CVE-2018-8517£©ÊÇ.NET Framework¹¹½¨µÄWebÓ¦ÓóÌÐòÖеÄDoSÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/microsoft-patch-updates.html6¡¢Web·þÎñÆ÷ÉèÖò»µ±£¬µ¼ÖÂ1.2ÒÚ°ÍÎ÷¹«ÃñСÎÒ˽¼ÒÐÅϢй¶
InfoArmorÔÚ2018Äê3Ô·¢Ã÷Ò»¸öÉèÖò»µ±µÄApache Web·þÎñÆ÷£¬¸Ã·þÎñÆ÷ÉÏ´æ´¢µÄÊý¾Ý´æµµÌ»Â¶ÁË1.2ÒÚ°ÍÎ÷¹«ÃñµÄСÎÒ˽¼Ò˰Îñ¹ÒºÅºÅ£¨CPF£©¡£Æ¾Ö¤InfoArmorµÄÐÎò£¬¸Ã·þÎñÆ÷ÉϵÄ27MBµ½82GBÖ®¼äµÄ¶à¸öÎļþ¿É¹ûÕæ»á¼û£¬ÆäÖÐÒ»¸öÊý¾Ý¿âÎļþ°üÀ¨ÁËCPF¡¢ÐÕÃû¡¢µç×ÓÓʼþ¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢¾ÍÒµ¡¢Ð¡ÎÒ˽¼Ò´û¿î¡¢ÐÅÓÃÀúÊ·µÈÐÅÏ¢¡£¸ÃĿ¼ºÜ¿ÉÄÜÓÃÓÚ´æ´¢Êý¾Ý¿âµÄ±¸·Ý£¬µ«ÆäËùÓÐÕßûÓÐÒâʶµ½Æä¿É¹ûÕæ»á¼û¡£InfoArmor²»¿ÉÈ·¶¨Ãü¾Ý¿âµÄËùÓÐÕߣ¬µ«ËûÃÇ֪ͨÁËÍйܷþÎñÉÌ£¬¸Ã·þÎñÆ÷ÓÚ3ÔÂβ»ñµÃ±£»¤¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/taxpayer-id-numbers-for-120-million-brazilians-exposed-online/ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿Ê±Î¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ