¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181221
Ðû²¼Ê±¼ä 2018-12-21
Ñо¿Ö°Ô±SandboxEscaperµÚÈý´ÎÔÚTwitterÉÏÅû¶δÐÞ¸´µÄWindows 0day£¬²¢ÇÒÐû²¼ÁËÏà¹ØPoC¡£Õâ¸öеÄÎó²î±£´æÓÚWindowsµÄMsiAdvertiseProduct¹¦Ð§ÖУ¬Æ¾Ö¤¸ÃÑо¿Ö°Ô±µÄ˵·¨£¬ÓÉÓÚûÓÐ׼ȷÑéÖ¤£¬¹¥»÷Õß¿ÉʹÓøù¦Ð§Ç¿ÆÈ×°Ö÷þÎñÒÔSYSTEMȨÏÞ¸´ÖÆí§ÒâÎļþ²¢¶ÁÈ¡ÆäÄÚÈÝ£¬´Ó¶øµ¼ÖÂí§ÒâÎļþ¶ÁÈ¡Îó²î¡£SandboxEscaper»¹ÔÚGithubÉÏÐû²¼Á˸ÃÎó²îµÄPoC£¬µ«¸ÃGithubÕË»§ÏÖÔÚÒѱ»É¾³ý¡£SandboxEscaperÔøÔÚ2018Äê8Ô·ݺÍ10Ô·ݻ®·ÖÔÚTwitterÉÏÅû¶ÁËÁ½¸öWindows 0day¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/windows-zero-day-exploit.html2¡¢McAfee³Æ×î½üµÄShamoon¹¥»÷Ô˶¯ÒÉÓëÒÁÀÊAPT33ÓйØ
ƾ֤McAfeeʵÑéÊÒ¶Ô×î½üµÄShamoon¹¥»÷Ô˶¯µÄÆÊÎö£¬Ñо¿Ö°Ô±ÒÔΪÆä¹¤¾ß¡¢ÊÖÒպͳÌÐò£¨TTP£©Óë2016ÖÁ2017ÄêµÄShamoon v2¼á³ÖÒ»Ö£¬2018ÄêµÄShamoon¹¥»÷Ô˶¯¿ÉÄÜÓëÒÁÀʺڿÍ×éÖ¯APT33Óйأ¬µ«Ò²ÓпÉÄÜÊÇÆäËü¹¥»÷Õßαװ³ÉAPT33¡£ÔÚÒÑÍùµÄ¼¸ÖÜÀShamoon v3ͨ¹ýÇóÖ°Àà´¹ÂÚÍøÕ¾¹¥»÷ʯÓÍ¡¢×ÔÈ»Æø¡¢ÄÜÔ´¡¢µçÐÅÆóÒµºÍÕþ¸®»ú¹¹£¬ÕâЩÓÃÓÚÍøÂçÊܺ¦Õ߯¾Ö¤µÄÆðÔ´´¹ÂÚ¹¥»÷ËÆºõÔçÔÚ2018Äê8ÔÂβ¾ÍÒÑ×îÏÈ¡£ÔÚеÄ.Net°æ±¾µÄÊý¾Ý²Á³ýÆ÷ÖУ¬Ñо¿Ö°Ô±·¢Ã÷Á˰üÀ¨Ò»¶Î¹ÅÀ¼¾ÎĵÄASCII×Ö·û£¨Surah Masad, Ayat 1£¬´óÒâÎªÕæÖ÷±Ø½«´¦·Ö£©¡£
ÔÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/shamoon-attackers-employ-new-tool-kit-to-wipe-infected-systems/3¡¢15¸öAndroid±ÚÖ½Ó¦Óñ£´æ¹ã¸æÚ²ÆÐÐΪ£¬×ÜÏÂÔØÁ¿Áè¼Ý22Íò´Î
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±ÔÚGoogle PlayÖмì²âµ½15¸öÉæ¼°¹ã¸æÚ²ÆÔ˶¯µÄAndroid±ÚÖ½Ó¦Óã¬ÕâЩӦÓõÄ×ÜÌåÏÂÔØÁ¿Áè¼Ý22.22Íò´Î¡£Ò£²âÊý¾ÝÅú×¢Êܵ½Ñ¬È¾×î¶àµÄ¹ú¼Ò/µØÇøÊÇÒâ´óÀû¡¢Öйų́Íå¡¢ÃÀ¹ú¡¢µÂ¹úºÍÓ¡¶ÈÄáÎ÷ÑÇ¡£GoogleÏÖÔÚÒÑ´ÓPlay StoreÖÐɾ³ýÁËÕâЩ¶ñÒâÓ¦Óá£ÕâЩӦÓÃ×Ô¼ºÒ²¾ßÓкܸߵÄÓû§ºÃÆÀ£¬µ«Ñо¿Ö°Ô±¸ß¶ÈÏÓÒÉÕâЩ̸ÂÛÊǼٵģ¬Ö»ÊÇΪÁËÎüÒýÓû§ÏÂÔØ¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/android-wallpaper-apps-found-running-ad-fraud-scheme/4¡¢MiraiбäÖÖMioriͨ¹ýPHP¿ò¼ÜÖеÄRCEÎó²îÈö²¥
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷IoT½©Ê¬ÍøÂçMiraiµÄÒ»¸ö±äÖÖMioriͨ¹ýPHP¿ò¼ÜThinkPHPÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îÈö²¥¡£¸ÃÎó²îÊÇ12ÔÂ11ÈÕÆØ¹âµÄÒ»¸öÐÂÎó²î£¬Ó°ÏìÁËThinkPHP v5.0.23/5.1.31¼°Ö®Ç°µÄ°æ±¾¡£Ò»µ©Óû§µÄLinux·þÎñÆ÷ѬȾÁËMiori£¬Ëü½«»á³ÉΪ½©Ê¬ÍøÂçµÄÒ»²¿·Ö£¬ÓÃÓÚÌᳫDDoS¹¥»÷¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÁíÍâµÄÁ½¸öÒÑÖªµÄMirai±äÖÖIZ1H9ºÍAPEPͬÑùʹÓøÃÎó²î¾ÙÐÐÈö²¥¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/with-mirai-comes-miori-iot-botnet-delivered-via-thinkphp-remote-code-execution-exploit/5¡¢ÃÀ¹úºÍÓ¢¹úÔâÓöÐÂÒ»ÂÖ¶ñÒâÓʼþ¹¥»÷£¬Ö÷ÒªÕë¶Ô½ðÈÚ¹«Ë¾
Menlo Labs·¢Ã÷Õë¶ÔÒøÐкͽðÈÚ·þÎñ¹«Ë¾µÄ¶ñÒâµç×ÓÓʼþÔ˶¯£¬¸ÃÔ˶¯×Ô2018Äê8ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬Ö÷ÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¡£¸ÃÔ˶¯ÖеĶñÒâpayloadÍйÜÔÚGoogleÔÆ·þÎñ£¨storage.googleapis.com£©ÉÏ£¬ÒÔÈÆ¹ýÇå¾²²úÆ·µÄÇå¾²¿ØÖÆ¡£µÚÒ»½×¶ÎµÄdropper°üÀ¨vbsÎļþºÍjarÎļþ£¬ÕâЩvbsÎļþ¾ÙÐÐÁ˸߶ȻìÏý£¬²¢ÇÒ¿ÉÄÜÊÇÓÉÏàͬµÄ¹¤¾ß°ü½¨ÉèµÄ¡£
ÔÎÄÁ´½Ó£º
https://www.menlosecurity.com/blog/a-jar-full-of-problems-for-financial-services-companies6¡¢Î¢ÈíÐû²¼½ôÆÈÇå¾²¸üУ¬ÐÞ¸´Ò»¸öÐÂIE 0day
΢ÈíÐû²¼½ôÆÈ´øÍâ¸üУ¬ÐÞ¸´IEä¯ÀÀÆ÷ÖеÄÒ»¸ö¸ßΣ0day¡£¸ÃÎó²î£¨CVE-2018-8653£©ÊÇÓɹȸèÍþвÆÊÎöС×éµÄÇå¾²Ñо¿Ô±Clement Lecigne·¢Ã÷µÄ£¬ÊÇIE JScript¾ç±¾ÒýÇæÖеÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¬ÀÖ³ÉʹÓôËÎó²îµÄ¹¥»÷Õß¿ÉÒÔÔÚÄ¿½ñÓû§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¸ÃÎó²îÓ°ÏìÁËWindows Server 2008ÖеÄIE9£¬Windows Server 2012ÖеÄIE10ÒÔ¼°¶à¸öWindows°æ±¾ÖеÄIE 11¡£ÓÉÓÚ´ËÎó²îÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Ó㬽¨ÒéÓû§¾¡¿ì×°ÖøüС£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/internet-explorer-zero-day.htmlÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿Ê±Î¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ