¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181226

Ðû²¼Ê±¼ä 2018-12-26
1¡¢Ê¹ÓÃÖÇÄܵÆÍæÌ°³ÔÉߣ¬Ñо¿Ö°Ô±·¢Ã÷Twinkly LEDµÆ±£´æÈÏÖ¤Îó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


MWR InfoSecurityµÄÑо¿Ö°Ô±·¢Ã÷Twinkly LEDÖÇÄܵƱ£´æÇå¾²Îó²î£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÔ¶³Ì¿ØÖÆÕâЩµÆ¡£TwinklyµÆ¿ÉÒÔͨ¹ýÒÆ¶¯appÀ´ÖÎÀí£¬µ«¸ÃappÓëµÆÖ®¼äûÓнÓÄɼÓÃÜͨѶ£¬ÆäÉí·ÝÑéÖ¤Àú³Ì±£´æÎó²î£¬Ñо¿Ö°Ô±¿ÉÒÔʹÓù̼þÖеÄÓ²±àÂëÆ¾Ö¤Í¨¹ýMQTTЭÒéÔ¶³Ì¿ØÖƵÆ£¬ÉõÖÁ¿ÉÒÔʹÓõƹâµÄת±äÀ´ÍæÌ°³ÔÉß¡£Ñо¿Ö°Ô±Ô¤¼Æ»¥ÁªÍøÉÏÔ¼ÓÐ2Íǫ̀װ±¸Ò×Êܹ¥»÷£¬µ«ÕâÖÖ¹¥»÷µÄΣº¦ÐÔ²»´ó£¬¸ü¶àµØÀàËÆÓÚ¿ªÍçЦ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hacking-christmas-lights-for-fun-and-mischief/


2¡¢IBM Trusteer Rapport for MacOS±£´æÄں˼¶Îó²î£¬ÉÐÎÞÐÞ¸´²¹¶¡

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!



Trustwave SpiderLabsµÄÑо¿Ö°Ô±·¢Ã÷IBM Trusteer RapportÖÕ¶ËÇå¾²¹¤¾ßµÄÇý¶¯³ÌÐò±£´æÒ»¸öÄں˼¶Îó²î£¬ÓÉÓÚIBMδÄÜÔÚ120ÌìÄÚÐû²¼ÐÞ¸´²¹¶¡£¬Ñо¿Ö°Ô±Ïò¹«ÖÚÅû¶ÁËÕâ¸öÎó²î¡£Trusteer Rapport for MacOSÓÃÓÚÔÚÓû§ÅþÁ¬µ½¶ñÒâÍøÕ¾Ê±Ëø¶¨ä¯ÀÀÆ÷£¬±£»¤Óû§µÄÃô¸ÐÐÅÏ¢¡£Ñо¿Ö°Ô±·¢Ã÷ÆäÇý¶¯³ÌÐòÔÚ´¦Öóͷ£Óû§»º³åÇøÊ±±£´æ·ûºÅ¹ýʧ£¬¸Ã¹ýʧ¿Éµ¼ÖÂMacOSÄÚºËÖеÄÄÚ´æË𻵣¬²¢×îÖÕµ¼ÖÂÄں˼¶í§Òâ´úÂëÖ´ÐС£¸ÃÎó²îÖ»ÄÜͨ¹ýÍâµØ¹¥»÷À´Ê¹Óã¬ÕâÉÔ΢¼õÇáÁËÆäΣº¦¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/79141/hacking/kernel-buffer-overflow-trusteer-rapport.html


3¡¢ÒøÐÐľÂíDanaBot£¬Ö÷ÒªÕë¶ÔÅ·ÖÞÒøÐк͵ç×ÓÓʼþ·þÎñÉÌ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


F5 Networks·¢Ã÷ÒøÐÐľÂíDanaBotÔÚ2018Äê11ÔÂ7ÈÕÖÁ12ÔÂ4ÈÕʱ´úÊ®·Ö»îÔ¾£¬ÆäÄ¿µÄº­¸ÇÁ˶à¸ö¹ú¼ÒµÄ¶à¸öÐÐÒµ£¬°üÀ¨ÒøÐС¢µç×ÓÓʼþ·þÎñÉ̺ͱÈÌØ±ÒÉúÒâËù¡£DanaBot 88%µÄÄ¿µÄÊÇÒøÐÐÓû§£¬Ö÷ÒªÕë¶ÔÒâ´óÀû£¬Æä´ÎΪ²¨À¼ºÍµÂ¹ú¡£11%µÄÄ¿µÄΪµç×ÓÓʼþ·þÎñÉÌ£¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡£11ÔÂ21ÈÕΪDanaBot¶ñÒâÔ˶¯µÄ×îá¯Áë¡£


Ô­ÎÄÁ´½Ó£º

https://www.f5.com/labs/articles/threat-intelligence/danabot-november-campaigns-target-european-banks


4¡¢Õë¶ÔÈÕ±¾¹«ÃñµÄº£Ð¥Ô¤¾¯À¬»øÓʼþ£¬Ö÷Òª·Ö·¢Smoke LoaderºÍAZORult

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


2018Äê11ÔÂFortiGuard Labs·¢Ã÷Ò»¸öÕë¶ÔÈÕ±¾¹«ÃñµÄº£Ð¥Ô¤¾¯À¬»øÓʼþÔ˶¯£¬¸ÃÀ¬»øÓʼþ°üÀ¨Ò»¸öÖ¸ÏòÈÕ±¾ÆøÏóÌü£¨JMA£©µÄ¶ñÒâÁ´½Ó£¬ÓÃÓÚ·Ö·¢Smoke LoaderľÂíºÍAZORultľÂí¡£ÏÖÔÚÕâ¸öÐéαµÄJMAÍøÕ¾ÈÔÈ»Ôڳ䵱AZORultµÄC&C·þÎñÆ÷£¬²¢½«Óû§Öض¨Ïòµ½Õýµ±µÄJMAÍøÕ¾¡£À¬»øÓʼþÖеÄÄÚÈÝûÓÐʹÓÃÔ­ÉúÈÕÓ²¢ÇÒ±£´æÓï·¨¹ýʧ£¬Òò´ËËüÃÇ¿ÉÄÜÊÇÓÉÍâ¹úÈ˱àдµÄ»òÊÇ»úе·­ÒëµÄ¡£11ÔÂ25ÈÕÖ®ºó£¬´Ó¶ñÒâÁ´½ÓÏÂÔØµÄ¶ñÒâÈí¼þ´ÓSmoke Loader¸ü¸ÄΪAZORult£¬ËüÃǵÄC&CÓòÃû¶¼ÊÇjma-go[.]jp¡£


Ô­ÎÄÁ´½Ó£º

https://www.fortinet.com/blog/threat-research/fake-tsunami-brings-malware-to-japan.html


5¡¢×î³õ±¬·¢18¸öÔºó£¬ÈÔÓÐÊýÊ®Íǫ̀ÅÌËã»úѬȾWannaCry

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ƾ֤Kryptos LogicµÄÍþвÇ鱨Ö÷¹ÜJamie HankinsµÄÑо¿£¬ÔÚWannaCry×î³õ±¬·¢µÄ18¸öÔºó£¬ÈÔÓÐÊýÊ®Íǫ̀ÅÌËã»úѬȾÁ˸ÃÀÕË÷Èí¼þ¡£¸ÃÀÕË÷Èí¼þµÄkill switchÓòÃûÏÖÔÚÍйÜÔÚCloudflareÉÏ£¬Æ¾Ö¤HankinsµÄÊý¾Ý£¬WannaCryµÄkill switchÓòÃûÔÚÒ»ÖÜÄÚÎüÊÕµ½Áè¼Ý1700Íò¸öÅþÁ¬£¬ÕâЩÅþÁ¬À´×ÔÁè¼Ý63Íò¸ö²î±ðµÄIPµØµã£¬º­¸Ç194¸ö²î±ðµÄ¹ú¼Ò/µØÇø¡£ÈÔÈ»Êܵ½WannaCryѬȾµÄ¹ú¼ÒÅÅÃûÖÐÖйú¡¢Ó¡¶ÈÄáÎ÷ÑǺÍÔ½ÄÏÅÅÁÐǰÈý¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/18-months-later-wannacry-still-lurks-on-infected-computers/


6¡¢IBM X-ForceÐû²¼2019ÄêÍøÂç·¸·¨ÍþвԶ¾°µÄÕ¹Íû±¨¸æ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


IBM X-ForceÐû²¼¹ØÓÚ2019ÄêÍøÂç·¸·¨ÍþвÃûÌõÄÕ¹Íû±¨¸æ£¬±¨¸æ³Æ2019ÄêÆóÒµ½«ïÔ̭ʹÓÃÉç±£ºÅÂë×÷ΪÉí·ÝÑéÖ¤±êʶ£»GDPR½«¶ÔÍþвÇ鱨¡¢ÍøÂçÇå¾²´øÀ´¸üÆÕ±éµÄÓ°Ï죻¹¥»÷Õß½«¸ü¶àµØÊ¹ÓÃÃæÏò¹«ÖÚµÄ×ÔÖú·þÎñÏµÍ³ÍøÂçÓмÛÖµµÄÓû§Êý¾Ý£»ÍøÂçÇå¾²°ü¹Ü·þÎñÉ̽«¸ü¶àµØÓëÇå¾²¹©Ó¦É̾ÙÐÐÏàÖú£»·¸·¨·Ö×Ó½«¸ü¶àµØÕë¶ÔÂÃÓΡ¢ÂùÝÒµµÄÊý¾Ý£»Ò»Ð©¹ÉƱÂô¿Õ¿ÉÄÜÓëÍøÂç¹¥»÷ÓйØ£¬2019Ä꽫»áÅû¶һЩÊÂÎñ»òÔ˶¯£»¶ñÒâÍÚ¿ó¹¥»÷½«¸ü¶àµØÊ¹ÓÃPowerShellÒÔÎÞÎļþµÄÐÎʽ¾ÙÐС£


 Ô­ÎÄÁ´½Ó£º

https://securityintelligence.com/ibm-x-force-security-predictions-for-the-2019-cybercrime-threat-landscape/


ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿­Ê±Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí