BitrueÔâºÚ¿Í¹¥»÷;Kubernetes CLI¹¤¾ßí§ÒâÎļþÁýÕÖÎó²î;Õë¶ÔÖж«µØÇøµÄViceLeaker¹¥»÷Ô˶¯
Ðû²¼Ê±¼ä 2019-06-28
ÐÂ¼ÓÆÈÎÃüÜÇ®±ÒÉúÒâËùBitrueÔâºÚ¿Í¹¥»÷£¬930Íò¸öRipple£¨XRP£©±Ò£¨¼ÛÖµ425ÍòÃÀÔª£©ºÍ250Íò¸öCardano£¨ADA£©±Ò£¨¼ÛÖµ22.5ÍòÃÀÔª£©±»ÇÔ¡£BitrueÌåÏÖ£¬ÔÚ·¢Ã÷ºÚ¿Í¹¥»÷ºóÒÑÔÝÍ£ÁË·þÎñ£¬²¢Ïò»ð±Ò¡¢Bittrex¡¢ChangeNOWµÈ×ʽðÎüÊÕ·½×ª´ïÁËÇéÐΡ£ÇéÐÎÒÑ»ñµÃ¿ØÖÆ£¬×ʽðËðʧ½«100%·µ»¹Óû§£¬BitrueÕýÔÚÖØÐÂÉóºËÆäÇå¾²²½·¥ºÍÕþ²ß£¬ÒÔÈ·±£´ËÀàÊÂÎñ²»ÔÙ±¬·¢¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hacker-steals-4-5-million-from-bitrue-cryptocurrency-exchange/2.µÂ¹ú¾¯·½Í»Ï®OmniRAT¿ª·¢ÕßסËù£¬²é»ñ´ó×ÚÖ¤¾Ý
6ÔÂ26Èյ¹ú¾¯·½Í»Ï®OmniRAT¿ª·¢ÕßµÄסËù£¬²é»ñÁËËûµÄÌõ¼Ç±¾µçÄÔ¡¢µçÄÔºÍÊÖ»úµÈÊý×Ö×ʲú¡£Õâ¿ÉÄÜÓë×î½üµÄÍøÂç¹¥»÷Ô˶¯µÄÊÓ²ìÓйء£ÔÚ½ñÄêÔçЩʱ¼äµÄÒ»´Î¹¥»÷ÊÂÎñÖУ¬ºÚ¿ÍÊÔͼʹÓÃMicrosoft ExcelÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2016-7262£©ÔÚÄ¿µÄÅÌËã»úÉÏ×°ÖÃOmniRAT¡£¹¥»÷Õß½«ExcelÎļþαװ³É¿ÆÍþÌØÊ¯Ó͹«Ë¾µÄÉÌÎñÎļþ£¬ÓÕÆÊܺ¦Õß·¿ªÎļþ¡£ÏÖÔÚÉв»ÇåÎúµÂ¹ú¾¯·½µÄÐж¯ÊÇ·ñÓë´ËÓйأ¬¾¯·½µÄÄ¿µÄÒ²¿ÉÄÜÊÇ»ñÈ¡ÒÑÍù4ÄêÖйºÖÃOmniRATµÄËùÓпͻ§µÄÃûµ¥£¬ÒÔ¹¥»÷ÀÄÓøù¤¾ßµÄÍøÂç·¸·¨·Ö×Ó¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/06/police-raid-omnirat-developer.html3.˼¿ÆÐû²¼DCNMµÄÇå¾²¸üУ¬ÐÞ¸´¶à¸öÑÏÖØÎó²î
˼¿ÆÐû²¼ÆäÊý¾ÝÖÐÐÄÍøÂçÖÎÀíÆ÷£¨DCNM£©Èí¼þµÄÇå¾²¸üУ¬ÐÞ¸´4¸öÎó²î¡£ÕâЩÎó²î¶¼ÓëWebÖÎÀí½çÃæÖеĻá¼û¿ØÖƹýʧÓйأ¬°üÀ¨¿Éµ¼ÖÂí§ÒâÎļþÉÏ´«¼°rootȨÏÞÖ´ÐдúÂëµÄÎó²î£¨CVE-2019-1620£¬CVSSÆÀ·ÖΪ9.8·Ö£©¡¢¿Éµ¼ÖÂÉí·ÝÑéÖ¤ÈÆ¹ýµÄÎó²î£¨CVE-2019-1619£¬CVSSÆÀ·ÖΪ9.8·Ö£©ÒÔ¼°¿Éµ¼ÖÂÃô¸ÐÐÅϢй¶µÄÎó²î£¨CVE-2019-1621£¬CVSSÆÀ·ÖΪ7.5·Ö£»CVE-2019-1622£¬CVSSÆÀ·ÖΪ5.3·Ö£©¡£ÊÜÓ°ÏìµÄ²úƷΪDCNM 11.2(1)֮ǰµÄ°æ±¾¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-patches-critical-flaws-in-data-center-network-manager/4.Kubernetes CLI¹¤¾ßí§ÒâÎļþÁýÕÖÎó²î£¬½¨ÒéÉý¼¶µ½×îа汾
Kubernetes CLI¹¤¾ßÐÞ¸´¿Éµ¼ÖÂí§ÒâÎļþÁýÕÖµÄÎó²î£¨CVE-2019-11246£©£¬¸ÃÎó²îÊÇ3Ô·ݵÄÎó²î£¨CVE-2019-1002101£©ÐÞ¸´²»ÍêÕûµ¼ÖµÄÐÂÎÊÌ⡣ʹÓøÃÎó²î¿ÉÄܻᵼÖÂĿ¼±éÀú-ÔÊÐí¹¥»÷ÕßʹÓöñÒâÈÝÆ÷½¨Éè»òÌæ»»Óû§ÊÂÇéÕ¾ÖеÄÎļþ¡£¸ÃÎó²îÉæ¼°kubectl cpÏÂÁ´ËÏÂÁîÓÃÓÚÔÚÈÝÆ÷ºÍÓû§»úе֮¼ä¸´ÖÆÎļþ¡£¹¥»÷Õß¿ÉÒÔͨ¹ýʹÓöñÒâtar¶þ½øÖÆÎļþÀ´Ê¹Óô˹¦Ð§£¬Ö»ÒªÅ²ÓÃkubectl cp£¬¾Í¿ÉÒÔ½«ÎļþдÈëÄ¿µÄÅÌËã»úÉϵÄÈκη¾¶¡£ÓÉÓÚCVE-2019-11246Êǿͻ§¶ËÉϵÄÎó²î£¬Òò´ËÆäʹÓÃÐèÒªÓû§½»»¥¡£ÔçÓÚ1.12.9£¬1.13.6ºÍ1.14.2µÄ¿Í»§¶Ë°æ±¾ÈÝÒ×Êܵ½¹¥»÷£¬½¨ÒéÓû§¾¡¿ìÉý¼¶¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/kubernetes-cli-tool-security-flaw-lets-attackers-run-code-on-host-machine/5.GreenFlash Sundown EK´ó¹æÄ£·Ö·¢Ô˶¯£¬Ö÷ÒªÕë¶Ô±±ÃÀºÍÅ·ÖÞ
Malwarebytes LabsÑо¿ÍŶӷ¢Ã÷GreenFlash Sundown EKµÄ´ó¹æÄ£·Ö·¢Ô˶¯¡£¸Ã¹¥»÷Ô˶¯ÔÚ±±ÃÀºÍÅ·ÖÞÊ®·Ö»îÔ¾¡£¹¥»÷Õßͨ¹ýÈëÇÖÍøÕ¾ËùÓÐÕßÔËÓªµÄ¹ã¸æ·þÎñÆ÷£¬Ñ¬È¾ÆäͶ·ÅµÄ¹ã¸æ¾ÙÐзַ¢¡£ÆäÖÐÒ»¸öÊÜÓ°ÏìµÄÐû²¼ÉÌÊÇonlinevideoconverter[.]com£¬¸ÃÍøÕ¾ÊÇÒ»¸ö½«YouTubeºÍÆäËûƽ̨ÉϵÄÊÓÆµ×ª»»ÎªÎļþµÄÈÈÃÅÍøÕ¾¡£Æ¾Ö¤SimilarWeb£¬ÆäÔ»á¼û´ÎÊýΪ2ÒڴΡ£¸ÃEK·Ö·¢µÄpayload°üÀ¨ÀÕË÷Èí¼þSEON¡¢PonyÒÔ¼°Ò»¸öÍÚ¿óÈí¼þ¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/threat-analysis/2019/06/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign/6.ÐÂViceLeaker¶ñÒâÔ˶¯£¬Ö÷ÒªÕë¶ÔÖж«µØÇøµÄAndroidÓû§
¿¨°Í˹»ùÑо¿Ö°Ô±·¢Ã÷еĶñÒâÈí¼þÔ˶¯ViceLeaker£¬¸ÃÔ˶¯Ö÷ÒªÕë¶ÔÖж«µØÇøµÄAndroidÓû§¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ˵·¨£¬ÆäpayloadÊÇÒ»ÖÖÌØ¹¤Èí¼þ³ÌÐò£¬ÓÃÓÚ´ÓÊÜѬȾµÄ×°±¸ÖÐÌáÈ¡¿É»á¼ûµÄÐÅÏ¢£¬°üÀ¨µç»°¼Í¼¡¢¶ÌÐÅ¡¢ä¯ÀÀÆ÷ÀúÊ·¼Í¼µÈ¡£³ýÁ˾ßÓÐÌØ¹¤Èí¼þµÄ¹¦Ð§Ö®Í⣬¶ñÒâAPKÑù±¾»¹°üÀ¨ºóÃŹ¦Ð§¡£°üÀ¨¶ñÒâpayloadµÄAPKÖ÷Ҫͨ¹ýTelegramºÍWhatsAppµÈ̸ÌìÓ¦ÓÃÈö²¥¸øÊܺ¦Õß¡£Ñо¿Ö°Ô±ÒÔΪViceLeaker¿ÉÄÜÊÇÃæÏòÈ«ÇòµÄÍøÂç¹¥»÷Ô˶¯µÄÒ»²¿·Ö¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/new-viceleaker-campaign-targets-android-users-in-the-middle-east-5f90068e


¾©¹«Íø°²±¸11010802024551ºÅ