ÍòºÀÒòÊý¾ÝÐ¹Â¶ÃæÁÙÓ¢¹úî¿Ïµ»ú¹¹1.23ÒÚÃÀÔª·£¿î£»GEº½¿Õ¹«Ë¾Jenkins·þÎñÆ÷й¶´ó×ÚÃô¸ÐÐÅÏ¢£»ÊÓÆµÈí¼þZoom RCEÎó²î
Ðû²¼Ê±¼ä 2019-07-10
Ó¢¹úÊý¾Ý±£»¤»ú¹¹ÖܶþÌåÏÖ½«ÏòÍòºÀ´¦ÒÔ9900ÍòÓ¢°÷£¨ºÏ1.23ÒÚÃÀÔª£©µÄ·£¿î£¬Ôµ¹ÊÔÓÉÊÇ2018Äê11ÔÂÍòºÀÆìÏÂϲ´ïÎÝÂùݵĻáÔ±Êý¾Ýй¶ÊÂÎñ¡£¾ÝÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©³Æ£¬Å·ÖÞ31¸ö¹ú¼ÒµÄ½ü3000ÍòסÃñºÍ700ÍòÓ¢¹úסÃñÊܵ½ÍòºÀÊý¾Ýй¶µÄÓ°Ïì¡£ÕâÊÇÒÑÍùÁ½ÌìÄÚ±¬·¢µÄµÚ¶þÆðÕë¶ÔÊý¾Ýй¶µÄÖØ´ó·£¿î֪ͨ¡£ÍòºÀÌåÏÖ¶ÔÐÅϢרԱ°ì¹«ÊҵľöÒé¸ÐӦʧÍû£¬ÔÚ±»´¦ÒÔ·£¿î֮ǰ£¬Ëü¡°ÓÐȨ×ö³ö»ØÓ¦¡±£¬²¢¡°ÍýÏë×ö³ö»ØÓ¦ÇÒÆð¾¢º´ÎÀ¡±×Ô¼ºµÄ̬¶È¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/marriott-data-breach-gdpr.html
2¡¢GEº½¿Õ¹«Ë¾Jenkins·þÎñÆ÷й¶´ó×ÚÃô¸ÐÐÅÏ¢
Çå¾²Ñо¿Ô±Bob Diachenko·¢Ã÷GEº½¿Õ¹«Ë¾µÄJenkins·þÎñÆ÷¿É¹ûÕæ»á¼û£¬µ¼Ö¹«Ë¾µÄ´ó×ÚÃô¸ÐÐÅϢй¶£¬°üÀ¨¹«Ë¾ÄÚ²¿ÉÌÒµ»ù´¡ÉèÊ©µÄÔ´´úÂë¡¢Ã÷ÎÄÃÜÂ롢ȫÇòϵͳµÄÉèÖÃÎļþºÍ˽Կ¡¢APIÁîÅÆ¡¢Êý¾Ý¿âƾ֤µÈ¡£GEº½¿Õ¹«Ë¾ÊÇͨÓÃµçÆøÆìϵÄ×Ó¹«Ë¾£¬ÊÇÈ«ÇòÉÌÓ÷ɻú·¢ÄîÍ·µÄ¶¥¼¶¹©Ó¦ÉÌÖ®Ò»¡£¸Ã¹«Ë¾ÌåÏÖûÓÐÖ¤¾ÝÅú×¢ÆäËüÈË»á¼ûÁË·þÎñÆ÷ÉϵÄÊý¾Ý£¬²¢ÒѽÓÄÉÔ¤·À²½·¥ÖØÖÃÁËËùÓÐÆ¾Ö¤¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/ge-aviation-passwords-jenkins-server/146302/
3¡¢Î¢ÈíÖÒÑÔÎÞÎļþ¶ñÒâÈí¼þAstarothµÄ¹¥»÷Ô˶¯
΢ÈíÇå¾²ÍŶÓÐû²¼Ò»Ôòת´ï£¬ÖÒÑÔʹÓÃÎÞÎļþÊÖÒÕ·Ö·¢¶ñÒâÈí¼þAstarothµÄ¹¥»÷Ô˶¯¡£Windows Defender ATPÍŶӼì²âµ½Á˸öñÒâÔ˶¯£¬¹¥»÷Õßͨ¹ý´ó¹æÄ£À¬»øÓʼþÔ˶¯ÏòÓû§·Ö·¢AstarothľÂí¡£¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÐÅÏ¢ÇÔȡľÂí£¬¿Éת´¢ÖÖÖÖÓ¦ÓóÌÐòµÄƾ֤£¬²¢½«±»µÁÊý¾ÝÉÏ´«µ½Ô¶³Ì·þÎñÆ÷¡£Î¢Èí½²»°ÈËÌåÏÖÁè¼Ý95£¥µÄAstarothѬȾ±¬·¢ÔÚ°ÍÎ÷¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/microsoft-warns-about-astaroth-malware-campaign/
4¡¢DDoS½©Ê¬ÍøÂçGoBotKR£¬Ö÷ÒªÕë¶Ôº«¹ú
ƾ֤ESETµÄ±¨¸æ£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚ¹¹½¨Ò»¸ö¿ÉÓÃÓÚÖ´ÐÐÖÖÖÖDDoS¹¥»÷µÄ½©Ê¬ÍøÂçGoBotKR¡£¸Ã½©Ê¬ÍøÂçÖ÷ÒªÃé×¼º«¹úµçÊÓ½ÚÄ¿µÄ·ÛË¿£¬Í¨¹ýµÁ°æÍøÕ¾ÉϵĵÁ°æÓ°Ï·¡¢ÓÎÏ·ºÍµçÊÓ½ÚÄ¿ÖÖ×ÓÏÂÔØ¾ÙÐÐÈö²¥¡£¸Ã¶ñÒâÈí¼þÊÇÒÑÖªºóÃÅGoBot2µÄˢа汾£¬´úÂëºÜ¼òÆÓ£¬´ó´ó¶¼¹¦Ð§¶¼ÊÇʹÓÃGoLang¿âʵÏֵ쬲¢ÇÒÖ´ÐÐWindowsÏÂÁîºÍµÚÈý·½¹¤¾ß£¬ÈçBitTorrentºÍuTorrent¿Í»§¶Ë¡£Ñо¿Ö°Ô±Ôö²¹Ëµ¸Ã¶ñÒâÈí¼þ¶ÔÔ´´úÂëµÄÐÞ¸ÄÖ÷ÒªÊǺ«¹úÌØÓеÄÌÓ±ÜÊÖÒÕ£¬°üÀ¨¼ì²âIPÐÅÏ¢ÒÔÈ·¶¨ÊÇ·ñÔÚº«¹úµÄһЩÇ徲ɳÏäÖÐÔËÐС¢É¨ÃèÀú³ÌÒÔ¼ì²â·À²¡¶¾²úÆ·µÈ¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/gobotkr-pirate-torrents-ddos-botnet/146285/
5¡¢¶ñÒâÈí¼þAnubis»Ø¹é£¬¼ì²âµ½Áè¼Ý1.7Íò¸öÑù±¾
Ç÷ÊÆ¿Æ¼¼¼ì²âµ½Android¶ñÒâÈí¼þAnubis»Ø¹é£¬Ñо¿Ö°Ô±ÔÚÁ½¸öÏà¹ØµÄ·þÎñÆ÷Éϼì²âµ½17490¸öÑù±¾¡£ÔÚÕâЩÑù±¾ÖÐÕÒµ½ÁËÁ½¸ö±êÇ©£ºOperat?rG¨¹ncellemesiºÍGoogle Services£¬Ç°ÕßÔÚÍÁ¶úÆäÓïÖеÄÒâ˼ÊÇ¡°²Ù×÷Ö°Ô±¸üС±£¬ÕâЩ±êÇ©¿ÉÄÜÊÇÉç½»¹¤³ÌÓÕ¶ü£¬ÓÃÓÚÓÕÆÓû§ÏÂÔØ¶ñÒâÈí¼þ¡£Anubis×ܹ²Õë¶Ô188¸öÓëÒøÐкͽðÈÚÏà¹ØµÄÓ¦ÓóÌÐò£¬´ÓÖÐÇÔȡСÎÒ˽¼ÒºÍ²ÆÎñÊý¾Ý¡£ÕâЩ³ÌÐòÀ´×ÔÓÚ²¨À¼¡¢°Ä´óÀûÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢·¨¹ú¡¢Òâ´óÀû¡¢Î÷°àÑÀ¡¢ÃÀ¹úºÍÓ¡¶ÈµÈ¹ú¼Ò¡£AnubisµÄC£¦C·þÎñÆ÷Ò²ÂþÑÜÔÚ²î±ðµÄ¹ú¼Ò¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/anubis-android-malware-returns-with-over-17000-samples/
6¡¢ÊÓÆµ¾Û»áÈí¼þZoom RCEÎó²î£¬¿ÉÐ®ÖÆMacÉãÏñÍ·
Çå¾²Ñо¿Ö°Ô±Jonathan LeitschuhÅû¶ÊÓÆµ¾Û»áÈí¼þZoomÖеÄÒ»¸öRCEÎó²î£¬¸ÃÎó²îÓ°ÏìÁËMacƽ̨ÉϵÄZoom app°æ±¾4.4.4£¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÓû§»á¼ûÍøÕ¾Ê±½ÓÊÜÍøÂçÉãÏñÍ·¡£Æ¾Ö¤LeitschuhµÄ˵·¨£¬Áè¼Ý400ÍòÓû§ÃæÁÙΣº¦¡£¸ÃÎó²îʹÓÃÁËZoomÈí¼þµÄµã»÷¼ÓÈ빦Ч£¬¼´Ö»Ðèµã»÷Ô¼ÇëÁ´½Ó¼´¿É×Ô¶¯¼¤»îϵͳÉÏ×°ÖõÄÓ¦ÓóÌÐò²¢Í¨¹ýWebä¯ÀÀÆ÷¼ÓÈëÊÓÆµ¾Û»á¡£¹¥»÷Õß¿Éͨ¹ý´¹ÂÚÓʼþ·Ö·¢ÕâÖÖ¶ñÒâÁ´½Ó¡£Leitschuh»¹ÌåÏÖZoomµÄÐÞ¸´Ö»ÊÇ×èÖ¹¹¥»÷Õß·¿ªÓû§µÄÉãÏñÍ·£¬¹¥»÷ÕßÈÔ¿ÉÒÔͨ¹ý¶ñÒâÁ´½ÓÓÕʹÓû§¼ÓÈë¾Û»á¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88147/hacking/zoom-mac-software-flaw.html


¾©¹«Íø°²±¸11010802024551ºÅ