¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181122

°ä²¼¹¦·ò 2018-11-22
1¡¢×êÑÐÍŶӷ¢ÏÖÕë¶Ô¶«ÄÏÑǵÄÐÂË®¿Ó¹¥»÷OceanLotus

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



ESET×êÑÐÍŶӷ¢ÏÖÒ»¸öÕë¶Ô¶«ÄÏÑǵÄÐÂË®¿Ó¹¥»÷»î¶¯£¬¸Ã»î¶¯×Ô2018Äê9ÔÂÒÔÀ´Ò»Ïò»îÔ¾£¬²¢ÇÒ¹æÄ£ºÜ´ó ¡£×êÑÐÈËÔ±¹²·¢ÏÖÁË21¸ö±»ÈëÇÖµÄÍøÕ¾£¬Ô̺¬¼íÆÒÕ¯¹ú·À²¿¡¢¼íÆÒÕ¯±í½»Óë¹ú¼ÊºÏ×÷²¿ÒÔ¼°Ò»Ð©Ô½Äϱ¨Ö½ºÍ²©¿ÍÍøÕ¾µÈ ¡£Æ¾¾Ý·ÖÎö£¬ESET·Ç³£×¢¶¨Õâ´Î¹¥»÷»î¶¯ÊÇÓÉ·¸×ïÍÅ»ïOceanLotusÔËÓªµÄ£¬¸Ã×éÖ¯Ò²±»³ÆÎªAPT32»òAPT-C-00 ¡£

  

 Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2018/11/20/oceanlotus-new-watering-hole-attack-southeast-asia/


2¡¢×êÑÐÍŶӷ¢ÏÖ»¨Ê½ÐÜÀûÓÃÐÂľÂíCannon¹¥»÷È«Çò¶à¸öµ±¾Ö»ú¹¹

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Palo Alto NetworksµÄUnit 42ÍŶÓÔÚ2018Äê10Ôµ׺Í11Ô³õ·¢ÏÖÁËÒ»¸öеÄÓã²æÊ½´¹µö»î¶¯ ¡£¸Ã»î¶¯Óë¶íÂÞ˹APT×éÖ¯»¨Ê½ÐÜ£¨APT28£©ÓйØ£¬ÖØÒªÕë¶Ô±±ÃÀ¡¢Å·ÖÞºÍǰËÕÁª¹ú¶ÈÈ·µ±¾Ö»ú¹¹ ¡£×êÑÐÈËÔ±ÔڸûÖз¢ÏÖÁËÒ»¸öÐµÄľÂíCannon£¬CannonʵÏÖÁË¿í·ºµÄÖ°ÄÜ£¬Ô̺¬ÍøÂçϵͳÐÅÏ¢¡¢½ØÈ¡ÆÁÄ»ºÍµÇ¼POP3ÓÊÏäÕË»§µÈ ¡£CannonʹÓõç×ÓÓʼþÕË»§sahro.bella7[at]post.cz×÷ΪC2·þÎñÆ÷ ¡£

 

 Ô­ÎÄÁ´½Ó£º

https://researchcenter.paloaltonetworks.com/2018/11/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/


3¡¢×êÑÐÍŶӷ¢ÏÖLazarusÔÙ´ÎÕë¶ÔÀ­¶¡ÃÀÖÞ½ðÈÚ»ú¹¹ÌáÒé¹¥»÷

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ç÷Ïò¿Æ¼¼×êÑÐÍŶӷ¢ÏÖLazarus£¨APT38£©Õë¶ÔÀ­¶¡ÃÀÖÞ¶à¸ö½ðÈÚ»ú¹¹ÔÙ´ÎÌáÒé¹¥»÷ ¡£LazarusµÄºóÃÅÔ̺¬Èý¸öÖØÒª²¿¼þ£¬ÆäÖÐAuditCred.dll/ROptimizer.dllÊÇ·þÎñ¼ÓÔØ·¨Ê½£¬Msadoz.dllÊÇÏÖʵµÄ¼ÓÃܺóÃÅ£¬Auditcred.dll.mui/rOptimizer.dll.muiÊǼÓÃܵÄÅäÖÃÎļþ ¡£ÕâЩºóÃÅÓÚ2018Äê9ÔÂ19ÈÕ×°ÖÃÔÚÊÜϰȾµÄÍÆËã»úÉÏ£¬ÓÃÓÚÍøÂçϵͳÐÅÏ¢¡¢´ò¿ª·´µ¯shell¡¢É¾³ý±¾µØÎļþ¡¢ÖÎÀí±¾µØ¹ý³Ì¡¢×¢Èë´úÂëÒÔ¼°ÏÂÔØÆäËü¶ñÒâÈí¼þµÈ ¡£


  Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/lazarus-continues-heists-mounts-attacks-on-financial-organizations-in-latin-america/


4¡¢×êÑÐÍŶÓÅû¶Atlantis Word ProcessorÖеÄ3¸ö´úÂëÖ´Ðзì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalosÔÙ´ÎÔÚAtlantis Word ProcessorÖз¢ÏÖ3¸ö°²È«·ì϶ ¡£AtlantisÊÇMicrosoft WordµÄ´úÌæÈí¼þ£¬¿ÉÔÊÐíÓû§ÇáËÉ´´½¨¡¢ÔĶÁºÍ±à×ëWordÎĵµ ¡£×êÑÐÈËÔ±·¢Ïֵķì϶Ô̺¬ËÁÒâдÈë·ì϶£¨CVE-2018-4038£©¡¢Ô½½çд·ì϶£¨CVE-2018-4039£©ºÍδ³õʼ»¯Ö¸Õë·ì϶£¨CVE-2018-4040£©£¬ÕâЩ·ì϶¿ÉÔÊÐíÔ¶³Ì¹¥»÷ÕßÖ´ÐÐËÁÒâ´úÂë²¢ÊÕÊÜϵͳ ¡£AtlantisÍŶӰ䲼ÁËа汾3.2.10.1À´½¨¸´ÕâЩ·ì϶ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/11/word-processor-vulnerability.html


5¡¢Ó¢¹úÑÇÂíÑ·Òâ±íй¶²¿Ãſͻ§ÐÅÏ¢£¬Ä¿Ç°ÉÐÎÞ¸ü¶àϸ½Ú

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¢¹úÑÇÂíÑ·Ïò²¿Ãſͻ§·¢ËÍÓʼþ³Æ£¬ÓÉÓÚ¼¼ÊõÃýÎó£¬ÕâЩ¿Í»§µÄÐÕÃûºÍµç×ÓÓʼþµØÖ·±»Òâ±íй¶£¬Ä¿Ç°¸ÃÎÊÌâÒѵõ½½â¾ö£¬ÊÜÓ°ÏìµÄ¿Í»§ÎÞÐèÅú¸ÄÃÜÂë»ò²ÉÈ¡ÆäËü²Ù×÷ ¡£¸Ã¹«Ë¾Ã»ÓÐй©ÊÂÎñ²úÉúµÄÔ­Òò£¬Ò²Ã»ÓÐй©¸ü¶à¼¼Êõϸ½Ú£¬Ò²²»Ã÷ÏÔÓм¸¶à¿Í»§Êܵ½Ó°Ïì ¡£ÓÉÓÚÕâÒ»ÊÂÎñ²úÉúÔÚºÚÎå¼´½«µ½À´Ö®¼Ê£¬ÕâÓÈÆäÁîÈ˲»°² ¡£


  Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78280/data-breach/amazon-uk-data-breach.html


6¡¢ÃÀ¹úÓÊÕþ·þÎñ¹ÙÍø·ì϶¿Éµ¼ÖÂ6000ÍòÓû§Êý¾Ýй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


±¾ÖÜÈýÃÀ¹úÓÊÕþ·þÎñ£¨USPS£©½¨¸´Á˹ÙÍøÉϵÄÒ»¸ö°²È«·ì϶£¬¸Ã·ì϶¿ÉÔÊÐíÈκÎÕ¼ÓÐUSPS.comÕË»§µÄÈ˲鿴ºÍÅú¸ÄÆäËûÓû§ÕË»§µÄ¾ßÌåÐÅÏ¢£¬Ô¼ÓÐ6000ÍòÓû§Êܵ½Ó°Ïì ¡£¸Ã·ì϶´æÔÚÓÚUSPSµÄAPI Informed VisibilityÖУ¬Æ¾¾ÝKerbs on SecurityµÄ±¨Â·£¬Ò»Ãû¶ÀÁ¢µÄ°²È«×êÑÐÈËÔ±ÔÚÒ»Äêǰ·¢ÏÖÁËÕâ¸ö·ì϶²¢»ã±¨¸øÁËUSPS£¬µ«²¢Î´ÊÕµ½Èκλظ´ ¡£ÔÚKerbs¹«¿ªÅû¶´ËÎÊÌâºó£¬USPS½¨¸´ÁËÕâ¸ö·ì϶ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78298/hacking/us-postal-service-flaws.html


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù