¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181203
°ä²¼¹¦·ò 2018-12-03
Windows Defender ATPÍŶӷ¢ÏÖÒ»¸öÕë¶ÔÑÇÖÞÄÜÔ´¡¢Ê³Æ·ºÍÒûÁÏÐÐÒµµÄжñÒâ¹¥»÷»î¶¯£¬»ùÓڶԸûµÄÖ¸±êÑ¡Ôñ¡¢¹¥»÷Á´ÒÔ¼°¹¤¾ß¼¯µÄ·ÖÎö£¬×êÑÐÍŶÓÒÔΪ¸Ã»î¶¯ÊÇÓÉAPT×éÖ¯Tropic TrooperÌáÒéµÄ¡£¹¥»÷µÄ³õʼÏòÁ¿ÊÇÒ»¸öÀûÓÃÁËOffice¹«Ê½±à×ëÆ÷·ì϶CVE-2018-0802µÄ¶ñÒâÎĵµ£¬¹¥»÷ÕßËæºóʹÓÃbitsadmin.exe´ÓÔ¶³Ì·þÎñÆ÷ÏÂÔØ²¢Ö´ÐÐËæ»ú¶¨ÃûµÄpayload¡£×êÑÐÈËÔ±ÒÔΪÕâЩpayloadµÄÖØÒªÖ÷ÕÅÊÇÇÔÈ¡Êý¾Ý¡£
ÔÎÄÁ´½Ó£º
https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/2¡¢¾Éƿװоƣ¬¶ñÒâ¹¥»÷»î¶¯Butter²ÎÓëÐÂsambaľÂí
GuardiCore×êÑÐÍŶӷ¢ÏÖ¶ñÒâ¹¥»÷»î¶¯butter²ÎÓëÁËÐÂpayload£ºsambaľÂí¡£butter×îÔç³öÏÖÓÚ2015ÄêÖÐÆÚ£¬Æä¹¥»÷À´×ÔÓÚÓÐÏ޵öIP£¬¾ßÌåÀ´Ëµ£¬Ö»ÓÐ4¸öIP±»ÓÃÓÚ·ÖÆç½×¶ÎµÄ¹¥»÷»î¶¯¡£ÕâЩIPÀ´×ÔÓÚÏã¸ÛºÍÐÂ¼ÓÆÂ£¬²¢ÇÒ×Ô2016ÄêÒÔÀ´Ò»ÏòÓë¶ñÒâ»î¶¯ÓйØÁª¡£butterÔçÆÚµÄpayloadÊÇ80 RAT£¬µ«×Ô2018Äê7ÔÂÆðÆðͷʹÓÃsambaľÂí¡£sambaľÂíÊǵäÐ͵ÄRAT£¬Äܹ»ÏÂÔØÎļþ¡¢Ö´ÐÐshellºÅÁî¡¢ÌáÒéDDoS¹¥»÷ÒÔ¼°ÓµÓÐÉý¼¶»úÔì¡£×êÑÐÈËÔ±ÒѾ¹Û²ìµ½Á˸ÃľÂíµÄ7¸ö·ÖÆçµÄ°æ±¾¡£
ÔÎÄÁ´½Ó£º
https://www.guardicore.com/2018/11/butter-brute-force-ssh-attack-tool-evolution3¡¢Õ°Íû½«À´£¬McAfee°ä²¼2019ÄêÍøÂçÍþвԤ²â»ã±¨
McAfee³¢ÊÔÊÒ¹ØÓÚ2019ÄêÍøÂçÍþвµÄÔ¤²âÔ̺¬£º·¸×ï·Ö×ӵĵØÏÂͬÃ˹ØÏµ½«Ô½·¢Àι̣¬²¢½«³ÉÁ¢¸ü¶àºÏ×÷ͬ°é¹ØÏµ£¬¼ÓÇ¿ÆäÍþвÐÔ£»ÈËΪÖÇÄÜÊÇÌӱܼ¼ÊõµÄ½«À´£»ÐͬÐÔÍþв½«Ôö³¤£¬Òò¶ø±ØÒª¸ü¶àµÄ×ÛºÏÐÔÏìÓ¦´ëÊ©£»·¸×ï·Ö×ÓÀûÓÃÉ罻ýÌå´«²¼ÐéαÐÅÏ¢£¬²¢Õë¶ÔÉÌ¼ÒÆ·ÅÆÌáÒéڲƻ£»Êý¾ÝÉøÂ©¸ü¶àµØÕë¶ÔÔÆ¶Ë£»ÓïÒô¸±ÊÖ³ÉΪIoT¹¥»÷µÄÏÂÒ»¸öÔØÌ壻·¸×ï·Ö×Ó½«¸ü¶àµØÕë¶ÔÉí·Ýƽ̨ºÍÌìǵÉ豸ÌáÒé¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/mcafee-labs/mcafee-labs-2019-threats-predictions/4¡¢´ÓδͣϢ£¬ÒøÐÐľÂíBackSwap3ÔÂÖÁ11Ô¶ñÒâ»î¶¯·ÖÎö
Check Point×êÑÐÍŶӰ䲼¹ØÓÚÒøÐÐľÂíBackSwapµÄÑݱäÇ÷ÏòµÄ·ÖÎö»ã±¨¡£BackSwap×îÔçÓÚ2018Äê3ÔÂÖÐÑ®±»·¢ÏÖ£¬ÆäʱµÄÑù±¾½ÏΪµ¥Ò»£¬ÖØÒªÕë¶Ô²¨À¼ÒøÐÐipko.pl¡¢24.plºÍmbank.pl¡£4Ô·ݣ¬ÐµÄÑù±¾Öн«¸ü¶àµÄÒøÐÐÔö³¤ÎªÖ¸±ê£¬²¢ÆðÍ·ÔÚÖ¸±êÍøÕ¾µÄDOMÖд´½¨ÐéαµÄÊäÈë±í¸ñ£¬¸²¸ÇÔʼÊäÈë×ֶΡ£5Ô·ݣ¬BackSwapÆðÍ·¸ú×ÙÊÜϰȾ»úеµÄÊýÁ¿¡£6Ô·ݣ¬BackSwap½«ÆäÓÐЧºÉÔØÇ¶ÈëBMPͼÏñÖС£7Ô·ÝBackSwapûÓÐÈκλ£¬µ«ÔÚ8ÔÂ·ÝÆðͷתÏòÕë¶ÔÎ÷°àÑÀÒøÐС£9Ôµ½11Ô·ÝBackSwapÖØÒªÊǶÔͼÏñÌåʽµÄpayload½øÐÐÅú¸Ä£¬²¢Ôö³¤Á˸ü¶à¼ÓÃܲãºÍ´óÁ¿À¬»ø´úÂë¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/the-evolution-of-backswap/5¡¢Êý¾Ý¿â²»ÉèÃÜÂ룬Urban¹«Ë¾³¬¹ý30ÍòÓû§ÐÅϢй¶
UrbanÊÇÒ»¼ÒÓ¢¹úµÄÍÆÄô´Òµ¹«Ë¾£¬ÆäÊý¾Ý¿âÒòδÉèÃÜÂëµ¼Ö³¬¹ý30Íò¿Í»§ÐÅϢй¶¡£×êÑÐÈËÔ±Oliver Houghͨ¹ýShodan·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬Ä¿Ç°¸ÃÊý¾Ý¿âÒÑÏÂÏߣ¬µ«²»ÖªÂ·¸ÃÊý¾Ý¿â¶³öÁ˶೤¹¦·ò¡£¸ÃÊý¾Ý¿âÖÐÔ̺¬³¬¹ý30.9ÍòÓû§¼Í¼£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëµÈ¡£´Ë±í£¬Êý¾Ý¿âÖл¹´æ´¢Á˳¬¹ý35.1Íò¸ö·þÎñÔ¤Ô¼¼Í¼£¬ÒÔ¼°³¬¹ý2000¸öÍÆÄÃʦµÄÓйØÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://techcrunch.com/2018/11/27/urban-massage-data-exposed-customers-creepy-clients/6¡¢Ë¼¿Æ½¨¸´PrimeÐí¿ÉÖ¤ÖÎÀíÆ÷ÖеÄSQL×¢Èë·ì϶
˼¿Æ½¨¸´ÁËPrimeÐí¿ÉÖ¤ÖÎÀíÆ÷£¨PLM£©ÖеÄÒ»¸öSQL×¢Èë·ì϶£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÀûÓø÷ì϶ִÐÐËÁÒâSQL²éÎÊ¡£¸Ã·ì϶£¨CVE-2018-15441£©ÓëPLMµÄWeb¿ò¼Ü´úÂëÓйأ¬Æ¾¾Ý˼¿ÆµÄÃèÊö£¬¸Ã·ì϶ÊÇÓÉÓÚSQL²éÎÊÖжÌȱ¶ÔÓû§ÊäÈë½øÐÐÑéÖ¤µ¼Öµģ¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÔ̺¬SQLÓï¾äµÄ¶ñÒâHTTP POSTÒªÇó´¥·¢¸Ã·ì϶£¬´Ó¶ø»ñµÃshellȨÏÞ»òÅú¸Ä¼°É¾³ýPLMÊý¾Ý¿âÖеÄÊý¾Ý¡£PLM 11.0.1¼°Ö®ºóµÄ°æ±¾Êܵ½Ó°Ï죬½¨ÒéÓû§¾¡¿ì×°Öý¨¸´²¹¶¡¡£
ÔÎÄÁ´½Ó£º
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-injectÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ