¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181213
°ä²¼¹¦·ò 2018-12-13
McAfee×êÑÐÈËÔ±·¢ÏÖжñÒâ»î¶¯¡°ÉñǹÊÖÐж¯¡±£¬¸Ã»î¶¯Õë¶ÔÈ«ÇòµÄ¹ú·ÀºÍ¹Ø¼ü»ù´¡ÉèÊ©£¬Ô̺¬ºËÄÜ¡¢¹ú·À¡¢ÄÜÔ´ºÍ½ðÈÚÆóÒµ¡£×Ô2018Äê10ÔÂ25ÈÕÒÔÀ´£¬Ôڶ̶ÌÁ½¸öÔÂÄÚÉñǹÊÖÐж¯ÒÑÓ°ÏìÁËÈ«Çò87¸öÆóÒµ¡£¹¥»÷Õß¼Ù×°³ÉÕÐÆ¸»î¶¯£¬Í¨¹ýDropbox·Ö·¢Ô̺¬¶ñÒâºêµÄWordÎĵµ£¬²¢×îÖÕ½»¸¶Rising SunºóÃÅ¡£¸ÃºóÃÅÓëAPT×éÖ¯LazarusÔÚ2015ÄêʹÓõĶñÒâÈí¼þDuuzerÓµÓÐÒ»ÑùµÄ´úÂë¡£Ö»¹ÜºÜ¶àÏßË÷¶¼Ö¸ÏòÁËLazarus£¬µ«×êÑÐÈËÔ±ÒÔΪÕâЩ¹ýÓÚÏÔÖøµÄÖ¤¾Ý¿ÉÄÜÖ»Êǹ¥»÷ÕßÓÐÒâÉèÖõÄfalse flag¡£
ÔÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/operation-sharpshooter-targets-global-defense-critical-infrastructure/2¡¢Ð·ì϶ÀûÓù¤¾ß°üNovidade£¬ÖØÒªÕë¶ÔSOHOºÍ¼ÒÓ÷ÓÉ
Ç÷Ïò¿Æ¼¼·¢ÏÖ¼ÒÍ¥ºÍÓ×ÐͰ칫·ÓÉÆ÷£¨SOHO£©ÔÚ³ÉΪ¹¥»÷ÕßµÄÖ¸±ê¡£×êÑÐÍŶӷ¢ÏÖÒ»¸öÃûΪNovidadeµÄзì϶ÀûÓù¤¾ß°üÔÚ°ÍÎ÷ÌáÒé´ó¹æÄ£¹¥»÷»î¶¯¡£NovidadeÖØÒªÍ¨¹ýCSRF·ì϶À´¸ü¸Ä·ÓÉÆ÷ÉϵÄDNSÉèÖ㬽«Óû§µÄÉÏÍøÁ÷Á¿½Ù³Öµ½¹¥»÷ÕߵķþÎñÆ÷¡£NovidadeµÄ¹¥»÷»î¶¯¿ÉÄÜÆðÍ·ÓÚ2017Äê8Ô£¬×Ô2018Äê3ÔÂÒÔÀ´×êÑÐÍŶӹ²¼à²âµ½ÁË2400Íò´Î¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/new-exploit-kit-novidade-found-targeting-home-and-soho-routers/3¡¢CobaltÍÆ³ö¸Ä½øµÄThreadKit£¬ÈÔÔÚ»ý¼«½øÐжñÒâ»î¶¯
Ö»¹ÜÔÚ½ñÄêÔçЩʱ³½·¸×ïÍÅ»ïCobalt GroupµÄÍ·×Ó±»¿ÛÁô£¬µ«CobaltÈÔÔÚ»ý¼«½øÐжñÒâ»î¶¯¡£Æ¾¾Ý°²È«³§ÉÌFidelisÖܶþ°ä²¼µÄ×êÑл㱨£¬2018Äê10ÔÂÆðÍ·CobaltÔÚ»ý¼«·Ö·¢Ð°汾µÄ¶ñÒâÈí¼þThreadKit¡£ThreadKitÈÔͨ¹ý´¹µöÓʼþ´«²¼£¬ÓʼþÖÐÔ̺¬¶ñÒâµÄRFT¸½¼þ¡£ThreadKitѡȡÁËһЩеĻìºÏ¼¼Êõ£¬ÆäpayloadÊÇCoblntľÂí¡£¸Ã°æ±¾µÄCoblntľÂíʹÓÃÁËXOR»ìºÏ¼¼Êõ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cobalt-bank-robbers-use-new-threadkit-malicious-doc-builder/4¡¢Adobe°ä²¼12Ô°²È«¸üУ¬Ò»´ÎÐÔ½¨¸´87¸ö·ì϶
AdobeÔÚ2018Äêµ×°ä²¼ÁË12Ô°²È«¸üУ¬½¨¸´ÁËMacOSºÍWindowsƽ̨ÉϵÄAcrobat ReaderÖеÄ87¸ö·ì϶¡£ÆäÖÐ39¸ö·ì϶µÄΣÏÕˮƽΪcritical£¬48¸ö·ì϶Ϊimportant¡£criticalµÄ·ì϶Ô̺¬3¸ö¶ÑÒç³ö¡¢5¸öÔ½½çд¡¢2¸ö²»ÊÜÐÅÀµµÄÖ¸Õë½âÒýÓá¢2¸ö»º³åÇøÃýÎóÒÔ¼°24¸öuse-after-free·ì϶£¬ÕâЩ·ì϶¶¼¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐС£importantµÄ·ì϶Ô̺¬43¸öÔ½½ç¶Á¡¢4¸öÕûÊýÒç³öºÍ2¸ö°²È«Èƹý·ì϶£¬ÕâЩ·ì϶¶¼¿Éµ¼ÖÂÐÅϢй¶¡£¸Ã¹«Ë¾Ã»ÓÐÅû¶Èκηì϶µÄ¼¼Êõϸ½Ú£¬µ«½«ËùÓеķì϶¶¼¹éÀàΪÓÅÏȼ¶2¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/adobe-acrobat-update.html5¡¢Î¢Èí°ä²¼39¸ö·ì϶µÄ½¨¸´²¹¶¡£¬ÆäÖÐÔ̺¬Ò»¸öWindows 0day
΢ÈíÔÚ12Եݲȫ¸üÐÂÖн¨¸´ÁË39¸ö·ì϶£¬ÆäÖÐ10¸ö·ì϶µÄÑϳÁÐÔΪcritical£¬ÆäÓàµÄΪimportant¡£ÆäÖÐWindows 0day£¨CVE-2018-8611£©Òѱ»·¢´Ë¿ÌÒ°±íÀûÓã¬Æ¾¾Ý¿¨°Í˹»ùµÄ»ã±¨£¬¸Ã0dayÊÇWindowsÄںˣ¨ntoskrnl.exe£©ÖеÄÌáȨ·ì϶£¨EoP£©£¬¿ÉÔÊÐí¶ñÒⷨʽÔÚÖ¸±êϵͳÉÏÒÔ¸ü¸ßȨÏÞÖ´ÐÐËÁÒâ´úÂë¡£APT×éÖ¯FruityArmorºÍSandCatÒÑÔÚÒ°±í»ý¼«ÀûÓø÷ì϶¡£ÁíÒ»¸ö³ÁÒªµÄ·ì϶£¨CVE-2018-8517£©ÊÇ.NET Framework¹¹½¨µÄWebÀûÓ÷¨Ê½ÖеÄDoSÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/microsoft-patch-updates.html6¡¢Web·þÎñÆ÷ÅäÖò»µ±£¬µ¼ÖÂ1.2ÒÚ°ÍÎ÷¹«ÃñÓ×ÎÒÐÅϢй¶
InfoArmorÔÚ2018Äê3Ô·¢ÏÖÒ»¸öÅäÖò»µ±µÄApache Web·þÎñÆ÷£¬¸Ã·þÎñÆ÷ÉÏ´æ´¢µÄÊý¾Ý´æµµÂ¶³öÁË1.2ÒÚ°ÍÎ÷¹«ÃñµÄÓ×ÎÒ˰ÎñµÇ¼ÇºÅ£¨CPF£©¡£Æ¾¾ÝInfoArmorµÄÃèÊö£¬¸Ã·þÎñÆ÷ÉϵÄ27MBµ½82GBÖ®¼äµÄ¶à¸öÎļþ¿É¹«¿ª½Ó¼û£¬ÆäÖÐÒ»¸öÊý¾Ý¿âÎļþÔ̺¬ÁËCPF¡¢ÐÕÃû¡¢µç×ÓÓʼþ¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢¾ÍÒµ¡¢Ó×ÎÒ´û¿î¡¢ÐÅÓþº¹ÇàµÈÐÅÏ¢¡£¸ÃĿ¼ºÜ¿ÉÄÜÓÃÓÚ´æ´¢Êý¾Ý¿âµÄ±¸·Ý£¬µ«ÆäËùÓÐÕßûÓÐÒâʶµ½Æä¿É¹«¿ª½Ó¼û¡£InfoArmor²»ÄÜÈ·¶¨Êý¾Ý¿âµÄËùÓÐÕߣ¬µ«ËûÃÇ֪ͨÁËÍйܷþÎñÉÌ£¬¸Ã·þÎñÆ÷ÓÚ3Ôµ׵õ½±£»¤¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/taxpayer-id-numbers-for-120-million-brazilians-exposed-online/ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ