¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181218

°ä²¼¹¦·ò 2018-12-18
1¡¢Talos³ÆÉÏÖܵıÈÌØ±ÒÕ¨µ¯ÍþвÓëSextortionڲƭÕß´æÔÚ¹ØÁª

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÉÏÖÜËÄÃÀ¹úÈ«¹ú¸÷µØµÄһЩ¹«¹²»ú¹¹£¨ÀýÈç´óѧ¡¢ÐÂÎÅýÌåµÈ£©½Ó¹Üµ½ÁËÕ¨µ¯ÍþвµÄڲƭµç×ÓÓʼþ£¬Ë¼¿ÆTalos·¢ÏָöñÒâ»î¶¯ÏÖʵÉÏÊÇ10Ô·ÝsextortionÚ¿Æ­»î¶¯µÄÑݱä¡£ÔÚÕ¨µ¯ÍþвÖÐTalos¹²·¢ÏÖÁË17¸ö·ÖÆçµÄ±ÈÌØ±ÒµØÖ·£¬Ö»ÓÐÁ½¸öµØÖ·Óà¶îΪÕý¡£Õ¨µ¯ÍþÐ²Éæ¼°µ½µÄIPµØÖ·Ò²·¢ËÍÁ˸÷ÖÖÀàÐ͵ÄsextortionڲƭÓʼþ¡£ÕâÒâζ×ÅÕâЩ×ï·¸Ô¸Òâ¼ÙÔìÈκÎËûÃÇÒÔΪÄܹ»ºýŪÊÕ¼þÈ˵ÄÍþвºÍ¹ÊÊ£¬×êÑÐÈËÔ±Ô¤¼ÆÕâÖÖ¹¥»÷»á³ÖÐø²úÉú¡£Talos¼¤ÀøÓû§²»ÒªÖ§¸¶ÈκÎÊê½ð£¬ÓÉÓÚÕâÑù×öÖ»»áÈù¥»÷ÕßÈ·ÈÏËûÃǵIJ½ÖèÊÇÓÐЧµÄ£¬´Ó¶ø±ä±¾¼ÓÑϵؽøÐÐÆäËü¹¥»÷¡£

   

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2018/12/bitcoin-bomb-scare-associated-with.html


2¡¢×êÑÐÈËÔ±°ä²¼ÀÕË÷Èí¼þHiddenTearµÄÃâ·Ñ½âÃܹ¤¾ß

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



Michael Gillespie°ä²¼ÀÕË÷Èí¼þHiddenTearµÄÃâ·Ñ½âÃܹ¤¾ßHiddenTearDecrypter¡£HiddenTearÊÇÒ»¸öÀÕË÷Èí¼þ¼Ò×壬ÆäÆëÈ«µÄÔ´´úÂë±»°ä²¼ÔÚGitHubÉÏ£¬¹¥»÷ÕßÄܹ»ÀûÓøÃÔ´´úÂë´´½¨×Ô¼ºµÄ±äÖÖ¡£ÓÉÓÚԭʼ´úÂëÊÇÄܹ»½âÃܵÄ£¬Òò¶ø´ÓÒ»Ñù´úÂë´´½¨µÄÆäËü±äÌåÒ²ÊÇÄܹ»½âÃܵÄ¡£¸Ã½âÃܹ¤¾ßÄܹ»½âÃܵıäÌåÔ̺¬8lock8¡¢AnonCrack¡¢BankAccountSummaryµÈ¡£

 

 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-hiddentear-ransomware-with-ht-brute-forcer/


3¡¢ÐÂÍøÂç´¹µö»î¶¯¼Ù×°³ÉOffice 365µÄδͶµÝ֪ͨ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ISC Handler Xavier Mertens·¢ÏÖÒ»¸öеÄÍøÂç´¹µö»î¶¯£¬¹¥»÷Õßͨ¹ý·¢ËͼÙ×°³É΢ÈíOffice 365δͶµÝÐÂÎŵĴ¹µöÓʼþ£¬ÊÔͼÇÔÈ¡Óû§µÄµÇ¼ʹ´¦¡£ÈôÊǽӹܵ½´ËÀàÓʼþµÄÓû§µã»÷ÁËÓʼþÖеÄÔٴη¢ËÍÁ´½Ó£¬ËûÃǽ«»áÌø×ªµ½Ò»¸ö·ÂÕÕOffice 365µÇÂ¼Ò³ÃæµÄ´¹µöÍøÕ¾¡£Ò»µ©Óû§ÊäÈëµÇ¼ʹ´¦£¬JavaScript´úÂ뽫»áÍøÂçÓû§µÄÍ´´¦²¢½«Óû§³Á¶¨Ïòµ½ºÏ·¨µÄOffice 365µÇ¼վµã¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-attack-pretends-to-be-a-office-365-non-delivery-email/


4¡¢PewDiePieºÚ¿ÍÌáÒéµÚ¶þÂÖ´òÓ¡»ú¹¥»÷»î¶¯££PrinterHack2

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÉϸöÔÂΪÐû´«YouTube¶©ÔÄÆµÂ·PewDiePie£¬ºÚ¿ÍÈëÇÖÁËÈ«ÇòÁìÓòÄÚµÄ5Íǫ̀´òÓ¡»ú¡£Ä¿Ç°ÕâЩ¹¥»÷ÕßÔÚÌáÒéµÚ¶þÂÖ¹¥»÷»î¶¯££PrinterHack2¡£¹¥»÷ÕßÔÚTwitterÉÏÐû³Æ£¬µÚ¶þÂÖ¹¥»÷»î¶¯Éæ¼°µ½ÈýÖÖºÍ̸£¬Ô̺¬IPP¡¢JetDirectºÍLPD£¬ÊÜÓ°ÏìµÄ´òÓ¡»ú³¬¹ý25Íǫ̀£¬¶øÖ¸±êIPµØÖ·µÄÊýÁ¿Ô¶Ô¶³¬¹ý200Íò¡£¹¥»÷Õß»¹³ÆÕâ´ÎÐж¯ÊÇΪÁËÒýÆðÈËÃǶԴòÓ¡»ú·ì϶µÄÆ÷³Á¡£

 

 Ô­ÎÄÁ´½Ó£º

https://threatpost.com/pewdiepie-hackers-launch-second-printer-siege-according-to-reports/139968/


5¡¢Jenkins±»ÆØ´æÔÚÁ½¸ö·ì϶£¬¿Éµ¼Ö·þÎñÆ÷±»ÊÕÊÜ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


CyberArk°²È«×êÑÐÈËÔ±Åû¶ÁËJenkinsÖеÄÁ½¸ö°²È«·ì϶µÄ¼¼Êõϸ½Ú£¬ÕâÁ½¸ö·ì϶¶¼ÔÚ½ñÄêÏÄÌì±»½¨¸´£¬µ«ÈÔº±¼ûÒÔǧ¼ÆµÄÔÚÏßJenkins·þÎñÆ÷Ò×Êܹ¥»÷¡£µÚÒ»¸ö·ì϶£¨CVE-2018-1999001£©¿ÉÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâµÇ¼ʹ´¦½«Jenkins·þÎñÆ÷µÄconfig.xmlÅäÖÃÎļþ´ÓhomeÄ¿Â¼ÒÆ¶¯µ½ÆäËüµØÎ»£¬µ±Jenkins·þÎñÆ÷³ÁÆôºó£¬¸Ã·þÎñÆ÷½«Ê¹ÓÃĬÈÏÅäÖã¬ÕâʹµÃÈκÎÈ˶¼Äܹ»×¢²á²¢»ñµÃÖÎÀíԱȨÏÞ¡£µÚ¶þ¸ö·ì϶£¨CVE-2018-1999043£©ÔÊÐí¹¥»÷ÕßÔÚ·þÎñÆ÷ÄÚ´æÖжÌÔݵش´½¨Óû§¼Í¼£¬²¢Ê¹ÓøÃÓû§½øÐÐÉí·ÝÑéÖ¤¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/thousands-of-jenkins-servers-will-let-anonymous-users-become-admins/


6¡¢Twitter½¨¸´Ò»¸ö°²È«·ì϶£¬¿ÉÔÊÐíδÊÚȨ½Ó¼ûÖ±½ÓÐÂÎÅ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±Terence Eden·¢ÏÖTwitter´æÔÚÒ»¸öbug£¬ÆäOAuthÊÚȨ¶Ô»°¿òÏÔʾijЩµÚÈý·½ÀûÓÃÎÞ·¨½Ó¼ûÓû§µÄÖ±½ÓÐÂÎÅ£¬µ«ÏÖʵÉÏÕâЩÀûÓÃÄܹ»ÔÚÓû§²»ÖªÇéµÄÇé¿öϽӼûËûÃǵÄÖ±½ÓÐÂÎÅ¡£¸Ã·ì϶ÓëTwitterµÄ»ùÓÚPINµÄ¸¨ÖúÊÚȨ»úÔìÓйØ£¬µ±µÚÈý·½ÀûÓÃͨ¹ýPIN»ñµÃÏàӦȨÏÞʱ£¬ÕâЩȨÏÞ²¢Ã»ÓÐÔÚOAuthÊÚȨÐÅÏ¢ÖÐÕýÈ·µØÏÔʾ³öÀ´¡£TwitterÓÚ12ÔÂ6ÈÕ½¨¸´Á˸ÃÎÊÌâ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/twitter-fixes-bug-that-gives-unauthorized-access-to-direct-messages/


ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù