¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20190312

°ä²¼¹¦·ò 2019-03-12
1¡¢StackStormзì϶£¨CVE-2019-9580£©£¬¿Éµ¼ÖÂXSS¹¥»÷

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«×êÑÐÈËÔ±Barak TawilyÔÚ¿ªÔ´×Ô¶¯»¯Æ½Ì¨StackStormÖз¢ÏÖÒ»¸öÑϳÁ·ì϶£¬¸Ã·ì϶£¨CVE-2019-9580£©¿Éµ¼ÖÂXSS ¡£Æ¾¾ÝTawilyµÄÃèÊö£¬¸Ã·ì϶ÓëStackStorm REST APIδÕýÈ·´¦ÖÃCORS£¨¿çÔ´×ÊÔ´¹²Ïí£©µÄ±êÍ·ÓйØ£¬¿Éµ¼ÖÂÕë¶ÔStackStorm APIµÄXSS¹¥»÷ ¡£StackStorm¿ª·¢ÍŶÓÔÚа汾2.9.3ºÍ2.10.3Öн¨¸´ÁËÕâ¸ö·ì϶£¬½¨ÒéÓû§¾¡¿ì½øÐиüР¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/03/stackstorm-security-vulnerability.html

2¡¢Moxa½¨¸´EDSºÍIKS¹¤Òµ»¥»»»úÖеĶà¸ö°²È«·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Positive Technologies×êÑÐÍŶӷ¢ÏÖMoxaµÄEDS-405A¡¢EDS-408AºÍEDS-510A¹¤Òµ»¥»»»ú´æÔÚ5¸ö·ì϶£¬·ì϶ÁìÓòÔ̺¬Ã÷ÎÄ´æ´¢ÃÜÂë¡¢»á»°ID¿ÉÔ¤²â¡¢Ãô¸ÐÊý¾Ý¶Ìȱ¼ÓÃÜ¡¢²»×㱩Á¦¹¥»÷·À»¤»úÔìÒÔ¼°¿Éµ¼ÖÂDoSµÄÒ»¸ö·ì϶ ¡£´Ë±í£¬Moxa IKS-G6824A¹¤Òµ»¥»»»úÖдæÔÚ7¸ö·ì϶£¬Ô̺¬¿Éµ¼ÖÂRCEµÄ»º³åÇøÒç³ö¡¢Ã÷ÎÄ´æ´¢ÃÜÂë¡¢XSS¡¢DoS¡¢CSRF¡¢ÄÚ´æÐ¹Â¶ºÍWeb½çÃæµÄ²»ÕýÈ·½Ó¼û½ÚÔì ¡£¸Ã¹©¸øÉÌÒѾ­°ä²¼ÁËÓйؽ¨¸´²¹¶¡ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82269/security/moxa-industrial-switches-flaws.html

3¡¢Check Point°ä²¼2ÔÂÈ«ÇòÍþвָÊý£¬CoinhiveÈÔ¾ÉÁìÅÜ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ƾ¾ÝCheck Point¼ÙÔìµÄ2ÔÂÈ«ÇòÍþвָÊý£¬¹ÌÈ»CoinhiveÒÑÓÚ3ÔÂ8ÈÕÖÕ³¡ÔËÓª£¬µ«ËüÔÚ2Ô·ÝÈÔÅÅÃû°ñÊ× ¡£Ëæ×ÅÃÅÂÞ±Ò¼ÛÖµµÄ×ÅÂ䣬CoinhiveµÄÍþвֵҲ´Ó2018Äê10ÔµÄ18%µøÖÁ2019Äê1ÔµÄ12£¥ºÍ2ÔµÄ10% ¡£Í¬ÑùÔÚ2Ô·Ý£¬×êÑÐÈËÔ±¼ì²âµ½Õë¶ÔÈÕ±¾¡¢µÂ¹ú¡¢¼ÓÄôóºÍ°Ä´óÀûÑǵȹú¶ÈµÄGandCrab V5.2·Ö·¢»î¶¯ ¡£Õâ¸öеıäÖÖÔÙ´ÎʹµÃ֮ǰ°æ±¾µÄ½âÃܹ¤¾ß²»Æð×÷Óà ¡£2Ô·ÝÅÅÃûǰÈýµÄÒÆ¶¯¶ñÒâÈí¼þÊÇLotoor¡¢HiddadºÍTriada ¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2019/03/11/february-2019s-most-wanted-malware-coinhive-quits-gandcrab-cryptomining-ransomware/

4¡¢·¸×ïÍÅ»ïAlarg53ÀûÓÃJoomlaкóÃÅ·Ö·¢À¬»øÓʼþ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Check Point×êÑÐÍŶӷ¢ÏÖ°£¼°·¸×ïÍÅ»ïAlarg53ÔÚÀûÓÃJoomlaÖеÄкóÃÅÀ´Ö´ÐÐÀ¬»øÓʼþ¹¥»÷ ¡£¹¥»÷ÕßÀûÓÃJoomlaµÄÓʼþ·þÎñJmail£¬Í¨¹ýÔÚHTTPÒªÇóÖжÔUser-Agent×Ö¶Î×¢Èë¶ñÒâ´úÂëÀ´Ö´Ðй¥»÷ ¡£ÔÚ´Óǰ¼¸ÄêÖУ¬Alarg53ÔøÈëÇÖ³¬¹ý1.5Íò¸öÍøÕ¾£¬Æä¹¥»÷Ö¸±êº­¸ÇÃÀ¹ú¡¢Ä«Î÷¸ç¡¢ÆÏÌÑÑÀ¡¢Ó¢¹ú¡¢·¨¹ú¡¢Ó¡¶ÈºÍÈÕ±¾µÈ¹ú¶È£¬ÖØÒªÕë¶Ô½ðÈÚ»ú¹¹¡¢ÒøÐк͵±¾Ö»ú¹¹ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/jmail-breaker-profiting-from-joomlas-mail-service/

5¡¢ÐµÄATM skimmer¹¥»÷£¬¿É½Ù³ÖATMÄÚÖÃÉãÏñÍ·

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ƾ¾ÝKrebs on SecurityµÄÒ»·Ýл㱨£¬×êÑÐÈËÔ±Ôڵ¿ËÈøË¹ÖݺÕË¹ÌØÊеÄATMÉÏ·¢ÏÖÁËеÄskimmer¹¥»÷£¬¹¥»÷Õßͨ¹ý½Ù³ÖATMÖÐÄÚÖõÄÉãÏñÍ·ÒÔÇÔÈ¡Óû§µÄPINÂë ¡£¸ÃskimmerÔ̺¬Ò»¸öÉãÏñÍ·²¿¼þ£¬ÓÃÓÚ¸²¸ÇÔÚATMÄÚÖõݲȫÉãÏñÍ·ÉÏÃæ£¬Óû§ºÜÄÑ´Ó±í²¿¿´µ½¸Ãskimmer ¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/new-atm-skimming-attack-enables-scammers-to-hijack-the-atms-in-built-camera-and-steal-a-users-pin-3d2c4884

6¡¢×êÑÐÍŶӰ䲼¹ØÓÚ¶ñÒâÈí¼þPredator v3.0.7µÄ·ÖÎö»ã±¨

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ù×êÑÐÍŶӷ¢ÏÖ¶ñÒâÈí¼þPredatorµÄбäÖÖv3.0.7 ¡£PredatorʹÓÃC++±àд£¬ÔÚ¶íÂÞ˹µØÏÂÂÛ̳ÉÏÒÔ±ãÒ˵ļÛÖµ£¨2000¬²¼£¬Ô¼30ÃÀÔª£©½øÐÐÏúÊÛ£¬ÖØÒªÓÃÓÚÇÔÈ¡Óû§µÄÊý¾Ý ¡£PredatorѡȡÁËһЩµ¥Ò»µÄ´úÂë»ìºÏ¼¼Êõ£¬Ô̺¬XOR¡¢Base64¡¢´úÌæ¡¢Õ»×Ö·û´®µÈ ¡£ÐµıäÖÖ»¹Ôö³¤Á˶ÔEdgeºÍIEä¯ÀÀÆ÷µÄÖ§³Ö ¡£Âô¼Òͨ¹ýTelegramÏòÂò¼ÒÌṩ¸üзþÎñ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://securelist.com/a-predatory-tale/89779/

ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù