¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20190318
°ä²¼¹¦·ò 2019-03-18
gnosticplayersÔÙ´ÎÔÚ°µÍøÏúÊÛÓû§ÕË»§£¬ÕâÊǽñÄê2ÔÂÒÔÀ´µÄµÚËÄÅúÊý¾Ý£¬¹²Ô̺¬´Ó6¸öÍøÕ¾ÇÔÈ¡µÄ2600Íò¸öÕË»§ÐÅÏ¢¡£Éæ¼°ÍøÕ¾Ô̺¬Ó¡¶ÈÄáÎ÷ÑÇ´óѧºÍ¾Íҵƽ̨Youthmanual£¨112Íò£©¡¢ÔÚÏß½ø½¨Æ½Ì¨GameSalad£¨1.5Íò£©¡¢ÔÚÏß¹ºÎïÍøÕ¾Bukalapak£¨1300Íò£©¡¢ÈÕ±¾ÔÚÏ߱ʼDZ¾Lifebear£¨386Íò£©¡¢ÔÚÏßÊéµêEstanteVirtual£¨545Íò£©ºÍÔ¤Ô¼ÖÎÀíÍøÕ¾Coubic£¨150Íò£©¡£ÕâЩÊý¾ÝÊÛ¼ÛΪ1.2431¸ö±ÈÌØ±Ò£¨Ô¼5000ÃÀÔª£©¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82539/data-breach/gnosticplayers-4-round.html2¡¢JS Sniffer GMO¶ñÒâ¹¥»÷£¬ÖØÒªÕë¶ÔÓ¢¹úºÍÃÀ¹ú
Group-IB×êÑÐÍŶӷ¢ÏÖеĶñÒâ´úÂëJS Sniffer GMOµÄ¹¥»÷»î¶¯£¬¹¥»÷Õß½«¶ñÒâ´úÂë×¢ÈëµçÉÌÍøÕ¾ÒÔÇÔÈ¡µÞ·ÑÕßµÄÖ§¸¶ÐÅÏ¢£¬Ô̺¬ÒøÐп¨ÐÅÏ¢¡¢ÐÕÃû¡¢Æ¾Ö¤µÈ¡£ÖÁÉÙÓÐÆß¼ÒÓ¢¹úºÍÃÀ¹úµÄµçÉÌÍøÕ¾Êܵ½ÇÖº¦£¬Ô̺¬¹ú¼ÊÌåÓýÓÃÆ·¹«Ë¾FILA UK¡¢¼Ò¾ÓÉè¼ÆÉ̵êjungleeny[.]com¡¢º¦³æÖÎÀí²úÆ·É̵êforshaw[.]com¡¢»¯×±Æ·É̵êabsolutenewyork[.]com¡¢ÔÓ»õµêcajungrocer[.]com¡¢ÑµÁ·É豸É̵êgetrxd[.]comºÍÊÓÆµ±à×ë·þ×°µêsharbor[.]com¡£GMO×Ô2018Äê11ÔÂÒÔÀ´Ò»Ïò»îÔ¾£¬³õ²½¹À¼ÆÖÁÉÙÓÐ5600Ãû¿Í»§µÄÐÅÏ¢ÒѾ±»µÁ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82403/cyber-crime/payment-data-security-breach.html3¡¢ÐÂÎÞÎļþ´¹µö¹¥»÷»î¶¯£¬ÖØÒª·Ö·¢NETWIREºóÃÅ
FireEyeÔÚ2019Äê2Ô·ݷ¢ÏÖÒ»¸öеĴ¹µö¹¥»÷»î¶¯£¬¹¥»÷ÕßʹÓÃVBScript¡¢PowerShellºÍ.NET¿ò¼Üͨ¹ý¹ý³ÌÍÚ¿Õ¼¼ÊõÀ´Ö´ÐÐ×¢Èë¹¥»÷£¬¶ø²»»áÔÚÓ²ÅÌÉÏ´´½¨ÈκÎPEÎļþ¡£Æä·Ö·¢µÄ×îÖÕpayloadÊÇNETWIREºóÃÅ£¬¸ÃºóÃÅÄܹ»½Ó¹ÜC2·þÎñÆ÷µÄºÅÁִÐÐÔ̺¬¼Í¼ÃÜÔ¿¡¢·´µ¯shell¡¢ÇÔÈ¡ÃÜÂë¡¢½ØÆÁµÈÖ°ÄÜ¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2019/03/dissecting-netwire-phishing-campaign-usage-of-process-hollowing.html4¡¢Õë¶ÔÔÆÕË»§µÄ´ó¹æÄ£¹¥»÷£¬ÀûÓÃIMAPºÍÌ¸ÈÆ¹ýMFA
Proofpoint¹Û²ìµ½2018Äê9ÔÂÖÁ2019Äê2ÔÂÆÚ¼äµÄÕë¶ÔÔÆÕË»§µÄ´ó¹æÄ£¹¥»÷£¬¹¥»÷ÕßÖØÒªÕë¶ÔOffice 365ºÍG SuiteÔÆÕÊ»§£¬²¢ÀûÓÃIMAPºÍÌ¸ÈÆ¹ý¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©±£»¤¡£´Ë±í£¬¹¥»÷Õß»¹ÀûÓÃÒѾÔÚÍøÉÏй¶µÄÓû§Í´´¦×ª´¢À´½øÐÐÃÜÂëÅçÉä¹¥»÷¡£×êÑÐÈËÔ±°µÊ¾£¬10%µÄ»îÔ¾Ö¸±êÕË»§Ôâµ½¹¥»÷£¬¶ø1%µÄÖ¸±êÕË»§±»³É¹¦ÉøÈë¡£40%µÄ¹¥»÷ÕßIPµØÖ·ÆðÔ´ÓÚÄáÈÕÀûÑÇ£¬26%ÆðÔ´ÓÚÖйú¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82480/hacking/imap-protocol-attacks.html5¡¢VMware°ä²¼°²È«¸üУ¬½¨¸´WorkstationºÍHorizon¶à¸ö·ì϶
VMware°ä²¼°²È«¸üУ¬½¨¸´¶à¸ö·ì϶£¬Ô̺¬WorkstationÖеÄÌáȨ·ì϶£¨CVE-2019-5511ºÍCVE-2019-5512£©£¬ÕâÁ½¸ö·ì϶ӰÏìÁËWindowsƽ̨µÄWorkstation°æ±¾14.x¼°15.x£¬Linuxƽ̨δÊÜÓ°Ï죬Workstationа汾14.1.6ºÍ15.0.3Öн¨¸´ÁËÕâÁ½¸ö·ì϶£»Horizon Connection ServerÖеÄÐÅϢй¶·ì϶£¨CVE-2019-5513£©£¬¸Ã·ì϶ӰÏìÁËHorizon°æ±¾6.x¡¢7.xºÍ7.5.x£¬½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ°æ±¾6.2.8¡¢7.8ºÍ7.5.2¡£
ÔÎÄÁ´½Ó£º
https://www.us-cert.gov/ncas/current-activity/2019/03/15/VMware-Releases-Security-Updates-Workstation-and-Horizon6¡¢¸»Ê¿Í¨LXÎÞÏß¼üÅÌÒ×ÊÜ×¢Èë¹¥»÷£¬ÉÐÎÞ²¹¶¡°ä²¼
µÂ¹úÉøÈë²âÊÔ¹«Ë¾SySS GmbH·¢ÏÖ¸»Ê¿Í¨LXÎÞÏß¼üÅÌÒ×ÊÜ×¢Èë¹¥»÷µÄÓ°Ï졣ƾ¾Ý×êÑÐÈËÔ±Matthias DeegµÄ±íÊö£¬¹¥»÷Õß¿Éͨ¹ýÏò¼üÅ̵ÄUSB½Ó¹ÜÆ÷·¢ËͶñÒâÐźÅÀ´ÏòÍÆËã»ú×¢Èë»÷¼üÐÅÏ¢¡£¸Ã·ì϶´æÔÚÓÚUSB½Ó¹ÜÆ÷Ö®ÖУ¬USB½Ó¹ÜÆ÷³ýÁ˽ӹܼüÅ̵ļÓÃÜͨѶ֮±í£¬»¹½Ó¹Üδ¼ÓÃܵÄÊý¾Ý°ü¡£×êÑÐÈËÔ±ÓÚÈ¥Äê10ÔÂÏò¸»Ê¿´«µÝ¸æÁ˸÷ì϶£¬µ«¸»Ê¿Í¨ÉÐδ°ä²¼¹Ì¼þ²¹¶¡¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fujitsu-wireless-keyboard-model-vulnerable-to-keystroke-injection-attacks/ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ