2018ÄêÎÒ¹ú»¥ÁªÍøÍøÂç°²È«Ì¬ÊÆ×ÛÊö £»Chrome 0day½Ù³Ö5ÒÚiOSÓû§»á»° £»JustDialй¶1ÒÚÓû§ÐÅÏ¢

°ä²¼¹¦·ò 2019-04-18
1¡¢¹ú¶È»¥ÁªÍøÓ¦¼±ÖÐÐİ䲼¡¶2018ÄêÎÒ¹ú»¥ÁªÍøÍøÂç°²È«Ì¬ÊÆ×ÛÊö¡·


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


4ÔÂ16ÈÕCNCERT/CC°ä²¼¡¶2018ÄêÎÒ¹ú»¥ÁªÍøÍøÂç°²È«Ì¬ÊÆ×ÛÊö¡·£¬¸Ã»ã±¨×ܽáÁË2018ÄêÎÒ¹ú»¥ÁªÍøµÄÍøÂ簲ȫÇé¿ö£¬²¢¶Ô2019ÄêÍøÂ簲ȫÇ÷Ïò½øÐÐÁËÔ¤²â¡£»ã±¨ÖеÄÊý¾Ýº­¸ÇÁË2018ÄêµÄ¶ñÒⷨʽ¡¢°²È«·ì϶¡¢»Ø¾ø·þÎñ¹¥»÷¡¢ÍøÕ¾°²È«¡¢¹¤Òµ»¥ÁªÍø°²È«¡¢»¥ÁªÍø½ðÈÚ°²È«Áù¸ö·½ÃæµÄͳ¼ÆÊý¾Ý¡£ÆëÈ«»ã±¨Çë²Î¿¼ÒÔÏÂÁ´½Ó¡£


Ô­ÎÄÁ´½Ó£º
http://www.cert.org.cn/publish/main/upload/File/2018situation.pdf

2¡¢³¬´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯£¬½Ù³Ö5ÒÚiOSÓû§»á»°


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«³§ÉÌConfiant·¢ÏÖ·¸×ïÍÅ»ïeGobblerÌáÒéÕë¶ÔiOSÓû§µÄ³¬´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯£¬ÒѽٳÖ5ÒÚiOSÓû§µÄ»á»°¡£¸Ã¹¥»÷»î¶¯´Ó4ÔÂ6ÈÕÆðÍ·£¬³ÖÐøÁË6ÌìµÄ¹¦·ò£¬¹¥»÷ÕßʹÓÃÁË8¸ö·ÖÆçµÄ¶ñÒâ¸æ°×ϵÁкÍ30¶à¸öÐéα¸æ°×£¬Ã¿¸öÐéα¸æ°×ϵÁеÄÐÔÃüÖÜÆÚΪ24-48Ó×ʱ֮¼ä¡£¹¥»÷ÕßÖØÒªÕë¶ÔÃÀ¹úºÍÅ·Ã˵ÄiOSÓû§£¬²¢ÔÚ¹¥»÷ÖÐÀûÓÃÁËChromeä¯ÀÀÆ÷Öеķì϶ÒÔÈÆ¹ýɳºÐ¼ì²â¡£¹¥»÷ÕßʹÓÃÁË.worldÓòÃûÍйܵĴ¹µöÍøÕ¾£¬¾­¹ý¶ÌÔݵĸédz֮ºó£¬ÓÖתÏò.siteÓòÃûµÄ´¹µöÍøÕ¾¡£×Ô4ÔÂ14ÈÕÒÔÀ´£¬ÕâЩ´¹µöÍøÕ¾Ò»Ïò´¦ÓÚ»îԾ״̬¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/malvertising-campaign-abused-chrome-to-hijack-500-million-ios-user-sessions/

3¡¢JustDial APIй¶³¬¹ý1ÒÚÓ¡¶Å×û§µÄÓ×ÎÒÐÅÏ¢

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

°²È«×êÑÐÔ±Rajshekhar Rajaharia·¢ÏÖÓ¡¶È±¾µØËÑË÷·þÎñ¹«Ë¾JustDialµÄÒ»¸öAPIδÊܱ £»¤£¬¿É±»ÈκÎÈËÀûÓÃÒÔ¼ìË÷³¬¹ý100ÍòÓû§µÄÓ×ÎÒÐÅÏ¢¡£Ð¹Â¶µÄÊý¾ÝÔ̺¬Óû§µÄÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢ÊÖ»úºÅÂë¡¢¾ÓסµØÖ·¡¢ÐԱ𡢵®ÉúÈÕÆÚ¡¢ÕÕÆ¬¡¢¾ÍÖ°¹«Ë¾µÈ¡£¹ÌÈ»¸ÃAPIÖÁÉÙ´Ó2015ÄêÆð¾Í¿É¹«¿ª½Ó¼û£¬µ«Éв»Ã÷ÏÔÊÇ·ñÒÑÓÐÈËÀûÓÃËüÀ´ÍøÂçJustDialÓû§µÄÓ×ÎÒÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/04/justdial-hacked-data-breach.html

4¡¢Navicent HealthÈ·ÈÏÔâºÚ¿ÍÈëÇÖ£¬27Íò»¼ÕßÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Navicent Health°ä²¼ÉêÃ÷³ÆÆäµç×ÓÓʼþϵͳÔâºÚ¿ÍÈëÇÖ£¬Ô¼27Íò»¼ÕßµÄÐÅϢй¶£¬ÆäÖÐÔ̺¬Ò»Ð©»¼ÕßµÄÉç»á°²È«ºÅÂë¡£¸ÃÊý¾Ýй¶ÊÂÎñ²úÉúÔÚ2018Äê7Ô£¬Navicentµ÷²éÈ·ÈÏÖ»Óеç×ÓÓʼþϵͳÔâµ½ÈëÇÖ£¬Ð¹Â¶µÄÐÅÏ¢Ô̺¬»¼ÕßµÄÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢µØÖ·ÒÔ¼°Õ˵¥ºÍÔ¤Ô¼ÐÅÏ¢¡£Navicent½«ÎªÉç»á°²È«ºÅÂëÔ⵽й¶µÄ»¼ÕßÌṩһÄêµÄÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/navicent-health-data-breach-exposes-patients-personal-info/

5¡¢ÐÂÀÕË÷Èí¼þNamPoHyu Virus£¬ÖØÒªÕë¶ÔSamba·þÎñÆ÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÐÂÀÕË÷Èí¼þNamPoHyu VirusÔÚ»ý¼«½øÐд«²¼£¬ÓëÆäËüÀÕË÷Èí¼þ·ÖÆçµÄÊÇ£¬¸ÃÀÕË÷Èí¼þ²»ÊDZ¾µØ½øÐмÓÃÜ£¬¶øÊÇÔ¶³Ì¼ÓÃܿɽӼûµÄSamba·þÎñÆ÷¡£NamPoHyu»áËÑË÷¿É½Ó¼ûµÄÔ¶³ÌSamba·þÎñÆ÷£¬±©Á¦ÆÆ½âÆäÃÜÂ룬¶øºóÔ¶³Ì¼ÓÃÜÆäÎļþ²¢¿ªÊÍÊê½ðµ¥¾Ý¡£ShodanÏÔʾÓнü50Íò¸ö¿É½Ó¼ûµÄSamba·þÎñÆ÷¿ÉÄܳÉΪָ±ê¡£¸ÃÀÕË÷²¡¶¾³õ´Î³öÏÖÓÚ3Ô·Ý£¬ÆäÃû³ÆÎªMegaLocker£¬¶øºóÔÚ4Ô³õ¸ÄÃûΪNamPoHyu£¬²¢½«.NamPoHyuÀ©´óÃû¸½¼Óµ½¼ÓÃÜÎļþºó¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/nampohyu-virus-ransomware-targets-remote-samba-servers/

6¡¢HawkeyeбäÖÖReborn v9£¬¿É¼Í¼¼üÅ̼°ÇÔÊØÐÅÏ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalos·¢Èç½ñ·Ö·¢HawkEyeбäÖÖReborn v9µÄ´¹µö¹¥»÷»î¶¯¡£ÕâЩ´¹µöÓʼþ¼Ù×°³É·¢Æ±¡¢ÎïÁÏÇåµ¥¡¢¶©µ¥È·ÈϵÈÒµÎñÓʼþ£¬ÀûÓÃOffice´úÂëÖ´Ðзì϶CVE-2017-11882À´ÏÂÔØ²¢ÔËÐÐHawkeye Reborn v9¡£¸ÃбäÖÖÄܹ»¼Í¼¼üÅ̲¢ÇÔÈ¡ä¯ÀÀÆ÷¡¢¼ôÌù°åÖеÄÐÅÏ¢ºÍÍ´´¦£¬»¹Äܹ»½ØÈ¡×ÀÃæ¼°´ÓÉãÏñÍ·ÅÄÉãÕÕÆ¬¡£¸ÃбäÖÖÔÚ×÷Ϊ¡°¸ß¼¶¼à¿Ø½â¾ö¹æ»®¡±½øÐÐÏúÊÛ£¬»¹Ô̺¬¡°·þÎñÌõ¿îºÍ̸¡±£¬²»ÈÝÂò¼ÒÔÚδ¾­Ðí¿ÉµÄÇé¿öÏÂʹÓøÃÈí¼þ£¬²¢²»ÈÝʹÓ÷À²¡¶¾Èí¼þɨÃèÆä¿ÉÖ´ÐÐÎļþ¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/a-new-variant-of-hawkeye-keylogger-reborn-v9-arises-821b972a

ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù