Ê׸öÀÄÓÃDNS over HTTPSºÍ̸µÄ¶ñÒâÈí¼þGodlua£»Chrome V8ÒýÇæÖеÄÄÚ´æ°Ü»µ·ì϶£¬¿Éµ¼ÖÂRCE
°ä²¼¹¦·ò 2019-07-04
×êÑÐÈËÔ±·¢ÏÖÊ׸öÀÄÓÃDNS over HTTPS£¨DoH£©ºÍ̸µÄ¶ñÒâÈí¼þGodlua£¬¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÓÃLua±àдµÄ¶ñÒâÈí¼þ£¬Æä×÷ÓÃÀàËÆÓÚºóÃÅ¡£¹¥»÷ÕßÀûÓ÷ì϶£¨CVE-2019-3396£©À´Ï°È¾Linux·þÎñÆ÷¡£×êÑÐÈËÔ±·¢ÏÖµÄÁ½¸öGodluaÑù±¾¶¼Ê¹ÓÃDNS over HTTPSÒªÇóÀ´»ñÈ¡ÓòÃûTXT£¬ÆäÖд洢ÁËC£¦C·þÎñÆ÷µÄURL¡£ÕâÖÖ´ÓDNSÎı¾¼Í¼ÖмìË÷µÚ¶þ/µÚÈý½×¶ÎC£¦C·þÎñÆ÷URLµØÖ·µÄ¼¼Êõ²¢²»ÐÂÏÊ£¬µ«Ê¹ÓÃDoHÒªÇó¶ø²»ÊÇ´«Í³µÄDNSÒªÇóΪ³õ´Î³öÏÖ¡£DoH£¨DNS£©ÒªÇó¶ÔµÚÈý·½¹Û²ìÕß¼ÓÃÜÇÒ²»Ë½¼û£¬ÕâÔ̺¬ÒÀÀµ±»¶¯DNS¼à¿ØÀ´×èÖ¹¶ÔÒÑÖª¶ñÒâÓòÒªÇóµÄÍøÂ簲ȫÈí¼þ¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/first-ever-malware-strain-spotted-abusing-new-doh-dns-over-https-protocol/
2¡¢WannaLockerбäÌåÔ̺¬Èý³ÁÍþв£¬¶Ô×¼°ÍÎ÷ËļÒÒøÐÐ
Avast×êÑÐÈËÔ±Nikolaos Chrysaidos·¢ÏÖÊÖ»úÀÕË÷Èí¼þWannaLockerµÄбäÌåÔ̺¬Èý³ÁÍþв£¬ÖØÒªÕë¶Ô°ÍÎ÷µÄËļÒÒøÐС£Æ¾¾ÝChrysaidosµÄµ÷²éÁ˾֣¬WannaLockerбäÌåÊÇWannaCryµÄ·ÂÕÕÕߣ¬¸Ã±äÌ彫¼äµýÈí¼þ¡¢RATºÍÒøÐÐľÂí°ó¸¿ÔÚÒ»¸öÀÕË÷Èí¼þ°üÖС£¸Ã±äÌå¿ÉÍøÂçÎı¾ÐÅÏ¢¡¢Í¨»°¼Í¼¡¢µç»°ºÅÂëºÍÐÅÓþ¿¨ÐÅÏ¢¡£×êÑÐÈËÔ±Éв»Ã÷ÏԸñäÌåÈëÇÖÊÖ»úµÄϰȾÏòÁ¿£¬µ«ÒÉ»óËü¿ÉÄÜÊÇͨ¹ý¶ñÒâÁ´½Ó»òµÚÈý·½ÉÌµê½øÐд«²¼¡£
ÔÎÄÁ´½Ó£ºhttps://blog.avast.com/wannalocker-targets-banks-in-brazil
3¡¢·¸×ïÍÅ»ïSilence Group´ÓÃϼÓÀ¹úÈý¼ÒÒøÐÐÇÔÈ¡300ÍòÃÀÔª
´ÓÃϼÓÀ¹úÒøÐÐÇÔÈ¡ÖÁÉÙ300ÍòÃÀÔªµÄ¹¥»÷¿ÉÄÜÊÇ·¸×ïÍÅ»ïSilence GroupËùΪ¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2016ÄêÆðÍ·»îÔ¾£¬°²È«³§ÉÌGroup-IBÒÔΪ¸ÃÍÅ»ïµÄÖ÷ÌâÊÇÁ½Ãû¶íÓï·¸×ïÕß¡£5Ô·ÝÃϼÓÀ¹úµÄÈý¼Ò¸öÈËÒøÐУ¨DBBLÒøÐÓ×¢NCCÒøÐкÍPrimeÒøÐУ©ÔâºÚ¿Í¹¥»÷£¬Ëðʧ³¬¹ý300ÍòÃÀÔª¡£Æ¾¾ÝÓйØÖ¤¾Ý£¬Group-IBÒÔΪ¸Ã¹¥»÷ÊÂÎñÊÇÓÉSilence GroupËùΪ¡£Group-IB·¢ÏÖDBBLµÄÖ÷»úÓëSilence GroupµÄC2·þÎñÆ÷½øÐÐͨѶ£¬¸ÃͨѶÖÁÉÙ´Ó2019Äê2Ô·ݾÍÒÑÆðÍ·¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/silence-group-likely-behind-recent-3m-bangladesh-bank-heist/
4¡¢ÃÀ¹úÍøÂç˾Á°ä²¼ÓйØÀûÓÃOutlook·ì϶µÄ¹¥»÷»î¶¯µÄ¾¯±¨
ÃÀ¹úÍøÂç˾ÁÔÚTwitterÉϰ䲼¹ØÓÚÀûÓÃ΢ÈíOutlookÖÐÒÑÖª·ì϶µÄ¾¯±¨¡£¸Ã·ì϶±»¸ú×ÙΪCVE-2017-11774£¬¹¥»÷ÕßÀûÓô˷ì϶ÔÚµ±¾ÖÍøÂçÉϲ¿Êð¶ñÒâÈí¼þ¡£¸Ã·ì϶ÓÉSensePost°²È«×êÑÐÈËÔ±·¢ÏÖ£¬¿ÉÔÊÐí¹¥»÷ÕßÈÆ¹ýOutlookɳÏä²¢ÔÚϵͳÉÏÔËÐжñÒâ´úÂë¡£APT33ÔøÔÚ2018ÄêÀûÓø÷ì϶ÏòÖ¸±êϵͳÉϲ¿Êð¶ñÒâÈí¼þ¡£¸Ã·ì϶µÄ½¨¸´²¹¶¡ÔÚ2017Äê10Ô°䲼£¬½¨Ò黹δװÖò¹¶¡µÄÓû§¾¡¿ì¸üС£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/us-cyber-command-issues-alert-about-attack-campaign-exploiting-outlook-vulnerability-fbcb95bf
5¡¢×êÑÐÍŶÓÅû¶Chrome V8ÒýÇæÖеÄÄÚ´æ°Ü»µ·ì϶£¬¿Éµ¼ÖÂRCE
˼¿ÆTalosÅû¶Google ChromeµÄV8 JavaScriptÒýÇæÖеÄÄÚ´æ°Ü»µ·ì϶£¨CVE-2019-5831£©£¬¸Ã·ì϶¿ÉÔÊÐí¹¥»÷ÕßÔÚÖ¸±êϵͳÉÏÖ´ÐÐËÁÒâ´úÂ롣ƾ¾ÝTalosµÄ±íÊö£¬¶ñÒâJavaScript´úÂë¿ÉÄÜ»áÔÚV8 7.3.492.17Öд¥·¢ÄÚ´æ°Ü»µ£¬µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£ÎªÁË´¥·¢´Ë·ì϶£¬Êܺ¦Õß±ØÒª½Ó¼û¶ñÒâÍøÒ³¡£¸Ã·ì϶µÄCVSSÆÀ·ÖΪ7.5£¬¹È¸èÒÑÔÚ3Ô·ݽ¨¸´ÁËÕâ¸ö·ì϶¡£
ÔÎÄÁ´½Ó£ºhttps://blog.talosintelligence.com/2019/07/vulnerability-spotlight-Google-V8-June-19.html
6¡¢³¬¹ý30¸öVMware²úÆ·Êܵ½Linux SACK·ì϶ӰÏì
VMwareÈ·ÈÏSACK PanicºÍSACK Slowness·ì϶ӰÏìÆä¶à¸ö²úÆ·¡£¸Ã¹«Ë¾Òѽ«SACK PanicÆÀ¼¶Îª³ÁÒª²¢¸³Óè7.5µÄCVSSÆÀ·Ö£¬SACK SlownessΪÖеȺÍCVSSÆÀ·Ö5.3¡£Æ¾¾ÝVMware°ä²¼µÄ°²È«²¼¸æ£¬³É¹¦ÀûÓÃÕâЩ·ì϶¿ÉÄܻᵼÖÂÖ¸±êϵͳ±ÀÀ£»òÑϳÁ½µµÍ»úÄÜ¡£ÊÜÓ°ÏìµÄ²úÆ·Ô̺¬vCenter Server Appliance¡¢vCloud¡¢vRealizeºÍvSphereµÈ¡£VMwareÔÚΪÿ¸öÊÜÓ°ÏìµÄ²úÆ·¿ª·¢²¹¶¡£¬µ«µ½Ä¿Ç°ÎªÖ¹Ëü½ö°ä²¼ÁËSD-WANÈí¼þ¡¢Unified Access GatewayºÍvCenter Server ApplianceµÄ¸üС£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/many-vmware-products-affected-sack-linux-vulnerabilities


¾©¹«Íø°²±¸11010802024551ºÅ