¡¶ÖÐÓ×ÐÍÆóÒµÍøÂ簲ȫָÄÏ¡· £»Imperva³ÆÆäÊý¾Ýй¶µÄÔ­ÒòÊÇAWS APIÃÜÔ¿±»µÁ £»NemtyµÄ½âÃܹ¤¾ß

°ä²¼¹¦·ò 2019-10-12
1¡¢°Ä´óÀûÑÇÍøÂ簲ȫÖÐÐİ䲼¡¶ÖÐÓ×ÐÍÆóÒµÍøÂ簲ȫָÄÏ¡·

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

°Ä´óÀûÑÇÍøÂ簲ȫÖÐÐÄ£¨ACSC£©°ä²¼¡¶ÖÐÓ×ÐÍÆóÒµÍøÂ簲ȫָÄÏ¡·£¬¸ÃÖ¸ÄÏÂÛÊöÁ˳£¼ûµÄÍøÂçÍþвÒÔ¼°ÆóÒµÄܹ»²ÉÈ¡ÄÄЩ´ëÊ©À´± £»¤×Ô¼ºÃâÊÜÇÖº¦¡£¸ÃÖ¸ÄÏרΪÖÐÓ×ÐÍÆóÒµÉè¼Æ£¬Ö¼ÔÚʹÆäÏàʶ¡¢²ÉÈ¡Ðж¯²¢¼ÓÇ¿ÆäÍøÂ簲ȫ·ÀÓùÄÜÁ¦£¬ÒÔÓ¦¶Ô²»ÐÝ·¢Õ¹µÄÍøÂ簲ȫÍþв¡£¸ÃÖ¸ÄϽéÉÜÁ˶ñÒâÈí¼þ¡¢´¹µöÓʼþºÍÀÕË÷Èí¼þµÈ³£¼ûÍþв£¬»¹ÁоÙÁ˶àÖÖÕë¶ÔÍþвµÄÔ¤·À´ëÊ©¡£¸ÃÖ¸Äϲ»½¨ÒéÆóÒµÖ§¸¶Êê½ð£¬ÓÉÓÚÎÞ·¨±£ÕÏ¿ÉÄܳÁлñµÃ½Ó¼ûȨ £»½¨ÒéÆóÒµ²ÉÈ¡×Ô¶¯¸üС¢×Ô¶¯±¸·ÝºÍ¶à³É·ÖÉí·ÝÑéÖ¤µÈ´ëÊ© £»½¨ÒéÔÚÈËÔ±ºÍÁ÷³ÌÖвÉÈ¡½Ó¼û½ÚÔì¡¢ÃÜÂë¶ÌÓï¼°Ô±¹¤Åàѵ £»¸ÃÖ¸ÄÏ»¹¸½´øÁËÓÃÓڲο¼µÄ°²È«ÊõÓï´Ê»ã±í¡£


Ô­ÎÄÁ´½Ó£º

https://www.us-cert.gov/ncas/current-activity/2019/10/10/acsc-releases-small-business-cybersecurity-guide

2¡¢ÐÂMacOS¶ñÒâÈí¼þTarmacÖØÒªÕë¶ÔÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Confiant°²È«×êÑÐÈËÔ±Taha Karim·¢ÏÖÕë¶ÔmacOSÓû§µÄжñÒâÈí¼þTarmac£¨OSX / Tarmac£©¡£¸Ã¶ñÒâÈí¼þµÄ·Ö·¢»î¶¯×Ô2019Äê1ÔÂÆðÍ·£¬µ«Æäʱ×êÑÐÈËÔ±Ö»·¢ÏÖÁ˶ñÒâpayload Shlayer¡£ÔÚÁ½ÖÜǰ°ä²¼µÄÒ»·ÝºóÐø»ã±¨ÖУ¬×êÑÐÈËÔ±°µÊ¾·¢ÏÖÁËShlayerϰȾµÄµÚ¶þ½×¶Îpayload Tarmac¡£Ä¿Ç°Ö»ÖªÂ·ShlayerÔÚÊÜϰȾµÄÖ÷»ú¸ßµÍÔØ²¢×°ÖÃÁËTarmacÖ®ºó£¬Tarmac»áÍøÂçÓйØÓ²¼þÉèÖõľßÌåÐÅÏ¢£¬²¢½«´ËÐÅÏ¢·¢Ë͵½ÆäºÅÁîºÍ½ÚÔì·þÎñÆ÷¡£¶øºóTarmac½«ÆÚ´ýкÅÁµ«ÊÇÓÉÓÚC2·þÎñÆ÷²»³ÉÓã¬Òò¶ø×êÑÐÈËÔ±ÎÞ·¨È·¶¨ÆäÈ«ÊýÖ°ÄÜ¡£¸Ã¶ñÒâ»î¶¯ÖØÒªÕë¶ÔµÄÊÇÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾µÄÓû§¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/macos-users-targeted-with-new-tarmac-malware/

3¡¢·¸×ïÍÅ»ïFIN7¿ª·¢Ð¶ñÒ⹤¾ßBOOSTWRITEºÍRDFSNIFFER

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ƾ¾ÝFireEyeµÄ»ã±¨£¬·¸×ïÍÅ»ïFIN7ÔÚÆä¹¥»÷¹¤¾ß¿âÖÐÔö³¤ÁËÁ½¸öеijÉÔ±-BOOSTWRITEºÍRDFSNIFFER¡£BOOSTWRITEÊÇÒ»¸ö½öÔËÐÐÔÚÄÚ´æÖеĿªÊÍÆ÷£¬ÆäʹÓÃÔËÐÐʱ´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡µÄÃÜÔ¿À´½âÃÜÄÚǶµÄpayload£¬Æ¾¾Ý×êÑÐÈËÔ±µÄ±íÊö£¬ËûÃÇ·ÖÎöµÄÒ»¸öÑù±¾ÊÇÓÉÓÐЧµÄÖ¤ÊéÊðÃûµÄ¡£BOOSTWRITE»á½âÃܲ¢¼ÓÔØÁ½¸öpayloadµÄDLL£¬Ô̺¬CARBANAKºóÃźÍRDFSNIFFER¡£RDFSNIFFERÄܹ»Ê¹¹¥»÷Õ߼ලºÍ´Û¸Äͨ¹ýNCR¹«Ë¾µÄRDFClient³ÉÁ¢µÄºÏ·¨ÏνÓ¡£×êÑÐÈËÔ±×Ü½á³ÆÐ¹¤¾ßºÍ¼¼ÊõµÄÒýÈëÅú×¢FIN7ÔÚ²»ÐÝ·¢Õ¹ÒÔÊÊÓ¦°²È«ÐÔ²»ÐݼÓÇ¿µÄ»·¾³¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2019/10/mahalo-fin7-responding-to-new-tools-and-techniques.html

4¡¢Imperva³ÆÆäÊý¾Ýй¶µÄÔ­ÒòÊÇAWS APIÃÜÔ¿±»µÁ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ImpervaÔÚ8Ô·ÝÅû¶ÁËÊý¾Ýй¶ÊÂÎñ£¬²¢ÔÚ½ñÌì°ä²¼ÁËÒ»·Ý¾ßÌåµÄ¹ýºó»ã±¨¡£¸Ã¹«Ë¾³ÆÕâ´ÎÊý¾Ýй¶µÄÔ­ÒòÊÇAWS APIÃÜÔ¿µÄ±»µÁ£¬¶ø¸ÃÃÜÔ¿ÊǺڿʹÓÒ»¸öÒâ±íÏνӵ½»¥ÁªÍøµÄÄÚ²¿ÏµÍ³ÇÔÈ¡µÄ¡£ºÚ¿ÍʹÓøÃAWS APIÃÜÔ¿½Ó¼ûImpervaµÄÔÆ»ù´¡ÉèÊ©£¬²¢ÕÒµ½Á˸ù«Ë¾ÓÃÓÚ²âÊÔµÄAWS RDS·þÎñ¡£Imperva²¢Î´Åû¶ÉÏÊöÊÂÎñ¼òÖ±ÇÐÈÕÆÚ£¬Òò¶øÉÐÎÞ·¨È·ÈϺڿͽӼûÁ˸ù«Ë¾µÄ·þÎñÆ÷¶à³¤¹¦·ò¡£ImpervaÊ×ϯִÐйٴÖÂÔ¹ÀËãÁËÊÜÓ°ÏìµÄÓû§ÊýÁ¿£¬³ÆÔÚ¹«Ë¾Í¨ÖªÊÜÓ°ÏìµÄ¿Í»§ºó£¬¿Í»§¸ü»»ÁË1.3Íò¸öÃÜÂë¼°1.35Íò¸öSSLÖ¤Ê飬²¢³ÁÐÂÌìÉúÁË1400¶à¸öImperva APIÃÜÔ¿¡£Ö»ÓÐÔÚ2017Äê9ÔÂ15ÈÕ֮ǰÓëImperva×¢²áµÄ¿Í»§²Å»áÊܵ½Ó°Ïì¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/imperva-blames-data-breach-on-stolen-aws-api-key/

5¡¢°²È«×êÑÐÍŶӰ䲼ÀÕË÷Èí¼þNemtyµÄ½âÃܹ¤¾ß


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Tesorion×êÑÐÈËÔ±´´½¨ÁË¿ÉÔÚÀÕË÷Èí¼þNemty 1.4ºÍ1.6°æ±¾ÉϹ¤×÷µÄ½âÃÜÆ÷£¬²¢ÔÚ¿ª·¢1.5°æ±¾µÄ½âÃÜÆ÷¡£Ä¿Ç°½âÃÜÆ÷½öÖ§³ÖÓÐÏÞÊýÁ¿µÄÎļþÀ©´óÃû£¬·Ç³ß¶ÈÎļþÌåʽµÄ¼ÓÃÜÎļþÈÔÎÞ·¨½âÃÜ£¬µ«TesorionÿÌì¶¼ÔÚ³ÖÐøÖ§³ÖеÄÎļþÀàÐÍ¡£Tesorion²¢Î´Ìṩ½âÃÜÆ÷µÄ¿Í»§¶Ë°æ±¾£¬¶øÊÇÑ¡ÔñÔÚ×Ô¼ºµÄ·þÎñÆ÷ÉÏʵÏÖ½âÃÜÃÜÔ¿µÄÌìÉú£¬×êÑÐÈËÔ±°µÊ¾´Ë¾ÙÊÇΪÁËÔ¤·ÀÀÕË÷Èí¼þ¿ª·¢ÈËÔ±·ÖÎö½âÃÜ·¨Ê½²¢ÏàʶÆäËã·¨µÄ·ì϶µØµã¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/nemty-ransomware-decryptor-released-recover-files-for-free/

6¡¢SAP°ä²¼10Ô°²È«¸üУ¬½¨¸´Á½¸ö¹Ø¼ü·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


SAP°ä²¼10Ô°²È«¸üУ¬½¨¸´¶à¸ö°²È«·ì϶¡£ÆäÖÐ×îÑϳÁµÄ·ì϶ΪSAP NetWeaver Process IntegrationµÄB2B×é¼þAS2ÊÊÅäÆ÷ÖеÄÉí·ÝÑé֤ȱʧ·ì϶£¬¸Ã·ì϶±»×·×ÙΪCVE-2019-0379£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õß½Ó¼ûÖÎÀíÖ°Äܼ°ÇÔÈ¡ºÍ°Ñ³ÖÃô¸ÐÊý¾Ý¡£¸Ã·ì϶µÄCVSSÆÀ·ÖΪ9.3¡£µÚ¶þ¸öÑϳÁ·ì϶ÊÇSAP Landscape ManagementÆóÒµ°æÖеÄÒ»¸öÐÅϢй¶·ì϶£¬¸Ã·ì϶±»×·×ÙΪCVE-2019-0380£¬ÆäCVSSÆÀ·ÖΪ9.1¡£´Ë±í£¬SAP»¹½¨¸´ÁËAnywhere¡¢SAP IQºÍSAP Dynamic TieringµÈ²úÆ·µÄÎļþËÑË÷Ëã·¨ÖеÄBinary Planting·ì϶£¨CVE-2019-0381£©£¬¸Ã·ì϶µÄCVSSÆÀ·ÖΪ7.8¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/92335/security/sap-october-2019-security-patch-day.html