MITRE CWE 4.0°æÐÂÔöÓ²¼þ°²È«·ì϶£»Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ

°ä²¼¹¦·ò 2020-02-28

1.MITRE°ä²¼°²È«·ì϶ÁбíCWE 4.0°æ £¬ÐÂÔöÓ²¼þ°²È«·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Mitre°ä²¼³£¼û°²È«·ì϶ÁбíCWE 4.0°æ £¬¸ÃÁбíÒÑÀ©´óΪº­¸ÇÓ²¼þ°²È«·ì϶ £¬ÆäÖÐÔ̺¬£ºÔì×÷ºÍÐÔÃüÖÜÆÚÖÎÀíÎÊÌ⣻°²È«Á÷³ÌÎÊÌ⣻¼¯³ÉÎÊÌ⣻ȨÏÞ·ÖÀëºÍ½Ó¼û½ÚÔìÎÊÌ⣻ͨ³£µç·ºÍÂß¼­Éè¼ÆÎÊÌ⣻Ö÷ÌâºÍÍÆËãÎÊÌ⣻ÄÚ´æºÍ´æ´¢ÎÊÌ⣻±íΧÉ豸¡¢Æ¬ÉϽṹºÍ½Ó¿Ú/IOÎÊÌ⣻°²È«Ô­ÓïºÍ¼ÓÃÜÎÊÌ⣻µçÔ´¡¢Ê±ÖӺ͸´Î»ÎÊÌ⣻µ÷ÊԺͲâÊÔÎÊÌ⣻¿çÁìÓòÎÊÌâ  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/02/27/hardware-security-weaknesses/


2.Magecart¹¥»÷ÕßÀûÓÃαÔìµÄCDNÀ´Èƹý¼ì²â


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Magecart¹¥»÷ÕßÀûÓÃαÔìµÄÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©ÓòÃûÀ´Èƹý¼ì²â  ¡£Malwarebytes LabsµÄ°²È«×êÑÐÈËÔ±·¢ÏÖ £¬¸ÃMagecart¶ñÒâ¾ç±¾¼Ù×°³ÉºÏ·¨µÄjQuery¿â £¬²¢ÇÒͨ¹ýαÔìµÄCDNÓòÃû´«²¼ £¬ÆäÒªÇóÀàËÆÓÚ//cdn-sources.org/jquery.unveil.js £¬ÁíÒ»¸öαÔìµÄCDNÓòÃûÒªÇóΪ//cdn-mediafiles.org/cache.php  ¡£¹¥»÷ÕßʹÓÃÃâ·ÑµÄngrok·þÎñ£¨¿É´´½¨°²È«Ëí·µÄ·´Ïò´úÀíÈí¼þ£©À´ÍøÂç±»µÁµÄÊý¾Ý £¬Õâͨ³£Ô̺¬¹ºÎïÕßµÄÐÕÃû¡¢µØÖ·¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÐÅÓþ¿¨ÐÅÏ¢  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/credit-card-skimmer-uses-fake-cdns-to-evade-detection/


3.Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ £¬ÒÉΪ¹ú¶ÈÖ§³Ö


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Sophos×êÑÐÈËÔ±·¢ÏÖÕë¶ÔÔÆ·þÎñÆ÷µÄCloud Snooper¹¥»÷»î¶¯ £¬¹¥»÷ÕßÄܹ»ÈƹýÖ¸±ê×éÖ¯µÄAWSºÍÆä·À»ðǽ £¬²¢¿ªÊÍÔ¶¿ØÄ¾Âí  ¡£×êÑÐÈËÔ±Ôڲ鳭ÔËÐÐÔÚAWSÖеÄÊÜϰȾLinuxºÍWindows EC2ÔÆ·þÎñÆ÷ʱ·¢ÏÖÁ˴˹¥»÷  ¡£Sophos°µÊ¾ÕâÖÖ¹¥»÷ºÜ¿ÉÄÜÊǹú¶ÈÖ§³ÖµÄ¹¥»÷ £¬ËüʹÓõÄRootkit²»½öʹ¹¥»÷ÕßÄܹ»Ô¶³Ì½ÚÔì·þÎñÆ÷ £¬²¢ÇÒ»¹Îª¶ñÒâÈí¼þÌṩÁËÓëÆäC2·þÎñÆ÷½øÐÐͨѶµÄÇþ·  ¡£Sophos»Ø¾øÐ¹Â©Êܺ¦×éÖ¯ £¬µ«°µÊ¾Õâ´Î¹¥»÷ËÆºõÊǹ©¸øÁ´¹¥»÷ £¬Æä·Ö·¢µÄRATÊÇ»ùÓÚGh0st RATµÄÔ´´úÂë  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171


4.RiskIQ°ä²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ»ã±¨¡·


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


RiskIQ°ä²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ»ã±¨¡· £¬¸Ã»ã±¨Ö¸³öÒÆ¶¯Éú̬ϵͳÔÚ´ó·ùÔö³¤ £¬µ«¹È¸èµÄÖÂÁ¦Ê¹µÃ¶ñÒâAPPµÄÊýÁ¿±ÉÈ˽µ  ¡£2018Äê¸Ã»ã±¨Í³¼ÆµÄºÚÃûµ¥ÀûÓÃÊýÁ¿Îª213279¸ö £¬¶øÔÚ2019Äê¸ÃÊý×ÖΪ170796¸ö £¬½µÂäÁË20%  ¡£Òƶ¯APPÒÀÈ»ÊÇÆóÒµ¹¥»÷ÃæµÄ³ÁÒª×é³É²¿ÃÅ £¬ÓÈÆä³¤¶Ì¹Ù·½ÆðÔ´µÄAPP £¬¸Ã»ã±¨»¹Í³¼ÆÁË2019ÄêºÚÃûµ¥APP×î¶àµÄ6¸öÀûÓÃÉ̵ê  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.riskiq.com/blog/external-threat-management/2019-mobile-app-threat-landscape-report/


5.ÐÂÒøÐÐľÂíCerberus¿ÉÇÔÈ¡Google AuthenticatorÑéÖ¤Âë


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


AndroidÒøÐÐľÂíCerberusµÄбäÌå¿ÉÄÜÇÔÈ¡Google AuthenticatorÌìÉúµÄÒ»´ÎÐÔÑéÖ¤Â루OTP£© £¬²¢Èƹý2FA±£»¤½Ó¼ûÓû§µÄÒøÐÐÕË»§  ¡£GoogleÓÚ2010ÄêÍÆ³öÁËAuthenticator £¬¸ÃÀûÓÃÊÇΪÁË´úÌæ¶ÌÐÅÑéÖ¤Âë  ¡£ºÉÀ¼Òƶ¯°²È«¹«Ë¾ThreatFabricµÄ°²È«×êÑÐÈËÔ±ÔÚCerberusµÄ×îÐÂÑù±¾Öз¢ÏÖÁËAuthenticator OTPÇÔȡְÄÜ £¬¸ÃľÂíÀÄÓÃAccessibilityÌØÈ¨À´»ñµÃAuthenticator½çÃæµÄÄÚÈݲ¢½«Æä·¢Ë͵½C2·þÎñÆ÷  ¡£×êÑÐÈËÔ±ÒÔΪ¸Ã±äÌåÈÔ´¦ÓÚ²âÊÔ½×¶Î £¬µ«¿ÉÄܺܿì¾Í»á°ä²¼  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/


6.Ó¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGR±»ÍϿ⠣¬ÒÑÔÚºÚ¿ÍÂÛ̳´«²¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÚ¿ÍÔÚµØÏÂÂÛ̳ÉϹ²ÏíÓ¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGRµÄSQLת´¢ £¬¾Ý³Æ¸ÃÊý¾Ý¿âÊǴӿɹ«¿ª½Ó¼ûµÄAWS S3´æ´¢Í°»ñÈ¡µÄ  ¡£Æ¾¾Ý°ä²¼ÏÂÔØÁ´½ÓµÄºÚ¿ÍÂÛ̳³ÉÔ±µÄ˵·¨ £¬¸ÃÊý¾Ý¿âÔ̺¬ÖÁÉÙ3.6Íò·âµç×ÓÓʼþºÍÓйØÊÜÓ°ÏìÍøÕ¾£¨tradinggame.au.com¡¢bgr.inºÍS3 Production£©µÄµÇ¼ÐÅÏ¢ £¬×ܹ²ÔÚ7¸öZIPÎļþÖд浵ÁË16¸öSQLת´¢  ¡£Î´¾­Ñ¹ËõµÄÊý¾Ý¿â×Ü´óÓ×Ϊ21.5GB  ¡£Under Breach×êÑÐÈËÔ±Ö¸³öÕâÊÇÒ»¸öÆëÈ«µÄSQLת´¢ £¬ÆäÖÐÔ̺¬Óû§Ãû¡¢µç×ÓÓʼþºÍ¹þÏ£ÃÜÂëµÈÐÅÏ¢  ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sql-dump-from-bgr-india-shared-on-hacker-forum/