MITRE CWE 4.0°æÐÂÔöÓ²¼þ°²È«·ì϶£»Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ
°ä²¼¹¦·ò 2020-02-281.MITRE°ä²¼°²È«·ì϶ÁбíCWE 4.0°æ£¬ÐÂÔöÓ²¼þ°²È«·ì϶
Mitre°ä²¼³£¼û°²È«·ì϶ÁбíCWE 4.0°æ£¬¸ÃÁбíÒÑÀ©´óΪº¸ÇÓ²¼þ°²È«·ì϶£¬ÆäÖÐÔ̺¬£ºÔì×÷ºÍÐÔÃüÖÜÆÚÖÎÀíÎÊÌ⣻°²È«Á÷³ÌÎÊÌ⣻¼¯³ÉÎÊÌ⣻ȨÏÞ·ÖÀëºÍ½Ó¼û½ÚÔìÎÊÌ⣻ͨ³£µç·ºÍÂß¼Éè¼ÆÎÊÌ⣻Ö÷ÌâºÍÍÆËãÎÊÌ⣻ÄÚ´æºÍ´æ´¢ÎÊÌ⣻±íΧÉ豸¡¢Æ¬ÉϽṹºÍ½Ó¿Ú/IOÎÊÌ⣻°²È«ÔÓïºÍ¼ÓÃÜÎÊÌ⣻µçÔ´¡¢Ê±ÖӺ͸´Î»ÎÊÌ⣻µ÷ÊԺͲâÊÔÎÊÌ⣻¿çÁìÓòÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/02/27/hardware-security-weaknesses/
2.Magecart¹¥»÷ÕßÀûÓÃαÔìµÄCDNÀ´Èƹý¼ì²â
Magecart¹¥»÷ÕßÀûÓÃαÔìµÄÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©ÓòÃûÀ´Èƹý¼ì²â¡£Malwarebytes LabsµÄ°²È«×êÑÐÈËÔ±·¢ÏÖ£¬¸ÃMagecart¶ñÒâ¾ç±¾¼Ù×°³ÉºÏ·¨µÄjQuery¿â£¬²¢ÇÒͨ¹ýαÔìµÄCDNÓòÃû´«²¼£¬ÆäÒªÇóÀàËÆÓÚ//cdn-sources.org/jquery.unveil.js£¬ÁíÒ»¸öαÔìµÄCDNÓòÃûÒªÇóΪ//cdn-mediafiles.org/cache.php¡£¹¥»÷ÕßʹÓÃÃâ·ÑµÄngrok·þÎñ£¨¿É´´½¨°²È«Ëí·µÄ·´Ïò´úÀíÈí¼þ£©À´ÍøÂç±»µÁµÄÊý¾Ý£¬Õâͨ³£Ô̺¬¹ºÎïÕßµÄÐÕÃû¡¢µØÖ·¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÐÅÓþ¿¨ÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/credit-card-skimmer-uses-fake-cdns-to-evade-detection/
3.Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ£¬ÒÉΪ¹ú¶ÈÖ§³Ö
Sophos×êÑÐÈËÔ±·¢ÏÖÕë¶ÔÔÆ·þÎñÆ÷µÄCloud Snooper¹¥»÷»î¶¯£¬¹¥»÷ÕßÄܹ»ÈƹýÖ¸±ê×éÖ¯µÄAWSºÍÆä·À»ðǽ£¬²¢¿ªÊÍÔ¶¿ØÄ¾Âí¡£×êÑÐÈËÔ±ÔÚ²é³ÔËÐÐÔÚAWSÖеÄÊÜϰȾLinuxºÍWindows EC2ÔÆ·þÎñÆ÷ʱ·¢ÏÖÁ˴˹¥»÷¡£Sophos°µÊ¾ÕâÖÖ¹¥»÷ºÜ¿ÉÄÜÊǹú¶ÈÖ§³ÖµÄ¹¥»÷£¬ËüʹÓõÄRootkit²»½öʹ¹¥»÷ÕßÄܹ»Ô¶³Ì½ÚÔì·þÎñÆ÷£¬²¢ÇÒ»¹Îª¶ñÒâÈí¼þÌṩÁËÓëÆäC2·þÎñÆ÷½øÐÐͨѶµÄÇþ·¡£Sophos»Ø¾øÐ¹Â©Êܺ¦×éÖ¯£¬µ«°µÊ¾Õâ´Î¹¥»÷ËÆºõÊǹ©¸øÁ´¹¥»÷£¬Æä·Ö·¢µÄRATÊÇ»ùÓÚGh0st RATµÄÔ´´úÂë¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171
4.RiskIQ°ä²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ»ã±¨¡·
RiskIQ°ä²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ»ã±¨¡·£¬¸Ã»ã±¨Ö¸³öÒÆ¶¯Éú̬ϵͳÔÚ´ó·ùÔö³¤£¬µ«¹È¸èµÄÖÂÁ¦Ê¹µÃ¶ñÒâAPPµÄÊýÁ¿±ÉÈ˽µ¡£2018Äê¸Ã»ã±¨Í³¼ÆµÄºÚÃûµ¥ÀûÓÃÊýÁ¿Îª213279¸ö£¬¶øÔÚ2019Äê¸ÃÊý×ÖΪ170796¸ö£¬½µÂäÁË20%¡£Òƶ¯APPÒÀÈ»ÊÇÆóÒµ¹¥»÷ÃæµÄ³ÁÒª×é³É²¿ÃÅ£¬ÓÈÆä³¤¶Ì¹Ù·½ÆðÔ´µÄAPP£¬¸Ã»ã±¨»¹Í³¼ÆÁË2019ÄêºÚÃûµ¥APP×î¶àµÄ6¸öÀûÓÃÉ̵ꡣ
ÔÎÄÁ´½Ó£º
https://www.riskiq.com/blog/external-threat-management/2019-mobile-app-threat-landscape-report/
5.ÐÂÒøÐÐľÂíCerberus¿ÉÇÔÈ¡Google AuthenticatorÑéÖ¤Âë
AndroidÒøÐÐľÂíCerberusµÄбäÌå¿ÉÄÜÇÔÈ¡Google AuthenticatorÌìÉúµÄÒ»´ÎÐÔÑéÖ¤Â루OTP£©£¬²¢Èƹý2FA±£»¤½Ó¼ûÓû§µÄÒøÐÐÕË»§¡£GoogleÓÚ2010ÄêÍÆ³öÁËAuthenticator£¬¸ÃÀûÓÃÊÇΪÁË´úÌæ¶ÌÐÅÑéÖ¤Âë¡£ºÉÀ¼Òƶ¯°²È«¹«Ë¾ThreatFabricµÄ°²È«×êÑÐÈËÔ±ÔÚCerberusµÄ×îÐÂÑù±¾Öз¢ÏÖÁËAuthenticator OTPÇÔȡְÄÜ£¬¸ÃľÂíÀÄÓÃAccessibilityÌØÈ¨À´»ñµÃAuthenticator½çÃæµÄÄÚÈݲ¢½«Æä·¢Ë͵½C2·þÎñÆ÷¡£×êÑÐÈËÔ±ÒÔΪ¸Ã±äÌåÈÔ´¦ÓÚ²âÊԽ׶Σ¬µ«¿ÉÄܺܿì¾Í»á°ä²¼¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/
6.Ó¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGR±»ÍϿ⣬ÒÑÔÚºÚ¿ÍÂÛ̳´«²¼
ºÚ¿ÍÔÚµØÏÂÂÛ̳ÉϹ²ÏíÓ¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGRµÄSQLת´¢£¬¾Ý³Æ¸ÃÊý¾Ý¿âÊǴӿɹ«¿ª½Ó¼ûµÄAWS S3´æ´¢Í°»ñÈ¡µÄ¡£Æ¾¾Ý°ä²¼ÏÂÔØÁ´½ÓµÄºÚ¿ÍÂÛ̳³ÉÔ±µÄ˵·¨£¬¸ÃÊý¾Ý¿âÔ̺¬ÖÁÉÙ3.6Íò·âµç×ÓÓʼþºÍÓйØÊÜÓ°ÏìÍøÕ¾£¨tradinggame.au.com¡¢bgr.inºÍS3 Production£©µÄµÇ¼ÐÅÏ¢£¬×ܹ²ÔÚ7¸öZIPÎļþÖд浵ÁË16¸öSQLת´¢¡£Î´¾Ñ¹ËõµÄÊý¾Ý¿â×Ü´óÓ×Ϊ21.5GB¡£Under Breach×êÑÐÈËÔ±Ö¸³öÕâÊÇÒ»¸öÆëÈ«µÄSQLת´¢£¬ÆäÖÐÔ̺¬Óû§Ãû¡¢µç×ÓÓʼþºÍ¹þÏ£ÃÜÂëµÈÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/sql-dump-from-bgr-india-shared-on-hacker-forum/


¾©¹«Íø°²±¸11010802024551ºÅ