¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181015

Ðû²¼Ê±¼ä 2018-10-15
1¡¢ÍþвÇ鱨³§ÉÌBluelivÐû²¼½üÆÚƾ֤ÇÔÈ¡µÄÌ¬ÊÆÆÊÎö±¨¸æ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

ƾ֤ÍþвÇ鱨ÉÌBlueliv×îÐÂµÄÆ¾Ö¤ÇÔÈ¡Ì¬ÊÆÆÊÎö±¨¸æ£¬£¬£¬£¬£¬Óë2018Äê3ÔÂÖÁ5ÔÂÏà±È£¬£¬£¬£¬£¬6ÔÂÖÁ8ÔÂʱ´úÔÚ±±ÃÀ½©Ê¬ÍøÂçÖмì²âµ½µÄ±»ÇÔÆ¾Ö¤µÄÊýÄ¿ì­Éý141%¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬ÆäËüµØÇøµÄ±»ÇÔÆ¾Ö¤µÄÊýÄ¿ÔòÓÐËùϽµ£¬£¬£¬£¬£¬Å·Ö޺ͶíÂÞ˹µØÇøÏ½µÁË22%£¬£¬£¬£¬£¬¶øÑÇÖÞµØÇøÔòϽµÁË36%¡£¡£ÔÚÓÃÓÚÇÔÈ¡Óû§Æ¾Ö¤µÄ¶ñÒâÈí¼þ·½Ã棬£¬£¬£¬£¬Pony¡¢KeyBaseºÍLokiPWSÊÇ×îÊܽӴýµÄ¶ñÒâÈí¼þ¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/stolen-credentials-soars-141-north/


2¡¢ÃÀ¹ú·À²¿£¨Îå½Ç´óÂ¥£©Ô¼3ÍòÃûÔ±¹¤µÄÂÃÐмͼй¶

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

ÃÀ¹ú¹ú·À²¿£¨Îå½Ç´óÂ¥£©µÄ²¿·Ö¾ü·½ºÍÎÄÖ°Ö°Ô±µÄСÎÒ˽¼ÒÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ýй¶£¬£¬£¬£¬£¬Ô¼3ÍòÈËÊܵ½Ó°Ïì¡£¡£ÕâÒ»Êý¾Ýй¶ÊÂÎñ¿ÉÄܱ¬·¢ÔÚ¼¸¸öÔÂǰ£¬£¬£¬£¬£¬µ«Ö±µ½×î½ü²Å±»·¢Ã÷¡£¡£¸ÃÊÂÎñÉæ¼°µ½Ò»¼ÒΪ¹ú·À²¿ÌṩЧÀ͵ĵÚÈý·½¹©Ó¦ÉÌ£¬£¬£¬£¬£¬ÏÖÔڸù©Ó¦É̵ÄÉí·ÝÈÔÈ»²»Ã÷È·¡£¡£ÕâÒ»ÊÂÎñÈÔÈ»ÔÚ½øÒ»²½µÄÊÓ²ìÖ®ÖУ¬£¬£¬£¬£¬µ«Ã»ÓÐÈκÎÉñÃØÐÅÏ¢Ô⵽й¶¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/77097/data-breach/pentagon-travel-records-data-breach.html


3¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃÐéαFlash¸üÐÂÀ´Èö²¥µÄ¶ñÒâÍÚ¿óÈí¼þ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

ƾ֤Palo Alto NetworksµÄUnit 42ÍŶӵÄ×îÐÂÑо¿£¬£¬£¬£¬£¬Ò»¸ö¶ñÒâÈí¼þ³ÌÐòͨ¹ýÐéαµÄFlash¸üÐÂÀ´Èö²¥£¬£¬£¬£¬£¬²¢×°ÖöñÒâ¿ó¹¤XMRigÒÔÍÚÈ¡ÃÅÂÞ±Ò¡£¡£ÓÉÓڸöñÒâÈí¼þ³ÌÐòȷʵ»áÔÚÄ¿µÄÅÌËã»úÉÏÏÂÔØ²¢×°ÖÃ×îа汾µÄFlash£¬£¬£¬£¬£¬Õâ½øÒ»²½ÔöÌíÁËÆäÍâòÉϵÄÕýµ±ÐÔ¡£¡£Ñо¿ÍÅÐÐÁгöÁË2018Äê3ÔÂ25ÈÕÖÁ9ÔÂ10ÈÕʱ´ú¸ÃÐéαFlash¸üеÄ473¸öÎļþÃûºÍURL¡£¡£


Ô­ÎÄÁ´½Ó£º

https://researchcenter.paloaltonetworks.com/2018/10/unit42-fake-flash-updaters-push-cryptocurrency-miners/


4¡¢Ñо¿ÍŶӷ¢Ã÷Magecart¹¥»÷µÄбäÖÖCartThief

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

The Media TrustÑо¿ÍŶӷ¢Ã÷Magecart¹¥»÷µÄÒ»¸öбäÖÖCartThief¡£¡£Æ¾Ö¤¸ÃÑо¿ÍŶӵÄ˵·¨£¬£¬£¬£¬£¬CartThiefÒ»Ö±ÔÚÕë¶Ô½ÏС¹æÄ£µÄµç×ÓÉÌÎñ¹«Ë¾¡£¡£CartThiefÀàËÆÓÚMagecartµÄÐÐΪ£¬£¬£¬£¬£¬ÓÃÓÚÍøÂçÖ§¸¶Ò³ÃæÉϵÄСÎÒ˽¼ÒÐÅÏ¢ºÍ²ÆÎñÐÅÏ¢¡£¡£µ«CartThiefÓëÆäËüMagecart±äÖÖ²î±ðµÄÊÇ£¬£¬£¬£¬£¬CartThiefûÓÐʹÓÃcookieÀ´Ê¶±ðÓû§£¬£¬£¬£¬£¬Õâ¿ÉÄÜÊÇΪÁË×èÖ¹ÒýÆðÏÓÒɺÍÌӱܼì²â¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/no-cookies-for-cartthief-a-new/


5¡¢Ñо¿Ö°Ô±ÔÚ΢Èí¹Ù·½É̳ÇÖз¢Ã÷Ò»¸ö¶ñÒâµÄ¹ã¸æµã»÷Æ÷

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

Ñо¿Ö°Ô±ÔÚ΢Èí¹Ù·½É̳ÇÖз¢Ã÷Ò»¸öÃûΪAlbum by Google Photos£¨¹È¸èÏà²á£©µÄ¶ñÒâ³ÌÐò£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þαװ³ÉÀ´×Թȸ裬£¬£¬£¬£¬µ«ÏÖʵÉÏÓÃÓÚÔÚWindows 10ÖÐÒ»Ö±·­¿ªÒþ²ØµÄ¹ã¸æ¡£¡£¸Ã¶ñÒâÈí¼þ°üÀ¨Èý¸öÎļþ£ºBlock Craft 3D.dll¡¢Block Craft 3D.exeºÍBlock Craft 3D.xr£¬£¬£¬£¬£¬Ëü½«ÔÚºǫ́ÅþÁ¬µ½ÖÖÖÖ¹ã¸æURL²¢·­¿ªËüÃÇ¡£¡£ÓÉÓÚ¹ã¸æ²»»áÔÚǰ̨ÏÔʾ£¬£¬£¬£¬£¬Òò´ËÈôÊÇ¹ã¸æ°üÀ¨ÒôƵ£¬£¬£¬£¬£¬Óû§¿ÉÄÜ»áÌýµ½Ï£ÆæµÄÉùÒô¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ad-clicker-hiding-as-google-photos-app-found-in-microsoft-store/


6¡¢Juniper NetworksÐû²¼Junos OSµÄÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´30¶à¸öÎó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

Juniper NetworksÐû²¼Junos OSµÄÇå¾²¸üУ¬£¬£¬£¬£¬¹²ÐÞ¸´30¶à¸öÎó²î£¬£¬£¬£¬£¬ÆäÖнÏΪÑÏÖØµÄÎó²î°üÀ¨¿Éµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì»á¼ûµÄÎó²î£¨CVE-2018-0044£©¡¢¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐеĻº³åÇøÒç³öÎó²î£¨CVE-2018-7183£©¡¢¿Éµ¼ÖÂÄÚºËÍß½âºÍDoSµÄÎó²î£¨CVE-2018-0049£©ÒÔ¼°XSSÎó²î£¨CVE-2018-0047£©µÈ¡£¡£½¨ÒéÓû§¾¡¿ì×°ÖÃÕâЩ¸üС£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/77047/hacking/juniper-networks-junos-flaws.html


ÉùÃ÷£º±¾×ÊѶÓÉÈËÉú¾ÍÊDz©Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí