¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181203

Ðû²¼Ê±¼ä 2018-12-03
1¡¢APT×éÖ¯Tropic TrooperжñÒâ»î¶¯£¬£¬ £¬£¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³ÎïÐÐÒµ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Windows Defender ATPÍŶӷ¢Ã÷Ò»¸öÕë¶ÔÑÇÖÞÄÜÔ´¡¢Ê³ÎïºÍÒûÁÏÐÐÒµµÄжñÒâ¹¥»÷»î¶¯£¬£¬ £¬£¬»ùÓڶԸûµÄÄ¿µÄÑ¡Ôñ¡¢¹¥»÷Á´ÒÔ¼°¹¤¾ß¼¯µÄÆÊÎö£¬£¬ £¬£¬Ñо¿ÍŶÓÒÔΪ¸Ã»î¶¯ÊÇÓÉAPT×éÖ¯Tropic TrooperÌᳫµÄ¡£¡£¡£¡£¡£¹¥»÷µÄ³õʼÏòÁ¿ÊÇÒ»¸öʹÓÃÁËOffice¹«Ê½±à¼­Æ÷Îó²îCVE-2018-0802µÄ¶ñÒâÎĵµ£¬£¬ £¬£¬¹¥»÷ÕßËæºóʹÓÃbitsadmin.exe´ÓÔ¶³ÌЧÀÍÆ÷ÏÂÔØ²¢Ö´ÐÐËæ»úÃüÃûµÄpayload¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪÕâЩpayloadµÄÖ÷ҪĿµÄÊÇÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/


2¡¢¾ÉƿװоÆ£¬£¬ £¬£¬¶ñÒâ¹¥»÷»î¶¯Butter¼ÓÈëÐÂsambaľÂí

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


GuardiCoreÑо¿ÍŶӷ¢Ã÷¶ñÒâ¹¥»÷»î¶¯butter¼ÓÈëÁËÐÂpayload£ºsambaľÂí¡£¡£¡£¡£¡£butter×îÔç·ºÆðÓÚ2015ÄêÖÐÆÚ£¬£¬ £¬£¬Æä¹¥»÷À´×ÔÓÚÓÐÏ޵öIP£¬£¬ £¬£¬ÏêϸÀ´Ëµ£¬£¬ £¬£¬Ö»ÓÐ4¸öIP±»ÓÃÓÚ²î±ð½×¶ÎµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£ÕâЩIPÀ´×ÔÓÚÏã¸ÛºÍÐÂ¼ÓÆÂ£¬£¬ £¬£¬²¢ÇÒ×Ô2016ÄêÒÔÀ´Ò»Ö±Óë¶ñÒâ»î¶¯Ïà¹ØÁª¡£¡£¡£¡£¡£butterÔçÆÚµÄpayloadÊÇ80 RAT£¬£¬ £¬£¬µ«×Ô2018Äê7ÔÂÆð×îÏÈʹÓÃsambaľÂí¡£¡£¡£¡£¡£sambaľÂíÊǵ䷶µÄRAT£¬£¬ £¬£¬¿ÉÒÔÏÂÔØÎļþ¡¢Ö´ÐÐshellÏÂÁî¡¢ÌᳫDDoS¹¥»÷ÒÔ¼°¾ßÓÐÉý¼¶»úÖÆ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒѾ­ÊӲ쵽Á˸ÃľÂíµÄ7¸ö²î±ðµÄ°æ±¾¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.guardicore.com/2018/11/butter-brute-force-ssh-attack-tool-evolution


3¡¢Õ¹ÍûδÀ´£¬£¬ £¬£¬McAfeeÐû²¼2019ÄêÍøÂçÍþвչÍû±¨¸æ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


McAfeeʵÑéÊÒ¹ØÓÚ2019ÄêÍøÂçÍþвµÄÕ¹Íû°üÀ¨£º·¸·¨·Ö×ӵĵØÏÂͬÃ˹ØÏµ½«Ô½·¢Àο¿£¬£¬ £¬£¬²¢½«½¨Éè¸ü¶àÏàÖúͬ°é¹ØÏµ£¬£¬ £¬£¬ÔöÇ¿ÆäÍþвÐÔ£»£»È˹¤ÖÇÄÜÊÇÌÓ±ÜÊÖÒÕµÄδÀ´£»£»Ð­Í¬ÐÔÍþв½«ÔöÌí£¬£¬ £¬£¬Òò´ËÐèÒª¸ü¶àµÄ×ÛºÏÐÔÏìÓ¦²½·¥£»£»·¸·¨·Ö×ÓʹÓÃÉ罻ýÌåÈö²¥ÐéαÐÅÏ¢£¬£¬ £¬£¬²¢Õë¶ÔÉÌ¼ÒÆ·ÅÆÌᳫڲƭ»î¶¯£»£»Êý¾ÝÉøÂ©¸ü¶àµØÕë¶ÔÔÆ¶Ë£»£»ÓïÒôÖúÊÖ³ÉΪIoT¹¥»÷µÄÏÂÒ»¸öÔØÌ壻£»·¸·¨·Ö×Ó½«¸ü¶àµØÕë¶ÔÉí·Ýƽ̨ºÍ½çÏß×°±¸Ìᳫ¹¥»÷¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securingtomorrow.mcafee.com/mcafee-labs/mcafee-labs-2019-threats-predictions/


4¡¢´ÓδͣЪ£¬£¬ £¬£¬ÒøÐÐľÂíBackSwap3ÔÂÖÁ11Ô¶ñÒâ»î¶¯ÆÊÎö

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Check PointÑо¿ÍŶÓÐû²¼¹ØÓÚÒøÐÐľÂíBackSwapµÄÑݱäÇ÷ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£BackSwap×îÔçÓÚ2018Äê3ÔÂÖÐÑ®±»·¢Ã÷£¬£¬ £¬£¬ÆäʱµÄÑù±¾½ÏΪ¼òÆÓ£¬£¬ £¬£¬Ö÷ÒªÕë¶Ô²¨À¼ÒøÐÐipko.pl¡¢24.plºÍmbank.pl¡£¡£¡£¡£¡£4Ô·Ý£¬£¬ £¬£¬ÐµÄÑù±¾Öн«¸ü¶àµÄÒøÐÐÌí¼ÓΪĿµÄ£¬£¬ £¬£¬²¢×îÏÈÔÚÄ¿µÄÍøÕ¾µÄDOMÖн¨ÉèÐéαµÄÊäÈë±í¸ñ£¬£¬ £¬£¬ÁýÕÖԭʼÊäÈë×ֶΡ£¡£¡£¡£¡£5Ô·Ý£¬£¬ £¬£¬BackSwap×îÏȸú×ÙÊÜѬȾ»úеµÄÊýÄ¿¡£¡£¡£¡£¡£6Ô·Ý£¬£¬ £¬£¬BackSwap½«ÆäÓÐÓúÉÔØÇ¶ÈëBMPͼÏñÖС£¡£¡£¡£¡£7Ô·ÝBackSwapûÓÐÈκλ£¬£¬ £¬£¬µ«ÔÚ8Ô·Ý×îÏÈתÏòÕë¶ÔÎ÷°àÑÀÒøÐС£¡£¡£¡£¡£9Ôµ½11Ô·ÝBackSwapÖ÷ÒªÊǶÔͼÏñÃûÌõÄpayload¾ÙÐÐÐ޸쬣¬ £¬£¬²¢Ìí¼ÓÁ˸ü¶à¼ÓÃܲãºÍ´ó×ÚÀ¬»ø´úÂë¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/the-evolution-of-backswap/


5¡¢Êý¾Ý¿â²»ÉèÃÜÂ룬£¬ £¬£¬Urban¹«Ë¾Áè¼Ý30ÍòÓû§ÐÅϢй¶

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


UrbanÊÇÒ»¼ÒÓ¢¹úµÄÍÆÄô´Òµ¹«Ë¾£¬£¬ £¬£¬ÆäÊý¾Ý¿âÒòδÉèÃÜÂëµ¼ÖÂÁè¼Ý30Íò¿Í»§ÐÅϢй¶¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Oliver Houghͨ¹ýShodan·¢Ã÷Á˸ÃÊý¾Ý¿â£¬£¬ £¬£¬ÏÖÔÚ¸ÃÊý¾Ý¿âÒÑÏÂÏߣ¬£¬ £¬£¬µ«²»ÖªµÀ¸ÃÊý¾Ý¿â̻¶Á˶೤ʱ¼ä¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÖаüÀ¨Áè¼Ý30.9ÍòÓû§¼Í¼£¬£¬ £¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëµÈ¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬Êý¾Ý¿âÖл¹´æ´¢ÁËÁè¼Ý35.1Íò¸öЧÀÍÔ¤¶¨¼Í¼£¬£¬ £¬£¬ÒÔ¼°Áè¼Ý2000¸öÍÆÄÃʦµÄÏà¹ØÐÅÏ¢¡£¡£¡£¡£¡£

 

 Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2018/11/27/urban-massage-data-exposed-customers-creepy-clients/


6¡¢Ë¼¿ÆÐÞ¸´PrimeÔÊÐíÖ¤ÖÎÀíÆ÷ÖеÄSQL×¢ÈëÎó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


˼¿ÆÐÞ¸´ÁËPrimeÔÊÐíÖ¤ÖÎÀíÆ÷£¨PLM£©ÖеÄÒ»¸öSQL×¢ÈëÎó²î£¬£¬ £¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ´ÐÐí§ÒâSQLÅÌÎÊ¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2018-15441£©ÓëPLMµÄWeb¿ò¼Ü´úÂëÓйØ£¬£¬ £¬£¬Æ¾Ö¤Ë¼¿ÆµÄÐÎò£¬£¬ £¬£¬¸ÃÎó²îÊÇÓÉÓÚSQLÅÌÎÊÖÐȱÉÙ¶ÔÓû§ÊäÈë¾ÙÐÐÑéÖ¤µ¼ÖµÄ£¬£¬ £¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËͰüÀ¨SQLÓï¾äµÄ¶ñÒâHTTP POSTÇëÇó´¥·¢¸ÃÎó²î£¬£¬ £¬£¬´Ó¶ø»ñµÃshellȨÏÞ»òÐ޸ļ°É¾³ýPLMÊý¾Ý¿âÖеÄÊý¾Ý¡£¡£¡£¡£¡£PLM 11.0.1¼°Ö®ºóµÄ°æ±¾Êܵ½Ó°Ï죬£¬ £¬£¬½¨ÒéÓû§¾¡¿ì×°ÖÃÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject


ÉùÃ÷£º±¾×ÊѶÓÉÈËÉú¾ÍÊDz©Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí