ά»ù½âÃÜÐû²¼Êýǧ·ÝÃô¸ÐÎļþ£»£»£»ÓÌËûÖݼӷƶûµÂÏØÔâÀÕË÷Èí¼þ¹¥»÷£»£»£»ÐÂÍÚ¿óľÂíPS1.LUDICROUZ.A
Ðû²¼Ê±¼ä 2019-04-16
4ÔÂ13ÈÕά»ù½âÃÜÔÚTwitterÉÏÐû²¼ÁËÊýǧ·ÝÃô¸ÐÎļþµÄºÏ¼¯ÏÂÔØÁ´½Ó£¬£¬£¬£¬£¬£¬Æ¾Ö¤Î¬»ù½âÃܵĹٷ½ËµÃ÷£¬£¬£¬£¬£¬£¬¸ÃÁ´½ÓÊÇÒÑÐû²¼ÎļþµÄºÏ¼¯£¬£¬£¬£¬£¬£¬±ãÓÚÓû§½¨Éè¾µÏñ¡¢ÍÑʱ»ú¼û»òʹÓÃÔʼÊý¾Ý£¬£¬£¬£¬£¬£¬²¢²»ÊǶ԰¢É£Ææ±»²¶µÄ»ØÓ¦¡£¡£¡£¡£¡£¡£¸ÃÁ´½ÓµÄÍøÖ·Îªhttps://file.wikileaks.org/£¬£¬£¬£¬£¬£¬½öfileÎļþ¼Ð¾Í°üÀ¨1763·ÝÎļþ£¬£¬£¬£¬£¬£¬ÎļþµÄʱ¼ä¶¼ÏÔʾΪ1984Äê1ÔÂ1ÈÕ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://twitter.com/wikileaks2.ApacheÐû²¼Tomcatа汾£¬£¬£¬£¬£¬£¬ÐÞ¸´RCEÎó²î£¨CVE-2019-0232£©
ApacheÈí¼þ»ù½ð»á£¨ASF£©Ðû²¼TomcatµÄа汾£¬£¬£¬£¬£¬£¬ÐÞ¸´Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-0232£©¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚÆôÓÃÁËenableCmdLineArgumentsÑ¡ÏîµÄCGI ServletÖУ¬£¬£¬£¬£¬£¬ÓëJREÏòWindowsת´ï²ÎÊýÀú³ÌÖеÄbugÓйء£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²î¿ÉÔÊÐíÔ¶³Ì¹¥»÷ÕßÔÚÄ¿µÄЧÀÍÆ÷ÉÏÖ´ÐÐí§ÒâÏÂÁ£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂЧÀÍÆ÷±»ÍêÈ«¿ØÖÆ¡£¡£¡£¡£¡£¡£ApacheÔÚTomcat 9.0.18¡¢8.5.40¡¢7.0.94¼°¸ü¸ß°æ±¾ÖÐÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ì¸üС£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/04/apache-tomcat-security-flaw.html3.ÓÌËûÖݼӷƶûµÂÏØÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ÒÑÏò¹¥»÷ÕßÖ§¸¶Êê½ð
ÃÀ¹úÓÌËûÖݼӷƶûµÂÏØÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Ò»ÃûÔ±¹¤µã»÷ÁË´¹ÂÚÁ´½Ó£¬£¬£¬£¬£¬£¬µ¼Ö·¸·¨·Ö×Ó»ñµÃÁËÄÚ²¿ÍøÂçµÄ»á¼ûȨ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÀÕË÷Èí¼þ¶ÔÏà¹ØÓªÒµÏµÍ³µÄÎļþ¾ÙÐÐÁ˼ÓÃÜ¡£¡£¡£¡£¡£¡£¸ÃÏØÕþ¸®±»ÆÈתÏòʹÓÃÖ½ÕžÙÐа칫¡£¡£¡£¡£¡£¡£ËæºóÏØÕþ¸®Ö§¸¶ÁËÊê½ð£¬£¬£¬£¬£¬£¬ÏÖÔÚϵͳÒѾ»Ö¸´Õý³£¡£¡£¡£¡£¡£¡£¸ÃÏØÕþ¸®²¢Î´Í¸Â¶Ïà¹Ø¹¥»÷ϸ½Ú£¬£¬£¬£¬£¬£¬°üÀ¨ÀÕË÷Èí¼þµÄÃû³Æ¼°Ö§¸¶µÄÊê½ð½ð¶îµÈ¡£¡£¡£¡£¡£¡£ÕâÒ»ÊÂÎñÅú×¢£¬£¬£¬£¬£¬£¬µØ·½Õþ¸®ÒòÆä¶ÔÐÅÏ¢ÊÖÒյĸ߶ÈÒÀÀµºÍÆÕ±é½Ï²îµÄÇå¾²ÐÔ¶ø³ÉΪ·¸·¨·Ö×ÓÔ½À´Ô½ÓÐÎüÒýÁ¦µÄÄ¿µÄ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
http://www.securityweek.com/utah-county-struck-ransomware4.д¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Ö¼ÔÚÈö²¥Õë¶ÔÁ¢ÌÕÍð¹ú·À²¿³¤µÄÐéαÐÂÎÅ
4ÔÂ10ÈÕ·ºÆðÁËÕë¶ÔÁ¢ÌÕÍðµÄÒ»¸öд¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬¹¥»÷Õß´ÓÒ»¸öαװ³É¹ú·À²¿Ô±¹¤µÄÓʼþµØµã·¢ËÍÖ¼ÔÚÈö²¥ÐéαÐÂÎŵĴ¹ÂÚÓʼþ¡£¡£¡£¡£¡£¡£¸ÃÓʼþ³ÆÁ¢ÌÕÍð¹ú·À²¿³¤Raimundas KaroblisÔÚÎäÆ÷²É¹ºÀú³ÌÖÐÊÕÊÜÁË58.6ÍòÃÀÔªµÄÐлߣ¬£¬£¬£¬£¬£¬²¢ÇÒÁ¢ÌÕÍðµÄÒ»¼ÒÒøÐÐÌṩÁËÏà¹ØÖ¤ÊµÎļþ¡£¡£¡£¡£¡£¡£¸ÃÐéαÐÂÎÅÔÚÉ罻ýÌåÉÏÆÕ±éÈö²¥¡£¡£¡£¡£¡£¡£¹ú·ÀÊÖÏÂÊôµÄ¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©ÒÑ×îÏȶԴ˴δ¹ÂÚ¹¥»÷Õö¿ªÊӲ죬£¬£¬£¬£¬£¬²¢ÖÒÑÔ¹«ÖÚ²»Òª×ª·¢ÕâЩÓʼþºÍµã»÷ÓʼþÖеĴ¹ÂÚÁ´½Ó¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/spear-phishing-campaign-uses-misinformation-tactics-aimed-at-the-lithuanian-defense-minister-31f9bef75.¹¥»÷ÕßʹÓÃSaaSƽ̨Land LordzÌᳫ´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔAirbnb¿Í»§
¹¥»÷ÕßʹÓÃSaaSƽ̨Land LordzÏòAirbnbÓû§Ìᳫ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£Land LordzÊÇÒ»¸öÈí¼þ¼´Ð§ÀÍÆ½Ì¨£¬£¬£¬£¬£¬£¬¿É×Ô¶¯½¨ÉèºÍÖÎÀíÐéαµÄAirbnbÍøÕ¾¡£¡£¡£¡£¡£¡£ÐéαµÄÍøÕ¾ÉϰüÀ¨Áè¼Ý500´¦·¿²úÁÐ±í£¬£¬£¬£¬£¬£¬Ò»µ©Êܺ¦Õßµã»÷¸ÃÁÐ±í£¬£¬£¬£¬£¬£¬¾Í»áÌø×ªµ½´¹ÂÚÍøÕ¾airbnb.longterm-airbnb[.]co[.]uk£¬£¬£¬£¬£¬£¬¶øÕýµ±ÍøÕ¾µÄÓòÃûÊÇAirbnb.com¡£¡£¡£¡£¡£¡£¸Ã´¹ÂÚÍøÕ¾»áÇÔÈ¡Óû§µÄAirbnbµÇ¼ÃûºÍÃÜÂ룬£¬£¬£¬£¬£¬²¢ÊÔͼÆÈ¡Óû§µÄ×ʽ𡣡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/scammers-leverage-land-lordz-software-as-a-service-to-dupe-airbnb-customers-56265f3b6.ÐÂÍÚ¿óľÂíPS1.LUDICROUZ.A£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°Ä´óÀûÑǺͶ«ÄÏÑÇ
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷Ò»¸öеÄÍÚ¿óľÂíTrojan.PS1.LUDICROUZ.A£¬£¬£¬£¬£¬£¬¸ÃľÂíÖ÷ÒªÕë¶Ô°Ä´óÀûÑÇ¡¢Öйų́Íå¡¢Ô½ÄÏ¡¢ÖйúÏã¸Û¡¢Ó¡¶ÈºÍÖйúµÄÓû§£¬£¬£¬£¬£¬£¬ÊÔͼÍÚÈ¡ÃÅÂÞ±Ò¡£¡£¡£¡£¡£¡£¸ÃľÂíͨ¹ý¶àÖÖÈö²¥·½·¨»ñȡϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬°üÀ¨ÈõÃÜÂë¡¢¹þϣת´ï¡¢WindowsÖÎÀí¹¤¾ßºÍ±©Á¦¹¥»÷¡£¡£¡£¡£¡£¡£¸ÃľÂí»¹Ê¹ÓÃEternalBlueÎó²î¼°Ê¹ÓÃPowerShellÀ´Ìӱܼì²âºÍ¾²Ä¬Èö²¥¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/new-miner-malware-leverages-variety-of-propagation-techniques-to-infect-windows-systems-d0060543


¾©¹«Íø°²±¸11010802024551ºÅ