¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180807

Ðû²¼Ê±¼ä 2018-08-07

¡¾ÆÊÎö±¨¸æ¡¿ICS-CERTÐû²¼ÁªÍøµçÁ¦ÏµÍ³ÍøÂçÇå¾²Ì¬ÊÆÆÊÎö±¨¸æ


CNCERTÏÂÊôµÄ¹¤Òµ»¥ÁªÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄ£¨ICS-CERT£©Õë¶ÔÎÒ¹úÁªÍøµçÁ¦ÏµÍ³µÄÍøÂçÇå¾²Ì¬ÊÆ¾ÙÐÐÆÊÎö£¬£¬£¬£¬2018Äê1-2¼¾¶Èʱ´ú¼à²â·¢Ã÷̻¶ÔÚ¹«¹²»¥ÁªÍøµÄµçÁ¦ÐÐÒµÍøÂç×ʲú1147¸ö£¬£¬£¬£¬²¿·Ö×°±¸±£´æÑÏÖØµÄÇå¾²Îó²î¡£¡£¡£¡£¡£¡£¡£Í¨¹ýÒýÈëÁªÍøµçÁ¦ÏµÍ³ÍøÂçÇå¾²ÍþвָÊý£¬£¬£¬£¬´Ó×°±¸×ʲúºÍWEB×ʲúÁ½¸ö½Ç¶È£¬£¬£¬£¬Á¬ÏµÎó²îÍþвƷ¼¶¡¢Ì½²â´ÎÊýºÍ¹¥»÷´ÎÊý£¬£¬£¬£¬¶ÔÎÒ¹ú²î±ðµØÇøµÄÁªÍøµçÁ¦ÏµÍ³Çå¾²ÍþвָÊý¾ÙÐÐÁË×ÛºÏÆÊÎö£¬£¬£¬£¬·¢Ã÷´ó¶¼Ê¡·ÝÇéÐÎÓÅÒ죬£¬£¬£¬¶ø¹ã¶«¡¢±±¾©µÈÊ¡ÊÐÇå¾²ÐÎʽÏà¶ÔÑÏËà¡£¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.ics-cert.org.cn/portal/page/121/95290efb86b44d7d8cd7ee222f3e9e24.html


¡¾ÆÊÎö±¨¸æ¡¿Ñо¿»ú¹¹Ðû²¼2018ÄêQ2ÍøÂçÍþвÇ÷ÊÆµÄÆÊÎö±¨¸æ


¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚ2018ÄêQ2ÍøÂçÍþвÇ÷ÊÆµÄͳ¼Æ±¨¸æ£¬£¬£¬£¬±¨¸æº­¸ÇÁ˵ڶþ¼¾¶ÈµÄÓÐÕë¶ÔÐԵĹ¥»÷»î¶¯£¬£¬£¬£¬ÈçOperation Parliament¡¢APT×éÖ¯Energetic Bear¡¢Òƶ¯ÍþвZooPark¡¢Õë¶Ô·ÓÉÆ÷µÄ½©Ê¬ÍøÂçVPNFilter¡¢Õë¶ÔÖÐÑÇÊý¾ÝÖÐÐĵÄLuckyMouseÒÔ¼°Õë¶ÔÅ·ÖÞ½ðÈÚ»ú¹¹ºÍÉúÎï×éÖ¯µÄOlympic Destroyer¡£¡£¡£¡£¡£¡£¡£±¨¸æ»¹º­¸ÇÁ˲¿·Ö¶ñÒâÈí¼þ¼°ÆäÐÂÊÖÒÕ£¬£¬£¬£¬ÈçSynAckºÍRoaming MantisµÈ¡£¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/it-threat-evolution-q2-2018/87172/


¡¾ÍþвÇ鱨¡¿FBIÐû²¼Ç徲ͨ¸æ¾¯Ê¾ÎïÁªÍø×°±¸ÖеÄÇ徲Σº¦


ÃÀ¹úFBIÖÒÑÔ³ÆÓû§µÄÎïÁªÍø×°±¸¿ÉÄÜÒѱ»½ÓÊÜ£¬£¬£¬£¬ÕâЩIoT½©Ê¬ÍøÂç±»ÓÃÓÚÌᳫDDoS¹¥»÷µÈ¡£¡£¡£¡£¡£¡£¡£´Ó·ÓÉÆ÷ºÍNAS×°±¸µ½DVR¡¢Ê÷Ý®ÅÉÉõÖÁÊÇÖÇÄܳµ¿â£¬£¬£¬£¬Ò»ÇÐIoT×°±¸¶¼¿ÉÄÜÃæÁÙΣº¦¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿ÉÒɵļ£Ïó°üÀ¨»¥ÁªÍøÔÂʹÓÃÁ¿µÄ´ó·ùÔöÌí¡¢¸ß¶îµÄISPÕ˵¥¡¢×°±¸ÔËÐлºÂý»òÎÞ·¨ÔËÐС¢DNSÅÌÎʺÍÁ÷Á¿Òì³£ÒÔ¼°ÍøÂçÅþÁ¬ËÙÂÊÂýµÈ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ³£»£»£»£»áÕë¶Ô¾ßÓÐÈõ¿ÚÁδÐÞ¸´µÄ¹Ì¼þ»òÈí¼þÎó²îÒÔ¼°Ê¹ÓÃĬÈÏÓû§ÃûºÍÃÜÂëµÄ×°±¸¾ÙÐб©Á¦¹¥»÷¡£¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/fbi-in-smart-device-security/


¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷ѬȾÁè¼Ý10Íǫ̀ÅÌËã»úµÄ½©Ê¬ÍøÂçBlack

Check PointÑо¿ÍŶӷ¢Ã÷ÒøÐжñÒâÈí¼þRamnitµÄеĴó¹æÄ£¹¥»÷»î¶¯£¬£¬£¬£¬ÔÚ2018Äê5ÔÂÖÁ7ÔÂʱ´úÒÔ185.44.75.109ΪC&CЧÀÍÆ÷µÄ½©Ê¬ÍøÂçBlackѬȾÁËÁè¼Ý10Íǫ̀ÅÌËã»ú¡£¡£¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçµÄÌØµã°üÀ¨£º´ó×ÚÑù±¾Ê¹ÓÃÓ²±àÂëµÄÓòÃû¶ø²»ÊÇDGA£»£»£»£»C£¦CЧÀÍÆ÷²¢²»Ìá¹©ÌØÁíÍâÄ£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬ÈçVNC¡¢ÃÜÂëÇÔÈ¡³ÌÐò»òFtpGrabberµÈ£»£»£»£»ÌØÁíÍâÄ£¿£¿£¿£¿£¿£¿é£¨FTPServer¡¢WebInjects£©ÓëRamnit¼¯³ÉÔÚÒ»¸ö°üÖУ»£»£»£»Ramnit×÷ΪÁíÒ»¸ö¶ñÒâÈí¼þNgiowebµÄ¼ÓÔØ³ÌÐò¡£¡£¡£¡£¡£¡£¡£×èÖ¹2018Äê7Ô³õ£¬£¬£¬£¬Ñ¬È¾ÁËNgiowebµÄÅÌËã»úÊýÄ¿Áè¼ÝÁË13.9Íǫ̀¡£¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://research.checkpoint.com/ramnits-network-proxy-servers/


¡¾Îó²î²¹¶¡¡¿HPÐû²¼InkJet´òÓ¡»úµÄ¹Ì¼þ¸üУ¬£¬£¬£¬ÐÞ¸´Á½¸ö¿Éµ¼ÖÂRCEµÄÇå¾²Îó²î


»ÝÆÕÐû²¼InkJet´òÓ¡»úµÄ¹Ì¼þ¸üУ¬£¬£¬£¬ÐÞ¸´ÁËÁ½¸öÇå¾²Îó²î£¨CVE-2018-5924ºÍCVE-2018-5925£©¡£¡£¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î¿Éͨ¹ý·¢ËÍÖÁÄ¿µÄ×°±¸µÄ¶ñÒâÎļþ´¥·¢£¬£¬£¬£¬µ¼Ö¿ÍÕ»»ò¾²Ì¬»º³åÇøÒç³ö£¬£¬£¬£¬×îÖÕÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ×°±¸°üÀ¨Pagewide Pro¡¢DesignJet¡¢OfficeJet¡¢DeskJetºÍEnvyϵÁеÈ¡£¡£¡£¡£¡£¡£¡£½¨ÒéÓû§¾¡¿ì×°ÖÃÕâЩ¹Ì¼þ¸üС£¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.helpnetsecurity.com/2018/08/06/hp-inkjet-printer-vulnerabilities/


¡¾¶ñÒâÈí¼þ¡¿Çå¾²Ñо¿Ö°Ô±·¢Ã÷жñÒâÍÚ¿óÈí¼þZombieBoy


Çå¾²Ñо¿Ö°Ô±James Quinn·¢Ã÷еÄÍÚ¿óÈ䳿ZombieBoy£¬£¬£¬£¬¸Ã¶ñÒâÍÚ¿óÈí¼þ¿ÉΪÆä×÷Õß´øÀ´Ã¿Ô¼ÛÖµÔ¼1000ÃÀÔªµÄÃÅÂÞ±Ò¡£¡£¡£¡£¡£¡£¡£ZombieBoyʹÓõÄÎó²î°üÀ¨RDPÎó²îCVE-2017-9073¡¢SMBÎó²îCVE-2017-0143ºÍCVE-2017-0146µÈ£¬£¬£¬£¬Ò»µ©ÔÚÄ¿µÄϵͳÖн¨ÉèÁ˺óÃÅ£¬£¬£¬£¬Ëü¾Í¿ÉÒÔ½øÒ»²½ÌṩÆäËü¶ñÒâÈí¼þ£¬£¬£¬£¬ÈçÀÕË÷Èí¼þ»ò¼üÅ̼ͼ³ÌÐòµÈ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Åû¶Á˹ØÓÚZombieBoyµÄ¸ü¶àIoC¡£¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75070/malware/zombieboy-monero-miner.html