¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180912
Ðû²¼Ê±¼ä 2018-09-12
ƾ֤RiskIQµÄÑо¿£¬£¬£¬Ó¢¹úº½¿Õ¹«Ë¾Êý¾Ýй¶ÊÂÎñµÄ±³ºóÊÇ·¸·¨¼¯ÍÅMageCart¡£¡£¡£¡£MageCart×Ô2015ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬Ö÷ÒªÕë¶Ôµç×ÓÉÌÎñÍøÕ¾£¬£¬£¬ÇÔÈ¡Óû§µÄÒøÐп¨ÐÅÏ¢µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£Æ¾Ö¤RiskIQµÄ˵·¨£¬£¬£¬MageCart¶ÔÓ¢¹úº½¿Õ¹«Ë¾¾ÙÐÐÁËÕë¶ÔÐÔ¹¥»÷£¬£¬£¬²¢Ê¹ÓÃÁ˶¨ÖƵľ籾ºÍרÓõĻù´¡ÉèÊ©¡£¡£¡£¡£ÏÖÔÚ»¹²»ÇåÎúMageCartÔõÑùÔÚÓ¢¹úº½¿Õ¹«Ë¾µÄÍøÕ¾ÉÏ×¢Èë¶ñÒâ´úÂë¡£¡£¡£¡£
2¡¢Ñо¿Ö°Ô±·¢Ã÷Ð®ÖÆÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯

Çå¾²Ñо¿Ö°Ô±Troy Mursch·¢Ã÷Ò»¸öʹÓÃÎó²î£¨CVE-2018-14847£©Ð®ÖÆMikroTik·ÓÉÆ÷¾ÙÐÐÍÚ¿óµÄ¹¥»÷»î¶¯¡£¡£¡£¡£ËäÈ»¸Ã·ÓÉÆ÷µÄ³§ÉÌÒÑÔÚ4Ô·ÝÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡£¬£¬£¬µ«ÈÔÓв¿·ÖÓû§Ã»ÓоÙÐÐÉý¼¶¡£¡£¡£¡£Æ¾Ö¤Mursch±¨¸æµÄÍÚ¿ó¾ç±¾£¬£¬£¬ÔÚShodanÉÏ¿ÉËÑË÷µ½3734¸öMikroTik×°±¸¡£¡£¡£¡£´ó´ó¶¼ÊÜѬȾµÄ×°±¸¶¼¼¯ÖÐÔÚÄÏÃÀÖÞ£¬£¬£¬Ö÷ÒªÊǰÍÎ÷£¨2612£©ºÍ°¢¸ùÍ¢£¨480£©¡£¡£¡£¡£¸ÃÍÚ¿ó¾ç±¾½«MikroTik·ÓÉÆ÷µÄCPUʹÓÃÂÊÔöÌíµ½80%²¢Ò»Á¬¾ÙÐÐÍڿ󡣡£¡£¡£
3¡¢Ñо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíKRONOSµÄбäÌåOsiris

2018Äê7ÔÂSecuronixÑо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíKRONOSµÄбäÌåOsiris¡£¡£¡£¡£Osiris¹²ÌᳫÁËÈý¸ö»®·ÖÕë¶ÔµÂ¹ú¡¢ÈÕ±¾ºÍ²¨À¼µÄ¹¥»÷»î¶¯£¬£¬£¬ÆäÖ÷Òª·Ö·¢·½·¨ÊÇ´¹ÂÚÓʼþ£¬£¬£¬ÔÚÐí¶àÇéÐÎÏÂҲͨ¹ýRIG EKµÈÎó²îʹÓù¤¾ß°ü¾ÙÐзַ¢¡£¡£¡£¡£´¹ÂÚÓʼþÖеĸ½¼þʹÓÃÁËÒÑÖªµÄOffice¹«Ê½±à¼Æ÷Îó²î£¨CVE-2017-11882£©¡£¡£¡£¡£ÐµÄOsiris¶ñÒâÈí¼þÆÕ±éʹÓÃTORÍøÂç¾ÙÐÐÏÂÁîºÍ¿ØÖÆ¡£¡£¡£¡£
4¡¢IBMÐû²¼¹ØÓÚAndroidÒøÐÐľÂíExoBotµÄÔ´ÂëÆÊÎö±¨¸æ

ÓÉÓÚAndroidÒøÐÐľÂíExoBotµÄÔ´´úÂëÔÚ×î½üй¶£¬£¬£¬IBM X-ForceÑо¿ÍŶÓÉîÈëÑо¿Á˸öñÒâÈí¼þµÄÄÚ²¿ÊÂÇé¡£¡£¡£¡£ExoBotÖ÷Ҫͨ¹ýÀ¬»ø¶ÌÐÅÒÔ¼°¹Ù·½Ó¦ÓÃÊÐËÁµÄapp¾ÙÐÐÈö²¥£¬£¬£¬Ê×´ÎÔÚ×°±¸ÉÏÔËÐÐʱ»áɾ³ýͼ±ê¡¢×îС»¯ËùÓÐÕýÔÚÔËÐеÄÓ¦Óò¢ÏÔʾÖ÷ÆÁÄ»£¬£¬£¬ÒÔ±ãÓû§²»»á·¢Ã÷ÈκÎÒì³£¡£¡£¡£¡£ÎªÁËÌÓ±ÜɳÏäºÍ¼ì²â£¬£¬£¬ExoBotÔÚÔËÐÐǰ»á¾ÙÐз´É³Ïä¼ì²é¡¢·´ÆÊÎöÆ÷¼ì²éÒÔ¼°¹ú¼Ò/µØÇø/ÓïÑÔ¹ýÂË¡£¡£¡£¡£ExoBotµÄ»ìÏýÊÖÒÕ°üÀ¨×Ö·û´®±£»£»£»£»¤ºÍ¶ÔC2ͨѶ¾ÙÐÐAES¼ÓÃÜ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityintelligence.com/ibm-x-force-delves-into-exobots-leaked-source-code/
5¡¢Î¢ÈíÐû²¼9ÔÂÇå¾²¸üУ¬£¬£¬ÐÞ¸´°üÀ¨17¸ö¸ßΣÎó²îÔÚÄÚµÄ61¸öÎó²î

΢Èí±¾ÔÂÐÞ¸´µÄÎó²îÖÐÓÐËĸö±»±ê¼ÇΪ¿ÉÄÜÔÚÒ°ÍⱻʹÓ㬣¬£¬°üÀ¨Ó°ÏìÁËËùÓÐWindows°æ±¾µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-8475£©¡¢Windows ALPCÌáȨÎó²î£¨CVE-2018-8440£©¡¢¾ç±¾ÒýÇæÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-8457£©ÒÔ¼°¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2018-8409£©¡£¡£¡£¡£ÁíÍâÁ½¸öÖµµÃ×¢ÖØµÄÎó²îÊÇWindowsÌáȨÎó²î£¨CVE-2018-0868ºÍCVE-2018-8339£©£¬£¬£¬¿ÉÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃWindowsÍýÏëʹÃüAPIÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/microsoft-software-updates.html
6¡¢Ç÷ÊÆ¿Æ¼¼ÈÏ¿ÉÆä¶à¿îMacÓ¦ÓÃÎ¥¹æÍøÂçÓû§µÄÊý¾Ý

Ñо¿Ö°Ô±·¢Ã÷Ç÷ÊÆ¿Æ¼¼µÄ¶à¿îMacÓ¦ÓÃÍøÂçÓû§µÄä¯ÀÀÆ÷ÀúÊ·¼Í¼ºÍϵͳÐÅÏ¢£¬£¬£¬ÏÖÔÚÕâЩӦÓÃÒÑÔÚMac App StoreÖÐϼܡ£¡£¡£¡£ÕâЩӦÓðüÀ¨Dr. Antivirus¡¢Dr. CleanerºÍDr. UnarchiverµÈ£¬£¬£¬ËùÓÐÓ¦ÓÃµÄÆÀ¼ÛÊý¶¼´ïÊýǧÌõ¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÕâЩӦÓÃÍøÂçµ½µÄÐÅÏ¢×îÖÕ¶¼·¢Ë͵½trendmicro.com¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/trend-micro-apps-leak-user-data-removed-from-mac-app-store/
ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí