¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181029

Ðû²¼Ê±¼ä 2018-10-29
1¡¢Çå¾²³§ÉÌÐû²¼µç×ÓÉÌÎñ¼°ÁãÊÛÒµÍþÐ²Ì¬ÊÆ±¨¸æ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

IntSightsºÍRiskifiedÁªºÏÐû²¼µç×ÓÉÌÎñ¼°ÁãÊÛÒµÍþÐ²Ì¬ÊÆ±¨¸æ£¨2018Äê10Ô£©£¬£¬ £¬£¬£¬±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£º°µÍøÊг¡ÉϵÄÁãÊÛÉÌÆ·ÔöÌíÁË278%£»£»£»£»Õë¶Ôµç×ÓÁãÊ۵Ĵ¹ÂÚÍøÕ¾ÔöÌíÁË297%£»£»£»£»2017ÄêµÚËÄÐò¶È£¨¼ÙÆÚ×óÓÒ£©¿ÉÒÉÓ¦ÓóÌÐò¼¤Ôö469%£»£»£»£»Í¬Ñù2017ÄêµÚËÄÐò¶È¶ñÒâµÄÉ罻ýÌåµµ°¸¼¤Ôö345%£»£»£»£»Æ½¾ùÿ¸öÁãÊÛ¹«Ë¾Ì»Â¶ÁË22.1¸öÄÚ²¿µÇÂ¼Ò³Ãæ»ò¿ª·¢Ð§ÀÍÆ÷¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.intsights.com/blog/introducing-the-retail-and-ecommerce-threat-landscape-report


2¡¢Ñо¿»ú¹¹Ðû²¼¹ØÓÚ³¯ÏÊÍøÂçÌØ¹¤»î¶¯µÄÆÊÎö±¨¸æ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤ÍþвÇ鱨¹«Ë¾Recorded FutureµÄ±¨¸æ£¬£¬ £¬£¬£¬»¥ÁªÍø¿ÉÄÜÕýÔÚ³ÉΪ³¯ÏÊ×î¸ßÏòµ¼²ãµÄÒ»ÖÖͨÀý¹¤¾ß£¬£¬ £¬£¬£¬ÓÃÓÚ´´Á¢ÊÕÈë»òΪÆä¾ÙÐÐЧÀÍ¡£¡£¡£¡£ ¡£½ðÕýÈÕÕþȨÒѾ­¿ª·¢³öÒ»ÖÖÆæÒìµÄ»¥ÁªÍøÊ¹ÓúÍʹÓÃģʽ£¬£¬ £¬£¬£¬Ê¹µÃÏòµ¼²ãÔÚÓÐÓÃʱ¿ÉÒÔѸËÙ½ÓÄÉеÄЧÀÍ»òÊÖÒÕ£¬£¬ £¬£¬£¬¶øÔÚ²»ÐèҪʱ½«ÆäÑïÆú¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±·¢Ã÷Ò»¸ö¼ÓÃÜÇ®±ÒÕ©Æ­»î¶¯Marine Chain£¬£¬ £¬£¬£¬Æä±³ºó¾ÍÊÇλÓÚÐÂ¼ÓÆÂµÄ³¯ÏÊÖ÷ÒåÕß¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.recordedfuture.com/north-korea-internet-usage/


3¡¢±ÈÀûʱµçÐŹ«Ë¾BelgacomÔâÊܹ¥»÷ÊÂÎñÒÉΪӢ¹úGCHQËùΪ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


±ÈÀûʱ±¨Ö½De Standaard±¨µÀ³Æ£¬£¬ £¬£¬£¬ÊÓ²ìÖ°Ô±ÒѾ­Ö¤ÊµÕë±ÈÕÕÀûʱµçÐŹ«Ë¾Belgacom£¨ÏÖΪProximus¹«Ë¾£©µÄºÚ¿Í¹¥»÷ÊÇÓ¢¹úÇ鱨»ú¹¹GCHQËùΪ¡£¡£¡£¡£ ¡£¸ÃÊÂÎñ±¬·¢ÔÚ2013Äê9Ô£¬£¬ £¬£¬£¬BelgacomµÄIT»ù´¡ÉèÊ©Ôâµ½¶ñÒâÈí¼þ¹¥»÷¡£¡£¡£¡£ ¡£±¨µÀÖ¸³ö£¬£¬ £¬£¬£¬Óë¹¥»÷BelgacomµÄÌØ¹¤Èí¼þ¾ÙÐÐͨѶµÄIPµØµãÖУ¬£¬ £¬£¬£¬ÓÐÈý¸öIPÊôÓÚÒ»¼ÒÓ¢¹ú¹«Ë¾¡£¡£¡£¡£ ¡£¸Ã¹¥»÷ÊÇÓÉGCHQÌᳫµÄ£¬£¬ £¬£¬£¬´úºÅΪOperation Socialist£¨Éç»áÖ÷ÒåÐж¯£©¡£¡£¡£¡£ ¡£Ó¢º£ÄÚÕþ²¿¾Ü¾øÓëÊÓ²ì×é¾ÙÐÐÏàÖú¡£¡£¡£¡£ ¡£ÈôÊDZ¨µÀÊôʵ£¬£¬ £¬£¬£¬ÕâÒ»ÇéÐÎÓÈÆäÁîÈ˵£ÐÄ¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/77430/intelligence/gchq-hacked-belgacom.html


4¡¢Ñо¿ÍŶÓÑÝʾÔõÑùʹÓÃMicrosoft WordµÄÔÚÏßÊÓÆµ¹¦Ð§Ö´ÐжñÒâ´úÂë

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


CymulateÑо¿ÍŶӷ¢Ã÷Ò»ÖÖʹÓÃMicrosoft WordÖеÄÔÚÏßÊÓÆµ¹¦Ð§Ö´ÐжñÒâ´úÂëµÄÒªÁì¡£¡£¡£¡£ ¡£¸ÃÒªÁìͨ¹ýÔÚWordÎĵµÖÐǶÈëÊÓÆµ£¬£¬ £¬£¬£¬È»ºó¶Ôdocument.xmlÎļþ¾ÙÐб༭£¬£¬ £¬£¬£¬½«ÊÓÆµÁ´½ÓÌæ»»Îª¶ñÒâ´úÂëÀ´Ìᳫ¹¥»÷¡£¡£¡£¡£ ¡£ÕâЩ¶ñÒâ´úÂëÔÚºǫִ́ÐУ¬£¬ £¬£¬£¬²¢¿ÉÄܵ¼Ö½øÒ»²½µÄ´úÂëÖ´ÐÐÇéÐΡ£¡£¡£¡£ ¡£Ñо¿ÍŶÓÐû²¼ÁËÏà¹ØPoCÑéÖ¤ÊÓÆµ£¬£¬ £¬£¬£¬µ«Î¢ÈíÒÔΪÕâ²¢²»ÊÇÒ»¸öÇå¾²Îó²î¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.cymulate.com/abusing-microsoft-office-online-video


5¡¢Ñо¿ÍŶÓÅû¶»ªÇæÖ÷°åµ×²ãÇý¶¯³ÌÐòÖеĶà¸öÇå¾²Îó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

SecureAuth LabsÑо¿ÍŶÓÅû¶»ªÇæÖ÷°åÖеĶà¸öÇå¾²Îó²î£¬£¬ £¬£¬£¬ÕâЩÎó²î±£´æÓڵײãÇý¶¯³ÌÐòAsrDrv101.sysºÍAsrDrv102.sysÖС£¡£¡£¡£ ¡£»£»£»£»ªÇæÊÊÓù¤¾ßASRock RGBLEDµÈ»á×°ÖÃÕâЩÇý¶¯£¬£¬ £¬£¬£¬ÀÖ³ÉʹÓÃÕâЩÎó²î½«µ¼ÖÂÍâµØ¹¥»÷ÕßÌáÉýȨÏÞ¡£¡£¡£¡£ ¡£Îó²î°üÀ¨CR¼Ä´æÆ÷»á¼ûÎó²î£¨CVE-2018-10709£©¡¢í§ÒâÎïÀíÄÚ´æ¶ÁдÎó²î£¨CVE-2018-10710£©¡¢MSR¼Ä´æÆ÷»á¼ûÎó²î£¨CVE-2018-10711£©ºÍ¶Ë¿ÚÓ³ÉäI/O»á¼ûÎó²î£¨CVE-2018-10712£©¡£¡£¡£¡£ ¡£»£»£»£»ªÇæÒÑÔÚ8Ô·ÝÐÞ¸´ÁËÕâЩÎó²î¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.secureauth.com/labs/advisories/asrock-drivers-elevation-privilege-vulnerabilities


6¡¢IBMÒÔ340ÒÚÃÀÔªÊÕ¹ºRed Hat£¬£¬ £¬£¬£¬×齨»ìÏýÔÆÌṩÉÌ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

10ÔÂ29ÈÕÐÂÎÅ£¬£¬ £¬£¬£¬IBMºÍRed HatÅäºÏÐû²¼Á½¼Ò¹«Ë¾ÒѸ濢×îÖÕЭÒ飬£¬ £¬£¬£¬IBM½«ÒÔ340ÒÚÃÀԪȫ×ÊÊÕ¹ºRed Hat£¬£¬ £¬£¬£¬Red Hat½«×÷ΪIBMµÄ»ìÏýÔÆÍŶÓ×ÔÁ¦ÔËÓª¡£¡£¡£¡£ ¡£¸Ã±ÊÉúÒâʹµÃIBM³ÉΪȫÇòÅÅÃûµÚÒ»µÄ»ìÏýÔÆÌṩÉÌ£¬£¬ £¬£¬£¬ÎªÆóÒµÌṩ¿ª·ÅÔÆ½â¾ö¼Æ»®¡£¡£¡£¡£ ¡£Í¨¹ý´Ë´ÎÊÕ¹º£¬£¬ £¬£¬£¬IBM½«¼ÌÐøÖÂÁ¦ÓÚºìñµÄ¿ª·ÅʽÖÎÀí¡¢¿ªÔ´Ð¢Ë³¡¢¼ÓÈ뿪ԴÉçÇøºÍ¿ª·¢Ä£Ê½£¬£¬ £¬£¬£¬ÒÔ¼°Ôö½øÆäÆÕ±éµÄ¿ª·¢Ö°Ô±Éú̬ϵͳ¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬ £¬£¬£¬Í¨¹ýרÀûÔÊÐí¡¢GPLÏàÖúÔÊÐí¡¢¿ª·Å·¢Ã÷ÍøÂçºÍLOTÍøÂçµÈÊÂÇ飬£¬ £¬£¬£¬IBMºÍRed Hat½«¼ÌÐøÖÂÁ¦ÓÚÒ»Á¬µÄ¿ªÔ´×ÔÓÉ¡£¡£¡£¡£ ¡£

 

 Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/ibm-acquire-open-source-giant-red-hat-34-billion


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí