¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181218

Ðû²¼Ê±¼ä 2018-12-18
1¡¢Talos³ÆÉÏÖܵıÈÌØ±ÒÕ¨µ¯ÍþвÓëSextortionڲƭÕß±£´æ¹ØÁª

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÉÏÖÜËÄÃÀ¹úÌìϸ÷µØµÄһЩ¹«¹²»ú¹¹£¨ÀýÈç´óѧ¡¢ÐÂÎÅýÌåµÈ£©ÎüÊÕµ½ÁËÕ¨µ¯ÍþвµÄڲƭµç×ÓÓʼþ£¬£¬£¬£¬Ë¼¿ÆTalos·¢Ã÷¸Ã¶ñÒâ»î¶¯ÏÖʵÉÏÊÇ10Ô·ÝsextortionÕ©Æ­»î¶¯µÄÑݱ䡣¡£¡£¡£ ¡£ÔÚÕ¨µ¯ÍþвÖÐTalos¹²·¢Ã÷ÁË17¸ö²î±ðµÄ±ÈÌØ±ÒµØµã£¬£¬£¬£¬Ö»ÓÐÁ½¸öµØµãÓà¶îΪÕý¡£¡£¡£¡£ ¡£Õ¨µ¯ÍþÐ²Éæ¼°µ½µÄIPµØµãÒ²·¢ËÍÁËÖÖÖÖÀàÐ͵ÄsextortionڲƭÓʼþ¡£¡£¡£¡£ ¡£ÕâÒâζ×ÅÕâЩ×ï·¸Ô¸Òâ±àÔìÈκÎËûÃÇÒÔΪ¿ÉÒÔÓÕÆ­ÊÕ¼þÈ˵ÄÍþвºÍ¹ÊÊ£¬£¬£¬£¬Ñо¿Ö°Ô±Ô¤¼ÆÕâÖÖ¹¥»÷»á¼ÌÐø±¬·¢¡£¡£¡£¡£ ¡£TalosÃãÀøÓû§²»ÒªÖ§¸¶ÈκÎÊê½ð£¬£¬£¬£¬ÓÉÓÚÕâÑù×öÖ»»áÈù¥»÷ÕßÈ·ÈÏËûÃǵÄÒªÁìÊÇÓÐÓõÄ£¬£¬£¬£¬´Ó¶ø±ä±¾¼ÓÀ÷µØ¾ÙÐÐÆäËü¹¥»÷¡£¡£¡£¡£ ¡£

   

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2018/12/bitcoin-bomb-scare-associated-with.html


2¡¢Ñо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þHiddenTearµÄÃ⺬»ìÃܹ¤¾ß

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨



Michael GillespieÐû²¼ÀÕË÷Èí¼þHiddenTearµÄÃ⺬»ìÃܹ¤¾ßHiddenTearDecrypter¡£¡£¡£¡£ ¡£HiddenTearÊÇÒ»¸öÀÕË÷Èí¼þ¼Ò×壬£¬£¬£¬ÆäÍêÕûµÄÔ´´úÂë±»Ðû²¼ÔÚGitHubÉÏ£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÔ´´úÂ뽨Éè×Ô¼ºµÄ±äÖÖ¡£¡£¡£¡£ ¡£ÓÉÓÚԭʼ´úÂëÊÇ¿ÉÒÔ½âÃܵÄ£¬£¬£¬£¬Òò´Ë´ÓÏàͬ´úÂ뽨ÉèµÄÆäËü±äÌåÒ²ÊÇ¿ÉÒÔ½âÃܵġ£¡£¡£¡£ ¡£¸Ã½âÃܹ¤¾ß¿ÉÒÔ½âÃܵıäÌå°üÀ¨8lock8¡¢AnonCrack¡¢BankAccountSummaryµÈ¡£¡£¡£¡£ ¡£

 

 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-hiddentear-ransomware-with-ht-brute-forcer/


3¡¢ÐÂÍøÂç´¹Âڻαװ³ÉOffice 365µÄδËÍ´ï֪ͨ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ISC Handler Xavier Mertens·¢Ã÷Ò»¸öеÄÍøÂç´¹Âڻ£¬£¬£¬£¬¹¥»÷Õßͨ¹ý·¢ËÍαװ³É΢ÈíOffice 365δËÍ´ïÐÂÎŵĴ¹ÂÚÓʼþ£¬£¬£¬£¬ÊÔͼÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡£¡£¡£¡£ ¡£ÈôÊÇÎüÊÕµ½´ËÀàÓʼþµÄÓû§µã»÷ÁËÓʼþÖеÄÔٴη¢ËÍÁ´½Ó£¬£¬£¬£¬ËûÃǽ«»áÌø×ªµ½Ò»¸öÄ£ÄâOffice 365µÇÂ¼Ò³ÃæµÄ´¹ÂÚÍøÕ¾¡£¡£¡£¡£ ¡£Ò»µ©Óû§ÊäÈëµÇ¼ƾ֤£¬£¬£¬£¬JavaScript´úÂ뽫»áÍøÂçÓû§µÄƾ֤²¢½«Óû§Öض¨Ïòµ½Õýµ±µÄOffice 365µÇ¼վµã¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-attack-pretends-to-be-a-office-365-non-delivery-email/


4¡¢PewDiePieºÚ¿ÍÌᳫµÚ¶þÂÖ´òÓ¡»ú¹¥»÷»î¶¯££PrinterHack2

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÉϸöÔÂΪÐû´«YouTube¶©ÔÄÆµµÀPewDiePie£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËÈ«Çò¹æÄ£ÄÚµÄ5Íǫ̀´òÓ¡»ú¡£¡£¡£¡£ ¡£ÏÖÔÚÕâЩ¹¥»÷ÕßÕýÔÚÌᳫµÚ¶þÂÖ¹¥»÷»î¶¯££PrinterHack2¡£¡£¡£¡£ ¡£¹¥»÷ÕßÔÚTwitterÉÏÐû³Æ£¬£¬£¬£¬µÚ¶þÂÖ¹¥»÷»î¶¯Éæ¼°µ½ÈýÖÖЭÒ飬£¬£¬£¬°üÀ¨IPP¡¢JetDirectºÍLPD£¬£¬£¬£¬ÊÜÓ°ÏìµÄ´òÓ¡»úÁè¼Ý25Íǫ̀£¬£¬£¬£¬¶øÄ¿µÄIPµØµãµÄÊýĿԶԶÁè¼Ý200Íò¡£¡£¡£¡£ ¡£¹¥»÷Õß»¹³Æ´Ë´ÎÐж¯ÊÇΪÁËÒýÆðÈËÃǶԴòÓ¡»úÎó²îµÄÖØÊÓ¡£¡£¡£¡£ ¡£

 

 Ô­ÎÄÁ´½Ó£º

https://threatpost.com/pewdiepie-hackers-launch-second-printer-siege-according-to-reports/139968/


5¡¢Jenkins±»ÆØ±£´æÁ½¸öÎó²î£¬£¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»½ÓÊÜ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


CyberArkÇå¾²Ñо¿Ö°Ô±Åû¶ÁËJenkinsÖеÄÁ½¸öÇå¾²Îó²îµÄÊÖÒÕϸ½Ú£¬£¬£¬£¬ÕâÁ½¸öÎó²î¶¼ÔÚ½ñÄêÑ×Ìì±»ÐÞ¸´£¬£¬£¬£¬µ«ÈÔÓÐÊýÒÔǧ¼ÆµÄÔÚÏßJenkinsЧÀÍÆ÷Ò×Êܹ¥»÷¡£¡£¡£¡£ ¡£µÚÒ»¸öÎó²î£¨CVE-2018-1999001£©¿ÉÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâµÇ¼ƾ֤½«JenkinsЧÀÍÆ÷µÄconfig.xmlÉèÖÃÎļþ´ÓhomeÄ¿Â¼ÒÆ¶¯µ½ÆäËüλÖ㬣¬£¬£¬µ±JenkinsЧÀÍÖØÊÓÆôºó£¬£¬£¬£¬¸ÃЧÀÍÆ÷½«Ê¹ÓÃĬÈÏÉèÖ㬣¬£¬£¬ÕâʹµÃÈκÎÈ˶¼¿ÉÒÔ×¢²á²¢»ñµÃÖÎÀíԱȨÏÞ¡£¡£¡£¡£ ¡£µÚ¶þ¸öÎó²î£¨CVE-2018-1999043£©ÔÊÐí¹¥»÷ÕßÔÚЧÀÍÆ÷ÄÚ´æÖжÌÔݵؽ¨ÉèÓû§¼Í¼£¬£¬£¬£¬²¢Ê¹ÓøÃÓû§¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/thousands-of-jenkins-servers-will-let-anonymous-users-become-admins/


6¡¢TwitterÐÞ¸´Ò»¸öÇå¾²Îó²î£¬£¬£¬£¬¿ÉÔÊÐíδÊÚȨ»á¼ûÖ±½ÓÐÂÎÅ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±Terence Eden·¢Ã÷Twitter±£´æÒ»¸öbug£¬£¬£¬£¬ÆäOAuthÊÚȨ¶Ô»°¿òÏÔʾijЩµÚÈý·½Ó¦ÓÃÎÞ·¨»á¼ûÓû§µÄÖ±½ÓÐÂÎÅ£¬£¬£¬£¬µ«ÏÖʵÉÏÕâЩӦÓÿÉÒÔÔÚÓû§²»ÖªÇéµÄÇéÐÎÏ»á¼ûËûÃǵÄÖ±½ÓÐÂÎÅ¡£¡£¡£¡£ ¡£¸ÃÎó²îÓëTwitterµÄ»ùÓÚPINµÄ¸¨ÖúÊÚȨ»úÖÆÓйØ£¬£¬£¬£¬µ±µÚÈý·½Ó¦ÓÃͨ¹ýPIN»ñµÃÏìӦȨÏÞʱ£¬£¬£¬£¬ÕâЩȨÏÞ²¢Ã»ÓÐÔÚOAuthÊÚȨÐÅÏ¢ÖÐ׼ȷµØÏÔʾ³öÀ´¡£¡£¡£¡£ ¡£TwitterÓÚ12ÔÂ6ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£ ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/twitter-fixes-bug-that-gives-unauthorized-access-to-direct-messages/


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí