¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181218
Ðû²¼Ê±¼ä 2018-12-18
ÉÏÖÜËÄÃÀ¹úÌìϸ÷µØµÄһЩ¹«¹²»ú¹¹£¨ÀýÈç´óѧ¡¢ÐÂÎÅýÌåµÈ£©ÎüÊÕµ½ÁËÕ¨µ¯ÍþвµÄڲƵç×ÓÓʼþ£¬£¬£¬£¬Ë¼¿ÆTalos·¢Ã÷¸Ã¶ñÒâ»î¶¯ÏÖʵÉÏÊÇ10Ô·ÝsextortionթƻµÄÑݱ䡣¡£¡£¡£¡£ÔÚÕ¨µ¯ÍþвÖÐTalos¹²·¢Ã÷ÁË17¸ö²î±ðµÄ±ÈÌØ±ÒµØµã£¬£¬£¬£¬Ö»ÓÐÁ½¸öµØµãÓà¶îΪÕý¡£¡£¡£¡£¡£Õ¨µ¯ÍþÐ²Éæ¼°µ½µÄIPµØµãÒ²·¢ËÍÁËÖÖÖÖÀàÐ͵ÄsextortionÚ²ÆÓʼþ¡£¡£¡£¡£¡£ÕâÒâζ×ÅÕâЩ×ï·¸Ô¸Òâ±àÔìÈκÎËûÃÇÒÔΪ¿ÉÒÔÓÕÆÊÕ¼þÈ˵ÄÍþвºÍ¹ÊÊ£¬£¬£¬£¬Ñо¿Ö°Ô±Ô¤¼ÆÕâÖÖ¹¥»÷»á¼ÌÐø±¬·¢¡£¡£¡£¡£¡£TalosÃãÀøÓû§²»ÒªÖ§¸¶ÈκÎÊê½ð£¬£¬£¬£¬ÓÉÓÚÕâÑù×öÖ»»áÈù¥»÷ÕßÈ·ÈÏËûÃǵÄÒªÁìÊÇÓÐÓõ쬣¬£¬£¬´Ó¶ø±ä±¾¼ÓÀ÷µØ¾ÙÐÐÆäËü¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2018/12/bitcoin-bomb-scare-associated-with.html2¡¢Ñо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þHiddenTearµÄÃ⺬»ìÃܹ¤¾ß

Michael GillespieÐû²¼ÀÕË÷Èí¼þHiddenTearµÄÃ⺬»ìÃܹ¤¾ßHiddenTearDecrypter¡£¡£¡£¡£¡£HiddenTearÊÇÒ»¸öÀÕË÷Èí¼þ¼Ò×壬£¬£¬£¬ÆäÍêÕûµÄÔ´´úÂë±»Ðû²¼ÔÚGitHubÉÏ£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÔ´´úÂ뽨Éè×Ô¼ºµÄ±äÖÖ¡£¡£¡£¡£¡£ÓÉÓÚÔʼ´úÂëÊÇ¿ÉÒÔ½âÃܵ쬣¬£¬£¬Òò´Ë´ÓÏàͬ´úÂ뽨ÉèµÄÆäËü±äÌåÒ²ÊÇ¿ÉÒÔ½âÃܵġ£¡£¡£¡£¡£¸Ã½âÃܹ¤¾ß¿ÉÒÔ½âÃܵıäÌå°üÀ¨8lock8¡¢AnonCrack¡¢BankAccountSummaryµÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-hiddentear-ransomware-with-ht-brute-forcer/3¡¢ÐÂÍøÂç´¹Âڻαװ³ÉOffice 365µÄδËÍ´ï֪ͨ

ISC Handler Xavier Mertens·¢Ã÷Ò»¸öеÄÍøÂç´¹Âڻ£¬£¬£¬£¬¹¥»÷Õßͨ¹ý·¢ËÍαװ³É΢ÈíOffice 365δËÍ´ïÐÂÎŵĴ¹ÂÚÓʼþ£¬£¬£¬£¬ÊÔͼÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡£¡£¡£¡£¡£ÈôÊÇÎüÊÕµ½´ËÀàÓʼþµÄÓû§µã»÷ÁËÓʼþÖеÄÔٴη¢ËÍÁ´½Ó£¬£¬£¬£¬ËûÃǽ«»áÌø×ªµ½Ò»¸öÄ£ÄâOffice 365µÇÂ¼Ò³ÃæµÄ´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈëµÇ¼ƾ֤£¬£¬£¬£¬JavaScript´úÂ뽫»áÍøÂçÓû§µÄƾ֤²¢½«Óû§Öض¨Ïòµ½Õýµ±µÄOffice 365µÇ¼վµã¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-attack-pretends-to-be-a-office-365-non-delivery-email/4¡¢PewDiePieºÚ¿ÍÌᳫµÚ¶þÂÖ´òÓ¡»ú¹¥»÷»î¶¯££PrinterHack2

ÉϸöÔÂΪÐû´«YouTube¶©ÔÄÆµµÀPewDiePie£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËÈ«Çò¹æÄ£ÄÚµÄ5Íǫ̀´òÓ¡»ú¡£¡£¡£¡£¡£ÏÖÔÚÕâЩ¹¥»÷ÕßÕýÔÚÌᳫµÚ¶þÂÖ¹¥»÷»î¶¯££PrinterHack2¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚTwitterÉÏÐû³Æ£¬£¬£¬£¬µÚ¶þÂÖ¹¥»÷»î¶¯Éæ¼°µ½ÈýÖÖÐÒ飬£¬£¬£¬°üÀ¨IPP¡¢JetDirectºÍLPD£¬£¬£¬£¬ÊÜÓ°ÏìµÄ´òÓ¡»úÁè¼Ý25Íǫ̀£¬£¬£¬£¬¶øÄ¿µÄIPµØµãµÄÊýĿԶԶÁè¼Ý200Íò¡£¡£¡£¡£¡£¹¥»÷Õß»¹³Æ´Ë´ÎÐж¯ÊÇΪÁËÒýÆðÈËÃǶԴòÓ¡»úÎó²îµÄÖØÊÓ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/pewdiepie-hackers-launch-second-printer-siege-according-to-reports/139968/5¡¢Jenkins±»ÆØ±£´æÁ½¸öÎó²î£¬£¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»½ÓÊÜ

CyberArkÇå¾²Ñо¿Ö°Ô±Åû¶ÁËJenkinsÖеÄÁ½¸öÇå¾²Îó²îµÄÊÖÒÕϸ½Ú£¬£¬£¬£¬ÕâÁ½¸öÎó²î¶¼ÔÚ½ñÄêÑ×Ìì±»ÐÞ¸´£¬£¬£¬£¬µ«ÈÔÓÐÊýÒÔǧ¼ÆµÄÔÚÏßJenkinsЧÀÍÆ÷Ò×Êܹ¥»÷¡£¡£¡£¡£¡£µÚÒ»¸öÎó²î£¨CVE-2018-1999001£©¿ÉÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâµÇ¼ƾ֤½«JenkinsЧÀÍÆ÷µÄconfig.xmlÉèÖÃÎļþ´ÓhomeÄ¿Â¼ÒÆ¶¯µ½ÆäËüλÖ㬣¬£¬£¬µ±JenkinsЧÀÍÖØÊÓÆôºó£¬£¬£¬£¬¸ÃЧÀÍÆ÷½«Ê¹ÓÃĬÈÏÉèÖ㬣¬£¬£¬ÕâʹµÃÈκÎÈ˶¼¿ÉÒÔ×¢²á²¢»ñµÃÖÎÀíԱȨÏÞ¡£¡£¡£¡£¡£µÚ¶þ¸öÎó²î£¨CVE-2018-1999043£©ÔÊÐí¹¥»÷ÕßÔÚЧÀÍÆ÷ÄÚ´æÖжÌÔݵؽ¨ÉèÓû§¼Í¼£¬£¬£¬£¬²¢Ê¹ÓøÃÓû§¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/thousands-of-jenkins-servers-will-let-anonymous-users-become-admins/6¡¢TwitterÐÞ¸´Ò»¸öÇå¾²Îó²î£¬£¬£¬£¬¿ÉÔÊÐíδÊÚȨ»á¼ûÖ±½ÓÐÂÎÅ

Ñо¿Ö°Ô±Terence Eden·¢Ã÷Twitter±£´æÒ»¸öbug£¬£¬£¬£¬ÆäOAuthÊÚȨ¶Ô»°¿òÏÔʾijЩµÚÈý·½Ó¦ÓÃÎÞ·¨»á¼ûÓû§µÄÖ±½ÓÐÂÎÅ£¬£¬£¬£¬µ«ÏÖʵÉÏÕâЩӦÓÿÉÒÔÔÚÓû§²»ÖªÇéµÄÇéÐÎÏ»á¼ûËûÃǵÄÖ±½ÓÐÂÎÅ¡£¡£¡£¡£¡£¸ÃÎó²îÓëTwitterµÄ»ùÓÚPINµÄ¸¨ÖúÊÚȨ»úÖÆÓйأ¬£¬£¬£¬µ±µÚÈý·½Ó¦ÓÃͨ¹ýPIN»ñµÃÏìӦȨÏÞʱ£¬£¬£¬£¬ÕâЩȨÏÞ²¢Ã»ÓÐÔÚOAuthÊÚȨÐÅÏ¢ÖÐ׼ȷµØÏÔʾ³öÀ´¡£¡£¡£¡£¡£TwitterÓÚ12ÔÂ6ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/twitter-fixes-bug-that-gives-unauthorized-access-to-direct-messages/ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí