ά»ù½âÃÜÊ×´´È˱»²¶£»£»£»£»£»Apache TomcatÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»EMOTETй¥»÷»î¶¯
Ðû²¼Ê±¼ä 2019-04-12
ά»ù½âÃÜÊ×´´È˰¢É£Ææ£¨Julian Assange£©ÔÚ¶ò¹Ï¶à¶ûפÂ×¶Ø´óʹ¹Ý±»²¶£¬£¬£¬£¬Ö®Ç°°¢É£ÆæÔøÔڸôóʹ¹Ý±ÜÄѳ¤´ï7ÄêµÄʱ¼ä¡£¡£¡£¡£Æ¾Ö¤Â׶ش󶼻ᾯԱ¾ÖÐû²¼µÄÒ»·Ý¼ò¶Ì˵Ã÷£¬£¬£¬£¬ÔÚ¶ò¹Ï¶à¶ûÕþ¸®³·»ØÆäÕþÖκǻ¤ºó£¬£¬£¬£¬Ó¢¹ú¾¯Ô±½øÈëʹ¹Ý½«°¢É£Ææ¾Ð²¶¡£¡£¡£¡£Ó¢¹ú¾¯·½ÌåÏÖ½«¾¡¿ìÈð¢É£ÆæÔÚÂ×¶ØÎ÷ÃôÇøµÄ·¨Í¥³öÍ¥¡£¡£¡£¡£ÃÀ¹ú˾·¨²¿Ò²³Æ°¢É£Ææ½«ÃæÁÙÒý¶ÉËßËÏ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/04/wikileaks-julian-assange-arrested.html
2¡¢Apache TomcatÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-0232£©

4ÔÂ10ÈÕApache¹Ù·½Ðû²¼Í¨¸æ³Æ½«ÔÚа汾ÖÐÐÞ¸´Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-0232£©¡£¡£¡£¡£ÓÉÓÚJREÔÚ½«²ÎÊýת´ïµ½WindowsÇéÐÎʱCGI ServletÖб£´æÊäÈëÑéÖ¤¹ýʧ£¬£¬£¬£¬µ¼ÖÂÔ¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÇëÇóÒÔTomcatµÄȨÏÞÔÚϵͳÉÏ×¢ÈëºÍÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£ÊÜÓ°ÏìµÄTomcat°æ±¾°üÀ¨9.0.13¡¢9.0.14ºÍ9.0.16¡£¡£¡£¡£Apache¹Ù·½ÉÐδÐû²¼ÐÞ¸´²¹¶¡£¬£¬£¬£¬µ«Óû§¿Éͨ¹ý½ûÓÃenableCmdLineArgumentsÑ¡ÏîÔÝʱ¾ÙÐзÀ»¤¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.cybersecurity-help.cz/vdb/SB2019041101?affChecked=1
3¡¢VSDC¹ÙÍøÔÙÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬±»ÓÃÓÚ·Ö·¢ÒøÐÐľÂíºÍÐÅϢ͵ÇÔľÂí

Ãâ·ÑÊÓÆµ±à¼Æ÷VSDCµÄ¹ÙÍøÔÙ´ÎÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¹¥»÷ÕßÐ®ÖÆÁËÍøÕ¾ÉϵÄÈí¼þÏÂÔØÁ´½Ó£¬£¬£¬£¬ÓÃÓÚ·Ö·¢ÒøÐÐľÂíWin32.Bolik.2ºÍÐÅϢ͵ÇÔľÂíTrojan.PWS.Stealer£¨KPOT Stealer£©¡£¡£¡£¡£Õâ²»ÊÇVSDC¹ÙÍøµÚÒ»´ÎÔâµ½ÈëÇÖ£¬£¬£¬£¬¹¥»÷ÕßÔøÔÚ2018Äê6ÔºÍ7ÔÂÈëÇÖ¹ý¸ÃÍøÕ¾£¬£¬£¬£¬²¢½«Èí¼þÏÂÔØÁ´½ÓÌæ»»ÎªAZORult Stealer¡¢X-Key KeyloggerºÍDarkVNCºóÃŵÄÏÂÔØÁ´½Ó¡£¡£¡£¡£ÕâÒ»´ÎÈëÇÖ±¬·¢ÔÚ2ÔÂ21ÈÕÖÁ3ÔÂ23ÈÕÖ®¼ä£¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÕë¶ÔÓ¢¹ú¡¢ÃÀ¹ú¡¢¼ÓÄôóºÍ°Ä´óÀûÑǵÄÓû§£¬£¬£¬£¬ÖÁÉÙÓÐ565ÃûÓû§Ñ¬È¾ÁËWin32.Bolik.2£¬£¬£¬£¬ÁíÍâ83ÃûÓû§Ñ¬È¾ÁËKPOT Stealer¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/vsdc-site-hacked-again-to-spread-password-stealing-malware/
4¡¢ÃÀ¹úDHSÖÒÑÔÓëAPT×éÖ¯LazarusÓйصÄжñÒâÈí¼þHoplight

DHSºÍFBIÕë¶ÔÒ»¸öеĶñÒâÈí¼þHoplightÐû²¼ÖÒÑÔ£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÓëÎÛÃûÕÑÖøµÄ³¯ÏÊAPT×éÖ¯LazarusÓйء£¡£¡£¡£HoplightÊÇPE32Îļþ£¬£¬£¬£¬¿ÉÍøÂçÄ¿µÄϵͳµÄÏà¹ØÐÅÏ¢£¬£¬£¬£¬°üÀ¨OS°æ±¾¡¢¾íÐÅÏ¢¡¢ÏµÍ³Ê±¼ä¼°Ã¶¾ÙÇý¶¯Æ÷ºÍ·ÖÇøÐÅÏ¢¡£¡£¡£¡£Hoplight»¹¾ßÓÐÒÔϹ¦Ð§£º¶ÁÈ¡¡¢Ð´ÈëºÍÒÆ¶¯Îļþ£»£»£»£»£»½¨ÉèºÍɱËÀÀú³Ì£»£»£»£»£»Àú³Ì×¢È룻£»£»£»£»½¨Éè¡¢Æô¶¯ºÍ×èֹЧÀÍ£»£»£»£»£»ÐÞ¸Ä×¢²á±í£»£»£»£»£»ÅþÁ¬Ô¶³ÌÖ÷»ú£»£»£»£»£»ÉÏ´«ºÍÏÂÔØÎļþ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓú«¹úÍøÂ繫˾NaverµÄSSLÖ¤Êé¾ÙÐÐͨѶ£¬£¬£¬£¬²¢Ê¹ÓÃÊðÀíÀ´»ìÏýÆä»î¶¯¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/us-government-warns-north-korean-1-1/
5¡¢Áè¼Ý6Íò¸ö±»µÁÉèÖÃÎļþÔÚGenesis StoreÉϳöÊÛ

¿¨°Í˹»ùÑо¿ÍŶӷ¢Ã÷Áè¼Ý6Íò¸ö±»µÁµÄÉèÖÃÎļþÔÚ°µÍøÊг¡Genesis StoreÉϳöÊÛ¡£¡£¡£¡£ÕâЩÉèÖÃÎļþÖаüÀ¨ä¯ÀÀÆ÷Ö¸ÎÆ¡¢Óû§µÇ¼ÃûºÍÃÜÂë¡¢cookies¼°ÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬µ¥¸öÉèÖÃÎļþµÄÊÛ¼Û´Ó5µ½200ÃÀÔª²»µÈ¡£¡£¡£¡£Genesis Store»¹ÎªÓû§ÌṩÁËÒ»¸öÌØÊâµÄ.crx²å¼þ£¬£¬£¬£¬¿É×ÊÖú·¸·¨·Ö×ÓʹÓÃÕâЩÉèÖÃÎļþαװ³ÉÕýµ±Óû§µÄÉí·Ý¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83630/deep-web/genesis-store-fingerprints.html
6¡¢EMOTETй¥»÷»î¶¯£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖÇÀûµÄ½ðÈÚºÍÒøÐÐЧÀÍ

SI-LAB·¢Ã÷EMOTETµÄÐÂÒ»²¨¹¥»÷À˳±Ö÷ÒªÕë¶ÔÖÇÀûµÄ½ðÈÚºÍÒøÐÐЧÀÍ£¬£¬£¬£¬ÔÚ3ÔÂ18ÈÕÖÁ26ÈÕʱ´úÒÑÓÐ176ÃûÊܺ¦ÕßÔâµ½¹¥»÷¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯ÈÔÒÔ´¹ÂÚÓʼþµÄÐÎʽ¾ÙÐУ¬£¬£¬£¬µÚÒ»½×¶ÎÊͷŶñÒâ¾ç±¾__Denuncia_Activa_CL.PDF.bat£¬£¬£¬£¬¸Ã¾ç±¾¿ÉÈÆ¹ýÇå¾²½â¾ö¼Æ»®µÄ¼ì²â¡£¡£¡£¡£µÚ¶þ½×¶ÎµÄ¶ñÒâÎļþdenuncias.rarÔòʹÓÃÁËWinRARÖеÄACEÎó²î£¨CVE-2018-20250£©À´·Ö·¢EMOTET¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83620/breaking-news/emotet-targets-chile.html