Docker HubÔâÈëÇÖ£¬£¬£¬19ÍòÕ˺ű»Ð¹Â¶£»£»£»£»£»£»£»¶ñÒâÈí¼þBabyShark£»£»£»£»£»£»£»MagecartÒÑѬȾ200¶à¸öµçÉÌÍøÕ¾
Ðû²¼Ê±¼ä 2019-04-28
4ÔÂ25ÈÕDocker HubÔâºÚ¿ÍÈëÇÖ£¬£¬£¬µ¼ÖÂÔ¼19ÍòÓû§ÕË»§µÄÃô¸ÐÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÓÃÓÚ×Ô¶¯¹¹½¨Docker¾µÏñ¶øÊÚȨ¸øDocker HubµÄGitHubºÍBitbucket»á¼ûÁîÅÆ£¬£¬£¬ÒÔ¼°Óû§ÃûºÍ¹þÏ£ÃÜÂë¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Docker¹Ù·½µÄ˵·¨£¬£¬£¬ÊÜÓ°ÏìµÄÓû§Ô¼Õ¼×ÜÓû§ÊýÄ¿µÄ5%¡£¡£¡£¡£¡£¡£¡£DockerÌåÏÖÔÚ·¢Ã÷ÈëÇÖºóÁ¬Ã¦ÏòÓû§·¢ËÍÁËÓʼþ֪ͨ£¬£¬£¬²¢½ÓÄɲ½·¥±£»£»£»£»£»£»£»¤Óû§µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/docker-hub-database-hack-exposes-sensitive-data-of-190k-users/2.iLnkP2PÒ×ÊÜÖÐÐÄÈ˹¥»÷£¬£¬£¬200¶àÍǫ̀ÔÚÏß×°±¸±£´æÎ£º¦
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/84525/hacking/ilnkp2p-flaws-iot.html3.˼¿ÆTalosÅû¶Sierra Wireless AirLinkÍø¹ØÖеĶà¸öÎó²î

˼¿ÆTalosÅû¶Sierra Wireless AirLinkϵÁеÄÍø¹ØºÍ·ÓÉÆ÷ÖеĶà¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£¡£ÕâЩװ±¸±»ÆÕ±éÓÃÓÚÆóÒµÇéÐÎÖй¤Òµ×°±¸¡¢ÖÇÄÜ×°±¸¡¢´«¸ÐÆ÷¡¢PoS¼°ICSµÄÅþÁ¬¡£¡£¡£¡£¡£¡£¡£Îó²î¹æÄ£°üÀ¨í§Òâ´úÂëÖ´ÐС¢ÖÎÀíÔ±ÃÜÂë¸ü¸Ä¡¢ÏµÍ³ÉèÖÃÐ޸ġ¢Óû§Æ¾Ö¤Ð¹Â¶¡¢CSRF¡¢XSSµÈ¡£¡£¡£¡£¡£¡£¡£´ó´ó¶¼Îó²î±£´æÓÚ×°±¸¸½´øµÄWebЧÀÍÆ÷ACEManagerÖС£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/84533/security/sierra-wireless-airlink-es450-flaws.html4.¶ñÒâÈí¼þBabySharkµÄй¥»÷»î¶¯£¬£¬£¬·Ö·¢KimJongRATºÍPCRat
Palo Alto NetworksµÄUnit 42ÍŶÓÐû²¼¹ØÓÚBabySharkжñÒâ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£BabySharkÊÇ2Ô·ݷºÆðµÄ¶ñÒâÈí¼þ£¬£¬£¬Æä¹¥»÷»î¶¯Ò»Á¬µ½ÁË3ÔºÍ4Ô£¬£¬£¬×îй¥»÷»î¶¯µÄÄ¿µÄËÆºõÓÐÁ½¸ö£ºÕë¶ÔºËÇå¾²ºÍ³¯Ïʰ뵺¹ú¼ÒÇå¾²ÎÊÌâµÄÌØ¹¤»î¶¯£»£»£»£»£»£»£»ÒÔ¼°Õë¶Ô¼ÓÃÜÇ®±ÒÐÐÒµÀ´»ñÈ¡¿î×Ó¡£¡£¡£¡£¡£¡£¡£BabySharkµÄ¶ñÒâpayload°üÀ¨KimJongRATºÍPCRat£¬£¬£¬µ«¹¥»÷ÕßÔÚ¶ñÒâ´úÂëÖн«ËüÃÇͳ³ÆÎªCowboy¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/5.¹¥»÷ÕßʹÓÃAtlassian Confluence ServerÎó²î·Ö·¢GandCrabºÍDofloo
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±Augusto II Remillano·¢Ã÷¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃAtlassian Confluence ServerÖеÄÎó²î£¨CVE-2019-3396£©À´·Ö·¢ÀÕË÷Èí¼þGandCrabºÍľÂíDofloo¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤NVD£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÄ£°å×¢ÈëʵÏÖ·¾¶±éÀúºÍÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£AtlassianÔÚ3ÔÂ20ÈÕÐÞ¸´Á˸ÃÎó²î£¬£¬£¬ÓÉÓÚ¶à¸öexploit¹ûÕæ¿ÉÓ㬣¬£¬¹¥»÷ÕßÕýÔÚÆð¾¢É¨ÃèÒ×Êܹ¥»÷µÄЧÀÍÆ÷À´ÊµÑé¹¥»÷¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/vulnerable-confluence-servers-get-infected-with-ransomware-trojans/6.MagecartÇÔÈ¡Óû§Ö§¸¶ÐÅÏ¢£¬£¬£¬ÒÑѬȾ200¶à¸öµçÉÌÍøÕ¾
Magecart¹¥»÷ÊÇÖ¸½«¶ñÒâ¾ç±¾Ö²ÈëµçÉÌÍøÕ¾ÒÔÇÔÈ¡Óû§µÄÖ§¸¶ÐÅÏ¢£¬£¬£¬ÆäÊܺ¦Õß°üÀ¨Ó¢¹úº½¿Õ¡¢Ðµ°ºÍFeedifyµÈ¡£¡£¡£¡£¡£¡£¡£MalwareBytesÑо¿Ö°Ô±ÔÚGithubÉÏ·¢Ã÷Ò»¸ö¶ñÒâMagecart¾ç±¾£¬£¬£¬¸Ã¾ç±¾ÓÚ4ÔÂ20ÈÕÉÏ´«£¬£¬£¬Í¨¹ýËÑË÷ÒýÇæurlscan.ioºÍPublicWWW¿ÉÒÔ·¢Ã÷ÖÁÉÙÓÐ200¶à¸öµçÉÌÍøÕ¾Êܵ½¸Ã¾ç±¾µÄѬȾ¡£¡£¡£¡£¡£¡£¡£ÔÚ½Óµ½±¨¸æºó£¬£¬£¬GitHubѸËÙɾ³ýÁ˶ñÒâ¾ç±¾£¬£¬£¬µ«ÊÜËðµÄÍøÕ¾ÈÔÃæÁÙ±»ÈëÇÖµÄΣº¦¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/84564/cyber-crime/magecart-skimmer-github.html