ÍòºÀÒòÊý¾ÝÐ¹Â¶ÃæÁÙÓ¢¹úî¿Ïµ»ú¹¹1.23ÒÚÃÀÔª·£¿£¿£¿£¿î£»£»£»£»£»GEº½¿Õ¹«Ë¾JenkinsЧÀÍÆ÷й¶´ó×ÚÃô¸ÐÐÅÏ¢£»£»£»£»£»ÊÓÆµÈí¼þZoom RCEÎó²î

Ðû²¼Ê±¼ä 2019-07-10
1¡¢ÍòºÀÒòÊý¾ÝÐ¹Â¶ÃæÁÙÓ¢¹úî¿Ïµ»ú¹¹1.23ÒÚÃÀÔª·£¿£¿£¿£¿î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Ó¢¹úÊý¾Ý±£»£»£»£»£»¤»ú¹¹ÖܶþÌåÏÖ½«ÏòÍòºÀ´¦ÒÔ9900ÍòÓ¢°÷£¨ºÏ1.23ÒÚÃÀÔª£©µÄ·£¿£¿£¿£¿î£¬£¬£¬Ôµ¹ÊÔ­ÓÉÊÇ2018Äê11ÔÂÍòºÀÆìÏÂϲ´ïÎÝÂùݵĻáÔ±Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¾ÝÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©³Æ£¬£¬£¬Å·ÖÞ31¸ö¹ú¼ÒµÄ½ü3000ÍòסÃñºÍ700ÍòÓ¢¹úסÃñÊܵ½ÍòºÀÊý¾Ýй¶µÄÓ°Ïì¡£¡£¡£ÕâÊÇÒÑÍùÁ½ÌìÄÚ±¬·¢µÄµÚ¶þÆðÕë¶ÔÊý¾Ýй¶µÄÖØ´ó·£¿£¿£¿£¿î֪ͨ¡£¡£¡£ÍòºÀÌåÏÖ¶ÔÐÅϢרԱ°ì¹«ÊҵľöÒé¸ÐӦʧÍû£¬£¬£¬ÔÚ±»´¦ÒÔ·£¿£¿£¿£¿î֮ǰ£¬£¬£¬Ëü¡°ÓÐȨ×ö³ö»ØÓ¦¡±£¬£¬£¬²¢¡°ÍýÏë×ö³ö»ØÓ¦ÇÒÆð¾¢º´ÎÀ¡±×Ô¼ºµÄ̬¶È¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/marriott-data-breach-gdpr.html

2¡¢GEº½¿Õ¹«Ë¾JenkinsЧÀÍÆ÷й¶´ó×ÚÃô¸ÐÐÅÏ¢

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Çå¾²Ñо¿Ô±Bob Diachenko·¢Ã÷GEº½¿Õ¹«Ë¾µÄJenkinsЧÀÍÆ÷¿É¹ûÕæ»á¼û£¬£¬£¬µ¼Ö¹«Ë¾µÄ´ó×ÚÃô¸ÐÐÅϢй¶£¬£¬£¬°üÀ¨¹«Ë¾ÄÚ²¿ÉÌÒµ»ù´¡ÉèÊ©µÄÔ´´úÂë¡¢Ã÷ÎÄÃÜÂ롢ȫÇòϵͳµÄÉèÖÃÎļþºÍ˽Կ¡¢APIÁîÅÆ¡¢Êý¾Ý¿âƾ֤µÈ¡£¡£¡£GEº½¿Õ¹«Ë¾ÊÇͨÓÃµçÆøÆìϵÄ×Ó¹«Ë¾£¬£¬£¬ÊÇÈ«ÇòÉÌÓ÷ɻú·¢ÄîÍ·µÄ¶¥¼¶¹©Ó¦ÉÌÖ®Ò»¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖûÓÐÖ¤¾ÝÅú×¢ÆäËüÈË»á¼ûÁËЧÀÍÆ÷ÉϵÄÊý¾Ý£¬£¬£¬²¢ÒѽÓÄÉÔ¤·À²½·¥ÖØÖÃÁËËùÓÐÆ¾Ö¤¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/ge-aviation-passwords-jenkins-server/146302/

3¡¢Î¢ÈíÖÒÑÔÎÞÎļþ¶ñÒâÈí¼þAstarothµÄ¹¥»÷»î¶¯

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
΢ÈíÇå¾²ÍŶÓÐû²¼Ò»Ôòת´ï£¬£¬£¬ÖÒÑÔʹÓÃÎÞÎļþÊÖÒÕ·Ö·¢¶ñÒâÈí¼þAstarothµÄ¹¥»÷»î¶¯¡£¡£¡£Windows Defender ATPÍŶӼì²âµ½Á˸öñÒâ»î¶¯£¬£¬£¬¹¥»÷Õßͨ¹ý´ó¹æÄ£À¬»øÓʼþ»î¶¯ÏòÓû§·Ö·¢AstarothľÂí¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÐÅÏ¢ÇÔȡľÂí£¬£¬£¬¿Éת´¢ÖÖÖÖÓ¦ÓóÌÐòµÄƾ֤£¬£¬£¬²¢½«±»µÁÊý¾ÝÉÏ´«µ½Ô¶³ÌЧÀÍÆ÷¡£¡£¡£Î¢Èí½²»°ÈËÌåÏÖÁè¼Ý95£¥µÄAstarothѬȾ±¬·¢ÔÚ°ÍÎ÷¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/microsoft-warns-about-astaroth-malware-campaign/

4¡¢DDoS½©Ê¬ÍøÂçGoBotKR£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹ú

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
ƾ֤ESETµÄ±¨¸æ£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚ¹¹½¨Ò»¸ö¿ÉÓÃÓÚÖ´ÐÐÖÖÖÖDDoS¹¥»÷µÄ½©Ê¬ÍøÂçGoBotKR¡£¡£¡£¸Ã½©Ê¬ÍøÂçÖ÷ÒªÃé×¼º«¹úµçÊÓ½ÚÄ¿µÄ·ÛË¿£¬£¬£¬Í¨¹ýµÁ°æÍøÕ¾ÉϵĵÁ°æÓ°Ï·¡¢ÓÎÏ·ºÍµçÊÓ½ÚÄ¿ÖÖ×ÓÏÂÔØ¾ÙÐÐÈö²¥¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒÑÖªºóÃÅGoBot2µÄˢа汾£¬£¬£¬´úÂëºÜ¼òÆÓ£¬£¬£¬´ó´ó¶¼¹¦Ð§¶¼ÊÇʹÓÃGoLang¿âʵÏֵ쬣¬£¬²¢ÇÒÖ´ÐÐWindowsÏÂÁîºÍµÚÈý·½¹¤¾ß£¬£¬£¬ÈçBitTorrentºÍuTorrent¿Í»§¶Ë¡£¡£¡£Ñо¿Ö°Ô±Ôö²¹Ëµ¸Ã¶ñÒâÈí¼þ¶ÔÔ´´úÂëµÄÐÞ¸ÄÖ÷ÒªÊǺ«¹úÌØÓеÄÌÓ±ÜÊÖÒÕ£¬£¬£¬°üÀ¨¼ì²âIPÐÅÏ¢ÒÔÈ·¶¨ÊÇ·ñÔÚº«¹úµÄһЩÇ徲ɳÏäÖÐÔËÐС¢É¨ÃèÀú³ÌÒÔ¼ì²â·À²¡¶¾²úÆ·µÈ¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/gobotkr-pirate-torrents-ddos-botnet/146285/

5¡¢¶ñÒâÈí¼þAnubis»Ø¹é£¬£¬£¬¼ì²âµ½Áè¼Ý1.7Íò¸öÑù±¾

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Ç÷ÊÆ¿Æ¼¼¼ì²âµ½Android¶ñÒâÈí¼þAnubis»Ø¹é£¬£¬£¬Ñо¿Ö°Ô±ÔÚÁ½¸öÏà¹ØµÄЧÀÍÆ÷Éϼì²âµ½17490¸öÑù±¾¡£¡£¡£ÔÚÕâЩÑù±¾ÖÐÕÒµ½ÁËÁ½¸ö±êÇ©£ºOperat?rG¨¹ncellemesiºÍGoogle Services£¬£¬£¬Ç°ÕßÔÚÍÁ¶úÆäÓïÖеÄÒâ˼ÊÇ¡°²Ù×÷Ö°Ô±¸üС±£¬£¬£¬ÕâЩ±êÇ©¿ÉÄÜÊÇÉç½»¹¤³ÌÓÕ¶ü£¬£¬£¬ÓÃÓÚÓÕÆ­Óû§ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£Anubis×ܹ²Õë¶Ô188¸öÓëÒøÐкͽðÈÚÏà¹ØµÄÓ¦ÓóÌÐò£¬£¬£¬´ÓÖÐÇÔȡСÎÒ˽¼ÒºÍ²ÆÎñÊý¾Ý¡£¡£¡£ÕâЩ³ÌÐòÀ´×ÔÓÚ²¨À¼¡¢°Ä´óÀûÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢·¨¹ú¡¢Òâ´óÀû¡¢Î÷°àÑÀ¡¢ÃÀ¹úºÍÓ¡¶ÈµÈ¹ú¼Ò¡£¡£¡£AnubisµÄC£¦CЧÀÍÆ÷Ò²ÂþÑÜÔÚ²î±ðµÄ¹ú¼Ò¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/anubis-android-malware-returns-with-over-17000-samples/

6¡¢ÊÓÆµ¾Û»áÈí¼þZoom RCEÎó²î£¬£¬£¬¿ÉÐ®ÖÆMacÉãÏñÍ·

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Çå¾²Ñо¿Ö°Ô±Jonathan LeitschuhÅû¶ÊÓÆµ¾Û»áÈí¼þZoomÖеÄÒ»¸öRCEÎó²î£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËMacƽ̨ÉϵÄZoom app°æ±¾4.4.4£¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÓû§»á¼ûÍøÕ¾Ê±½ÓÊÜÍøÂçÉãÏñÍ·¡£¡£¡£Æ¾Ö¤LeitschuhµÄ˵·¨£¬£¬£¬Áè¼Ý400ÍòÓû§ÃæÁÙΣº¦¡£¡£¡£¸ÃÎó²îʹÓÃÁËZoomÈí¼þµÄµã»÷¼ÓÈ빦Ч£¬£¬£¬¼´Ö»Ðèµã»÷Ô¼ÇëÁ´½Ó¼´¿É×Ô¶¯¼¤»îϵͳÉÏ×°ÖõÄÓ¦ÓóÌÐò²¢Í¨¹ýWebä¯ÀÀÆ÷¼ÓÈëÊÓÆµ¾Û»á¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý´¹ÂÚÓʼþ·Ö·¢ÕâÖÖ¶ñÒâÁ´½Ó¡£¡£¡£Leitschuh»¹ÌåÏÖZoomµÄÐÞ¸´Ö»ÊÇ×èÖ¹¹¥»÷Õß·­¿ªÓû§µÄÉãÏñÍ·£¬£¬£¬¹¥»÷ÕßÈÔ¿ÉÒÔͨ¹ý¶ñÒâÁ´½ÓÓÕʹÓû§¼ÓÈë¾Û»á¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88147/hacking/zoom-mac-software-flaw.html