¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·£»£»£»£»Imperva³ÆÆäÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿±»µÁ£»£»£»£»NemtyµÄ½âÃܹ¤¾ß

Ðû²¼Ê±¼ä 2019-10-12
1¡¢°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄÐû²¼¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©Ðû²¼¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·£¬£¬£¬£¬£¬£¬£¬¸ÃÖ¸ÄÏÐðÊöÁ˳£¼ûµÄÍøÂçÍþвÒÔ¼°ÆóÒµ¿ÉÒÔ½ÓÄÉÄÄЩ²½·¥À´±£»£»£»£»¤×Ô¼ºÃâÊÜË𺦡£¡£¡£¸ÃÖ¸ÄÏרΪÖÐСÐÍÆóÒµÉè¼Æ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚʹÆäÏàʶ¡¢½ÓÄÉÐж¯²¢ÔöÇ¿ÆäÍøÂçÇå¾²·ÀÓùÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬ÒÔÓ¦¶ÔÒ»Ö±Éú³¤µÄÍøÂçÇå¾²Íþв¡£¡£¡£¸ÃÖ¸ÄÏÏÈÈÝÁ˶ñÒâÈí¼þ¡¢´¹ÂÚÓʼþºÍÀÕË÷Èí¼þµÈ³£¼ûÍþв£¬£¬£¬£¬£¬£¬£¬»¹Ã¶¾ÙÁ˶àÖÖÕë¶ÔÍþвµÄÔ¤·À²½·¥¡£¡£¡£¸ÃÖ¸Äϲ»½¨ÒéÆóÒµÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÎÞ·¨°ü¹ÜÄܹ»ÖØÐ»ñµÃ»á¼ûȨ£»£»£»£»½¨ÒéÆóÒµ½ÓÄÉ×Ô¶¯¸üС¢×Ô¶¯±¸·ÝºÍ¶àÒòËØÉí·ÝÑéÖ¤µÈ²½·¥£»£»£»£»½¨ÒéÔÚÖ°Ô±ºÍÁ÷³ÌÖнÓÄÉ»á¼û¿ØÖÆ¡¢ÃÜÂë¶ÌÓï¼°Ô±¹¤Åàѵ£»£»£»£»¸ÃÖ¸ÄÏ»¹¸½´øÁËÓÃÓڲο¼µÄÇå¾²ÊõÓï´Ê»ã±í¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.us-cert.gov/ncas/current-activity/2019/10/10/acsc-releases-small-business-cybersecurity-guide

2¡¢ÐÂMacOS¶ñÒâÈí¼þTarmacÖ÷ÒªÕë¶ÔÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ConfiantÇå¾²Ñо¿Ö°Ô±Taha Karim·¢Ã÷Õë¶ÔmacOSÓû§µÄжñÒâÈí¼þTarmac£¨OSX / Tarmac£©¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄ·Ö·¢»î¶¯×Ô2019Äê1ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬µ«ÆäʱÑо¿Ö°Ô±Ö»·¢Ã÷Á˶ñÒâpayload Shlayer¡£¡£¡£ÔÚÁ½ÖÜǰÐû²¼µÄÒ»·ÝºóÐø±¨¸æÖУ¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ·¢Ã÷ÁËShlayerѬȾµÄµÚ¶þ½×¶Îpayload Tarmac¡£¡£¡£ÏÖÔÚÖ»ÖªµÀShlayerÔÚÊÜѬȾµÄÖ÷»úÉÏÏÂÔØ²¢×°ÖÃÁËTarmacÖ®ºó£¬£¬£¬£¬£¬£¬£¬Tarmac»áÍøÂçÓйØÓ²¼þÉèÖõÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢½«´ËÐÅÏ¢·¢Ë͵½ÆäÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£¡£È»ºóTarmac½«ÆÚ´ýÐÂÏÂÁ£¬£¬£¬£¬£¬£¬¿ÉÊÇÓÉÓÚC2ЧÀÍÆ÷²»¿ÉÓ㬣¬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±ÎÞ·¨È·¶¨ÆäËùÓй¦Ð§¡£¡£¡£¸Ã¶ñÒâ»î¶¯Ö÷ÒªÕë¶ÔµÄÊÇÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾µÄÓû§¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/macos-users-targeted-with-new-tarmac-malware/

3¡¢·¸·¨ÍÅ»ïFIN7¿ª·¢Ð¶ñÒ⹤¾ßBOOSTWRITEºÍRDFSNIFFER

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ƾ֤FireEyeµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬·¸·¨ÍÅ»ïFIN7ÔÚÆä¹¥»÷¹¤¾ß¿âÖÐÌí¼ÓÁËÁ½¸öеijÉÔ±-BOOSTWRITEºÍRDFSNIFFER¡£¡£¡£BOOSTWRITEÊÇÒ»¸ö½öÔËÐÐÔÚÄÚ´æÖеÄÊÍ·ÅÆ÷£¬£¬£¬£¬£¬£¬£¬ÆäʹÓÃÔËÐÐʱ´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡µÄÃÜÔ¿À´½âÃÜÄÚǶµÄpayload£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬£¬£¬£¬£¬£¬ËûÃÇÆÊÎöµÄÒ»¸öÑù±¾ÊÇÓÉÓÐÓõÄÖ¤ÊéÊðÃûµÄ¡£¡£¡£BOOSTWRITE»á½âÃܲ¢¼ÓÔØÁ½¸öpayloadµÄDLL£¬£¬£¬£¬£¬£¬£¬°üÀ¨CARBANAKºóÃźÍRDFSNIFFER¡£¡£¡£RDFSNIFFER¿ÉÒÔʹ¹¥»÷Õß¼àÊӺ͸Ķ¯Í¨¹ýNCR¹«Ë¾µÄRDFClient½¨ÉèµÄÕýµ±ÅþÁ¬¡£¡£¡£Ñо¿Ö°Ô±×Ü½á³ÆÐ¹¤¾ßºÍÊÖÒÕµÄÒýÈëÅú×¢FIN7ÕýÔÚÒ»Ö±Éú³¤ÒÔ˳ӦÇå¾²ÐÔÒ»Ö±ÔöÇ¿µÄÇéÐΡ£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2019/10/mahalo-fin7-responding-to-new-tools-and-techniques.html

4¡¢Imperva³ÆÆäÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿±»µÁ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ImpervaÔÚ8Ô·ÝÅû¶ÁËÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ½ñÌìÐû²¼ÁËÒ»·ÝÏêϸµÄʺ󱨸档¡£¡£¸Ã¹«Ë¾³Æ´Ë´ÎÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿µÄ±»µÁ£¬£¬£¬£¬£¬£¬£¬¶ø¸ÃÃÜÔ¿ÊǺڿʹÓÒ»¸öÒâÍâÅþÁ¬µ½»¥ÁªÍøµÄÄÚ²¿ÏµÍ³ÇÔÈ¡µÄ¡£¡£¡£ºÚ¿ÍʹÓøÃAWS APIÃÜÔ¿»á¼ûImpervaµÄÔÆ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬²¢ÕÒµ½Á˸ù«Ë¾ÓÃÓÚ²âÊÔµÄAWS RDSЧÀÍ¡£¡£¡£Imperva²¢Î´Åû¶ÉÏÊöÊÂÎñ¼òÖ±ÇÐÈÕÆÚ£¬£¬£¬£¬£¬£¬£¬Òò´ËÉÐÎÞ·¨È·ÈϺڿͻá¼ûÁ˸ù«Ë¾µÄЧÀÍÆ÷¶à³¤Ê±¼ä¡£¡£¡£ImpervaÊ×ϯִÐйټòª¹ÀËãÁËÊÜÓ°ÏìµÄÓû§ÊýÄ¿£¬£¬£¬£¬£¬£¬£¬³ÆÔÚ¹«Ë¾Í¨ÖªÊÜÓ°ÏìµÄ¿Í»§ºó£¬£¬£¬£¬£¬£¬£¬¿Í»§Ìæ»»ÁË1.3Íò¸öÃÜÂë¼°1.35Íò¸öSSLÖ¤Ê飬£¬£¬£¬£¬£¬£¬²¢ÖØÐÂÌìÉúÁË1400¶à¸öImperva APIÃÜÔ¿¡£¡£¡£Ö»ÓÐÔÚ2017Äê9ÔÂ15ÈÕ֮ǰÓëImperva×¢²áµÄ¿Í»§²Å»áÊܵ½Ó°Ïì¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/imperva-blames-data-breach-on-stolen-aws-api-key/

5¡¢Çå¾²Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þNemtyµÄ½âÃܹ¤¾ß


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


TesorionÑо¿Ö°Ô±½¨ÉèÁË¿ÉÔÚÀÕË÷Èí¼þNemty 1.4ºÍ1.6°æ±¾ÉÏÊÂÇéµÄ½âÃÜÆ÷£¬£¬£¬£¬£¬£¬£¬²¢ÕýÔÚ¿ª·¢1.5°æ±¾µÄ½âÃÜÆ÷¡£¡£¡£ÏÖÔÚ½âÃÜÆ÷½öÖ§³ÖÓÐÏÞÊýÄ¿µÄÎļþÀ©Õ¹Ãû£¬£¬£¬£¬£¬£¬£¬·Ç±ê×¼ÎļþÃûÌõļÓÃÜÎļþÈÔÎÞ·¨½âÃÜ£¬£¬£¬£¬£¬£¬£¬µ«TesorionÌìÌì¶¼ÔÚ¼ÌÐøÖ§³ÖеÄÎļþÀàÐÍ¡£¡£¡£Tesorion²¢Î´Ìṩ½âÃÜÆ÷µÄ¿Í»§¶Ë°æ±¾£¬£¬£¬£¬£¬£¬£¬¶øÊÇÑ¡ÔñÔÚ×Ô¼ºµÄЧÀÍÆ÷ÉÏÍê³É½âÃÜÃÜÔ¿µÄÌìÉú£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏִ˾ÙÊÇΪÁ˱ÜÃâÀÕË÷Èí¼þ¿ª·¢Ö°Ô±ÆÊÎö½âÃܳÌÐò²¢ÏàʶÆäËã·¨µÄÎó²îËùÔÚ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/nemty-ransomware-decryptor-released-recover-files-for-free/

6¡¢SAPÐû²¼10ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á½¸öÒªº¦Îó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


SAPÐû²¼10ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÇå¾²Îó²î¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îΪSAP NetWeaver Process IntegrationµÄB2B×é¼þAS2ÊÊÅäÆ÷ÖеÄÉí·ÝÑé֤ȱʧÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2019-0379£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õß»á¼ûÖÎÀí¹¦Ð§¼°ÇÔÈ¡ºÍʹÓÃÃô¸ÐÊý¾Ý¡£¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ9.3¡£¡£¡£µÚ¶þ¸öÑÏÖØÎó²îÊÇSAP Landscape ManagementÆóÒµ°æÖеÄÒ»¸öÐÅϢй¶Îó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2019-0380£¬£¬£¬£¬£¬£¬£¬ÆäCVSSÆÀ·ÖΪ9.1¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬SAP»¹ÐÞ¸´ÁËAnywhere¡¢SAP IQºÍSAP Dynamic TieringµÈ²úÆ·µÄÎļþËÑË÷Ëã·¨ÖеÄBinary PlantingÎó²î£¨CVE-2019-0381£©£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îµÄCVSSÆÀ·ÖΪ7.8¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/92335/security/sap-october-2019-security-patch-day.html