˼¿ÆTalosÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄRCEÎó²î£»£»£»ÃÀµÂÇ鱨²¿·Ö¿ØÖÆÈðÊ¿¹«Ë¾ÊýÊ®Ä꣬£¬£¬£¬£¬£¬£¬ÇÔÈ¡120¹úÉñÃØÇ鱨

Ðû²¼Ê±¼ä 2020-02-14

1.˼¿ÆTalosÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄRCEÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


˼¿ÆTalosÍŶÓÅû¶Apple Safariä¯ÀÀÆ÷ÖеÄÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î(CVE-2020-3868)£¬£¬£¬£¬£¬£¬£¬µ±Óû§ÔÚSafariÖз­¿ª¶ñÒâÍøÒ³Ê±£¬£¬£¬£¬£¬£¬£¬¿ÉÄܻᴥ·¢ÀàÐÍ»ìÏý£¬£¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂÄÚ´æË𻵺ÍÖ´ÐÐí§Òâ´úÂë ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÐèҪͨ¹ýijÖÖ·½·¨ÓÕʹÓû§»á¼û¶ñÒâÍøÒ³À´´¥·¢´ËÎó²î ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚSafariµÄ¡°×ÖÌ塱¹¦Ð§ÖУ¬£¬£¬£¬£¬£¬£¬Talos²âÊÔ²¢È·ÈÏ´ËÎó²îÓ°ÏìSafari°æ±¾13.0.3£¨15608.3.10.1.4£©¡¢SafariÊÖÒÕÔ¤ÀÀ°æ96£¨Safari 13.1£¬£¬£¬£¬£¬£¬£¬WebKit 15609.1.9.7£©ºÍWebkit GIT e4cd3b4fab6166d1288984ded40c588439dab925£¬£¬£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì¸üÐÂÖÁ×îа汾 ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/02/vuln-spotlight-apple-safari-code-execution-feb-2020.html


2.Î÷ÃÅ×ÓÐû²¼2ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеÄDoSÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Î÷ÃÅ×ÓÐû²¼2020Äê2ÔµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬¸Ã¸üÐÂÐÞ¸´ÁËÓ°Ïì¶à¸ö²úÆ·µÄDoSÎó²î ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Î÷ÃÅ×ÓÐû²¼µÄת´ï£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-19282£©Ó°ÏìÁËÆôÓüÓÃÜͨѶµÄSiemens SIMATIC PCS 7¡¢SIMATIC WinCCºÍSIMATIC NET PC²úÆ· ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿ÉÄÜʹ¾ßÓÐÍøÂç»á¼ûȨÏ޵Ĺ¥»÷ÕßÔÚijЩÇéÐÎϵ¼Ö¾ܾøÐ§ÀÍ״̬£¨SIMATIC WinCC V7.3»òSIMATIC PCS 7 V8.1֮ǰµÄ°æ±¾²»ÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬ÓÉÓÚ¼ÓÃÜͨѶ²»¿ÉÓã© ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÎÞÐèÏµÍ³ÌØÈ¨»òÓû§½»»¥¼´¿ÉʹÓôËÎÊÌâ ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ7.5 ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/97742/security/siemens-dos-flaws-2.html


3.¿¨°Í˹»ùÐû²¼2019ÄêµÚËÄÐò¶ÈµÄDDoS¹¥»÷±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¿¨°Í˹»ùÐû²¼2019ÄêQ4 DDoS¹¥»÷±¨¸æ£¬£¬£¬£¬£¬£¬£¬¸Ã±¨¸æÖ¸³öQ4µÄDDoS¹¥»÷´ÎÊýÏà¹ØÓÚÉÏÒ»¸ö±¨¸æÆÚÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬£¬µ«ÉÏÉý·ù¶È²»´ó£¬£¬£¬£¬£¬£¬£¬¶øÓë2018ÄêQ4Ïà±ÈÔòÏÕЩ·­ÁËÒ»·¬ ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜQ4DDoS¹¥»÷µÄÊýÄ¿ºÍÒ»Á¬Ê±¼äÏà¹ØÓÚÉÏÒ»¸ö±¨¸æÆÚÓÐËùÔöÌí£¬£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪDDoSÊг¡ÒѾ­ÖØÐÂÇ÷ÓÚÎȹÌ£¬£¬£¬£¬£¬£¬£¬Ô¤¼Æ2020ÄêQ1¹¥»÷ÊýÄ¿½«ÂÔÓÐϽµ£¬£¬£¬£¬£¬£¬£¬µ«ÓпÉÄܾø¶ÔÖµÈÔ½«¸ßÓÚ2019ÄêͬÆÚ ¡£¡£¡£¡£¡£¡£¡£Q4¹¥»÷ÊýÄ¿ÅÅÃûǰÈýµÄ¹ú¼Ò»®·ÖÊÇÖйú¡¢ÃÀ¹úºÍÈÕ±¾ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/ddos-report-q4-2019/96154/


4.ÃÀµÂÇ鱨²¿·Ö¿ØÖÆÈðÊ¿¹«Ë¾ÊýÊ®Ä꣬£¬£¬£¬£¬£¬£¬ÇÔÈ¡120¹úÉñÃØÇ鱨


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¾ÝÃÀ¹ú¡¶»ªÊ¢¶ÙÓʱ¨¡·±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÃÀµÂÇ鱨²¿·ÖÊýÊ®Äê¼äͨ¹ý¿ØÖÆÈðÊ¿¼ÓÃܹ«Ë¾Crypto AG£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁËÈ«ÇòÔ¼120¹úÕþ¸®µÄ×î¸ßÉñÃØÍ¨Ñ¶Ç鱨 ¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬µÚ¶þ´ÎÌìÏ´óÕ½Õ½ºóµ½±¾ÊÀ¼Í³õ£¬£¬£¬£¬£¬£¬£¬Crypto AG¹«Ë¾ÎªÔ¼120¸ö¹ú¼ÒµÄÕþ¸®Ìṩ¼ÓÃÜͨѶװÖ㬣¬£¬£¬£¬£¬£¬ÒÁÀÊ¡¢ÄÏÃÀ¶à¹úÕþ¸®¡¢Ó¡¶ÈÓë°Í»ù˹̹½ÔΪЧÀ͹¤¾ß ¡£¡£¡£¡£¡£¡£¡£µ«Crypto AGÄ»ºóÀϰå×ÅʵÊÇÃÀ¹úÖÐÑëÇ鱨¾Ö£¨CIA£©ÒÔ¼°µÂ¹úÁª°îÇ鱨¾Ö£¨BND£© ¡£¡£¡£¡£¡£¡£¡£ÕâÁ½¸öÇ鱨²¿·Ö¶ÔCrypto×°ÖÃÏÂÊֽţ¬£¬£¬£¬£¬£¬£¬ÈÃ×°ÖÿÉÈÝÒ×±»ÆÆ½â£¬£¬£¬£¬£¬£¬£¬½ø¶ø½â¶ÁÊý¾Ý ¡£¡£¡£¡£¡£¡£¡£±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬ÖÐÇé¾ÖÄÚ²¿ÓйØÓÚÕâ¸ö×î¸ßÉñÃØÍýÏëµÄÀúÊ·ÉñÃØµµ°¸£¬£¬£¬£¬£¬£¬£¬µµ°¸Ö¸³öCrypto AG¿¿×ÅÈÃÎ÷·½Ç鱨»ú¹ØÈ¡µÃ¿Í»§ÉñÃØ£¬£¬£¬£¬£¬£¬£¬×¬½øÊýÒÔ°ÙÍò¼ÆÃÀÔª ¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬µµ°¸Ò²Ö¸³ö£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜʹÓÃCrypto AG²úÆ·µÄ¹ú¼Ò²»ÉÙ£¬£¬£¬£¬£¬£¬£¬µ«ËÕÁª/¶íÂÞ˹ºÍÖйú£¬£¬£¬£¬£¬£¬£¬È´ÀúÀ´¶¼²»ÊǸù«Ë¾µÄ¿Í»§ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/us-german-spies-plundered-global-secrets-swiss-encryption-firm-report


5.Gaza groupÐÂÍøÂç¹¥»÷À˳±£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô°ÍÀÕ˹̹


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Cybereason NocturnusÍŶÓÔÚÖж«·¢Ã÷Ò»¸öеÄÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷»î¶¯Ö÷ÒªÕë¶Ô°ÍÀÕ˹̹ ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ·¸·¨ÍÅ»ïGaza groupµÄÆäÖÐÒ»¸ö×éÖ¯£¨±»³ÆÎªMoleRATs£©Ëƺõ¶Ô´ËÊÂÈÏÕæ ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÔÚÒÑÍùµÄ¼¸¸öÔÂÖÐMoleRATsÒ»Ö±ÊÔÍ¼ÉøÍ¸µ½×éÖ¯ºÍСÎÒ˽¼ÒµÄϵͳÖУ¬£¬£¬£¬£¬£¬£¬µ«Ëƺõͬʱ±¬·¢ÁËÁ½¸öµ¥¶ÀµÄ¹¥»÷»î¶¯ ¡£¡£¡£¡£¡£¡£¡£µÚÒ»¸ö¹¥»÷»î¶¯Ö÷ҪʹÓÃÉç»á¹¤³Ìѧ·Ö·¢SparkºóÃÅ ¡£¡£¡£¡£¡£¡£¡£Æä´¹ÂÚÓʼþÊÔͼʹÓÃÕþÖÎÉÏÃô¸ÐµÄÄÚÈÝÀ´ÎüÒýÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬ÀýÈçÒ԰ͳåÍ»¡¢¹þÂí˹Óë°£¼°Õþ¸®Ö®¼äµÄÖ÷ÒªÊ±ÊÆÒÔ¼°¿¨ÈûÄ·¡¤Ë÷À³ÂíÄᱻıº¦ ¡£¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÔòÖ÷Òª·Ö·¢Pierogi£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜËüҲʹÓÃÁËÉç»á¹¤³Ìѧ£¬£¬£¬£¬£¬£¬£¬µ«Ê¹ÓÃÁ˲î±ðµÄÓÕ¶üÎļþÒÔ¼°È«ÐµĺóÃųÌÐò ¡£¡£¡£¡£¡£¡£¡£CybereasonÏÓÒÉÕâÁ½¸ö¹¥»÷»î¶¯µÄÄ¿µÄ¶¼ÊÇ¡°´ÓÊܺ¦ÕßÄÇÀïÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢½«ÆäÓÃÓÚÕþÖÎÄ¿µÄ¡± ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/gaza-group-strikes-targets-in-palestinian-territories-in-new-cyberattack-wave/


6.ÃÀ¹úÁ¬ËøÊÐËÁRutter 71¼ÒµêËÁѬȾPoS¶ñÒâÈí¼þ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹úÁ¬ËøÊÐËÁRutterÅû¶ÓÐ71¼ÒµêËÁѬȾÁËPoS¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢±»ÇÔ ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤RutterÐû²¼µÄͨ¸æ£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þͨ¹ý±ãµ±µêÄÚÒÔ¼°Ò»Ð©È¼ÓͱÃÉϵÄPoS×°±¸ÍøÂç¿Í»§µÄÖ§¸¶¿¨ÐÅÏ¢ ¡£¡£¡£¡£¡£¡£¡£´ó´ó¶¼ÇéÐÎϸöñÒâÈí¼þÍøÂçÁ˿ͻ§µÄÐÕÃû¡¢¿¨ºÅ¡¢ÓÐÓÃÆÚºÍÄÚ²¿ÑéÖ¤ÂëÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ«¹ØÓÚÔÚ¾ßÓÐEMV¹¦Ð§µÄPoS×°±¸ÉÏË¢¿¨µÄÓû§£¬£¬£¬£¬£¬£¬£¬RutterÌåÏÖÖ»Óп¨ºÅºÍÓÐÓÃÆÚÊÜÓ°Ïì ¡£¡£¡£¡£¡£¡£¡£ËäÈ»ÊÂÎñ±¬·¢µÄʱ¼ä¹æÄ£Òòÿ¸öµêËÁµÄλÖöøÒ죬£¬£¬£¬£¬£¬£¬µ«×ÜÌåµÄʱ¼ä¹æÄ£ÊÇ´Ó2018Äê10ÔÂ1ÈÕµ½2019Äê5ÔÂ29ÈÕ ¡£¡£¡£¡£¡£¡£¡£RutterÌåÏÖÒÑ´ÓÆäÖ§¸¶ÏµÍ³ÖÐɾ³ýÁ˸öñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬²¢½«´Ëʱ¨¸æ¸øÁËÖ´·¨²¿·ÖºÍÕýÔÚ֪ͨÊÜÓ°ÏìµÄ¿Í»§ ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/us-store-chain-rutter-s-hit-by-credit-card-stealing-malware/