Ñо¿Ö°Ô±·¢Ã÷HTTP/2 ÐÂÐͼÆÊ±²àÐŵÀ¹¥»÷·½·¨£»£»£»£»£»£»Googleͳ¼ÆÉϰëÄêÒÑÅû¶11¸öÔÚҰʹÓÃ0day

Ðû²¼Ê±¼ä 2020-08-03

1.Ñо¿Ö°Ô±·¢Ã÷HTTP/2 ÐÂÐͼÆÊ±²àÐŵÀ¹¥»÷·½·¨


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


DistriNetÑо¿Ð¡×éºÍŦԼ´óѧ°¢²¼Ôú±È·ÖУµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄHTTP/2 ¼ÆÊ±²àÐŵÀ¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬²¢ÃüÃûΪÎÞʱÏÞÖÆÊ±¹¥»÷£¨Timeless Timing Attacks£¬£¬£¬£¬£¬£¬TTA£©¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷·½·¨ÊÇʹÓÃÍøÂçЭÒéµÄ¶à·¸´ÓúÍÓ¦ÓóÌÐòµÄ²¢·¢Ö´ÐУ¬£¬£¬£¬£¬£¬´Ó¶ø²»ÊÜÍøÂçÌõ¼þµÄÓ°Ïì¡£¡£¡£¡£¡£¡£Óë¹Å°åµÄ»ùÓÚʱ¼äµÄ¹¥»÷²î±ð£¬£¬£¬£¬£¬£¬TTAÖ´ÐÐʱ¼äÊǰ´Ë³Ðò×ÔÁ¦ÕÉÁ¿µÄ£¬£¬£¬£¬£¬£¬×ÅʵÑé´ÓÁ½¸ö²¢·¢Ö´ÐеÄÇëÇóµÄ˳ÐòºÍÏà¶Ôʱ¼ä²î±ðÖÐÌáÊØÐÅÏ¢£¬£¬£¬£¬£¬£¬¶ø²»ÒÀÀµÓÚÈκÎʱ¼äÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÑо¿Ð§¹û½«ÔÚ½ñÄêϰëÄêÔÚUSENIXÇå¾²×êÑлáÉϽÒÏþ£¬£¬£¬£¬£¬£¬Í¬Ê±»¹Ðû²¼»ùÓÚPythonµÄ¹¤¾ß£¬£¬£¬£¬£¬£¬ÒÔ²âÊÔHTTP / 2ЧÀÍÆ÷µÄTTAÎó²î¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2020/07/http2-timing-side-channel-attacks.html    


2.Google PlayÊÐËÁ±£´æ29¿î¶ñÒâÕÕÆ¬´¦Öóͷ£Ó¦ÓÃ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


WhiteOps SatoriÍþвÇ鱨ÍŶӷ¢Ã÷£¬£¬£¬£¬£¬£¬Google PlayÊÐËÁ±£´æ29¿î¶ñÒâÕÕÆ¬´¦Öóͷ£Ó¦Óᣡ£¡£¡£¡£¡£ÕâЩӦÓÃÕë¶ÔAndroidÓû§·Ö·¢¹ã¸æÈí¼þ£¬£¬£¬£¬£¬£¬²¢ÈƹýÇå¾²¼ì²é£¬£¬£¬£¬£¬£¬WhiteOps½«¸Ã¸ö»î¶¯ÃüÃûΪCHARTREUSEBLUR¡£¡£¡£¡£¡£¡£ÕâЩ¹ã¸æÈí¼þµÄÃû³ÆÖж¼´øÓÐBLURÒ»´Ê£¬£¬£¬£¬£¬£¬ÆäÄ£ÄâÁËÕÕÆ¬±à¼­¹¤¾ßÀ´Ä£ºýͼÏñ£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÓÐÐí¶à¶ñÒâÊôÐÔ£¬£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬£¬Ëü×°Öõ½Ä¿µÄ×°±¸ºóÒþ²ØÓ¦ÓÃͼ±ê¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¶ÔÓ¦ÓóÌÐòµÄ»ìÏý´úÂë¾ÙÐнøÒ»²½ÆÊÎöºó£¬£¬£¬£¬£¬£¬·¢Ã÷¸ÃÓ¦ÓóÌÐòʹÓÃÁËÈý½×¶ÎÓÐÓøºÔØÑݱä¡£¡£¡£¡£¡£¡£ÕâЩӦÓõÄÏÂÔØÁ¿×ܼÆÔ¼Îª350Íò£¬£¬£¬£¬£¬£¬ÏÖÔÚGoogleÒѽ«Æäɾ³ý¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/08/01/numerous-malicious-photo-blur-apps-appeared-on-play-store/


3.Drizly¹«Ë¾ÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬Ð¹Â¶250Íò¿Í»§PII


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¾ÆÀàÅäË͹«Ë¾DrizlyÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬Ð¹Â¶250Íò¿Í»§PII¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬£¬ÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÓÐδ¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËÆä¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþµØµã¡¢ÉúÈÕ¡¢bcrypt¼ÓÃܵÄÃÜÂëÒÔ¼°ËÍ»õµØµã¡£¡£¡£¡£¡£¡£HaveIBeenPwnedÔò³Æ£¬£¬£¬£¬£¬£¬´Ë´Îй¶µÄÐÅÏ¢»¹°üÀ¨¿Í»§Ãû³ÆºÍIPµØµã£¬£¬£¬£¬£¬£¬²¢ÇÒ¿ÉÄÜÓ°ÏìÁËԼĪ250Íò¸öÓû§¡£¡£¡£¡£¡£¡£DrizlyÌåÏÖ£¬£¬£¬£¬£¬£¬ÔÚ´Ë´ÎÊÂÎñÖв¢Ã»ÓвÆÎñÊý¾Ýй¶£¬£¬£¬£¬£¬£¬¶øËûÃÇÒѶԴËÊÂÕö¿ªÊӲ졣¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/drizly-breach-hits-25-million/


4.Googleͳ¼Æ£¬£¬£¬£¬£¬£¬½ñÄêÉϰëÄêÒÑÅû¶11¸öÔÚҰʹÓÃ0day


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


GoogleµÄProject ZeroÇå¾²ÍŶÓͳ¼Æ·¢Ã÷£¬£¬£¬£¬£¬£¬½ñÄêÉϰëÄêÒÑÅû¶11¸öÔÚҰʹÓÃ0day¡£¡£¡£¡£¡£¡£ÆäÖÐFirefox£¨CVE-2019-17026£©ºÍInternet Explorer£¨CVE-2020-0674£©¾ùÒѱ»Ãñ×å¹ú¼ÒºÚ¿Í×éÖ¯DarkHotelʹÓ㬣¬£¬£¬£¬£¬±ðµÄÉÐÓÐChrome£¨CVE-2020-6418£©£¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼·À¶¾Ç½ÍøÂç°æ£¨CVE-2020-8467ºÍCVE-2020-8468£©ÊÇÇ÷ÊÆ¿Æ¼¼ÊÓ²ìÈýÁâµç»úÊÂÎñʱ·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬ Firefox£¨CVE-2020-6819ºÍCVE-2020-6820£©»òÒѱ»Ê¹Ó㬣¬£¬£¬£¬£¬CVE-2020-0938¡¢CVE-2020-1020ºÍCVE-2020-1027µÄÏêϸÐÅÏ¢ÉÐδÐû²¼£¬£¬£¬£¬£¬£¬Sophos XG·À»ðǽ£¨CVE 2020-12271£©Òѱ»Ê¹Óð²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/google-eleven-zero-days-detected-in-the-wild-in-the-first-half-of-2020/#ftag=RSSbaffb68


5.Ñо¿ÍŶÓÐû²¼ÍøÂç´¹ÂÚÇéÐμ°½»»¥·½·¨µÄ±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


À´×ÔGoogle¡¢PayPal¡¢ÈýÐǺÍÑÇÀûÉ£ÄÇÖÝÁ¢´óѧµÄÇå¾²Ñо¿Ö°Ô±×é³ÉµÄÍŶӺÄʱÕûÕûÒ»Ä꣬£¬£¬£¬£¬£¬ÆÊÎöÁËÍøÂç´¹ÂÚµÄÇéÐÎÒÔ¼°Óû§ÓëÍøÂç´¹ÂÚÒ³ÃæµÄ½»»¥·½·¨£¬£¬£¬£¬£¬£¬¸ÃÏîÄ¿ÆÊÎöÁË22553707¸öÓû§¶Ô404628¸öÍøÂç´¹ÂÚÒ³ÃæµÄ»á¼û¡£¡£¡£¡£¡£¡£±¨¸æÌåÏÖ£¬£¬£¬£¬£¬£¬Æ½¾ùÍøÂç´¹ÂÚ¹¥»÷ʱ¼äΪ21Сʱ£¬£¬£¬£¬£¬£¬ÓÐ7.42£¥µÄÊܺ¦Õß×îÖÕÊäÁËÈëÆ¾Ö¤²¢µ¼ÖÂÕË»§Ð¹Â¶»òڲƭ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬Ò»Ð©¹¥»÷»î¶¯»áÒ»Á¬»îÔ¾³¤´ï9¸öÔ£¬£¬£¬£¬£¬£¬ÆäʹÓÃÏֳɵĴ¹ÂÚ¹¤¾ß£¬£¬£¬£¬£¬£¬¿É¹¥»÷³ÉǧÉÏÍòµÄÊܺ¦Õß¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/phishing-campaigns-from-first-to-last-victim-take-21h-on-average/#ftag=RSSbaffb68


6.FireEyeÐû²¼Õë¶ÔOffice 365µÄ¹¥»÷µÄÆÊÎö±¨¸æ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


FireEyeÐû²¼ÁËoffice365¹¥»÷͸ÊÓ¼°MandiantÖÎÀí·ÀÎñÊÓ²ìµÄ±¨¸æ¡£¡£¡£¡£¡£¡£ÆäÕë¶ÔOffice 365 BEC¹¥»÷£¬£¬£¬£¬£¬£¬ÌṩÁËÓйØMicrosoftÔÆÉú²úÁ¦Ì×¼þ¼°¶ÔÑо¿Ö°Ô±ÖÁ¹ØÖ÷ÒªµÄÖÖÖÖÈÕÖ¾ºÍÊý¾ÝÔ´¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹ÏÈÈÝÁËÔÚÏìÓ¦BECʱ³£¼ûµÄ¹¥»÷ÕßÕ½ÂÔ£¬£¬£¬£¬£¬£¬²¢ÉîÈëÚ¹ÊÍÁËMandiantÍйܷÀÓùÆÊÎöʦÔõÑùʹÓÃPowerShellºÍFireEye Helixƽ̨ÔÚ¿Í»§ÄÇÀï¾ÙÐÐÕâЩÊӲ졣¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2020/07/insights-into-office-365-attacks-and-how-managed-defense-investigates.html