¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181009

Ðû²¼Ê±¼ä 2018-10-09
1¡¢¹ú¼ÒÄÜÔ´¾ÖÓ¡·¢¡¶¹ØÓÚÔöÇ¿µçÁ¦ÐÐÒµÍøÂçÇå¾²ÊÂÇéµÄÖ¸µ¼Òâ¼û¡·

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

¡¶Òâ¼û¡·Î§ÈƽøÒ»²½ÂäʵµçÁ¦ÆóÒµÍøÂçÇå¾²Ö÷ÌåÔðÈΣ¬£¬£¬£¬£¬£¬£¬ÍêÉÆÍøÂçÇå¾²¼àÊÓÖÎÀíÌåÖÆ»úÖÆ£¬£¬£¬£¬£¬£¬£¬Ôöǿȫ·½Î»ÍøÂçÇå¾²ÖÎÀí£¬£¬£¬£¬£¬£¬£¬Ç¿»¯Òªº¦ÐÅÏ¢»ù´¡ÉèÊ©Çå¾²±£» £»£»£»¤£¬£¬£¬£¬£¬£¬£¬ÔöÇ¿ÐÐÒµÍøÂçÇå¾²»ù´¡ÉèÊ©½¨É裬£¬£¬£¬£¬£¬£¬ÔöÇ¿µçÁ¦ÆóÒµÊý¾ÝÇå¾²±£» £»£»£»¤£¬£¬£¬£¬£¬£¬£¬Ìá¸ßÍøÂçÇå¾²Ì¬ÊÆ¸ÐÖª¡¢Ô¤¾¯¼°Ó¦¼±´¦Öóͷ£ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬Ö§³ÖÍøÂçÇå¾²×ÔÖ÷Á¢ÒìÓëÇå¾²¿É¿Ø£» £»£»£»Æð¾¢Íƶ¯µçÁ¦ÐÐÒµÍøÂçÇå¾²¹¤Òµ¿µ½¡Éú³¤£¬£¬£¬£¬£¬£¬£¬ÍƽøÍøÂçÇå¾²¾üÃñÈÚºÏÉî¶ÈÉú³¤£¬£¬£¬£¬£¬£¬£¬ÔöÇ¿ÍøÂçÇå¾²È˲Ų½¶Ó½¨É裬£¬£¬£¬£¬£¬£¬ÍØÕ¹ÍøÂçÇå¾²¹ú¼ÊÏàÖúµÈ12·½ÃæÌá³ö30ÌõÏêϸҪÇ󡣡£¡£¡£¡£

  

 Ô­ÎÄÁ´½Ó£º

https://www.ics-cert.org.cn/portal/page/132/0460854682f84a51baf925e95162aabb.html


2¡¢ÉæÏÓÕÚÑÚ50ÍòÓû§Êý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬¹È¸è½«¹Ø±ÕÉç½»ÍøÂçGoogle+


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

ƾ֤¹È¸èµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬Google+µÄPeople APIÖб£´æÒ»¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíµÚÈý·½¿ª·¢Õß»á¼ûÁè¼Ý50ÍòÓû§µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨Óû§Ãû¡¢µç×ÓÓʼþµØµã¡¢Ö°Òµ¡¢³öÉúÈÕÆÚ¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏÕÕÆ¬ÒÔ¼°ÐÔ±ðµÈÐÅÏ¢¡£¡£¡£¡£¡£¹È¸èÔÚ2018Äê3Ô·¢Ã÷²¢ÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾Ñ¡Ôñ²»Ïò¹«ÖÚÅû¶´ËÊÂÎñ¡£¡£¡£¡£¡£³ýÁËÈϿɴËÊý¾Ýй¶ÊÂÎñÖ®Í⣬£¬£¬£¬£¬£¬£¬¹È¸è»¹Ðû²¼½«¹Ø±ÕGoogle+¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/10/google-plus-shutdown.html


3¡¢Ñо¿ÍŶÓÔÚMikroTik·ÓÉÆ÷µÄRouterOSÖз¢Ã÷¶à¸öÇå¾²Îó²î

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

Tenable ResearchÅû¶MikroTik·ÓÉÆ÷µÄRouterOSÖеÄ4¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬°üÀ¨¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÎó²î£¨CVE-2018-1156£©¡¢ÎļþÉÏ´«Îó²î£¨CVE-2018-1157£©¡¢ÄÚ´æËð»µÎó²î£¨CVE-2018-1159£©ÒÔ¼°¿ÍÕ»ºÄ¾¡Îó²î£¨CVE-2018-1158£©¡£¡£¡£¡£¡£ÆäÖÐÑÏÖØÐÔ×î¸ßµÄÎó²îÊÇRCEÎó²î£¨CVE-2018-1156£©£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²î»ñµÃÍêÕûµÄϵͳ»á¼ûȨÏÞ¡£¡£¡£¡£¡£MikroTikÔÚRouterOS 6.40.9¡¢6.42.7ºÍ6.43ÖÐÐÞ¸´ÁËÕâЩÎó²î¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º
https://www.tenable.com/blog/tenable-research-advisory-multiple-vulnerabilities-discovered-in-mikrotiks-routeros


4¡¢ÈüÃÅÌú¿ËÐû²¼¹ØÓÚAPT28µÄÐÂÌØ¹¤»î¶¯µÄÆÊÎö±¨¸æ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

ÈüÃÅÌú¿ËÐû²¼¹ØÓÚAPT28µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£APT28×Ô2007Äê1ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ2017ÄêºÍ2018Äê¼ÌÐøÆäÇé±¨ÍøÂç»î¶¯¡£¡£¡£¡£¡£ÆäÔÚ2017ÄêºÍ2018ÄêµÄ¹¥»÷Ä¿µÄ°üÀ¨Ò»¸ö×ÅÃûµÄ¹ú¼Ê×éÖ¯¡¢Å·Ö޵ľüÊÂÄ¿µÄ¡¢Å·ÖÞµÄÕþ¸®»ú¹¹¡¢Ò»¸öÄÏÃÀ¹ú¼ÒµÄÕþ¸®»ú¹¹ÒÔ¼°Ò»¸ö¶«Å·¹ú¼ÒµÄ´óʹ¹Ý¡£¡£¡£¡£¡£ÆäʹÓõŤ¾ß°üÀ¨¶ñÒâÈí¼þSofacy¡¢Trojan.ShunnaelÒÔ¼°Trojan.Lojax¡£¡£¡£¡£¡£Ñо¿ÍŶӻ¹·¢Ã÷¸Ã×éÖ¯ÓëÁíÒ»¸ö·¸·¨×éÖ¯Earworm±£´æ¹ØÁª¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º
https://www.symantec.com/blogs/election-security/apt28-espionage-military-government


5¡¢ÒÔÉ«Áйú¼ÒÇå¾²¾ÖÖÒÑÔʹÓÃÓïÒôÐÅÏäÐ®ÖÆWhatsAppÕË»§µÄй¥»÷

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

ÒÔÉ«Áйú¼ÒÍøÂçÇå¾²¾Ö£¨INCSA£©Ðû²¼¹ØÓÚͨ¹ýÓïÒôÐÅÏäÐ®ÖÆWhatsAppÕË»§¹¥»÷µÄ¾¯±¨¡£¡£¡£¡£¡£¾ÝÒÔÉ«ÁÐÕþ¸®³Æ£¬£¬£¬£¬£¬£¬£¬×î½ü¼¸ÖÜÄÚ±£´æ´ó×ÚʹÓøÃÊÖÒÕµ¼ÖÂWhatsAppÕË»§±»Ð®ÖƵı¨¸æ¡£¡£¡£¡£¡£Í¨¹ýÓïÒôÐÅÏäÀ´Ð®ÖÆWhatsAppÕË»§ÊÇÒ»ÖÖÏà¶Ô½ÏÐµĹ¥»÷ÒªÁ죬£¬£¬£¬£¬£¬£¬¸ÃÒªÁì²»ÐèÒªÈκθ߼¶ÊÖÒÕ»ò×°±¸¡£¡£¡£¡£¡£ÒÔÉ«ÁÐÕþ¸®½¨ÒéÓû§ÔÚÓïÒôÐÅÏäÖÐʹÓÃÇ¿ÃÜÂë¾ÙÐб£» £»£»£»¤£¬£¬£¬£¬£¬£¬£¬»òÕ߯ôÓÃWhatsAppÕÊ»§µÄÁ½²½ÑéÖ¤Õ½ÂÔ¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/recent-wave-of-hijacked-whatsapp-accounts-traced-back-to-voicemail-hacking/


6¡¢¼ÓÖݽ«´Ó2020Äê×îÏȽûÓÃadminºÍpasswordµÈÈõÃÜÂë

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

´Ó2020Äê×îÏÈ£¬£¬£¬£¬£¬£¬£¬³§ÉÌÔÚ¼ÓÀû¸£ÄáÑÇÖÝʹÓÃadminºÍpasswordµÈÈõĬÈÏÃÜÂ뽫ÊÇÎ¥·¨µÄ¡£¡£¡£¡£¡£¸ÃÖÝÒÑͨ¹ýÒ»ÏîÖ´·¨£¨ÎïÁªÍøÒþ˽±£» £»£»£»¤·¨°¸£©£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚΪ¸ÃµØÇøÖÆÔì»òÏúÊÛµÄÎïÁªÍø×°±¸É趨¸ü¸ßµÄÇå¾²±ê×¼¡£¡£¡£¡£¡£¸Ã·¨°¸ÒªÇóÔÚÖÆÔìʱΪÿһ̨װ±¸ÌṩΨһµÄÃÜÂë¡£¡£¡£¡£¡£¸Ã·¨°¸»¹ÔÊÐíÔâÊÜËðʧµÄÊܺ¦Õ߯ðËßÎÞÊӸ÷¨°¸µÄ¹«Ë¾ÒÔ»ñµÃÅâ³¥¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º
https://www.bbc.co.uk/news/amp/technology-45757528


ÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·­ÒëºÍÕûÀí