¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181122

Ðû²¼Ê±¼ä 2018-11-22
1¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶Ô¶«ÄÏÑǵÄÐÂË®¿Ó¹¥»÷OceanLotus

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾



ESETÑо¿ÍŶӷ¢Ã÷Ò»¸öÕë¶Ô¶«ÄÏÑǵÄÐÂË®¿Ó¹¥»÷»î¶¯£¬£¬ £¬ £¬£¬¸Ã»î¶¯×Ô2018Äê9ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬ £¬ £¬£¬²¢ÇÒ¹æÄ£ºÜ´ó¡£¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±¹²·¢Ã÷ÁË21¸ö±»ÈëÇÖµÄÍøÕ¾£¬£¬ £¬ £¬£¬°üÀ¨¼íÆÒÕ¯¹ú·À²¿¡¢¼íÆÒÕ¯Íâ½»Óë¹ú¼ÊÏàÖú²¿ÒÔ¼°Ò»Ð©Ô½Äϱ¨Ö½ºÍ²©¿ÍÍøÕ¾µÈ¡£¡£¡£¡£ ¡£¡£¡£Æ¾Ö¤ÆÊÎö£¬£¬ £¬ £¬£¬ESETºÜÊÇ¿£¿£¿£¿Ï¶¨´Ë´Î¹¥»÷»î¶¯ÊÇÓÉ·¸·¨ÍÅ»ïOceanLotusÔËÓªµÄ£¬£¬ £¬ £¬£¬¸Ã×éÖ¯Ò²±»³ÆÎªAPT32»òAPT-C-00¡£¡£¡£¡£ ¡£¡£¡£

  

 Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2018/11/20/oceanlotus-new-watering-hole-attack-southeast-asia/


2¡¢Ñо¿ÍŶӷ¢Ã÷»¨Ê½ÐÜʹÓÃÐÂľÂíCannon¹¥»÷È«Çò¶à¸öÕþ¸®»ú¹¹

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Palo Alto NetworksµÄUnit 42ÍŶÓÔÚ2018Äê10ÔÂβºÍ11Ô³õ·¢Ã÷ÁËÒ»¸öеÄÓã²æÊ½´¹Âڻ¡£¡£¡£¡£ ¡£¡£¡£¸Ã»î¶¯Óë¶íÂÞ˹APT×éÖ¯»¨Ê½ÐÜ£¨APT28£©ÓйØ£¬£¬ £¬ £¬£¬Ö÷ÒªÕë¶Ô±±ÃÀ¡¢Å·ÖÞºÍǰËÕÁª¹ú¼ÒµÄÕþ¸®»ú¹¹¡£¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±ÔڸûÖз¢Ã÷ÁËÒ»¸öÐµÄľÂíCannon£¬£¬ £¬ £¬£¬CannonʵÏÖÁËÆÕ±éµÄ¹¦Ð§£¬£¬ £¬ £¬£¬°üÀ¨ÍøÂçϵͳÐÅÏ¢¡¢½ØÈ¡ÆÁÄ»ºÍµÇ¼POP3ÓÊÏäÕË»§µÈ¡£¡£¡£¡£ ¡£¡£¡£CannonʹÓõç×ÓÓʼþÕË»§sahro.bella7[at]post.cz×÷ΪC2ЧÀÍÆ÷¡£¡£¡£¡£ ¡£¡£¡£

 

 Ô­ÎÄÁ´½Ó£º

https://researchcenter.paloaltonetworks.com/2018/11/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/


3¡¢Ñо¿ÍŶӷ¢Ã÷LazarusÔÙ´ÎÕë¶ÔÀ­¶¡ÃÀÖÞ½ðÈÚ»ú¹¹Ìᳫ¹¥»÷

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Lazarus£¨APT38£©Õë¶ÔÀ­¶¡ÃÀÖÞ¶à¸ö½ðÈÚ»ú¹¹ÔÙ´ÎÌᳫ¹¥»÷¡£¡£¡£¡£ ¡£¡£¡£LazarusµÄºóÃŰüÀ¨Èý¸öÖ÷Òª²¿¼þ£¬£¬ £¬ £¬£¬ÆäÖÐAuditCred.dll/ROptimizer.dllÊÇЧÀͼÓÔØ³ÌÐò£¬£¬ £¬ £¬£¬Msadoz.dllÊÇÏÖʵµÄ¼ÓÃܺóÃÅ£¬£¬ £¬ £¬£¬Auditcred.dll.mui/rOptimizer.dll.muiÊǼÓÃܵÄÉèÖÃÎļþ¡£¡£¡£¡£ ¡£¡£¡£ÕâЩºóÃÅÓÚ2018Äê9ÔÂ19ÈÕ×°ÖÃÔÚÊÜѬȾµÄÅÌËã»úÉÏ£¬£¬ £¬ £¬£¬ÓÃÓÚÍøÂçϵͳÐÅÏ¢¡¢·­¿ª·´µ¯shell¡¢É¾³ýÍâµØÎļþ¡¢ÖÎÀíÍâµØÀú³Ì¡¢×¢Èë´úÂëÒÔ¼°ÏÂÔØÆäËü¶ñÒâÈí¼þµÈ¡£¡£¡£¡£ ¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/lazarus-continues-heists-mounts-attacks-on-financial-organizations-in-latin-america/


4¡¢Ñо¿ÍŶÓÅû¶Atlantis Word ProcessorÖеÄ3¸ö´úÂëÖ´ÐÐÎó²î

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


˼¿ÆTalosÔÙ´ÎÔÚAtlantis Word ProcessorÖз¢Ã÷3¸öÇå¾²Îó²î¡£¡£¡£¡£ ¡£¡£¡£AtlantisÊÇMicrosoft WordµÄÌæ»»Èí¼þ£¬£¬ £¬ £¬£¬¿ÉÔÊÐíÓû§ÇáËɽ¨Éè¡¢ÔĶÁºÍ±à¼­WordÎĵµ¡£¡£¡£¡£ ¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄÎó²î°üÀ¨í§ÒâдÈëÎó²î£¨CVE-2018-4038£©¡¢Ô½½çдÎó²î£¨CVE-2018-4039£©ºÍδ³õʼ»¯Ö¸ÕëÎó²î£¨CVE-2018-4040£©£¬£¬ £¬ £¬£¬ÕâЩÎó²î¿ÉÔÊÐíÔ¶³Ì¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë²¢½ÓÊÜϵͳ¡£¡£¡£¡£ ¡£¡£¡£AtlantisÍŶÓÐû²¼ÁËа汾3.2.10.1À´ÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/11/word-processor-vulnerability.html


5¡¢Ó¢¹úÑÇÂíÑ·ÒâÍâй¶²¿·Ö¿Í»§ÐÅÏ¢£¬£¬ £¬ £¬£¬ÏÖÔÚÉÐÎÞ¸ü¶àϸ½Ú

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ó¢¹úÑÇÂíÑ·Ïò²¿·Ö¿Í»§·¢ËÍÓʼþ³Æ£¬£¬ £¬ £¬£¬ÓÉÓÚÊÖÒÕ¹ýʧ£¬£¬ £¬ £¬£¬ÕâЩ¿Í»§µÄÐÕÃûºÍµç×ÓÓʼþµØµã±»ÒâÍâй¶£¬£¬ £¬ £¬£¬ÏÖÔÚ¸ÃÎÊÌâÒÑ»ñµÃ½â¾ö£¬£¬ £¬ £¬£¬ÊÜÓ°ÏìµÄ¿Í»§ÎÞÐèÐÞ¸ÄÃÜÂë»ò½ÓÄÉÆäËü²Ù×÷¡£¡£¡£¡£ ¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ͸¶ÊÂÎñ±¬·¢µÄÔµ¹ÊÔ­ÓÉ£¬£¬ £¬ £¬£¬Ò²Ã»ÓÐ͸¶¸ü¶àÊÖÒÕϸ½Ú£¬£¬ £¬ £¬£¬Ò²²»ÇåÎúÓм¸¶à¿Í»§Êܵ½Ó°Ïì¡£¡£¡£¡£ ¡£¡£¡£ÓÉÓÚÕâÒ»ÊÂÎñ±¬·¢ÔÚºÚÎå¼´½«µ½À´Ö®¼Ê£¬£¬ £¬ £¬£¬ÕâÓÈÆäÁîÈ˵£ÐÄ¡£¡£¡£¡£ ¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78280/data-breach/amazon-uk-data-breach.html


6¡¢ÃÀ¹úÓÊÕþЧÀ͹ÙÍøÎó²î¿Éµ¼ÖÂ6000ÍòÓû§Êý¾Ýй¶

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


±¾ÖÜÈýÃÀ¹úÓÊÕþЧÀÍ£¨USPS£©ÐÞ¸´Á˹ÙÍøÉϵÄÒ»¸öÇå¾²Îó²î£¬£¬ £¬ £¬£¬¸ÃÎó²î¿ÉÔÊÐíÈκÎÓµÓÐUSPS.comÕË»§µÄÈËÉó²éºÍÐÞ¸ÄÆäËûÓû§ÕË»§µÄÏêϸÐÅÏ¢£¬£¬ £¬ £¬£¬Ô¼ÓÐ6000ÍòÓû§Êܵ½Ó°Ïì¡£¡£¡£¡£ ¡£¡£¡£¸ÃÎó²î±£´æÓÚUSPSµÄAPI Informed VisibilityÖУ¬£¬ £¬ £¬£¬Æ¾Ö¤Kerbs on SecurityµÄ±¨µÀ£¬£¬ £¬ £¬£¬Ò»Ãû×ÔÁ¦µÄÇå¾²Ñо¿Ö°Ô±ÔÚÒ»Äêǰ·¢Ã÷ÁËÕâ¸öÎó²î²¢±¨¸æ¸øÁËUSPS£¬£¬ £¬ £¬£¬µ«²¢Î´ÊÕµ½Èκλظ´¡£¡£¡£¡£ ¡£¡£¡£ÔÚKerbs¹ûÕæÅû¶´ËÎÊÌâºó£¬£¬ £¬ £¬£¬USPSÐÞ¸´ÁËÕâ¸öÎó²î¡£¡£¡£¡£ ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78298/hacking/us-postal-service-flaws.html


ÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·­ÒëºÍÕûÀí