¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181203

Ðû²¼Ê±¼ä 2018-12-03
1¡¢APT×éÖ¯Tropic TrooperжñÒâ»î¶¯£¬£¬£¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³ÎïÐÐÒµ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Windows Defender ATPÍŶӷ¢Ã÷Ò»¸öÕë¶ÔÑÇÖÞÄÜÔ´¡¢Ê³ÎïºÍÒûÁÏÐÐÒµµÄжñÒâ¹¥»÷»î¶¯£¬£¬£¬»ùÓڶԸûµÄÄ¿µÄÑ¡Ôñ¡¢¹¥»÷Á´ÒÔ¼°¹¤¾ß¼¯µÄÆÊÎö£¬£¬£¬Ñо¿ÍŶÓÒÔΪ¸Ã»î¶¯ÊÇÓÉAPT×éÖ¯Tropic TrooperÌᳫµÄ¡£¡£¡£¹¥»÷µÄ³õʼÏòÁ¿ÊÇÒ»¸öʹÓÃÁËOffice¹«Ê½±à¼­Æ÷Îó²îCVE-2018-0802µÄ¶ñÒâÎĵµ£¬£¬£¬¹¥»÷ÕßËæºóʹÓÃbitsadmin.exe´ÓÔ¶³ÌЧÀÍÆ÷ÏÂÔØ²¢Ö´ÐÐËæ»úÃüÃûµÄpayload¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪÕâЩpayloadµÄÖ÷ҪĿµÄÊÇÇÔÈ¡Êý¾Ý¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/


2¡¢¾ÉƿװоÆ£¬£¬£¬¶ñÒâ¹¥»÷»î¶¯Butter¼ÓÈëÐÂsambaľÂí

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


GuardiCoreÑо¿ÍŶӷ¢Ã÷¶ñÒâ¹¥»÷»î¶¯butter¼ÓÈëÁËÐÂpayload£ºsambaľÂí¡£¡£¡£butter×îÔç·ºÆðÓÚ2015ÄêÖÐÆÚ£¬£¬£¬Æä¹¥»÷À´×ÔÓÚÓÐÏ޵öIP£¬£¬£¬ÏêϸÀ´Ëµ£¬£¬£¬Ö»ÓÐ4¸öIP±»ÓÃÓÚ²î±ð½×¶ÎµÄ¹¥»÷»î¶¯¡£¡£¡£ÕâЩIPÀ´×ÔÓÚÏã¸ÛºÍÐÂ¼ÓÆÂ£¬£¬£¬²¢ÇÒ×Ô2016ÄêÒÔÀ´Ò»Ö±Óë¶ñÒâ»î¶¯Ïà¹ØÁª¡£¡£¡£butterÔçÆÚµÄpayloadÊÇ80 RAT£¬£¬£¬µ«×Ô2018Äê7ÔÂÆð×îÏÈʹÓÃsambaľÂí¡£¡£¡£sambaľÂíÊǵ䷶µÄRAT£¬£¬£¬¿ÉÒÔÏÂÔØÎļþ¡¢Ö´ÐÐshellÏÂÁî¡¢ÌᳫDDoS¹¥»÷ÒÔ¼°¾ßÓÐÉý¼¶»úÖÆ¡£¡£¡£Ñо¿Ö°Ô±ÒѾ­ÊӲ쵽Á˸ÃľÂíµÄ7¸ö²î±ðµÄ°æ±¾¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.guardicore.com/2018/11/butter-brute-force-ssh-attack-tool-evolution


3¡¢Õ¹ÍûδÀ´£¬£¬£¬McAfeeÐû²¼2019ÄêÍøÂçÍþвչÍû±¨¸æ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


McAfeeʵÑéÊÒ¹ØÓÚ2019ÄêÍøÂçÍþвµÄÕ¹Íû°üÀ¨£º·¸·¨·Ö×ӵĵØÏÂͬÃ˹ØÏµ½«Ô½·¢Àο¿£¬£¬£¬²¢½«½¨Éè¸ü¶àÏàÖúͬ°é¹ØÏµ£¬£¬£¬ÔöÇ¿ÆäÍþвÐÔ£»£»£»£»£» £»È˹¤ÖÇÄÜÊÇÌÓ±ÜÊÖÒÕµÄδÀ´£»£»£»£»£» £»Ð­Í¬ÐÔÍþв½«ÔöÌí£¬£¬£¬Òò´ËÐèÒª¸ü¶àµÄ×ÛºÏÐÔÏìÓ¦²½·¥£»£»£»£»£» £»·¸·¨·Ö×ÓʹÓÃÉ罻ýÌåÈö²¥ÐéαÐÅÏ¢£¬£¬£¬²¢Õë¶ÔÉÌ¼ÒÆ·ÅÆÌᳫڲƭ»î¶¯£»£»£»£»£» £»Êý¾ÝÉøÂ©¸ü¶àµØÕë¶ÔÔÆ¶Ë£»£»£»£»£» £»ÓïÒôÖúÊÖ³ÉΪIoT¹¥»÷µÄÏÂÒ»¸öÔØÌ壻£»£»£»£» £»·¸·¨·Ö×Ó½«¸ü¶àµØÕë¶ÔÉí·Ýƽ̨ºÍ½çÏß×°±¸Ìᳫ¹¥»÷¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securingtomorrow.mcafee.com/mcafee-labs/mcafee-labs-2019-threats-predictions/


4¡¢´ÓδͣЪ£¬£¬£¬ÒøÐÐľÂíBackSwap3ÔÂÖÁ11Ô¶ñÒâ»î¶¯ÆÊÎö

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Check PointÑо¿ÍŶÓÐû²¼¹ØÓÚÒøÐÐľÂíBackSwapµÄÑݱäÇ÷ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£BackSwap×îÔçÓÚ2018Äê3ÔÂÖÐÑ®±»·¢Ã÷£¬£¬£¬ÆäʱµÄÑù±¾½ÏΪ¼òÆÓ£¬£¬£¬Ö÷ÒªÕë¶Ô²¨À¼ÒøÐÐipko.pl¡¢24.plºÍmbank.pl¡£¡£¡£4Ô·Ý£¬£¬£¬ÐµÄÑù±¾Öн«¸ü¶àµÄÒøÐÐÌí¼ÓΪĿµÄ£¬£¬£¬²¢×îÏÈÔÚÄ¿µÄÍøÕ¾µÄDOMÖн¨ÉèÐéαµÄÊäÈë±í¸ñ£¬£¬£¬ÁýÕÖԭʼÊäÈë×ֶΡ£¡£¡£5Ô·Ý£¬£¬£¬BackSwap×îÏȸú×ÙÊÜѬȾ»úеµÄÊýÄ¿¡£¡£¡£6Ô·Ý£¬£¬£¬BackSwap½«ÆäÓÐÓúÉÔØÇ¶ÈëBMPͼÏñÖС£¡£¡£7Ô·ÝBackSwapûÓÐÈκλ£¬£¬£¬µ«ÔÚ8Ô·Ý×îÏÈתÏòÕë¶ÔÎ÷°àÑÀÒøÐС£¡£¡£9Ôµ½11Ô·ÝBackSwapÖ÷ÒªÊǶÔͼÏñÃûÌõÄpayload¾ÙÐÐÐ޸쬣¬£¬²¢Ìí¼ÓÁ˸ü¶à¼ÓÃܲãºÍ´ó×ÚÀ¬»ø´úÂë¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/the-evolution-of-backswap/


5¡¢Êý¾Ý¿â²»ÉèÃÜÂ룬£¬£¬Urban¹«Ë¾Áè¼Ý30ÍòÓû§ÐÅϢй¶

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


UrbanÊÇÒ»¼ÒÓ¢¹úµÄÍÆÄô´Òµ¹«Ë¾£¬£¬£¬ÆäÊý¾Ý¿âÒòδÉèÃÜÂëµ¼ÖÂÁè¼Ý30Íò¿Í»§ÐÅϢй¶¡£¡£¡£Ñо¿Ö°Ô±Oliver Houghͨ¹ýShodan·¢Ã÷Á˸ÃÊý¾Ý¿â£¬£¬£¬ÏÖÔÚ¸ÃÊý¾Ý¿âÒÑÏÂÏߣ¬£¬£¬µ«²»ÖªµÀ¸ÃÊý¾Ý¿â̻¶Á˶೤ʱ¼ä¡£¡£¡£¸ÃÊý¾Ý¿âÖаüÀ¨Áè¼Ý30.9ÍòÓû§¼Í¼£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëµÈ¡£¡£¡£±ðµÄ£¬£¬£¬Êý¾Ý¿âÖл¹´æ´¢ÁËÁè¼Ý35.1Íò¸öЧÀÍÔ¤¶¨¼Í¼£¬£¬£¬ÒÔ¼°Áè¼Ý2000¸öÍÆÄÃʦµÄÏà¹ØÐÅÏ¢¡£¡£¡£

 

 Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2018/11/27/urban-massage-data-exposed-customers-creepy-clients/


6¡¢Ë¼¿ÆÐÞ¸´PrimeÔÊÐíÖ¤ÖÎÀíÆ÷ÖеÄSQL×¢ÈëÎó²î

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


˼¿ÆÐÞ¸´ÁËPrimeÔÊÐíÖ¤ÖÎÀíÆ÷£¨PLM£©ÖеÄÒ»¸öSQL×¢ÈëÎó²î£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ´ÐÐí§ÒâSQLÅÌÎÊ¡£¡£¡£¸ÃÎó²î£¨CVE-2018-15441£©ÓëPLMµÄWeb¿ò¼Ü´úÂëÓйØ£¬£¬£¬Æ¾Ö¤Ë¼¿ÆµÄÐÎò£¬£¬£¬¸ÃÎó²îÊÇÓÉÓÚSQLÅÌÎÊÖÐȱÉÙ¶ÔÓû§ÊäÈë¾ÙÐÐÑéÖ¤µ¼ÖµÄ£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËͰüÀ¨SQLÓï¾äµÄ¶ñÒâHTTP POSTÇëÇó´¥·¢¸ÃÎó²î£¬£¬£¬´Ó¶ø»ñµÃshellȨÏÞ»òÐ޸ļ°É¾³ýPLMÊý¾Ý¿âÖеÄÊý¾Ý¡£¡£¡£PLM 11.0.1¼°Ö®ºóµÄ°æ±¾Êܵ½Ó°Ï죬£¬£¬½¨ÒéÓû§¾¡¿ì×°ÖÃÐÞ¸´²¹¶¡¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject


ÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·­ÒëºÍÕûÀí