¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190221
Ðû²¼Ê±¼ä 2019-02-21
Check PointÑо¿ÍŶÓÅû¶WinRARÖеĴúÂëÖ´ÐÐÎó²î£¬£¬£¬¸ÃÎó²îÒѱ£´æÁËÁè¼Ý19ÄêµÄʱ¼ä£¬£¬£¬Ó°ÏìÁËÁè¼Ý5ÒÚÓû§¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2018-20250¡¢CVE-2018-20251¡¢CVE-2018-20252ºÍCVE-2018-20253£©±£´æÓÚWinRARµÄUNACEV2.DLL¿âÖУ¬£¬£¬Õâ¸ö¿âÈÏÕæ½âѹËõACEÃûÌõÄѹËõÎļþ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷¸Ã¿â±£´æ±àÂëȱÏÝ£¬£¬£¬¹¥»÷Õß¿ÉʹÓöñÒâACEÎļþÔÚ½âѹËõµÄÄ¿µÄ·¾¶Ö®ÍâÖ²Èë¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£WinRARÍŶÓÌåÏÖÓÉÓÚUNACEV2.DLL´Ó2005ÄêÆð¾Í×èÖ¹Á˸üУ¬£¬£¬¿ª·¢Ö°Ô±ÒѾʧȥÁ˸ÿâÔ´´úÂëµÄ»á¼ûȨÏÞ£¬£¬£¬Òò´ËËûÃÇÑ¡Ôñ·ÅÆú¶ÔACEÃûÌõÄÖ§³Ö¡£¡£¡£¡£¡£¡£¡£WinRAR¿ª·¢ÕßÔÚ1ÔÂ28ÈÕÐû²¼ÁËWinRAR 5.70 Beta 1ÒÔÐÞ¸´´ËÎó²î¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/extracting-code-execution-from-winrar/2¡¢WordPressÍŶÓÐÞ¸´Ò»¸ö¾ßÓÐ6ÄêÀúÊ·µÄRCEÎó²î
RIPS¹«Ë¾µÄÇå¾²Ñо¿Ö°Ô±ÔÚWordPress 5.0.3֮ǰµÄ°æ±¾Öз¢Ã÷Ò»¸ö¿Éµ¼ÖÂRCEµÄÇå¾²Îó²î£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÒÑÍù6Äê¼äÐû²¼µÄËùÓÐWordPress°æ±¾¡£¡£¡£¡£¡£¡£¡£¾ßÓÐÖÁÉÙÒ»¸ö¡°×÷Õß¡±ÕË»§µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²îÔڵײãЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇ·¾¶±éÀúÎó²îºÍÎļþ°üÀ¨Îó²îµÄ×éºÏ£¬£¬£¬ÔÚÑо¿Ö°Ô±Ðû²¼µÄPoCÊÓÆµÖУ¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ¼¸ÃëÖÓÄÚ»ñµÃÄ¿µÄWordPress²©¿ÍµÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£¡£WordPress°æ±¾5.0.1ºÍ4.9.9ÖеÄÇå¾²²½·¥¿É×èÖ¹¸ÃÎó²îʹÓᣡ£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/02/wordpress-remote-code-execution.html3¡¢ÈüÃÅÌú¿ËÐû²¼ISTR 24Äê¶ÈÍþв±¨¸æ£¬£¬£¬2018Ä깩ӦÁ´¹¥»÷ÔöÌí78£¥
ÈüÃÅÌú¿ËÐû²¼»¥ÁªÍøÇå¾²Íþв±¨¸æ£¨ISTR£©Volume 24£¬£¬£¬¸Ã±¨¸æÖ¸³ö±íµ¥Ð®Öƹ¥»÷£¨formjacking£©È¡´úÁËÀÕË÷Èí¼þºÍ¶ñÒâÍÚ¿óÈí¼þ£¬£¬£¬³ÉΪ2018Äê×îÖ÷ÒªµÄÍþв¡£¡£¡£¡£¡£¡£¡£formjacking¹¥»÷Ö÷ÒªÕë¶ÔÔÚÏßÁãÊÛÉ̺͵ç×ÓÉÌÎñÍøÕ¾£¬£¬£¬Í¨¹ý¶ñÒâ´úÂëÀ´ÇÔÈ¡¿Í»§µÄÖ§¸¶ÐÅÏ¢£¬£¬£¬ÕâÖÖ¹¥»÷½øÒ»²½Ö¤ÊµÎú¹©Ó¦Á´¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æµÄÊý¾Ý£¬£¬£¬2018Ä깩ӦÁ´¹¥»÷µÄÊýÄ¿±È2017Äêºá¿ç78%¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Óë2017ÄêÏà±È£¬£¬£¬2018ÄêÀÕË÷Èí¼þ¹¥»÷ϽµÁË20%£¬£¬£¬µ«Õë¶ÔÆóÒµµÄ¹¥»÷ÔöÌíÁË12%£¬£¬£¬²¢ÇÒÒÆ¶¯ÀÕË÷Èí¼þìÉý33%¡£¡£¡£¡£¡£¡£¡£ÔÚ2018Äê1ÔÂÖÁ12ÔÂʱ´ú£¬£¬£¬¼ÓÃÜÐ®ÖÆ¹¥»÷ϽµÁË52%¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.symantec.com/blogs/threat-intelligence/istr-24-cyber-security-threat-landscape4¡¢Î¢ÈíÅû¶APT28й¥»÷»î¶¯£¬£¬£¬Ö÷ÒªÕë¶ÔÅ·ÖÞÕþÖÎʵÌå

΢ÈíÅû¶¶íÂÞ˹APT×éÖ¯Fancy Bear£¨ÓÖ³ÆAPT28£©µÄй¥»÷»î¶¯£¬£¬£¬Æ¾Ö¤Î¢ÈíµÄ±íÊö£¬£¬£¬APT28µÄÄ¿µÄÊÇÓë2019ÄêÅ·ÖÞÒé»áÑ¡¾ÙÏà¹ØµÄÕþÖÎʵÌå¡£¡£¡£¡£¡£¡£¡£APT28ʹÓÃÓã²æÊ½´¹ÂÚÓʼþ£¬£¬£¬ÔÚ2018Äê9ÔÂÖÁ12ÔÂʱ´úÕë¶Ô104¸öÕË»§ÌᳫÁ˹¥»÷¡£¡£¡£¡£¡£¡£¡£ÕâЩÕË»§ÊôÓÚ±ÈÀûʱ¡¢·¨¹ú¡¢µÂ¹ú¡¢²¨À¼¡¢ÂÞÂíÄáÑǺÍÈû¶ûάÑǵÄÕþÖλú¹¹¡£¡£¡£¡£¡£¡£¡£ÕâЩ´¹ÂÚÓʼþÖ¼ÔÚÍøÂçÄ¿µÄµÄµÇ¼ƾ֤»òÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖËü½«°ÑAccountGuardЧÀÍÀ©Õ¹µ½12¸öеÄÅ·ÓѰî¼Ò¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-reveals-new-apt28-cyber-attacks-against-european-political-entities/5¡¢³¯ÏÊAPT×éÖ¯Lazarus£¬£¬£¬Ê¹ÓÃKEYMARBLEºóÃŹ¥»÷¶íÂÞ˹ÆóÒµ
³¯ÏÊAPT×éÖ¯LazarusµÄ·ÖÖ§»ú¹¹BluenoroffÕë¶Ô¶íÂÞ˹ÆóÒµÌᳫÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯Ê¹ÓÃOfficeÎĵµ×÷Ϊ³õʼѬȾǰÑÔ£¬£¬£¬²¢×îÖÕÊÍ·ÅÁËKEYMARBLEºóÃÅ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤US-CERTµÄÏà¹Ø¶ñÒâÈí¼þÆÊÎö±¨¸æ£¬£¬£¬¸ÃºóÃÅľÂí¿ÉÓÃÓÚ»á¼û×°±¸µÄÉèÖÃÊý¾Ý¡¢ÏÂÔØÆäËüÎļþ¡¢Ö´ÐÐÏÂÁî¡¢ÐÞ¸Ä×¢²á±í¡¢½ØÈ¡ÆÁÄ»ÐÅÏ¢ºÍÊý¾ÝÉøÂ©µÈ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-apt-lazarus-targets-russian-entities-with-keymarble-backdoor/6¡¢ATM¶ñÒâÈí¼þWinPot£¬£¬£¬Ê¹ÓÃUSB½Ó¿Ú¾ÙÐÐÈö²¥
¿¨°Í˹»ùÑо¿Ö°Ô±Konstantin Zykov·¢Ã÷ATM¶ñÒâÈí¼þWinPotµÄбäÌåv.3ÒѾÔÚ°µÍøÉÏ·ºÆð£¬£¬£¬Æä±¨¼ÛΪ500ÃÀÔªµ½1000ÃÀÔªÖ®¼ä¡£¡£¡£¡£¡£¡£¡£WinPotͨ¹ýÎïÆÊÎö¼û¾ÙÐÐÈö²¥£¬£¬£¬¼´Í¨¹ýATMµÄUSB½Ó¿ÚÈö²¥¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ³£Õë¶ÔÐÐÈ˽ÏÉٵĽֵÀ¡¢Ò©µê¡¢ÂùÝÀàÊÐËÁµÈÅԱߵĵ¥¸öATM£¬£¬£¬Ò»µ©ATMѬȾÁ˸öñÒâÈí¼þ£¬£¬£¬¹¥»÷Õß¼´¿Éͨ¹ýÏÔʾÆÁÄ»Ç¿ÖÆATMÍ·ºÆð½ð¡£¡£¡£¡£¡£¡£¡£°µÍøÂô¼ÒÔÚÆäÑÝʾÊÓÆµÖÐÑÝʾÁËWinPot v.3µÄÊÂÇéÀú³Ì£¬£¬£¬²¢Õ¹Ê¾ÁËÒ»¶ÎShowMeMoneyµÄ´úÂë¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/atm-jackpotting-malware-winpot/141960/ÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ