¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190308

Ðû²¼Ê±¼ä 2019-03-08
1¡¢¿¨°Í˹»ùÐû²¼2018Äê½ðÈÚÐÐÒµÍøÂçÍþвµÄÆÊÎö±¨¸æ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ƾ֤¿¨°Í˹»ùÐû²¼µÄ2018Äê½ðÈÚÐÐÒµÍþв¾°¹Û±¨¸æ£¬£¬£¬2018Äê½ðÈÚÐÐÒµÔâµ½µÄ´¹ÂÚ¹¥»÷Õ¼Æä¼ì²âµ½µÄËùÓд¹ÂÚ¹¥»÷µÄ½üÒ»°ë£¨44.7%£©£¬£¬£¬Ïà±È2017ÄêµÄ53.8%ÓÐËùϽµ¡£¡£¡£2018ÄêÔâµ½ÒøÐÐľÂí¹¥»÷µÄÓû§ÊýĿΪ889452£¬£¬£¬Óë2017ÄêµÄÊý×Ö767072Ïà±ÈÔöÌíÁË15.9£¥¡£¡£¡£×î³£Ôâµ½ÒøÐÐľÂí¹¥»÷µÄ¹ú¼ÒÊǶíÂÞ˹¡¢µÂ¹ú¡¢Ó¡¶È¡¢Ô½ÄÏ¡¢Òâ´óÀû¡¢ÃÀ¹úºÍÖйú¡£¡£¡£2018ÄêÔâµ½AndroidÒøÐжñÒâÈí¼þ¹¥»÷µÄÓû§ÊýÄ¿ÔöÌíÁËÁ½±¶¶à£¬£¬£¬´ï1799891¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://securelist.com/financial-cyberthreats-in-2018/89788/

2¡¢ÐÂÍøÂçÌØ¹¤×éÖ¯Whitefly£¬£¬£¬ÓëÐÂ¼ÓÆÂ¶à¸ö¹¥»÷»î¶¯ÓйØ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÈüÃÅÌú¿ËÑо¿ÍŶӳÆ2018Äê7ÔÂÐÂ¼ÓÆÂSingHealth´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ±³ºóµÄ¹¥»÷ÕßÊÇÍøÂçÌØ¹¤×éÖ¯Whitefly¡£¡£¡£¸Ã×éÖ¯×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬Ö÷ÒªÕë¶ÔÐÂ¼ÓÆÂµÄ²î±ðÐÐÒµµÄ¹«Ë¾£¬£¬£¬²¢ÊÔͼÇÔÈ¡´ó×ÚÃô¸ÐÐÅÏ¢¡£¡£¡£×Ô2017ÄêÖÐÆÚµ½2018ÄêÖÐÆÚ£¬£¬£¬WhiteflyÒѾ­ÏòÒ½ÁƱ£½¡¡¢Ã½Ìå¡¢µçÐź͹¤³ÌÁìÓòµÄ¶à¸öÆóÒµÌᳫÁ˹¥»÷£¬£¬£¬ÆäʹÓõŤ¾ß°üÀ¨Vcrodat¡¢Nibatad¡¢RootkitºÍMimikatz¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.symantec.com/blogs/threat-intelligence/whitefly-espionage-singapore

3¡¢Ñо¿ÍŶӷ¢Ã÷2Ô·ÝÀÕË÷Èí¼þShadeµÄ¹¥»÷»î¶¯ì­Éý

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

Malwarebytes LabsÑо¿ÍŶӷ¢Ã÷ÀÕË÷Èí¼þTroldesh£¨ÓÖÃûShade£©ÔÚ2018ÄêQ4µ½2019ÄêQ1ʱ´úµÄ¼ì²âÊýÄ¿¼±¾çÔöÌí¡£¡£¡£Shadeͨ³£Í¨¹ý´¹ÂÚÓʼþ¾ÙÐÐÈö²¥£¬£¬£¬Æä¸½¼þÊǰüÀ¨Javascript¾ç±¾µÄzipÎļþ¡£¡£¡£ShadeµÄÖ÷Òª¹¥»÷Ä¿µÄÊÇWindowsϵͳ£¬£¬£¬Æä½ÓÄÉAES 256 CBCËã·¨¾ÙÐмÓÃÜ¡£¡£¡£²¿·ÖShadeµÄ±äÖÖ±£´æÃâ·ÑµÄ½âÃܹ¤¾ß£¬£¬£¬Óû§¿ÉÔÚNoMoreRansom.orgÍøÕ¾ÉÏÕÒµ½ËüÃÇ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/threat-analysis/2019/03/spotlight-troldesh-ransomware-aka-shade/

4¡¢Ñо¿ÍŶӷ¢Ã÷Ê׸öʹÓÃSlack API¾ÙÐÐͨѶµÄSLUBºóÃÅ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Ê׸öʹÓÃSlack APIͨѶµÄ¶ñÒâÈí¼þSLUBºóÃÅ¡£¡£¡£SLUBÊÇÒ»¸öÓÃC++±àдµÄ×Ô½ç˵ºóÃÅ£¬£¬£¬Æä°üÀ¨¾²Ì¬Á´½Ó¿âcurl£¨ÓÃÓÚÖ´ÐÐHTTPÇëÇ󣩡¢boost£¨ÓÃÓÚ´ÓgistƬ¶ÏÖÐÌáÈ¡ÏÂÁºÍJsonCpp£¨ÓÃÓÚÆÊÎöslackͨѶ£©¡£¡£¡£¸ÃºóÃÅͨ¹ýË®¿Ó¹¥»÷Èö²¥£¬£¬£¬²¢ÇÒʹÓÃÁË΢ÈíÔÚ2018Äê5ÔÂÐÞ¸´µÄVBScriptÒýÇæÎó²î£¨CVE-2018-8174£©¾ÙÐÐѬȾ¡£¡£¡£¸ÃºóÃÅ»¹»á´ÓGithubÉÏÏÂÔØÒ»¸öÌØ¶¨µÄgistƬ¶Ï²¢ÌáÈ¡Ïà¹ØÏÂÁî¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/new-slub-backdoor-uses-github-communicates-via-slack/

5¡¢ÐÂľÂíPirate Matryoshka£¬£¬£¬Ê¹Óú£µÁÍå¾ÙÐзַ¢

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

¿¨°Í˹»ùÑо¿ÍŶӷ¢Ã÷¹¥»÷ÕßʹÓú£µÁÍå·Ö·¢ÐÂľÂíPirate Matryoshka¡£¡£¡£¸ÃľÂíαװ³ÉÆÆ½âÈí¼þµÄ×°ÖÃÎļþ£¬£¬£¬µ±Óû§ÔËÐиÃÎļþʱ£¬£¬£¬½«»áÏÔʾһ¸öαÔìµÄº£µÁÍåµÇÂ¼Ò³Ãæ¡£¡£¡£Ò»µ©Óû§ÊäÈëÕË»§ÃûºÍÃÜÂ룬£¬£¬¹¥»÷Õ߾ͻáÐ®ÖÆÓû§µÄÕË»§²¢ÉÏ´«¸ü¶àµÄ¶ñÒâÎļþ¡£¡£¡£±ðµÄ£¬£¬£¬×°ÖÃÎļþ»¹Ä¬ÈÏÀ¦°óÁËÆäËüÈí¼þ£¬£¬£¬ÆäÖÐÎå·ÖÖ®Ò»ÊÇ¹ã¸æÈí¼þ¡¢Ð®ÖÆä¯ÀÀÆ÷Ö÷Ò³µÄ¶ñÒâÈí¼þÒÔ¼°Ä¾ÂíµÈ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.kaspersky.com/blog/pirate-matryoshka-malware/25905/

6¡¢Ë¼¿ÆÐÞ¸´Nexus½»Á÷»úÖеĶþÊ®¶à¸öÇå¾²Îó²î

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

˼¿Æ±¾ÖÜÐÞ¸´ÁËNexus½»Á÷»úÖеĶþÊ®¶à¸öÇå¾²Îó²î£¬£¬£¬Îó²î¹æÄ£°üÀ¨DoS¡¢í§Òâ´úÂëÖ´ÐкÍȨÏÞÌáÉýµÈ¡£¡£¡£ÕâЩÎó²îÓ°ÏìÁËTetration AnalyticsÊðÀí¡¢LDAP¡¢Óû§ÕÊ»§ÖÎÀí½çÃæ¡¢ÏÂÁîÐнçÃæ£¨CLI£©µÈ×é¼þ£¬£¬£¬¶à¸öÎó²î¿ÉÔÊÐíÍâµØ¹¥»÷Õß¾ÙÐÐÌáȨ¡¢ÒÔrootÉí·ÝÖ´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ¡¢»ñÈ¡Ö÷ÒªÉèÖÃÎļþµÄ»á¼ûȨÏÞ»ò¾ÙÐÐÊÜÏÞshellÌÓÒÝ¡£¡£¡£±ðµÄ£¬£¬£¬Ë¼¿Æ»¹½¨ÒéÓû§½ÓÄɲ½·¥±£»£»£»¤°²ÅÅÁËPOAPµÄÍøÂç»ò½ûÓøù¦Ð§¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82120/breaking-news/cisco-nexus-flaws-2.html

ÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·­ÒëºÍÕûÀí