Docker HubÔâÈëÇÖ£¬ £¬£¬19ÍòÕ˺ű»Ð¹Â¶£»£»£»£»£»£»£»¶ñÒâÈí¼þBabyShark£»£»£»£»£»£»£»MagecartÒÑѬȾ200¶à¸öµçÉÌÍøÕ¾

Ðû²¼Ê±¼ä 2019-04-28
1.Docker HubÔâºÚ¿ÍÈëÇÖ£¬ £¬£¬19ÍòÓû§µÄÃô¸ÐÐÅϢй¶


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


4ÔÂ25ÈÕDocker HubÔâºÚ¿ÍÈëÇÖ£¬ £¬£¬µ¼ÖÂÔ¼19ÍòÓû§ÕË»§µÄÃô¸ÐÐÅϢй¶¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÓÃÓÚ×Ô¶¯¹¹½¨Docker¾µÏñ¶øÊÚȨ¸øDocker HubµÄGitHubºÍBitbucket»á¼ûÁîÅÆ£¬ £¬£¬ÒÔ¼°Óû§ÃûºÍ¹þÏ£ÃÜÂë¡£¡£¡£¡£Æ¾Ö¤Docker¹Ù·½µÄ˵·¨£¬ £¬£¬ÊÜÓ°ÏìµÄÓû§Ô¼Õ¼×ÜÓû§ÊýÄ¿µÄ5%¡£¡£¡£¡£DockerÌåÏÖÔÚ·¢Ã÷ÈëÇÖºóÁ¬Ã¦ÏòÓû§·¢ËÍÁËÓʼþ֪ͨ£¬ £¬£¬²¢½ÓÄɲ½·¥±£»£»£»£»£»£»£»¤Óû§µÄÊý¾Ý¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/docker-hub-database-hack-exposes-sensitive-data-of-190k-users/

2.iLnkP2PÒ×ÊÜÖÐÐÄÈ˹¥»÷£¬ £¬£¬200¶àÍǫ̀ÔÚÏß×°±¸±£´æÎ£º¦


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±Paul Marrapese·¢Ã÷iLnkP2Pϵͳ±£´æÇå¾²Îó²î£¬ £¬£¬µ¼ÖÂÊý°ÙÍǫ̀IoT×°±¸Ò×Êܹ¥»÷¡£¡£¡£¡£iLnkP2PÔÊÐíÓû§Ê¹ÓÃÊÖ»ú»òPCÔ¶³ÌÅþÁ¬ËûÃǵÄIoT×°±¸£¬ £¬£¬¸Ãϵͳ±»¶à¼Ò¹©Ó¦ÉÌÆÕ±é½ÓÄÉ£¬ £¬£¬°üÀ¨Hichip¡¢TENVISºÍVStarcamµÈ¡£¡£¡£¡£Marrapese·¢Ã÷µÄÎó²î°üÀ¨Ã¶¾ÙÎó²î£¨CVE-2019-11219£©ºÍ¿Éµ¼ÖÂÖÐÐÄÈ˹¥»÷µÄÎó²î£¨CVE-2019-11220£©£¬ £¬£¬ÕâÁ½¸öÎó²îÏÖÔÚÉÐÎÞÐÞ¸´²¹¶¡¡£¡£¡£¡£Marrapese»¹·¢Ã÷Ô¼ÓÐ200¶àÍǫ̀ÔÚÏß×°±¸Ò×Êܹ¥»÷£¬ £¬£¬ÆäÖÐ39£¥µÄ×°±¸Î»ÓÚÖйú£¬ £¬£¬19£¥Î»ÓÚÅ·ÖÞ£¬ £¬£¬7£¥Î»ÓÚÃÀ¹ú¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/84525/hacking/ilnkp2p-flaws-iot.html

3.˼¿ÆTalosÅû¶Sierra Wireless AirLinkÍø¹ØÖеĶà¸öÎó²î

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

˼¿ÆTalosÅû¶Sierra Wireless AirLinkϵÁеÄÍø¹ØºÍ·ÓÉÆ÷ÖеĶà¸öÇå¾²Îó²î¡£¡£¡£¡£ÕâЩװ±¸±»ÆÕ±éÓÃÓÚÆóÒµÇéÐÎÖй¤Òµ×°±¸¡¢ÖÇÄÜ×°±¸¡¢´«¸ÐÆ÷¡¢PoS¼°ICSµÄÅþÁ¬¡£¡£¡£¡£Îó²î¹æÄ£°üÀ¨í§Òâ´úÂëÖ´ÐС¢ÖÎÀíÔ±ÃÜÂë¸ü¸Ä¡¢ÏµÍ³ÉèÖÃÐ޸ġ¢Óû§Æ¾Ö¤Ð¹Â¶¡¢CSRF¡¢XSSµÈ¡£¡£¡£¡£´ó´ó¶¼Îó²î±£´æÓÚ×°±¸¸½´øµÄWebЧÀÍÆ÷ACEManagerÖС£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/84533/security/sierra-wireless-airlink-es450-flaws.html

4.¶ñÒâÈí¼þBabySharkµÄй¥»÷»î¶¯£¬ £¬£¬·Ö·¢KimJongRATºÍPCRat


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Palo Alto NetworksµÄUnit 42ÍŶÓÐû²¼¹ØÓÚBabySharkжñÒâ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£BabySharkÊÇ2Ô·ݷºÆðµÄ¶ñÒâÈí¼þ£¬ £¬£¬Æä¹¥»÷»î¶¯Ò»Á¬µ½ÁË3ÔºÍ4Ô£¬ £¬£¬×îй¥»÷»î¶¯µÄÄ¿µÄËÆºõÓÐÁ½¸ö£ºÕë¶ÔºËÇå¾²ºÍ³¯Ïʰ뵺¹ú¼ÒÇå¾²ÎÊÌâµÄÌØ¹¤»î¶¯£»£»£»£»£»£»£»ÒÔ¼°Õë¶Ô¼ÓÃÜÇ®±ÒÐÐÒµÀ´»ñÈ¡¿î×Ó¡£¡£¡£¡£BabySharkµÄ¶ñÒâpayload°üÀ¨KimJongRATºÍPCRat£¬ £¬£¬µ«¹¥»÷ÕßÔÚ¶ñÒâ´úÂëÖн«ËüÃÇͳ³ÆÎªCowboy¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/

5.¹¥»÷ÕßʹÓÃAtlassian Confluence ServerÎó²î·Ö·¢GandCrabºÍDofloo


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±Augusto II Remillano·¢Ã÷¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃAtlassian Confluence ServerÖеÄÎó²î£¨CVE-2019-3396£©À´·Ö·¢ÀÕË÷Èí¼þGandCrabºÍľÂíDofloo¡£¡£¡£¡£Æ¾Ö¤NVD£¬ £¬£¬¸ÃÎó²î¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÄ£°å×¢ÈëʵÏÖ·¾¶±éÀúºÍÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£AtlassianÔÚ3ÔÂ20ÈÕÐÞ¸´Á˸ÃÎó²î£¬ £¬£¬ÓÉÓÚ¶à¸öexploit¹ûÕæ¿ÉÓ㬠£¬£¬¹¥»÷ÕßÕýÔÚÆð¾¢É¨ÃèÒ×Êܹ¥»÷µÄЧÀÍÆ÷À´ÊµÑé¹¥»÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/vulnerable-confluence-servers-get-infected-with-ransomware-trojans/

6.MagecartÇÔÈ¡Óû§Ö§¸¶ÐÅÏ¢£¬ £¬£¬ÒÑѬȾ200¶à¸öµçÉÌÍøÕ¾


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Magecart¹¥»÷ÊÇÖ¸½«¶ñÒâ¾ç±¾Ö²ÈëµçÉÌÍøÕ¾ÒÔÇÔÈ¡Óû§µÄÖ§¸¶ÐÅÏ¢£¬ £¬£¬ÆäÊܺ¦Õß°üÀ¨Ó¢¹úº½¿Õ¡¢Ðµ°ºÍFeedifyµÈ¡£¡£¡£¡£MalwareBytesÑо¿Ö°Ô±ÔÚGithubÉÏ·¢Ã÷Ò»¸ö¶ñÒâMagecart¾ç±¾£¬ £¬£¬¸Ã¾ç±¾ÓÚ4ÔÂ20ÈÕÉÏ´«£¬ £¬£¬Í¨¹ýËÑË÷ÒýÇæurlscan.ioºÍPublicWWW¿ÉÒÔ·¢Ã÷ÖÁÉÙÓÐ200¶à¸öµçÉÌÍøÕ¾Êܵ½¸Ã¾ç±¾µÄѬȾ¡£¡£¡£¡£ÔÚ½Óµ½±¨¸æºó£¬ £¬£¬GitHubѸËÙɾ³ýÁ˶ñÒâ¾ç±¾£¬ £¬£¬µ«ÊÜËðµÄÍøÕ¾ÈÔÃæÁÙ±»ÈëÇÖµÄΣº¦¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/84564/cyber-crime/magecart-skimmer-github.html