¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·£» £»£»£»Imperva³ÆÆäÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿±»µÁ£» £»£»£»NemtyµÄ½âÃܹ¤¾ß

Ðû²¼Ê±¼ä 2019-10-12
1¡¢°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄÐû²¼¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©Ðû²¼¡¶ÖÐСÐÍÆóÒµÍøÂçÇå¾²Ö¸ÄÏ¡·£¬£¬£¬£¬£¬£¬£¬¸ÃÖ¸ÄÏÐðÊöÁ˳£¼ûµÄÍøÂçÍþвÒÔ¼°ÆóÒµ¿ÉÒÔ½ÓÄÉÄÄЩ²½·¥À´±£» £»£»£»¤×Ô¼ºÃâÊÜË𺦡£ ¡£¡£¡£¡£¸ÃÖ¸ÄÏרΪÖÐСÐÍÆóÒµÉè¼Æ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚʹÆäÏàʶ¡¢½ÓÄÉÐж¯²¢ÔöÇ¿ÆäÍøÂçÇå¾²·ÀÓùÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬ÒÔÓ¦¶ÔÒ»Ö±Éú³¤µÄÍøÂçÇå¾²Íþв¡£ ¡£¡£¡£¡£¸ÃÖ¸ÄÏÏÈÈÝÁ˶ñÒâÈí¼þ¡¢´¹ÂÚÓʼþºÍÀÕË÷Èí¼þµÈ³£¼ûÍþв£¬£¬£¬£¬£¬£¬£¬»¹Ã¶¾ÙÁ˶àÖÖÕë¶ÔÍþвµÄÔ¤·À²½·¥¡£ ¡£¡£¡£¡£¸ÃÖ¸Äϲ»½¨ÒéÆóÒµÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÎÞ·¨°ü¹ÜÄܹ»ÖØÐ»ñµÃ»á¼ûȨ£» £»£»£»½¨ÒéÆóÒµ½ÓÄÉ×Ô¶¯¸üС¢×Ô¶¯±¸·ÝºÍ¶àÒòËØÉí·ÝÑéÖ¤µÈ²½·¥£» £»£»£»½¨ÒéÔÚÖ°Ô±ºÍÁ÷³ÌÖнÓÄÉ»á¼û¿ØÖÆ¡¢ÃÜÂë¶ÌÓï¼°Ô±¹¤Åàѵ£» £»£»£»¸ÃÖ¸ÄÏ»¹¸½´øÁËÓÃÓڲο¼µÄÇå¾²ÊõÓï´Ê»ã±í¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.us-cert.gov/ncas/current-activity/2019/10/10/acsc-releases-small-business-cybersecurity-guide

2¡¢ÐÂMacOS¶ñÒâÈí¼þTarmacÖ÷ÒªÕë¶ÔÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ConfiantÇå¾²Ñо¿Ö°Ô±Taha Karim·¢Ã÷Õë¶ÔmacOSÓû§µÄжñÒâÈí¼þTarmac£¨OSX / Tarmac£©¡£ ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þµÄ·Ö·¢»î¶¯×Ô2019Äê1ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬µ«ÆäʱÑо¿Ö°Ô±Ö»·¢Ã÷Á˶ñÒâpayload Shlayer¡£ ¡£¡£¡£¡£ÔÚÁ½ÖÜǰÐû²¼µÄÒ»·ÝºóÐø±¨¸æÖУ¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ·¢Ã÷ÁËShlayerѬȾµÄµÚ¶þ½×¶Îpayload Tarmac¡£ ¡£¡£¡£¡£ÏÖÔÚÖ»ÖªµÀShlayerÔÚÊÜѬȾµÄÖ÷»úÉÏÏÂÔØ²¢×°ÖÃÁËTarmacÖ®ºó£¬£¬£¬£¬£¬£¬£¬Tarmac»áÍøÂçÓйØÓ²¼þÉèÖõÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢½«´ËÐÅÏ¢·¢Ë͵½ÆäÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£ ¡£¡£¡£¡£È»ºóTarmac½«ÆÚ´ýÐÂÏÂÁ£¬£¬£¬£¬£¬£¬¿ÉÊÇÓÉÓÚC2ЧÀÍÆ÷²»¿ÉÓ㬣¬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±ÎÞ·¨È·¶¨ÆäËùÓй¦Ð§¡£ ¡£¡£¡£¡£¸Ã¶ñÒâ»î¶¯Ö÷ÒªÕë¶ÔµÄÊÇÃÀ¹ú¡¢Òâ´óÀûºÍÈÕ±¾µÄÓû§¡£ ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/macos-users-targeted-with-new-tarmac-malware/

3¡¢·¸·¨ÍÅ»ïFIN7¿ª·¢Ð¶ñÒ⹤¾ßBOOSTWRITEºÍRDFSNIFFER

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

ƾ֤FireEyeµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬·¸·¨ÍÅ»ïFIN7ÔÚÆä¹¥»÷¹¤¾ß¿âÖÐÌí¼ÓÁËÁ½¸öеijÉÔ±-BOOSTWRITEºÍRDFSNIFFER¡£ ¡£¡£¡£¡£BOOSTWRITEÊÇÒ»¸ö½öÔËÐÐÔÚÄÚ´æÖеÄÊÍ·ÅÆ÷£¬£¬£¬£¬£¬£¬£¬ÆäʹÓÃÔËÐÐʱ´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡µÄÃÜÔ¿À´½âÃÜÄÚǶµÄpayload£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤Ñо¿Ö°Ô±µÄ±íÊö£¬£¬£¬£¬£¬£¬£¬ËûÃÇÆÊÎöµÄÒ»¸öÑù±¾ÊÇÓÉÓÐÓõÄÖ¤ÊéÊðÃûµÄ¡£ ¡£¡£¡£¡£BOOSTWRITE»á½âÃܲ¢¼ÓÔØÁ½¸öpayloadµÄDLL£¬£¬£¬£¬£¬£¬£¬°üÀ¨CARBANAKºóÃźÍRDFSNIFFER¡£ ¡£¡£¡£¡£RDFSNIFFER¿ÉÒÔʹ¹¥»÷Õß¼àÊӺ͸Ķ¯Í¨¹ýNCR¹«Ë¾µÄRDFClient½¨ÉèµÄÕýµ±ÅþÁ¬¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±×Ü½á³ÆÐ¹¤¾ßºÍÊÖÒÕµÄÒýÈëÅú×¢FIN7ÕýÔÚÒ»Ö±Éú³¤ÒÔ˳ӦÇå¾²ÐÔÒ»Ö±ÔöÇ¿µÄÇéÐΡ£ ¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2019/10/mahalo-fin7-responding-to-new-tools-and-techniques.html

4¡¢Imperva³ÆÆäÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿±»µÁ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ImpervaÔÚ8Ô·ÝÅû¶ÁËÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ½ñÌìÐû²¼ÁËÒ»·ÝÏêϸµÄʺ󱨸æ¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾³Æ´Ë´ÎÊý¾Ýй¶µÄÔµ¹ÊÔ­ÓÉÊÇAWS APIÃÜÔ¿µÄ±»µÁ£¬£¬£¬£¬£¬£¬£¬¶ø¸ÃÃÜÔ¿ÊǺڿʹÓÒ»¸öÒâÍâÅþÁ¬µ½»¥ÁªÍøµÄÄÚ²¿ÏµÍ³ÇÔÈ¡µÄ¡£ ¡£¡£¡£¡£ºÚ¿ÍʹÓøÃAWS APIÃÜÔ¿»á¼ûImpervaµÄÔÆ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬²¢ÕÒµ½Á˸ù«Ë¾ÓÃÓÚ²âÊÔµÄAWS RDSЧÀÍ¡£ ¡£¡£¡£¡£Imperva²¢Î´Åû¶ÉÏÊöÊÂÎñ¼òÖ±ÇÐÈÕÆÚ£¬£¬£¬£¬£¬£¬£¬Òò´ËÉÐÎÞ·¨È·ÈϺڿͻá¼ûÁ˸ù«Ë¾µÄЧÀÍÆ÷¶à³¤Ê±¼ä¡£ ¡£¡£¡£¡£ImpervaÊ×ϯִÐйټòª¹ÀËãÁËÊÜÓ°ÏìµÄÓû§ÊýÄ¿£¬£¬£¬£¬£¬£¬£¬³ÆÔÚ¹«Ë¾Í¨ÖªÊÜÓ°ÏìµÄ¿Í»§ºó£¬£¬£¬£¬£¬£¬£¬¿Í»§Ìæ»»ÁË1.3Íò¸öÃÜÂë¼°1.35Íò¸öSSLÖ¤Ê飬£¬£¬£¬£¬£¬£¬²¢ÖØÐÂÌìÉúÁË1400¶à¸öImperva APIÃÜÔ¿¡£ ¡£¡£¡£¡£Ö»ÓÐÔÚ2017Äê9ÔÂ15ÈÕ֮ǰÓëImperva×¢²áµÄ¿Í»§²Å»áÊܵ½Ó°Ïì¡£ ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/imperva-blames-data-breach-on-stolen-aws-api-key/

5¡¢Çå¾²Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þNemtyµÄ½âÃܹ¤¾ß


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


TesorionÑо¿Ö°Ô±½¨ÉèÁË¿ÉÔÚÀÕË÷Èí¼þNemty 1.4ºÍ1.6°æ±¾ÉÏÊÂÇéµÄ½âÃÜÆ÷£¬£¬£¬£¬£¬£¬£¬²¢ÕýÔÚ¿ª·¢1.5°æ±¾µÄ½âÃÜÆ÷¡£ ¡£¡£¡£¡£ÏÖÔÚ½âÃÜÆ÷½öÖ§³ÖÓÐÏÞÊýÄ¿µÄÎļþÀ©Õ¹Ãû£¬£¬£¬£¬£¬£¬£¬·Ç±ê×¼ÎļþÃûÌõļÓÃÜÎļþÈÔÎÞ·¨½âÃÜ£¬£¬£¬£¬£¬£¬£¬µ«TesorionÌìÌì¶¼ÔÚ¼ÌÐøÖ§³ÖеÄÎļþÀàÐÍ¡£ ¡£¡£¡£¡£Tesorion²¢Î´Ìṩ½âÃÜÆ÷µÄ¿Í»§¶Ë°æ±¾£¬£¬£¬£¬£¬£¬£¬¶øÊÇÑ¡ÔñÔÚ×Ô¼ºµÄЧÀÍÆ÷ÉÏÍê³É½âÃÜÃÜÔ¿µÄÌìÉú£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏִ˾ÙÊÇΪÁ˱ÜÃâÀÕË÷Èí¼þ¿ª·¢Ö°Ô±ÆÊÎö½âÃܳÌÐò²¢ÏàʶÆäËã·¨µÄÎó²îËùÔÚ¡£ ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/nemty-ransomware-decryptor-released-recover-files-for-free/

6¡¢SAPÐû²¼10ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á½¸öÒªº¦Îó²î

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


SAPÐû²¼10ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÇå¾²Îó²î¡£ ¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îΪSAP NetWeaver Process IntegrationµÄB2B×é¼þAS2ÊÊÅäÆ÷ÖеÄÉí·ÝÑé֤ȱʧÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2019-0379£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õß»á¼ûÖÎÀí¹¦Ð§¼°ÇÔÈ¡ºÍʹÓÃÃô¸ÐÊý¾Ý¡£ ¡£¡£¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ9.3¡£ ¡£¡£¡£¡£µÚ¶þ¸öÑÏÖØÎó²îÊÇSAP Landscape ManagementÆóÒµ°æÖеÄÒ»¸öÐÅϢй¶Îó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2019-0380£¬£¬£¬£¬£¬£¬£¬ÆäCVSSÆÀ·ÖΪ9.1¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬SAP»¹ÐÞ¸´ÁËAnywhere¡¢SAP IQºÍSAP Dynamic TieringµÈ²úÆ·µÄÎļþËÑË÷Ëã·¨ÖеÄBinary PlantingÎó²î£¨CVE-2019-0381£©£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îµÄCVSSÆÀ·ÖΪ7.8¡£ ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/92335/security/sap-october-2019-security-patch-day.html