¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181218

Ðû²¼Ê±¼ä 2018-12-18
1¡¢Talos³ÆÉÏÖܵıÈÌØ±ÒÕ¨µ¯ÍþвÓëSextortionڲƭÕß±£´æ¹ØÁª

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÉÏÖÜËÄÃÀ¹úÌìϸ÷µØµÄһЩ¹«¹²»ú¹¹£¨ÀýÈç´óѧ¡¢ÐÂÎÅýÌåµÈ£©ÎüÊÕµ½ÁËÕ¨µ¯ÍþвµÄڲƭµç×ÓÓʼþ£¬£¬£¬ £¬£¬£¬Ë¼¿ÆTalos·¢Ã÷¸Ã¶ñÒâ»î¶¯ÏÖʵÉÏÊÇ10Ô·ÝsextortionÕ©Æ­»î¶¯µÄÑݱä¡£¡£¡£¡£ ¡£¡£ÔÚÕ¨µ¯ÍþвÖÐTalos¹²·¢Ã÷ÁË17¸ö²î±ðµÄ±ÈÌØ±ÒµØµã£¬£¬£¬ £¬£¬£¬Ö»ÓÐÁ½¸öµØµãÓà¶îΪÕý¡£¡£¡£¡£ ¡£¡£Õ¨µ¯ÍþÐ²Éæ¼°µ½µÄIPµØµãÒ²·¢ËÍÁËÖÖÖÖÀàÐ͵ÄsextortionڲƭÓʼþ¡£¡£¡£¡£ ¡£¡£ÕâÒâζ×ÅÕâЩ×ï·¸Ô¸Òâ±àÔìÈκÎËûÃÇÒÔΪ¿ÉÒÔÓÕÆ­ÊÕ¼þÈ˵ÄÍþвºÍ¹ÊÊ£¬£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±Ô¤¼ÆÕâÖÖ¹¥»÷»á¼ÌÐø±¬·¢¡£¡£¡£¡£ ¡£¡£TalosÃãÀøÓû§²»ÒªÖ§¸¶ÈκÎÊê½ð£¬£¬£¬ £¬£¬£¬ÓÉÓÚÕâÑù×öÖ»»áÈù¥»÷ÕßÈ·ÈÏËûÃǵÄÒªÁìÊÇÓÐÓõÄ£¬£¬£¬ £¬£¬£¬´Ó¶ø±ä±¾¼ÓÀ÷µØ¾ÙÐÐÆäËü¹¥»÷¡£¡£¡£¡£ ¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2018/12/bitcoin-bomb-scare-associated-with.html


2¡¢Ñо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þHiddenTearµÄÃ⺬»ìÃܹ¤¾ß

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾



Michael GillespieÐû²¼ÀÕË÷Èí¼þHiddenTearµÄÃ⺬»ìÃܹ¤¾ßHiddenTearDecrypter¡£¡£¡£¡£ ¡£¡£HiddenTearÊÇÒ»¸öÀÕË÷Èí¼þ¼Ò×壬£¬£¬ £¬£¬£¬ÆäÍêÕûµÄÔ´´úÂë±»Ðû²¼ÔÚGitHubÉÏ£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÔ´´úÂ뽨Éè×Ô¼ºµÄ±äÖÖ¡£¡£¡£¡£ ¡£¡£ÓÉÓÚԭʼ´úÂëÊÇ¿ÉÒÔ½âÃܵÄ£¬£¬£¬ £¬£¬£¬Òò´Ë´ÓÏàͬ´úÂ뽨ÉèµÄÆäËü±äÌåÒ²ÊÇ¿ÉÒÔ½âÃܵÄ¡£¡£¡£¡£ ¡£¡£¸Ã½âÃܹ¤¾ß¿ÉÒÔ½âÃܵıäÌå°üÀ¨8lock8¡¢AnonCrack¡¢BankAccountSummaryµÈ¡£¡£¡£¡£ ¡£¡£

 

 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-hiddentear-ransomware-with-ht-brute-forcer/


3¡¢ÐÂÍøÂç´¹Âڻαװ³ÉOffice 365µÄδËÍ´ï֪ͨ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ISC Handler Xavier Mertens·¢Ã÷Ò»¸öеÄÍøÂç´¹Âڻ£¬£¬£¬ £¬£¬£¬¹¥»÷Õßͨ¹ý·¢ËÍαװ³É΢ÈíOffice 365δËÍ´ïÐÂÎŵĴ¹ÂÚÓʼþ£¬£¬£¬ £¬£¬£¬ÊÔͼÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡£¡£¡£¡£ ¡£¡£ÈôÊÇÎüÊÕµ½´ËÀàÓʼþµÄÓû§µã»÷ÁËÓʼþÖеÄÔٴη¢ËÍÁ´½Ó£¬£¬£¬ £¬£¬£¬ËûÃǽ«»áÌø×ªµ½Ò»¸öÄ£ÄâOffice 365µÇÂ¼Ò³ÃæµÄ´¹ÂÚÍøÕ¾¡£¡£¡£¡£ ¡£¡£Ò»µ©Óû§ÊäÈëµÇ¼ƾ֤£¬£¬£¬ £¬£¬£¬JavaScript´úÂ뽫»áÍøÂçÓû§µÄƾ֤²¢½«Óû§Öض¨Ïòµ½Õýµ±µÄOffice 365µÇ¼վµã¡£¡£¡£¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-attack-pretends-to-be-a-office-365-non-delivery-email/


4¡¢PewDiePieºÚ¿ÍÌᳫµÚ¶þÂÖ´òÓ¡»ú¹¥»÷»î¶¯££PrinterHack2

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÉϸöÔÂΪÐû´«YouTube¶©ÔÄÆµµÀPewDiePie£¬£¬£¬ £¬£¬£¬ºÚ¿ÍÈëÇÖÁËÈ«Çò¹æÄ£ÄÚµÄ5Íǫ̀´òÓ¡»ú¡£¡£¡£¡£ ¡£¡£ÏÖÔÚÕâЩ¹¥»÷ÕßÕýÔÚÌᳫµÚ¶þÂÖ¹¥»÷»î¶¯££PrinterHack2¡£¡£¡£¡£ ¡£¡£¹¥»÷ÕßÔÚTwitterÉÏÐû³Æ£¬£¬£¬ £¬£¬£¬µÚ¶þÂÖ¹¥»÷»î¶¯Éæ¼°µ½ÈýÖÖЭÒ飬£¬£¬ £¬£¬£¬°üÀ¨IPP¡¢JetDirectºÍLPD£¬£¬£¬ £¬£¬£¬ÊÜÓ°ÏìµÄ´òÓ¡»úÁè¼Ý25Íǫ̀£¬£¬£¬ £¬£¬£¬¶øÄ¿µÄIPµØµãµÄÊýĿԶԶÁè¼Ý200Íò¡£¡£¡£¡£ ¡£¡£¹¥»÷Õß»¹³Æ´Ë´ÎÐж¯ÊÇΪÁËÒýÆðÈËÃǶԴòÓ¡»úÎó²îµÄÖØÊÓ¡£¡£¡£¡£ ¡£¡£

 

 Ô­ÎÄÁ´½Ó£º

https://threatpost.com/pewdiepie-hackers-launch-second-printer-siege-according-to-reports/139968/


5¡¢Jenkins±»ÆØ±£´æÁ½¸öÎó²î£¬£¬£¬ £¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»½ÓÊÜ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


CyberArkÇå¾²Ñо¿Ö°Ô±Åû¶ÁËJenkinsÖеÄÁ½¸öÇå¾²Îó²îµÄÊÖÒÕϸ½Ú£¬£¬£¬ £¬£¬£¬ÕâÁ½¸öÎó²î¶¼ÔÚ½ñÄêÑ×Ìì±»ÐÞ¸´£¬£¬£¬ £¬£¬£¬µ«ÈÔÓÐÊýÒÔǧ¼ÆµÄÔÚÏßJenkinsЧÀÍÆ÷Ò×Êܹ¥»÷¡£¡£¡£¡£ ¡£¡£µÚÒ»¸öÎó²î£¨CVE-2018-1999001£©¿ÉÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâµÇ¼ƾ֤½«JenkinsЧÀÍÆ÷µÄconfig.xmlÉèÖÃÎļþ´ÓhomeÄ¿Â¼ÒÆ¶¯µ½ÆäËüλÖ㬣¬£¬ £¬£¬£¬µ±JenkinsЧÀÍÖØÊÓÆôºó£¬£¬£¬ £¬£¬£¬¸ÃЧÀÍÆ÷½«Ê¹ÓÃĬÈÏÉèÖ㬣¬£¬ £¬£¬£¬ÕâʹµÃÈκÎÈ˶¼¿ÉÒÔ×¢²á²¢»ñµÃÖÎÀíԱȨÏÞ¡£¡£¡£¡£ ¡£¡£µÚ¶þ¸öÎó²î£¨CVE-2018-1999043£©ÔÊÐí¹¥»÷ÕßÔÚЧÀÍÆ÷ÄÚ´æÖжÌÔݵؽ¨ÉèÓû§¼Í¼£¬£¬£¬ £¬£¬£¬²¢Ê¹ÓøÃÓû§¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/thousands-of-jenkins-servers-will-let-anonymous-users-become-admins/


6¡¢TwitterÐÞ¸´Ò»¸öÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬¿ÉÔÊÐíδÊÚȨ»á¼ûÖ±½ÓÐÂÎÅ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±Terence Eden·¢Ã÷Twitter±£´æÒ»¸öbug£¬£¬£¬ £¬£¬£¬ÆäOAuthÊÚȨ¶Ô»°¿òÏÔʾijЩµÚÈý·½Ó¦ÓÃÎÞ·¨»á¼ûÓû§µÄÖ±½ÓÐÂÎÅ£¬£¬£¬ £¬£¬£¬µ«ÏÖʵÉÏÕâЩӦÓÿÉÒÔÔÚÓû§²»ÖªÇéµÄÇéÐÎÏ»á¼ûËûÃǵÄÖ±½ÓÐÂÎÅ¡£¡£¡£¡£ ¡£¡£¸ÃÎó²îÓëTwitterµÄ»ùÓÚPINµÄ¸¨ÖúÊÚȨ»úÖÆÓйØ£¬£¬£¬ £¬£¬£¬µ±µÚÈý·½Ó¦ÓÃͨ¹ýPIN»ñµÃÏìӦȨÏÞʱ£¬£¬£¬ £¬£¬£¬ÕâЩȨÏÞ²¢Ã»ÓÐÔÚOAuthÊÚȨÐÅÏ¢ÖÐ׼ȷµØÏÔʾ³öÀ´¡£¡£¡£¡£ ¡£¡£TwitterÓÚ12ÔÂ6ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£ ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/twitter-fixes-bug-that-gives-unauthorized-access-to-direct-messages/


ÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·­ÒëºÍÕûÀí