¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190221
Ðû²¼Ê±¼ä 2019-02-21
Check PointÑо¿ÍŶÓÅû¶WinRARÖеĴúÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ£´æÁËÁè¼Ý19ÄêµÄʱ¼ä£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÁè¼Ý5ÒÚÓû§¡£¡£¸ÃÎó²î£¨CVE-2018-20250¡¢CVE-2018-20251¡¢CVE-2018-20252ºÍCVE-2018-20253£©±£´æÓÚWinRARµÄUNACEV2.DLL¿âÖУ¬£¬£¬£¬£¬£¬Õâ¸ö¿âÈÏÕæ½âѹËõACEÃûÌõÄѹËõÎļþ¡£¡£Ñо¿Ö°Ô±·¢Ã÷¸Ã¿â±£´æ±àÂëȱÏÝ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓöñÒâACEÎļþÔÚ½âѹËõµÄÄ¿µÄ·¾¶Ö®ÍâÖ²Èë¶ñÒâÈí¼þ¡£¡£WinRARÍŶÓÌåÏÖÓÉÓÚUNACEV2.DLL´Ó2005ÄêÆð¾Í×èÖ¹Á˸üУ¬£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±ÒѾʧȥÁ˸ÿâÔ´´úÂëµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬Òò´ËËûÃÇÑ¡Ôñ·ÅÆú¶ÔACEÃûÌõÄÖ§³Ö¡£¡£WinRAR¿ª·¢ÕßÔÚ1ÔÂ28ÈÕÐû²¼ÁËWinRAR 5.70 Beta 1ÒÔÐÞ¸´´ËÎó²î¡£¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/extracting-code-execution-from-winrar/2¡¢WordPressÍŶÓÐÞ¸´Ò»¸ö¾ßÓÐ6ÄêÀúÊ·µÄRCEÎó²î
RIPS¹«Ë¾µÄÇå¾²Ñо¿Ö°Ô±ÔÚWordPress 5.0.3֮ǰµÄ°æ±¾Öз¢Ã÷Ò»¸ö¿Éµ¼ÖÂRCEµÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÒÑÍù6Äê¼äÐû²¼µÄËùÓÐWordPress°æ±¾¡£¡£¾ßÓÐÖÁÉÙÒ»¸ö¡°×÷Õß¡±ÕË»§µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²îÔڵײãЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¸ÃÎó²îÊÇ·¾¶±éÀúÎó²îºÍÎļþ°üÀ¨Îó²îµÄ×éºÏ£¬£¬£¬£¬£¬£¬ÔÚÑо¿Ö°Ô±Ðû²¼µÄPoCÊÓÆµÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ¼¸ÃëÖÓÄÚ»ñµÃÄ¿µÄWordPress²©¿ÍµÄÍêÈ«¿ØÖÆÈ¨¡£¡£WordPress°æ±¾5.0.1ºÍ4.9.9ÖеÄÇå¾²²½·¥¿É×èÖ¹¸ÃÎó²îʹÓᣡ£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/02/wordpress-remote-code-execution.html3¡¢ÈüÃÅÌú¿ËÐû²¼ISTR 24Äê¶ÈÍþв±¨¸æ£¬£¬£¬£¬£¬£¬2018Ä깩ӦÁ´¹¥»÷ÔöÌí78£¥
ÈüÃÅÌú¿ËÐû²¼»¥ÁªÍøÇå¾²Íþв±¨¸æ£¨ISTR£©Volume 24£¬£¬£¬£¬£¬£¬¸Ã±¨¸æÖ¸³ö±íµ¥Ð®Öƹ¥»÷£¨formjacking£©È¡´úÁËÀÕË÷Èí¼þºÍ¶ñÒâÍÚ¿óÈí¼þ£¬£¬£¬£¬£¬£¬³ÉΪ2018Äê×îÖ÷ÒªµÄÍþв¡£¡£formjacking¹¥»÷Ö÷ÒªÕë¶ÔÔÚÏßÁãÊÛÉ̺͵ç×ÓÉÌÎñÍøÕ¾£¬£¬£¬£¬£¬£¬Í¨¹ý¶ñÒâ´úÂëÀ´ÇÔÈ¡¿Í»§µÄÖ§¸¶ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÕâÖÖ¹¥»÷½øÒ»²½Ö¤ÊµÎú¹©Ó¦Á´¹¥»÷µÄΣº¦¡£¡£Æ¾Ö¤¸Ã±¨¸æµÄÊý¾Ý£¬£¬£¬£¬£¬£¬2018Ä깩ӦÁ´¹¥»÷µÄÊýÄ¿±È2017Äêºá¿ç78%¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Óë2017ÄêÏà±È£¬£¬£¬£¬£¬£¬2018ÄêÀÕË÷Èí¼þ¹¥»÷ϽµÁË20%£¬£¬£¬£¬£¬£¬µ«Õë¶ÔÆóÒµµÄ¹¥»÷ÔöÌíÁË12%£¬£¬£¬£¬£¬£¬²¢ÇÒÒÆ¶¯ÀÕË÷Èí¼þìÉý33%¡£¡£ÔÚ2018Äê1ÔÂÖÁ12ÔÂʱ´ú£¬£¬£¬£¬£¬£¬¼ÓÃÜÐ®ÖÆ¹¥»÷ϽµÁË52%¡£¡£
ÔÎÄÁ´½Ó£º
https://www.symantec.com/blogs/threat-intelligence/istr-24-cyber-security-threat-landscape4¡¢Î¢ÈíÅû¶APT28й¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÅ·ÖÞÕþÖÎʵÌå

΢ÈíÅû¶¶íÂÞ˹APT×éÖ¯Fancy Bear£¨ÓÖ³ÆAPT28£©µÄй¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Æ¾Ö¤Î¢ÈíµÄ±íÊö£¬£¬£¬£¬£¬£¬APT28µÄÄ¿µÄÊÇÓë2019ÄêÅ·ÖÞÒé»áÑ¡¾ÙÏà¹ØµÄÕþÖÎʵÌå¡£¡£APT28ʹÓÃÓã²æÊ½´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬ÔÚ2018Äê9ÔÂÖÁ12ÔÂʱ´úÕë¶Ô104¸öÕË»§ÌᳫÁ˹¥»÷¡£¡£ÕâЩÕË»§ÊôÓÚ±ÈÀûʱ¡¢·¨¹ú¡¢µÂ¹ú¡¢²¨À¼¡¢ÂÞÂíÄáÑǺÍÈû¶ûάÑǵÄÕþÖλú¹¹¡£¡£ÕâЩ´¹ÂÚÓʼþÖ¼ÔÚÍøÂçÄ¿µÄµÄµÇ¼ƾ֤»òÈö²¥¶ñÒâÈí¼þ¡£¡£Î¢ÈíÌåÏÖËü½«°ÑAccountGuardЧÀÍÀ©Õ¹µ½12¸öеÄÅ·ÓѰî¼Ò¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-reveals-new-apt28-cyber-attacks-against-european-political-entities/5¡¢³¯ÏÊAPT×éÖ¯Lazarus£¬£¬£¬£¬£¬£¬Ê¹ÓÃKEYMARBLEºóÃŹ¥»÷¶íÂÞ˹ÆóÒµ
³¯ÏÊAPT×éÖ¯LazarusµÄ·ÖÖ§»ú¹¹BluenoroffÕë¶Ô¶íÂÞ˹ÆóÒµÌᳫÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¸Ã¹¥»÷»î¶¯Ê¹ÓÃOfficeÎĵµ×÷Ϊ³õʼѬȾǰÑÔ£¬£¬£¬£¬£¬£¬²¢×îÖÕÊÍ·ÅÁËKEYMARBLEºóÃÅ¡£¡£Æ¾Ö¤US-CERTµÄÏà¹Ø¶ñÒâÈí¼þÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬¸ÃºóÃÅľÂí¿ÉÓÃÓÚ»á¼û×°±¸µÄÉèÖÃÊý¾Ý¡¢ÏÂÔØÆäËüÎļþ¡¢Ö´ÐÐÏÂÁî¡¢ÐÞ¸Ä×¢²á±í¡¢½ØÈ¡ÆÁÄ»ÐÅÏ¢ºÍÊý¾ÝÉøÂ©µÈ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-apt-lazarus-targets-russian-entities-with-keymarble-backdoor/6¡¢ATM¶ñÒâÈí¼þWinPot£¬£¬£¬£¬£¬£¬Ê¹ÓÃUSB½Ó¿Ú¾ÙÐÐÈö²¥
¿¨°Í˹»ùÑо¿Ö°Ô±Konstantin Zykov·¢Ã÷ATM¶ñÒâÈí¼þWinPotµÄбäÌåv.3ÒѾÔÚ°µÍøÉÏ·ºÆð£¬£¬£¬£¬£¬£¬Æä±¨¼ÛΪ500ÃÀÔªµ½1000ÃÀÔªÖ®¼ä¡£¡£WinPotͨ¹ýÎïÆÊÎö¼û¾ÙÐÐÈö²¥£¬£¬£¬£¬£¬£¬¼´Í¨¹ýATMµÄUSB½Ó¿ÚÈö²¥¡£¡£¹¥»÷Õßͨ³£Õë¶ÔÐÐÈ˽ÏÉٵĽֵÀ¡¢Ò©µê¡¢ÂùÝÀàÊÐËÁµÈÅԱߵĵ¥¸öATM£¬£¬£¬£¬£¬£¬Ò»µ©ATMѬȾÁ˸öñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¼´¿Éͨ¹ýÏÔʾÆÁÄ»Ç¿ÖÆATMÍ·ºÆð½ð¡£¡£°µÍøÂô¼ÒÔÚÆäÑÝʾÊÓÆµÖÐÑÝʾÁËWinPot v.3µÄÊÂÇéÀú³Ì£¬£¬£¬£¬£¬£¬²¢Õ¹Ê¾ÁËÒ»¶ÎShowMeMoneyµÄ´úÂë¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/atm-jackpotting-malware-winpot/141960/ÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ