¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190308

Ðû²¼Ê±¼ä 2019-03-08
1¡¢¿¨°Í˹»ùÐû²¼2018Äê½ðÈÚÐÐÒµÍøÂçÍþвµÄÆÊÎö±¨¸æ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ƾ֤¿¨°Í˹»ùÐû²¼µÄ2018Äê½ðÈÚÐÐÒµÍþв¾°¹Û±¨¸æ£¬ £¬£¬2018Äê½ðÈÚÐÐÒµÔâµ½µÄ´¹ÂÚ¹¥»÷Õ¼Æä¼ì²âµ½µÄËùÓд¹ÂÚ¹¥»÷µÄ½üÒ»°ë£¨44.7%£©£¬ £¬£¬Ïà±È2017ÄêµÄ53.8%ÓÐËùϽµ¡£¡£¡£¡£¡£2018ÄêÔâµ½ÒøÐÐľÂí¹¥»÷µÄÓû§ÊýĿΪ889452£¬ £¬£¬Óë2017ÄêµÄÊý×Ö767072Ïà±ÈÔöÌíÁË15.9£¥¡£¡£¡£¡£¡£×î³£Ôâµ½ÒøÐÐľÂí¹¥»÷µÄ¹ú¼ÒÊǶíÂÞ˹¡¢µÂ¹ú¡¢Ó¡¶È¡¢Ô½ÄÏ¡¢Òâ´óÀû¡¢ÃÀ¹úºÍÖйú¡£¡£¡£¡£¡£2018ÄêÔâµ½AndroidÒøÐжñÒâÈí¼þ¹¥»÷µÄÓû§ÊýÄ¿ÔöÌíÁËÁ½±¶¶à£¬ £¬£¬´ï1799891¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://securelist.com/financial-cyberthreats-in-2018/89788/

2¡¢ÐÂÍøÂçÌØ¹¤×éÖ¯Whitefly£¬ £¬£¬ÓëÐÂ¼ÓÆÂ¶à¸ö¹¥»÷»î¶¯ÓйØ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÈüÃÅÌú¿ËÑо¿ÍŶӳÆ2018Äê7ÔÂÐÂ¼ÓÆÂSingHealth´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ±³ºóµÄ¹¥»÷ÕßÊÇÍøÂçÌØ¹¤×éÖ¯Whitefly¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬ £¬£¬Ö÷ÒªÕë¶ÔÐÂ¼ÓÆÂµÄ²î±ðÐÐÒµµÄ¹«Ë¾£¬ £¬£¬²¢ÊÔͼÇÔÈ¡´ó×ÚÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£×Ô2017ÄêÖÐÆÚµ½2018ÄêÖÐÆÚ£¬ £¬£¬WhiteflyÒѾ­ÏòÒ½ÁƱ£½¡¡¢Ã½Ìå¡¢µçÐź͹¤³ÌÁìÓòµÄ¶à¸öÆóÒµÌᳫÁ˹¥»÷£¬ £¬£¬ÆäʹÓõŤ¾ß°üÀ¨Vcrodat¡¢Nibatad¡¢RootkitºÍMimikatz¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.symantec.com/blogs/threat-intelligence/whitefly-espionage-singapore

3¡¢Ñо¿ÍŶӷ¢Ã÷2Ô·ÝÀÕË÷Èí¼þShadeµÄ¹¥»÷»î¶¯ì­Éý

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

Malwarebytes LabsÑо¿ÍŶӷ¢Ã÷ÀÕË÷Èí¼þTroldesh£¨ÓÖÃûShade£©ÔÚ2018ÄêQ4µ½2019ÄêQ1ʱ´úµÄ¼ì²âÊýÄ¿¼±¾çÔöÌí¡£¡£¡£¡£¡£Shadeͨ³£Í¨¹ý´¹ÂÚÓʼþ¾ÙÐÐÈö²¥£¬ £¬£¬Æä¸½¼þÊǰüÀ¨Javascript¾ç±¾µÄzipÎļþ¡£¡£¡£¡£¡£ShadeµÄÖ÷Òª¹¥»÷Ä¿µÄÊÇWindowsϵͳ£¬ £¬£¬Æä½ÓÄÉAES 256 CBCËã·¨¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£²¿·ÖShadeµÄ±äÖÖ±£´æÃâ·ÑµÄ½âÃܹ¤¾ß£¬ £¬£¬Óû§¿ÉÔÚNoMoreRansom.orgÍøÕ¾ÉÏÕÒµ½ËüÃÇ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/threat-analysis/2019/03/spotlight-troldesh-ransomware-aka-shade/

4¡¢Ñо¿ÍŶӷ¢Ã÷Ê׸öʹÓÃSlack API¾ÙÐÐͨѶµÄSLUBºóÃÅ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Ê׸öʹÓÃSlack APIͨѶµÄ¶ñÒâÈí¼þSLUBºóÃÅ¡£¡£¡£¡£¡£SLUBÊÇÒ»¸öÓÃC++±àдµÄ×Ô½ç˵ºóÃÅ£¬ £¬£¬Æä°üÀ¨¾²Ì¬Á´½Ó¿âcurl£¨ÓÃÓÚÖ´ÐÐHTTPÇëÇ󣩡¢boost£¨ÓÃÓÚ´ÓgistƬ¶ÏÖÐÌáÈ¡ÏÂÁºÍJsonCpp£¨ÓÃÓÚÆÊÎöslackͨѶ£©¡£¡£¡£¡£¡£¸ÃºóÃÅͨ¹ýË®¿Ó¹¥»÷Èö²¥£¬ £¬£¬²¢ÇÒʹÓÃÁË΢ÈíÔÚ2018Äê5ÔÂÐÞ¸´µÄVBScriptÒýÇæÎó²î£¨CVE-2018-8174£©¾ÙÐÐѬȾ¡£¡£¡£¡£¡£¸ÃºóÃÅ»¹»á´ÓGithubÉÏÏÂÔØÒ»¸öÌØ¶¨µÄgistƬ¶Ï²¢ÌáÈ¡Ïà¹ØÏÂÁî¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/new-slub-backdoor-uses-github-communicates-via-slack/

5¡¢ÐÂľÂíPirate Matryoshka£¬ £¬£¬Ê¹Óú£µÁÍå¾ÙÐзַ¢

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

¿¨°Í˹»ùÑо¿ÍŶӷ¢Ã÷¹¥»÷ÕßʹÓú£µÁÍå·Ö·¢ÐÂľÂíPirate Matryoshka¡£¡£¡£¡£¡£¸ÃľÂíαװ³ÉÆÆ½âÈí¼þµÄ×°ÖÃÎļþ£¬ £¬£¬µ±Óû§ÔËÐиÃÎļþʱ£¬ £¬£¬½«»áÏÔʾһ¸öαÔìµÄº£µÁÍåµÇÂ¼Ò³Ãæ¡£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈëÕË»§ÃûºÍÃÜÂ룬 £¬£¬¹¥»÷Õ߾ͻáÐ®ÖÆÓû§µÄÕË»§²¢ÉÏ´«¸ü¶àµÄ¶ñÒâÎļþ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬×°ÖÃÎļþ»¹Ä¬ÈÏÀ¦°óÁËÆäËüÈí¼þ£¬ £¬£¬ÆäÖÐÎå·ÖÖ®Ò»ÊÇ¹ã¸æÈí¼þ¡¢Ð®ÖÆä¯ÀÀÆ÷Ö÷Ò³µÄ¶ñÒâÈí¼þÒÔ¼°Ä¾ÂíµÈ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.kaspersky.com/blog/pirate-matryoshka-malware/25905/

6¡¢Ë¼¿ÆÐÞ¸´Nexus½»Á÷»úÖеĶþÊ®¶à¸öÇå¾²Îó²î

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

˼¿Æ±¾ÖÜÐÞ¸´ÁËNexus½»Á÷»úÖеĶþÊ®¶à¸öÇå¾²Îó²î£¬ £¬£¬Îó²î¹æÄ£°üÀ¨DoS¡¢í§Òâ´úÂëÖ´ÐкÍȨÏÞÌáÉýµÈ¡£¡£¡£¡£¡£ÕâЩÎó²îÓ°ÏìÁËTetration AnalyticsÊðÀí¡¢LDAP¡¢Óû§ÕÊ»§ÖÎÀí½çÃæ¡¢ÏÂÁîÐнçÃæ£¨CLI£©µÈ×é¼þ£¬ £¬£¬¶à¸öÎó²î¿ÉÔÊÐíÍâµØ¹¥»÷Õß¾ÙÐÐÌáȨ¡¢ÒÔrootÉí·ÝÖ´ÐÐí§Òâ´úÂë¡¢×°ÖöñÒâÈí¼þ¡¢»ñÈ¡Ö÷ÒªÉèÖÃÎļþµÄ»á¼ûȨÏÞ»ò¾ÙÐÐÊÜÏÞshellÌÓÒÝ¡£¡£¡£¡£¡£±ðµÄ£¬ £¬£¬Ë¼¿Æ»¹½¨ÒéÓû§½ÓÄɲ½·¥±£» £»£»£»£»£»¤°²ÅÅÁËPOAPµÄÍøÂç»ò½ûÓøù¦Ð§¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82120/breaking-news/cisco-nexus-flaws-2.html

ÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·­ÒëºÍÕûÀí