Docker HubÔâÈëÇÖ£¬£¬19ÍòÕ˺ű»Ð¹Â¶£»£»¶ñÒâÈí¼þBabyShark£»£»MagecartÒÑѬȾ200¶à¸öµçÉÌÍøÕ¾

Ðû²¼Ê±¼ä 2019-04-28
1.Docker HubÔâºÚ¿ÍÈëÇÖ£¬£¬19ÍòÓû§µÄÃô¸ÐÐÅϢй¶


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


4ÔÂ25ÈÕDocker HubÔâºÚ¿ÍÈëÇÖ£¬£¬µ¼ÖÂÔ¼19ÍòÓû§ÕË»§µÄÃô¸ÐÐÅϢй¶¡£¡£ ¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÓÃÓÚ×Ô¶¯¹¹½¨Docker¾µÏñ¶øÊÚȨ¸øDocker HubµÄGitHubºÍBitbucket»á¼ûÁîÅÆ£¬£¬ÒÔ¼°Óû§ÃûºÍ¹þÏ£ÃÜÂë¡£¡£ ¡£¡£¡£Æ¾Ö¤Docker¹Ù·½µÄ˵·¨£¬£¬ÊÜÓ°ÏìµÄÓû§Ô¼Õ¼×ÜÓû§ÊýÄ¿µÄ5%¡£¡£ ¡£¡£¡£DockerÌåÏÖÔÚ·¢Ã÷ÈëÇÖºóÁ¬Ã¦ÏòÓû§·¢ËÍÁËÓʼþ֪ͨ£¬£¬²¢½ÓÄɲ½·¥±£»£»¤Óû§µÄÊý¾Ý¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/docker-hub-database-hack-exposes-sensitive-data-of-190k-users/

2.iLnkP2PÒ×ÊÜÖÐÐÄÈ˹¥»÷£¬£¬200¶àÍǫ̀ÔÚÏß×°±¸±£´æÎ£º¦


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±Paul Marrapese·¢Ã÷iLnkP2Pϵͳ±£´æÇå¾²Îó²î£¬£¬µ¼ÖÂÊý°ÙÍǫ̀IoT×°±¸Ò×Êܹ¥»÷¡£¡£ ¡£¡£¡£iLnkP2PÔÊÐíÓû§Ê¹ÓÃÊÖ»ú»òPCÔ¶³ÌÅþÁ¬ËûÃǵÄIoT×°±¸£¬£¬¸Ãϵͳ±»¶à¼Ò¹©Ó¦ÉÌÆÕ±é½ÓÄÉ£¬£¬°üÀ¨Hichip¡¢TENVISºÍVStarcamµÈ¡£¡£ ¡£¡£¡£Marrapese·¢Ã÷µÄÎó²î°üÀ¨Ã¶¾ÙÎó²î£¨CVE-2019-11219£©ºÍ¿Éµ¼ÖÂÖÐÐÄÈ˹¥»÷µÄÎó²î£¨CVE-2019-11220£©£¬£¬ÕâÁ½¸öÎó²îÏÖÔÚÉÐÎÞÐÞ¸´²¹¶¡¡£¡£ ¡£¡£¡£Marrapese»¹·¢Ã÷Ô¼ÓÐ200¶àÍǫ̀ÔÚÏß×°±¸Ò×Êܹ¥»÷£¬£¬ÆäÖÐ39£¥µÄ×°±¸Î»ÓÚÖйú£¬£¬19£¥Î»ÓÚÅ·ÖÞ£¬£¬7£¥Î»ÓÚÃÀ¹ú¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/84525/hacking/ilnkp2p-flaws-iot.html

3.˼¿ÆTalosÅû¶Sierra Wireless AirLinkÍø¹ØÖеĶà¸öÎó²î

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

˼¿ÆTalosÅû¶Sierra Wireless AirLinkϵÁеÄÍø¹ØºÍ·ÓÉÆ÷ÖеĶà¸öÇå¾²Îó²î¡£¡£ ¡£¡£¡£ÕâЩװ±¸±»ÆÕ±éÓÃÓÚÆóÒµÇéÐÎÖй¤Òµ×°±¸¡¢ÖÇÄÜ×°±¸¡¢´«¸ÐÆ÷¡¢PoS¼°ICSµÄÅþÁ¬¡£¡£ ¡£¡£¡£Îó²î¹æÄ£°üÀ¨í§Òâ´úÂëÖ´ÐС¢ÖÎÀíÔ±ÃÜÂë¸ü¸Ä¡¢ÏµÍ³ÉèÖÃÐ޸ġ¢Óû§Æ¾Ö¤Ð¹Â¶¡¢CSRF¡¢XSSµÈ¡£¡£ ¡£¡£¡£´ó´ó¶¼Îó²î±£´æÓÚ×°±¸¸½´øµÄWebЧÀÍÆ÷ACEManagerÖС£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/84533/security/sierra-wireless-airlink-es450-flaws.html

4.¶ñÒâÈí¼þBabySharkµÄй¥»÷»î¶¯£¬£¬·Ö·¢KimJongRATºÍPCRat


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Palo Alto NetworksµÄUnit 42ÍŶÓÐû²¼¹ØÓÚBabySharkжñÒâ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£ ¡£¡£¡£BabySharkÊÇ2Ô·ݷºÆðµÄ¶ñÒâÈí¼þ£¬£¬Æä¹¥»÷»î¶¯Ò»Á¬µ½ÁË3ÔºÍ4Ô£¬£¬×îй¥»÷»î¶¯µÄÄ¿µÄËÆºõÓÐÁ½¸ö£ºÕë¶ÔºËÇå¾²ºÍ³¯Ïʰ뵺¹ú¼ÒÇå¾²ÎÊÌâµÄÌØ¹¤»î¶¯£»£»ÒÔ¼°Õë¶Ô¼ÓÃÜÇ®±ÒÐÐÒµÀ´»ñÈ¡¿î×Ó¡£¡£ ¡£¡£¡£BabySharkµÄ¶ñÒâpayload°üÀ¨KimJongRATºÍPCRat£¬£¬µ«¹¥»÷ÕßÔÚ¶ñÒâ´úÂëÖн«ËüÃÇͳ³ÆÎªCowboy¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat/

5.¹¥»÷ÕßʹÓÃAtlassian Confluence ServerÎó²î·Ö·¢GandCrabºÍDofloo


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±Augusto II Remillano·¢Ã÷¹¥»÷ÕßÕýÔÚÆð¾¢Ê¹ÓÃAtlassian Confluence ServerÖеÄÎó²î£¨CVE-2019-3396£©À´·Ö·¢ÀÕË÷Èí¼þGandCrabºÍľÂíDofloo¡£¡£ ¡£¡£¡£Æ¾Ö¤NVD£¬£¬¸ÃÎó²î¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÄ£°å×¢ÈëʵÏÖ·¾¶±éÀúºÍÔ¶³Ì´úÂëÖ´ÐС£¡£ ¡£¡£¡£AtlassianÔÚ3ÔÂ20ÈÕÐÞ¸´Á˸ÃÎó²î£¬£¬ÓÉÓÚ¶à¸öexploit¹ûÕæ¿ÉÓ㬣¬¹¥»÷ÕßÕýÔÚÆð¾¢É¨ÃèÒ×Êܹ¥»÷µÄЧÀÍÆ÷À´ÊµÑé¹¥»÷¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/vulnerable-confluence-servers-get-infected-with-ransomware-trojans/

6.MagecartÇÔÈ¡Óû§Ö§¸¶ÐÅÏ¢£¬£¬ÒÑѬȾ200¶à¸öµçÉÌÍøÕ¾


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Magecart¹¥»÷ÊÇÖ¸½«¶ñÒâ¾ç±¾Ö²ÈëµçÉÌÍøÕ¾ÒÔÇÔÈ¡Óû§µÄÖ§¸¶ÐÅÏ¢£¬£¬ÆäÊܺ¦Õß°üÀ¨Ó¢¹úº½¿Õ¡¢Ðµ°ºÍFeedifyµÈ¡£¡£ ¡£¡£¡£MalwareBytesÑо¿Ö°Ô±ÔÚGithubÉÏ·¢Ã÷Ò»¸ö¶ñÒâMagecart¾ç±¾£¬£¬¸Ã¾ç±¾ÓÚ4ÔÂ20ÈÕÉÏ´«£¬£¬Í¨¹ýËÑË÷ÒýÇæurlscan.ioºÍPublicWWW¿ÉÒÔ·¢Ã÷ÖÁÉÙÓÐ200¶à¸öµçÉÌÍøÕ¾Êܵ½¸Ã¾ç±¾µÄѬȾ¡£¡£ ¡£¡£¡£ÔÚ½Óµ½±¨¸æºó£¬£¬GitHubѸËÙɾ³ýÁ˶ñÒâ¾ç±¾£¬£¬µ«ÊÜËðµÄÍøÕ¾ÈÔÃæÁÙ±»ÈëÇÖµÄΣº¦¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/84564/cyber-crime/magecart-skimmer-github.html