BitrueÔâºÚ¿Í¹¥»÷;Kubernetes CLI¹¤¾ßí§ÒâÎļþÁýÕÖÎó²î;Õë¶ÔÖж«µØÇøµÄViceLeaker¹¥»÷»î¶¯

Ðû²¼Ê±¼ä 2019-06-28
1.BitrueÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬930Íò¸öXRP±ÒºÍ250Íò¸öADA±ÒʧÔô

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

ÐÂ¼ÓÆÈÎÃüÜÇ®±ÒÉúÒâËùBitrueÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬930Íò¸öRipple£¨XRP£©±Ò£¨¼ÛÖµ425ÍòÃÀÔª£©ºÍ250Íò¸öCardano£¨ADA£©±Ò£¨¼ÛÖµ22.5ÍòÃÀÔª£©±»ÇÔ¡£¡£¡£¡£BitrueÌåÏÖ£¬£¬£¬£¬ÔÚ·¢Ã÷ºÚ¿Í¹¥»÷ºóÒÑÔÝÍ£ÁËЧÀÍ£¬£¬£¬£¬²¢Ïò»ð±Ò¡¢Bittrex¡¢ChangeNOWµÈ×ʽðÎüÊÕ·½×ª´ïÁËÇéÐΡ£¡£¡£¡£ÇéÐÎÒÑ»ñµÃ¿ØÖÆ£¬£¬£¬£¬×ʽðËðʧ½«100%·µ»¹Óû§£¬£¬£¬£¬BitrueÕýÔÚÖØÐÂÉóºËÆäÇå¾²²½·¥ºÍÕþ²ß£¬£¬£¬£¬ÒÔÈ·±£´ËÀàÊÂÎñ²»ÔÙ±¬·¢¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hacker-steals-4-5-million-from-bitrue-cryptocurrency-exchange/

2.µÂ¹ú¾¯·½Í»Ï®OmniRAT¿ª·¢ÕßסËù£¬£¬£¬£¬²é»ñ´ó×ÚÖ¤¾Ý

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

6ÔÂ26Èյ¹ú¾¯·½Í»Ï®OmniRAT¿ª·¢ÕßµÄסËù£¬£¬£¬£¬²é»ñÁËËûµÄÌõ¼Ç±¾µçÄÔ¡¢µçÄÔºÍÊÖ»úµÈÊý×Ö×ʲú¡£¡£¡£¡£Õâ¿ÉÄÜÓë×î½üµÄÍøÂç¹¥»÷»î¶¯µÄÊÓ²ìÓйء£¡£¡£¡£ÔÚ½ñÄêÔçЩʱ¼äµÄÒ»´Î¹¥»÷ÊÂÎñÖУ¬£¬£¬£¬ºÚ¿ÍÊÔͼʹÓÃMicrosoft ExcelÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2016-7262£©ÔÚÄ¿µÄÅÌËã»úÉÏ×°ÖÃOmniRAT¡£¡£¡£¡£¹¥»÷Õß½«ExcelÎļþαװ³É¿ÆÍþÌØÊ¯Ó͹«Ë¾µÄÉÌÎñÎļþ£¬£¬£¬£¬ÓÕÆ­Êܺ¦Õß·­¿ªÎļþ¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúµÂ¹ú¾¯·½µÄÐж¯ÊÇ·ñÓë´ËÓйØ£¬£¬£¬£¬¾¯·½µÄÄ¿µÄÒ²¿ÉÄÜÊÇ»ñÈ¡ÒÑÍù4ÄêÖйºÖÃOmniRATµÄËùÓпͻ§µÄÃûµ¥£¬£¬£¬£¬ÒÔ¹¥»÷ÀÄÓøù¤¾ßµÄÍøÂç·¸·¨·Ö×Ó¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/06/police-raid-omnirat-developer.html

3.˼¿ÆÐû²¼DCNMµÄÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´¶à¸öÑÏÖØÎó²î

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

˼¿ÆÐû²¼ÆäÊý¾ÝÖÐÐÄÍøÂçÖÎÀíÆ÷£¨DCNM£©Èí¼þµÄÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´4¸öÎó²î¡£¡£¡£¡£ÕâЩÎó²î¶¼ÓëWebÖÎÀí½çÃæÖеĻá¼û¿ØÖƹýʧÓйØ£¬£¬£¬£¬°üÀ¨¿Éµ¼ÖÂí§ÒâÎļþÉÏ´«¼°rootȨÏÞÖ´ÐдúÂëµÄÎó²î£¨CVE-2019-1620£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8·Ö£©¡¢¿Éµ¼ÖÂÉí·ÝÑéÖ¤ÈÆ¹ýµÄÎó²î£¨CVE-2019-1619£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8·Ö£©ÒÔ¼°¿Éµ¼ÖÂÃô¸ÐÐÅϢй¶µÄÎó²î£¨CVE-2019-1621£¬£¬£¬£¬CVSSÆÀ·ÖΪ7.5·Ö£»£»CVE-2019-1622£¬£¬£¬£¬CVSSÆÀ·ÖΪ5.3·Ö£©¡£¡£¡£¡£ÊÜÓ°ÏìµÄ²úƷΪDCNM 11.2(1)֮ǰµÄ°æ±¾¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cisco-patches-critical-flaws-in-data-center-network-manager/

4.Kubernetes CLI¹¤¾ßí§ÒâÎļþÁýÕÖÎó²î£¬£¬£¬£¬½¨ÒéÉý¼¶µ½×îа汾

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

Kubernetes CLI¹¤¾ßÐÞ¸´¿Éµ¼ÖÂí§ÒâÎļþÁýÕÖµÄÎó²î£¨CVE-2019-11246£©£¬£¬£¬£¬¸ÃÎó²îÊÇ3Ô·ݵÄÎó²î£¨CVE-2019-1002101£©ÐÞ¸´²»ÍêÕûµ¼ÖµÄÐÂÎÊÌâ¡£¡£¡£¡£Ê¹ÓøÃÎó²î¿ÉÄܻᵼÖÂĿ¼±éÀú-ÔÊÐí¹¥»÷ÕßʹÓöñÒâÈÝÆ÷½¨Éè»òÌæ»»Óû§ÊÂÇéÕ¾ÖеÄÎļþ¡£¡£¡£¡£¸ÃÎó²îÉæ¼°kubectl cpÏÂÁ£¬£¬£¬´ËÏÂÁîÓÃÓÚÔÚÈÝÆ÷ºÍÓû§»úе֮¼ä¸´ÖÆÎļþ¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýʹÓöñÒâtar¶þ½øÖÆÎļþÀ´Ê¹Óô˹¦Ð§£¬£¬£¬£¬Ö»ÒªÅ²ÓÃkubectl cp£¬£¬£¬£¬¾Í¿ÉÒÔ½«ÎļþдÈëÄ¿µÄÅÌËã»úÉϵÄÈκη¾¶¡£¡£¡£¡£ÓÉÓÚCVE-2019-11246Êǿͻ§¶ËÉϵÄÎó²î£¬£¬£¬£¬Òò´ËÆäʹÓÃÐèÒªÓû§½»»¥¡£¡£¡£¡£ÔçÓÚ1.12.9£¬£¬£¬£¬1.13.6ºÍ1.14.2µÄ¿Í»§¶Ë°æ±¾ÈÝÒ×Êܵ½¹¥»÷£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ìÉý¼¶¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/kubernetes-cli-tool-security-flaw-lets-attackers-run-code-on-host-machine/

5.GreenFlash Sundown EK´ó¹æÄ£·Ö·¢»î¶¯£¬£¬£¬£¬Ö÷ÒªÕë¶Ô±±ÃÀºÍÅ·ÖÞ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

Malwarebytes LabsÑо¿ÍŶӷ¢Ã÷GreenFlash Sundown EKµÄ´ó¹æÄ£·Ö·¢»î¶¯¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯ÔÚ±±ÃÀºÍÅ·ÖÞÊ®·Ö»îÔ¾¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÈëÇÖÍøÕ¾ËùÓÐÕßÔËÓªµÄ¹ã¸æÐ§ÀÍÆ÷£¬£¬£¬£¬Ñ¬È¾ÆäͶ·ÅµÄ¹ã¸æ¾ÙÐзַ¢¡£¡£¡£¡£ÆäÖÐÒ»¸öÊÜÓ°ÏìµÄÐû²¼ÉÌÊÇonlinevideoconverter[.]com£¬£¬£¬£¬¸ÃÍøÕ¾ÊÇÒ»¸ö½«YouTubeºÍÆäËûƽ̨ÉϵÄÊÓÆµ×ª»»ÎªÎļþµÄÈÈÃÅÍøÕ¾¡£¡£¡£¡£Æ¾Ö¤SimilarWeb£¬£¬£¬£¬ÆäÔ»á¼û´ÎÊýΪ2ÒڴΡ£¡£¡£¡£¸ÃEK·Ö·¢µÄpayload°üÀ¨ÀÕË÷Èí¼þSEON¡¢PonyÒÔ¼°Ò»¸öÍÚ¿óÈí¼þ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/threat-analysis/2019/06/greenflash-sundown-exploit-kit-expands-via-large-malvertising-campaign/

6.ÐÂViceLeaker¶ñÒâ»î¶¯£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖж«µØÇøµÄAndroidÓû§

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

¿¨°Í˹»ùÑо¿Ö°Ô±·¢Ã÷еĶñÒâÈí¼þ»î¶¯ViceLeaker£¬£¬£¬£¬¸Ã»î¶¯Ö÷ÒªÕë¶ÔÖж«µØÇøµÄAndroidÓû§¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ˵·¨£¬£¬£¬£¬ÆäpayloadÊÇÒ»ÖÖÌØ¹¤Èí¼þ³ÌÐò£¬£¬£¬£¬ÓÃÓÚ´ÓÊÜѬȾµÄ×°±¸ÖÐÌáÈ¡¿É»á¼ûµÄÐÅÏ¢£¬£¬£¬£¬°üÀ¨µç»°¼Í¼¡¢¶ÌÐÅ¡¢ä¯ÀÀÆ÷ÀúÊ·¼Í¼µÈ¡£¡£¡£¡£³ýÁ˾ßÓÐÌØ¹¤Èí¼þµÄ¹¦Ð§Ö®Í⣬£¬£¬£¬¶ñÒâAPKÑù±¾»¹°üÀ¨ºóÃŹ¦Ð§¡£¡£¡£¡£°üÀ¨¶ñÒâpayloadµÄAPKÖ÷Ҫͨ¹ýTelegramºÍWhatsAppµÈ̸ÌìÓ¦ÓÃÈö²¥¸øÊܺ¦Õß¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪViceLeaker¿ÉÄÜÊÇÃæÏòÈ«ÇòµÄÍøÂç¹¥»÷»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/new-viceleaker-campaign-targets-android-users-in-the-middle-east-5f90068e