¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181107

Ðû²¼Ê±¼ä 2018-11-07
1¡¢¿¨°Í˹»ùÐû²¼2018ÄêQ3À¬»øÓʼþºÍ´¹ÂڻµÄÇ÷ÊÆÆÊÎö

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¿¨°Í˹»ùʵÑéÊÒÐû²¼2018ÄêµÚÈý¼¾¶ÈÀ¬»øÓʼþºÍÍøÂç´¹ÂڻµÄÇ÷ÊÆÆÊÎö±¨¸æ¡£¡£¡£¡£¡£ÔÚ2018ÄêQ3£¬£¬£¬ £¬À¬»øÓʼþռȫÇòÓʼþ×ÜÁ¿ÖеıÈÀýÔöÌíÁË2.88¸ö°Ù·Öµã£¬£¬£¬ £¬´ï52.54%¡£¡£¡£¡£¡£·´´¹ÂÚϵ×ܹ²×èÖ¹ÁËÁè¼Ý1.37ÒÚ¸öÌø×ªÖÁ´¹ÂÚÍøÕ¾µÄÖØ¶¨Ïò£¬£¬£¬ £¬±ÈÉÏÒ»¼¾¶ÈÔöÌíÁË3000Íò¡£¡£¡£¡£¡£À¬»øÓʼþºÍ´¹Âڻ¼ÌÐøÊ¹Óñ¾¼¾¶ÈµÄÖØ´óÐÂÎű¨µÀÀ´Èö²¥£¬£¬£¬ £¬ÀýÈçÐÂiPhoneµÄÐû²¼¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://securelist.com/spam-and-phishing-in-q3-2018/88686/


2¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃÐéαTelegram¼àÊÓÒÁÀÊÓû§µÄ¶ñÒâ»î¶¯

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


˼¿ÆTalosÅû¶ÁËÒÁÀʵÄһЩÓɹú¼Ò×ÊÖúµÄ¶ñÒâ»î¶¯£¬£¬£¬ £¬ÕâЩ»î¶¯×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬ £¬Ö÷ÒªÓÃÓÚ¼àÊÓÒÁÀʵÄÔ¼4000ÍòTelegramÓû§£¨ËäÈ»¸ÃÓ¦ÓÃÏÖʵÉÏÔڸùú±»Õ¥È¡Ê¹Óã©¡£¡£¡£¡£¡£Talos³ÆÕâЩ»î¶¯µÄÖØ´óÐÔ¡¢×ÊÔ´ÐèÇóºÍÒªÁì¸÷²»Ïàͬ£¬£¬£¬ £¬µ«Ö÷ҪʹÓÃÁËÈý¸öÔØÌ壺ÐéαӦÓᢴ¹ÂÚµÇÂ¼Ò³ÃæºÍBGPÐ®ÖÆ¡£¡£¡£¡£¡£ÕâЩÐéαTelegram¡°¿Ë¡Ì塱Ӧ¸Ã±»¹éÀàΪ»ÒÉ«Èí¼þ»òDZÔÚÓꦵÄÈí¼þ£¨PUP£©¡£¡£¡£¡£¡£ËäÈ»ÕâЩ¶ñÒâ»î¶¯¶¼Õë¶ÔÒÁÀÊ£¬£¬£¬ £¬µ«Ñо¿Ö°Ô±²¢Î´·¢Ã÷ËüÃÇÖ®¼ä±£´æÁªÏµ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2018/11/persian-stalker.html


3¡¢·¸·¨ÍÅ»ïInceptionʹÓÃÐÂPowerShellºóÃÅÃé׼ŷÖÞ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Palo Alto NetworksµÄUnit42Ðû²¼¹ØÓÚ·¸·¨ÍÅ»ïInceptionµÄй¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£InceptionÖÁÉÙ×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬ £¬¸Ã×éÖ¯ÔøÔÚ2017ÄêÕë¶ÔÅ·ÖÞ¡¢¶íÂÞ˹ºÍÖÐÑǵØÇøµÄÕþ¸®»ú¹¹Ìᳫ¹¥»÷¡£¡£¡£¡£¡£Unit42ÊӲ쵽¸Ã×éÖ¯ÔÚ2018Äê10ÔÂʹÓÃOfficeÎó²îCVE-2017-11882ºÍÒ»¸öеÄPowerShellºóÃÅÕë¶ÔÅ·ÖÞµÄÄ¿µÄÌᳫ¹¥»÷¡£¡£¡£¡£¡£¸ÃºóÃű»³ÆÎªPOWERSHOWER£¬£¬£¬ £¬¿ÉÓÃÓÚÍøÂçϵͳÐÅÏ¢²¢ÉÏ´«ÖÁC2ЧÀÍÆ÷ÒÔ¼°É¨³ýÖ¤¾Ý£¬£¬£¬ £¬»¹¿ÉÓÃÓÚÖ´ÐÐÆäËüpayload¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://researchcenter.paloaltonetworks.com/2018/11/unit42-inception-attackers-target-europe-year-old-office-vulnerability/


4¡¢Ñо¿Ö°Ô±·¢Ã÷¶à¿î×Ô¼ÓÃÜSSD±£´æÎó²î£¬£¬£¬ £¬¿ÉÔÊÐí¹¥»÷Õß½âÃÜÓû§Êý¾Ý

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÉÀ¼Radboud´óѧµÄÑо¿Ö°Ô±Carlo MeijerºÍBernard van Gastel·¢Ã÷¶à¿îÊ¢ÐеÄ×Ô¼ÓÃÜSSD±£´æÇå¾²Îó²î£¬£¬£¬ £¬¿ÉÔÊÐí¹¥»÷Õß½âÃÜ´ÅÅ̺ͻñÈ¡Óû§Êý¾Ý¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ²úÆ·°üÀ¨CrucialµÄCruces MX100ºÍÈýÐǵÄ850 EVOµÈ¡£¡£¡£¡£¡£CrucialÒѾ­ÎªÆäËùÓÐÊÜÓ°ÏìµÄSSDÐû²¼Á˹̼þ²¹¶¡£¡£¡£¡£¡£¬£¬£¬ £¬µ«ÈýÐÇֻΪT3ºÍT5±ãЯʽSSDÐû²¼ÁËÐÞ¸´²¹¶¡£¡£¡£¡£¡£¬£¬£¬ £¬²¢½¨ÒéEVOÓû§Ê¹ÓÃÓëϵͳ¼æÈݵļÓÃÜÈí¼þ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/11/self-encrypting-ssd-hacking.html


5¡¢GoogleÐû²¼11ÔÂAndroidÇå¾²¸üУ¬£¬£¬ £¬ÐÞ¸´¶à¸öÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

GoogleÔÚ11Ô·ݵÄAndroidÇå¾²¸üÐÂÖÐÐÞ¸´ÁË36¸öÇå¾²Îó²î£¬£¬£¬ £¬±ðµÄÉÐÓÐ17¸öÎó²îÓëQualcomm×é¼þÓйØ¡£¡£¡£¡£¡£½ÏÑÏÖØµÄÎó²î°üÀ¨Ó°ÏìAndroid 7.0+µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-9527£©ºÍÓ°Ïì9.0µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-9531ºÍCVE-2018-9521£©¡£¡£¡£¡£¡£ÓÉÓÚÔÚLibxaac¿âÖз¢Ã÷´ó×ÚÇå¾²Îó²î£¬£¬£¬ £¬Òò´ËGoogleÒѽ«¸Ã¿â±ê¼ÇΪʵÑéÐÔ²¢ÇÒ²»»á½«¸Ã¿â°üÀ¨ÔÚÈκÎAndroidÉú²ú°æ±¾ÖС£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬11ÔµÄÇå¾²¸üнöÊÊÓÃÓÚAndroid7.0+µÄ°æ±¾£¬£¬£¬ £¬»»¾ä»°Ëµ£¬£¬£¬ £¬Android 6.x½«²»ÔÙ»ñµÃGoogleµÄÖ§³Ö¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://source.android.com/security/bulletin/2018-11-01.html


6¡¢Akado TelecomÒâÍâй¶ÊýǧÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¾Ý·͸É籨µÀ£¬£¬£¬ £¬¶íÂÞ˹ISP Akado TelecomÒâÍâµØ½«ÊýǧÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢ÉÏ´«ÖÁRIPE NCCµÄЧÀÍÆ÷£¬£¬£¬ £¬ÕâЩй¶µÄСÎÒ˽¼ÒÐÅÏ¢£¨PII£©Öл¹°üÀ¨Ò»Ð©¶íÂÞ˹Õþ¸®¹ÙÔ±ºÍ¶íÂÞ˹ÃûÈË¡¢ÒøÐÐÊÂÇéÖ°Ô±µÄµØµãºÍµç»°ºÅÂëµÈ¡£¡£¡£¡£¡£RIPE NCCÊÇÅ·ÖÞ¡¢Öж«ºÍÖÐÑDz¿·ÖµØÇøµÄ·ÇÓªÀûÐÔÇøÓò»¥ÁªÍø×¢²á»ú¹¹£¬£¬£¬ £¬ÆäÊý¾Ý¿âÊǿɹûÕæ»á¼ûµÄ¡£¡£¡£¡£¡£Akado TelecomÌåÏÖÒѾ­Æô¶¯ÁËÒ»Ïî¹ØÓÚ´ËÊÂÎñµÄÄÚ²¿ÊӲ졣¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://news.softpedia.com/news/akado-telecom-accidentally-leaks-customers-names-phone-numbers-and-addresses-523617.shtml


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí