¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181108
Ðû²¼Ê±¼ä 2018-11-08
¶íÂÞ˹Îó²îÑо¿Ö°Ô±Sergey ZelenyukÅû¶VirtualBoxÖеÄÒ»¸öÐéÄâ»úÌÓÒÝ0day£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËVirtualBox 5.2.20¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£¡£¸ÃÎó²îÊÊÓÃÓÚÍø¿¨ÎªIntel PRO/1000 MT Desktop (82540EM) ²¢´¦ÓÚNATģʽµÄÐéÄâ»ú£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÌÓÒÝÖÁÖ÷»úring3ȨÏÞ£¬£¬£¬£¬£¬²¢Ê¹ÓÃÆäËüÊÖÒÕÌáȨÖÁring0¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚGithubÉÏÏêϸÐÎòÁ˸ÃÎó²î±³ºóµÄ»úÖÆ£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÏà¹ØPoCÊÓÆµ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/virtualbox-zero-day-vulnerability-details-and-exploit-are-publicly-available/2¡¢WordPress²å¼þWooCommerceÐÞ¸´Ò»¸öí§ÒâÎļþɾ³ýÎó²î

RIPSÑо¿Ö°Ô±Simon Scannell·¢Ã÷WordPress²å¼þWooCommerce±£´æÒ»¸öí§ÒâÎļþɾ³ýÎó²î£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¶ñÒâ¹¥»÷ÕßÖØÖÃÖÎÀíÔ±ÕË»§µÄÃÜÂë²¢ÍêÈ«½ÓÊÜÍøÕ¾¡£¡£¡£¡£WooCommerceÊÇWordPressÉÏ×îÊܽӴýµÄµç×ÓÉÌÎñ²å¼þÖ®Ò»£¬£¬£¬£¬£¬Æä×°ÖôÎÊýÁè¼Ý400Íò£¬£¬£¬£¬£¬Îª»¥ÁªÍøÉϽü35%µÄµç×ÓÉÌÎñÍøÕ¾Ìṩ֧³Ö¡£¡£¡£¡£WooCommerce¿ª·¢ÍŶÓÒÑÔÚ°æ±¾3.4.6ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/woocommerce-wordpress-hacking.html3¡¢Ë¼¿Æ½ñÄêÄÚµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§

˼¿ÆÐû²¼Á˶à¿î²úÆ·µÄ15¸öÇå¾²¸üУ¬£¬£¬£¬£¬ÆäÖаüÀ¨É¾³ýÁËСÐÍÆóÒµ½»Á÷»úÖеÄÒ»¸öºóÃÅÕË»§¡£¡£¡£¡£ÕâÊǽñÄêÀ´Ë¼¿ÆµÚÆß´Îɾ³ý²úÆ·ÖеĺóÃÅÕË»§¡£¡£¡£¡£ÕâЩºóÃÅÕË»§Îó²î°üÀ¨3Ô·ݵÄCVE-2018-0141ºÍCVE-2018-0150¡¢5Ô·ݵÄCVE-2018-0222¡¢6Ô·ݵÄCVE-2018-0329¡¢7Ô·ݵÄCVE-2018-0375¡¢9Ô·ݵÄCVE-2018-15427ÒÔ¼°±¾Ô£¨11Ô·ݣ©µÄCVE-2018-15439¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cisco-removed-its-seventh-backdoor-account-this-year-and-thats-a-good-thing/4¡¢Ñо¿ÍŶӷ¢Ã÷¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioÔâµ½¹©Ó¦Á´¹¥»÷

ESETÑо¿ÍŶӷ¢Ã÷¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioÔâµ½¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬¸Ã¹¥»÷ÊÇͨ¹ýÍøÂçÆÊÎöƽ̨StatCounter¾ÙÐеġ£¡£¡£¡£StatCounterЧÀͱ»Áè¼Ý200Íò¸öÍøÕ¾Ê¹ÓÃÒÔÊÕ¾Û»á¼ûÕßµÄͳ¼ÆÐÅÏ¢£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚStatCounterµÄJS¾ç±¾ÖÐÌí¼Ó¶ñÒâ´úÂ룬£¬£¬£¬£¬¿ÉÒÔÔÚËùÓеÄÕâÐ©ÍøÕ¾Öж¼×¢Èë¶ñÒâJS´úÂë¡£¡£¡£¡£Æ¾Ö¤¶Ô¶ñÒâ´úÂëµÄÆÊÎö£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùgate.ioËÆºõÊÇÕâ´Î¹¥»÷µÄÖ÷ҪĿµÄ¡£¡£¡£¡£µ«ÓÉÓÚ¶ñÒâ¾ç±¾»áÒ»Ö±ÌìÉúеıÈÌØ±ÒµØµã£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±ÎÞ·¨µÃÖªÏêϸÓм¸¶à×ʽ𱻵Á¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.welivesecurity.com/2018/11/06/supply-chain-attack-cryptocurrency-exchange-gate-io/5¡¢Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶ÔÎ÷°àÑÀµÄÐéÎ±ÒøÐÐÓ¦ÓÃMovil Secure

Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±ÔÚGoogle PlayÉÏ·¢Ã÷Ö÷ÒªÕë¶ÔÎ÷°àÑÀÓû§µÄ¶ñÒâÒøÐÐÓ¦ÓÃMovil Secure¡£¡£¡£¡£Movil Secureð³äÓëÎ÷°àÑÀ¶ÔÍâÒøÐÐBBVAÓйأ¬£¬£¬£¬£¬²¢ÇÒ¾ßÓÐרҵµÄÍâ¹ÛºÍϸÄåµÄÓû§½çÃæ¡£¡£¡£¡£¸ÃÓ¦ÓÃÖ÷ÒªÓÃÓÚÍøÂçÓû§µÄÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨¶ÌÐź͵绰ºÅÂëµÈ£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ¶ÌÐÅ´¹Âڻ¡£¡£¡£¡£¸Ã¶ñÒâÓ¦ÓÃÔÚ10ÔÂ19ÈÕÐû²¼£¬£¬£¬£¬£¬²¢ÔÚ6ÌìÄÚÏÂÔØÁËÁè¼Ý100´Î¡£¡£¡£¡£Ñо¿Ö°Ô±»¹ÔÚͳһ¸ö¿ª·¢Ö°Ô±ÃûÏ·¢Ã÷ÁËÆäËüÈý¸öÀàËÆµÄ¶ñÒâÓ¦Ó㬣¬£¬£¬£¬ÏÖÔÚÕâЩӦÓÃÒѱ»Googleɾ³ý¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/fake-banking-app-found-on-google-play-used-in-smishing-scheme/
6¡¢Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÊ¥µ®ÓÃÆ·¹©Ó¦É̵ÄÎÞÎļþ¶ñÒâÈí¼þ¹¥»÷

CyrenÑо¿Ö°Ô±·¢Ã÷ÒѾ±£´æÕë¶ÔÊ¥µ®ÓÃÆ·¹©Ó¦É̵ÄжñÒâ¹¥»÷»î¶¯¡£¡£¡£¡£Ã¿ÄêµÄºÚÎåºÍÊ¥µ®½Úʱ´ú£¬£¬£¬£¬£¬ÍøÂç´¹ÂÚºÍթƻ¶¼»áµÖ´ïÒ»¸öá¯Áë¡£¡£¡£¡£½ñÄêµÄÊ¥µ®×¼±¸ÊÂÇéÕýÔÚ¾ÙÐÐÖ®ÖУ¬£¬£¬£¬£¬¶øÑо¿Ö°Ô±ÒѾ·¢Ã÷ÁËÒ»ÖÖеÄÎÞÎļþ¹¥»÷¡£¡£¡£¡£ÕâÖÖ´¹ÂÚÓʼþÒÔÊ¥µ®¶©µ¥ÎªÖ÷Ì⣬£¬£¬£¬£¬ÓÃÓÚ·Ö·¢NetwiredRCºóÃÅ¡£¡£¡£¡£¸ÃºóÃÅ¿ÉÒÔ¾ÙÐмüÅ̼ͼ¡¢ÇÔÈ¡ä¯ÀÀÆ÷ƾ֤ÒÔ¼°µç×ÓÓʼþƾ֤µÈ¡£¡£¡£¡£¶ñÒâÈí¼þµÄÕû¸ö×°ÖÃÀú³ÌÊDZ»×¢ÈëÄ¿µÄÀú³Ì£¬£¬£¬£¬£¬Ã»ÓÐÉúÑĵ½´ÅÅÌÉÏ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.cyren.com/blog/articles/fileless-malware-already-targeting-holiday-suppliersÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí