¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181203
Ðû²¼Ê±¼ä 2018-12-03
Windows Defender ATPÍŶӷ¢Ã÷Ò»¸öÕë¶ÔÑÇÖÞÄÜÔ´¡¢Ê³ÎïºÍÒûÁÏÐÐÒµµÄжñÒâ¹¥»÷»î¶¯£¬£¬£¬£¬£¬»ùÓڶԸûµÄÄ¿µÄÑ¡Ôñ¡¢¹¥»÷Á´ÒÔ¼°¹¤¾ß¼¯µÄÆÊÎö£¬£¬£¬£¬£¬Ñо¿ÍŶÓÒÔΪ¸Ã»î¶¯ÊÇÓÉAPT×éÖ¯Tropic TrooperÌᳫµÄ¡£¡£¡£¡£¡£¡£¹¥»÷µÄ³õʼÏòÁ¿ÊÇÒ»¸öʹÓÃÁËOffice¹«Ê½±à¼Æ÷Îó²îCVE-2018-0802µÄ¶ñÒâÎĵµ£¬£¬£¬£¬£¬¹¥»÷ÕßËæºóʹÓÃbitsadmin.exe´ÓÔ¶³ÌЧÀÍÆ÷ÏÂÔØ²¢Ö´ÐÐËæ»úÃüÃûµÄpayload¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪÕâЩpayloadµÄÖ÷ҪĿµÄÊÇÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/2¡¢¾Éƿװоƣ¬£¬£¬£¬£¬¶ñÒâ¹¥»÷»î¶¯Butter¼ÓÈëÐÂsambaľÂí

GuardiCoreÑо¿ÍŶӷ¢Ã÷¶ñÒâ¹¥»÷»î¶¯butter¼ÓÈëÁËÐÂpayload£ºsambaľÂí¡£¡£¡£¡£¡£¡£butter×îÔç·ºÆðÓÚ2015ÄêÖÐÆÚ£¬£¬£¬£¬£¬Æä¹¥»÷À´×ÔÓÚÓÐÏ޵öIP£¬£¬£¬£¬£¬ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬Ö»ÓÐ4¸öIP±»ÓÃÓÚ²î±ð½×¶ÎµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ÕâЩIPÀ´×ÔÓÚÏã¸ÛºÍÐÂ¼ÓÆÂ£¬£¬£¬£¬£¬²¢ÇÒ×Ô2016ÄêÒÔÀ´Ò»Ö±Óë¶ñÒâ»î¶¯Ïà¹ØÁª¡£¡£¡£¡£¡£¡£butterÔçÆÚµÄpayloadÊÇ80 RAT£¬£¬£¬£¬£¬µ«×Ô2018Äê7ÔÂÆð×îÏÈʹÓÃsambaľÂí¡£¡£¡£¡£¡£¡£sambaľÂíÊǵ䷶µÄRAT£¬£¬£¬£¬£¬¿ÉÒÔÏÂÔØÎļþ¡¢Ö´ÐÐshellÏÂÁî¡¢ÌᳫDDoS¹¥»÷ÒÔ¼°¾ßÓÐÉý¼¶»úÖÆ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒѾÊӲ쵽Á˸ÃľÂíµÄ7¸ö²î±ðµÄ°æ±¾¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.guardicore.com/2018/11/butter-brute-force-ssh-attack-tool-evolution3¡¢Õ¹ÍûδÀ´£¬£¬£¬£¬£¬McAfeeÐû²¼2019ÄêÍøÂçÍþвչÍû±¨¸æ

McAfeeʵÑéÊÒ¹ØÓÚ2019ÄêÍøÂçÍþвµÄÕ¹Íû°üÀ¨£º·¸·¨·Ö×ӵĵØÏÂͬÃ˹ØÏµ½«Ô½·¢Àο¿£¬£¬£¬£¬£¬²¢½«½¨Éè¸ü¶àÏàÖúͬ°é¹ØÏµ£¬£¬£¬£¬£¬ÔöÇ¿ÆäÍþвÐÔ£»£»£»È˹¤ÖÇÄÜÊÇÌÓ±ÜÊÖÒÕµÄδÀ´£»£»£»ÐͬÐÔÍþв½«ÔöÌí£¬£¬£¬£¬£¬Òò´ËÐèÒª¸ü¶àµÄ×ÛºÏÐÔÏìÓ¦²½·¥£»£»£»·¸·¨·Ö×ÓʹÓÃÉ罻ýÌåÈö²¥ÐéαÐÅÏ¢£¬£¬£¬£¬£¬²¢Õë¶ÔÉÌ¼ÒÆ·ÅÆÌᳫڲƻ£»£»£»Êý¾ÝÉøÂ©¸ü¶àµØÕë¶ÔÔÆ¶Ë£»£»£»ÓïÒôÖúÊÖ³ÉΪIoT¹¥»÷µÄÏÂÒ»¸öÔØÌ壻£»£»·¸·¨·Ö×Ó½«¸ü¶àµØÕë¶ÔÉí·Ýƽ̨ºÍ½çÏß×°±¸Ìᳫ¹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/mcafee-labs/mcafee-labs-2019-threats-predictions/4¡¢´ÓδͣЪ£¬£¬£¬£¬£¬ÒøÐÐľÂíBackSwap3ÔÂÖÁ11Ô¶ñÒâ»î¶¯ÆÊÎö

Check PointÑо¿ÍŶÓÐû²¼¹ØÓÚÒøÐÐľÂíBackSwapµÄÑݱäÇ÷ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£BackSwap×îÔçÓÚ2018Äê3ÔÂÖÐÑ®±»·¢Ã÷£¬£¬£¬£¬£¬ÆäʱµÄÑù±¾½ÏΪ¼òÆÓ£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô²¨À¼ÒøÐÐipko.pl¡¢24.plºÍmbank.pl¡£¡£¡£¡£¡£¡£4Ô·ݣ¬£¬£¬£¬£¬ÐµÄÑù±¾Öн«¸ü¶àµÄÒøÐÐÌí¼ÓΪĿµÄ£¬£¬£¬£¬£¬²¢×îÏÈÔÚÄ¿µÄÍøÕ¾µÄDOMÖн¨ÉèÐéαµÄÊäÈë±í¸ñ£¬£¬£¬£¬£¬ÁýÕÖÔʼÊäÈë×ֶΡ£¡£¡£¡£¡£¡£5Ô·ݣ¬£¬£¬£¬£¬BackSwap×îÏȸú×ÙÊÜѬȾ»úеµÄÊýÄ¿¡£¡£¡£¡£¡£¡£6Ô·ݣ¬£¬£¬£¬£¬BackSwap½«ÆäÓÐÓúÉÔØÇ¶ÈëBMPͼÏñÖС£¡£¡£¡£¡£¡£7Ô·ÝBackSwapûÓÐÈκλ£¬£¬£¬£¬£¬µ«ÔÚ8Ô·Ý×îÏÈתÏòÕë¶ÔÎ÷°àÑÀÒøÐС£¡£¡£¡£¡£¡£9Ôµ½11Ô·ÝBackSwapÖ÷ÒªÊǶÔͼÏñÃûÌõÄpayload¾ÙÐÐÐ޸쬣¬£¬£¬£¬²¢Ìí¼ÓÁ˸ü¶à¼ÓÃܲãºÍ´ó×ÚÀ¬»ø´úÂë¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/the-evolution-of-backswap/5¡¢Êý¾Ý¿â²»ÉèÃÜÂ룬£¬£¬£¬£¬Urban¹«Ë¾Áè¼Ý30ÍòÓû§ÐÅϢй¶

UrbanÊÇÒ»¼ÒÓ¢¹úµÄÍÆÄô´Òµ¹«Ë¾£¬£¬£¬£¬£¬ÆäÊý¾Ý¿âÒòδÉèÃÜÂëµ¼ÖÂÁè¼Ý30Íò¿Í»§ÐÅϢй¶¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Oliver Houghͨ¹ýShodan·¢Ã÷Á˸ÃÊý¾Ý¿â£¬£¬£¬£¬£¬ÏÖÔÚ¸ÃÊý¾Ý¿âÒÑÏÂÏߣ¬£¬£¬£¬£¬µ«²»ÖªµÀ¸ÃÊý¾Ý¿â̻¶Á˶೤ʱ¼ä¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÖаüÀ¨Áè¼Ý30.9ÍòÓû§¼Í¼£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëµÈ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Êý¾Ý¿âÖл¹´æ´¢ÁËÁè¼Ý35.1Íò¸öЧÀÍÔ¤¶¨¼Í¼£¬£¬£¬£¬£¬ÒÔ¼°Áè¼Ý2000¸öÍÆÄÃʦµÄÏà¹ØÐÅÏ¢¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://techcrunch.com/2018/11/27/urban-massage-data-exposed-customers-creepy-clients/6¡¢Ë¼¿ÆÐÞ¸´PrimeÔÊÐíÖ¤ÖÎÀíÆ÷ÖеÄSQL×¢ÈëÎó²î

˼¿ÆÐÞ¸´ÁËPrimeÔÊÐíÖ¤ÖÎÀíÆ÷£¨PLM£©ÖеÄÒ»¸öSQL×¢ÈëÎó²î£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ´ÐÐí§ÒâSQLÅÌÎÊ¡£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2018-15441£©ÓëPLMµÄWeb¿ò¼Ü´úÂëÓйأ¬£¬£¬£¬£¬Æ¾Ö¤Ë¼¿ÆµÄÐÎò£¬£¬£¬£¬£¬¸ÃÎó²îÊÇÓÉÓÚSQLÅÌÎÊÖÐȱÉÙ¶ÔÓû§ÊäÈë¾ÙÐÐÑéÖ¤µ¼Öµģ¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËͰüÀ¨SQLÓï¾äµÄ¶ñÒâHTTP POSTÇëÇó´¥·¢¸ÃÎó²î£¬£¬£¬£¬£¬´Ó¶ø»ñµÃshellȨÏÞ»òÐ޸ļ°É¾³ýPLMÊý¾Ý¿âÖеÄÊý¾Ý¡£¡£¡£¡£¡£¡£PLM 11.0.1¼°Ö®ºóµÄ°æ±¾Êܵ½Ó°Ï죬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì×°ÖÃÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-injectÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí