¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181221

Ðû²¼Ê±¼ä 2018-12-21
1¡¢SandboxEscaperµÚÈý´ÎÔÚTwitterÉÏÅû¶δÐÞ¸´µÄWindows 0day

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±SandboxEscaperµÚÈý´ÎÔÚTwitterÉÏÅû¶δÐÞ¸´µÄWindows 0day £¬£¬£¬£¬²¢ÇÒÐû²¼ÁËÏà¹ØPoC¡£¡£¡£¡£Õâ¸öеÄÎó²î±£´æÓÚWindowsµÄMsiAdvertiseProduct¹¦Ð§ÖÐ £¬£¬£¬£¬Æ¾Ö¤¸ÃÑо¿Ö°Ô±µÄ˵·¨ £¬£¬£¬£¬ÓÉÓÚûÓÐ׼ȷÑéÖ¤ £¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøù¦Ð§Ç¿ÆÈ×°ÖÃЧÀÍÒÔSYSTEMȨÏÞ¸´ÖÆí§ÒâÎļþ²¢¶ÁÈ¡ÆäÄÚÈÝ £¬£¬£¬£¬´Ó¶øµ¼ÖÂí§ÒâÎļþ¶ÁÈ¡Îó²î¡£¡£¡£¡£SandboxEscaper»¹ÔÚGithubÉÏÐû²¼Á˸ÃÎó²îµÄPoC £¬£¬£¬£¬µ«¸ÃGithubÕË»§ÏÖÔÚÒѱ»É¾³ý¡£¡£¡£¡£SandboxEscaperÔøÔÚ2018Äê8Ô·ݺÍ10Ô·ݻ®·ÖÔÚTwitterÉÏÅû¶ÁËÁ½¸öWindows 0day¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/12/windows-zero-day-exploit.html


2¡¢McAfee³Æ×î½üµÄShamoon¹¥»÷»î¶¯ÒÉÓëÒÁÀÊAPT33ÓйØ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨



ƾ֤McAfeeʵÑéÊÒ¶Ô×î½üµÄShamoon¹¥»÷»î¶¯µÄÆÊÎö £¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪÆä¹¤¾ß¡¢ÊÖÒպͳÌÐò£¨TTP£©Óë2016ÖÁ2017ÄêµÄShamoon v2¼á³ÖÒ»Ö £¬£¬£¬£¬2018ÄêµÄShamoon¹¥»÷»î¶¯¿ÉÄÜÓëÒÁÀʺڿÍ×éÖ¯APT33ÓÐ¹Ø £¬£¬£¬£¬µ«Ò²ÓпÉÄÜÊÇÆäËü¹¥»÷Õßαװ³ÉAPT33¡£¡£¡£¡£ÔÚÒÑÍùµÄ¼¸ÖÜÀï £¬£¬£¬£¬Shamoon v3ͨ¹ýÇóÖ°Àà´¹ÂÚÍøÕ¾¹¥»÷ʯÓÍ¡¢×ÔÈ»Æø¡¢ÄÜÔ´¡¢µçÐÅÆóÒµºÍÕþ¸®»ú¹¹ £¬£¬£¬£¬ÕâЩÓÃÓÚÍøÂçÊܺ¦Õ߯¾Ö¤µÄÆðÔ´´¹ÂÚ¹¥»÷ËÆºõÔçÔÚ2018Äê8ÔÂβ¾ÍÒÑ×îÏÈ¡£¡£¡£¡£ÔÚеÄ.Net°æ±¾µÄÊý¾Ý²Á³ýÆ÷ÖÐ £¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Á˰üÀ¨Ò»¶Î¹ÅÀ¼¾­ÎĵÄASCII×Ö·û£¨Surah Masad, Ayat 1 £¬£¬£¬£¬´óÒâÎªÕæÖ÷±Ø½«´¦·Ö£©¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/shamoon-attackers-employ-new-tool-kit-to-wipe-infected-systems/


3¡¢15¸öAndroid±ÚÖ½Ó¦Óñ£´æ¹ã¸æÚ²Æ­ÐÐΪ £¬£¬£¬£¬×ÜÏÂÔØÁ¿Áè¼Ý22Íò´Î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±ÔÚGoogle PlayÖмì²âµ½15¸öÉæ¼°¹ã¸æÚ²Æ­»î¶¯µÄAndroid±ÚÖ½Ó¦Óà £¬£¬£¬£¬ÕâЩӦÓõÄ×ÜÌåÏÂÔØÁ¿Áè¼Ý22.22Íò´Î¡£¡£¡£¡£Ò£²âÊý¾ÝÅú×¢Êܵ½Ñ¬È¾×î¶àµÄ¹ú¼Ò/µØÇøÊÇÒâ´óÀû¡¢Öйų́Íå¡¢ÃÀ¹ú¡¢µÂ¹úºÍÓ¡¶ÈÄáÎ÷ÑÇ¡£¡£¡£¡£GoogleÏÖÔÚÒÑ´ÓPlay StoreÖÐɾ³ýÁËÕâЩ¶ñÒâÓ¦Óᣡ£¡£¡£ÕâЩӦÓÃ×Ô¼ºÒ²¾ßÓкܸߵÄÓû§ºÃÆÀ £¬£¬£¬£¬µ«Ñо¿Ö°Ô±¸ß¶ÈÏÓÒÉÕâЩ̸ÂÛÊÇ¼ÙµÄ £¬£¬£¬£¬Ö»ÊÇΪÁËÎüÒýÓû§ÏÂÔØ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/android-wallpaper-apps-found-running-ad-fraud-scheme/


4¡¢MiraiбäÖÖMioriͨ¹ýPHP¿ò¼ÜÖеÄRCEÎó²îÈö²¥

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷IoT½©Ê¬ÍøÂçMiraiµÄÒ»¸ö±äÖÖMioriͨ¹ýPHP¿ò¼ÜThinkPHPÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îÈö²¥¡£¡£¡£¡£¸ÃÎó²îÊÇ12ÔÂ11ÈÕÆØ¹âµÄÒ»¸öÐÂÎó²î £¬£¬£¬£¬Ó°ÏìÁËThinkPHP v5.0.23/5.1.31¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£¡£Ò»µ©Óû§µÄLinuxЧÀÍÆ÷ѬȾÁËMiori £¬£¬£¬£¬Ëü½«»á³ÉΪ½©Ê¬ÍøÂçµÄÒ»²¿·Ö £¬£¬£¬£¬ÓÃÓÚÌᳫDDoS¹¥»÷¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷ÁËÁíÍâµÄÁ½¸öÒÑÖªµÄMirai±äÖÖIZ1H9ºÍAPEPͬÑùʹÓøÃÎó²î¾ÙÐÐÈö²¥¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/with-mirai-comes-miori-iot-botnet-delivered-via-thinkphp-remote-code-execution-exploit/


5¡¢ÃÀ¹úºÍÓ¢¹úÔâÓöÐÂÒ»ÂÖ¶ñÒâÓʼþ¹¥»÷ £¬£¬£¬£¬Ö÷ÒªÕë¶Ô½ðÈÚ¹«Ë¾

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Menlo Labs·¢Ã÷Õë¶ÔÒøÐкͽðÈÚЧÀ͹«Ë¾µÄ¶ñÒâµç×ÓÓʼþ»î¶¯ £¬£¬£¬£¬¸Ã»î¶¯×Ô2018Äê8ÔÂÒÔÀ´Ò»Ö±»îÔ¾ £¬£¬£¬£¬Ö÷ÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¡£¡£¡£¡£¸Ã»î¶¯ÖеĶñÒâpayloadÍйÜÔÚGoogleÔÆÐ§ÀÍ£¨storage.googleapis.com£©ÉÏ £¬£¬£¬£¬ÒÔÈÆ¹ýÇå¾²²úÆ·µÄÇå¾²¿ØÖÆ¡£¡£¡£¡£µÚÒ»½×¶ÎµÄdropper°üÀ¨vbsÎļþºÍjarÎļþ £¬£¬£¬£¬ÕâЩvbsÎļþ¾ÙÐÐÁ˸߶ȻìÏý £¬£¬£¬£¬²¢ÇÒ¿ÉÄÜÊÇÓÉÏàͬµÄ¹¤¾ß°ü½¨ÉèµÄ¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.menlosecurity.com/blog/a-jar-full-of-problems-for-financial-services-companies


6¡¢Î¢ÈíÐû²¼½ôÆÈÇå¾²¸üР£¬£¬£¬£¬ÐÞ¸´Ò»¸öÐÂIE 0day

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


΢ÈíÐû²¼½ôÆÈ´øÍâ¸üР£¬£¬£¬£¬ÐÞ¸´IEä¯ÀÀÆ÷ÖеÄÒ»¸ö¸ßΣ0day¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2018-8653£©ÊÇÓɹȸèÍþвÆÊÎöС×éµÄÇå¾²Ñо¿Ô±Clement Lecigne·¢Ã÷µÄ £¬£¬£¬£¬ÊÇIE JScript¾ç±¾ÒýÇæÖеÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î £¬£¬£¬£¬ÀÖ³ÉʹÓôËÎó²îµÄ¹¥»÷Õß¿ÉÒÔÔÚÄ¿½ñÓû§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËWindows Server 2008ÖеÄIE9 £¬£¬£¬£¬Windows Server 2012ÖеÄIE10ÒÔ¼°¶à¸öWindows°æ±¾ÖеÄIE 11¡£¡£¡£¡£ÓÉÓÚ´ËÎó²îÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Óà £¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì×°ÖøüС£¡£¡£¡£

 

 Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/12/internet-explorer-zero-day.html


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí