¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190221
Ðû²¼Ê±¼ä 2019-02-21
Check PointÑо¿ÍŶÓÅû¶WinRARÖеĴúÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ£´æÁËÁè¼Ý19ÄêµÄʱ¼ä£¬£¬£¬£¬£¬Ó°ÏìÁËÁè¼Ý5ÒÚÓû§¡£¡£¡£¸ÃÎó²î£¨CVE-2018-20250¡¢CVE-2018-20251¡¢CVE-2018-20252ºÍCVE-2018-20253£©±£´æÓÚWinRARµÄUNACEV2.DLL¿âÖУ¬£¬£¬£¬£¬Õâ¸ö¿âÈÏÕæ½âѹËõACEÃûÌõÄѹËõÎļþ¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷¸Ã¿â±£´æ±àÂëȱÏÝ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓöñÒâACEÎļþÔÚ½âѹËõµÄÄ¿µÄ·¾¶Ö®ÍâÖ²Èë¶ñÒâÈí¼þ¡£¡£¡£WinRARÍŶÓÌåÏÖÓÉÓÚUNACEV2.DLL´Ó2005ÄêÆð¾Í×èÖ¹Á˸üУ¬£¬£¬£¬£¬¿ª·¢Ö°Ô±ÒѾʧȥÁ˸ÿâÔ´´úÂëµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬Òò´ËËûÃÇÑ¡Ôñ·ÅÆú¶ÔACEÃûÌõÄÖ§³Ö¡£¡£¡£WinRAR¿ª·¢ÕßÔÚ1ÔÂ28ÈÕÐû²¼ÁËWinRAR 5.70 Beta 1ÒÔÐÞ¸´´ËÎó²î¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/extracting-code-execution-from-winrar/2¡¢WordPressÍŶÓÐÞ¸´Ò»¸ö¾ßÓÐ6ÄêÀúÊ·µÄRCEÎó²î

RIPS¹«Ë¾µÄÇå¾²Ñо¿Ö°Ô±ÔÚWordPress 5.0.3֮ǰµÄ°æ±¾Öз¢Ã÷Ò»¸ö¿Éµ¼ÖÂRCEµÄÇå¾²Îó²î£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÒÑÍù6Äê¼äÐû²¼µÄËùÓÐWordPress°æ±¾¡£¡£¡£¾ßÓÐÖÁÉÙÒ»¸ö¡°×÷Õß¡±ÕË»§µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²îÔڵײãЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¸ÃÎó²îÊÇ·¾¶±éÀúÎó²îºÍÎļþ°üÀ¨Îó²îµÄ×éºÏ£¬£¬£¬£¬£¬ÔÚÑо¿Ö°Ô±Ðû²¼µÄPoCÊÓÆµÖУ¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ¼¸ÃëÖÓÄÚ»ñµÃÄ¿µÄWordPress²©¿ÍµÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£WordPress°æ±¾5.0.1ºÍ4.9.9ÖеÄÇå¾²²½·¥¿É×èÖ¹¸ÃÎó²îʹÓᣡ£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/02/wordpress-remote-code-execution.html3¡¢ÈüÃÅÌú¿ËÐû²¼ISTR 24Äê¶ÈÍþв±¨¸æ£¬£¬£¬£¬£¬2018Ä깩ӦÁ´¹¥»÷ÔöÌí78£¥

ÈüÃÅÌú¿ËÐû²¼»¥ÁªÍøÇå¾²Íþв±¨¸æ£¨ISTR£©Volume 24£¬£¬£¬£¬£¬¸Ã±¨¸æÖ¸³ö±íµ¥Ð®Öƹ¥»÷£¨formjacking£©È¡´úÁËÀÕË÷Èí¼þºÍ¶ñÒâÍÚ¿óÈí¼þ£¬£¬£¬£¬£¬³ÉΪ2018Äê×îÖ÷ÒªµÄÍþв¡£¡£¡£formjacking¹¥»÷Ö÷ÒªÕë¶ÔÔÚÏßÁãÊÛÉ̺͵ç×ÓÉÌÎñÍøÕ¾£¬£¬£¬£¬£¬Í¨¹ý¶ñÒâ´úÂëÀ´ÇÔÈ¡¿Í»§µÄÖ§¸¶ÐÅÏ¢£¬£¬£¬£¬£¬ÕâÖÖ¹¥»÷½øÒ»²½Ö¤ÊµÎú¹©Ó¦Á´¹¥»÷µÄΣº¦¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æµÄÊý¾Ý£¬£¬£¬£¬£¬2018Ä깩ӦÁ´¹¥»÷µÄÊýÄ¿±È2017Äêºá¿ç78%¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Óë2017ÄêÏà±È£¬£¬£¬£¬£¬2018ÄêÀÕË÷Èí¼þ¹¥»÷ϽµÁË20%£¬£¬£¬£¬£¬µ«Õë¶ÔÆóÒµµÄ¹¥»÷ÔöÌíÁË12%£¬£¬£¬£¬£¬²¢ÇÒÒÆ¶¯ÀÕË÷Èí¼þìÉý33%¡£¡£¡£ÔÚ2018Äê1ÔÂÖÁ12ÔÂʱ´ú£¬£¬£¬£¬£¬¼ÓÃÜÐ®ÖÆ¹¥»÷ϽµÁË52%¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.symantec.com/blogs/threat-intelligence/istr-24-cyber-security-threat-landscape4¡¢Î¢ÈíÅû¶APT28й¥»÷»î¶¯£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÅ·ÖÞÕþÖÎʵÌå

΢ÈíÅû¶¶íÂÞ˹APT×éÖ¯Fancy Bear£¨ÓÖ³ÆAPT28£©µÄй¥»÷»î¶¯£¬£¬£¬£¬£¬Æ¾Ö¤Î¢ÈíµÄ±íÊö£¬£¬£¬£¬£¬APT28µÄÄ¿µÄÊÇÓë2019ÄêÅ·ÖÞÒé»áÑ¡¾ÙÏà¹ØµÄÕþÖÎʵÌå¡£¡£¡£APT28ʹÓÃÓã²æÊ½´¹ÂÚÓʼþ£¬£¬£¬£¬£¬ÔÚ2018Äê9ÔÂÖÁ12ÔÂʱ´úÕë¶Ô104¸öÕË»§ÌᳫÁ˹¥»÷¡£¡£¡£ÕâЩÕË»§ÊôÓÚ±ÈÀûʱ¡¢·¨¹ú¡¢µÂ¹ú¡¢²¨À¼¡¢ÂÞÂíÄáÑǺÍÈû¶ûάÑǵÄÕþÖλú¹¹¡£¡£¡£ÕâЩ´¹ÂÚÓʼþÖ¼ÔÚÍøÂçÄ¿µÄµÄµÇ¼ƾ֤»òÈö²¥¶ñÒâÈí¼þ¡£¡£¡£Î¢ÈíÌåÏÖËü½«°ÑAccountGuardЧÀÍÀ©Õ¹µ½12¸öеÄÅ·ÓѰî¼Ò¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-reveals-new-apt28-cyber-attacks-against-european-political-entities/5¡¢³¯ÏÊAPT×éÖ¯Lazarus£¬£¬£¬£¬£¬Ê¹ÓÃKEYMARBLEºóÃŹ¥»÷¶íÂÞ˹ÆóÒµ

³¯ÏÊAPT×éÖ¯LazarusµÄ·ÖÖ§»ú¹¹BluenoroffÕë¶Ô¶íÂÞ˹ÆóÒµÌᳫÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£¸Ã¹¥»÷»î¶¯Ê¹ÓÃOfficeÎĵµ×÷Ϊ³õʼѬȾǰÑÔ£¬£¬£¬£¬£¬²¢×îÖÕÊÍ·ÅÁËKEYMARBLEºóÃÅ¡£¡£¡£Æ¾Ö¤US-CERTµÄÏà¹Ø¶ñÒâÈí¼þÆÊÎö±¨¸æ£¬£¬£¬£¬£¬¸ÃºóÃÅľÂí¿ÉÓÃÓÚ»á¼û×°±¸µÄÉèÖÃÊý¾Ý¡¢ÏÂÔØÆäËüÎļþ¡¢Ö´ÐÐÏÂÁî¡¢ÐÞ¸Ä×¢²á±í¡¢½ØÈ¡ÆÁÄ»ÐÅÏ¢ºÍÊý¾ÝÉøÂ©µÈ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-apt-lazarus-targets-russian-entities-with-keymarble-backdoor/6¡¢ATM¶ñÒâÈí¼þWinPot£¬£¬£¬£¬£¬Ê¹ÓÃUSB½Ó¿Ú¾ÙÐÐÈö²¥

¿¨°Í˹»ùÑо¿Ö°Ô±Konstantin Zykov·¢Ã÷ATM¶ñÒâÈí¼þWinPotµÄбäÌåv.3ÒѾÔÚ°µÍøÉÏ·ºÆð£¬£¬£¬£¬£¬Æä±¨¼ÛΪ500ÃÀÔªµ½1000ÃÀÔªÖ®¼ä¡£¡£¡£WinPotͨ¹ýÎïÆÊÎö¼û¾ÙÐÐÈö²¥£¬£¬£¬£¬£¬¼´Í¨¹ýATMµÄUSB½Ó¿ÚÈö²¥¡£¡£¡£¹¥»÷Õßͨ³£Õë¶ÔÐÐÈ˽ÏÉٵĽֵÀ¡¢Ò©µê¡¢ÂùÝÀàÊÐËÁµÈÅԱߵĵ¥¸öATM£¬£¬£¬£¬£¬Ò»µ©ATMѬȾÁ˸öñÒâÈí¼þ£¬£¬£¬£¬£¬¹¥»÷Õß¼´¿Éͨ¹ýÏÔʾÆÁÄ»Ç¿ÖÆATMÍ·ºÆð½ð¡£¡£¡£°µÍøÂô¼ÒÔÚÆäÑÝʾÊÓÆµÖÐÑÝʾÁËWinPot v.3µÄÊÂÇéÀú³Ì£¬£¬£¬£¬£¬²¢Õ¹Ê¾ÁËÒ»¶ÎShowMeMoneyµÄ´úÂë¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/atm-jackpotting-malware-winpot/141960/ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí