ÍòºÀÒòÊý¾ÝÐ¹Â¶ÃæÁÙÓ¢¹úî¿Ïµ»ú¹¹1.23ÒÚÃÀÔª·£¿£¿£¿£¿£¿£¿î£»£»£»£»£»£»GEº½¿Õ¹«Ë¾JenkinsЧÀÍÆ÷й¶´ó×ÚÃô¸ÐÐÅÏ¢£»£»£»£»£»£»ÊÓÆµÈí¼þZoom RCEÎó²î
Ðû²¼Ê±¼ä 2019-07-10
Ó¢¹úÊý¾Ý±£»£»£»£»£»£»¤»ú¹¹ÖܶþÌåÏÖ½«ÏòÍòºÀ´¦ÒÔ9900ÍòÓ¢°÷£¨ºÏ1.23ÒÚÃÀÔª£©µÄ·£¿£¿£¿£¿£¿£¿î£¬£¬£¬£¬£¬£¬£¬Ôµ¹ÊÔÓÉÊÇ2018Äê11ÔÂÍòºÀÆìÏÂϲ´ïÎÝÂùݵĻáÔ±Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¾ÝÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©³Æ£¬£¬£¬£¬£¬£¬£¬Å·ÖÞ31¸ö¹ú¼ÒµÄ½ü3000ÍòסÃñºÍ700ÍòÓ¢¹úסÃñÊܵ½ÍòºÀÊý¾Ýй¶µÄÓ°Ïì¡£¡£¡£ÕâÊÇÒÑÍùÁ½ÌìÄÚ±¬·¢µÄµÚ¶þÆðÕë¶ÔÊý¾Ýй¶µÄÖØ´ó·£¿£¿£¿£¿£¿£¿î֪ͨ¡£¡£¡£ÍòºÀÌåÏÖ¶ÔÐÅϢרԱ°ì¹«ÊҵľöÒé¸ÐӦʧÍû£¬£¬£¬£¬£¬£¬£¬ÔÚ±»´¦ÒÔ·£¿£¿£¿£¿£¿£¿î֮ǰ£¬£¬£¬£¬£¬£¬£¬Ëü¡°ÓÐȨ×ö³ö»ØÓ¦¡±£¬£¬£¬£¬£¬£¬£¬²¢¡°ÍýÏë×ö³ö»ØÓ¦ÇÒÆð¾¢º´ÎÀ¡±×Ô¼ºµÄ̬¶È¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/marriott-data-breach-gdpr.html
2¡¢GEº½¿Õ¹«Ë¾JenkinsЧÀÍÆ÷й¶´ó×ÚÃô¸ÐÐÅÏ¢

Çå¾²Ñо¿Ô±Bob Diachenko·¢Ã÷GEº½¿Õ¹«Ë¾µÄJenkinsЧÀÍÆ÷¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬£¬£¬µ¼Ö¹«Ë¾µÄ´ó×ÚÃô¸ÐÐÅϢй¶£¬£¬£¬£¬£¬£¬£¬°üÀ¨¹«Ë¾ÄÚ²¿ÉÌÒµ»ù´¡ÉèÊ©µÄÔ´´úÂë¡¢Ã÷ÎÄÃÜÂ롢ȫÇòϵͳµÄÉèÖÃÎļþºÍ˽Կ¡¢APIÁîÅÆ¡¢Êý¾Ý¿âƾ֤µÈ¡£¡£¡£GEº½¿Õ¹«Ë¾ÊÇͨÓÃµçÆøÆìϵÄ×Ó¹«Ë¾£¬£¬£¬£¬£¬£¬£¬ÊÇÈ«ÇòÉÌÓ÷ɻú·¢ÄîÍ·µÄ¶¥¼¶¹©Ó¦ÉÌÖ®Ò»¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖûÓÐÖ¤¾ÝÅú×¢ÆäËüÈË»á¼ûÁËЧÀÍÆ÷ÉϵÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÒѽÓÄÉÔ¤·À²½·¥ÖØÖÃÁËËùÓÐÆ¾Ö¤¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/ge-aviation-passwords-jenkins-server/146302/
3¡¢Î¢ÈíÖÒÑÔÎÞÎļþ¶ñÒâÈí¼þAstarothµÄ¹¥»÷»î¶¯

΢ÈíÇå¾²ÍŶÓÐû²¼Ò»Ôòת´ï£¬£¬£¬£¬£¬£¬£¬ÖÒÑÔʹÓÃÎÞÎļþÊÖÒÕ·Ö·¢¶ñÒâÈí¼þAstarothµÄ¹¥»÷»î¶¯¡£¡£¡£Windows Defender ATPÍŶӼì²âµ½Á˸öñÒâ»î¶¯£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý´ó¹æÄ£À¬»øÓʼþ»î¶¯ÏòÓû§·Ö·¢AstarothľÂí¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÐÅÏ¢ÇÔȡľÂí£¬£¬£¬£¬£¬£¬£¬¿Éת´¢ÖÖÖÖÓ¦ÓóÌÐòµÄƾ֤£¬£¬£¬£¬£¬£¬£¬²¢½«±»µÁÊý¾ÝÉÏ´«µ½Ô¶³ÌЧÀÍÆ÷¡£¡£¡£Î¢Èí½²»°ÈËÌåÏÖÁè¼Ý95£¥µÄAstarothѬȾ±¬·¢ÔÚ°ÍÎ÷¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/microsoft-warns-about-astaroth-malware-campaign/
4¡¢DDoS½©Ê¬ÍøÂçGoBotKR£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹ú

ƾ֤ESETµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚ¹¹½¨Ò»¸ö¿ÉÓÃÓÚÖ´ÐÐÖÖÖÖDDoS¹¥»÷µÄ½©Ê¬ÍøÂçGoBotKR¡£¡£¡£¸Ã½©Ê¬ÍøÂçÖ÷ÒªÃé×¼º«¹úµçÊÓ½ÚÄ¿µÄ·ÛË¿£¬£¬£¬£¬£¬£¬£¬Í¨¹ýµÁ°æÍøÕ¾ÉϵĵÁ°æÓ°Ï·¡¢ÓÎÏ·ºÍµçÊÓ½ÚÄ¿ÖÖ×ÓÏÂÔØ¾ÙÐÐÈö²¥¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒÑÖªºóÃÅGoBot2µÄˢа汾£¬£¬£¬£¬£¬£¬£¬´úÂëºÜ¼òÆÓ£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼¹¦Ð§¶¼ÊÇʹÓÃGoLang¿âʵÏֵ쬣¬£¬£¬£¬£¬£¬²¢ÇÒÖ´ÐÐWindowsÏÂÁîºÍµÚÈý·½¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÈçBitTorrentºÍuTorrent¿Í»§¶Ë¡£¡£¡£Ñо¿Ö°Ô±Ôö²¹Ëµ¸Ã¶ñÒâÈí¼þ¶ÔÔ´´úÂëµÄÐÞ¸ÄÖ÷ÒªÊǺ«¹úÌØÓеÄÌÓ±ÜÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬°üÀ¨¼ì²âIPÐÅÏ¢ÒÔÈ·¶¨ÊÇ·ñÔÚº«¹úµÄһЩÇ徲ɳÏäÖÐÔËÐС¢É¨ÃèÀú³ÌÒÔ¼ì²â·À²¡¶¾²úÆ·µÈ¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/gobotkr-pirate-torrents-ddos-botnet/146285/
5¡¢¶ñÒâÈí¼þAnubis»Ø¹é£¬£¬£¬£¬£¬£¬£¬¼ì²âµ½Áè¼Ý1.7Íò¸öÑù±¾

Ç÷ÊÆ¿Æ¼¼¼ì²âµ½Android¶ñÒâÈí¼þAnubis»Ø¹é£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚÁ½¸öÏà¹ØµÄЧÀÍÆ÷Éϼì²âµ½17490¸öÑù±¾¡£¡£¡£ÔÚÕâЩÑù±¾ÖÐÕÒµ½ÁËÁ½¸ö±êÇ©£ºOperat?rG¨¹ncellemesiºÍGoogle Services£¬£¬£¬£¬£¬£¬£¬Ç°ÕßÔÚÍÁ¶úÆäÓïÖеÄÒâ˼ÊÇ¡°²Ù×÷Ö°Ô±¸üС±£¬£¬£¬£¬£¬£¬£¬ÕâЩ±êÇ©¿ÉÄÜÊÇÉç½»¹¤³ÌÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÓÕÆÓû§ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£Anubis×ܹ²Õë¶Ô188¸öÓëÒøÐкͽðÈÚÏà¹ØµÄÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬´ÓÖÐÇÔȡСÎÒ˽¼ÒºÍ²ÆÎñÊý¾Ý¡£¡£¡£ÕâЩ³ÌÐòÀ´×ÔÓÚ²¨À¼¡¢°Ä´óÀûÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢·¨¹ú¡¢Òâ´óÀû¡¢Î÷°àÑÀ¡¢ÃÀ¹úºÍÓ¡¶ÈµÈ¹ú¼Ò¡£¡£¡£AnubisµÄC£¦CЧÀÍÆ÷Ò²ÂþÑÜÔÚ²î±ðµÄ¹ú¼Ò¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/anubis-android-malware-returns-with-over-17000-samples/
6¡¢ÊÓÆµ¾Û»áÈí¼þZoom RCEÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÐ®ÖÆMacÉãÏñÍ·

Çå¾²Ñо¿Ö°Ô±Jonathan LeitschuhÅû¶ÊÓÆµ¾Û»áÈí¼þZoomÖеÄÒ»¸öRCEÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËMacƽ̨ÉϵÄZoom app°æ±¾4.4.4£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÓû§»á¼ûÍøÕ¾Ê±½ÓÊÜÍøÂçÉãÏñÍ·¡£¡£¡£Æ¾Ö¤LeitschuhµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬Áè¼Ý400ÍòÓû§ÃæÁÙΣº¦¡£¡£¡£¸ÃÎó²îʹÓÃÁËZoomÈí¼þµÄµã»÷¼ÓÈ빦Ч£¬£¬£¬£¬£¬£¬£¬¼´Ö»Ðèµã»÷Ô¼ÇëÁ´½Ó¼´¿É×Ô¶¯¼¤»îϵͳÉÏ×°ÖõÄÓ¦ÓóÌÐò²¢Í¨¹ýWebä¯ÀÀÆ÷¼ÓÈëÊÓÆµ¾Û»á¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý´¹ÂÚÓʼþ·Ö·¢ÕâÖÖ¶ñÒâÁ´½Ó¡£¡£¡£Leitschuh»¹ÌåÏÖZoomµÄÐÞ¸´Ö»ÊÇ×èÖ¹¹¥»÷Õß·¿ªÓû§µÄÉãÏñÍ·£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈÔ¿ÉÒÔͨ¹ý¶ñÒâÁ´½ÓÓÕʹÓû§¼ÓÈë¾Û»á¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88147/hacking/zoom-mac-software-flaw.html