IE RCE 0day¼°Defender DoSÎó²î£»£»£»£»2019ÄêÍøÂç¹¥»÷ÈËΪÒòËØ±¨¸æ£»£»£»£»D-Link DNS-320 RCEÎó²î

Ðû²¼Ê±¼ä 2019-09-24
1.΢Èí½ôÆÈÐÞ¸´IEÖеÄRCE 0day¼°DefenderÖеÄDoSÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

΢ÈíÐû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´IEÖеÄRCE 0day¼°Windows DefenderÖеÄDoSÎó²î ¡£¡£¡£¡£¡£¡£¡£ÆäÖÐIE 0dayΪ¹È¸èÑо¿Ö°Ô±Cl¨¦mentLecigne·¢Ã÷µÄ¾ç±¾ÒýÇæÄÚ´æËð»µÎó²î£¨CVE-2019-1367£©£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÄ¿½ñÓû§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿ÉÒÔͨ¹ý½«Ä¿µÄÓû§Öض¨ÏòÖÁ¶ñÒâÍøÕ¾À´Ê¹Ó㬣¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨IE9¡¢10ºÍ11 ¡£¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²îÊÇWindows DefenderÖеľܾøÐ§ÀÍÎó²î£¨CVE-2019-1255£©£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓëDefender´¦Öóͷ£ÎļþµÄ·½·¨ÓйØ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²î×èÖ¹Õýµ±ÕË»§Ö´ÐÐÕýµ±µÄϵͳÎļþ ¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄDefender°æ±¾Îª1.1.16300.1£¬£¬£¬£¬£¬£¬£¬²¢ÒÑÔÚ1.1.16400.2ÖÐÐÞ¸´ ¡£¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-releases-out-of-band-security-update-to-fix-ie-zero-day-defender-bug/

2.Ñо¿Ö°Ô±Åû¶D-Link DNS-320×°±¸ÖеÄRCEÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


CyStack SecurityÑо¿Ö°Ô±·¢Ã÷D-Link DNS-320 ShareCenter×°±¸±£´æÒ»¸öÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔ¶³Ì¿ØÖÆ×°±¸²¢»á¼û×°±¸ÉÏ´æ´¢µÄÎļþ ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-16057£©µÄCVSSÆÀ·ÖΪ10·Ö£¬£¬£¬£¬£¬£¬£¬ËüÓ°ÏìÁ˹̼þ°æ±¾Îª2.05b10¼°¸üµÍµÄDNS-320×°±¸ ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓëDNS-320ÖÎÀí½çÃæµÄµÇ¼Ä£¿£¿£¿£¿£¿£¿éÓйØ£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÄ£¿£¿£¿£¿£¿£¿é/cgi/login_mgr.cgi°üÀ¨Ò»¸ö¿ÉÄܱ»Ê¹ÓõIJÎÊýport£¬£¬£¬£¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚrootȨÏÞÏÂÖ´ÐÐí§ÒâÏÂÁ£¬£¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂ×°±¸±»½ÓÊÜ ¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.cystack.net/d-link-dns-320-rce/

3.ProofpointÐû²¼¡¶2019ÄêÍøÂç¹¥»÷ÖеÄÈËΪÒòËØ¡·ÆÊÎö±¨¸æ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ƾ֤ProofpointµÄ¡¶2019ÄêÍøÂç¹¥»÷ÖеÄÈËΪÒòËØ¡·ÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÔÚÒÑÍù¼¸ÄêÖй¥»÷Õß½«´¹ÂÚ¹¥»÷ÌáÉýµ½ÁËÒ»¸öȫеÄˮƽ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÆð¾¢Ê¹ÓÃÏûºÄÕßµÄÇéÐ÷£¬£¬£¬£¬£¬£¬£¬ÔÚÈËÃDz»ÖªÇéµÄÇéÐÎÏÂÇÔÈ¡Ãô¸ÐÐÅÏ¢ ¡£¡£¡£¡£¡£¡£¡£Êг¡ÓªÏúÐÐÒµÊÇ2018ÄêÖÁ2019ÄêµÄÖ÷Òª¹¥»÷Ä¿µÄÖ®Ò» ¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹«Ë¾ÓµÓÐÓë¿Í»§ÓйصĴó×ÚÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢ËùÔÚµØÒÔ¼°ÊÂÇéϰ¹ßµÈ£¬£¬£¬£¬£¬£¬£¬ÕâʹµÃËüÃdzÉΪ·¸·¨·Ö×ÓÓмÛÖµµÄÄ¿µÄ ¡£¡£¡£¡£¡£¡£¡£³ýÁ˸߹ÜÖ®Í⣬£¬£¬£¬£¬£¬£¬Éç½»¹¤³Ì¹¥»÷µÄÄ¿µÄ»¹°üÀ¨ÆóÒµÖеÄÊÖÒÕÖ§³ÖÍŶӡ¢HRÒÔ¼°²ÆÎñ»á¼ÆµÈ ¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ»¹Ç¿µ÷³Æ£¬£¬£¬£¬£¬£¬£¬·¸·¨·Ö×ÓҲͨ¹ýÔÚÉ罻ýÌåÉϽ¨Éè×Ô¼ºµÄÆ·ÅÆ¡¢ÐÎÏóµÈÓÕÆ­¸ü¶àµÄÊܺ¦Õß ¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.proofpoint.com/us/resources/threat-reports/human-factor

4.ÐÂMac¶ñÒâÈí¼þGMERA.Aαװ³ÉÉúÒâÈí¼þÇÔÈ¡Óû§ÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷Ò»¸öαװ³ÉMacƽ̨Õýµ±ÉúÒâÈí¼þStockfolioµÄ¶ñÒâÈí¼þ¼Ò×åGMERA£¬£¬£¬£¬£¬£¬£¬¸Ã¼Ò×å°üÀ¨Á½¸ö±äÌ壬£¬£¬£¬£¬£¬£¬»®·ÖΪTrojan.MacOS.GMERA.AºÍTrojan.MacOS.GMERA.B£¬£¬£¬£¬£¬£¬£¬µÚÒ»¸ö±äÌåÊÇÒ»¸öZIP´æµµÎļþ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸öÀ¦°ó°üStockfoli.appºÍÒ»¸öÒþ²ØµÄ¼ÓÃÜÎļþ.app ¡£¡£¡£¡£¡£¡£¡£¸ÃStockfoli.app¾­ÓɶñÒâÈí¼þ¿ª·¢ÕßµÄÊý×ÖÖ¤ÊéÊðÃû£¬£¬£¬£¬£¬£¬£¬AppleÌåÏÖ´ËÖ¤ÊéÒÑÓÚ2019Äê7Ô±»µõÏú ¡£¡£¡£¡£¡£¡£¡£µÚ¶þ¸ö±äÌå»áÔÚ¶Ë¿Ú25733-25736ÉϽ¨ÉèÅþÁ¬ÖÁC£¦CЧÀÍÆ÷µÄ·´Ïòshell£¬£¬£¬£¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÔÚÄ¿µÄ»úеÉÏÖ´ÐÐshellÏÂÁî ¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/mac-malware-that-spoofs-trading-app-steals-user-information-uploads-it-to-website/

5.ÃÀTCADÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µç»°ºÍµç×ÓÓʼþµÈЧÀÍÖÐÖ¹

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹úÌØÀ­Î¬Ë¹ÏØÖÐÑëÆÀ¹ÀÇø£¨TCAD£©ÓÚ9ÔÂ19ÈÕÈ·ÈϳÆÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼Ö¶àÏîЧÀÍÖÐÖ¹ ¡£¡£¡£¡£¡£¡£¡£TCADÈÏÕæ¶Ô¸ÃÏØµÄ·¿µØ²ú¾ÙÐÐÆÀ¹À£¬£¬£¬£¬£¬£¬£¬¸Ã»ú¹¹È·ÈϹ¥»÷ÊÂÎñ±¬·¢ÔÚ9ÔÂ11ÈÕÍíÉÏ9:30£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷Ó°ÏìÁËÍøÕ¾µÄ·¿²úËÑË÷¹¦Ð§ÒÔ¼°µç×ÓÓʼþ¡¢µç»°ºÍÅÌËã»ú¸¨ÖúÆÀ¹Àϵͳ£¬£¬£¬£¬£¬£¬£¬µ«¿Í»§Ð§ÀÍºÍÆÀ¹ÀÉê±çµÈÒ»Ñùƽ³£²Ù×÷²»ÊÜÓ°Ïì ¡£¡£¡£¡£¡£¡£¡£Ð§ÀÍÆ÷ÉϵÄÐí¶àÎļþ±»ÀÕË÷²¡¶¾¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬µ¼Ö¸ûú¹¹µÄ²¿·ÖЧÀÍÖÐÖ¹ ¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹¾Ü¾øÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬²¢ÕýÔÚÓëר¼ÒÏàÖúÒÔ´Ó±¸·ÝÊý¾ÝÖлָ´ÔËÓª ¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.traviscad.org/wp-content/uploads/2019/09/Cyber-Attack-FAQs.pdf

6.PhishLabs·¢Ã÷αװ³É·çͶºÍ˽ļµÄд¹ÂÚ¹¥»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


PhishLabsÑо¿Ö°Ô±·¢Ã÷·¸·¨·Ö×ÓÕýÔÚð³ä˽ļ¹«Ë¾Crossplane CapitalºÍEdgemont PartnersµÄÔ±¹¤À´ÓÕÆ­Êܺ¦Õß ¡£¡£¡£¡£¡£¡£¡£ÎªÁËÓªÔìÕæÊµÐԺͽôÆÈ¸Ð£¬£¬£¬£¬£¬£¬£¬·¸·¨·Ö×ÓʹÓÃÁËÕæÊµÔ±¹¤¡¢PE»òVCµÄÃû×Ö£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ°üÀ¨Ò»¸öÒÑÊðÃûµÄ±£ÃÜЭÒ飨NDA£© ¡£¡£¡£¡£¡£¡£¡£¸ÃNDAλÓÚÒ»¸öͼƬÁ´½Óºó£¬£¬£¬£¬£¬£¬£¬ÆäURLʹÓÃÁË×î½ü×¢²áµÄÄ£ÄâÁËÕæÊµË½Ä¼¹«Ë¾µÄαÔìÓòÃû£¬£¬£¬£¬£¬£¬£¬²¢×îÖÕ½«Êܺ¦ÕßÖØ¶¨ÏòÖÁhxxps://serversecuredhttp[.]com ¡£¡£¡£¡£¡£¡£¡£¸ÃÍøÕ¾ÒªÇóÊܺ¦ÕߵǼÆäOffice 365ÕÊ»§ÒÔÏÂÔØÎĵµ£¬£¬£¬£¬£¬£¬£¬ÕâÒ²ÕýÊÇ·¸·¨·Ö×ӵĴ¹ÂÚÄ¿µÄ ¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://info.phishlabs.com/blog/spear-phishing-campaign-impersonates-vcs-and-pe-firms