IE RCE 0day¼°Defender DoSÎó²î£»£»£»£»2019ÄêÍøÂç¹¥»÷ÈËΪÒòËØ±¨¸æ£»£»£»£»D-Link DNS-320 RCEÎó²î
Ðû²¼Ê±¼ä 2019-09-24
΢ÈíÐû²¼½ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´IEÖеÄRCE 0day¼°Windows DefenderÖеÄDoSÎó²î¡£¡£¡£¡£¡£¡£¡£ÆäÖÐIE 0dayΪ¹È¸èÑо¿Ö°Ô±Cl¨¦mentLecigne·¢Ã÷µÄ¾ç±¾ÒýÇæÄÚ´æËð»µÎó²î£¨CVE-2019-1367£©£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÄ¿½ñÓû§µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î¿ÉÒÔͨ¹ý½«Ä¿µÄÓû§Öض¨ÏòÖÁ¶ñÒâÍøÕ¾À´Ê¹Ó㬣¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨IE9¡¢10ºÍ11¡£¡£¡£¡£¡£¡£¡£ÁíÒ»¸öÎó²îÊÇWindows DefenderÖеľܾøÐ§ÀÍÎó²î£¨CVE-2019-1255£©£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓëDefender´¦Öóͷ£ÎļþµÄ·½·¨Óйأ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²î×èÖ¹Õýµ±ÕË»§Ö´ÐÐÕýµ±µÄϵͳÎļþ¡£¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄDefender°æ±¾Îª1.1.16300.1£¬£¬£¬£¬£¬£¬£¬²¢ÒÑÔÚ1.1.16400.2ÖÐÐÞ¸´¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-releases-out-of-band-security-update-to-fix-ie-zero-day-defender-bug/2.Ñо¿Ö°Ô±Åû¶D-Link DNS-320×°±¸ÖеÄRCEÎó²î
ÔÎÄÁ´½Ó£º
https://blog.cystack.net/d-link-dns-320-rce/3.ProofpointÐû²¼¡¶2019ÄêÍøÂç¹¥»÷ÖеÄÈËΪÒòËØ¡·ÆÊÎö±¨¸æ

ƾ֤ProofpointµÄ¡¶2019ÄêÍøÂç¹¥»÷ÖеÄÈËΪÒòËØ¡·ÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÔÚÒÑÍù¼¸ÄêÖй¥»÷Õß½«´¹ÂÚ¹¥»÷ÌáÉýµ½ÁËÒ»¸öȫеÄˮƽ£¬£¬£¬£¬£¬£¬£¬ËûÃÇÆð¾¢Ê¹ÓÃÏûºÄÕßµÄÇéÐ÷£¬£¬£¬£¬£¬£¬£¬ÔÚÈËÃDz»ÖªÇéµÄÇéÐÎÏÂÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Êг¡ÓªÏúÐÐÒµÊÇ2018ÄêÖÁ2019ÄêµÄÖ÷Òª¹¥»÷Ä¿µÄÖ®Ò»¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹«Ë¾ÓµÓÐÓë¿Í»§ÓйصĴó×ÚÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢ËùÔÚµØÒÔ¼°ÊÂÇéϰ¹ßµÈ£¬£¬£¬£¬£¬£¬£¬ÕâʹµÃËüÃdzÉΪ·¸·¨·Ö×ÓÓмÛÖµµÄÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£³ýÁ˸߹ÜÖ®Í⣬£¬£¬£¬£¬£¬£¬Éç½»¹¤³Ì¹¥»÷µÄÄ¿µÄ»¹°üÀ¨ÆóÒµÖеÄÊÖÒÕÖ§³ÖÍŶӡ¢HRÒÔ¼°²ÆÎñ»á¼ÆµÈ¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ»¹Ç¿µ÷³Æ£¬£¬£¬£¬£¬£¬£¬·¸·¨·Ö×ÓҲͨ¹ýÔÚÉ罻ýÌåÉϽ¨Éè×Ô¼ºµÄÆ·ÅÆ¡¢ÐÎÏóµÈÓÕÆ¸ü¶àµÄÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.proofpoint.com/us/resources/threat-reports/human-factor4.ÐÂMac¶ñÒâÈí¼þGMERA.Aαװ³ÉÉúÒâÈí¼þÇÔÈ¡Óû§ÐÅÏ¢
Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷Ò»¸öαװ³ÉMacƽ̨Õýµ±ÉúÒâÈí¼þStockfolioµÄ¶ñÒâÈí¼þ¼Ò×åGMERA£¬£¬£¬£¬£¬£¬£¬¸Ã¼Ò×å°üÀ¨Á½¸ö±äÌ壬£¬£¬£¬£¬£¬£¬»®·ÖΪTrojan.MacOS.GMERA.AºÍTrojan.MacOS.GMERA.B£¬£¬£¬£¬£¬£¬£¬µÚÒ»¸ö±äÌåÊÇÒ»¸öZIP´æµµÎļþ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ò»¸öÀ¦°ó°üStockfoli.appºÍÒ»¸öÒþ²ØµÄ¼ÓÃÜÎļþ.app¡£¡£¡£¡£¡£¡£¡£¸ÃStockfoli.app¾ÓɶñÒâÈí¼þ¿ª·¢ÕßµÄÊý×ÖÖ¤ÊéÊðÃû£¬£¬£¬£¬£¬£¬£¬AppleÌåÏÖ´ËÖ¤ÊéÒÑÓÚ2019Äê7Ô±»µõÏú¡£¡£¡£¡£¡£¡£¡£µÚ¶þ¸ö±äÌå»áÔÚ¶Ë¿Ú25733-25736ÉϽ¨ÉèÅþÁ¬ÖÁC£¦CЧÀÍÆ÷µÄ·´Ïòshell£¬£¬£¬£¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÔÚÄ¿µÄ»úеÉÏÖ´ÐÐshellÏÂÁî¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/mac-malware-that-spoofs-trading-app-steals-user-information-uploads-it-to-website/
5.ÃÀTCADÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µç»°ºÍµç×ÓÓʼþµÈЧÀÍÖÐÖ¹
ÔÎÄÁ´½Ó£º
https://www.traviscad.org/wp-content/uploads/2019/09/Cyber-Attack-FAQs.pdf
6.PhishLabs·¢Ã÷αװ³É·çͶºÍ˽ļµÄд¹ÂÚ¹¥»÷
ÔÎÄÁ´½Ó£º
https://info.phishlabs.com/blog/spear-phishing-campaign-impersonates-vcs-and-pe-firms