MITRE CWE 4.0°æÐÂÔöÓ²¼þÇå¾²Îó²î£»£»£»£»£»£»Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ

Ðû²¼Ê±¼ä 2020-02-28

1.MITREÐû²¼Çå¾²Îó²îÁбíCWE 4.0°æ£¬£¬£¬£¬£¬ÐÂÔöÓ²¼þÇå¾²Îó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


MitreÐû²¼³£¼ûÇå¾²Îó²îÁбíCWE 4.0°æ£¬£¬£¬£¬£¬¸ÃÁбíÒÑÀ©Õ¹Îªº­¸ÇÓ²¼þÇå¾²Îó²î£¬£¬£¬£¬£¬ÆäÖаüÀ¨£ºÖÆÔìºÍÉúÃüÖÜÆÚÖÎÀíÎÊÌ⣻£»£»£»£»£»Çå¾²Á÷³ÌÎÊÌ⣻£»£»£»£»£»¼¯³ÉÎÊÌ⣻£»£»£»£»£»È¨ÏÞÊèÉ¢ºÍ»á¼û¿ØÖÆÎÊÌ⣻£»£»£»£»£»Ò»Ñùƽ³£µç·ºÍÂß¼­Éè¼ÆÎÊÌ⣻£»£»£»£»£»½¹µãºÍÅÌËãÎÊÌ⣻£»£»£»£»£»ÄÚ´æºÍ´æ´¢ÎÊÌ⣻£»£»£»£»£»ÍâΧװ±¸¡¢Æ¬ÉϽṹºÍ½Ó¿Ú/IOÎÊÌ⣻£»£»£»£»£»Çå¾²Ô­ÓïºÍ¼ÓÃÜÎÊÌ⣻£»£»£»£»£»µçÔ´¡¢Ê±ÖӺ͸´Î»ÎÊÌ⣻£»£»£»£»£»µ÷ÊԺͲâÊÔÎÊÌ⣻£»£»£»£»£»¿çÁìÓòÎÊÌâ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/02/27/hardware-security-weaknesses/


2.Magecart¹¥»÷ÕßʹÓÃαÔìµÄCDNÀ´Èƹý¼ì²â


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Magecart¹¥»÷ÕßʹÓÃαÔìµÄÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©ÓòÃûÀ´Èƹý¼ì²â¡£¡£¡£ ¡£¡£Malwarebytes LabsµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬¸ÃMagecart¶ñÒâ¾ç±¾Î±×°³ÉÕýµ±µÄjQuery¿â£¬£¬£¬£¬£¬²¢ÇÒͨ¹ýαÔìµÄCDNÓòÃûÊ¿´«£¬£¬£¬£¬£¬ÆäÇëÇóÀàËÆÓÚ//cdn-sources.org/jquery.unveil.js£¬£¬£¬£¬£¬ÁíÒ»¸öαÔìµÄCDNÓòÃûÇëÇóΪ//cdn-mediafiles.org/cache.php¡£¡£¡£ ¡£¡£¹¥»÷ÕßʹÓÃÃâ·ÑµÄngrokЧÀÍ£¨¿É½¨ÉèÇå¾²ËíµÀµÄ·´ÏòÊðÀíÈí¼þ£©À´ÍøÂç±»µÁµÄÊý¾Ý£¬£¬£¬£¬£¬Õâͨ³£°üÀ¨¹ºÎïÕßµÄÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/credit-card-skimmer-uses-fake-cdns-to-evade-detection/


3.Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ£¬£¬£¬£¬£¬ÒÉΪ¹ú¼ÒÖ§³Ö


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


SophosÑо¿Ö°Ô±·¢Ã÷Õë¶ÔÔÆÐ§ÀÍÆ÷µÄCloud Snooper¹¥»÷»î¶¯£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÈÆ¹ýÄ¿µÄ×éÖ¯µÄAWSºÍÆä·À»ðǽ£¬£¬£¬£¬£¬²¢ÊÍ·ÅÔ¶¿ØÄ¾Âí¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÔÚ¼ì²éÔËÐÐÔÚAWSÖеÄÊÜѬȾLinuxºÍWindows EC2ÔÆÐ§ÀÍÆ÷ʱ·¢Ã÷Á˴˹¥»÷¡£¡£¡£ ¡£¡£SophosÌåÏÖÕâÖÖ¹¥»÷ºÜ¿ÉÄÜÊǹú¼ÒÖ§³ÖµÄ¹¥»÷£¬£¬£¬£¬£¬ËüʹÓõÄRootkit²»µ«Ê¹¹¥»÷Õß¿ÉÒÔÔ¶³Ì¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬²¢ÇÒ»¹Îª¶ñÒâÈí¼þÌṩÁËÓëÆäC2ЧÀÍÆ÷¾ÙÐÐͨѶµÄÇþµÀ¡£¡£¡£ ¡£¡£Sophos¾Ü¾øÍ¸Â¶Êܺ¦×éÖ¯£¬£¬£¬£¬£¬µ«ÌåÏÖÕâ´Î¹¥»÷ËÆºõÊǹ©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬Æä·Ö·¢µÄRATÊÇ»ùÓÚGh0st RATµÄÔ´´úÂë¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171


4.RiskIQÐû²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ±¨¸æ¡·


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


RiskIQÐû²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ±¨¸æ¡·£¬£¬£¬£¬£¬¸Ã±¨¸æÖ¸³öÒÆ¶¯Éú̬ϵͳÕýÔÚ´ó·ùÔöÌí£¬£¬£¬£¬£¬µ«¹È¸èµÄÆð¾¢Ê¹µÃ¶ñÒâAPPµÄÊýÄ¿ÕýÔÚϽµ¡£¡£¡£ ¡£¡£2018Äê¸Ã±¨¸æÍ³¼ÆµÄºÚÃûµ¥Ó¦ÓÃÊýĿΪ213279¸ö£¬£¬£¬£¬£¬¶øÔÚ2019Äê¸ÃÊý×ÖΪ170796¸ö£¬£¬£¬£¬£¬Ï½µÁË20%¡£¡£¡£ ¡£¡£Òƶ¯APPÈÔÈ»ÊÇÆóÒµ¹¥»÷ÃæµÄÖ÷Òª×é³É²¿·Ö£¬£¬£¬£¬£¬ÓÈÆäÊǷǹٷ½ÈªÔ´µÄAPP£¬£¬£¬£¬£¬¸Ã±¨¸æ»¹Í³¼ÆÁË2019ÄêºÚÃûµ¥APP×î¶àµÄ6¸öÓ¦ÓÃÊÐËÁ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.riskiq.com/blog/external-threat-management/2019-mobile-app-threat-landscape-report/


5.ÐÂÒøÐÐľÂíCerberus¿ÉÇÔÈ¡Google AuthenticatorÑéÖ¤Âë


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


AndroidÒøÐÐľÂíCerberusµÄбäÌåÄܹ»ÇÔÈ¡Google AuthenticatorÌìÉúµÄÒ»´ÎÐÔÑéÖ¤Â루OTP£©£¬£¬£¬£¬£¬²¢Èƹý2FA±£»£»£»£»£»£»¤»á¼ûÓû§µÄÒøÐÐÕË»§¡£¡£¡£ ¡£¡£GoogleÓÚ2010ÄêÍÆ³öÁËAuthenticator£¬£¬£¬£¬£¬¸ÃÓ¦ÓÃÊÇΪÁËÌæ»»¶ÌÐÅÑéÖ¤Âë¡£¡£¡£ ¡£¡£ºÉÀ¼Òƶ¯Çå¾²¹«Ë¾ThreatFabricµÄÇå¾²Ñо¿Ö°Ô±ÔÚCerberusµÄ×îÐÂÑù±¾Öз¢Ã÷ÁËAuthenticator OTPÇÔÈ¡¹¦Ð§£¬£¬£¬£¬£¬¸ÃľÂíÀÄÓÃAccessibilityÌØÈ¨À´»ñµÃAuthenticator½çÃæµÄÄÚÈݲ¢½«Æä·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã±äÌåÈÔ´¦ÓÚ²âÊԽ׶Σ¬£¬£¬£¬£¬µ«¿ÉÄܺܿì¾Í»áÐû²¼¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/


6.Ó¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGR±»ÍϿ⣬£¬£¬£¬£¬ÒÑÔÚºÚ¿ÍÂÛ̳Èö²¥


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿ÍÕýÔÚµØÏÂÂÛ̳ÉϹ²ÏíÓ¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGRµÄSQLת´¢£¬£¬£¬£¬£¬¾Ý³Æ¸ÃÊý¾Ý¿âÊǴӿɹûÕæ»á¼ûµÄAWS S3´æ´¢Í°»ñÈ¡µÄ¡£¡£¡£ ¡£¡£Æ¾Ö¤Ðû²¼ÏÂÔØÁ´½ÓµÄºÚ¿ÍÂÛ̳³ÉÔ±µÄ˵·¨£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨ÖÁÉÙ3.6Íò·âµç×ÓÓʼþºÍÓйØÊÜÓ°ÏìÍøÕ¾£¨tradinggame.au.com¡¢bgr.inºÍS3 Production£©µÄµÇ¼ÐÅÏ¢£¬£¬£¬£¬£¬×ܹ²ÔÚ7¸öZIPÎļþÖд浵ÁË16¸öSQLת´¢¡£¡£¡£ ¡£¡£Î´¾­Ñ¹ËõµÄÊý¾Ý¿â×ܾÞϸΪ21.5GB¡£¡£¡£ ¡£¡£Under BreachÑо¿Ö°Ô±Ö¸³öÕâÊÇÒ»¸öÍêÕûµÄSQLת´¢£¬£¬£¬£¬£¬ÆäÖаüÀ¨Óû§Ãû¡¢µç×ÓÓʼþºÍ¹þÏ£ÃÜÂëµÈÐÅÏ¢¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sql-dump-from-bgr-india-shared-on-hacker-forum/