MITRE CWE 4.0°æÐÂÔöÓ²¼þÇå¾²Îó²î £»£»£»£»£»Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ

Ðû²¼Ê±¼ä 2020-02-28

1.MITREÐû²¼Çå¾²Îó²îÁбíCWE 4.0°æ£¬£¬£¬£¬£¬£¬ÐÂÔöÓ²¼þÇå¾²Îó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


MitreÐû²¼³£¼ûÇå¾²Îó²îÁбíCWE 4.0°æ£¬£¬£¬£¬£¬£¬¸ÃÁбíÒÑÀ©Õ¹Îªº­¸ÇÓ²¼þÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨£ºÖÆÔìºÍÉúÃüÖÜÆÚÖÎÀíÎÊÌâ £»£»£»£»£»Çå¾²Á÷³ÌÎÊÌâ £»£»£»£»£»¼¯³ÉÎÊÌâ £»£»£»£»£»È¨ÏÞÊèÉ¢ºÍ»á¼û¿ØÖÆÎÊÌâ £»£»£»£»£»Ò»Ñùƽ³£µç·ºÍÂß¼­Éè¼ÆÎÊÌâ £»£»£»£»£»½¹µãºÍÅÌËãÎÊÌâ £»£»£»£»£»ÄÚ´æºÍ´æ´¢ÎÊÌâ £»£»£»£»£»ÍâΧװ±¸¡¢Æ¬ÉϽṹºÍ½Ó¿Ú/IOÎÊÌâ £»£»£»£»£»Çå¾²Ô­ÓïºÍ¼ÓÃÜÎÊÌâ £»£»£»£»£»µçÔ´¡¢Ê±ÖӺ͸´Î»ÎÊÌâ £»£»£»£»£»µ÷ÊԺͲâÊÔÎÊÌâ £»£»£»£»£»¿çÁìÓòÎÊÌâ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/02/27/hardware-security-weaknesses/


2.Magecart¹¥»÷ÕßʹÓÃαÔìµÄCDNÀ´Èƹý¼ì²â


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Magecart¹¥»÷ÕßʹÓÃαÔìµÄÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©ÓòÃûÀ´Èƹý¼ì²â¡£¡£¡£¡£Malwarebytes LabsµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬¸ÃMagecart¶ñÒâ¾ç±¾Î±×°³ÉÕýµ±µÄjQuery¿â£¬£¬£¬£¬£¬£¬²¢ÇÒͨ¹ýαÔìµÄCDNÓòÃûÊ¿´«£¬£¬£¬£¬£¬£¬ÆäÇëÇóÀàËÆÓÚ//cdn-sources.org/jquery.unveil.js£¬£¬£¬£¬£¬£¬ÁíÒ»¸öαÔìµÄCDNÓòÃûÇëÇóΪ//cdn-mediafiles.org/cache.php¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÃâ·ÑµÄngrokЧÀÍ£¨¿É½¨ÉèÇå¾²ËíµÀµÄ·´ÏòÊðÀíÈí¼þ£©À´ÍøÂç±»µÁµÄÊý¾Ý£¬£¬£¬£¬£¬£¬Õâͨ³£°üÀ¨¹ºÎïÕßµÄÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/credit-card-skimmer-uses-fake-cdns-to-evade-detection/


3.Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ£¬£¬£¬£¬£¬£¬ÒÉΪ¹ú¼ÒÖ§³Ö


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


SophosÑо¿Ö°Ô±·¢Ã÷Õë¶ÔÔÆÐ§ÀÍÆ÷µÄCloud Snooper¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÈÆ¹ýÄ¿µÄ×éÖ¯µÄAWSºÍÆä·À»ðǽ£¬£¬£¬£¬£¬£¬²¢ÊÍ·ÅÔ¶¿ØÄ¾Âí¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ¼ì²éÔËÐÐÔÚAWSÖеÄÊÜѬȾLinuxºÍWindows EC2ÔÆÐ§ÀÍÆ÷ʱ·¢Ã÷Á˴˹¥»÷¡£¡£¡£¡£SophosÌåÏÖÕâÖÖ¹¥»÷ºÜ¿ÉÄÜÊǹú¼ÒÖ§³ÖµÄ¹¥»÷£¬£¬£¬£¬£¬£¬ËüʹÓõÄRootkit²»µ«Ê¹¹¥»÷Õß¿ÉÒÔÔ¶³Ì¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬£¬²¢ÇÒ»¹Îª¶ñÒâÈí¼þÌṩÁËÓëÆäC2ЧÀÍÆ÷¾ÙÐÐͨѶµÄÇþµÀ¡£¡£¡£¡£Sophos¾Ü¾øÍ¸Â¶Êܺ¦×éÖ¯£¬£¬£¬£¬£¬£¬µ«ÌåÏÖÕâ´Î¹¥»÷ËÆºõÊǹ©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬Æä·Ö·¢µÄRATÊÇ»ùÓÚGh0st RATµÄÔ´´úÂë¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171


4.RiskIQÐû²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ±¨¸æ¡·


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


RiskIQÐû²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ±¨¸æ¡·£¬£¬£¬£¬£¬£¬¸Ã±¨¸æÖ¸³öÒÆ¶¯Éú̬ϵͳÕýÔÚ´ó·ùÔöÌí£¬£¬£¬£¬£¬£¬µ«¹È¸èµÄÆð¾¢Ê¹µÃ¶ñÒâAPPµÄÊýÄ¿ÕýÔÚϽµ¡£¡£¡£¡£2018Äê¸Ã±¨¸æÍ³¼ÆµÄºÚÃûµ¥Ó¦ÓÃÊýĿΪ213279¸ö£¬£¬£¬£¬£¬£¬¶øÔÚ2019Äê¸ÃÊý×ÖΪ170796¸ö£¬£¬£¬£¬£¬£¬Ï½µÁË20%¡£¡£¡£¡£Òƶ¯APPÈÔÈ»ÊÇÆóÒµ¹¥»÷ÃæµÄÖ÷Òª×é³É²¿·Ö£¬£¬£¬£¬£¬£¬ÓÈÆäÊǷǹٷ½ÈªÔ´µÄAPP£¬£¬£¬£¬£¬£¬¸Ã±¨¸æ»¹Í³¼ÆÁË2019ÄêºÚÃûµ¥APP×î¶àµÄ6¸öÓ¦ÓÃÊÐËÁ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.riskiq.com/blog/external-threat-management/2019-mobile-app-threat-landscape-report/


5.ÐÂÒøÐÐľÂíCerberus¿ÉÇÔÈ¡Google AuthenticatorÑéÖ¤Âë


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


AndroidÒøÐÐľÂíCerberusµÄбäÌåÄܹ»ÇÔÈ¡Google AuthenticatorÌìÉúµÄÒ»´ÎÐÔÑéÖ¤Â루OTP£©£¬£¬£¬£¬£¬£¬²¢Èƹý2FA± £»£»£»£»£»¤»á¼ûÓû§µÄÒøÐÐÕË»§¡£¡£¡£¡£GoogleÓÚ2010ÄêÍÆ³öÁËAuthenticator£¬£¬£¬£¬£¬£¬¸ÃÓ¦ÓÃÊÇΪÁËÌæ»»¶ÌÐÅÑéÖ¤Âë¡£¡£¡£¡£ºÉÀ¼Òƶ¯Çå¾²¹«Ë¾ThreatFabricµÄÇå¾²Ñо¿Ö°Ô±ÔÚCerberusµÄ×îÐÂÑù±¾Öз¢Ã÷ÁËAuthenticator OTPÇÔÈ¡¹¦Ð§£¬£¬£¬£¬£¬£¬¸ÃľÂíÀÄÓÃAccessibilityÌØÈ¨À´»ñµÃAuthenticator½çÃæµÄÄÚÈݲ¢½«Æä·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã±äÌåÈÔ´¦ÓÚ²âÊԽ׶Σ¬£¬£¬£¬£¬£¬µ«¿ÉÄܺܿì¾Í»áÐû²¼¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/


6.Ó¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGR±»ÍϿ⣬£¬£¬£¬£¬£¬ÒÑÔÚºÚ¿ÍÂÛ̳Èö²¥


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿ÍÕýÔÚµØÏÂÂÛ̳ÉϹ²ÏíÓ¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGRµÄSQLת´¢£¬£¬£¬£¬£¬£¬¾Ý³Æ¸ÃÊý¾Ý¿âÊǴӿɹûÕæ»á¼ûµÄAWS S3´æ´¢Í°»ñÈ¡µÄ¡£¡£¡£¡£Æ¾Ö¤Ðû²¼ÏÂÔØÁ´½ÓµÄºÚ¿ÍÂÛ̳³ÉÔ±µÄ˵·¨£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨ÖÁÉÙ3.6Íò·âµç×ÓÓʼþºÍÓйØÊÜÓ°ÏìÍøÕ¾£¨tradinggame.au.com¡¢bgr.inºÍS3 Production£©µÄµÇ¼ÐÅÏ¢£¬£¬£¬£¬£¬£¬×ܹ²ÔÚ7¸öZIPÎļþÖд浵ÁË16¸öSQLת´¢¡£¡£¡£¡£Î´¾­Ñ¹ËõµÄÊý¾Ý¿â×ܾÞϸΪ21.5GB¡£¡£¡£¡£Under BreachÑо¿Ö°Ô±Ö¸³öÕâÊÇÒ»¸öÍêÕûµÄSQLת´¢£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Óû§Ãû¡¢µç×ÓÓʼþºÍ¹þÏ£ÃÜÂëµÈÐÅÏ¢¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sql-dump-from-bgr-india-shared-on-hacker-forum/