¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180807
Ðû²¼Ê±¼ä 2018-08-07¡¾ÆÊÎö±¨¸æ¡¿ICS-CERTÐû²¼ÁªÍøµçÁ¦ÏµÍ³ÍøÂçÇå¾²Ì¬ÊÆÆÊÎö±¨¸æ
CNCERTÏÂÊôµÄ¹¤Òµ»¥ÁªÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄ£¨ICS-CERT£©Õë¶ÔÎÒ¹úÁªÍøµçÁ¦ÏµÍ³µÄÍøÂçÇå¾²Ì¬ÊÆ¾ÙÐÐÆÊÎö£¬£¬£¬£¬£¬£¬£¬£¬2018Äê1-2¼¾¶Èʱ´ú¼à²â·¢Ã÷̻¶ÔÚ¹«¹²»¥ÁªÍøµÄµçÁ¦ÐÐÒµÍøÂç×ʲú1147¸ö£¬£¬£¬£¬£¬£¬£¬£¬²¿·Ö×°±¸±£´æÑÏÖØµÄÇå¾²Îó²î¡£¡£¡£¡£¡£Í¨¹ýÒýÈëÁªÍøµçÁ¦ÏµÍ³ÍøÂçÇå¾²ÍþвָÊý£¬£¬£¬£¬£¬£¬£¬£¬´Ó×°±¸×ʲúºÍWEB×ʲúÁ½¸ö½Ç¶È£¬£¬£¬£¬£¬£¬£¬£¬Á¬ÏµÎó²îÍþвƷ¼¶¡¢Ì½²â´ÎÊýºÍ¹¥»÷´ÎÊý£¬£¬£¬£¬£¬£¬£¬£¬¶ÔÎÒ¹ú²î±ðµØÇøµÄÁªÍøµçÁ¦ÏµÍ³Çå¾²ÍþвָÊý¾ÙÐÐÁË×ÛºÏÆÊÎö£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷´ó¶¼Ê¡·ÝÇéÐÎÓÅÒ죬£¬£¬£¬£¬£¬£¬£¬¶ø¹ã¶«¡¢±±¾©µÈÊ¡ÊÐÇå¾²ÐÎʽÏà¶ÔÑÏËà¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.ics-cert.org.cn/portal/page/121/95290efb86b44d7d8cd7ee222f3e9e24.html
¡¾ÆÊÎö±¨¸æ¡¿Ñо¿»ú¹¹Ðû²¼2018ÄêQ2ÍøÂçÍþвÇ÷ÊÆµÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚ2018ÄêQ2ÍøÂçÍþвÇ÷ÊÆµÄͳ¼Æ±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬±¨¸æº¸ÇÁ˵ڶþ¼¾¶ÈµÄÓÐÕë¶ÔÐԵĹ¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬ÈçOperation Parliament¡¢APT×éÖ¯Energetic Bear¡¢Òƶ¯ÍþвZooPark¡¢Õë¶Ô·ÓÉÆ÷µÄ½©Ê¬ÍøÂçVPNFilter¡¢Õë¶ÔÖÐÑÇÊý¾ÝÖÐÐĵÄLuckyMouseÒÔ¼°Õë¶ÔÅ·ÖÞ½ðÈÚ»ú¹¹ºÍÉúÎï×éÖ¯µÄOlympic Destroyer¡£¡£¡£¡£¡£±¨¸æ»¹º¸ÇÁ˲¿·Ö¶ñÒâÈí¼þ¼°ÆäÐÂÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬ÈçSynAckºÍRoaming MantisµÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/it-threat-evolution-q2-2018/87172/
¡¾ÍþвÇ鱨¡¿FBIÐû²¼Ç徲ͨ¸æ¾¯Ê¾ÎïÁªÍø×°±¸ÖеÄÇ徲Σº¦
ÃÀ¹úFBIÖÒÑÔ³ÆÓû§µÄÎïÁªÍø×°±¸¿ÉÄÜÒѱ»½ÓÊÜ£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩIoT½©Ê¬ÍøÂç±»ÓÃÓÚÌᳫDDoS¹¥»÷µÈ¡£¡£¡£¡£¡£´Ó·ÓÉÆ÷ºÍNAS×°±¸µ½DVR¡¢Ê÷Ý®ÅÉÉõÖÁÊÇÖÇÄܳµ¿â£¬£¬£¬£¬£¬£¬£¬£¬Ò»ÇÐIoT×°±¸¶¼¿ÉÄÜÃæÁÙΣº¦¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿£¿ÉÒɵļ£Ïó°üÀ¨»¥ÁªÍøÔÂʹÓÃÁ¿µÄ´ó·ùÔöÌí¡¢¸ß¶îµÄISPÕ˵¥¡¢×°±¸ÔËÐлºÂý»òÎÞ·¨ÔËÐС¢DNSÅÌÎʺÍÁ÷Á¿Òì³£ÒÔ¼°ÍøÂçÅþÁ¬ËÙÂÊÂýµÈ¡£¡£¡£¡£¡£¹¥»÷Õßͨ³£»£»£»áÕë¶Ô¾ßÓÐÈõ¿ÚÁδÐÞ¸´µÄ¹Ì¼þ»òÈí¼þÎó²îÒÔ¼°Ê¹ÓÃĬÈÏÓû§ÃûºÍÃÜÂëµÄ×°±¸¾ÙÐб©Á¦¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/fbi-in-smart-device-security/
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶӷ¢Ã÷ѬȾÁè¼Ý10Íǫ̀ÅÌËã»úµÄ½©Ê¬ÍøÂçBlack
Check PointÑо¿ÍŶӷ¢Ã÷ÒøÐжñÒâÈí¼þRamnitµÄеĴó¹æÄ£¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ2018Äê5ÔÂÖÁ7ÔÂʱ´úÒÔ185.44.75.109ΪC&CЧÀÍÆ÷µÄ½©Ê¬ÍøÂçBlackѬȾÁËÁè¼Ý10Íǫ̀ÅÌËã»ú¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçµÄÌØµã°üÀ¨£º´ó×ÚÑù±¾Ê¹ÓÃÓ²±àÂëµÄÓòÃû¶ø²»ÊÇDGA£»£»£»C£¦CЧÀÍÆ÷²¢²»Ìá¹©ÌØÁíÍâÄ£¿£¿£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬£¬ÈçVNC¡¢ÃÜÂëÇÔÈ¡³ÌÐò»òFtpGrabberµÈ£»£»£»ÌØÁíÍâÄ£¿£¿£¿£¿£¿£¿£¿£¿é£¨FTPServer¡¢WebInjects£©ÓëRamnit¼¯³ÉÔÚÒ»¸ö°üÖУ»£»£»Ramnit×÷ΪÁíÒ»¸ö¶ñÒâÈí¼þNgiowebµÄ¼ÓÔØ³ÌÐò¡£¡£¡£¡£¡£×èÖ¹2018Äê7Ô³õ£¬£¬£¬£¬£¬£¬£¬£¬Ñ¬È¾ÁËNgiowebµÄÅÌËã»úÊýÄ¿Áè¼ÝÁË13.9Íǫ̀¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://research.checkpoint.com/ramnits-network-proxy-servers/
¡¾Îó²î²¹¶¡¡¿HPÐû²¼InkJet´òÓ¡»úµÄ¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Á½¸ö¿Éµ¼ÖÂRCEµÄÇå¾²Îó²î
»ÝÆÕÐû²¼InkJet´òÓ¡»úµÄ¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÁ½¸öÇå¾²Îó²î£¨CVE-2018-5924ºÍCVE-2018-5925£©¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î¿Éͨ¹ý·¢ËÍÖÁÄ¿µÄ×°±¸µÄ¶ñÒâÎļþ´¥·¢£¬£¬£¬£¬£¬£¬£¬£¬µ¼Ö¿ÍÕ»»ò¾²Ì¬»º³åÇøÒç³ö£¬£¬£¬£¬£¬£¬£¬£¬×îÖÕÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ×°±¸°üÀ¨Pagewide Pro¡¢DesignJet¡¢OfficeJet¡¢DeskJetºÍEnvyϵÁеȡ£¡£¡£¡£¡£½¨ÒéÓû§¾¡¿ì×°ÖÃÕâЩ¹Ì¼þ¸üС£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.helpnetsecurity.com/2018/08/06/hp-inkjet-printer-vulnerabilities/
¡¾¶ñÒâÈí¼þ¡¿Çå¾²Ñо¿Ö°Ô±·¢Ã÷жñÒâÍÚ¿óÈí¼þZombieBoy
Çå¾²Ñо¿Ö°Ô±James Quinn·¢Ã÷еÄÍÚ¿óÈ䳿ZombieBoy£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÍÚ¿óÈí¼þ¿ÉΪÆä×÷Õß´øÀ´Ã¿Ô¼ÛÖµÔ¼1000ÃÀÔªµÄÃÅÂÞ±Ò¡£¡£¡£¡£¡£ZombieBoyʹÓõÄÎó²î°üÀ¨RDPÎó²îCVE-2017-9073¡¢SMBÎó²îCVE-2017-0143ºÍCVE-2017-0146µÈ£¬£¬£¬£¬£¬£¬£¬£¬Ò»µ©ÔÚÄ¿µÄϵͳÖн¨ÉèÁ˺óÃÅ£¬£¬£¬£¬£¬£¬£¬£¬Ëü¾Í¿ÉÒÔ½øÒ»²½ÌṩÆäËü¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬ÈçÀÕË÷Èí¼þ»ò¼üÅ̼ͼ³ÌÐòµÈ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Åû¶Á˹ØÓÚZombieBoyµÄ¸ü¶àIoC¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75070/malware/zombieboy-monero-miner.html


¾©¹«Íø°²±¸11010802024551ºÅ