¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190221
Ðû²¼Ê±¼ä 2019-02-21
Check PointÑо¿ÍŶÓÅû¶WinRARÖеĴúÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ£´æÁËÁè¼Ý19ÄêµÄʱ¼ä£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÁè¼Ý5ÒÚÓû§¡£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2018-20250¡¢CVE-2018-20251¡¢CVE-2018-20252ºÍCVE-2018-20253£©±£´æÓÚWinRARµÄUNACEV2.DLL¿âÖУ¬£¬£¬£¬£¬£¬£¬Õâ¸ö¿âÈÏÕæ½âѹËõACEÃûÌõÄѹËõÎļþ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷¸Ã¿â±£´æ±àÂëȱÏÝ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓöñÒâACEÎļþÔÚ½âѹËõµÄÄ¿µÄ·¾¶Ö®ÍâÖ²Èë¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£WinRARÍŶÓÌåÏÖÓÉÓÚUNACEV2.DLL´Ó2005ÄêÆð¾Í×èÖ¹Á˸üУ¬£¬£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±ÒѾʧȥÁ˸ÿâÔ´´úÂëµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬Òò´ËËûÃÇÑ¡Ôñ·ÅÆú¶ÔACEÃûÌõÄÖ§³Ö¡£¡£¡£¡£¡£¡£WinRAR¿ª·¢ÕßÔÚ1ÔÂ28ÈÕÐû²¼ÁËWinRAR 5.70 Beta 1ÒÔÐÞ¸´´ËÎó²î¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/extracting-code-execution-from-winrar/2¡¢WordPressÍŶÓÐÞ¸´Ò»¸ö¾ßÓÐ6ÄêÀúÊ·µÄRCEÎó²î
RIPS¹«Ë¾µÄÇå¾²Ñо¿Ö°Ô±ÔÚWordPress 5.0.3֮ǰµÄ°æ±¾Öз¢Ã÷Ò»¸ö¿Éµ¼ÖÂRCEµÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÒÑÍù6Äê¼äÐû²¼µÄËùÓÐWordPress°æ±¾¡£¡£¡£¡£¡£¡£¾ßÓÐÖÁÉÙÒ»¸ö¡°×÷Õß¡±ÕË»§µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²îÔڵײãЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇ·¾¶±éÀúÎó²îºÍÎļþ°üÀ¨Îó²îµÄ×éºÏ£¬£¬£¬£¬£¬£¬£¬ÔÚÑо¿Ö°Ô±Ðû²¼µÄPoCÊÓÆµÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ¼¸ÃëÖÓÄÚ»ñµÃÄ¿µÄWordPress²©¿ÍµÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£WordPress°æ±¾5.0.1ºÍ4.9.9ÖеÄÇå¾²²½·¥¿É×èÖ¹¸ÃÎó²îʹÓᣡ£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/02/wordpress-remote-code-execution.html3¡¢ÈüÃÅÌú¿ËÐû²¼ISTR 24Äê¶ÈÍþв±¨¸æ£¬£¬£¬£¬£¬£¬£¬2018Ä깩ӦÁ´¹¥»÷ÔöÌí78£¥
ÈüÃÅÌú¿ËÐû²¼»¥ÁªÍøÇå¾²Íþв±¨¸æ£¨ISTR£©Volume 24£¬£¬£¬£¬£¬£¬£¬¸Ã±¨¸æÖ¸³ö±íµ¥Ð®Öƹ¥»÷£¨formjacking£©È¡´úÁËÀÕË÷Èí¼þºÍ¶ñÒâÍÚ¿óÈí¼þ£¬£¬£¬£¬£¬£¬£¬³ÉΪ2018Äê×îÖ÷ÒªµÄÍþв¡£¡£¡£¡£¡£¡£formjacking¹¥»÷Ö÷ÒªÕë¶ÔÔÚÏßÁãÊÛÉ̺͵ç×ÓÉÌÎñÍøÕ¾£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¶ñÒâ´úÂëÀ´ÇÔÈ¡¿Í»§µÄÖ§¸¶ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÕâÖÖ¹¥»÷½øÒ»²½Ö¤ÊµÎú¹©Ó¦Á´¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã±¨¸æµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬2018Ä깩ӦÁ´¹¥»÷µÄÊýÄ¿±È2017Äêºá¿ç78%¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Óë2017ÄêÏà±È£¬£¬£¬£¬£¬£¬£¬2018ÄêÀÕË÷Èí¼þ¹¥»÷ϽµÁË20%£¬£¬£¬£¬£¬£¬£¬µ«Õë¶ÔÆóÒµµÄ¹¥»÷ÔöÌíÁË12%£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÒÆ¶¯ÀÕË÷Èí¼þìÉý33%¡£¡£¡£¡£¡£¡£ÔÚ2018Äê1ÔÂÖÁ12ÔÂʱ´ú£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÐ®ÖÆ¹¥»÷ϽµÁË52%¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.symantec.com/blogs/threat-intelligence/istr-24-cyber-security-threat-landscape4¡¢Î¢ÈíÅû¶APT28й¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÅ·ÖÞÕþÖÎʵÌå

΢ÈíÅû¶¶íÂÞ˹APT×éÖ¯Fancy Bear£¨ÓÖ³ÆAPT28£©µÄй¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤Î¢ÈíµÄ±íÊö£¬£¬£¬£¬£¬£¬£¬APT28µÄÄ¿µÄÊÇÓë2019ÄêÅ·ÖÞÒé»áÑ¡¾ÙÏà¹ØµÄÕþÖÎʵÌå¡£¡£¡£¡£¡£¡£APT28ʹÓÃÓã²æÊ½´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬ÔÚ2018Äê9ÔÂÖÁ12ÔÂʱ´úÕë¶Ô104¸öÕË»§ÌᳫÁ˹¥»÷¡£¡£¡£¡£¡£¡£ÕâЩÕË»§ÊôÓÚ±ÈÀûʱ¡¢·¨¹ú¡¢µÂ¹ú¡¢²¨À¼¡¢ÂÞÂíÄáÑǺÍÈû¶ûάÑǵÄÕþÖλú¹¹¡£¡£¡£¡£¡£¡£ÕâЩ´¹ÂÚÓʼþÖ¼ÔÚÍøÂçÄ¿µÄµÄµÇ¼ƾ֤»òÈö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖËü½«°ÑAccountGuardЧÀÍÀ©Õ¹µ½12¸öеÄÅ·ÓѰî¼Ò¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-reveals-new-apt28-cyber-attacks-against-european-political-entities/5¡¢³¯ÏÊAPT×éÖ¯Lazarus£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃKEYMARBLEºóÃŹ¥»÷¶íÂÞ˹ÆóÒµ
³¯ÏÊAPT×éÖ¯LazarusµÄ·ÖÖ§»ú¹¹BluenoroffÕë¶Ô¶íÂÞ˹ÆóÒµÌᳫÐÂÒ»ÂֵĹ¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯Ê¹ÓÃOfficeÎĵµ×÷Ϊ³õʼѬȾǰÑÔ£¬£¬£¬£¬£¬£¬£¬²¢×îÖÕÊÍ·ÅÁËKEYMARBLEºóÃÅ¡£¡£¡£¡£¡£¡£Æ¾Ö¤US-CERTµÄÏà¹Ø¶ñÒâÈí¼þÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬¸ÃºóÃÅľÂí¿ÉÓÃÓÚ»á¼û×°±¸µÄÉèÖÃÊý¾Ý¡¢ÏÂÔØÆäËüÎļþ¡¢Ö´ÐÐÏÂÁî¡¢ÐÞ¸Ä×¢²á±í¡¢½ØÈ¡ÆÁÄ»ÐÅÏ¢ºÍÊý¾ÝÉøÂ©µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-apt-lazarus-targets-russian-entities-with-keymarble-backdoor/6¡¢ATM¶ñÒâÈí¼þWinPot£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃUSB½Ó¿Ú¾ÙÐÐÈö²¥
¿¨°Í˹»ùÑо¿Ö°Ô±Konstantin Zykov·¢Ã÷ATM¶ñÒâÈí¼þWinPotµÄбäÌåv.3ÒѾÔÚ°µÍøÉÏ·ºÆð£¬£¬£¬£¬£¬£¬£¬Æä±¨¼ÛΪ500ÃÀÔªµ½1000ÃÀÔªÖ®¼ä¡£¡£¡£¡£¡£¡£WinPotͨ¹ýÎïÆÊÎö¼û¾ÙÐÐÈö²¥£¬£¬£¬£¬£¬£¬£¬¼´Í¨¹ýATMµÄUSB½Ó¿ÚÈö²¥¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ³£Õë¶ÔÐÐÈ˽ÏÉٵĽֵÀ¡¢Ò©µê¡¢ÂùÝÀàÊÐËÁµÈÅԱߵĵ¥¸öATM£¬£¬£¬£¬£¬£¬£¬Ò»µ©ATMѬȾÁ˸öñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¼´¿Éͨ¹ýÏÔʾÆÁÄ»Ç¿ÖÆATMÍ·ºÆð½ð¡£¡£¡£¡£¡£¡£°µÍøÂô¼ÒÔÚÆäÑÝʾÊÓÆµÖÐÑÝʾÁËWinPot v.3µÄÊÂÇéÀú³Ì£¬£¬£¬£¬£¬£¬£¬²¢Õ¹Ê¾ÁËÒ»¶ÎShowMeMoneyµÄ´úÂë¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/atm-jackpotting-malware-winpot/141960/ÉùÃ÷£º±¾×ÊѶÓÉ¿·¢k8άËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ