ÍòºÀÒòÊý¾ÝÐ¹Â¶ÃæÁÙÓ¢¹úî¿Ïµ»ú¹¹1.23ÒÚÃÀÔª·£¿£¿£¿£¿£¿£¿£¿£¿î£»£»£»£»£»£»GEº½¿Õ¹«Ë¾JenkinsЧÀÍÆ÷й¶´ó×ÚÃô¸ÐÐÅÏ¢£»£»£»£»£»£»ÊÓÆµÈí¼þZoom RCEÎó²î
Ðû²¼Ê±¼ä 2019-07-10
Ó¢¹úÊý¾Ý±£»£»£»£»£»£»¤»ú¹¹ÖܶþÌåÏÖ½«ÏòÍòºÀ´¦ÒÔ9900ÍòÓ¢°÷£¨ºÏ1.23ÒÚÃÀÔª£©µÄ·£¿£¿£¿£¿£¿£¿£¿£¿î£¬£¬£¬£¬£¬£¬£¬£¬Ôµ¹ÊÔÓÉÊÇ2018Äê11ÔÂÍòºÀÆìÏÂϲ´ïÎÝÂùݵĻáÔ±Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¡£¾ÝÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©³Æ£¬£¬£¬£¬£¬£¬£¬£¬Å·ÖÞ31¸ö¹ú¼ÒµÄ½ü3000ÍòסÃñºÍ700ÍòÓ¢¹úסÃñÊܵ½ÍòºÀÊý¾Ýй¶µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£ÕâÊÇÒÑÍùÁ½ÌìÄÚ±¬·¢µÄµÚ¶þÆðÕë¶ÔÊý¾Ýй¶µÄÖØ´ó·£¿£¿£¿£¿£¿£¿£¿£¿î֪ͨ¡£¡£¡£¡£¡£¡£¡£¡£ÍòºÀÌåÏÖ¶ÔÐÅϢרԱ°ì¹«ÊҵľöÒé¸ÐӦʧÍû£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ±»´¦ÒÔ·£¿£¿£¿£¿£¿£¿£¿£¿î֮ǰ£¬£¬£¬£¬£¬£¬£¬£¬Ëü¡°ÓÐȨ×ö³ö»ØÓ¦¡±£¬£¬£¬£¬£¬£¬£¬£¬²¢¡°ÍýÏë×ö³ö»ØÓ¦ÇÒÆð¾¢º´ÎÀ¡±×Ô¼ºµÄ̬¶È¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/marriott-data-breach-gdpr.html
2¡¢GEº½¿Õ¹«Ë¾JenkinsЧÀÍÆ÷й¶´ó×ÚÃô¸ÐÐÅÏ¢
Çå¾²Ñо¿Ô±Bob Diachenko·¢Ã÷GEº½¿Õ¹«Ë¾µÄJenkinsЧÀÍÆ÷¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬£¬£¬£¬µ¼Ö¹«Ë¾µÄ´ó×ÚÃô¸ÐÐÅϢй¶£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¹«Ë¾ÄÚ²¿ÉÌÒµ»ù´¡ÉèÊ©µÄÔ´´úÂë¡¢Ã÷ÎÄÃÜÂ롢ȫÇòϵͳµÄÉèÖÃÎļþºÍ˽Կ¡¢APIÁîÅÆ¡¢Êý¾Ý¿âƾ֤µÈ¡£¡£¡£¡£¡£¡£¡£¡£GEº½¿Õ¹«Ë¾ÊÇͨÓÃµçÆøÆìϵÄ×Ó¹«Ë¾£¬£¬£¬£¬£¬£¬£¬£¬ÊÇÈ«ÇòÉÌÓ÷ɻú·¢ÄîÍ·µÄ¶¥¼¶¹©Ó¦ÉÌÖ®Ò»¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖûÓÐÖ¤¾ÝÅú×¢ÆäËüÈË»á¼ûÁËЧÀÍÆ÷ÉϵÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬²¢ÒѽÓÄÉÔ¤·À²½·¥ÖØÖÃÁËËùÓÐÆ¾Ö¤¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/ge-aviation-passwords-jenkins-server/146302/
3¡¢Î¢ÈíÖÒÑÔÎÞÎļþ¶ñÒâÈí¼þAstarothµÄ¹¥»÷»î¶¯
΢ÈíÇå¾²ÍŶÓÐû²¼Ò»Ôòת´ï£¬£¬£¬£¬£¬£¬£¬£¬ÖÒÑÔʹÓÃÎÞÎļþÊÖÒÕ·Ö·¢¶ñÒâÈí¼þAstarothµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£¡£Windows Defender ATPÍŶӼì²âµ½Á˸öñÒâ»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý´ó¹æÄ£À¬»øÓʼþ»î¶¯ÏòÓû§·Ö·¢AstarothľÂí¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒ»¸öÐÅÏ¢ÇÔȡľÂí£¬£¬£¬£¬£¬£¬£¬£¬¿Éת´¢ÖÖÖÖÓ¦ÓóÌÐòµÄƾ֤£¬£¬£¬£¬£¬£¬£¬£¬²¢½«±»µÁÊý¾ÝÉÏ´«µ½Ô¶³ÌЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¡£Î¢Èí½²»°ÈËÌåÏÖÁè¼Ý95£¥µÄAstarothѬȾ±¬·¢ÔÚ°ÍÎ÷¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/microsoft-warns-about-astaroth-malware-campaign/
4¡¢DDoS½©Ê¬ÍøÂçGoBotKR£¬£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ôº«¹ú
ƾ֤ESETµÄ±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓÕýÔÚ¹¹½¨Ò»¸ö¿ÉÓÃÓÚÖ´ÐÐÖÖÖÖDDoS¹¥»÷µÄ½©Ê¬ÍøÂçGoBotKR¡£¡£¡£¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÖ÷ÒªÃé×¼º«¹úµçÊÓ½ÚÄ¿µÄ·ÛË¿£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýµÁ°æÍøÕ¾ÉϵĵÁ°æÓ°Ï·¡¢ÓÎÏ·ºÍµçÊÓ½ÚÄ¿ÖÖ×ÓÏÂÔØ¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÊÇÒÑÖªºóÃÅGoBot2µÄˢа汾£¬£¬£¬£¬£¬£¬£¬£¬´úÂëºÜ¼òÆÓ£¬£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼¹¦Ð§¶¼ÊÇʹÓÃGoLang¿âʵÏֵ쬣¬£¬£¬£¬£¬£¬£¬²¢ÇÒÖ´ÐÐWindowsÏÂÁîºÍµÚÈý·½¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬ÈçBitTorrentºÍuTorrent¿Í»§¶Ë¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ôö²¹Ëµ¸Ã¶ñÒâÈí¼þ¶ÔÔ´´úÂëµÄÐÞ¸ÄÖ÷ÒªÊǺ«¹úÌØÓеÄÌÓ±ÜÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¼ì²âIPÐÅÏ¢ÒÔÈ·¶¨ÊÇ·ñÔÚº«¹úµÄһЩÇ徲ɳÏäÖÐÔËÐС¢É¨ÃèÀú³ÌÒÔ¼ì²â·À²¡¶¾²úÆ·µÈ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/gobotkr-pirate-torrents-ddos-botnet/146285/
5¡¢¶ñÒâÈí¼þAnubis»Ø¹é£¬£¬£¬£¬£¬£¬£¬£¬¼ì²âµ½Áè¼Ý1.7Íò¸öÑù±¾
Ç÷ÊÆ¿Æ¼¼¼ì²âµ½Android¶ñÒâÈí¼þAnubis»Ø¹é£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚÁ½¸öÏà¹ØµÄЧÀÍÆ÷Éϼì²âµ½17490¸öÑù±¾¡£¡£¡£¡£¡£¡£¡£¡£ÔÚÕâЩÑù±¾ÖÐÕÒµ½ÁËÁ½¸ö±êÇ©£ºOperat?rG¨¹ncellemesiºÍGoogle Services£¬£¬£¬£¬£¬£¬£¬£¬Ç°ÕßÔÚÍÁ¶úÆäÓïÖеÄÒâ˼ÊÇ¡°²Ù×÷Ö°Ô±¸üС±£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩ±êÇ©¿ÉÄÜÊÇÉç½»¹¤³ÌÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÓÕÆÓû§ÏÂÔØ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£Anubis×ܹ²Õë¶Ô188¸öÓëÒøÐкͽðÈÚÏà¹ØµÄÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬£¬´ÓÖÐÇÔȡСÎÒ˽¼ÒºÍ²ÆÎñÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ³ÌÐòÀ´×ÔÓÚ²¨À¼¡¢°Ä´óÀûÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢·¨¹ú¡¢Òâ´óÀû¡¢Î÷°àÑÀ¡¢ÃÀ¹úºÍÓ¡¶ÈµÈ¹ú¼Ò¡£¡£¡£¡£¡£¡£¡£¡£AnubisµÄC£¦CЧÀÍÆ÷Ò²ÂþÑÜÔÚ²î±ðµÄ¹ú¼Ò¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/anubis-android-malware-returns-with-over-17000-samples/
6¡¢ÊÓÆµ¾Û»áÈí¼þZoom RCEÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÐ®ÖÆMacÉãÏñÍ·
Çå¾²Ñо¿Ö°Ô±Jonathan LeitschuhÅû¶ÊÓÆµ¾Û»áÈí¼þZoomÖеÄÒ»¸öRCEÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËMacƽ̨ÉϵÄZoom app°æ±¾4.4.4£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÔÚÓû§»á¼ûÍøÕ¾Ê±½ÓÊÜÍøÂçÉãÏñÍ·¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤LeitschuhµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬£¬Áè¼Ý400ÍòÓû§ÃæÁÙΣº¦¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îʹÓÃÁËZoomÈí¼þµÄµã»÷¼ÓÈ빦Ч£¬£¬£¬£¬£¬£¬£¬£¬¼´Ö»Ðèµã»÷Ô¼ÇëÁ´½Ó¼´¿É×Ô¶¯¼¤»îϵͳÉÏ×°ÖõÄÓ¦ÓóÌÐò²¢Í¨¹ýWebä¯ÀÀÆ÷¼ÓÈëÊÓÆµ¾Û»á¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý´¹ÂÚÓʼþ·Ö·¢ÕâÖÖ¶ñÒâÁ´½Ó¡£¡£¡£¡£¡£¡£¡£¡£Leitschuh»¹ÌåÏÖZoomµÄÐÞ¸´Ö»ÊÇ×èÖ¹¹¥»÷Õß·¿ªÓû§µÄÉãÏñÍ·£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈÔ¿ÉÒÔͨ¹ý¶ñÒâÁ´½ÓÓÕʹÓû§¼ÓÈë¾Û»á¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88147/hacking/zoom-mac-software-flaw.html


¾©¹«Íø°²±¸11010802024551ºÅ