¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181218

Ðû²¼Ê±¼ä 2018-12-18
1¡¢Talos³ÆÉÏÖܵıÈÌØ±ÒÕ¨µ¯ÍþвÓëSextortionڲƭÕß±£´æ¹ØÁª

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÉÏÖÜËÄÃÀ¹úÌìϸ÷µØµÄһЩ¹«¹²»ú¹¹£¨ÀýÈç´óѧ¡¢ÐÂÎÅýÌåµÈ£©ÎüÊÕµ½ÁËÕ¨µ¯ÍþвµÄڲƭµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬Ë¼¿ÆTalos·¢Ã÷¸Ã¶ñÒâ»î¶¯ÏÖʵÉÏÊÇ10Ô·ÝsextortionÕ©Æ­»î¶¯µÄÑݱä¡£¡£¡£¡£¡£¡£¡£ÔÚÕ¨µ¯ÍþвÖÐTalos¹²·¢Ã÷ÁË17¸ö²î±ðµÄ±ÈÌØ±ÒµØµã£¬£¬£¬£¬£¬£¬Ö»ÓÐÁ½¸öµØµãÓà¶îΪÕý¡£¡£¡£¡£¡£¡£¡£Õ¨µ¯ÍþÐ²Éæ¼°µ½µÄIPµØµãÒ²·¢ËÍÁËÖÖÖÖÀàÐ͵ÄsextortionڲƭÓʼþ¡£¡£¡£¡£¡£¡£¡£ÕâÒâζ×ÅÕâЩ×ï·¸Ô¸Òâ±àÔìÈκÎËûÃÇÒÔΪ¿ÉÒÔÓÕÆ­ÊÕ¼þÈ˵ÄÍþвºÍ¹ÊÊ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ô¤¼ÆÕâÖÖ¹¥»÷»á¼ÌÐø±¬·¢¡£¡£¡£¡£¡£¡£¡£TalosÃãÀøÓû§²»ÒªÖ§¸¶ÈκÎÊê½ð£¬£¬£¬£¬£¬£¬ÓÉÓÚÕâÑù×öÖ»»áÈù¥»÷ÕßÈ·ÈÏËûÃǵÄÒªÁìÊÇÓÐÓõ쬣¬£¬£¬£¬£¬´Ó¶ø±ä±¾¼ÓÀ÷µØ¾ÙÐÐÆäËü¹¥»÷¡£¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2018/12/bitcoin-bomb-scare-associated-with.html


2¡¢Ñо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þHiddenTearµÄÃ⺬»ìÃܹ¤¾ß

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾



Michael GillespieÐû²¼ÀÕË÷Èí¼þHiddenTearµÄÃ⺬»ìÃܹ¤¾ßHiddenTearDecrypter¡£¡£¡£¡£¡£¡£¡£HiddenTearÊÇÒ»¸öÀÕË÷Èí¼þ¼Ò×壬£¬£¬£¬£¬£¬ÆäÍêÕûµÄÔ´´úÂë±»Ðû²¼ÔÚGitHubÉÏ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÔ´´úÂ뽨Éè×Ô¼ºµÄ±äÖÖ¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚԭʼ´úÂëÊÇ¿ÉÒÔ½âÃܵ쬣¬£¬£¬£¬£¬Òò´Ë´ÓÏàͬ´úÂ뽨ÉèµÄÆäËü±äÌåÒ²ÊÇ¿ÉÒÔ½âÃܵÄ¡£¡£¡£¡£¡£¡£¡£¸Ã½âÃܹ¤¾ß¿ÉÒÔ½âÃܵıäÌå°üÀ¨8lock8¡¢AnonCrack¡¢BankAccountSummaryµÈ¡£¡£¡£¡£¡£¡£¡£

 

 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-hiddentear-ransomware-with-ht-brute-forcer/


3¡¢ÐÂÍøÂç´¹Âڻαװ³ÉOffice 365µÄδËÍ´ï֪ͨ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ISC Handler Xavier Mertens·¢Ã÷Ò»¸öеÄÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý·¢ËÍαװ³É΢ÈíOffice 365δËÍ´ïÐÂÎŵĴ¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬ÊÔͼÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡£¡£¡£¡£¡£¡£¡£ÈôÊÇÎüÊÕµ½´ËÀàÓʼþµÄÓû§µã»÷ÁËÓʼþÖеÄÔٴη¢ËÍÁ´½Ó£¬£¬£¬£¬£¬£¬ËûÃǽ«»áÌø×ªµ½Ò»¸öÄ£ÄâOffice 365µÇÂ¼Ò³ÃæµÄ´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈëµÇ¼ƾ֤£¬£¬£¬£¬£¬£¬JavaScript´úÂ뽫»áÍøÂçÓû§µÄƾ֤²¢½«Óû§Öض¨Ïòµ½Õýµ±µÄOffice 365µÇ¼վµã¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-attack-pretends-to-be-a-office-365-non-delivery-email/


4¡¢PewDiePieºÚ¿ÍÌᳫµÚ¶þÂÖ´òÓ¡»ú¹¥»÷»î¶¯££PrinterHack2

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÉϸöÔÂΪÐû´«YouTube¶©ÔÄÆµµÀPewDiePie£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËÈ«Çò¹æÄ£ÄÚµÄ5Íǫ̀´òÓ¡»ú¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÕâЩ¹¥»÷ÕßÕýÔÚÌᳫµÚ¶þÂÖ¹¥»÷»î¶¯££PrinterHack2¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚTwitterÉÏÐû³Æ£¬£¬£¬£¬£¬£¬µÚ¶þÂÖ¹¥»÷»î¶¯Éæ¼°µ½ÈýÖÖЭÒ飬£¬£¬£¬£¬£¬°üÀ¨IPP¡¢JetDirectºÍLPD£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ´òÓ¡»úÁè¼Ý25Íǫ̀£¬£¬£¬£¬£¬£¬¶øÄ¿µÄIPµØµãµÄÊýĿԶԶÁè¼Ý200Íò¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹³Æ´Ë´ÎÐж¯ÊÇΪÁËÒýÆðÈËÃǶԴòÓ¡»úÎó²îµÄÖØÊÓ¡£¡£¡£¡£¡£¡£¡£

 

 Ô­ÎÄÁ´½Ó£º

https://threatpost.com/pewdiepie-hackers-launch-second-printer-siege-according-to-reports/139968/


5¡¢Jenkins±»ÆØ±£´æÁ½¸öÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»½ÓÊÜ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


CyberArkÇå¾²Ñо¿Ö°Ô±Åû¶ÁËJenkinsÖеÄÁ½¸öÇå¾²Îó²îµÄÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²î¶¼ÔÚ½ñÄêÑ×Ìì±»ÐÞ¸´£¬£¬£¬£¬£¬£¬µ«ÈÔÓÐÊýÒÔǧ¼ÆµÄÔÚÏßJenkinsЧÀÍÆ÷Ò×Êܹ¥»÷¡£¡£¡£¡£¡£¡£¡£µÚÒ»¸öÎó²î£¨CVE-2018-1999001£©¿ÉÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâµÇ¼ƾ֤½«JenkinsЧÀÍÆ÷µÄconfig.xmlÉèÖÃÎļþ´ÓhomeÄ¿Â¼ÒÆ¶¯µ½ÆäËüλÖ㬣¬£¬£¬£¬£¬µ±JenkinsЧÀÍÖØÊÓÆôºó£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷½«Ê¹ÓÃĬÈÏÉèÖ㬣¬£¬£¬£¬£¬ÕâʹµÃÈκÎÈ˶¼¿ÉÒÔ×¢²á²¢»ñµÃÖÎÀíԱȨÏÞ¡£¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÎó²î£¨CVE-2018-1999043£©ÔÊÐí¹¥»÷ÕßÔÚЧÀÍÆ÷ÄÚ´æÖжÌÔݵؽ¨ÉèÓû§¼Í¼£¬£¬£¬£¬£¬£¬²¢Ê¹ÓøÃÓû§¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/thousands-of-jenkins-servers-will-let-anonymous-users-become-admins/


6¡¢TwitterÐÞ¸´Ò»¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíδÊÚȨ»á¼ûÖ±½ÓÐÂÎÅ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ñо¿Ö°Ô±Terence Eden·¢Ã÷Twitter±£´æÒ»¸öbug£¬£¬£¬£¬£¬£¬ÆäOAuthÊÚȨ¶Ô»°¿òÏÔʾijЩµÚÈý·½Ó¦ÓÃÎÞ·¨»á¼ûÓû§µÄÖ±½ÓÐÂÎÅ£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÕâЩӦÓÿÉÒÔÔÚÓû§²»ÖªÇéµÄÇéÐÎÏ»á¼ûËûÃǵÄÖ±½ÓÐÂÎÅ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓëTwitterµÄ»ùÓÚPINµÄ¸¨ÖúÊÚȨ»úÖÆÓйأ¬£¬£¬£¬£¬£¬µ±µÚÈý·½Ó¦ÓÃͨ¹ýPIN»ñµÃÏìӦȨÏÞʱ£¬£¬£¬£¬£¬£¬ÕâЩȨÏÞ²¢Ã»ÓÐÔÚOAuthÊÚȨÐÅÏ¢ÖÐ׼ȷµØÏÔʾ³öÀ´¡£¡£¡£¡£¡£¡£¡£TwitterÓÚ12ÔÂ6ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/twitter-fixes-bug-that-gives-unauthorized-access-to-direct-messages/


ÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·­ÒëºÍÕûÀí