ά»ù½âÃÜÊ×´´È˱»²¶£»£»£»£»Apache TomcatÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»EMOTETй¥»÷»î¶¯

Ðû²¼Ê±¼ä 2019-04-12
1¡¢Î¬»ù½âÃÜÊ×´´ÈËJulian AssangeÔÚ¶ò¹Ï¶à¶ûפÂ×¶Ø´óʹ¹Ý±»²¶

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾
 
ά»ù½âÃÜÊ×´´È˰¢É£Ææ£¨Julian Assange£©ÔÚ¶ò¹Ï¶à¶ûפÂ×¶Ø´óʹ¹Ý±»²¶£¬£¬£¬£¬Ö®Ç°°¢É£ÆæÔøÔڸôóʹ¹Ý±ÜÄѳ¤´ï7ÄêµÄʱ¼ä¡£¡£¡£¡£¡£Æ¾Ö¤Â׶ش󶼻ᾯԱ¾ÖÐû²¼µÄÒ»·Ý¼ò¶Ì˵Ã÷£¬£¬£¬£¬ÔÚ¶ò¹Ï¶à¶ûÕþ¸®³·»ØÆäÕþÖκǻ¤ºó£¬£¬£¬£¬Ó¢¹ú¾¯Ô±½øÈëʹ¹Ý½«°¢É£Ææ¾Ð²¶¡£¡£¡£¡£¡£Ó¢¹ú¾¯·½ÌåÏÖ½«¾¡¿ìÈð¢É£ÆæÔÚÂ×¶ØÎ÷ÃôÇøµÄ·¨Í¥³öÍ¥¡£¡£¡£¡£¡£ÃÀ¹ú˾·¨²¿Ò²³Æ°¢É£Ææ½«ÃæÁÙÒý¶ÉËßËÏ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/04/wikileaks-julian-assange-arrested.html

2¡¢Apache TomcatÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-0232£©

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾
 
4ÔÂ10ÈÕApache¹Ù·½Ðû²¼Í¨¸æ³Æ½«ÔÚа汾ÖÐÐÞ¸´Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-0232£©¡£¡£¡£¡£¡£ÓÉÓÚJREÔÚ½«²ÎÊýת´ïµ½WindowsÇéÐÎʱCGI ServletÖб£´æÊäÈëÑéÖ¤¹ýʧ£¬£¬£¬£¬µ¼ÖÂÔ¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÇëÇóÒÔTomcatµÄȨÏÞÔÚϵͳÉÏ×¢ÈëºÍÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄTomcat°æ±¾°üÀ¨9.0.13¡¢9.0.14ºÍ9.0.16¡£¡£¡£¡£¡£Apache¹Ù·½ÉÐδÐû²¼ÐÞ¸´²¹¶¡£¬£¬£¬£¬µ«Óû§¿Éͨ¹ý½ûÓÃenableCmdLineArgumentsÑ¡ÏîÔÝʱ¾ÙÐзÀ»¤¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.cybersecurity-help.cz/vdb/SB2019041101?affChecked=1

3¡¢VSDC¹ÙÍøÔÙÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬±»ÓÃÓÚ·Ö·¢ÒøÐÐľÂíºÍÐÅϢ͵ÇÔľÂí

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾
 
Ãâ·ÑÊÓÆµ±à¼­Æ÷VSDCµÄ¹ÙÍøÔÙ´ÎÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¹¥»÷ÕßÐ®ÖÆÁËÍøÕ¾ÉϵÄÈí¼þÏÂÔØÁ´½Ó£¬£¬£¬£¬ÓÃÓÚ·Ö·¢ÒøÐÐľÂíWin32.Bolik.2ºÍÐÅϢ͵ÇÔľÂíTrojan.PWS.Stealer£¨KPOT Stealer£©¡£¡£¡£¡£¡£Õâ²»ÊÇVSDC¹ÙÍøµÚÒ»´ÎÔâµ½ÈëÇÖ£¬£¬£¬£¬¹¥»÷ÕßÔøÔÚ2018Äê6ÔºÍ7ÔÂÈëÇÖ¹ý¸ÃÍøÕ¾£¬£¬£¬£¬²¢½«Èí¼þÏÂÔØÁ´½ÓÌæ»»ÎªAZORult Stealer¡¢X-Key KeyloggerºÍDarkVNCºóÃŵÄÏÂÔØÁ´½Ó¡£¡£¡£¡£¡£ÕâÒ»´ÎÈëÇÖ±¬·¢ÔÚ2ÔÂ21ÈÕÖÁ3ÔÂ23ÈÕÖ®¼ä£¬£¬£¬£¬¹¥»÷ÕßÖ÷ÒªÕë¶ÔÓ¢¹ú¡¢ÃÀ¹ú¡¢¼ÓÄôóºÍ°Ä´óÀûÑǵÄÓû§£¬£¬£¬£¬ÖÁÉÙÓÐ565ÃûÓû§Ñ¬È¾ÁËWin32.Bolik.2£¬£¬£¬£¬ÁíÍâ83ÃûÓû§Ñ¬È¾ÁËKPOT Stealer¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/vsdc-site-hacked-again-to-spread-password-stealing-malware/

4¡¢ÃÀ¹úDHSÖÒÑÔÓëAPT×éÖ¯LazarusÓйصÄжñÒâÈí¼þHoplight

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾
 
DHSºÍFBIÕë¶ÔÒ»¸öеĶñÒâÈí¼þHoplightÐû²¼ÖÒÑÔ£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÓëÎÛÃûÕÑÖøµÄ³¯ÏÊAPT×éÖ¯LazarusÓйء£¡£¡£¡£¡£HoplightÊÇPE32Îļþ£¬£¬£¬£¬¿ÉÍøÂçÄ¿µÄϵͳµÄÏà¹ØÐÅÏ¢£¬£¬£¬£¬°üÀ¨OS°æ±¾¡¢¾íÐÅÏ¢¡¢ÏµÍ³Ê±¼ä¼°Ã¶¾ÙÇý¶¯Æ÷ºÍ·ÖÇøÐÅÏ¢¡£¡£¡£¡£¡£Hoplight»¹¾ßÓÐÒÔϹ¦Ð§£º¶ÁÈ¡¡¢Ð´ÈëºÍÒÆ¶¯Îļþ£»£»£»£»½¨ÉèºÍɱËÀÀú³Ì£»£»£»£»Àú³Ì×¢È룻£»£»£»½¨Éè¡¢Æô¶¯ºÍ×èֹЧÀÍ£»£»£»£»ÐÞ¸Ä×¢²á±í£»£»£»£»ÅþÁ¬Ô¶³ÌÖ÷»ú£»£»£»£»ÉÏ´«ºÍÏÂÔØÎļþ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓú«¹úÍøÂ繫˾NaverµÄSSLÖ¤Êé¾ÙÐÐͨѶ£¬£¬£¬£¬²¢Ê¹ÓÃÊðÀíÀ´»ìÏýÆä»î¶¯¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/us-government-warns-north-korean-1-1/

5¡¢Áè¼Ý6Íò¸ö±»µÁÉèÖÃÎļþÔÚGenesis StoreÉϳöÊÛ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾
 
¿¨°Í˹»ùÑо¿ÍŶӷ¢Ã÷Áè¼Ý6Íò¸ö±»µÁµÄÉèÖÃÎļþÔÚ°µÍøÊг¡Genesis StoreÉϳöÊÛ¡£¡£¡£¡£¡£ÕâЩÉèÖÃÎļþÖаüÀ¨ä¯ÀÀÆ÷Ö¸ÎÆ¡¢Óû§µÇ¼ÃûºÍÃÜÂë¡¢cookies¼°ÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬µ¥¸öÉèÖÃÎļþµÄÊÛ¼Û´Ó5µ½200ÃÀÔª²»µÈ¡£¡£¡£¡£¡£Genesis Store»¹ÎªÓû§ÌṩÁËÒ»¸öÌØÊâµÄ.crx²å¼þ£¬£¬£¬£¬¿É×ÊÖú·¸·¨·Ö×ÓʹÓÃÕâЩÉèÖÃÎļþαװ³ÉÕýµ±Óû§µÄÉí·Ý¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83630/deep-web/genesis-store-fingerprints.html

6¡¢EMOTETй¥»÷»î¶¯£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÖÇÀûµÄ½ðÈÚºÍÒøÐÐЧÀÍ

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾
 
SI-LAB·¢Ã÷EMOTETµÄÐÂÒ»²¨¹¥»÷À˳±Ö÷ÒªÕë¶ÔÖÇÀûµÄ½ðÈÚºÍÒøÐÐЧÀÍ£¬£¬£¬£¬ÔÚ3ÔÂ18ÈÕÖÁ26ÈÕʱ´úÒÑÓÐ176ÃûÊܺ¦ÕßÔâµ½¹¥»÷¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯ÈÔÒÔ´¹ÂÚÓʼþµÄÐÎʽ¾ÙÐУ¬£¬£¬£¬µÚÒ»½×¶ÎÊͷŶñÒâ¾ç±¾__Denuncia_Activa_CL.PDF.bat£¬£¬£¬£¬¸Ã¾ç±¾¿ÉÈÆ¹ýÇå¾²½â¾ö¼Æ»®µÄ¼ì²â¡£¡£¡£¡£¡£µÚ¶þ½×¶ÎµÄ¶ñÒâÎļþdenuncias.rarÔòʹÓÃÁËWinRARÖеÄACEÎó²î£¨CVE-2018-20250£©À´·Ö·¢EMOTET¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83620/breaking-news/emotet-targets-chile.html