MITRE CWE 4.0°æÐÂÔöÓ²¼þÇå¾²Îó²î£»£»£»£»£»Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ

Ðû²¼Ê±¼ä 2020-02-28

1.MITREÐû²¼Çå¾²Îó²îÁбíCWE 4.0°æ£¬£¬ £¬£¬£¬£¬ÐÂÔöÓ²¼þÇå¾²Îó²î


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


MitreÐû²¼³£¼ûÇå¾²Îó²îÁбíCWE 4.0°æ£¬£¬ £¬£¬£¬£¬¸ÃÁбíÒÑÀ©Õ¹Îªº­¸ÇÓ²¼þÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨£ºÖÆÔìºÍÉúÃüÖÜÆÚÖÎÀíÎÊÌ⣻£»£»£»£»Çå¾²Á÷³ÌÎÊÌ⣻£»£»£»£»¼¯³ÉÎÊÌ⣻£»£»£»£»È¨ÏÞÊèÉ¢ºÍ»á¼û¿ØÖÆÎÊÌ⣻£»£»£»£»Ò»Ñùƽ³£µç·ºÍÂß¼­Éè¼ÆÎÊÌ⣻£»£»£»£»½¹µãºÍÅÌËãÎÊÌ⣻£»£»£»£»ÄÚ´æºÍ´æ´¢ÎÊÌ⣻£»£»£»£»ÍâΧװ±¸¡¢Æ¬ÉϽṹºÍ½Ó¿Ú/IOÎÊÌ⣻£»£»£»£»Çå¾²Ô­ÓïºÍ¼ÓÃÜÎÊÌ⣻£»£»£»£»µçÔ´¡¢Ê±ÖӺ͸´Î»ÎÊÌ⣻£»£»£»£»µ÷ÊԺͲâÊÔÎÊÌ⣻£»£»£»£»¿çÁìÓòÎÊÌâ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/02/27/hardware-security-weaknesses/


2.Magecart¹¥»÷ÕßʹÓÃαÔìµÄCDNÀ´Èƹý¼ì²â


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Magecart¹¥»÷ÕßʹÓÃαÔìµÄÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©ÓòÃûÀ´Èƹý¼ì²â¡£¡£¡£ ¡£¡£Malwarebytes LabsµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬ £¬£¬£¬£¬¸ÃMagecart¶ñÒâ¾ç±¾Î±×°³ÉÕýµ±µÄjQuery¿â£¬£¬ £¬£¬£¬£¬²¢ÇÒͨ¹ýαÔìµÄCDNÓòÃûÊ¿´«£¬£¬ £¬£¬£¬£¬ÆäÇëÇóÀàËÆÓÚ//cdn-sources.org/jquery.unveil.js£¬£¬ £¬£¬£¬£¬ÁíÒ»¸öαÔìµÄCDNÓòÃûÇëÇóΪ//cdn-mediafiles.org/cache.php¡£¡£¡£ ¡£¡£¹¥»÷ÕßʹÓÃÃâ·ÑµÄngrokЧÀÍ£¨¿É½¨ÉèÇå¾²ËíµÀµÄ·´ÏòÊðÀíÈí¼þ£©À´ÍøÂç±»µÁµÄÊý¾Ý£¬£¬ £¬£¬£¬£¬Õâͨ³£°üÀ¨¹ºÎïÕßµÄÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/credit-card-skimmer-uses-fake-cdns-to-evade-detection/


3.Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ£¬£¬ £¬£¬£¬£¬ÒÉΪ¹ú¼ÒÖ§³Ö


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


SophosÑо¿Ö°Ô±·¢Ã÷Õë¶ÔÔÆÐ§ÀÍÆ÷µÄCloud Snooper¹¥»÷»î¶¯£¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÈÆ¹ýÄ¿µÄ×éÖ¯µÄAWSºÍÆä·À»ðǽ£¬£¬ £¬£¬£¬£¬²¢ÊÍ·ÅÔ¶¿ØÄ¾Âí¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÔÚ¼ì²éÔËÐÐÔÚAWSÖеÄÊÜѬȾLinuxºÍWindows EC2ÔÆÐ§ÀÍÆ÷ʱ·¢Ã÷Á˴˹¥»÷¡£¡£¡£ ¡£¡£SophosÌåÏÖÕâÖÖ¹¥»÷ºÜ¿ÉÄÜÊǹú¼ÒÖ§³ÖµÄ¹¥»÷£¬£¬ £¬£¬£¬£¬ËüʹÓõÄRootkit²»µ«Ê¹¹¥»÷Õß¿ÉÒÔÔ¶³Ì¿ØÖÆÐ§ÀÍÆ÷£¬£¬ £¬£¬£¬£¬²¢ÇÒ»¹Îª¶ñÒâÈí¼þÌṩÁËÓëÆäC2ЧÀÍÆ÷¾ÙÐÐͨѶµÄÇþµÀ¡£¡£¡£ ¡£¡£Sophos¾Ü¾øÍ¸Â¶Êܺ¦×éÖ¯£¬£¬ £¬£¬£¬£¬µ«ÌåÏÖÕâ´Î¹¥»÷ËÆºõÊǹ©Ó¦Á´¹¥»÷£¬£¬ £¬£¬£¬£¬Æä·Ö·¢µÄRATÊÇ»ùÓÚGh0st RATµÄÔ´´úÂë¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171


4.RiskIQÐû²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ±¨¸æ¡·


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


RiskIQÐû²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ±¨¸æ¡·£¬£¬ £¬£¬£¬£¬¸Ã±¨¸æÖ¸³öÒÆ¶¯Éú̬ϵͳÕýÔÚ´ó·ùÔöÌí£¬£¬ £¬£¬£¬£¬µ«¹È¸èµÄÆð¾¢Ê¹µÃ¶ñÒâAPPµÄÊýÄ¿ÕýÔÚϽµ¡£¡£¡£ ¡£¡£2018Äê¸Ã±¨¸æÍ³¼ÆµÄºÚÃûµ¥Ó¦ÓÃÊýĿΪ213279¸ö£¬£¬ £¬£¬£¬£¬¶øÔÚ2019Äê¸ÃÊý×ÖΪ170796¸ö£¬£¬ £¬£¬£¬£¬Ï½µÁË20%¡£¡£¡£ ¡£¡£Òƶ¯APPÈÔÈ»ÊÇÆóÒµ¹¥»÷ÃæµÄÖ÷Òª×é³É²¿·Ö£¬£¬ £¬£¬£¬£¬ÓÈÆäÊǷǹٷ½ÈªÔ´µÄAPP£¬£¬ £¬£¬£¬£¬¸Ã±¨¸æ»¹Í³¼ÆÁË2019ÄêºÚÃûµ¥APP×î¶àµÄ6¸öÓ¦ÓÃÊÐËÁ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.riskiq.com/blog/external-threat-management/2019-mobile-app-threat-landscape-report/


5.ÐÂÒøÐÐľÂíCerberus¿ÉÇÔÈ¡Google AuthenticatorÑéÖ¤Âë


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


AndroidÒøÐÐľÂíCerberusµÄбäÌåÄܹ»ÇÔÈ¡Google AuthenticatorÌìÉúµÄÒ»´ÎÐÔÑéÖ¤Â루OTP£©£¬£¬ £¬£¬£¬£¬²¢Èƹý2FA±£»£»£»£»£»¤»á¼ûÓû§µÄÒøÐÐÕË»§¡£¡£¡£ ¡£¡£GoogleÓÚ2010ÄêÍÆ³öÁËAuthenticator£¬£¬ £¬£¬£¬£¬¸ÃÓ¦ÓÃÊÇΪÁËÌæ»»¶ÌÐÅÑéÖ¤Âë¡£¡£¡£ ¡£¡£ºÉÀ¼Òƶ¯Çå¾²¹«Ë¾ThreatFabricµÄÇå¾²Ñо¿Ö°Ô±ÔÚCerberusµÄ×îÐÂÑù±¾Öз¢Ã÷ÁËAuthenticator OTPÇÔÈ¡¹¦Ð§£¬£¬ £¬£¬£¬£¬¸ÃľÂíÀÄÓÃAccessibilityÌØÈ¨À´»ñµÃAuthenticator½çÃæµÄÄÚÈݲ¢½«Æä·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã±äÌåÈÔ´¦ÓÚ²âÊԽ׶Σ¬£¬ £¬£¬£¬£¬µ«¿ÉÄܺܿì¾Í»áÐû²¼¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/


6.Ó¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGR±»ÍϿ⣬£¬ £¬£¬£¬£¬ÒÑÔÚºÚ¿ÍÂÛ̳Èö²¥


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ºÚ¿ÍÕýÔÚµØÏÂÂÛ̳ÉϹ²ÏíÓ¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGRµÄSQLת´¢£¬£¬ £¬£¬£¬£¬¾Ý³Æ¸ÃÊý¾Ý¿âÊǴӿɹûÕæ»á¼ûµÄAWS S3´æ´¢Í°»ñÈ¡µÄ¡£¡£¡£ ¡£¡£Æ¾Ö¤Ðû²¼ÏÂÔØÁ´½ÓµÄºÚ¿ÍÂÛ̳³ÉÔ±µÄ˵·¨£¬£¬ £¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨ÖÁÉÙ3.6Íò·âµç×ÓÓʼþºÍÓйØÊÜÓ°ÏìÍøÕ¾£¨tradinggame.au.com¡¢bgr.inºÍS3 Production£©µÄµÇ¼ÐÅÏ¢£¬£¬ £¬£¬£¬£¬×ܹ²ÔÚ7¸öZIPÎļþÖд浵ÁË16¸öSQLת´¢¡£¡£¡£ ¡£¡£Î´¾­Ñ¹ËõµÄÊý¾Ý¿â×ܾÞϸΪ21.5GB¡£¡£¡£ ¡£¡£Under BreachÑо¿Ö°Ô±Ö¸³öÕâÊÇÒ»¸öÍêÕûµÄSQLת´¢£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨Óû§Ãû¡¢µç×ÓÓʼþºÍ¹þÏ£ÃÜÂëµÈÐÅÏ¢¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sql-dump-from-bgr-india-shared-on-hacker-forum/