¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181218
Ðû²¼Ê±¼ä 2018-12-18
ÉÏÖÜËÄÃÀ¹úÌìϸ÷µØµÄһЩ¹«¹²»ú¹¹£¨ÀýÈç´óѧ¡¢ÐÂÎÅýÌåµÈ£©ÎüÊÕµ½ÁËÕ¨µ¯ÍþвµÄڲƵç×ÓÓʼþ£¬£¬£¬£¬£¬£¬Ë¼¿ÆTalos·¢Ã÷¸Ã¶ñÒâ»î¶¯ÏÖʵÉÏÊÇ10Ô·ÝsextortionթƻµÄÑݱ䡣¡£¡£¡£¡£¡£ÔÚÕ¨µ¯ÍþвÖÐTalos¹²·¢Ã÷ÁË17¸ö²î±ðµÄ±ÈÌØ±ÒµØµã£¬£¬£¬£¬£¬£¬Ö»ÓÐÁ½¸öµØµãÓà¶îΪÕý¡£¡£¡£¡£¡£¡£Õ¨µ¯ÍþÐ²Éæ¼°µ½µÄIPµØµãÒ²·¢ËÍÁËÖÖÖÖÀàÐ͵ÄsextortionÚ²ÆÓʼþ¡£¡£¡£¡£¡£¡£ÕâÒâζ×ÅÕâЩ×ï·¸Ô¸Òâ±àÔìÈκÎËûÃÇÒÔΪ¿ÉÒÔÓÕÆÊÕ¼þÈ˵ÄÍþвºÍ¹ÊÊ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ô¤¼ÆÕâÖÖ¹¥»÷»á¼ÌÐø±¬·¢¡£¡£¡£¡£¡£¡£TalosÃãÀøÓû§²»ÒªÖ§¸¶ÈκÎÊê½ð£¬£¬£¬£¬£¬£¬ÓÉÓÚÕâÑù×öÖ»»áÈù¥»÷ÕßÈ·ÈÏËûÃǵÄÒªÁìÊÇÓÐÓõ쬣¬£¬£¬£¬£¬´Ó¶ø±ä±¾¼ÓÀ÷µØ¾ÙÐÐÆäËü¹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2018/12/bitcoin-bomb-scare-associated-with.html2¡¢Ñо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þHiddenTearµÄÃ⺬»ìÃܹ¤¾ß
Michael GillespieÐû²¼ÀÕË÷Èí¼þHiddenTearµÄÃ⺬»ìÃܹ¤¾ßHiddenTearDecrypter¡£¡£¡£¡£¡£¡£HiddenTearÊÇÒ»¸öÀÕË÷Èí¼þ¼Ò×壬£¬£¬£¬£¬£¬ÆäÍêÕûµÄÔ´´úÂë±»Ðû²¼ÔÚGitHubÉÏ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÔ´´úÂ뽨Éè×Ô¼ºµÄ±äÖÖ¡£¡£¡£¡£¡£¡£ÓÉÓÚÔʼ´úÂëÊÇ¿ÉÒÔ½âÃܵ쬣¬£¬£¬£¬£¬Òò´Ë´ÓÏàͬ´úÂ뽨ÉèµÄÆäËü±äÌåÒ²ÊÇ¿ÉÒÔ½âÃܵġ£¡£¡£¡£¡£¡£¸Ã½âÃܹ¤¾ß¿ÉÒÔ½âÃܵıäÌå°üÀ¨8lock8¡¢AnonCrack¡¢BankAccountSummaryµÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-hiddentear-ransomware-with-ht-brute-forcer/3¡¢ÐÂÍøÂç´¹Âڻαװ³ÉOffice 365µÄδËÍ´ï֪ͨ
ISC Handler Xavier Mertens·¢Ã÷Ò»¸öеÄÍøÂç´¹Âڻ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý·¢ËÍαװ³É΢ÈíOffice 365δËÍ´ïÐÂÎŵĴ¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬ÊÔͼÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡£¡£¡£¡£¡£¡£ÈôÊÇÎüÊÕµ½´ËÀàÓʼþµÄÓû§µã»÷ÁËÓʼþÖеÄÔٴη¢ËÍÁ´½Ó£¬£¬£¬£¬£¬£¬ËûÃǽ«»áÌø×ªµ½Ò»¸öÄ£ÄâOffice 365µÇÂ¼Ò³ÃæµÄ´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈëµÇ¼ƾ֤£¬£¬£¬£¬£¬£¬JavaScript´úÂ뽫»áÍøÂçÓû§µÄƾ֤²¢½«Óû§Öض¨Ïòµ½Õýµ±µÄOffice 365µÇ¼վµã¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-attack-pretends-to-be-a-office-365-non-delivery-email/4¡¢PewDiePieºÚ¿ÍÌᳫµÚ¶þÂÖ´òÓ¡»ú¹¥»÷»î¶¯££PrinterHack2
ÉϸöÔÂΪÐû´«YouTube¶©ÔÄÆµµÀPewDiePie£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËÈ«Çò¹æÄ£ÄÚµÄ5Íǫ̀´òÓ¡»ú¡£¡£¡£¡£¡£¡£ÏÖÔÚÕâЩ¹¥»÷ÕßÕýÔÚÌᳫµÚ¶þÂÖ¹¥»÷»î¶¯££PrinterHack2¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚTwitterÉÏÐû³Æ£¬£¬£¬£¬£¬£¬µÚ¶þÂÖ¹¥»÷»î¶¯Éæ¼°µ½ÈýÖÖÐÒ飬£¬£¬£¬£¬£¬°üÀ¨IPP¡¢JetDirectºÍLPD£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ´òÓ¡»úÁè¼Ý25Íǫ̀£¬£¬£¬£¬£¬£¬¶øÄ¿µÄIPµØµãµÄÊýĿԶԶÁè¼Ý200Íò¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹³Æ´Ë´ÎÐж¯ÊÇΪÁËÒýÆðÈËÃǶԴòÓ¡»úÎó²îµÄÖØÊÓ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/pewdiepie-hackers-launch-second-printer-siege-according-to-reports/139968/5¡¢Jenkins±»ÆØ±£´æÁ½¸öÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»½ÓÊÜ
CyberArkÇå¾²Ñо¿Ö°Ô±Åû¶ÁËJenkinsÖеÄÁ½¸öÇå¾²Îó²îµÄÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²î¶¼ÔÚ½ñÄêÑ×Ìì±»ÐÞ¸´£¬£¬£¬£¬£¬£¬µ«ÈÔÓÐÊýÒÔǧ¼ÆµÄÔÚÏßJenkinsЧÀÍÆ÷Ò×Êܹ¥»÷¡£¡£¡£¡£¡£¡£µÚÒ»¸öÎó²î£¨CVE-2018-1999001£©¿ÉÔÊÐí¹¥»÷Õßͨ¹ý¶ñÒâµÇ¼ƾ֤½«JenkinsЧÀÍÆ÷µÄconfig.xmlÉèÖÃÎļþ´ÓhomeÄ¿Â¼ÒÆ¶¯µ½ÆäËüλÖ㬣¬£¬£¬£¬£¬µ±JenkinsЧÀÍÖØÊÓÆôºó£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷½«Ê¹ÓÃĬÈÏÉèÖ㬣¬£¬£¬£¬£¬ÕâʹµÃÈκÎÈ˶¼¿ÉÒÔ×¢²á²¢»ñµÃÖÎÀíԱȨÏÞ¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÎó²î£¨CVE-2018-1999043£©ÔÊÐí¹¥»÷ÕßÔÚЧÀÍÆ÷ÄÚ´æÖжÌÔݵؽ¨ÉèÓû§¼Í¼£¬£¬£¬£¬£¬£¬²¢Ê¹ÓøÃÓû§¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/thousands-of-jenkins-servers-will-let-anonymous-users-become-admins/6¡¢TwitterÐÞ¸´Ò»¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíδÊÚȨ»á¼ûÖ±½ÓÐÂÎÅ
Ñо¿Ö°Ô±Terence Eden·¢Ã÷Twitter±£´æÒ»¸öbug£¬£¬£¬£¬£¬£¬ÆäOAuthÊÚȨ¶Ô»°¿òÏÔʾijЩµÚÈý·½Ó¦ÓÃÎÞ·¨»á¼ûÓû§µÄÖ±½ÓÐÂÎÅ£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÕâЩӦÓÿÉÒÔÔÚÓû§²»ÖªÇéµÄÇéÐÎÏ»á¼ûËûÃǵÄÖ±½ÓÐÂÎÅ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓëTwitterµÄ»ùÓÚPINµÄ¸¨ÖúÊÚȨ»úÖÆÓйأ¬£¬£¬£¬£¬£¬µ±µÚÈý·½Ó¦ÓÃͨ¹ýPIN»ñµÃÏìӦȨÏÞʱ£¬£¬£¬£¬£¬£¬ÕâЩȨÏÞ²¢Ã»ÓÐÔÚOAuthÊÚȨÐÅÏ¢ÖÐ׼ȷµØÏÔʾ³öÀ´¡£¡£¡£¡£¡£¡£TwitterÓÚ12ÔÂ6ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/twitter-fixes-bug-that-gives-unauthorized-access-to-direct-messages/ÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ