ÐŰ²±êί¡¶ÍøÂçÇå¾²±ê׼ʵ¼ùÖ¸ÄÏ¡ªÔ¶³Ì°ì¹«Çå¾²·À»¤¡· £»£»£»£»2019Ä꿪Դ´úÂëÎó²îÊýÄ¿ÔöÌí½ü50£¥

Ðû²¼Ê±¼ä 2020-03-17

1.ÐŰ²±êί¡¶ÍøÂçÇå¾²±ê׼ʵ¼ùÖ¸ÄÏ¡ªÔ¶³Ì°ì¹«Çå¾²·À»¤¡·

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÌìÏÂÐÅÏ¢Çå¾²±ê×¼»¯ÊÖÒÕίԱ»áÃØÊé´¦Õë¶ÔÔ¶³Ì°ì¹«Çå¾²ÎÊÌ⣬ £¬£¬£¬£¬×éÖ¯Ïà¹Ø³§É̺ÍÇ徲ר¼Ò£¬ £¬£¬£¬£¬ÌåÀýÁË¡¶ÍøÂçÇå¾²±ê׼ʵ¼ùÖ¸ÄÏ¡ªÔ¶³Ì°ì¹«Çå¾²·À»¤¡·¡£¡£¡£ ¡£¡¶Êµ¼ùÖ¸ÄÏ¡·¸ø³öÁËÔ¶³Ì°ì¹«µÄµä·¶Ó¦Óó¡¾°£¬ £¬£¬£¬£¬ÆÊÎöÁËÔ¶³Ì°ì¹«¿ÉÄÜÃæÁٵİ칫ϵͳ×ÔÉíÇå¾²¡¢Êý¾ÝÇå¾²¡¢×°±¸Çå¾²ºÍСÎÒ˽¼ÒÐÅÏ¢± £»£»£»£»¤µÈΣº¦£¬ £¬£¬£¬£¬Õë¶ÔÔ¶³Ì°ì¹«ÏµÍ³µÄʹÓ÷½ºÍÓû§£¬ £¬£¬£¬£¬»®·Ö¸ø³öÁËÇå¾²¿ØÖƲ½·¥½¨Òé¡£¡£¡£ ¡£ÆäÖУ¬ £¬£¬£¬£¬Ê¹Ó÷½Ó¦ÔÚÖÎÀíºÍÊÖÒÕÁ½·½Ã濪չÇå¾²·À»¤£¬ £¬£¬£¬£¬½¡È«Ô¶³Ì°ì¹«ÖÎÀíÖÆ¶È£¬ £¬£¬£¬£¬ÔöÇ¿ÔËάÖÎÀí£¬ £¬£¬£¬£¬Ç¿»¯Çå¾²²½·¥¡£¡£¡£ ¡£Óû§Ó¦Ìá¸ß×ÔÉíÇå¾²Òâʶ£¬ £¬£¬£¬£¬ÖصãÕë¶Ô×°±¸¡¢Êý¾Ý¡¢ÇéÐεȷ½ÃæµÄÇ徲Σº¦¾ÙÐзÀ»¤¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.tc260.org.cn/upload/2020-03-13/1584090952093076364.pdf


2.2019Ä꿪Դ´úÂëÎó²îÊýÄ¿Ê×´ÎÁè¼Ý6000¸ö£¬ £¬£¬£¬£¬ÔöÌí½ü50£¥


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ƾ֤¿ªÔ´Çå¾²ÓëºÏ¹æ¹«Ë¾WhiteSourceµÄÒ»·Ý±¨¸æ£¬ £¬£¬£¬£¬È¥Ä꿪Դ´úÂëÖеÄÎó²î¼¤Ôö¡£¡£¡£ ¡£¸Ã±¨¸æ³Æ£¬ £¬£¬£¬£¬2017ÄêºÍ2018Ä꿪ԴÎó²îµÄÊýÄ¿ÎȹÌÔÚ4000¶à¸ö£¬ £¬£¬£¬£¬Óë2017Äê֮ǰ´ÓÎ´Í»ÆÆ2000¸öµÄÊý×ÖÏà±È£¬ £¬£¬£¬£¬Îó²îÊýÄ¿ÔöÌíÁËÒ»±¶ÒÔÉÏ¡£¡£¡£ ¡£È»ºóÔÚ2019Ä꣬ £¬£¬£¬£¬¿ªÔ´Îó²îÊýÄ¿ÔÙ´Îì­Éý£¬ £¬£¬£¬£¬Ê×´ÎÁè¼Ý6000¸ö£¬ £¬£¬£¬£¬Õâ´ú±íÁ˽ü50£¥µÄÔöÌí¡£¡£¡£ ¡£µ½ÏÖÔÚΪֹ¿ªÔ´Îó²îÖÐ×î³£¼ûµÄÀàÐÍÊÇ¿çÕ¾µã¾ç±¾£¨XSS£©£¬ £¬£¬£¬£¬¸ÃÀàÐÍÏÕЩռËùÓÐÎó²îµÄËÄ·ÖÖ®Ò»£¬ £¬£¬£¬£¬Æä´ÎÊÇÊäÈëÑéÖ¤²»×¼È·¡¢»º³åÇø¹ýʧ¡¢Ô½½ç¶ÁÈ¡ºÍÐÅϢй¶¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£º

https://nakedsecurity.sophos.com/2020/03/16/open-source-bugs-have-soared-in-the-past-year/


3.2020ÄêÔÆÉèÖùýʧ±¨¸æ£¬ £¬£¬£¬£¬ÒÑÍùÁ½Äêй¶330ÒÚÌõ¼Í¼


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ƾ֤DivvyCloudµÄ2020ÄêÔÆÉèÖùýʧ±¨¸æ£¬ £¬£¬£¬£¬2018ÄêºÍ2019ÄêÓнü334ÒÚÌõ¼Í¼ÒòÔÆÉèÖùýʧµ¼ÖÂй¶£¬ £¬£¬£¬£¬È«ÇòÆóÒµµÄ±¾Ç®Îª¿ìÒª5ÍòÒÚÃÀÔª¡£¡£¡£ ¡£´Ó2018Äêµ½2019Ä꣬ £¬£¬£¬£¬ÔÆÉèÖùýʧ̻¶µÄ¼Í¼ÊýĿͬ±ÈÔöÌíÁË80£¥£¬ £¬£¬£¬£¬ÓëÖ®Ïà¹ØµÄ¹«Ë¾×ܱ¾Ç®Ò²ÓÐËùÔöÌí¡£¡£¡£ ¡£²»ÐÒµÄÊÇ£¬ £¬£¬£¬£¬×¨¼ÒÃÇÔ¤¼ÆÕâÖÖÉÏÉýÇ÷ÊÆ½«Ò»Á¬ÏÂÈ¥£¬ £¬£¬£¬£¬ÓÉÓÚ¹«Ë¾¼ÌÐøÑ¸ËÙ½ÓÄÉÔÆÐ§À͵«Î´ÄÜʵÑéÊʵ±µÄÔÆÇå¾²²½·¥¡£¡£¡£ ¡£ElasticsearchÉèÖùýʧռËùÓÐй¶µÄ20£¥£¬ £¬£¬£¬£¬µ«ÕâЩÊÂÎñй¶µÄ¼Í¼ÊýĿռËùÓмͼµÄ44£¥¡£¡£¡£ ¡£´Ó2018Äêµ½2019Ä꣬ £¬£¬£¬£¬ÓÉElasticsearchÉèÖùýʧµ¼ÖµÄй¶ÊýÄ¿ÏÕЩÔöÌíÁËÁ½±¶¡£¡£¡£ ¡£S3´æ´¢Í°ÉèÖùýʧռËùÓÐй¶µÄ16£¥£¬ £¬£¬£¬£¬¿ÉÊÇÓë2018ÄêÏà±È£¬ £¬£¬£¬£¬2019ÄêÉèÖùýʧµÄS3ЧÀÍÆ÷ïÔÌ­ÁË45£¥¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.computerweekly.com/news/252478833/Cost-of-cloud-misconfigurations-set-at-5tn?&web_view=true


4.Android¸ú×ÙÈí¼þMonitorMinor£¬ £¬£¬£¬£¬¿É¸ú×ÙGmailÓû§»î¶¯


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¿¨°Í˹»ùÇ徲ר¼Ò·¢Ã÷ÐÂAndroid¸ú×ÙÈí¼þMonitorMinor£¬ £¬£¬£¬£¬Ëü¿ÉÒÔ¸ú×ÙGmail¡¢WhatsApp¡¢InstagramºÍFacebookµÄÓû§»î¶¯¡£¡£¡£ ¡£Ç徲ר¼Ò³ÆMonitorMinor±ÈÆä¼Ò×åµÄËùÓÐÏÖÓÐÈí¼þ¹¦Ð§¸üǿʢ£¬ £¬£¬£¬£¬ËüʹÓÃÁËSuperUserÀàÐ͵ÄÓ¦ÓóÌÐò£¨SUÊÊÓóÌÐò£©À´»ñµÃϵͳµÄroot»á¼ûȨÏÞ£¬ £¬£¬£¬£¬»¹¿ÉÒÔÌáÈ¡Éè±¹ØÁ¬Ä/data/system/gesture.keyÎļþ£¬ £¬£¬£¬£¬¸ÃÎļþ°üÀ¨ÁËÆÁÄ»½âËøÄ£Ê½/ÃÜÂëµÄ¹þÏ£Öµ¡£¡£¡£ ¡£MonitorMonor¹¥»÷Õß¿ÉÒÔʹÓÃËüÀ´½âËø×°±¸£¬ £¬£¬£¬£¬ÕâÊǵÚÒ»¸öʵÏִ˹¦Ð§µÄ¸ú×ÙÈí¼þ¡£¡£¡£ ¡£MonitorMinor»¹Ê¹ÓÃAccessibility Services APIÀ´×赲ĿµÄAPPÖеÄÊÂÎñ£¬ £¬£¬£¬£¬×ÝȻûÓÐrootȨÏÞ£¬ £¬£¬£¬£¬ËüÒ²¿ÉÒÔʹÓôËAPIÔÚËùÓÐ×°±¸ÉÏÓÐÓÃÔËÐС£¡£¡£ ¡£Æ¾Ö¤¿¨°Í˹»ùµÄ˵·¨£¬ £¬£¬£¬£¬¸Ã¸ú×ÙÈí¼þ´ó´ó¶¼×°ÖÃÔÚÓ¡¶È£¨14.71£¥£©¡¢Æä´ÎÊÇÄ«Î÷¸ç£¨11.76£¥£©¡¢µÂ¹ú¡¢É³Ìذ¢À­²®ºÍÓ¢¹ú£¨5.88£¥£©¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/monitorminor-vicious-stalkerware/95575/?utm_source=rss&utm_medium=rss&utm_campaign=monitorminor-vicious-stalkerware


5.Ñо¿ÍŶÓÐû²¼ÐÂÀÕË÷Èí¼þ¼Ò×åPXJµÄÆÊÎö±¨¸æ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


IBM X-ForceµÄÇ徲ר¼Ò·¢Ã÷ÁËÒ»ÖÖеÄÀÕË÷Èí¼þPXJ Ransomware£¬ £¬£¬£¬£¬Ö»¹Ü¸ÃÀÕË÷Èí¼þʵÏÖÁË´ó´ó¶¼ÀÕË÷Èí¼þ¹²ÓеĹ¦Ð§£¬ £¬£¬£¬£¬µ«ËüËÆºõ²¢Î´ÓëÒÑÖªµÄÀÕË÷Èí¼þ¼Ò×å¹²Ïíµ×²ã´úÂë¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÔÚ2ÔÂ29ÈÕÊ״η¢Ã÷ÁËPXJ£¬ £¬£¬£¬£¬ÆäʱÓÐÁ½¸öÑù±¾±»ÉÏ´«µ½VirusTotal¡£¡£¡£ ¡£PXJµÄÃû³ÆÀ´×Ô¸½¼Óµ½¼ÓÃÜÎļþµÄÀ©Õ¹Ãû£¬ £¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÒ²±»³ÆÎªXVFXGW£¬ £¬£¬£¬£¬À´×ÔÓÚ¶ñÒâÈí¼þ½¨ÉèµÄ¡°XVFXGW DOUBLE SET¡±¼°ÀÕË÷Ʊ¾ÝÖаüÀ¨µÄµç×ÓÓʼþµØµã£¨¡°xvfxgw3929@protonmail.com¡±ºÍ¡°xvfxgw213@decoymail.com¡±£©¡£¡£¡£ ¡£PXJʹÓÃAESºÍRSAËã·¨À´¼ÓÃÜÊý¾Ý¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÔÚ±¨¸æÖÐÆÊÎöÁËÓйØPXJµÄÊÖÒÕϸ½Ú£¬ £¬£¬£¬£¬°üÀ¨ÈëÇÖÖ¸±ê£¨IoC£©¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityintelligence.com/posts/pxj-ransomware-campaign-identified-by-x-force-iris/


6.ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©ÔâDDoS¹¥»÷


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©ÓÚÖÜÈÕÔâµ½DDoS¹¥»÷£¬ £¬£¬£¬£¬µ«¸Ã»ú¹¹ÌåÏÖÊÂÎñ²¢Î´Ôì³ÉÈκÎÖØ´óÆÆË𡣡£¡£ ¡£Ê״ᨵÀÕâÒ»ÊÂÎñµÄÅí²©Éç×î³õʹÓÃÁË¡°ÍøÂçÈëÇÖ¡±Ò»´Ê£¬ £¬£¬£¬£¬µ«ØÊºó½«Æä´ÓÎÄÕÂÕýÎÄÖÐɾ³ý-µ«ÈÔÈ»±£±£´æ¸±ÎÊÌâÖС£¡£¡£ ¡£¡¶»ªÊ¢¶ÙÓʱ¨¡·³ÆHSµÄÍøÕ¾ÏÖʵÉÏ´ÓδÒòÕâ´Î¹¥»÷¶øÍ߽⡣¡£¡£ ¡£Æ¾Ö¤Ò»Ð©±¨µÀ£¬ £¬£¬£¬£¬¹¥»÷¿ÉÄÜÊÇÓÉÍâ¹ú¹¥»÷ÕßÌᳫµÄ£¬ £¬£¬£¬£¬ÆäÄ¿µÄÊÇÆÆËðHHS¶ÔCOVID-19Î £»£»£»£»úµÄ·´Ó¦£¬ £¬£¬£¬£¬µ«ÕâÒ»ÀíÂÛÉÐδ»ñµÃ֤ʵ¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/hhs-says-ddos-attack-failed-cause-disruption