¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20190215

°ä²¼¹¦·ò 2019-02-15
1¡¢VallettaÒøÐÐÔâºÚ¿Í¹¥»÷£¬¹¥»÷ÕßÊÔͼÇÔÈ¡1300ÍòÅ·Ôª

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

Âí¶úËûVallettaÒøÐÐÔâµ½ºÚ¿Í¹¥»÷£¬¹¥»÷ÕßÊÔͼ½«1300ÍòŷԪתÈëÓ¢¹ú¡¢ÃÀ¹ú¡¢½Ý¿Ë¹²ºÍ¹úºÍÏã¸ÛÒøÐеÄÕË»§¡£ÕâЩÂòÂôÔÚ30·ÖÖÓÄÚ±»×èÖ¹£¬µ«¹¥»÷ÕßÊÇ·ñÒѾ­»ñµÃ×ʽðÉÐδµÃµ½Ö¤Êµ¡£¸ÃÒøÐÐÒѾ­¹Ø¹ØÁËÆäϵͳ£¬²¢ÁÙʱÖÕ³¡ÁËËùÓÐÒµÎñ¡£Æ¾¾ÝÂí¶úËûʱ±¨µÄ±¨Â·£¬ÕâÆð¹¥»÷ÊÂÎñ²úÉúÔÚ±¾ÖÜÈýÉÏÎç¡£¸ÃÒøÐаµÊ¾£¬Ã»Óпͻ§ÕË»§¼°Æä×ʽðÊܵ½ÇÖº¦¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2019/02/14/bank-of-valletta-cyber-attack/

2¡¢Á¬Ëø²ÍÌüTruluckÔâºÚ¿ÍÈëÇÖ£¬²¿Ãſͻ§µÄÖ§¸¶ÐÅϢй¶

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ÐÝ˹¶ÙÁ¬Ëø²ÍÌüTruluck¡¯s Seafood, Steak & Crab House²úÉúÊý¾Ýй¶ÊÂÎñ£¬²¿Ãſͻ§µÄÐÅÓþ¿¨ÐÅÏ¢±»ÇÔ¡£ÕâÒ»ÊÂÎñÓ°ÏìÁËλÓÚAustin¡¢Houston¡¢Naples¡¢SouthlakeºÍChicagoµÄ8¼Ò²ÍÌü¡£¸ÃÊÂÎñ²úÉúÔÚ2018Äê11ÔÂ21ÈÕÖÁ12ÔÂ8ÈÕÆÚ¼ä£¬Æ¾¾ÝTruluckµÄ˵·¨£¬¹¥»÷ÕßÔÚÊÜÓ°Ïì²ÍÌüµÄPoSϵͳÖÐÖ²ÈëÁ˶ñÒâÈí¼þ£¬ÒÔÇÔÈ¡¿Í»§µÄÐÅÓþ¿¨ÐÅÏ¢¡£¸Ã¹«Ë¾»¹³ÆÐ¹Â¶µÄÐÅÏ¢Öв»Ô̺¬ÈκÎÐÕÃûºÍµØÖ·ÐÅÏ¢¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/trulucks-seafood-steak-crab-house-reports-data-breach-at-8-of-its-restaurants-b1fccc72

3¡¢0patch.com°ä²¼OpenOffice´úÂëÖ´ÐÐ0dayµÄ½¨¸´²¹¶¡

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

0patch.comÍÆ³öOpenOfficeÁãÈÕ·ì϶£¨CVE-2018-16858£©µÄ½¨¸´²¹¶¡¡£¸Ã·ì϶ÊÇÓɰ²È«×êÑÐÔ±AlexInf¨¹hr·¢Ïֵģ¬¿ÉÓÃÓÚÌáÒéĿ¼±éÀú¹¥»÷£¬Ó°ÏìÁËOpenOfficeµÄËùÓа汾ºÍLibreOfficeµÄ°æ±¾6.0.6/6.1.2.1¡£LibreOfficeÒѾ­ÔÚа汾6.0.7/6.1.3Öн¨¸´Á˸÷ì϶¡£¹ÌÈ»¸Ã·ì϶ӰÏìÁËOpenOfficeµÄLinuxºÍWindows°æ±¾£¬µ«0patchÍÆ³öµÄ½¨¸´²¹¶¡Ö»Õë¶ÔWindowsƽ̨¿ÉÓá£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/openoffice-zero-day-code-execution-flaw-gets-free-micropatch/

4¡¢Î÷ÃÅ×Ó½¨¸´SICAM 230ÖеÄÔ¶³Ì´úÂëÖ´ÐкÍÌáȨ·ì϶

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

Î÷ÃÅ×ÓSICAM 230½ÚÔìϵͳ±»¿í·ºÓÃÓÚICSÀûÓã¬ÀýÈ繫ÓÃÊÂÒµµÄ¼¯³ÉÄÜԴϵͳÒÔ¼°ÖÇÄܵçÍøµÄ¼à¿ØÏµÍ³µÈ¡£Æ¾¾ÝÎ÷ÃÅ×Ó°ä²¼µÄ°²È«²¼¸æ£¬SICAM 230´æÔÚ¶ÑÒç³öµ¼ÖµÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2018-3991£©»ººÍ³åÇøÒç³öµ¼ÖµÄÌáȨ·ì϶£¨CVE-2018-3990£©¡£´Ë±í£¬Î÷ÃÅ×Ó¹²°ä²¼ÁË16¸ö°²È«²¼¸æ£¬½¨¸´Á˶à¸ö·ì϶£¬ÆäÖÐÔ̺¬EN100ÒÔÌ«ÍøÍ¨Ñ¶Ä£¿éºÍSIPROTEC 5¼ÌµçÆ÷ÖеÄ3¸ö¿Éµ¼ÖÂDoSµÄ·ì϶£¨CVE-2018-16563¡¢CVE-2018-11451ºÍCVE-2018-11452£©¡£½¨ÒéÓû§¾¡¿ì×°ÖÃÓйزúÆ·µÄ¸üС£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/siemens-critical-remote-code-execution/141768/

5¡¢Õë¶ÔmacOSµÄShlayerľÂí£¬¿É½ûÓÃGatekeeper±£»¤»úÔì

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

Carbon BlackµÄTAU×êÑÐÍŶӷ¢ÏÖÕë¶ÔmacOSµÄShlayerľÂíµÄбäÖÖ£¬¸Ã±äÖÖͨ¹ý¶ñÒâFlash¸üнøÐзַ¢£¬¿ÉÓ°ÏìmacOS°æ±¾10.10.5µ½10.14.3¡£×êÑÐÍŶÓÖ¸³ö£¬¸Ã±äÌåѡȡÁ˶à²ã»ìºÏ£¬²¢ÇÒ¿ÉÄܽøÐÐÌáȨ¡£¸Ã±äÌ廹»á½ûÓÃmacOSÉϵÄGatekeeper±£»¤»úÔìÀ´ÔËÐеڶþ½×¶Îpayload¡£¸Ã±äÌåµÄ´óÎÞÊýÑù±¾¶¼ÊÇDMGÎļþ£¬Ò»Ð©Ñù±¾»¹Ê¹ÓúϷ¨µÄApple¿ª·¢ÕßID½øÐÐÊðÃû¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/new-shlayer-variant-disables-gatekeeper-protection-mechanism-to-run-second-stage-payloads-cce39f23

6¡¢ÐÂLinuxľÂíSpeakUp£¬ÖØÒªÕë¶Ô¶«ÑǺÍÀ­¶¡ÃÀÖÞ

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Check Point×êÑÐÈËÔ±·¢ÏÖÒ»¸öеÄLinuxºóÃÅľÂíSpeakUp£¬¸ÃľÂíÀûÓÃÁËÁùÖÖ·ÖÆçLinux¿¯ÐаæÖеÄÒÑÖª·ì϶£¬ÆäÖ¸±êÖØÒªÊǶ«ÑǺÍÀ­¶¡ÃÀÖ޵ķþÎñÆ÷£¬Ô̺¬AWSÍйܵķþÎñÆ÷¡£SpeakUpµÄ³õʼϰȾÏòÁ¿ÊÇ×î½ü»ã±¨µÄThinkPHPÖеķì϶¡£¹ÌÈ»SpeakUp±³ºóµÄ¹¥»÷ÕßµÄÉí·ÝÉв»Ã÷È·£¬µ«×êÑÐÈËÔ±·¢ÏÖSpeakUpÓëZettabit´æÔںܶ๲֮ͬ´¦¡£¸ü¶àIoCÖ¸±êÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£

  

Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/speakup-a-new-undetected-backdoor-linux-trojan/


ÉêÃ÷£º±¾×ÊѶÓɱ¦ÔËÀ³¹Ù·½ÍøÕ¾Î¬ËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù