¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20190312

°ä²¼¹¦·ò 2019-03-12
1¡¢StackStormзì϶£¨CVE-2019-9580£©£¬¿Éµ¼ÖÂXSS¹¥»÷

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


°²È«×êÑÐÈËÔ±Barak TawilyÔÚ¿ªÔ´×Ô¶¯»¯Æ½Ì¨StackStormÖз¢ÏÖÒ»¸öÑϳÁ·ì϶£¬¸Ã·ì϶£¨CVE-2019-9580£©¿Éµ¼ÖÂXSS¡£Æ¾¾ÝTawilyµÄÃèÊö£¬¸Ã·ì϶ÓëStackStorm REST APIδÕýÈ·´¦ÖÃCORS£¨¿çÔ´×ÊÔ´¹²Ïí£©µÄ±êÍ·ÓйØ£¬¿Éµ¼ÖÂÕë¶ÔStackStorm APIµÄXSS¹¥»÷¡£StackStorm¿ª·¢ÍŶÓÔÚа汾2.9.3ºÍ2.10.3Öн¨¸´ÁËÕâ¸ö·ì϶£¬½¨ÒéÓû§¾¡¿ì½øÐиüС£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/03/stackstorm-security-vulnerability.html

2¡¢Moxa½¨¸´EDSºÍIKS¹¤Òµ»¥»»»úÖеĶà¸ö°²È«·ì϶

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Positive Technologies×êÑÐÍŶӷ¢ÏÖMoxaµÄEDS-405A¡¢EDS-408AºÍEDS-510A¹¤Òµ»¥»»»ú´æÔÚ5¸ö·ì϶£¬·ì϶ÁìÓòÔ̺¬Ã÷ÎÄ´æ´¢ÃÜÂë¡¢»á»°ID¿ÉÔ¤²â¡¢Ãô¸ÐÊý¾Ý¶Ìȱ¼ÓÃÜ¡¢²»×㱩Á¦¹¥»÷·À»¤»úÔìÒÔ¼°¿Éµ¼ÖÂDoSµÄÒ»¸ö·ì϶¡£´Ë±í£¬Moxa IKS-G6824A¹¤Òµ»¥»»»úÖдæÔÚ7¸ö·ì϶£¬Ô̺¬¿Éµ¼ÖÂRCEµÄ»º³åÇøÒç³ö¡¢Ã÷ÎÄ´æ´¢ÃÜÂë¡¢XSS¡¢DoS¡¢CSRF¡¢ÄÚ´æÐ¹Â¶ºÍWeb½çÃæµÄ²»ÕýÈ·½Ó¼û½ÚÔì¡£¸Ã¹©¸øÉÌÒѾ­°ä²¼ÁËÓйؽ¨¸´²¹¶¡¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82269/security/moxa-industrial-switches-flaws.html

3¡¢Check Point°ä²¼2ÔÂÈ«ÇòÍþвָÊý£¬CoinhiveÈÔ¾ÉÁìÅÜ

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

ƾ¾ÝCheck Point¼ÙÔìµÄ2ÔÂÈ«ÇòÍþвָÊý£¬¹ÌÈ»CoinhiveÒÑÓÚ3ÔÂ8ÈÕÖÕ³¡ÔËÓª£¬µ«ËüÔÚ2Ô·ÝÈÔÅÅÃû°ñÊס£Ëæ×ÅÃÅÂÞ±Ò¼ÛÖµµÄ×ÅÂ䣬CoinhiveµÄÍþвֵҲ´Ó2018Äê10ÔµÄ18%µøÖÁ2019Äê1ÔµÄ12£¥ºÍ2ÔµÄ10%¡£Í¬ÑùÔÚ2Ô·Ý£¬×êÑÐÈËÔ±¼ì²âµ½Õë¶ÔÈÕ±¾¡¢µÂ¹ú¡¢¼ÓÄôóºÍ°Ä´óÀûÑǵȹú¶ÈµÄGandCrab V5.2·Ö·¢»î¶¯¡£Õâ¸öеıäÖÖÔÙ´ÎʹµÃ֮ǰ°æ±¾µÄ½âÃܹ¤¾ß²»Æð×÷Óá£2Ô·ÝÅÅÃûǰÈýµÄÒÆ¶¯¶ñÒâÈí¼þÊÇLotoor¡¢HiddadºÍTriada¡£

  

Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2019/03/11/february-2019s-most-wanted-malware-coinhive-quits-gandcrab-cryptomining-ransomware/

4¡¢·¸×ïÍÅ»ïAlarg53ÀûÓÃJoomlaкóÃÅ·Ö·¢À¬»øÓʼþ

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

Check Point×êÑÐÍŶӷ¢ÏÖ°£¼°·¸×ïÍÅ»ïAlarg53ÔÚÀûÓÃJoomlaÖеÄкóÃÅÀ´Ö´ÐÐÀ¬»øÓʼþ¹¥»÷¡£¹¥»÷ÕßÀûÓÃJoomlaµÄÓʼþ·þÎñJmail£¬Í¨¹ýÔÚHTTPÒªÇóÖжÔUser-Agent×Ö¶Î×¢Èë¶ñÒâ´úÂëÀ´Ö´Ðй¥»÷¡£ÔÚ´Óǰ¼¸ÄêÖУ¬Alarg53ÔøÈëÇÖ³¬¹ý1.5Íò¸öÍøÕ¾£¬Æä¹¥»÷Ö¸±êº­¸ÇÃÀ¹ú¡¢Ä«Î÷¸ç¡¢ÆÏÌÑÑÀ¡¢Ó¢¹ú¡¢·¨¹ú¡¢Ó¡¶ÈºÍÈÕ±¾µÈ¹ú¶È£¬ÖØÒªÕë¶Ô½ðÈÚ»ú¹¹¡¢ÒøÐк͵±¾Ö»ú¹¹¡£

  

Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/jmail-breaker-profiting-from-joomlas-mail-service/

5¡¢ÐµÄATM skimmer¹¥»÷£¬¿É½Ù³ÖATMÄÚÖÃÉãÏñÍ·

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

ƾ¾ÝKrebs on SecurityµÄÒ»·Ýл㱨£¬×êÑÐÈËÔ±Ôڵ¿ËÈøË¹ÖݺÕË¹ÌØÊеÄATMÉÏ·¢ÏÖÁËеÄskimmer¹¥»÷£¬¹¥»÷Õßͨ¹ý½Ù³ÖATMÖÐÄÚÖõÄÉãÏñÍ·ÒÔÇÔÈ¡Óû§µÄPINÂë¡£¸ÃskimmerÔ̺¬Ò»¸öÉãÏñÍ·²¿¼þ£¬ÓÃÓÚ¸²¸ÇÔÚATMÄÚÖõݲȫÉãÏñÍ·ÉÏÃæ£¬Óû§ºÜÄÑ´Ó±í²¿¿´µ½¸Ãskimmer¡£

  

Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/new-atm-skimming-attack-enables-scammers-to-hijack-the-atms-in-built-camera-and-steal-a-users-pin-3d2c4884

6¡¢×êÑÐÍŶӰ䲼¹ØÓÚ¶ñÒâÈí¼þPredator v3.0.7µÄ·ÖÎö»ã±¨

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


¿¨°Í˹»ù×êÑÐÍŶӷ¢ÏÖ¶ñÒâÈí¼þPredatorµÄбäÖÖv3.0.7¡£PredatorʹÓÃC++±àд£¬ÔÚ¶íÂÞ˹µØÏÂÂÛ̳ÉÏÒÔ±ãÒ˵ļÛÖµ£¨2000¬²¼£¬Ô¼30ÃÀÔª£©½øÐÐÏúÊÛ£¬ÖØÒªÓÃÓÚÇÔÈ¡Óû§µÄÊý¾Ý¡£PredatorѡȡÁËһЩµ¥Ò»µÄ´úÂë»ìºÏ¼¼Êõ£¬Ô̺¬XOR¡¢Base64¡¢´úÌæ¡¢Õ»×Ö·û´®µÈ¡£ÐµıäÖÖ»¹Ôö³¤Á˶ÔEdgeºÍIEä¯ÀÀÆ÷µÄÖ§³Ö¡£Âô¼Òͨ¹ýTelegramÏòÂò¼ÒÌṩ¸üзþÎñ¡£

  

Ô­ÎÄÁ´½Ó£º

https://securelist.com/a-predatory-tale/89779/

ÉêÃ÷£º±¾×ÊѶÓɱ¦ÔËÀ³¹Ù·½ÍøÕ¾Î¬ËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù