ά»ù½âÃÜÊ×´´È˱»²¶£»Apache TomcatÔ¶³Ì´úÂëÖ´Ðзì϶£»EMOTETй¥»÷»î¶¯

°ä²¼¹¦·ò 2019-04-12
1¡¢Î¬»ù½âÃÜÊ×´´ÈËJulian AssangeÔÚ¶ò¹Ï¶à¶ûפÂ×¶Ø´óʹ¹Ý±»²¶

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾
 
ά»ù½âÃÜÊ×´´È˰¢É£Ææ£¨Julian Assange£©ÔÚ¶ò¹Ï¶à¶ûפÂ×¶Ø´óʹ¹Ý±»²¶ £¬Ö®Ç°°¢É£ÆæÔøÔڸôóʹ¹Ý³öÍö³¤´ï7ÄêµÄ¹¦·ò ¡£Æ¾¾ÝÂ×¶Ø´ó³ÇÊо¯Ô±¾Ö°ä²¼µÄÒ»·Ý¼ò¶Ì×¢Ã÷ £¬ÔÚ¶ò¹Ï¶à¶ûµ±¾Ö³·»ØÆäÕþÖΰü±Óºó £¬Ó¢¹ú¾¯Ô±½øÈëʹ¹Ý½«°¢É£Ææ¿ÛÁô ¡£Ó¢¹ú¾¯·½°µÊ¾½«¾¡¿ìÈð¢É£ÆæÔÚÂ×¶ØÎ÷ÃôÇøµÄ·¨Í¥³öÍ¥ ¡£ÃÀ¹ú˾·¨²¿Ò²³Æ°¢É£Ææ½«Ãæ¶ÔÒý¶ÉËßËÏ ¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/04/wikileaks-julian-assange-arrested.html

2¡¢Apache TomcatÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-0232£©

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾
 
4ÔÂ10ÈÕApache¹Ù·½°ä²¼¹«¸æ³Æ½«ÔÚа汾Öн¨¸´Ô¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2019-0232£© ¡£ÓÉÓÚJREÔÚ½«²ÎÊý´«µÝµ½Windows»·¾³Ê±CGI ServletÖдæÔÚÊäÈëÑéÖ¤ÃýÎó £¬µ¼ÖÂÔ¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÒªÇóÒÔTomcatµÄȨÏÞÔÚϵͳÉÏ×¢ÈëºÍÖ´ÐÐËÁÒâOSºÅÁî ¡£ÊÜÓ°ÏìµÄTomcat°æ±¾Ô̺¬9.0.13¡¢9.0.14ºÍ9.0.16 ¡£Apache¹Ù·½ÉÐδ°ä²¼½¨¸´²¹¶¡ £¬µ«Óû§¿Éͨ¹ý½ûÓÃenableCmdLineArgumentsÑ¡Ïîһʱ½øÐзÀ»¤ ¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.cybersecurity-help.cz/vdb/SB2019041101?affChecked=1

3¡¢VSDC¹ÙÍøÔÙÔâºÚ¿ÍÈëÇÖ £¬±»ÓÃÓÚ·Ö·¢ÒøÐÐľÂíºÍÐÅϢ͵ÇÔľÂí

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾
 
Ãâ·ÑÊÓÆµ±à×ëÆ÷VSDCµÄ¹ÙÍøÔÙ´ÎÔâµ½ºÚ¿ÍÈëÇÖ £¬¹¥»÷Õß½Ù³ÖÁËÍøÕ¾ÉϵÄÈí¼þÏÂÔØÁ´½Ó £¬ÓÃÓÚ·Ö·¢ÒøÐÐľÂíWin32.Bolik.2ºÍÐÅϢ͵ÇÔľÂíTrojan.PWS.Stealer£¨KPOT Stealer£© ¡£Õâ²»ÊÇVSDC¹ÙÍøµÚÒ»´ÎÔâµ½ÈëÇÖ £¬¹¥»÷ÕßÔøÔÚ2018Äê6ÔºÍ7ÔÂÈëÇÖ¹ý¸ÃÍøÕ¾ £¬²¢½«Èí¼þÏÂÔØÁ´½Ó´úÌæÎªAZORult Stealer¡¢X-Key KeyloggerºÍDarkVNCºóÃŵÄÏÂÔØÁ´½Ó ¡£ÕâÒ»´ÎÈëÇÖ²úÉúÔÚ2ÔÂ21ÈÕÖÁ3ÔÂ23ÈÕÖ®¼ä £¬¹¥»÷ÕßÖØÒªÕë¶ÔÓ¢¹ú¡¢ÃÀ¹ú¡¢¼ÓÄôóºÍ°Ä´óÀûÑǵÄÓû§ £¬ÖÁÉÙÓÐ565ÃûÓû§Ï°È¾ÁËWin32.Bolik.2 £¬Áí±í83ÃûÓû§Ï°È¾ÁËKPOT Stealer ¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/vsdc-site-hacked-again-to-spread-password-stealing-malware/

4¡¢ÃÀ¹úDHSÖÒ¸æÓëAPT×éÖ¯LazarusÓйصÄжñÒâÈí¼þHoplight

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾
 
DHSºÍFBIÕë¶ÔÒ»¸öеĶñÒâÈí¼þHoplight°ä²¼ÖÒ¸æ £¬¸Ã¶ñÒâÈí¼þÓë³ôÃûÔ¶ÑïµÄ³¯ÏÊAPT×éÖ¯LazarusÓйØ ¡£HoplightÊÇPE32Îļþ £¬¿ÉÍøÂçÖ¸±êϵͳµÄÓйØÐÅÏ¢ £¬Ô̺¬OS°æ±¾¡¢¾íÐÅÏ¢¡¢ÏµÍ³¹¦·ò¼°Ã¶¾ÙÇý¶¯Æ÷ºÍ·ÖÇøÐÅÏ¢ ¡£Hoplight»¹ÓµÓÐÒÔÏÂÖ°ÄÜ£º¶ÁÈ¡¡¢Ð´ÈëºÍÒÆ¶¯Îļþ£»´´½¨ºÍɱËÀ¹ý³Ì£»¹ý³Ì×¢È룻´´½¨¡¢Æô¶¯ºÍÖÕ³¡·þÎñ£»Åú¸Ä×¢²á±í£»ÏνÓÔ¶³ÌÖ÷»ú£»ÉÏ´«ºÍÏÂÔØÎļþ ¡£¸Ã¶ñÒâÈí¼þʹÓú«¹úÍøÂ繫˾NaverµÄSSLÖ¤Êé½øÐÐͨѶ £¬²¢Ê¹ÓôúÀíÀ´»ìºÏÆä»î¶¯ ¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/us-government-warns-north-korean-1-1/

5¡¢³¬¹ý6Íò¸ö±»µÁÅäÖÃÎļþÔÚGenesis StoreÉÏÏúÊÛ

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾
 
¿¨°Í˹»ù×êÑÐÍŶӷ¢ÏÖ³¬¹ý6Íò¸ö±»µÁµÄÅäÖÃÎļþÔÚ°µÍøÊг¡Genesis StoreÉÏÏúÊÛ ¡£ÕâЩÅäÖÃÎļþÖÐÔ̺¬ä¯ÀÀÆ÷Ö¸ÎÆ¡¢Óû§µÇ¼ÃûºÍÃÜÂë¡¢cookies¼°ÐÅÓþ¿¨ÐÅÏ¢ £¬µ¥¸öÅäÖÃÎļþµÄÊÛ¼Û´Ó5µ½200ÃÀÔª²»µÈ ¡£Genesis Store»¹ÎªÓû§ÌṩÁËÒ»¸öÌØÊâµÄ.crx²å¼þ £¬¿ÉÔ®ÊÖ·¸×ï·Ö×ÓÀûÓÃÕâЩÅäÖÃÎļþ¼Ù×°³ÉºÏ·¨Óû§µÄÉí·Ý ¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83630/deep-web/genesis-store-fingerprints.html

6¡¢EMOTETй¥»÷»î¶¯ £¬ÖØÒªÕë¶ÔÖÇÀûµÄ½ðÈÚºÍÒøÐзþÎñ

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾
 
SI-LAB·¢ÏÖEMOTETµÄÐÂÒ»²¨¹¥»÷º£³±ÖØÒªÕë¶ÔÖÇÀûµÄ½ðÈÚºÍÒøÐзþÎñ £¬ÔÚ3ÔÂ18ÈÕÖÁ26ÈÕÆÚ¼äÒÑÓÐ176ÃûÊܺ¦ÕßÔâµ½¹¥»÷ ¡£¸Ã¹¥»÷»î¶¯ÈÔÒÔ´¹µöÓʼþµÄ´ó¾Ö½øÐÐ £¬µÚÒ»½×¶Î¿ªÊͶñÒâ¾ç±¾__Denuncia_Activa_CL.PDF.bat £¬¸Ã¾ç±¾¿ÉÈÆ¹ý°²È«½â¾ö¹æ»®µÄ¼ì²â ¡£µÚ¶þ½×¶ÎµÄ¶ñÒâÎļþdenuncias.rarÔòÀûÓÃÁËWinRARÖеÄACE·ì϶£¨CVE-2018-20250£©À´·Ö·¢EMOTET ¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/83620/breaking-news/emotet-targets-chile.html