MITRE CWE 4.0°æÐÂÔöÓ²¼þ°²È«·ì϶ £»Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ

°ä²¼¹¦·ò 2020-02-28

1.MITRE°ä²¼°²È«·ì϶ÁбíCWE 4.0°æ£¬ÐÂÔöÓ²¼þ°²È«·ì϶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Mitre°ä²¼³£¼û°²È«·ì϶ÁбíCWE 4.0°æ£¬¸ÃÁбíÒÑÀ©´óΪº­¸ÇÓ²¼þ°²È«·ì϶£¬ÆäÖÐÔ̺¬£ºÔì×÷ºÍÐÔÃüÖÜÆÚÖÎÀíÎÊÌâ £»°²È«Á÷³ÌÎÊÌâ £»¼¯³ÉÎÊÌâ £»È¨ÏÞ·ÖÀëºÍ½Ó¼û½ÚÔìÎÊÌâ £»Í¨³£µç·ºÍÂß¼­Éè¼ÆÎÊÌâ £»Ö÷ÌâºÍÍÆËãÎÊÌâ £»ÄÚ´æºÍ´æ´¢ÎÊÌâ £»±íΧÉ豸¡¢Æ¬ÉϽṹºÍ½Ó¿Ú/IOÎÊÌâ £»°²È«Ô­ÓïºÍ¼ÓÃÜÎÊÌâ £»µçÔ´¡¢Ê±ÖӺ͸´Î»ÎÊÌâ £»µ÷ÊԺͲâÊÔÎÊÌâ £»¿çÁìÓòÎÊÌâ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/02/27/hardware-security-weaknesses/


2.Magecart¹¥»÷ÕßÀûÓÃαÔìµÄCDNÀ´Èƹý¼ì²â


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Magecart¹¥»÷ÕßÀûÓÃαÔìµÄÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©ÓòÃûÀ´Èƹý¼ì²â ¡£Malwarebytes LabsµÄ°²È«×êÑÐÈËÔ±·¢ÏÖ£¬¸ÃMagecart¶ñÒâ¾ç±¾¼Ù×°³ÉºÏ·¨µÄjQuery¿â£¬²¢ÇÒͨ¹ýαÔìµÄCDNÓòÃû´«²¼£¬ÆäÒªÇóÀàËÆÓÚ//cdn-sources.org/jquery.unveil.js£¬ÁíÒ»¸öαÔìµÄCDNÓòÃûÒªÇóΪ//cdn-mediafiles.org/cache.php ¡£¹¥»÷ÕßʹÓÃÃâ·ÑµÄngrok·þÎñ£¨¿É´´½¨°²È«Ëí·µÄ·´Ïò´úÀíÈí¼þ£©À´ÍøÂç±»µÁµÄÊý¾Ý£¬Õâͨ³£Ô̺¬¹ºÎïÕßµÄÐÕÃû¡¢µØÖ·¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÐÅÓþ¿¨ÐÅÏ¢ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/credit-card-skimmer-uses-fake-cdns-to-evade-detection/


3.Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ£¬ÒÉΪ¹ú¶ÈÖ§³Ö


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Sophos×êÑÐÈËÔ±·¢ÏÖÕë¶ÔÔÆ·þÎñÆ÷µÄCloud Snooper¹¥»÷»î¶¯£¬¹¥»÷ÕßÄܹ»ÈƹýÖ¸±ê×éÖ¯µÄAWSºÍÆä·À»ðǽ£¬²¢¿ªÊÍÔ¶¿ØÄ¾Âí ¡£×êÑÐÈËÔ±Ôڲ鳭ÔËÐÐÔÚAWSÖеÄÊÜϰȾLinuxºÍWindows EC2ÔÆ·þÎñÆ÷ʱ·¢ÏÖÁ˴˹¥»÷ ¡£Sophos°µÊ¾ÕâÖÖ¹¥»÷ºÜ¿ÉÄÜÊǹú¶ÈÖ§³ÖµÄ¹¥»÷£¬ËüʹÓõÄRootkit²»½öʹ¹¥»÷ÕßÄܹ»Ô¶³Ì½ÚÔì·þÎñÆ÷£¬²¢ÇÒ»¹Îª¶ñÒâÈí¼þÌṩÁËÓëÆäC2·þÎñÆ÷½øÐÐͨѶµÄÇþ· ¡£Sophos»Ø¾øÐ¹Â©Êܺ¦×éÖ¯£¬µ«°µÊ¾Õâ´Î¹¥»÷ËÆºõÊǹ©¸øÁ´¹¥»÷£¬Æä·Ö·¢µÄRATÊÇ»ùÓÚGh0st RATµÄÔ´´úÂë ¡£


Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171


4.RiskIQ°ä²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ»ã±¨¡·


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


RiskIQ°ä²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ»ã±¨¡·£¬¸Ã»ã±¨Ö¸³öÒÆ¶¯Éú̬ϵͳÔÚ´ó·ùÔö³¤£¬µ«¹È¸èµÄÖÂÁ¦Ê¹µÃ¶ñÒâAPPµÄÊýÁ¿±ÉÈ˽µ ¡£2018Äê¸Ã»ã±¨Í³¼ÆµÄºÚÃûµ¥ÀûÓÃÊýÁ¿Îª213279¸ö£¬¶øÔÚ2019Äê¸ÃÊý×ÖΪ170796¸ö£¬½µÂäÁË20% ¡£Òƶ¯APPÒÀÈ»ÊÇÆóÒµ¹¥»÷ÃæµÄ³ÁÒª×é³É²¿ÃÅ£¬ÓÈÆä³¤¶Ì¹Ù·½ÆðÔ´µÄAPP£¬¸Ã»ã±¨»¹Í³¼ÆÁË2019ÄêºÚÃûµ¥APP×î¶àµÄ6¸öÀûÓÃÉ̵ê ¡£


Ô­ÎÄÁ´½Ó£º

https://www.riskiq.com/blog/external-threat-management/2019-mobile-app-threat-landscape-report/


5.ÐÂÒøÐÐľÂíCerberus¿ÉÇÔÈ¡Google AuthenticatorÑéÖ¤Âë


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


AndroidÒøÐÐľÂíCerberusµÄбäÌå¿ÉÄÜÇÔÈ¡Google AuthenticatorÌìÉúµÄÒ»´ÎÐÔÑéÖ¤Â루OTP£©£¬²¢Èƹý2FA± £»¤½Ó¼ûÓû§µÄÒøÐÐÕË»§ ¡£GoogleÓÚ2010ÄêÍÆ³öÁËAuthenticator£¬¸ÃÀûÓÃÊÇΪÁË´úÌæ¶ÌÐÅÑéÖ¤Âë ¡£ºÉÀ¼Òƶ¯°²È«¹«Ë¾ThreatFabricµÄ°²È«×êÑÐÈËÔ±ÔÚCerberusµÄ×îÐÂÑù±¾Öз¢ÏÖÁËAuthenticator OTPÇÔȡְÄÜ£¬¸ÃľÂíÀÄÓÃAccessibilityÌØÈ¨À´»ñµÃAuthenticator½çÃæµÄÄÚÈݲ¢½«Æä·¢Ë͵½C2·þÎñÆ÷ ¡£×êÑÐÈËÔ±ÒÔΪ¸Ã±äÌåÈÔ´¦ÓÚ²âÊԽ׶Σ¬µ«¿ÉÄܺܿì¾Í»á°ä²¼ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/


6.Ó¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGR±»ÍϿ⣬ÒÑÔÚºÚ¿ÍÂÛ̳´«²¼


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ºÚ¿ÍÔÚµØÏÂÂÛ̳ÉϹ²ÏíÓ¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGRµÄSQLת´¢£¬¾Ý³Æ¸ÃÊý¾Ý¿âÊǴӿɹ«¿ª½Ó¼ûµÄAWS S3´æ´¢Í°»ñÈ¡µÄ ¡£Æ¾¾Ý°ä²¼ÏÂÔØÁ´½ÓµÄºÚ¿ÍÂÛ̳³ÉÔ±µÄ˵·¨£¬¸ÃÊý¾Ý¿âÔ̺¬ÖÁÉÙ3.6Íò·âµç×ÓÓʼþºÍÓйØÊÜÓ°ÏìÍøÕ¾£¨tradinggame.au.com¡¢bgr.inºÍS3 Production£©µÄµÇ¼ÐÅÏ¢£¬×ܹ²ÔÚ7¸öZIPÎļþÖд浵ÁË16¸öSQLת´¢ ¡£Î´¾­Ñ¹ËõµÄÊý¾Ý¿â×Ü´óÓ×Ϊ21.5GB ¡£Under Breach×êÑÐÈËÔ±Ö¸³öÕâÊÇÒ»¸öÆëÈ«µÄSQLת´¢£¬ÆäÖÐÔ̺¬Óû§Ãû¡¢µç×ÓÓʼþºÍ¹þÏ£ÃÜÂëµÈÐÅÏ¢ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sql-dump-from-bgr-india-shared-on-hacker-forum/