ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ50ÖÜ
°ä²¼¹¦·ò 2019-12-23>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2019Äê12ÔÂ16ÈÕÖÁ22ÈÕ¹²ÊÕ¼°²È«·ì϶47¸ö£¬£¬ÖµµÃ¹Ø×¢µÄÊÇApache Log4j·´ÐòÁл¯´úÂëÖ´Ðзì϶; Citrix Application Delivery ControllerËÁÒâ´úÂëÖ´Ðзì϶£»TRENDnet TEW-651BR»º³åÇøÒç³ö´úÂëÖ´Ðзì϶£»Google Chrome media pickerÄÚ´æÃýÎóÒýÓ÷ì϶£»Joomla! configuration SQL×¢Èë·ì϶¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ¿¨°Í˹»ù°ä²¼2019ÄêÍøÂçÍþвµÄͳ¼ÆÊý¾Ý»ã±¨£»ÃÀ¹úÖÚÒéԺͨ¹ý¡¶±£ÏÕÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·£»LightInTheBoxй¶1.3TB Web·þÎñÆ÷ÈÕÖ¾£»MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷Ïò£»Gangnam Industrial Style¶Ô×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾¡£¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬±¾Öܰ²È«ÍþвΪÖС£¡£
>ÖØÒª°²È«·ì϶Áбí
1. Apache Log4j·´ÐòÁл¯´úÂëÖ´Ðзì϶
Apache Log4j´æÔÚSocket Server·´ÐòÁл¯·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://vigilance.fr/vulnerability/Apache-Log4j-1-2-code-execution-via-Socket-Server-Deserialization-31193
2. Citrix Application Delivery ControllerËÁÒâ´úÂëÖ´Ðзì϶
Citrix Application Delivery Controller´æÔÚδÃ÷°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://www.auscert.org.au/bulletins/ESB-2019.4708/
3. TRENDnet TEW-651BR»º³åÇøÒç³ö´úÂëÖ´Ðзì϶
TRENDnet TEW-651BR 'ccp_act'²ÎÊý´¦ÖôæÔÚ»º³åÇøÒç³ö·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄ'get_set.ccp' POSTÒªÇ󣬣¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-11400
4. Google Chrome media pickerÄÚ´æÃýÎóÒýÓ÷ì϶
Google Chrome media picker´æÔÚ¿ªÊͺóʹÓ÷ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇ󣬣¬ÓÕʹÓû§½âÎö£¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop_17.html
5. Joomla! configuration SQL×¢Èë·ì϶
Joomla! configuration²ÎÊý´¦ÖôæÔÚÊäÈëÑéÖ¤·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇ󣬣¬²Ù×÷Êý¾Ý¿â£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://www.auscert.org.au/bulletins/ESB-2019.4713/
>ÖØÒª°²È«ÊÂÎñ×ÛÊö
1¡¢¡¢¿¨°Í˹»ù°ä²¼2019ÄêÍøÂçÍþвµÄͳ¼ÆÊý¾Ý»ã±¨
¿¨°Í˹»ù°ä²¼2019ÄêÍøÂçÍþвͳ¼ÆÊý¾Ý»ã±¨£¬£¬¸Ã»ã±¨ÊÇ»ùÓÚ2018Äê11Ôµ½2019Äê10ÔÂÆÚ¼ä´ÓÈ«Çò203¸ö¹ú¶ÈºÍµØÓòµÄKSNÓû§ÍøÂçµÄ¶ñÒâ»î¶¯Êý¾Ý¡£¡£Ôڻ㱨ÆÚ¼ä£¬£¬ÓÐ19.8%µÄÓû§ÍÆËã»úÖÁÉÙÔâ·êÒ»´Î¶ñÒâÈí¼þÀà´ËÍâÍøÂç¹¥»÷¡£¡£¿£¿£¿¨°Í˹»ù°²È«½â¾ö¹æ»®×èÖ¹ÁËÀ´×ÔÈ«ÇòÔÚÏß×ÊÔ´µÄ9.7Òڴι¥»÷¡£¡£Web·´²¡¶¾×é¼þ¼ø±ð³ö2.7ÒÚ¸ö·ÖÆçµÄ¶ñÒâURL¡£¡£ÍøÂç·À²¡¶¾Èí¼þ¼ì²âµ½2461Íò¸ö·ÖÆçµÄ¶ñÒâÑù±¾¡£¡£75.5Íò¸öÓû§ÍÆËã»úÔâµ½ÀÕË÷Èí¼þ¹¥»÷¡£¡£226ÍòÓû§ÍÆËã»úÔâµ½¶ñÒâÍÚ¿ó¹¥»÷¡£¡£¿£¿£¿¨°Í˹»ù°²È«½â¾ö¹æ»®ÔÚ76.6Íǫ̀É豸ÉÏ×èÖ¹ÁËÕë¶ÔÔÚÏßÒøÐÐÕË»§µÄ¶ñÒâÈí¼þ¹¥»÷¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/kaspersky-security-bulletin-2019-statistics/95475/
2¡¢¡¢ÃÀ¹úÖÚÒéԺͨ¹ý¡¶±£ÏÕÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·
Ëæ×Å2020Äê¡¶¹ú·ÀÊÚȨ·¨¡·£¨NDAA£©µÄͨ¹ý£¬£¬ÃÀ¹úÖÚÒéԺҲͨ¹ýÁË¡¶±£ÏÕÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·¡£¡£¸Ã·¨°¸½«ÔÚÃÀ¹úÄÜÔ´²¿¹ú¶È³¢ÊÔÊÒÄÚ³ÉÁ¢Ò»¸öΪÆÚÁ½ÄêµÄÊÔµã´òË㣬£¬ÆäÖ¸±êÊÇ·¢ÏÖÄÜÔ´²¿ÃÅʵÌå»ú¹¹Öеݲȫ·ì϶ºÍ¸ôÀë¹Ø¼üµÄµçÍøÏµÍ³¡£¡£ÆÀ¹ÀµÄ¼¼ÊõºÍ³ß¶ÈÔ̺¬·ÂÕպͷÇÊý×Ö½ÚÖÆÏµÍ³¡¢¡¢×¨ÓýÚÖÆÏµÍ³ºÍÎïÀí½ÚÖÆ¹æ»®¡£¡£¸Ã·¨°¸»¹ÒªÇó³ÉÁ¢Ò»¸ö¹¤×÷×飬£¬Æä¹¤×÷ÊÇ·ÖÎö¹ú¶È³¢ÊÔÊÒÌá³öµÄ½â¾ö¹æ»®£¬£¬²¢Öƶ©Ò»ÏîÕäÊÓÄÜÔ´ÍøµÄ¹ú¶ÈÕ½Êõ¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/bill-protect-us-energy-grid-cyberattacks-passes-ndaa
3¡¢¡¢LightInTheBoxй¶1.3TB Web·þÎñÆ÷ÈÕÖ¾
vpnMentor×êÑÐÈËÔ±·¢´Ë¿ÌÏßÁãÊÛÉÌLightInTheBoxµÄElasticsearchÊý¾Ý¿â¿É¹«¿ª½Ó¼û£¬£¬ÆäÖÐÔ̺¬1.3TB Web·þÎñÆ÷ÈÕÖ¾¡£¡£LightInTheBoxרһÓÚСÅä¼þ¡¢¡¢·þ×°ºÍÅäÊεÄÏúÊÛ£¬£¬Æä´ó²¿Ãſͻ§Î»ÓÚ±±ÃÀºÍÅ·ÖÞ¡£¡£×êÑÐÈËÔ±ÔÚ11ÔÂÏÂÑ®·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬£¬Êý¾Ý¿âÖеļͼ×ܼƳ¬¹ý15ÒÚÌõ£¬£¬»¹Ô̺¬Æä×ÓÍøÕ¾MiniInTheBox.comµÄÊý¾Ý¡£¡£ÈÕÖ¾Ô̺¬8ÔÂ9ÈÕÖÁ10ÔÂ11ÈÕÖ®¼äµÄÍøÕ¾»î¶¯£¬£¬Ô̺¬µç×ÓÓʼþµØÖ·¡¢¡¢IPµØÖ·¡¢¡¢¾Óס¹ú¶È/µØÓòÒÔ¼°Ã¿¸ö·Ã¿Í½Ó¼ûµÄÒ³ÃæµÈÐÅÏ¢¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/95231/data-breach/lightinthebox-data-leak.html
4¡¢¡¢MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷Ïò
ƾ¾ÝMalwarebytesµÄ×îл㱨£¬£¬MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷Ïò¡£¡£Ö»¹Ü´«Í³¸ÅÄîÒÔΪMacÊܵ½µÄϰȾҪ±ÈWindows PCÉٵö࣬£¬µ«2019ÄêMalwarebytesµÄÒ£²âÊý¾ÝÅú×¢MacÍþв¼ì²âÊýÁ¿³öÏÖÁ˾ªÈ˵ÄÉÏÉýÇ÷Ïò¡£¡£ÔÚËùÓÐÆ½Ì¨£¨Windows PC¡¢¡¢MacºÍAndroid£©ÉϵÄÍþв¼ì²âÅÅÐаñ£¨Top25£©ÖУ¬£¬ÓÐ6¸öÊÇMacÍþв£¬£¬×ÜÌå¶øÑÔ£¬£¬MacÍþвռ×ܼìÕÉÁ¿µÄ16£¥ÒÔÉÏ¡£¡£¿£¿£Ë¼¿¼µ½MalwarebytesµÄMacÓû§ÈºÔ¼ÄªÊÇWindowsÓû§ÈºµÄ1/12£¬£¬ÕâÒ»Êý×ÖÔ½·¢ÏÔÖø¡£¡£ÔÚ2019Äêµ¥¸öÍÆËã»úÉϵÄÍþв¼ì²âÊýÁ¿ÖУ¬£¬Windows PCΪ¾ùÔÈ4.2´Î£¬£¬¶øMacÓû§Îª¾ùÔÈ9.8´Î£¬£¬ÊÇWindowsÓû§µÄÁ½±¶¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/mac/2019/12/mac-threat-detections-on-the-rise-in-2019/
5¡¢¡¢Gangnam Industrial Style¶Ô×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾
CyberXÍþв×êÑÐС×éSection 52ÅûÂ¶ÖØÒªÕë¶Ô¹¤Òµ¡¢¡¢¹¤³ÌºÍÖÆ×÷ÆóÒµµÄAPT¹¥»÷»î¶¯£¬£¬¸Ã¹¥»÷ÍŻﱻ³ÆÎªGangnam Industrial Style£¬£¬Ä¿Ç°ÒÑÓÐÖÁÉÙ200¼Ò¹«Ë¾³ÉΪÊܺ¦Õß¡£¡£Ö»¹Ü´óÎÞÊýÊܺ¦ÕßλÓÚº«¹ú£¬£¬µ«Ô̺¬ÈÕ±¾¡¢¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢¡¢ÍÁ¶úÆä¡¢¡¢µÂ¹ú¡¢¡¢¶ò¹Ï¶à¶ûºÍÓ¢¹úÔÚÄڵĺܶà¹ú¶ÈµÄ¹«Ë¾¶¼Êܵ½Ó°Ïì¡£¡£¹¥»÷ÕßÖØÒªÍ¨¹ý´¹µöÓʼþÌáÒé¹¥»÷£¬£¬ÕâЩÓʼþµÄÖ÷Ìâ/¸½¼þÓ빤ҵÓйأ¬£¬Ô̺¬°×ƤÊé¡¢¡¢µç³§Ê¾ÒâͼÒÔ¼°¶ÔÉè¼ÆÉèÊ©£¨ÈçÌìÈ»Æø´¦Öúͳö²ú×°Ö㩵ı¨¼ÛÒªÇóµÈ¡£¡£¹¥»÷ÕßʹÓõĶñÒâÈí¼þÖØÒªÎªSeparµÄ±äÖÖ£¬£¬Separ¿ÉÇÔÈ¡Firefox¡¢¡¢ChromeºÍSafari´æ´¢µÄÃÜÂëÒÔ¼°´ÓGmail¡¢¡¢Yahoo¡¢¡¢Windows LiveºÍHotmailÖÐÇÔÈ¡ÓʼþÕË»§µÄÍ´´¦¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/south-korean-industrial-giants-slammed-in-new-info-stealing-hacker-campaign/


¾©¹«Íø°²±¸11010802024551ºÅ