ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ22ÖÜ
Ðû²¼Ê±¼ä 2018-06-04
Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2018Äê05ÔÂ28ÈÕÖÁ06ÔÂ01ÈÕ¹²ÊÕ¼Çå¾²Îó²î53¸ö£¬£¬ÖµµÃ¹Ø×¢µÄÊǶà¿îTP-LINK²úÆ·Ô¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Git 'git clone ¨Crecurse-submodules'Ô¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Huawei 1288H V5ºÍ2288H V5 CVE-2018-7904ȨÏÞÌáÉýÎó²î£»£»£»£»£»strongSwan CVE-2018-5388»º³åÇøÒç³öÎó²î£»£»£»£»£»BeaconMedaes TotalAlert Scroll Medical Air SystemsÐÅϢй¶Îó²î¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿ÍŶӷ¢Ã÷ʹÓÃAndroidÔÉúwebÊÓͼµÄд¹Âڻ£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷ʹÓÃRIG EK·Ö·¢Ä¾ÂíGrobiosµÄ¹¥»÷»î¶¯£»£»£»£»£»¼ÓÄôóµÄÁ½¼ÒÒøÐÐÔâºÚ¿Í¹¥»÷£¬£¬²¿·Ö¿Í»§µÄÊý¾Ýй¶£»£»£»£»£»Ñо¿Ö°Ô±³Æ¿Éͨ¹ýÉù²¨¹¥»÷ÆÆËðHDDºÍµ¼ÖÂϵͳÍ߽⣻£»£»£»£»±¾ÌïÆû³µÓ¡¶È·Ö¹«Ë¾µÄAWS S3ÉèÖùýʧ£¬£¬µ¼ÖÂ5Íò¶àÃûÓû§µÄÐÅϢй¶¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1¡¢¶à¿îTP-LINK²úÆ·Ô¶³Ì´úÂëÖ´ÐÐÎó²î
¶à¿îTP-LINK²úÆ·ÖеÄ/usr/lib/lua/luci/torchlight/validator.luaÎļþ±£´æÊäÈëÑéÖ¤Îó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄJSONÇëÇ󣬣¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://github.com/yough3rt/IOT-pwn-for-fun/blob/master/TP-LINK-websys-Authenticated-RCE
2¡¢Git 'git clone ¨Crecurse-submodules'Ô¶³Ì´úÂëÖ´ÐÐÎó²î
Git ÔÚÓÃgit cloneʱûÓжÔsubmoduleµÄÎļþ¼ÐÃüÃû×ö×ã¹»µÄÑéÖ¤£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»¶ñÒâµÄ.gitmodulesÎļþ£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://git-scm.com
3¡¢Huawei 1288H V5ºÍ2288H V5 CVE-2018-7904ȨÏÞÌáÉýÎó²î
Huawei 1288H V5ºÍ2288H V5±£´æJSON×¢ÈëÎó²î£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ÐÞ¸ÄÖÎÀíÔ±ÃÜÂ룬£¬»ñȡϵͳµÄÖÎÀíȨÏÞ¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180523-01-json-en
4¡¢strongSwan CVE-2018-5388»º³åÇøÒç³öÎó²î
strongSwan±£´æ»º³åÇøÒç³öÎó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬¿ÉºÄ¾¡×ÊÔ´£¬£¬¾ÙÐоܾøÐ§À͹¥»÷¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttp://www.strongswan.org/blog
5¡¢BeaconMedaes TotalAlert Scroll Medical Air SystemsÐÅϢй¶Îó²î
BeaconMedaes TotalAlert Scroll Medical Air Systems WEBЧÀÍÆ÷±£´æÇå¾²Îó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://ics-cert.us-cert.gov/advisories/ICSMA-18-144-01
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃAndroidÔÉúwebÊÓͼµÄд¹Âڻ

RiskIQÑо¿ÍŶӷ¢Ã÷Õë¶ÔMyEtherWalletµÄÒ»¸öд¹Âڻ¡£¡£¹¥»÷Õßͨ¹ý½¨ÉèÒ»¸öαװ³ÉMyEtherWalletÖ§³ÖÍŶӵÄTelegram̸ÌìȺ×éÀ´·Ö·¢¶ñÒâMyEtherWallet¿Í»§¶Ë¡£¡£¸Ã¶ñÒâ³ÌÐòͨ¹ýGoNative.io½«WebÓ¦ÓÃ×÷ΪÍâµØÓ¦ÓÃÐû²¼£¬£¬ÓÃÓÚÇÔÈ¡Óû§µÄƾ֤¡£¡£Ñо¿Ö°Ô±Ðû²¼ÁËÏà¹ØIoC¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.riskiq.com/blog/labs/myetherwallet-android/
2¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃRIG EK·Ö·¢Ä¾ÂíGrobiosµÄ¹¥»÷»î¶¯

FireEyeÑо¿ÍŶӷ¢Ã÷ʹÓÃRIG Exploit Kit£¨EK£©Èö²¥Ä¾ÂíGrobiosµÄ¶ñÒâ¹¥»÷»î¶¯£¬£¬¸Ã»î¶¯´Ó2018Äê3ÔÂ10ÈÕ×îÏÈ¡£¡£GrobiosʹÓÃÁ˶àÖÖÌӱܼì²âÊÖÒÕ£¬£¬²¢Í¨¹ý¶à¸ö±¸·ÝºÍ½¨Éè×Ô¶¯ÔËÐÐ×¢²á±íÏî¼°ÍýÏëʹÃüÀ´ÊµÏÖ³¤ÆÚÐÔ¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/72954/malware/rig-exploit-kit-grobios-campaign.html
3¡¢¼ÓÄôóµÄÁ½¼ÒÒøÐÐÔâºÚ¿Í¹¥»÷£¬£¬²¿·Ö¿Í»§µÄÊý¾Ýй¶

¼ÓÄôóµÄÁ½¼ÒÒøÐÐSimplii FinancialºÍÃÉÌØÀû¶ûÒøÐÐÔÚÖÜÒ»½ÒÏþÉùÃ÷³Æ±¬·¢ÍøÂçÇå¾²ÊÂÎñ£¬£¬Simplii FinancialÌåÏÖ£¬£¬ËüÔÚÉÏÖÜÄ©·¢Ã÷¹¥»÷Õß»á¼ûÁËÔ¼4ÍòÃûSimplii¿Í»§µÄÕË»§ÐÅÏ¢¡£¡£¿ÉÊÇSimplii FinancialÔÊÐí100£¥·µ»¹ËùÊÜÓ°ÏìµÄÕË»§µÄËðʧ¡£¡£ÔÚSimplii½ÒÏþÉùÃ÷һСʱºó£¬£¬ÃÉÌØÀû¶ûÒøÐÐÒ²Ðû²¼ÁËÀàËÆµÄÉùÃ÷¡£¡£¸ÃÒøÐÐÌåÏÖ£¬£¬ºÚ¿Í×Ô¼ºÔÚÉÏÖÜÈÕÁªÏµÁËËûÃÇ£¬£¬Éù³ÆÓµÓпͻ§Êý¾Ý¡£¡£ÃÉÌØÀû¶ûÒøÐÐûÓÐ͸¶Óм¸¶à¿Í»§µÄÐÅϢй¶£¬£¬µ«ÌåÏÖËûÃÇÏàÐÅÒѾ¹Ø±ÕÁ˺ڿͽøÈëÆäϵͳµÄÈë¿Úµã¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/two-canadian-banks-announce-hacks-over-the-weekend/
4¡¢Ñо¿Ö°Ô±³Æ¿Éͨ¹ýÉù²¨¹¥»÷ÆÆËðHDDºÍµ¼ÖÂϵͳÍß½â

À´×ÔÃÜЪ¸ù´óѧºÍÕã½´óѧµÄÒ»¸öÑо¿Ð¡×鳯¿Éͨ¹ýÉù²¨/³¬Éù²¨¹¥»÷À´ÆÆËðÓ²ÅÌ£¨HDD£©µÄ¶ÁÈ¡¡¢Ð´ÈëºÍ´æ´¢¹¦Ð§ÒÔ¼°µ¼Ö²Ù×÷ϵͳÍ߽⡣¡£Ñо¿Ö°Ô±ÌåÏÖÕâÖÖ¹¥»÷¿ÉÒÔͨ¹ý×ÔÖÆµĄ̈ʽµçÄÔ»òÌõ¼Ç±¾µçÄÔµÄÑïÉùÆ÷¾ÙÐУ¬£¬Ò»ÖÖ¿ÉÄܵĹ¥»÷³¡¾°ÊÇ£¬£¬Óû§»á¼ûÁ˶ñÒâÍøÕ¾²¢²¥·ÅÁ˾ßÓÐÆÆËðÐԵĶñÒâÉù²¨¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/sonic-tone-attacks-damage-hard-disk-drives-crashes-os/132343/
5¡¢±¾ÌïÆû³µÓ¡¶È·Ö¹«Ë¾µÄAWS S3ÉèÖùýʧ£¬£¬µ¼ÖÂ5Íò¶àÃûÓû§µÄÐÅϢй¶

ƾ֤Kromtech SecurityµÄ±¨¸æ£¬£¬±¾ÌïÆû³µÓ¡¶È·Ö¹«Ë¾µÄ2¸öAmazon S3¿É¹ûÕæ»á¼û£¬£¬µ¼ÖÂÁè¼Ý5ÍòÃûÓû§µÄÐÅϢй¶¡£¡£Õâ2¸öAWS bucket°üÀ¨±¾ÌïÒÆ¶¯Ó¦ÓÃHonda ConnectµÄÓû§µÄÏêϸÐÅÏ¢£¬£¬ÀýÈçÐÕÃû¡¢ÐÔ±ð¡¢Óû§¼°Æä¿ÉÐÅÁªÏµÈ˵ĵ绰ºÅÂëºÍµç×ÓÓʼþµØµã¡¢ÕË»§ÃÜÂë¡¢Æû³µVINÂëºÍÆû³µConnect IDµÈ¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/honda-india-left-details-of-50-000-customers-exposed-on-an-aws-s3-server/