ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ46ÖÜ
Ðû²¼Ê±¼ä 2018-11-19Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇFIAÌåÏÖ×î½üµÄÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÏÕЩËùÓеİͻùË¹Ì¹ÒøÐУ»£»£»£»£»Ñо¿ÍŶÓÅû¶7ÖÖÐÂÈÛ»ÙºÍÓÄÁé¹¥»÷£¬£¬£¬£¬£¬£¬Intel¡¢AMDºÍARM¾ùÊÜÓ°Ï죻£»£»£»£»Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶Ô°ÍÎ÷½ðÈÚ»ú¹¹µÄ¶ñÒâÈí¼þ·Ö·¢»î¶¯£»£»£»£»£»Ñо¿»ú¹¹Ðû²¼ÃÀ¹úÐÅÓÿ¨Ú²Æ±¨¸æ£»£»£»£»£»ÒÑÍù1ÄêÄÚÒÑÓÐ6000ÍòÐÅÓÿ¨ÐÅÏ¢±»ÇÔ£»£»£»£»£»Áè¼Ý50¸ö¹ú¼ÒÇ©Êð¡¶°ÍÀèÍøÂç¿Õ¼äÐÅÈκÍÇå¾²½¨Òé¡·¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1. Microsoft Exchange Server CVE-2018-8581Ô¶³ÌȨÏÞÌáÉýÎó²î
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8581
2. Microsoft Windows BitLocker CVE-2018-8566Çå¾²¹¦Ð§ÈƹýÎó²î
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-8566
3. Vmware ESXi/Workstation/Fusion CVE-2018-6981ÌÓÒÝÎó²î
https://www.vmware.com/security/advisories/VMSA-2018-0027.html
4. Elasticsearch Kibana Console²å¼þí§Òâ´úÂëÖ´ÐÐÎó²î
https://access.redhat.com/security/cve/cve-2018-17246
5. Microsoft Outlook CVE-2018-8522Ô¶³Ì´úÂëÖ´ÐÐÎó²î
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8522
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
ƾ֤°Í»ù˹̹Áª°îÊÓ²ì¾ÖFIAµÄ˵·¨£¬£¬£¬£¬£¬£¬ÏÕЩËùÓеİͻùË¹Ì¹ÒøÐж¼Êܵ½×î½üµÄÊý¾Ýй¶ÊÂÎñµÄÓ°Ïì¡£¡£¡£¡£¾Ý³Æ¸ÃÊÂÎñÓëÔÚ°µÍøÊг¡ÉÏ·ºÆðµÄÔ¼2ÍòÕŰͻùË¹Ì¹ÒøÐнè¼Ç¿¨ÐÅÏ¢Óйء£¡£¡£¡£¸Ã»ú¹¹ÕýÔÚÊÓ²ìÓë¸ÃÊÂÎñÓйصÄ100¶àÆðÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎúÊý¾Ýй¶ÊÂÎñ±¬·¢µÄÏêϸʱ¼ä£¬£¬£¬£¬£¬£¬Ò²²»ÖªµÀ¹¥»÷ÕßÔõÑù½øÈëÕâЩ°Í»ùË¹Ì¹ÒøÐеÄϵͳ¡£¡£¡£¡£×èÖ¹ÉÏÖÜÄ©£¬£¬£¬£¬£¬£¬Ò»Ð©°Í»ùË¹Ì¹ÒøÐÐÒѾÔÝÍ£ÔÚÍâÑóʹÓÃËüÃǵĽè¼Ç¿¨£¬£¬£¬£¬£¬£¬²¢½ûÓÃÁËÕâЩ¿¨µÄËùÓйú¼ÊÉúÒâ¡£¡£¡£¡£PakCERTͬÑùÐû²¼ÁËÒ»·Ý¹ØÓÚÊý¾Ýй¶µÄʱ¼ä±íºÍ¹æÄ£µÄ±¨¸æ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/77847/cyber-crime/pakistani-banks-data-breach.html
2¡¢Ñо¿ÍŶÓÅû¶7ÖÖÐÂÈÛ»ÙºÍÓÄÁé¹¥»÷£¬£¬£¬£¬£¬£¬Intel¡¢AMDºÍARM¾ùÊÜÓ°Ïì
ÓÉ9ÃûÑо¿Ö°Ô±×é³ÉµÄÑо¿Ð¡×éÅû¶ÁË7ÖÖеÄÈÛ»ÙºÍÓÄÁé¹¥»÷£¬£¬£¬£¬£¬£¬ÆäÖÐ2ÖÖÊÇMeltdown¹¥»÷µÄ±äÖÖ£¬£¬£¬£¬£¬£¬ÁíÍâ5ÖÖÊÇSpectre¹¥»÷µÄ±äÖÖ¡£¡£¡£¡£Èý´óÖ÷Òª´¦Öóͷ£Æ÷³§ÉÌ-Intel¡¢AMDºÍARM¾ùÊÜÓ°Ïì¡£¡£¡£¡£¸ÃÑо¿Ð¡×éÏòIntel¡¢AMDºÍARM±¨¸æÁËÕâЩÎó²î£¬£¬£¬£¬£¬£¬ÆäÖÐIntelºÍARMÒѾÈÏ¿ÉÁËËûÃǵÄÑо¿Ð§¹û¡£¡£¡£¡£¸ÃÍŶӻ¹ÌåÏÖ£¬£¬£¬£¬£¬£¬ÓÉÓÚ¹©Ó¦ÉÌÕýÔÚÆð¾¢ÐÞ¸´ÕâЩÎÊÌ⣬£¬£¬£¬£¬£¬ËûÃǾöÒéÔݲ»Åû¶Ïà¹ØPoC¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/meltdown-spectre-vulnerabilities.html
3¡¢Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶Ô°ÍÎ÷½ðÈÚ»ú¹¹µÄ¶ñÒâÈí¼þ·Ö·¢»î¶¯
˼¿ÆTalosÍŶӷ¢Ã÷Á½¸öÕýÔÚ¾ÙÐÐÖеĶñÒâÈí¼þ·Ö·¢»î¶¯£¬£¬£¬£¬£¬£¬ÕâЩ»î¶¯ÓÃÓÚÏò°ÍÎ÷µÄ½ðÈÚ»ú¹¹Óû§Èö²¥ÒøÐÐľÂí¡£¡£¡£¡£¹¥»÷»î¶¯±¬·¢ÔÚ10ÔÂβºÍ11Ô³õ£¬£¬£¬£¬£¬£¬ÕâÁ½¸ö¹¥»÷»î¶¯Ê¹ÓÃÁ˲î±ðµÄ³õʼѬȾÎļþÀàÐͺÍÁ½¸ö²î±ðµÄÒøÐÐľÂí£¬£¬£¬£¬£¬£¬µ«ÔÚѬȾÀú³ÌÖжÔÖÖÖÖÎļþʹÓÃÁËÏàͬµÄÃüÃû¹æÔò£¬£¬£¬£¬£¬£¬²¢¶¼Ê¹ÓÃÁ˶ÌÁ´½ÓÀ´Òþ²ØÏÖʵµÄ·Ö·¢Ð§ÀÍÆ÷µØµã¡£¡£¡£¡£ÔÚÆÊÎöÕâЩ»î¶¯Ê±£¬£¬£¬£¬£¬£¬Talos»¹·¢Ã÷ÁËÒ»¸öеÄÀ¬»øÓʼþ½©Ê¬ÍøÂç¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2018/11/metamorfo-brazilian-campaigns.html
4¡¢Ñо¿»ú¹¹Ðû²¼ÃÀ¹úÐÅÓÿ¨Ú²Æ±¨¸æ£¬£¬£¬£¬£¬£¬ÒÑÍù1ÄêÄÚÒÑÓÐ6000ÍòÐÅÓÿ¨ÐÅÏ¢±»ÇÔ
ƾ֤Gemini AdvisoryÐû²¼µÄÃÀ¹úÐÅÓÿ¨Ú²Æ±¨¸æ£¬£¬£¬£¬£¬£¬Ö»¹Ü2015ÄêÃÀ¹ú½ðÈÚÒµ¾ÍÒÑ´ó¹æÄ£Ç¨áãµ½EMVоƬ¿¨±ê×¼£¬£¬£¬£¬£¬£¬µ«ÔÚÒÑÍù12¸öÔÂÄÚÈÔÓÐ6000ÍòÕÅÐÅÓÿ¨µÄÐÅÏ¢±»ÇÔ¡£¡£¡£¡£ÆäÖÐ4580Íò£¨75%£©µÄÐÅÓÿ¨ÐÅÏ¢ÊÇͨ¹ýPoS»úÉϵÄʵ¿¨ÉúÒâ±»ÇԵ쬣¬£¬£¬£¬£¬Ö»ÓÐ25%µÄÐÅÓÿ¨ÐÅÏ¢±»ÔÚÏßÇÔÈ¡¡£¡£¡£¡£ÕâЩʵ¿¨ÖÐ90%ÊÇEMV¿¨¡£¡£¡£¡£ÒÑÍù12¸öÔÂÄÚÔÚµç×ÓÉÌÎñÖб»ÇÔµÄÐÅÓÿ¨ÊýÄ¿ÔöÌíÁË14%£¬£¬£¬£¬£¬£¬ÕâÒâζÕß·¸·¨·Ö×ÓÕýÔÚ´Óʵ¿¨ÉúÒâתÏòÎÞ¿¨Ú²Æ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://geminiadvisory.io/card-fraud-on-the-rise/
5¡¢Áè¼Ý50¸ö¹ú¼ÒÇ©Êð¡¶°ÍÀèÍøÂç¿Õ¼äÐÅÈκÍÇå¾²½¨Òé¡·
51¸ö¹ú¼Ò¡¢224¼Ò¹«Ë¾ÒÔ¼°92¸ö·ÇÓªÀû×éÖ¯ÔÚ·¨¹úÕþ¸®µÄÍÆ¶¯ÏÂÇ©ÊðÁËÕâÏî¡¶°ÍÀèÍøÂç¿Õ¼äÐÅÈκÍÇå¾²½¨Òé¡·ÐÒ飬£¬£¬£¬£¬£¬°üÀ¨Î¢Èí¡¢¹È¸è¡¢FacebookºÍÈýÐǵȶà¼Ò¿Æ¼¼¾ÞÍ·¡£¡£¡£¡£Õâ·Ý½¨ÒéÊéÖ÷ÒªÊÇΪÁËÓ¦¶ÔÒÑÍù¼¸Äê·ºÆðµÄÍøÂçÕ½£¬£¬£¬£¬£¬£¬µ«ÃÀ¹ú¡¢¶íÂÞ˹¡¢Ó¢¹ú¡¢ÒÁÀÊ¡¢ÒÔÉ«ÁС¢³¯ÏÊÒÔ¼°ÎÒ¹ú¶¼Ã»ÓÐÊðÃû¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-russia-china-dont-sign-macrons-cyber-pact/
ÉùÃ÷£º±¾×ÊѶÓÉc7c7ÓéÀÖÆ½Ì¨Î¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ