WPA3Ò²²»Çå¾² £¿DragonbloodÎó²î¿ÉÆÆ½âWi-FiÃÜÂ룻ICS¶ñÒâÈí¼þTriton¾íÍÁÖØÀ´£»Ð¶ñÒâÈí¼þTajMahal

Ðû²¼Ê±¼ä 2019-04-11
1.WPA3Ò²²»Çå¾² £¿DragonbloodÎó²î¿ÉÆÆ½âWi-FiÃÜÂë

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÔÚ4ÔÂ10ÈÕ½ÒÏþµÄһƪÂÛÎÄÖУ¬Çå¾²Ñо¿Ö°Ô±Mathy VanhoefºÍEyal Ronen·¢Ã÷WPA3-PersonalЭÒé±£´æÐÂÎó²îDragonblood£¬ÕâЩÎó²î¿ÉÔÊÐíDZÔÚ¹¥»÷ÕßÆÆ½âWi-FiÃÜÂë²¢ÇÔÈ¡¼ÓÃÜÁ÷Á¿¡£ÔÚÂÛÎÄÖÐÑо¿Ö°Ô±ÏêϸÏÈÈÝÁËWPA3µÄÁ½ÖÖÉè¼ÆÈ±ÏÝ£ºÒ»ÖÖÊǽµ¼¶¹¥»÷£¬Ò»ÖÖÊDzàÐŵÀй¶¡£Ê×ÏÈWPA3Ìṩ¹ý¶ÉģʽÒÔÖ§³Ö¾É×°±¸£¬µ«¹¥»÷Õß¿ÉÒÔÀÄÓÃÕâЩÉèÖÃÀ´ÆÈʹWPA3×°±¸Ê¹Óò»Çå¾²µÄWPA2µÄ4´ÎÎÕÊÖ£¬²¢ÇÒÕâÖÖ½µ¼¶¹¥»÷Ö»ÐèÒªÖªµÀWPA3ÍøÂçµÄSSID¡£Æä´ÎÑо¿Ö°Ô±ÏÈÈÝÁËÁ½ÖÖ²àÐŵÀ¹¥»÷-»ùÓÚ»º´æ£¨CVE-2019-9494£©ºÍ»ùÓÚʱÐò£¨CVE-2019-9494£©£¬¿ÉÓÃÓÚ»ñÈ¡Wi-FiÃÜÂëºÍÇÔÈ¡¼ÓÃÜ´«ÊäµÄÃô¸ÐÐÅÏ¢¡£Ñо¿Ö°Ô±½«ÔÚGitHubÉÏÐû²¼PoC²âÊÔ¹¤¾ß¡£Wi-FiͬÃËÈ·ÈϳÆÕýÔÚÓ빩ӦÉÌÏàÖúÐÞ²¹ÏÖÓеÄWPA3ÈÏ֤װ±¸¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/04/wpa3-hack-wifi-password.html

2.ICS¶ñÒâÈí¼þTriton¾íÍÁÖØÀ´£¬Õë¶ÔÖж«µØÇøµÄÒªº¦»ù´¡ÉèÊ©


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ƾ֤FireEyeµÄÒ»·Ýб¨¸æ£¬ICS¶ñÒâÈí¼þTriton·ºÆðÁ˵ڶþÃûÊܺ¦Õߣ¬Õâ´ÎÊÇÖж«µØÇøµÄÒ»¸öÒªº¦»ù´¡ÉèÊ©£¬µ«FireEye²¢Î´Í¸Â¶Ä¿µÄÆóÒµµÄÃû×Ö¡£TritonÊ×´ÎÆØ¹âÓÚ2017ÄêÕë¶ÔÉ³ÌØÊ¯Ó͹«Ë¾Petro RabighµÄ¹¥»÷¡£ÕâÒ»´Î¹¥»÷ÕßÔÚÄ¿µÄÍøÂçÖÐDZÔÚÁ˽üÒ»ÄêµÄʱ¼ä£¬È»ºó²Å½øÈ빤³ÌÊÂÇéÕ¾¡£¹¥»÷ÕßʹÓÃÁ˶àÖÖ¹¤¾ß£¬°üÀ¨MimikatzºÍSecHackÀ´ÍøÂçÆ¾Ö¤£¬ÆäÖÐһЩ¹¤¾ß¿ÉÒÔ×·ËÝÖÁ2014Äê¡£FireEye²¢Î´Í¸Â¶´Ë´Î¹¥»÷Ôì³ÉµÄË𺦡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/triton-ics-malware-second-victim/143658/

3.ÐÂÍøÂçÌØ¹¤Ì×¼þTajMahal£¬°üÀ¨Ô¼80¸ö¶ñÒâÄ £¿é


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

¿¨°Í˹»ù·¢Ã÷Ò»¸öеÄÍøÂçÌØ¹¤Æ½Ì¨TajMahal£¬TajMahalÖÁÉÙ×Ô2013ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬×îÔçµÄÑù½ñÈÕÆÚΪ2013Äê4Ô£¬×î½üµÄÔòΪ2018Äê8Ô¡£Ñо¿Ö°Ô±ÉÐδÄܽ«TajMahalÓëÈκκڿÍ×éÖ¯¾ÙÐйØÁª¡£TajMahalÊÇÒ»¸ö¶à½×¶Î¹¥»÷¿ò¼Ü£¬°üÀ¨Á½¸ö¶ñÒâÈí¼þ°ü£ºTokyoºÍYokohama¡£ºóÕß¾ßÓÐÔ¼80¸ö¶ñÒâÄ £¿é£¬°üÀ¨¼ÓÔØÆ÷¡¢Ð­µ÷Ä £¿é¡¢C&CÍ¨Ñ¶Ä £¿é¡¢ÒôƵ¼Í¼¡¢¼üÅ̼ͼ¡¢½ØÆÁ¡¢ÉãÏñÍ·¡¢ÎļþºÍÃÜÔ¿ÇÔÈ¡µÈ¡£Yokohama»á½«ÇÔÈ¡µ½µÄÐÅÏ¢ÒÔÃûΪTajMahalµÄXMLÎļþµÄÐÎʽ·¢ËÍÖÁC&C·þÎñÆ÷¡£ÏÖÔÚÑо¿Ö°Ô±·¢Ã÷µÄΨһÊܺ¦ÕßΪÖÐÑǵØÇøµÄÍâ½»»ú¹¹¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-tajmahal-cyberespionage-kit-includes-80-malicious-modules/

4.Ã÷ÄáËÕ´ïÖÝÈËÀà·þÎñ²¿ÔâºÚ¿ÍÈëÇÖ£¬1.1Íò¹«ÃñÐÅÏ¢ÒÉÔâй¶


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÃÀ¹úÃ÷ÄáËÕ´ïÖÝÈËÀà·þÎñ²¿Ôâµ½ºÚ¿ÍÈëÇÖ£¬Ô¼1.1Íò¹«ÃñµÄСÎÒ˽¼ÒÐÅÏ¢»òÔâй¶¡£Æ¾Ö¤¸Ã»ú¹¹Ðû²¼µÄ֪ͨ£¬¹¥»÷ÕßÔÚ2018Äê3ÔÂ26ÈÕ×óÓÒ»á¼ûÁËÒ»ÃûÔ±¹¤µÄµç×ÓÓʼþÕË»§£¬²¢ÏòÆäͬÊ·¢ËÍÁËÁ½·âÒªÇó»ã¿îÖ§¸¶µÄ´¹ÂÚÓʼþ¡£ÔÚ´Ëʱ´ú£¬¹¥»÷Õß¿ÉÒÔÉó²é¡¢ÏÂÔØ»òÒÔÆäËü·½·¨»ñȡijЩÕË»§µÄÄÚÈÝ£¬MNITÎÞ·¨È·ÈϹ¥»÷ÕßÉó²é»ò»ñÈ¡µ½µÄÐÅÏ¢£¨ÈôÊÇÓеϰ£©¡£¸Ã»ú¹¹Ö¸³ö£¬Ã»ÓÐÖ¤¾ÝÅú×¢±»ºÚµç×ÓÓʼþÕË»§ÖеÄСÎÒ˽¼ÒÐÅÏ¢ÒÔÈκη½·¨Ôâµ½¡°Éó²é¡¢ÏÂÔØ»òÀÄÓᱡ£

 

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/83609/data-breach/minnesota-department-of-human-services-breach.html

5.SAPÐû²¼4ÔÂÇå¾²¸üУ¬ÐÞ¸´6¸öÇå¾²Îó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


±¾ÖÜSAPÐû²¼4ÔÂÇå¾²¸üУ¬ÐÞ¸´Á˶à¸ö²úÆ·ÖеÄ6¸öÎó²î¡£ÆäÖÐÐÞ¸´ÁËCrystal ReportsÖеÄÐÅϢй¶Îó²î£¨CVE-2019-0285£¬ CVSSÆÀ·Ö7.5£©£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷Õß»á¼ûϵͳÊý¾Ý¡¢µ÷ÊÔÐÅÏ¢µÈÏêϸÐÅÏ¢¡£ÁíÒ»¸öÎó²îÊÇNetWeaver Java Application ServerÖеÄαÔì¹¥»÷Îó²î£¨CVE-2019-0283£¬CVSS 7.1·Ö£©£¬¸ÃÎó²î¿ÉÔÊÐí¹¥»÷ÕßαÔìÏòÓû§ÏÔʾµÄÊý¾Ý¡£ÆäËüÎó²î°üÀ¨È±ÉÙÊÚȨ¼ì²é£¨CVE-2019-0279£¬CVSS 5.5£©¡¢ÐÅϢй¶£¨CVE-2019-0282£¬CVSS 5.3£»CVE-2019-0278£¬CVSS 5.1£©ºÍXXEÎó²î£¨CVE-2019-0284£¬ CVSS 5.1£©¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/sap-patches-high-severity-flaws-crystal-reports-netweaver

6.AdobeÐû²¼4ÔÂÇå¾²¸üУ¬ÐÞ¸´8¸ö²úÆ·ÖеÄÇå¾²Îó²î


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


±¾ÖܶþAdobeÐû²¼Çå¾²¸üУ¬ÐÞ¸´Bridge CCµÈ8¿î²úÆ·ÖеĶà¸öÇå¾²Îó²î£¬ÆäÖаüÀ¨Bridge CCÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨¶ÑÒç³öCVE-2019-7130ºÍÔ½½çдCVE-2019-7132£©¡¢Experience Manager FormsÖеÄÐÅϢй¶Îó²î£¨CVE-2019-7129£¨XSS£©£©¡¢InDesignÖеÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2019-7107¡¢CVE-2019-7105ºÍCVE-2019-7106£©µÈ¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/adobe-patch-update-squashes-critical-code-execution-bugs/