MITRE CWE 4.0°æÐÂÔöÓ²¼þÇå¾²Îó²î£»Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ
Ðû²¼Ê±¼ä 2020-02-281.MITREÐû²¼Çå¾²Îó²îÁбíCWE 4.0°æ£¬ÐÂÔöÓ²¼þÇå¾²Îó²î
MitreÐû²¼³£¼ûÇå¾²Îó²îÁбíCWE 4.0°æ£¬¸ÃÁбíÒÑÀ©Õ¹Îªº¸ÇÓ²¼þÇå¾²Îó²î£¬ÆäÖаüÀ¨£ºÖÆÔìºÍÉúÃüÖÜÆÚÖÎÀíÎÊÌ⣻Çå¾²Á÷³ÌÎÊÌ⣻¼¯³ÉÎÊÌ⣻ȨÏÞÊèÉ¢ºÍ»á¼û¿ØÖÆÎÊÌ⣻һÑùƽ³£µç·ºÍÂß¼Éè¼ÆÎÊÌ⣻½¹µãºÍÅÌËãÎÊÌ⣻ÄÚ´æºÍ´æ´¢ÎÊÌ⣻ÍâΧװ±¸¡¢Æ¬ÉϽṹºÍ½Ó¿Ú/IOÎÊÌ⣻Çå¾²ÔÓïºÍ¼ÓÃÜÎÊÌ⣻µçÔ´¡¢Ê±ÖӺ͸´Î»ÎÊÌ⣻µ÷ÊԺͲâÊÔÎÊÌ⣻¿çÁìÓòÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/02/27/hardware-security-weaknesses/
2.Magecart¹¥»÷ÕßʹÓÃαÔìµÄCDNÀ´Èƹý¼ì²â
Magecart¹¥»÷ÕßʹÓÃαÔìµÄÄÚÈÝ·Ö·¢ÍøÂ磨CDN£©ÓòÃûÀ´Èƹý¼ì²â¡£Malwarebytes LabsµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬¸ÃMagecart¶ñÒâ¾ç±¾Î±×°³ÉÕýµ±µÄjQuery¿â£¬²¢ÇÒͨ¹ýαÔìµÄCDNÓòÃûÊ¿´«£¬ÆäÇëÇóÀàËÆÓÚ//cdn-sources.org/jquery.unveil.js£¬ÁíÒ»¸öαÔìµÄCDNÓòÃûÇëÇóΪ//cdn-mediafiles.org/cache.php¡£¹¥»÷ÕßʹÓÃÃâ·ÑµÄngrok·þÎñ£¨¿É½¨ÉèÇå¾²ËíµÀµÄ·´ÏòÊðÀíÈí¼þ£©À´ÍøÂç±»µÁµÄÊý¾Ý£¬Õâͨ³£°üÀ¨¹ºÎïÕßµÄÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÐÅÓÿ¨ÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/credit-card-skimmer-uses-fake-cdns-to-evade-detection/
3.Cloud Snooper¹¥»÷¿ÉÈÆ¹ýAWS·À»ðǽ£¬ÒÉΪ¹ú¼ÒÖ§³Ö
SophosÑо¿Ö°Ô±·¢Ã÷Õë¶ÔÔÆ·þÎñÆ÷µÄCloud Snooper¹¥»÷Ô˶¯£¬¹¥»÷Õß¿ÉÒÔÈÆ¹ýÄ¿µÄ×éÖ¯µÄAWSºÍÆä·À»ðǽ£¬²¢ÊÍ·ÅÔ¶¿ØÄ¾Âí¡£Ñо¿Ö°Ô±ÔÚ¼ì²éÔËÐÐÔÚAWSÖеÄÊÜѬȾLinuxºÍWindows EC2ÔÆ·þÎñÆ÷ʱ·¢Ã÷Á˴˹¥»÷¡£SophosÌåÏÖÕâÖÖ¹¥»÷ºÜ¿ÉÄÜÊǹú¼ÒÖ§³ÖµÄ¹¥»÷£¬ËüʹÓõÄRootkit²»µ«Ê¹¹¥»÷Õß¿ÉÒÔÔ¶³Ì¿ØÖÆ·þÎñÆ÷£¬²¢ÇÒ»¹Îª¶ñÒâÈí¼þÌṩÁËÓëÆäC2·þÎñÆ÷¾ÙÐÐͨѶµÄÇþµÀ¡£Sophos¾Ü¾øÍ¸Â¶Êܺ¦×éÖ¯£¬µ«ÌåÏÖÕâ´Î¹¥»÷ËÆºõÊǹ©Ó¦Á´¹¥»÷£¬Æä·Ö·¢µÄRATÊÇ»ùÓÚGh0st RATµÄÔ´´úÂë¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/cloud/cloud-snooper-attack-circumvents-aws-firewall-controls/d/d-id/1337171
4.RiskIQÐû²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ±¨¸æ¡·
RiskIQÐû²¼¡¶2019ÄêÒÆ¶¯APPÍþÐ²Ì¬ÊÆ±¨¸æ¡·£¬¸Ã±¨¸æÖ¸³öÒÆ¶¯Éú̬ϵͳÕýÔÚ´ó·ùÔöÌí£¬µ«¹È¸èµÄÆð¾¢Ê¹µÃ¶ñÒâAPPµÄÊýÄ¿ÕýÔÚϽµ¡£2018Äê¸Ã±¨¸æÍ³¼ÆµÄºÚÃûµ¥Ó¦ÓÃÊýĿΪ213279¸ö£¬¶øÔÚ2019Äê¸ÃÊý×ÖΪ170796¸ö£¬Ï½µÁË20%¡£Òƶ¯APPÈÔÈ»ÊÇÆóÒµ¹¥»÷ÃæµÄÖ÷Òª×é³É²¿·Ö£¬ÓÈÆäÊǷǹٷ½ÈªÔ´µÄAPP£¬¸Ã±¨¸æ»¹Í³¼ÆÁË2019ÄêºÚÃûµ¥APP×î¶àµÄ6¸öÓ¦ÓÃÊÐËÁ¡£
ÔÎÄÁ´½Ó£º
https://www.riskiq.com/blog/external-threat-management/2019-mobile-app-threat-landscape-report/
5.ÐÂÒøÐÐľÂíCerberus¿ÉÇÔÈ¡Google AuthenticatorÑéÖ¤Âë
AndroidÒøÐÐľÂíCerberusµÄбäÌåÄܹ»ÇÔÈ¡Google AuthenticatorÌìÉúµÄÒ»´ÎÐÔÑéÖ¤Â루OTP£©£¬²¢Èƹý2FA±£»¤»á¼ûÓû§µÄÒøÐÐÕË»§¡£GoogleÓÚ2010ÄêÍÆ³öÁËAuthenticator£¬¸ÃÓ¦ÓÃÊÇΪÁËÌæ»»¶ÌÐÅÑéÖ¤Âë¡£ºÉÀ¼Òƶ¯Çå¾²¹«Ë¾ThreatFabricµÄÇå¾²Ñо¿Ö°Ô±ÔÚCerberusµÄ×îÐÂÑù±¾Öз¢Ã÷ÁËAuthenticator OTPÇÔÈ¡¹¦Ð§£¬¸ÃľÂíÀÄÓÃAccessibilityÌØÈ¨À´»ñµÃAuthenticator½çÃæµÄÄÚÈݲ¢½«Æä·¢Ë͵½C2·þÎñÆ÷¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã±äÌåÈÔ´¦ÓÚ²âÊԽ׶Σ¬µ«¿ÉÄܺܿì¾Í»áÐû²¼¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/android-malware-can-steal-google-authenticator-2fa-codes/
6.Ó¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGR±»ÍϿ⣬ÒÑÔÚºÚ¿ÍÂÛ̳Èö²¥
ºÚ¿ÍÕýÔÚµØÏÂÂÛ̳ÉϹ²ÏíÓ¡¶È¿Æ¼¼ÐÂÎÅÍøÕ¾BGRµÄSQLת´¢£¬¾Ý³Æ¸ÃÊý¾Ý¿âÊǴӿɹûÕæ»á¼ûµÄAWS S3´æ´¢Í°»ñÈ¡µÄ¡£Æ¾Ö¤Ðû²¼ÏÂÔØÁ´½ÓµÄºÚ¿ÍÂÛ̳³ÉÔ±µÄ˵·¨£¬¸ÃÊý¾Ý¿â°üÀ¨ÖÁÉÙ3.6Íò·âµç×ÓÓʼþºÍÓйØÊÜÓ°ÏìÍøÕ¾£¨tradinggame.au.com¡¢bgr.inºÍS3 Production£©µÄµÇ¼ÐÅÏ¢£¬×ܹ²ÔÚ7¸öZIPÎļþÖд浵ÁË16¸öSQLת´¢¡£Î´¾Ñ¹ËõµÄÊý¾Ý¿â×ܾÞϸΪ21.5GB¡£Under BreachÑо¿Ö°Ô±Ö¸³öÕâÊÇÒ»¸öÍêÕûµÄSQLת´¢£¬ÆäÖаüÀ¨Óû§Ãû¡¢µç×ÓÓʼþºÍ¹þÏ£ÃÜÂëµÈÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/sql-dump-from-bgr-india-shared-on-hacker-forum/


¾©¹«Íø°²±¸11010802024551ºÅ