WPA3Ò²²»°²È«£¿Dragonblood·ì϶¿ÉÆÆ½âWi-FiÃÜÂ룻ICS¶ñÒâÈí¼þTriton¾íÍÁ³ÁÀ´£»Ð¶ñÒâÈí¼þTajMahal

°ä²¼¹¦·ò 2019-04-11
1.WPA3Ò²²»°²È«£¿Dragonblood·ì϶¿ÉÆÆ½âWi-FiÃÜÂë

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ÔÚ4ÔÂ10ÈÕ°ä·¢µÄһƪÂÛÎÄÖÐ £¬°²È«×êÑÐÈËÔ±Mathy VanhoefºÍEyal Ronen·¢ÏÖWPA3-PersonalºÍ̸´æÔÚзì϶Dragonblood £¬ÕâЩ·ì϶¿ÉÔÊÐíDZÔÚ¹¥»÷ÕßÆÆ½âWi-FiÃÜÂë²¢ÇÔÈ¡¼ÓÃÜÁ÷Á¿¡£ÔÚÂÛÎÄÖÐ×êÑÐÈËÔ±¾ßÌå½éÉÜÁËWPA3µÄÁ½ÖÖÉè¼ÆÈ±µã£ºÒ»ÖÖÊǽµ¼¶¹¥»÷ £¬Ò»ÖÖÊDzàÐÅ·й¶¡£Ê×ÏÈWPA3Ìṩ¹ý¶ÉģʽÒÔÖ§³Ö¾ÉÉ豸 £¬µ«¹¥»÷ÕßÄܹ»ÀÄÓÃÕâЩÉèÖÃÀ´ÆÈʹWPA3É豸ʹÓò»°²È«µÄWPA2µÄ4´ÎÎÕÊÖ £¬²¢ÇÒÕâÖÖ½µ¼¶¹¥»÷Ö»±ØÒªÖªÂ·WPA3ÍøÂçµÄSSID¡£Æä´Î×êÑÐÈËÔ±½éÉÜÁËÁ½ÖÖ²àÐÅ·¹¥»÷-»ùÓÚ»º´æ£¨CVE-2019-9494£©ºÍ»ùÓÚʱÐò£¨CVE-2019-9494£© £¬¿ÉÓÃÓÚ»ñÈ¡Wi-FiÃÜÂëºÍÇÔÈ¡¼ÓÃÜ´«ÊäµÄÃô¸ÐÐÅÏ¢¡£×êÑÐÈËÔ±½«ÔÚGitHubÉϰ䲼PoC²âÊÔ¹¤¾ß¡£Wi-FiͬÃËÈ·ÈϳÆÔÚÓ빩¸øÉ̺Ï×÷½¨²¹ÏÖÓеÄWPA3ÈÏÖ¤É豸¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/04/wpa3-hack-wifi-password.html

2.ICS¶ñÒâÈí¼þTriton¾íÍÁ³ÁÀ´ £¬Õë¶ÔÖж«µØÓòµÄ¹Ø¼ü»ù´¡ÉèÊ©


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ƾ¾ÝFireEyeµÄÒ»·Ýл㱨 £¬ICS¶ñÒâÈí¼þTriton³öÏÖÁ˵ڶþÃûÊܺ¦Õß £¬Õâ´ÎÊÇÖж«µØÓòµÄÒ»¸ö¹Ø¼ü»ù´¡ÉèÊ© £¬µ«FireEye²¢Î´Ð¹Â©Ö¸±êÆóÒµµÄÃû×Ö¡£Triton³õ´ÎÆØ¹âÓÚ2017ÄêÕë¶ÔÉ³ÌØÊ¯Ó͹«Ë¾Petro RabighµÄ¹¥»÷¡£ÕâÒ»´Î¹¥»÷ÕßÔÚÖ¸±êÍøÂçÖÐÂñ·üÁ˽üÒ»ÄêµÄ¹¦·ò £¬¶øºó²Å½øÈ빤³Ì¹¤×÷Õ¾¡£¹¥»÷ÕßʹÓÃÁ˶àÖÖ¹¤¾ß £¬Ô̺¬MimikatzºÍSecHackÀ´ÍøÂçÍ´´¦ £¬ÆäÖÐһЩ¹¤¾ßÄܹ»×·ÒäÖÁ2014Äê¡£FireEye²¢Î´Ð¹Â©Õâ´Î¹¥»÷Ôì³ÉµÄÇÖº¦¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/triton-ics-malware-second-victim/143658/

3.ÐÂÍøÂç¼äµýÌ×¼þTajMahal £¬Ô̺¬Ô¼80¸ö¶ñÒâÄ£¿é


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¿¨°Í˹»ù·¢ÏÖÒ»¸öеÄÍøÂç¼äµýƽ̨TajMahal £¬TajMahalÖÁÉÙ×Ô2013ÄêÒÔÀ´Ò»Ïò»îÔ¾ £¬×îÔçµÄÑù½ñÌìÆÚΪ2013Äê4Ô £¬×î½üµÄÔòΪ2018Äê8Ô¡£×êÑÐÈËÔ±ÉÐδÄܽ«TajMahalÓëÈκκڿÍ×éÖ¯½øÐйØÁª¡£TajMahalÊÇÒ»¸ö¶à½×¶Î¹¥»÷¿ò¼Ü £¬Ô̺¬Á½¸ö¶ñÒâÈí¼þ°ü£ºTokyoºÍYokohama¡£ºóÕßÓµÓÐÔ¼80¸ö¶ñÒâÄ£¿é £¬Ô̺¬¼ÓÔØÆ÷¡¢Ð­µ÷Ä£¿é¡¢C&CͨѶÄ£¿é¡¢ÒôƵ¼Í¼¡¢¼üÅ̼ͼ¡¢½ØÆÁ¡¢ÉãÏñÍ·¡¢ÎļþºÍÃÜÔ¿ÇÔÈ¡µÈ¡£Yokohama»á½«ÇÔÈ¡µ½µÄÐÅÏ¢ÒÔÃûΪTajMahalµÄXMLÎļþµÄ´ó¾Ö·¢ËÍÖÁC&C·þÎñÆ÷¡£Ä¿Ç°×êÑÐÈËÔ±·¢ÏÖµÄΨһÊܺ¦ÕßΪÖÐÑǵØÓòµÄ±í½»»ú¹¹¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-tajmahal-cyberespionage-kit-includes-80-malicious-modules/

4.Ã÷ÄáËÕ´ïÖÝÈËÀà·þÎñ²¿ÔâºÚ¿ÍÈëÇÖ £¬1.1Íò¹«ÃñÐÅÏ¢ÒÉÔâй¶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ÃÀ¹úÃ÷ÄáËÕ´ïÖÝÈËÀà·þÎñ²¿Ôâµ½ºÚ¿ÍÈëÇÖ £¬Ô¼1.1Íò¹«ÃñµÄÓ×ÎÒÐÅÏ¢»òÔâй¶¡£Æ¾¾Ý¸Ã»ú¹¹°ä²¼µÄ֪ͨ £¬¹¥»÷ÕßÔÚ2018Äê3ÔÂ26ÈÕ×óÓÒ½Ó¼ûÁËÒ»ÃûÔ±¹¤µÄµç×ÓÓʼþÕË»§ £¬²¢ÏòÆäͬÊ·¢ËÍÁËÁ½·âÒªÇó»ã¿îÖ§¸¶µÄ´¹µöÓʼþ¡£ÔÚ´ËÆÚ¼ä £¬¹¥»÷ÕßÄܹ»²é¿´¡¢ÏÂÔØ»òÒÔÆäËü·½Ê½»ñȡijЩÕË»§µÄÄÚÈÝ £¬MNITÎÞ·¨È·ÈϹ¥»÷Õ߲鿴»ò»ñÈ¡µ½µÄÐÅÏ¢£¨ÈôÊÇÓеϰ£©¡£¸Ã»ú¹¹Ö¸³ö £¬Ã»ÓÐÖ¤¾ÝÅú×¢±»ºÚµç×ÓÓʼþÕË»§ÖеÄÓ×ÎÒÐÅÏ¢ÒÔÈκη½Ê½Ôâµ½¡°²é¿´¡¢ÏÂÔØ»òÀÄÓᱡ£

 

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/83609/data-breach/minnesota-department-of-human-services-breach.html

5.SAP°ä²¼4Ô°²È«¸üР£¬½¨¸´6¸ö°²È«·ì϶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


±¾ÖÜSAP°ä²¼4Ô°²È«¸üР£¬½¨¸´Á˶à¸ö²úÆ·ÖеÄ6¸ö·ì϶¡£ÆäÖн¨¸´ÁËCrystal ReportsÖеÄÐÅϢй¶·ì϶£¨CVE-2019-0285 £¬ CVSSÆÀ·Ö7.5£© £¬¸Ã·ì϶¿ÉÔÊÐí¹¥»÷Õß½Ó¼ûϵͳÊý¾Ý¡¢µ÷ÊÔÐÅÏ¢µÈ¾ßÌåÐÅÏ¢¡£ÁíÒ»¸ö·ì϶ÊÇNetWeaver Java Application ServerÖеÄαÔì¹¥»÷·ì϶£¨CVE-2019-0283 £¬CVSS 7.1·Ö£© £¬¸Ã·ì϶¿ÉÔÊÐí¹¥»÷ÕßαÔìÏòÓû§ÏÔʾµÄÊý¾Ý¡£ÆäËü·ì϶Ô̺¬¶ÌȱÊÚȨ²é³­£¨CVE-2019-0279 £¬CVSS 5.5£©¡¢ÐÅϢй¶£¨CVE-2019-0282 £¬CVSS 5.3£»CVE-2019-0278 £¬CVSS 5.1£©ºÍXXE·ì϶£¨CVE-2019-0284 £¬ CVSS 5.1£©¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/sap-patches-high-severity-flaws-crystal-reports-netweaver

6.Adobe°ä²¼4Ô°²È«¸üР£¬½¨¸´8¸ö²úÆ·Öеݲȫ·ì϶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


±¾ÖܶþAdobe°ä²¼°²È«¸üР£¬½¨¸´Bridge CCµÈ8¿î²úÆ·ÖеĶà¸ö°²È«·ì϶ £¬ÆäÖÐÔ̺¬Bridge CCÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨¶ÑÒç³öCVE-2019-7130ºÍÔ½½çдCVE-2019-7132£©¡¢Experience Manager FormsÖеÄÐÅϢй¶·ì϶£¨CVE-2019-7129£¨XSS£©£©¡¢InDesignÖеÄËÁÒâ´úÂëÖ´Ðзì϶£¨CVE-2019-7107¡¢CVE-2019-7105ºÍCVE-2019-7106£©µÈ¡£ÆëÈ«·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/adobe-patch-update-squashes-critical-code-execution-bugs/