Ñо¿Ö°Ô±·¢Ã÷HTTP/2 ÐÂÐͼÆÊ±²àÐŵÀ¹¥»÷·½·¨£»£»£»£»£»£»£»£»Googleͳ¼ÆÉϰëÄêÒÑÅû¶11¸öÔÚҰʹÓÃ0day

Ðû²¼Ê±¼ä 2020-08-03

1.Ñо¿Ö°Ô±·¢Ã÷HTTP/2 ÐÂÐͼÆÊ±²àÐŵÀ¹¥»÷·½·¨


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


DistriNetÑо¿Ð¡×éºÍŦԼ´óѧ°¢²¼Ôú±È·ÖУµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄHTTP/2 ¼ÆÊ±²àÐŵÀ¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬£¬£¬²¢ÃüÃûΪÎÞʱÏÞÖÆÊ±¹¥»÷£¨Timeless Timing Attacks£¬£¬£¬£¬£¬£¬£¬£¬TTA£©¡£¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷·½·¨ÊÇʹÓÃÍøÂçЭÒéµÄ¶à·¸´ÓúÍÓ¦ÓóÌÐòµÄ²¢·¢Ö´ÐУ¬£¬£¬£¬£¬£¬£¬£¬´Ó¶ø²»ÊÜÍøÂçÌõ¼þµÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£Óë¹Å°åµÄ»ùÓÚʱ¼äµÄ¹¥»÷²î±ð£¬£¬£¬£¬£¬£¬£¬£¬TTAÖ´ÐÐʱ¼äÊǰ´Ë³Ðò×ÔÁ¦ÕÉÁ¿µÄ£¬£¬£¬£¬£¬£¬£¬£¬×ÅʵÑé´ÓÁ½¸ö²¢·¢Ö´ÐеÄÇëÇóµÄ˳ÐòºÍÏà¶Ôʱ¼ä²î±ðÖÐÌáÊØÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬¶ø²»ÒÀÀµÓÚÈκÎʱ¼äÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÑо¿Ð§¹û½«ÔÚ½ñÄêϰëÄêÔÚUSENIXÇå¾²×êÑлáÉϽÒÏþ£¬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±»¹Ðû²¼»ùÓÚPythonµÄ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ²âÊÔHTTP / 2ЧÀÍÆ÷µÄTTAÎó²î¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2020/07/http2-timing-side-channel-attacks.html    


2.Google PlayÊÐËÁ±£´æ29¿î¶ñÒâÕÕÆ¬´¦Öóͷ£Ó¦ÓÃ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


WhiteOps SatoriÍþвÇ鱨ÍŶӷ¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬Google PlayÊÐËÁ±£´æ29¿î¶ñÒâÕÕÆ¬´¦Öóͷ£Ó¦Óᣡ£¡£¡£¡£¡£¡£¡£ÕâЩӦÓÃÕë¶ÔAndroidÓû§·Ö·¢¹ã¸æÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÈƹýÇå¾²¼ì²é£¬£¬£¬£¬£¬£¬£¬£¬WhiteOps½«¸Ã¸ö»î¶¯ÃüÃûΪCHARTREUSEBLUR¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹ã¸æÈí¼þµÄÃû³ÆÖж¼´øÓÐBLURÒ»´Ê£¬£¬£¬£¬£¬£¬£¬£¬ÆäÄ£ÄâÁËÕÕÆ¬±à¼­¹¤¾ßÀ´Ä£ºýͼÏñ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÓÐÐí¶à¶ñÒâÊôÐÔ£¬£¬£¬£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬£¬£¬£¬Ëü×°Öõ½Ä¿µÄ×°±¸ºóÒþ²ØÓ¦ÓÃͼ±ê¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¶ÔÓ¦ÓóÌÐòµÄ»ìÏý´úÂë¾ÙÐнøÒ»²½ÆÊÎöºó£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷¸ÃÓ¦ÓóÌÐòʹÓÃÁËÈý½×¶ÎÓÐÓøºÔØÑݱä¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩӦÓõÄÏÂÔØÁ¿×ܼÆÔ¼Îª350Íò£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚGoogleÒѽ«Æäɾ³ý¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/08/01/numerous-malicious-photo-blur-apps-appeared-on-play-store/


3.Drizly¹«Ë¾ÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶250Íò¿Í»§PII


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


¾ÆÀàÅäË͹«Ë¾DrizlyÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶250Íò¿Í»§PII¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÓÐδ¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËÆä¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþµØµã¡¢ÉúÈÕ¡¢bcrypt¼ÓÃܵÄÃÜÂëÒÔ¼°ËÍ»õµØµã¡£¡£¡£¡£¡£¡£¡£¡£HaveIBeenPwnedÔò³Æ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´Îй¶µÄÐÅÏ¢»¹°üÀ¨¿Í»§Ãû³ÆºÍIPµØµã£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ¿ÉÄÜÓ°ÏìÁËԼĪ250Íò¸öÓû§¡£¡£¡£¡£¡£¡£¡£¡£DrizlyÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ´Ë´ÎÊÂÎñÖв¢Ã»ÓвÆÎñÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬¶øËûÃÇÒѶԴËÊÂÕö¿ªÊӲ졣¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/drizly-breach-hits-25-million/


4.Googleͳ¼Æ£¬£¬£¬£¬£¬£¬£¬£¬½ñÄêÉϰëÄêÒÑÅû¶11¸öÔÚҰʹÓÃ0day


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


GoogleµÄProject ZeroÇå¾²ÍŶÓͳ¼Æ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬½ñÄêÉϰëÄêÒÑÅû¶11¸öÔÚҰʹÓÃ0day¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖÐFirefox£¨CVE-2019-17026£©ºÍInternet Explorer£¨CVE-2020-0674£©¾ùÒѱ»Ãñ×å¹ú¼ÒºÚ¿Í×éÖ¯DarkHotelʹÓ㬣¬£¬£¬£¬£¬£¬£¬±ðµÄÉÐÓÐChrome£¨CVE-2020-6418£©£¬£¬£¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼·À¶¾Ç½ÍøÂç°æ£¨CVE-2020-8467ºÍCVE-2020-8468£©ÊÇÇ÷ÊÆ¿Æ¼¼ÊÓ²ìÈýÁâµç»úÊÂÎñʱ·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬£¬£¬ Firefox£¨CVE-2020-6819ºÍCVE-2020-6820£©»òÒѱ»Ê¹Ó㬣¬£¬£¬£¬£¬£¬£¬CVE-2020-0938¡¢CVE-2020-1020ºÍCVE-2020-1027µÄÏêϸÐÅÏ¢ÉÐδÐû²¼£¬£¬£¬£¬£¬£¬£¬£¬Sophos XG·À»ðǽ£¨CVE 2020-12271£©Òѱ»Ê¹Óð²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/google-eleven-zero-days-detected-in-the-wild-in-the-first-half-of-2020/#ftag=RSSbaffb68


5.Ñо¿ÍŶÓÐû²¼ÍøÂç´¹ÂÚÇéÐμ°½»»¥·½·¨µÄ±¨¸æ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


À´×ÔGoogle¡¢PayPal¡¢ÈýÐǺÍÑÇÀûÉ£ÄÇÖÝÁ¢´óѧµÄÇå¾²Ñо¿Ö°Ô±×é³ÉµÄÍŶӺÄʱÕûÕûÒ»Ä꣬£¬£¬£¬£¬£¬£¬£¬ÆÊÎöÁËÍøÂç´¹ÂÚµÄÇéÐÎÒÔ¼°Óû§ÓëÍøÂç´¹ÂÚÒ³ÃæµÄ½»»¥·½·¨£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÏîÄ¿ÆÊÎöÁË22553707¸öÓû§¶Ô404628¸öÍøÂç´¹ÂÚÒ³ÃæµÄ»á¼û¡£¡£¡£¡£¡£¡£¡£¡£±¨¸æÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Æ½¾ùÍøÂç´¹ÂÚ¹¥»÷ʱ¼äΪ21Сʱ£¬£¬£¬£¬£¬£¬£¬£¬ÓÐ7.42£¥µÄÊܺ¦Õß×îÖÕÊäÁËÈëÆ¾Ö¤²¢µ¼ÖÂÕË»§Ð¹Â¶»òڲƭ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Ò»Ð©¹¥»÷»î¶¯»áÒ»Á¬»îÔ¾³¤´ï9¸öÔ£¬£¬£¬£¬£¬£¬£¬£¬ÆäʹÓÃÏֳɵĴ¹ÂÚ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬¿É¹¥»÷³ÉǧÉÏÍòµÄÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/phishing-campaigns-from-first-to-last-victim-take-21h-on-average/#ftag=RSSbaffb68


6.FireEyeÐû²¼Õë¶ÔOffice 365µÄ¹¥»÷µÄÆÊÎö±¨¸æ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


FireEyeÐû²¼ÁËoffice365¹¥»÷͸ÊÓ¼°MandiantÖÎÀí·ÀÎñÊÓ²ìµÄ±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£ÆäÕë¶ÔOffice 365 BEC¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÌṩÁËÓйØMicrosoftÔÆÉú²úÁ¦Ì×¼þ¼°¶ÔÑо¿Ö°Ô±ÖÁ¹ØÖ÷ÒªµÄÖÖÖÖÈÕÖ¾ºÍÊý¾ÝÔ´¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬»¹ÏÈÈÝÁËÔÚÏìÓ¦BECʱ³£¼ûµÄ¹¥»÷ÕßÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÉîÈëÚ¹ÊÍÁËMandiantÍйܷÀÓùÆÊÎöʦÔõÑùʹÓÃPowerShellºÍFireEye Helixƽ̨ÔÚ¿Í»§ÄÇÀï¾ÙÐÐÕâЩÊӲ졣¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2020/07/insights-into-office-365-attacks-and-how-managed-defense-investigates.html