每日安全资讯-2020.8.6

声明:本文所有内容仅用于学习和研究目的,且不能违反《网络安全法》、《刑法》等相关要求,尤其禁止传播,或用于非善良目的。您查看本文,即视为遵守以上约定,否则责任自负。

今日导读:LaoXinWon携带两个勒索病毒样本,重复加密或增加解密难度、PyPI 官方仓库遭遇request恶意包投毒、2020 ICS Pwn2Own中Rockwell Studio 5000 Logix Designer从XXE到RCE漏洞、ChromeOS root提权、Web缓存中毒新途径、BlackHatUSA 2020 PPT已经陆续公开等。

【病毒区】
1、Office Drama on macOS-infecting macOS via macro-laden documents and 0days

2、Bulehero 蠕虫病毒安全分析报告

3、LaoXinWon携带两个勒索病毒样本,重复加密或增加解密难度

4、伪装成抖音国际版Tiktok的短信蠕虫
https://www.anquanke.com/post/id/212758

5、PyPI 官方仓库遭遇request恶意包投毒
https://mp.weixin.qq.com/s/dkPdXfGfSK097GI6Ln92lA

【漏洞分析区】
6、Cool XXE to RCE vulnerability in Rockwell Studio 5000 Logix Designer from the 2020 ICS Pwn2Own
http://muffsec.com/blog/?p=608

7、Exploiting Android Messengers with WebRTC: Part 2

8、ChromeOS root privilege escalation and persistence (reward: $45000)
https://bugs.chromium.org/p/chromium/issues/detail?id=1072233

【技术分享区】
9、Web Cache Entanglement: Novel Pathways to Poisoning

10、NodeJS module express-fileupload downloaded 7M times lets hackers inject code

11、iOS Kernel PAC,One Year Later

12、Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild

13、Breaking Samsung’s Root of Trust: Exploiting Samsung S10 Secure Boot

14、Microsoft Teams Updater Living off the Land
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/microsoft-teams-updater-living-off-the-land/

#工具#search.unprotect.it-The search engine about Malware Evasion Techniques
https://search.unprotect.it/

1