ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ43ÖÜ

°ä²¼¹¦·ò 2021-10-26

>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


±¾Öܹ²ÊÕ¼°²È«·ì϶61¸ö £¬£¬ÖµµÃ¹Ø×¢µÄÊÇLinux Kernel Bluetooth CMTPÄ£¿éÁ½´Î¿ªÊÍȨÏÞÌáÉý·ì϶£»£»Oracle MySQL Cluster Data Node»º³åÇøÒç³ö´úÂëÖ´Ðзì϶£»£»Google Chrome Skia¶ÑÒç³ö´úÂëÖ´Ðзì϶£»£»Oracle Fusion Middleware Oracle WebLogic Server Coherence ContainerIIOP´úÂëÖ´Ðзì϶£»£»AUVESY VersiondogÑéÖ¤»úÖÆÈÆ¹ý·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÃÀ¹úFinCEN°ä²¼¹ØÓÚÀÕË÷¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨£»£»REvil³ÆÆäÍøÕ¾Òѱ»½Ù³Ö £¬£¬¿ÉÄÜ»áÔÙ´ÎÖÕÖ¹ÔËÓª£»£»Symantec·¢ÏÖHarvesterÕë¶ÔÄÏÑǵçÐÅÐÐÒµµÄ¹¥»÷»î¶¯£»£»×êÑÐÈËÔ±·¢ÏÖ¸æ°×À¹½ØÀ©´óAllBlock²åÈë¸æ°×µÄ»î¶¯£»£»×êÑÐÈËÔ±·¢ÏÖLightBasinÍŻ﹥»÷È«ÇòµÄµçÐŹ«Ë¾¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬£¬±¾Öܰ²È«ÍþвΪÖС£


>ÖØÒª°²È«·ì϶Áбí


1. Linux Kernel Bluetooth CMTPÄ£¿éÁ½´Î¿ªÊÍȨÏÞÌáÉý·ì϶


Linux Kernel Bluetooth CMTPÄ£¿é´æÔÚÁ½´Î¿ªÊÍ·ì϶ £¬£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬£¬¿ÉÌáÉýȨÏÞ¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1223/



2. Oracle MySQL Cluster Data Node»º³åÇøÒç³ö´úÂëÖ´Ðзì϶


Oracle MySQL Cluster´¦ÖÃData Node×÷Òµ´æÔÚ»º³åÇøÒç³ö·ì϶ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1232/



3. Google Chrome Skia¶ÑÒç³ö´úÂëÖ´Ðзì϶


Google Chrome Skia´æÔÚ¶ÑÒç³ö·ì϶ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó £¬£¬ÓÕʹÓû§½âÎö £¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html



4. Oracle Fusion Middleware Oracle WebLogic Server Coherence ContainerIIOP´úÂëÖ´Ðзì϶


Oracle Fusion Middleware Oracle WebLogic Server Coherence Container×é¼þ´æÔÚ°²È«·ì϶ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://www.oracle.com/security-alerts/cpuoct2021.html



5. AUVESY VersiondogÑéÖ¤»úÖÆÈÆ¹ý·ì϶


AUVESY VersiondogÑéÖ¤´æÔÚÉè¼Æ·ì϶ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬£¬¿ÉÎÞÐèÌṩËÁÒâ´ó¾ÖÑéÖ¤Óë·þÎñÆ÷³õʼ»¯»á»° £¬£¬Î´ÊÚȨ½Ó¼ûϵͳ¡£


https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01


>ÖØÒª°²È«ÊÂÎñ×ÛÊö


1¡¢¡¢ÃÀ¹úFinCEN°ä²¼¹ØÓÚÀÕË÷¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨


ÃÀ¹ú²ÆÕþ²¿µÄ½ðÈÚ·¸×ï·¨ÂÉÍøÂç (FinCEN) ÔÚ10ÔÂ15ÈÕ°ä²¼Á˹ØÓÚÀÕË÷¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£FinCEN·ÖÎöÁË2011Äê1ÔÂ1ÈÕÖÁ2021Äê6ÔÂ30ÈÕÆÚ¼äÌá½»µÄ2184·ÝSAR£¨¿ÉÒɻ»ã±¨£© £¬£¬·¢ÏÖÁËԼĪ52ÒÚÃÀÔªµÄBTCÂòÂô¿ÉÄÜÓëÀÕË÷¹¥»÷µÄÓйØ¡£2021ÉϰëÄêÓëÀÕË÷¹¥»÷ÓйصÄSARÉæ¼°5.9ÒÚÃÀÔª £¬£¬ÒѾ­³¬¹ýÁË2020ÄêÕûÄêµÄ4.16ÒÚÃÀÔª¡£»ã±¨»¹È·¶¨ÁË68ÖÖ»îÔ¾µÄÀÕË÷Èí¼þ±äÖÖ£¨×î³£¼ûµÄÊÇREvil/Sodinokibi¡¢¡¢Conti¡¢¡¢DarkSide¡¢¡¢AvaddonºÍPhobos£©¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.fincen.gov/sites/default/files/shared/Financial%20Trend%20Analysis_Ransomeware%20508%20FINAL.pdf



2¡¢¡¢REvil³ÆÆäÍøÕ¾Òѱ»½Ù³Ö £¬£¬¿ÉÄÜ»áÔÙ´ÎÖÕÖ¹ÔËÓª


10ÔÂ17ÈÕ £¬£¬ÀÕË÷ÔËÓªÍÅ»ïREvilµÄ³ÉÔ±0_nedayÔÚºÚ¿ÍÂÛ̳XSSÉϳÆÓÐÈËÈëÇÖÁËËûÃǵķþÎñÆ÷¡£0_neday°µÊ¾ £¬£¬ÄªË¹¿Æ¹¦·ò12:00ÆðÍ· £¬£¬¹¥»÷ÕßÀûÓÃÆä˽Կµ÷³öÁËREvil°µ²Ø·þÎñ £¬£¬»¹³ÆËûÃÇûÓз¢ÏÖ·þÎñÆ÷Ôâµ½¹¥»÷µÄ¼£Ïó¡£µ«17ÈÕÍíÉÏ £¬£¬0_nedayÔٴη¢Ìû³ÆËûÃǵķþÎñÆ÷Ôâµ½ÁËÈëÇÖ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßÈôºÎ»ñµÃµÄREvil˽Կ £¬£¬×êÑÐÈËÔ±´§Ä¦ÕâÊÇ·¨Âɲ¿ÃÅËùΪ¡£´ËÍâ £¬£¬Õâ´Î¹¥»÷¿ÉÄܻᵼÖÂREvilÓÀÔ¶ÐԵĹرÕ¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.bleepingcomputer.com/news/security/revil-ransomware-shuts-down-again-after-tor-sites-were-hijacked/



3¡¢¡¢Symantec·¢ÏÖHarvesterÕë¶ÔÄÏÑǵçÐÅÐÐÒµµÄ¹¥»÷»î¶¯


SymantecÔÚ10ÔÂ18ÈÕÅû¶ÁËÒ»¸öеÄÓɹú¶ÈÖ§³ÖµÄºÚ¿ÍÍÅ»ïHarvesterµÄ¹¥»÷»î¶¯¡£Õâ´Î¹¥»÷»î¶¯¶Ô×¼ÁËÄÏÑǵÄ×éÖ¯ £¬£¬³ö¸ñÊǰ¢¸»º¹ £¬£¬Õë¶ÔµçÐźÍITÐÐÒµµÄ¹«Ë¾ÒÔ¼°¹Ù·½×éÖ¯ £¬£¬ÆðÍ·ÓÚ2021Äê6Ô £¬£¬×î½üÒ»´Î»î¶¯²úÉúÔÚ2021Äê10Ô¡£ÔÚ¼¼Êõ·½Ãæ £¬£¬¹¥»÷ÕßÔÚÖ¸±êÖÐ×°ÖÃÁËÒ»¸öÃûΪBackdoor.GraphonµÄ×Ô½ç˵ºóÃÅ £¬£¬ÒÔ¼°ÆäËû×Ô½ç˵ÏÂÔØÆ÷ºÍ½ØÍ¼¹¤¾ß¡£Ä¿Ç°Éв»Ã÷ÏÔ³õʼϰȾý½éÊÇʲô £¬£¬µ«×êÑÐÈËÔ±ÔÚ±»ºÚÉ豸ÉÏ·¢ÏֵĵÚÒ»¸ö¹ØÓÚÕâ´Î»î¶¯µÄÖ¤¾ÝÊǶñÒâURL¡£


Ô­ÎÄÁ´½Ó£º£º

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/harvester-new-apt-attacks-asia



4¡¢¡¢×êÑÐÈËÔ±·¢ÏÖ¸æ°×À¹½ØÀ©´óAllBlock²åÈë¸æ°×µÄ»î¶¯


ImpervaµÄ×êÑÐÈËÔ±ÔÚ8ÔÂÏÂÑ®·¢ÏÖÁËÒ»ÖÖеĸæ°×²åÈë»î¶¯¡£¸Ã»î¶¯ÀûÓÃÁËChromeºÍOperaä¯ÀÀÆ÷Éϵĸæ°×À¹½ØÀ©´ó·¨Ê½AllBlock £¬£¬Õë¶ÔһЩ´óÐÍÍøÕ¾µÄÓû§¡£×êÑÐÈËÔ±³Æ £¬£¬¸ÃÀ©´óÄܹ»½«ºÏ·¨URLÖØ¶¨Ïòµ½Óɹ¥»÷Õß½ÚÖÆµÄ´ÓÊôÁ´½Ó £¬£¬²¢ÇÒ¿ª·¢Õß»¹Ê¹ÓÃÁ˶àÖÖ¼¼ÊõÀ´Èƹý¼ì²â £¬£¬Ô̺¬Ã¿100ºÁÃë¶Ï¸ùÒ»´Îµ÷ÊÔ½ÚÖÆÌ¨¡£Ä¿Ç° £¬£¬¸ÃÀ©´óÒÑ´ÓChromeÍøÉÏÀûÓõêÖÐɾ³ý¡£


Ô­ÎÄÁ´½Ó£º£º

https://securityaffairs.co/wordpress/123488/cyber-crime/ad-blocking-chrome-extension-allblock.html


5¡¢¡¢×êÑÐÈËÔ±·¢ÏÖLightBasinÍŻ﹥»÷È«ÇòµÄµçÐŹ«Ë¾


10ÔÂ19ÈÕ £¬£¬CrowdStrike×êÑÐÈËÔ±³ÆLightBasinÔÚ´ÓǰÎåÄêÖÐÒ»Ïò¹¥»÷È«Çò¸÷µØµÄÍ¨Ñ¶ÍøÂç¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2016Äê¾ÍÆðÍ·»îÔ¾ £¬£¬ÖØÒªÕë¶ÔLinuxºÍSolarisϵͳ £¬£¬×Ô2019ÄêÒÔÀ´ÒѾ­¹¥»÷ÁËÖÁÉÙ13¼ÒµçÐŹ«Ë¾¡£LightBasinµÄÖ¸±êϵͳÔ̺¬ÍⲿDNS·þÎñÆ÷(eDNS)¡¢¡¢·þÎñ½»¸¶Æ½Ì¨ÏµÍ³(SDP)ºÍSIM/IMEIÅäÖà £¬£¬ÕâЩ¶¼ÊÇͨÓ÷Ö×éÎÞÏßµç·þÎñ(GPRS)ÍøÂçµÄÒ»²¿ÃÅ £¬£¬Ôڳɹ¦ÈëÇÖÖ®ºó»á×°ÖÃ×Ô½ç˵¶ñÒâÈí¼þSLAPSTICK¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.crowdstrike.com/blog/an-analysis-of-lightbasin-telecommunications-attacks/