ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ43ÖÜ

Ðû²¼Ê±¼ä 2021-10-26

>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


±¾Öܹ²ÊÕ¼Çå¾²Îó²î61¸ö£¬ £¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇLinux Kernel Bluetooth CMTPÄ£¿£¿ £¿£¿éÁ½´ÎÊÍ·ÅȨÏÞÌáÉýÎó²î£»£»£»£»£»£»£»Oracle MySQL Cluster Data Node»º³åÇøÒç³ö´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»Google Chrome Skia¶ÑÒç³ö´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»Oracle Fusion Middleware Oracle WebLogic Server Coherence ContainerIIOP´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»AUVESY VersiondogÑéÖ¤»úÖÆÈÆ¹ýÎó²î¡£¡£ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹úFinCENÐû²¼¹ØÓÚÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ£»£»£»£»£»£»£»REvil³ÆÆäÍøÕ¾Òѱ»Ð®ÖÆ£¬ £¬£¬£¬£¬¿ÉÄÜ»áÔÙ´ÎÖÕÖ¹ÔËÓª£»£»£»£»£»£»£»Symantec·¢Ã÷HarvesterÕë¶ÔÄÏÑǵçÐÅÐÐÒµµÄ¹¥»÷»î¶¯£»£»£»£»£»£»£»Ñо¿Ö°Ô±·¢Ã÷¹ã¸æ×èµ²À©Õ¹AllBlock²åÈë¹ã¸æµÄ»î¶¯£»£»£»£»£»£»£»Ñо¿Ö°Ô±·¢Ã÷LightBasinÍŻ﹥»÷È«ÇòµÄµçÐŹ«Ë¾¡£¡£ ¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬ £¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£ ¡£


>Ö÷ÒªÇå¾²Îó²îÁбí


1. Linux Kernel Bluetooth CMTPÄ£¿£¿ £¿£¿éÁ½´ÎÊÍ·ÅȨÏÞÌáÉýÎó²î


Linux Kernel Bluetooth CMTPÄ£¿£¿ £¿£¿é±£´æÁ½´ÎÊÍ·ÅÎó²î£¬ £¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ £¬£¬£¬£¬¿ÉÌáÉýȨÏÞ¡£¡£ ¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1223/



2. Oracle MySQL Cluster Data Node»º³åÇøÒç³ö´úÂëÖ´ÐÐÎó²î


Oracle MySQL Cluster´¦Öóͷ£Data Node×÷Òµ±£´æ»º³åÇøÒç³öÎó²î£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ £¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1232/



3. Google Chrome Skia¶ÑÒç³ö´úÂëÖ´ÐÐÎó²î


Google Chrome Skia±£´æ¶ÑÒç³öÎó²î£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇó£¬ £¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬ £¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»£»ò¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£


https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html



4. Oracle Fusion Middleware Oracle WebLogic Server Coherence ContainerIIOP´úÂëÖ´ÐÐÎó²î


Oracle Fusion Middleware Oracle WebLogic Server Coherence Container×é¼þ±£´æÇå¾²Îó²î£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ £¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£


https://www.oracle.com/security-alerts/cpuoct2021.html



5. AUVESY VersiondogÑéÖ¤»úÖÆÈÆ¹ýÎó²î


AUVESY VersiondogÑéÖ¤±£´æÉè¼ÆÎó²î£¬ £¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ £¬£¬£¬£¬¿ÉÎÞÐèÌṩí§ÒâÐÎʽÑéÖ¤ÓëЧÀÍÆ÷³õʼ»¯»á»°£¬ £¬£¬£¬£¬Î´ÊÚȨ»á¼ûϵͳ¡£¡£ ¡£


https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01


>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÃÀ¹úFinCENÐû²¼¹ØÓÚÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ


ÃÀ¹ú²ÆÎñ²¿µÄ½ðÈÚ·¸·¨Ö´·¨ÍøÂç (FinCEN) ÔÚ10ÔÂ15ÈÕÐû²¼Á˹ØÓÚÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£ ¡£FinCENÆÊÎöÁË2011Äê1ÔÂ1ÈÕÖÁ2021Äê6ÔÂ30ÈÕʱ´úÌá½»µÄ2184·ÝSAR£¨¿ÉÒɻ±¨¸æ£©£¬ £¬£¬£¬£¬·¢Ã÷ÁËԼĪ52ÒÚÃÀÔªµÄBTCÉúÒâ¿ÉÄÜÓëÀÕË÷¹¥»÷µÄÏà¹Ø¡£¡£ ¡£2021ÉϰëÄêÓëÀÕË÷¹¥»÷Ïà¹ØµÄSARÉæ¼°5.9ÒÚÃÀÔª£¬ £¬£¬£¬£¬ÒѾ­Áè¼ÝÁË2020ÄêÕûÄêµÄ4.16ÒÚÃÀÔª¡£¡£ ¡£±¨¸æ»¹È·¶¨ÁË68ÖÖ»îÔ¾µÄÀÕË÷Èí¼þ±äÖÖ£¨×î³£¼ûµÄÊÇREvil/Sodinokibi¡¢Conti¡¢DarkSide¡¢AvaddonºÍPhobos£©¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.fincen.gov/sites/default/files/shared/Financial%20Trend%20Analysis_Ransomeware%20508%20FINAL.pdf



2¡¢REvil³ÆÆäÍøÕ¾Òѱ»Ð®ÖÆ£¬ £¬£¬£¬£¬¿ÉÄÜ»áÔÙ´ÎÖÕÖ¹ÔËÓª


10ÔÂ17ÈÕ£¬ £¬£¬£¬£¬ÀÕË÷ÔËÓªÍÅ»ïREvilµÄ³ÉÔ±0_nedayÔÚºÚ¿ÍÂÛ̳XSSÉϳÆÓÐÈËÈëÇÖÁËËûÃǵÄЧÀÍÆ÷¡£¡£ ¡£0_nedayÌåÏÖ£¬ £¬£¬£¬£¬ÄªË¹¿ÆÊ±¼ä12:00×îÏÈ£¬ £¬£¬£¬£¬¹¥»÷ÕßʹÓÃÆä˽Կµ÷³öÁËREvilÒþ²ØÐ§ÀÍ£¬ £¬£¬£¬£¬»¹³ÆËûÃÇûÓз¢Ã÷ЧÀÍÆ÷Ôâµ½¹¥»÷µÄ¼£Ï󡣡£ ¡£µ«17ÈÕÍíÉÏ£¬ £¬£¬£¬£¬0_nedayÔٴη¢Ìû³ÆËûÃǵÄЧÀÍÆ÷Ôâµ½ÁËÈëÇÖ¡£¡£ ¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÔõÑù»ñµÃµÄREvil˽Կ£¬ £¬£¬£¬£¬Ñо¿Ö°Ô±ÍƲâÕâÊÇÖ´·¨²¿·ÖËùΪ¡£¡£ ¡£±ðµÄ£¬ £¬£¬£¬£¬´Ë´Î¹¥»÷¿ÉÄܻᵼÖÂREvilÓÀÊÀÐԵĹرÕ¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/revil-ransomware-shuts-down-again-after-tor-sites-were-hijacked/



3¡¢Symantec·¢Ã÷HarvesterÕë¶ÔÄÏÑǵçÐÅÐÐÒµµÄ¹¥»÷»î¶¯


SymantecÔÚ10ÔÂ18ÈÕÅû¶ÁËÒ»¸öеÄÓɹú¼ÒÖ§³ÖµÄºÚ¿ÍÍÅ»ïHarvesterµÄ¹¥»÷»î¶¯¡£¡£ ¡£´Ë´Î¹¥»÷»î¶¯Ãé×¼ÁËÄÏÑǵÄ×éÖ¯£¬ £¬£¬£¬£¬ÌØÊâÊǰ¢¸»º¹£¬ £¬£¬£¬£¬Õë¶ÔµçÐźÍITÐÐÒµµÄ¹«Ë¾ÒÔ¼°¹Ù·½×éÖ¯£¬ £¬£¬£¬£¬×îÏÈÓÚ2021Äê6Ô£¬ £¬£¬£¬£¬×î½üÒ»´Î»î¶¯±¬·¢ÔÚ2021Äê10Ô¡£¡£ ¡£ÔÚÊÖÒÕ·½Ã棬 £¬£¬£¬£¬¹¥»÷ÕßÔÚÄ¿µÄÖÐ×°ÖÃÁËÒ»¸öÃûΪBackdoor.GraphonµÄ×Ô½ç˵ºóÃÅ£¬ £¬£¬£¬£¬ÒÔ¼°ÆäËû×Ô½ç˵ÏÂÔØÆ÷ºÍ½ØÍ¼¹¤¾ß¡£¡£ ¡£ÏÖÔÚÉв»ÇåÎú³õʼѬȾǰÑÔÊÇʲô£¬ £¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÔÚ±»ºÚ×°±¸ÉÏ·¢Ã÷µÄµÚÒ»¸ö¹ØÓڴ˴λµÄÖ¤¾ÝÊǶñÒâURL¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/harvester-new-apt-attacks-asia



4¡¢Ñо¿Ö°Ô±·¢Ã÷¹ã¸æ×èµ²À©Õ¹AllBlock²åÈë¹ã¸æµÄ»î¶¯


ImpervaµÄÑо¿Ö°Ô±ÔÚ8ÔÂÏÂÑ®·¢Ã÷ÁËÒ»ÖÖÐÂµÄ¹ã¸æ²åÈë»î¶¯¡£¡£ ¡£¸Ã»î¶¯Ê¹ÓÃÁËChromeºÍOperaä¯ÀÀÆ÷ÉÏµÄ¹ã¸æ×èµ²À©Õ¹³ÌÐòAllBlock£¬ £¬£¬£¬£¬Õë¶ÔһЩ´óÐÍÍøÕ¾µÄÓû§¡£¡£ ¡£Ñо¿Ö°Ô±³Æ£¬ £¬£¬£¬£¬¸ÃÀ©Õ¹¿ÉÒÔ½«Õýµ±URLÖØ¶¨Ïòµ½Óɹ¥»÷Õß¿ØÖƵÄÁ¥ÊôÁ´½Ó£¬ £¬£¬£¬£¬²¢ÇÒ¿ª·¢Õß»¹Ê¹ÓÃÁ˶àÖÖÊÖÒÕÀ´Èƹý¼ì²â£¬ £¬£¬£¬£¬°üÀ¨Ã¿100ºÁÃëɨ³ýÒ»´Îµ÷ÊÔ¿ØÖÆÌ¨¡£¡£ ¡£ÏÖÔÚ£¬ £¬£¬£¬£¬¸ÃÀ©Õ¹ÒÑ´ÓChromeÍøÉÏÓ¦ÓõêÖÐɾ³ý¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123488/cyber-crime/ad-blocking-chrome-extension-allblock.html


5¡¢Ñо¿Ö°Ô±·¢Ã÷LightBasinÍŻ﹥»÷È«ÇòµÄµçÐŹ«Ë¾


10ÔÂ19ÈÕ£¬ £¬£¬£¬£¬CrowdStrikeÑо¿Ö°Ô±³ÆLightBasinÔÚÒÑÍùÎåÄêÖÐÒ»Ö±¹¥»÷È«Çò¸÷µØµÄÍ¨Ñ¶ÍøÂç¡£¡£ ¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2016Äê¾Í×îÏÈ»îÔ¾£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶ÔLinuxºÍSolarisϵͳ£¬ £¬£¬£¬£¬×Ô2019ÄêÒÔÀ´ÒѾ­¹¥»÷ÁËÖÁÉÙ13¼ÒµçÐŹ«Ë¾¡£¡£ ¡£LightBasinµÄÄ¿µÄϵͳ°üÀ¨ÍⲿDNSЧÀÍÆ÷(eDNS)¡¢Ð§Àͽ»¸¶Æ½Ì¨ÏµÍ³(SDP)ºÍSIM/IMEIÉèÖ㬠£¬£¬£¬£¬ÕâЩ¶¼ÊÇͨÓ÷Ö×éÎÞÏßµçЧÀÍ(GPRS)ÍøÂçµÄÒ»²¿·Ö£¬ £¬£¬£¬£¬ÔÚÀÖ³ÉÈëÇÖÖ®ºó»á×°ÖÃ×Ô½ç˵¶ñÒâÈí¼þSLAPSTICK¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.crowdstrike.com/blog/an-analysis-of-lightbasin-telecommunications-attacks/