ÐÅÏ¢Äþ¾²Öܱ¨-2021ÄêµÚ43ÖÜ

Ðû²¼Ê±¼ä 2021-10-26

>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


±¾Öܹ²ÊÕ¼Äþ¾²Â©¶´61¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇLinux Kernel Bluetooth CMTPÄ£¿éÁ½´ÎÊÍ·ÅȨÏÞÌáÉý©¶´£»Oracle MySQL Cluster Data Node»º³åÇøÒç³ö´úÂëÖ´ÐЩ¶´£»Google Chrome Skia¶ÑÒç³ö´úÂëÖ´ÐЩ¶´£»Oracle Fusion Middleware Oracle WebLogic Server Coherence ContainerIIOP´úÂëÖ´ÐЩ¶´£»AUVESY VersiondogÑéÖ¤»úÖÆÈƹý©¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÃÀ¹úFinCENÐû²¼¹ØÓÚÀÕË÷¹¥»÷̬ÊƵķÖÎö³ÂËߣ»REvil³ÆÆäÍøÕ¾Òѱ»½Ù³Ö£¬¿ÉÄÜ»áÔÙ´ÎÖÕÖ¹ÔËÓª£»Symantec·¢ÏÖHarvesterÕë¶ÔÄÏÑǵçÐÅÐÐÒµµÄ¹¥»÷»î¶¯£»Ñо¿ÈËÔ±·¢ÏÖ¹ã¸æÀ¹½ØÀ©Õ¹AllBlock²åÈë¹ã¸æµÄ»î¶¯£»Ñо¿ÈËÔ±·¢ÏÖLightBasinÍŻ﹥»÷È«ÇòµÄµçÐŹ«Ë¾¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£


>ÖØÒªÄþ¾²Â©¶´Áбí


1. Linux Kernel Bluetooth CMTPÄ£¿éÁ½´ÎÊÍ·ÅȨÏÞÌáÉý©¶´


Linux Kernel Bluetooth CMTPÄ£¿é´æÔÚÁ½´ÎÊÍ·Å©¶´£¬ÔÊÐíµ±µØ¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1223/



2. Oracle MySQL Cluster Data Node»º³åÇøÒç³ö´úÂëÖ´ÐЩ¶´


Oracle MySQL Cluster´¦ÖÃData Node×÷Òµ´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1232/



3. Google Chrome Skia¶ÑÒç³ö´úÂëÖ´ÐЩ¶´


Google Chrome Skia´æÔÚ¶ÑÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»ò¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£


https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html



4. Oracle Fusion Middleware Oracle WebLogic Server Coherence ContainerIIOP´úÂëÖ´ÐЩ¶´


Oracle Fusion Middleware Oracle WebLogic Server Coherence Container×é¼þ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£


https://www.oracle.com/security-alerts/cpuoct2021.html



5. AUVESY VersiondogÑéÖ¤»úÖÆÈƹý©¶´


AUVESY VersiondogÑéÖ¤´æÔÚÉè¼Æ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÎÞÐèÌṩÈÎÒâÐÎʽÑéÖ¤Óë·þÎñÆ÷³õʼ»¯»á»°£¬Î´ÊÚȨ·ÃÎÊϵͳ¡£


https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01


>ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢ÃÀ¹úFinCENÐû²¼¹ØÓÚÀÕË÷¹¥»÷̬ÊƵķÖÎö³ÂËß


ÃÀ¹ú²ÆÕþ²¿µÄ½ðÈÚ·¸×ïÖ´·¨ÍøÂç (FinCEN) ÔÚ10ÔÂ15ÈÕÐû²¼Á˹ØÓÚÀÕË÷¹¥»÷̬ÊƵķÖÎö³ÂËß¡£FinCEN·ÖÎöÁË2011Äê1ÔÂ1ÈÕÖÁ2021Äê6ÔÂ30ÈÕÆÚ¼äÌá½»µÄ2184·ÝSAR£¨¿ÉÒɻ³ÂËߣ©£¬·¢ÏÖÁËԼĪ52ÒÚÃÀÔªµÄBTC½»Ò׿ÉÄÜÓëÀÕË÷¹¥»÷µÄÏà¹Ø¡£2021ÉÏ°ëÄêÓëÀÕË÷¹¥»÷Ïà¹ØµÄSARÉæ¼°5.9ÒÚÃÀÔª£¬ÒѾ­Áè¼ÝÁË2020ÄêÈ«ÄêµÄ4.16ÒÚÃÀÔª¡£³ÂËß»¹È·¶¨ÁË68ÖÖ»îÔ¾µÄÀÕË÷Èí¼þ±äÖÖ£¨×î³£¼ûµÄÊÇREvil/Sodinokibi¡¢Conti¡¢DarkSide¡¢AvaddonºÍPhobos£©¡£


Ô­ÎÄÁ´½Ó£º

https://www.fincen.gov/sites/default/files/shared/Financial%20Trend%20Analysis_Ransomeware%20508%20FINAL.pdf



2¡¢REvil³ÆÆäÍøÕ¾Òѱ»½Ù³Ö£¬¿ÉÄÜ»áÔÙ´ÎÖÕÖ¹ÔËÓª


10ÔÂ17ÈÕ£¬ÀÕË÷ÔËÓªÍÅ»ïREvilµÄ³ÉÔ±0_nedayÔÚºÚ¿ÍÂÛ̳XSSÉϳÆÓÐÈËÈëÇÖÁËËûÃǵķþÎñÆ÷¡£0_nedayÌåÏÖ£¬ÄªË¹¿Æʱ¼ä12:00¿ªÊ¼£¬¹¥»÷ÕßÀûÓÃÆä˽Կµ÷³öÁËREvilÒþ²Ø·þÎñ£¬»¹³ÆËûÃÇûÓз¢ÏÖ·þÎñÆ÷Ôâµ½¹¥»÷µÄ¼£Ïó¡£µ«17ÈÕÍíÉÏ£¬0_nedayÔٴη¢Ìû³ÆËûÃǵķþÎñÆ÷Ôâµ½ÁËÈëÇÖ¡£Ä¿Ç°Éв»Çå³þ¹¥»÷ÕßÈçºÎ»ñµÃµÄREvil˽Կ£¬Ñо¿ÈËÔ±ÍƲâÕâÊÇÖ´·¨²¿ÃÅËùΪ¡£´ËÍ⣬´Ë´Î¹¥»÷¿ÉÄܻᵼÖÂREvilÓÀ¾ÃÐԵĹرÕ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/revil-ransomware-shuts-down-again-after-tor-sites-were-hijacked/



3¡¢Symantec·¢ÏÖHarvesterÕë¶ÔÄÏÑǵçÐÅÐÐÒµµÄ¹¥»÷»î¶¯


SymantecÔÚ10ÔÂ18ÈÕÅû¶ÁËÒ»¸öеÄÓɹú¼ÒÖ§³ÖµÄºÚ¿ÍÍÅ»ïHarvesterµÄ¹¥»÷»î¶¯¡£´Ë´Î¹¥»÷»î¶¯Ãé×¼ÁËÄÏÑǵÄ×éÖ¯£¬ÌرðÊÇ°¢¸»º¹£¬Õë¶ÔµçÐźÍITÐÐÒµµÄ¹«Ë¾ÒÔ¼°¹Ù·½×éÖ¯£¬¿ªÊ¼ÓÚ2021Äê6Ô£¬×î½üÒ»´Î»î¶¯·¢ÉúÔÚ2021Äê10Ô¡£ÔÚ¼¼Êõ·½Ã棬¹¥»÷ÕßÔÚÄ¿±êÖа²×°ÁËÒ»¸öÃûΪBackdoor.GraphonµÄ×Ô½ç˵ºóÃÅ£¬ÒÔ¼°ÆäËû×Ô½ç˵ÏÂÔØÆ÷ºÍ½Øͼ¹¤¾ß¡£Ä¿Ç°Éв»Çå³þ³õʼѬȾý½éÊÇʲô£¬µ«Ñо¿ÈËÔ±ÔÚ±»ºÚÉ豸ÉÏ·¢ÏֵĵÚÒ»¸ö¹ØÓڴ˴λµÄÖ¤¾ÝÊǶñÒâURL¡£


Ô­ÎÄÁ´½Ó£º

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/harvester-new-apt-attacks-asia



4¡¢Ñо¿ÈËÔ±·¢ÏÖ¹ã¸æÀ¹½ØÀ©Õ¹AllBlock²åÈë¹ã¸æµÄ»î¶¯


ImpervaµÄÑо¿ÈËÔ±ÔÚ8ÔÂÏÂÑ®·¢ÏÖÁËÒ»ÖÖеĹã¸æ²åÈë»î¶¯¡£¸Ã»î¶¯ÀûÓÃÁËChromeºÍOperaä¯ÀÀÆ÷ÉϵĹã¸æÀ¹½ØÀ©Õ¹·¨Ê½AllBlock£¬Õë¶ÔһЩ´óÐÍÍøÕ¾µÄÓû§¡£Ñо¿ÈËÔ±³Æ£¬¸ÃÀ©Õ¹¿ÉÒÔ½«ºÏ·¨URLÖض¨Ïòµ½Óɹ¥»÷Õß¿ØÖƵÄÁ¥ÊôÁ´½Ó£¬¶øÇÒ¿ª·¢Õß»¹Ê¹ÓÃÁ˶àÖÖ¼¼ÊõÀ´Èƹý¼ì²â£¬°üÂÞÿ100ºÁÃëÇå³ýÒ»´Îµ÷ÊÔ¿ØÖÆ̨¡£Ä¿Ç°£¬¸ÃÀ©Õ¹ÒÑ´ÓChromeÍøÉÏÓ¦ÓõêÖÐɾ³ý¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123488/cyber-crime/ad-blocking-chrome-extension-allblock.html


5¡¢Ñо¿ÈËÔ±·¢ÏÖLightBasinÍŻ﹥»÷È«ÇòµÄµçÐŹ«Ë¾


10ÔÂ19ÈÕ£¬CrowdStrikeÑо¿ÈËÔ±³ÆLightBasinÔÚ¹ýÈ¥ÎåÄêÖÐÒ»Ö±¹¥»÷È«Çò¸÷µØµÄͨÐÅÍøÂç¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2016Äê¾Í¿ªÊ¼»îÔ¾£¬Ö÷ÒªÕë¶ÔLinuxºÍSolarisϵͳ£¬×Ô2019ÄêÒÔÀ´ÒѾ­¹¥»÷ÁËÖÁÉÙ13¼ÒµçÐŹ«Ë¾¡£LightBasinµÄÄ¿±êϵͳ°üÂÞÍⲿDNS·þÎñÆ÷(eDNS)¡¢·þÎñ½»¸¶Æ½Ì¨ÏµÍ³(SDP)ºÍSIM/IMEIÅäÖã¬ÕâЩ¶¼ÊÇͨÓ÷Ö×éÎÞÏßµç·þÎñ(GPRS)ÍøÂçµÄÒ»²¿ÃÅ£¬ÔÚÀÖ³ÉÈëÇÖÖ®ºó»á°²×°×Ô½ç˵¶ñÒâÈí¼þSLAPSTICK¡£


Ô­ÎÄÁ´½Ó£º

https://www.crowdstrike.com/blog/an-analysis-of-lightbasin-telecommunications-attacks/