ÐÅÏ¢Äþ¾²Öܱ¨-2021ÄêµÚ44ÖÜ

Ðû²¼Ê±¼ä 2021-11-01

>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


±¾Öܹ²ÊÕ¼Äþ¾²Â©¶´62¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache Storm getTopologyHistory·þÎñSHELLÃüÁî×¢È멶´£»Microsoft Azure GridPro´úÂëÖ´ÐЩ¶´£»Apple macOS bigsurÄں˴úÂëÖ´ÐЩ¶´£»BillQuick Web SuiteSQL×¢È멶´£»Penguin Aurora TV Box 41502δÊÚȨ·ÃÎÊ©¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇWizardUpdateбäÖÖͨ¹ýð³äºÏ·¨Èí¼þÈƹý¼ì²â£»MicrosoftÐû²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄ·ÖÎö³ÂËߣ»EmsisoftÐû²¼Õë¶ÔÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷£»Ñо¿ÍŶÓÅû¶APT×éÖ¯LazarusÌᳫµÄ¹©Ó¦Á´¹¥»÷µÄϸ½Ú£»ÒÁÀÊʯÓ͹«Ë¾NIOPDCÔâµ½¹¥»÷£¬È«¹ú¼ÓÓÍÕ¾ÔËÓªÖжÏ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£


>ÖØÒªÄþ¾²Â©¶´Áбí


1. Apache Storm getTopologyHistory·þÎñSHELLÃüÁî×¢È멶´


Apache Storm getTopologyHistory·þÎñ´æÔÚSHELLÃüÁî×¢È멶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿É×¢ÈëÈÎÒâ´úÂë²¢ÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐС£


https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E


2. Microsoft Azure GridPro´úÂëÖ´ÐЩ¶´


Microsoft Azure GridProÇëÇó¹ÜÀí´æÔÚĿ¼±éÀú©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£


https://seclists.org/fulldisclosure/2021/Oct/33


3. Apple macOS bigsurÄں˴úÂëÖ´ÐЩ¶´


Apple macOS bigsurÄں˴æÔÚÄþ¾²Â©¶´£¬ÔÊÐíµ±µØ¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÄÚºËÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£


https://support.apple.com/zh-cn/HT212872


4. BillQuick Web SuiteSQL×¢È멶´


Bqe Software BillQuick Web Suite´æÔÚSQL×¢È멶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄSQLÇëÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐÈÎÒâ´úÂë¡£


https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware


5. Penguin Aurora TV Box 41502δÊÚȨ·ÃÎÊ©¶´


Penguin Aurora TV Box¶ÔÌض¨Á´½Ó´¦ÖôæÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬Î´ÊÚȨ¿ØÖÆϵͳ¡£


https://www.cnvd.org.cn/flaw/show/2934166



 >ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢WizardUpdateбäÖÖͨ¹ýð³äºÏ·¨Èí¼þÈƹý¼ì²â


Ñо¿ÈËÔ±ÔÚ10ÔÂ22ÈÕÅû¶Á˶ñÒâÈí¼þWizardUpdate£¨ÓÖÃûUpdateAgent£©µÄбäÖÖ¡£WizardUpdate×î³õÓÚ2020Äê11Ô±»·¢ÏÖ£¬Ö÷ÒªÕë¶ÔmacOS¡£¸Ã±äÌ忪·¢ÁËÐµĹ¦Ð§£¬ÀýÈçÀÄÓù«¹²ÔÆÀ´·Ö·¢¶ñÒâ¹ã¸æÈí¼þAdload£¬¶øÇÒ»¹ÄÜÈƹýAppleµÄÄþ¾²¹¦Ð§Gatekeeper¡£´ËÍ⣬ËüʹÓÃÁË͵¶ÉʽÏÂÔØ£¨Drive-by downloads£©µÄ·½Ê½½øÐзַ¢£¬Í¨¹ýð³äºÏ·¨Èí¼þÀ´Èƹý¼ì²â£¬Ñо¿ÈËÔ±ÉÐδ͸¶ÆäÄ£·ÂÁËÄÄЩÈí¼þ¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/updateagent-malware-variant-macos-software/


2¡¢MicrosoftÐû²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄ·ÖÎö³ÂËß


MicrosoftÍþвÇ鱨ÖÐÐÄÔÚ10ÔÂ25ÈÕÐû²¼Á˹ØÓÚNOBELIUMÍŻ﹥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£NOBELIUMÊÇ2020Äê12ÔÂÕë¶ÔSolarWindsµÄ¹©Ó¦Á´¹¥»÷µÄÄ»ºóºÚÊÖ£¬×Ô2021Äê5ÔÂÒÔÀ´£¬¸ÃÍÅ»ïÔÚÃÀ¹úºÍÅ·ÖÞÌᳫÁËÓÐÕë¶ÔÐԵĹ©Ó¦Á´¹¥»÷¡£´Ë´Î»î¶¯²¢Î´ÀûÓÃÈκΩ¶´£¬¶øÊÇÀûÓÃÃÜÂëÅçÉä¡¢ÁîÅÆ͵ÇÔ¡¢APIÀÄÓúÍÓã²æʽÍøÂçµöÓãµÈ¶àÖÖ¼¼ÊõÀ´ÇÔÌØȨÕÊ»§µÄƾ¾Ý£¬´Ó¶øÔÚÔÆ»·¾³ÖкáÏòÒƶ¯¡£


Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2021/10/25/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks/


3¡¢EmsisoftÐû²¼Õë¶ÔÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷


Äþ¾²¹«Ë¾EmsisoftÔÚ10ÔÂ24ÈÕ¹ûÈ»ÁËÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷¡£½ñÄêÔçЩʱºò£¬Ñо¿ÈËÔ±·¢ÏÖBlackMatterÖдæÔÚÒ»¸ö¿ÉÓÃÓÚ»Ö¸´¼ÓÃÜÎļþ©¶´£¬¶øÇÒËûÃÇÔÚ֮ǰһֱûÓÐ͸¶¸Ã©¶´µÄ´æÔÚ£¬ÒÔ·ÀÖ¹¸ÃÍÅ»ïÐÞ¸´Â©¶´¡£²»ÐÒµÄÊÇ£¬BlackMatterÔÚ9Ôµ׷¢ÏÖ²¢ÐÞ¸´Á˸鶴£¬Òò´ËÕâ¸ö½âÃÜÆ÷½öÄܽâÃÜ2021Äê7ÔÂÖÐÑ®ÖÁ9ÔÂÏÂѮ֮¼ä±»¼ÓÃܵÄÎļþ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123736/security/blackmatter-decryptor-pat-victims.html


4¡¢Ñо¿ÍŶÓÅû¶APT×éÖ¯LazarusÌᳫµÄ¹©Ó¦Á´¹¥»÷µÄϸ½Ú


KasperskyÑо¿ÍŶÓÓÚ±¾ÖܶþÅû¶ÁËLazarusÔÚ½üÆÚÌᳫµÄ¹©Ó¦Á´¹¥»÷¡£APT×éÖ¯Lazarus×Ô2009ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬ÀûÓÃMATA¹¥»÷¸÷¸öÐÐÒµµÄ×éÖ¯¡£Ôڴ˴λÖУ¬¸ÃÍÅ»ïÓÚ5Ô¹¥»÷ÁËÀ­ÍÑάÑǵÄIT¹©Ó¦ÉÌ£¬ÓÖÔÚ6Ô·ÝÀûÓúóÃÅBLINDINGCANµÄбäÌå¹¥»÷Á˺«¹úÖÇ¿â¡£Ñо¿ÈËÔ±³Æ£¬×î½üµÄ»î¶¯Õ¹ÏÖÁËÁ½¸öÇ÷ÊÆ£ºLazarusÈÔÈ»¶Ô¹ú·ÀÐÐÒµ¸ÐÐËȤ£¬¶øÇÒ»¹Ï£Íûͨ¹ý¹©Ó¦Á´¹¥»÷À´À©Õ¹Æä¹¥»÷·¶Î§¡£


Ô­ÎÄÁ´½Ó£º

https://usa.kaspersky.com/about/press-releases/2021_apt-actor-lazarus-attacks-defense-industry-develops-supply-chain-attack-capabilities


5¡¢ÒÁÀÊʯÓ͹«Ë¾NIOPDCÔâµ½¹¥»÷£¬È«¹ú¼ÓÓÍÕ¾ÔËÓªÖжÏ


ÒÁÀʹúÓÐʯÓͲúÎï·ÖÏú¹«Ë¾(NIOPDC)ÔÚ10ÔÂ26ÈÕÔâµ½¹¥»÷¡£NIOPDCÔÚÒÁÀÊÈ«¹ú·¶Î§ÄÚÓµÓÐÁè¼Ý3500¸ö¼ÓÓÍÕ¾£¬ÒòΪÎÞ·¨Ö§¸¶ÓöÈ£¬ÊÜÓ°ÏìµÄ¼ÓÓÍÕ¾ÔÚÔâµ½¹¥»÷ºóÁ¢¼´ÖжÏÁËÔËÓª¡£Ðí¶à¼ÓÓÍÕ¾µÄ¹ã¸æÅÆÉ϶¼ÏÔʾ×Å¡°Khamenei£¡ÎÒÃǵÄȼÁÏÄØ£¿¡±ºÍ¡°Ãâ·ÑÆûÓÍ¡±µÄ×ÖÑù£¬´ËÍ⣬¼ÓÓÍÕ¾µÄÆÁÄ»ÉÏÏÔʾ×Å¡°cyebrattack 64411¡±µÄ×ÖÑù£¬ÆäÖÐ64411ÊǸùú×î¸ßÁìÐäAyatollah Ali Khamenei°ì¹«Êҵĵ绰¡£Éв»È·¶¨¹¥»÷ÕßµÄÉí·Ý£¬µ«ÒÁÀÊÕþ¸®ÍƶÏÕâÊÇÓɵжԹú¼ÒÌᳫµÄÍøÂç¹¥»÷»î¶¯¡£Ä¿Ç°£¬¼ÓÓÍÕ¾µÄÔËÓªÒѻָ´¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123824/hacking/iranian-gas-stations-incident.html