Ñо¿ÍŶÓÅû¶Òѱ£´æ¶àÄêµÄLinuxºóÃÅRotaJakiro£»£»£»£»£»Î¢ÈíÅû¶IoTºÍOT×°±¸ÖеÄ25¸öRCEÎó²îBadAlloc
Ðû²¼Ê±¼ä 2021-04-301.Ñо¿ÍŶÓÅû¶Òѱ£´æ¶àÄêµÄLinuxºóÃÅRotaJakiro
Ñо¿ÍŶÓÅû¶×Ô2018ÄêÒÔÀ´¾Í±£´æµÄLinuxºóÃÅRotaJakiro£¬£¬£¬£¬Ö¼ÔÚ´ÓÊÜѬȾµÄ×°±¸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£RotaJakiroÖ®ÒÔÊǵÃÃû£¬£¬£¬£¬ÊÇÓÉÓÚËüʹÓÃÁËÂÖ»»¼ÓÃÜ£¬£¬£¬£¬²¢ÇÒÔÚrootÕÊ»§ºÍ·ÇrootÕÊ»§ÖÐÖ´ÐÐʱÓÐËù²î±ð¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÆäʹÓÃÁ˶àÖÖ¼ÓÃÜËã·¨£¬£¬£¬£¬°üÀ¨ÓÃÓÚ¶ÔÑù±¾ÖеÄ×ÊÔ´ÐÅÏ¢¾ÙÐмÓÃܵÄAESËã·¨£¬£¬£¬£¬ÒÔ¼°ÓÃÓÚC2ͨѶµÄAES¡¢XOR¡¢ROTATE¼ÓÃܺÍZLIBѹËõ£¬£¬£¬£¬Ö¼ÔÚ¾¡¿ÉÄÜÒþ²ØµØÔËÐС£¡£¡£¡£¡£¡£¡£¾ßÓÐÇÔȡװ±¸Ö¸ÎÆ¡¢ÎļþºÍ²å¼þÖÎÀí£¨ÅÌÎÊ¡¢ÏÂÔØºÍɾ³ý£©ºÍÖ´ÐÐÌØ¶¨²å¼þµÄ¹¦Ð§¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/117332/breaking-news/rotajakiro-linux-backdoor.html
2.Naikon APTÔÚÕë¶Ô¶«ÄÏÑǾüÊÂ×éÖ¯µÄ¹¥»÷ÖÐʹÓÃкóÃÅNebulae
Bitdefender·¢Ã÷£¬£¬£¬£¬APT×éÖ¯NaikonÔÚÕë¶Ô¶«ÄÏÑǾüÊÂ×éÖ¯µÄ¹¥»÷»î¶¯ÖÐʹÓÃÁËкóÃÅNebulae¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2010ÄêÒÔÀ´×îÏÈ»îÔ¾£¬£¬£¬£¬Ö÷ÒªÕë¶Ô·ÆÂɱö¡¢ÂíÀ´Î÷ÑÇ¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÐÂ¼ÓÆÂºÍÌ©¹úµÄÕþ¸®ºÍ¾üÊÂ×éÖ¯¡£¡£¡£¡£¡£¡£¡£ÔÚ½üÆÚµÄ»î¶¯ÖУ¨2019Äê6ÔÂÖÁ2021Äê3Ô£©£¬£¬£¬£¬NaikonʹÓÃÁËÕýµ±Èí¼þ¼ÓÔØNebulaeÀ´ÊµÏÖ³¤ÆÚÐÔ£¬£¬£¬£¬¸ÃºóÃÅ¿ÉÒÔÍøÂçϵͳÐÅÏ¢¡¢Ê¹ÓÃÎļþºÍÎļþ¼Ð¡¢´ÓC2ÏÂÔØÎļþÒÔ¼°Ö´ÐС¢Áгö»òÖÕÖ¹ÊÜѬȾÉè±¹ØÁ¬ÄÀú³Ì¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/117321/apt/naikon-apt-nebulae-backdoor.html
3.΢ÈíÅû¶IoTºÍOT×°±¸ÖеÄ25¸öRCEÎó²îBadAlloc
΢ÈíÇå¾²Ñо¿Ö°Ô±ÔÚÎïÁªÍø£¨IoT£©×°±¸ºÍÔËÓªÊÖÒÕ£¨OT£©¹¤ÒµÏµÍ³Öз¢Ã÷ÁË25¸öÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¬£¬£¬£¬±»Í³³ÆÎªBadAlloc¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÊÇÓÉÓÚÕûÊýÒç³ö»òÎ§ÈÆµ¼Öµģ¬£¬£¬£¬ÓÉÓÚÄÚ´æ·ÖÅɹ¦Ð§ÖÐûÓоÙÐÐÊäÈëÑéÖ¤£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøù¦Ð§À´¾ÙÐжÑÒç³ö£¬£¬£¬£¬´Ó¶øÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÖ÷ÒªÓ°ÏìÁËÏûºÄÕß¡¢Ò½Áƺ͹¤ÒµµÄÍøÂ磬£¬£¬£¬CISA½¨Òé×éÖ¯Ó¦ÓÿÉÓõũӦÉ̸üС¢Ö»¹ÜïÔÌÏµÍ³ÍøÂçµÄ̻¶¡¢½«¿ØÖÆÏµÍ³µÄÍøÂçºÍÔ¶³Ì×°±¸ÖÃÓÚ·À»ðǽ֮ºó²¢ÓëÓªÒµÍøÂç¸ôÀëÒÔ¼°Ê¹ÓÃVPN¾ÙÐÐÔ¶³Ì»á¼û¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-finds-critical-code-execution-bugs-in-iot-ot-devices/
4.ºÚ¿ÍÂÛ̳OGUsersÔâµ½µÚËĴι¥»÷£¬£¬£¬£¬ÆäÊý¾Ý¿â±»³öÊÛ
Çå¾²¹«Ë¾KELA³ÆOGUsersÒÑÈ·ÈÏÆäÔâµ½¹¥»÷£¬£¬£¬£¬ÕâÊÇÆäÁ½ÄêÄÚÔâµ½µÄµÚËÄ´ÎÈëÇÖ¡£¡£¡£¡£¡£¡£¡£OGUsersÊÇÒ»¸öºÚ¿ÍÂÛ̳£¬£¬£¬£¬Ö÷Òª³öÊÛͨ¹ýSIM½»Á÷¹¥»÷¡¢Æ¾Ö¤Ìî³ä¹¥»÷µÈ·½·¨»ñµÃµÄÉ罻ýÌåÕÊ»§¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ2021Äê4ÔÂ11ÈÕ£¬£¬£¬£¬ºÚ¿Í½«Web ShellÉÏ´«µ½ÁËOGUsersµÄЧÀÍÆ÷£¬£¬£¬£¬²¢ÔÚ°µÍøÒÔ3000ÃÀÔªµÄ¼ÛÇ®³öÊÛÆäÊý¾Ý¿â£¬£¬£¬£¬ÆäÖаüÀ¨Ô¼350000¸ö»áÔ±µÄÓû§¼Í¼ºÍ˽ÈËÐÂÎÅ¡£¡£¡£¡£¡£¡£¡£ÔçÔÚÔÚ2019Äê5Ô¡¢2020Äê4ÔºÍ2020Äê11Ô£¬£¬£¬£¬OGUsersÔâµ½ÁË3´Î¹¥»÷¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fourth-times-a-charm-ogusers-hacking-forum-hacked-again/
5.GoogleÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´Chrome V8ÖеĴúÂëÖ´ÐÐÎó²î
GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÁËChrome V8ÖеĴúÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪ£¬£¬£¬£¬Î»ÓÚä¯ÀÀÆ÷ʹÓõÄV8 JavaScriptÒýÇæÖУ¬£¬£¬£¬ÊÇÓÉÓÚÊý¾ÝÑé֤ȱ·¦µ¼Öµġ£¡£¡£¡£¡£¡£¡£½«ÆäÓëɳºÐÌÓÒÝÎó²îÁ¬ÏµÊ¹ÓÿÉÒÔÔÚ²Ù×÷ϵͳÉÏÖ´ÐжñÒâ´úÂ룬£¬£¬£¬ÓëÒѱ»ÐÞ¸´µÄCVE-2020-16040ºÍCVE-2020-15965Îó²îÏà¹Ø¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬´Ë´Î¸üл¹ÐÞ¸´ÁËANGLE×é¼þÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2021-21233£©ºÍV8×é¼þÖеÄÀàÐÍ»ìÏýÎó²î£¨CVE-2021-21230£©µÈÆäËü8¸öÎó²î¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/google-chrome-v8-bug-remote-code-execution/165662/
6.Ó¢¹úÌúÂ·ÍøÕ¾MerseyrailѬȾLockbit£¬£¬£¬£¬¿Í»§ÐÅϢй¶
Merseyrail³ÆÆäÔâµ½LockbitÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬Óʼþϵͳ±»ÆÆË𡣡£¡£¡£¡£¡£¡£MerseyrailÊÇÓ¢¹úµÄÌúÂ·ÍøÕ¾£¬£¬£¬£¬ÎªÓ¢¸ñÀ¼ÀûÎïÆÖÊеØÇøµÄ68¸ö³µÕ¾Ìṩ»ð³µÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÓÚ4ÔÂ18ÈÕÐû²¼Óʼþ£¬£¬£¬£¬¼û¸æ¸Ã¹«Ë¾Óйش˴εĹ¥»÷ÊÂÎñ£¬£¬£¬£¬²¢Éù³ÆÆäÒÑÇÔÈ¡ÁËÔ±¹¤ºÍ¿Í»§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬¸ÃÓʼþÒ²±»·¢Ë͸øÁËÓ¢¹úµÄ¼¸¼Ò±¨ÉçºÍMerseyrailµÄÔ±¹¤£¬£¬£¬£¬ÒÔÏò¹«Ë¾Ê©¼ÓѹÁ¦£¬£¬£¬£¬ÆÈʹÆäÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¡£MerseyrailÒÑÉϱ¨¸øÓ¢¹úÕþ¸®£¬£¬£¬£¬²¢ÕýÔÚÖ´·¨²¿·ÖµÄÐÖú϶ԸÃÊÂÎñÕö¿ªÊӲ졣¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news-block.com/uks-merseyrail-rail-network-likely-to-be-hit-by-lockbit-ransomware/