Ñо¿ÍŶÓÅû¶Òѱ£´æ¶àÄêµÄLinuxºóÃÅRotaJakiro£»£»£»£»£»Î¢ÈíÅû¶IoTºÍOT×°±¸ÖеÄ25¸öRCEÎó²îBadAlloc

Ðû²¼Ê±¼ä 2021-04-30

1.Ñо¿ÍŶÓÅû¶Òѱ£´æ¶àÄêµÄLinuxºóÃÅRotaJakiro


1.jpg


Ñо¿ÍŶÓÅû¶×Ô2018ÄêÒÔÀ´¾Í±£´æµÄLinuxºóÃÅRotaJakiro£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÊÜѬȾµÄ×°±¸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£ ¡£¡£¡£¡£RotaJakiroÖ®ÒÔÊǵÃÃû£¬£¬£¬£¬£¬ÊÇÓÉÓÚËüʹÓÃÁËÂÖ»»¼ÓÃÜ£¬£¬£¬£¬£¬²¢ÇÒÔÚrootÕÊ»§ºÍ·ÇrootÕÊ»§ÖÐÖ´ÐÐʱÓÐËù²î±ð¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÆäʹÓÃÁ˶àÖÖ¼ÓÃÜËã·¨£¬£¬£¬£¬£¬°üÀ¨ÓÃÓÚ¶ÔÑù±¾ÖеÄ×ÊÔ´ÐÅÏ¢¾ÙÐмÓÃܵÄAESËã·¨£¬£¬£¬£¬£¬ÒÔ¼°ÓÃÓÚC2ͨѶµÄAES¡¢XOR¡¢ROTATE¼ÓÃܺÍZLIBѹËõ£¬£¬£¬£¬£¬Ö¼ÔÚ¾¡¿ÉÄÜÒþ²ØµØÔËÐС£ ¡£¡£¡£¡£¾ßÓÐÇÔȡװ±¸Ö¸ÎÆ¡¢ÎļþºÍ²å¼þÖÎÀí£¨ÅÌÎÊ¡¢ÏÂÔØºÍɾ³ý£©ºÍÖ´ÐÐÌØ¶¨²å¼þµÄ¹¦Ð§¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/117332/breaking-news/rotajakiro-linux-backdoor.html


2.Naikon APTÔÚÕë¶Ô¶«ÄÏÑǾüÊÂ×éÖ¯µÄ¹¥»÷ÖÐʹÓÃкóÃÅNebulae


2.jpg


Bitdefender·¢Ã÷£¬£¬£¬£¬£¬APT×éÖ¯NaikonÔÚÕë¶Ô¶«ÄÏÑǾüÊÂ×éÖ¯µÄ¹¥»÷»î¶¯ÖÐʹÓÃÁËкóÃÅNebulae¡£ ¡£¡£¡£¡£¸Ã×éÖ¯×Ô2010ÄêÒÔÀ´×îÏÈ»îÔ¾£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô·ÆÂɱö¡¢ÂíÀ´Î÷ÑÇ¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÐÂ¼ÓÆÂºÍÌ©¹úµÄÕþ¸®ºÍ¾üÊÂ×éÖ¯¡£ ¡£¡£¡£¡£ÔÚ½üÆÚµÄ»î¶¯ÖУ¨2019Äê6ÔÂÖÁ2021Äê3Ô£©£¬£¬£¬£¬£¬NaikonʹÓÃÁËÕýµ±Èí¼þ¼ÓÔØNebulaeÀ´ÊµÏÖ³¤ÆÚÐÔ£¬£¬£¬£¬£¬¸ÃºóÃÅ¿ÉÒÔÍøÂçϵͳÐÅÏ¢¡¢Ê¹ÓÃÎļþºÍÎļþ¼Ð¡¢´ÓC2ÏÂÔØÎļþÒÔ¼°Ö´ÐС¢Áгö»òÖÕÖ¹ÊÜѬȾÉè±¹ØÁ¬ÄÀú³Ì¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/117321/apt/naikon-apt-nebulae-backdoor.html


3.΢ÈíÅû¶IoTºÍOT×°±¸ÖеÄ25¸öRCEÎó²îBadAlloc


3.jpg


΢ÈíÇå¾²Ñо¿Ö°Ô±ÔÚÎïÁªÍø£¨IoT£©×°±¸ºÍÔËÓªÊÖÒÕ£¨OT£©¹¤ÒµÏµÍ³Öз¢Ã÷ÁË25¸öÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¬£¬£¬£¬£¬±»Í³³ÆÎªBadAlloc¡£ ¡£¡£¡£¡£ÕâЩÎó²îÊÇÓÉÓÚÕûÊýÒç³ö»òÎ§ÈÆµ¼ÖµÄ£¬£¬£¬£¬£¬ÓÉÓÚÄÚ´æ·ÖÅɹ¦Ð§ÖÐûÓоÙÐÐÊäÈëÑéÖ¤£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøù¦Ð§À´¾ÙÐжÑÒç³ö£¬£¬£¬£¬£¬´Ó¶øÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐжñÒâ´úÂë¡£ ¡£¡£¡£¡£ÕâЩÎó²îÖ÷ÒªÓ°ÏìÁËÏûºÄÕß¡¢Ò½Áƺ͹¤ÒµµÄÍøÂ磬£¬£¬£¬£¬CISA½¨Òé×éÖ¯Ó¦ÓÿÉÓõũӦÉ̸üС¢Ö»¹ÜïÔÌ­ÏµÍ³ÍøÂçµÄ̻¶¡¢½«¿ØÖÆÏµÍ³µÄÍøÂçºÍÔ¶³Ì×°±¸ÖÃÓÚ·À»ðǽ֮ºó²¢ÓëÓªÒµÍøÂç¸ôÀëÒÔ¼°Ê¹ÓÃVPN¾ÙÐÐÔ¶³Ì»á¼û¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-finds-critical-code-execution-bugs-in-iot-ot-devices/


4.ºÚ¿ÍÂÛ̳OGUsersÔâµ½µÚËĴι¥»÷£¬£¬£¬£¬£¬ÆäÊý¾Ý¿â±»³öÊÛ


4.jpg


Çå¾²¹«Ë¾KELA³ÆOGUsersÒÑÈ·ÈÏÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬ÕâÊÇÆäÁ½ÄêÄÚÔâµ½µÄµÚËÄ´ÎÈëÇÖ¡£ ¡£¡£¡£¡£OGUsersÊÇÒ»¸öºÚ¿ÍÂÛ̳£¬£¬£¬£¬£¬Ö÷Òª³öÊÛͨ¹ýSIM½»Á÷¹¥»÷¡¢Æ¾Ö¤Ìî³ä¹¥»÷µÈ·½·¨»ñµÃµÄÉ罻ýÌåÕÊ»§¡£ ¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ2021Äê4ÔÂ11ÈÕ£¬£¬£¬£¬£¬ºÚ¿Í½«Web ShellÉÏ´«µ½ÁËOGUsersµÄЧÀÍÆ÷£¬£¬£¬£¬£¬²¢ÔÚ°µÍøÒÔ3000ÃÀÔªµÄ¼ÛÇ®³öÊÛÆäÊý¾Ý¿â£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ô¼350000¸ö»áÔ±µÄÓû§¼Í¼ºÍ˽ÈËÐÂÎÅ¡£ ¡£¡£¡£¡£ÔçÔÚÔÚ2019Äê5Ô¡¢2020Äê4ÔºÍ2020Äê11Ô£¬£¬£¬£¬£¬OGUsersÔâµ½ÁË3´Î¹¥»÷¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fourth-times-a-charm-ogusers-hacking-forum-hacked-again/


5.GoogleÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Chrome V8ÖеĴúÂëÖ´ÐÐÎó²î


5.jpg


GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËChrome V8ÖеĴúÂëÖ´ÐÐÎó²î¡£ ¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪ£¬£¬£¬£¬£¬Î»ÓÚä¯ÀÀÆ÷ʹÓõÄV8 JavaScriptÒýÇæÖУ¬£¬£¬£¬£¬ÊÇÓÉÓÚÊý¾ÝÑé֤ȱ·¦µ¼ÖµÄ¡£ ¡£¡£¡£¡£½«ÆäÓëɳºÐÌÓÒÝÎó²îÁ¬ÏµÊ¹ÓÿÉÒÔÔÚ²Ù×÷ϵͳÉÏÖ´ÐжñÒâ´úÂ룬£¬£¬£¬£¬ÓëÒѱ»ÐÞ¸´µÄCVE-2020-16040ºÍCVE-2020-15965Îó²îÏà¹Ø¡£ ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬´Ë´Î¸üл¹ÐÞ¸´ÁËANGLE×é¼þÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2021-21233£©ºÍV8×é¼þÖеÄÀàÐÍ»ìÏýÎó²î£¨CVE-2021-21230£©µÈÆäËü8¸öÎó²î¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/google-chrome-v8-bug-remote-code-execution/165662/


6.Ó¢¹úÌúÂ·ÍøÕ¾MerseyrailѬȾLockbit£¬£¬£¬£¬£¬¿Í»§ÐÅϢй¶


6.jpg


Merseyrail³ÆÆäÔâµ½LockbitÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬Óʼþϵͳ±»ÆÆËð¡£ ¡£¡£¡£¡£MerseyrailÊÇÓ¢¹úµÄÌúÂ·ÍøÕ¾£¬£¬£¬£¬£¬ÎªÓ¢¸ñÀ¼ÀûÎïÆÖÊеØÇøµÄ68¸ö³µÕ¾Ìṩ»ð³µÐ§ÀÍ¡£ ¡£¡£¡£¡£¹¥»÷ÕßÓÚ4ÔÂ18ÈÕÐû²¼Óʼþ£¬£¬£¬£¬£¬¼û¸æ¸Ã¹«Ë¾Óйش˴εĹ¥»÷ÊÂÎñ£¬£¬£¬£¬£¬²¢Éù³ÆÆäÒÑÇÔÈ¡ÁËÔ±¹¤ºÍ¿Í»§µÄÐÅÏ¢¡£ ¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬¸ÃÓʼþÒ²±»·¢Ë͸øÁËÓ¢¹úµÄ¼¸¼Ò±¨ÉçºÍMerseyrailµÄÔ±¹¤£¬£¬£¬£¬£¬ÒÔÏò¹«Ë¾Ê©¼ÓѹÁ¦£¬£¬£¬£¬£¬ÆÈʹÆäÖ§¸¶Êê½ð¡£ ¡£¡£¡£¡£MerseyrailÒÑÉϱ¨¸øÓ¢¹úÕþ¸®£¬£¬£¬£¬£¬²¢ÕýÔÚÖ´·¨²¿·ÖµÄЭÖú϶ԸÃÊÂÎñÕö¿ªÊӲ졣 ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://news-block.com/uks-merseyrail-rail-network-likely-to-be-hit-by-lockbit-ransomware/