ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ42ÖÜ

Ðû²¼Ê±¼ä 2018-10-22

Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2018Äê10ÔÂ15ÈÕÖÁ21ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö£¬£¬£¬ £¬£¬£¬ £¬ÖµµÃ¹Ø×¢µÄÊÇLibssh CVE-2018-10933ЧÀÍÆ÷Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»£»£»Pivotal Spring Security OAuthȨÏÞÌáÉýÎó²î£»£»£»£»£»£»£»Dell EMC Secure Remote ServicesȨÏÞÌáÉýÎó²î£»£»£»£»£»£»£»Opto 22 PAC Control CVE-2018-14807»º³åÇøÒç³öÎó²î£»£»£»£»£»£»£»HPE Intelligent Management Center PLAT´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹ú·À²¿£¨Îå½Ç´óÂ¥£©Ô¼3ÍòÃûÔ±¹¤µÄÂÃÐмͼй¶£»£»£»£»£»£»£»ÎÚ¿ËÀ¼Õþ¸®»ú¹¹ÔÙÔâAPT×éÖ¯BlackEnergyÏ®»÷£»£»£»£»£»£»£»Áè¼Ý3500ÍòÃÀ¹úÑ¡ÃñµÄ¼Í¼ÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ£»£»£»£»£»£»£»±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬£¬ £¬FBIÒѽéÈëÊӲ죻£»£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷Õë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼ÄÜÔ´¹«Ë¾µÄÐÂAPT×éÖ¯GreyEnergy¡£¡£¡£¡£¡£¡£

ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬ £¬£¬£¬ £¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£

¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí


1. Libssh CVE-2018-10933ЧÀÍÆ÷Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î


Libsshͨ¹ýÏòЧÀÍÆ÷ÌṩSSH2_MSG_USERAUTH_SUCCESSÐÂÎÅÀ´È¡´úЧÀÍÆ÷Õý³£ÆôÆôº½·ÝÑéÖ¤µÄSSH2_MSG_USERAUTH_REQUESTÐÂÎÅʱ±£´æÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬ £¬ÎÞÐèÑé֤δÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£


https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release/

2. Pivotal Spring Security OAuthȨÏÞÌáÉýÎó²î


Pivotal Spring Security OAuth±£´æÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬ £¬ÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£

https://pivotal.io/security/cve-2018-15758

3. Dell EMC Secure Remote ServicesȨÏÞÌáÉýÎó²î


Dell EMC Secure Remote Services°üÀ¨¶à¸ö¾ßÓÐÈ«¾Ö¿É¶ÁȨÏÞµÄÉèÖÃÎļþ£¬£¬£¬ £¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬ £¬ÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£


https://www.dellemc.com/

4. Opto 22 PAC Control CVE-2018-14807»º³åÇøÒç³öÎó²î

Opto 22 PAC Control±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬ £¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬ £¬¿ÉʹӦÓóÌÐò»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£


https://www.opto22.com/support/resources-tools/knowledgebase/kb87547

5. HPE Intelligent Management Center PLAT´úÂëÖ´ÐÐÎó²î


HPE Intelligent Management Center PLAT±£´æÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬ £¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£


https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03901en_us

Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÃÀ¹ú·À²¿£¨Îå½Ç´óÂ¥£©Ô¼3ÍòÃûÔ±¹¤µÄÂÃÐмͼй¶

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ÃÀ¹ú¹ú·À²¿£¨Îå½Ç´óÂ¥£©µÄ²¿·Ö¾ü·½ºÍÎÄÖ°Ö°Ô±µÄСÎÒ˽¼ÒÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ýй¶£¬£¬£¬ £¬£¬£¬ £¬Ô¼3ÍòÈËÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£ÕâÒ»Êý¾Ýй¶ÊÂÎñ¿ÉÄܱ¬·¢ÔÚ¼¸¸öÔÂǰ£¬£¬£¬ £¬£¬£¬ £¬µ«Ö±µ½×î½ü²Å±»·¢Ã÷¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÉæ¼°µ½Ò»¼ÒΪ¹ú·À²¿ÌṩЧÀ͵ĵÚÈý·½¹©Ó¦ÉÌ£¬£¬£¬ £¬£¬£¬ £¬ÏÖÔڸù©Ó¦É̵ÄÉí·ÝÈÔÈ»²»Ã÷È·¡£¡£¡£¡£¡£¡£ÕâÒ»ÊÂÎñÈÔÈ»ÔÚ½øÒ»²½µÄÊÓ²ìÖ®ÖУ¬£¬£¬ £¬£¬£¬ £¬µ«Ã»ÓÐÈκÎÉñÃØÐÅÏ¢Ô⵽й¶¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/77097/data-breach/pentagon-travel-records-data-breach.html

2¡¢ÎÚ¿ËÀ¼Õþ¸®»ú¹¹ÔÙÔâAPT×éÖ¯BlackEnergyÏ®»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÎÚ¿ËÀ¼Çå¾²¾Ö£¨SBU£©ÌåÏÖ×î½ü¶íÂÞ˹APT×éÖ¯BlackEnergyÔÙ´ÎÕë¶ÔÎÚ¿ËÀ¼Õþ¸®»ú¹¹µÄÐÅϢϵͳºÍµçÐÅϵͳÌᳫ¹¥»÷¡£¡£¡£¡£¡£¡£SBUר¼ÒÖ¸³ö£¬£¬£¬ £¬£¬£¬ £¬¹¥»÷ÕßʹÓÃÁËеĶñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬ £¬Æä¹¦Ð§°üÀ¨Ô¶³ÌÖÎÀí²Ù×÷ϵͳÒÔ¼°Îļþ¸´ÖÆ¡¢¼à¿ØÓû§ÐÐΪºÍ×èµ²ÃÜÂëµÈ¡£¡£¡£¡£¡£¡£Æ¾Ö¤SBUºÍÒ»¸öÇå¾²³§É̵ÄÊӲ죬£¬£¬ £¬£¬£¬ £¬¹¥»÷ÖÐÉæ¼°µ½µÄ¶ñÒâÈí¼þÊÇIndustroyerºóÃŵÄбäÌå¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬ £¬SBU»¹·¢Ã÷ÁËÊôÓÚ¸ÃAPT×éÖ¯µÄ¶ÀÍ̹¤¾ß¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.ukrinform.net/rubric-crime/2557323-russian-hackers-mount-cyberattack-on-ukraines-state-bodies.html

3¡¢Áè¼Ý3500ÍòÃÀ¹úÑ¡ÃñµÄ¼Í¼ÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


±¾ÖÜÒ»Anomali LabsºÍIntel 471µÄÑо¿Ö°Ô±ÔÚ°µÍøÂÛ̳ÉÏ·¢Ã÷Ò»¸ö°üÀ¨´ó×ÚÑ¡ÃñÊý¾ÝµÄÊý¾Ý¿âÕýÔÚ³öÊÛ¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨À´×Ô19¸öÖݵĶà´ï3500ÍòÌõÑ¡Ãñ¼Í¼¡£¡£¡£¡£¡£¡£ÕâЩ¼Í¼°üÀ¨ÐÕÃû¡¢µç»°ºÅÂ롢סַ¡¢Í¶Æ±ÀúÊ·ºÍÆäËüͶƱÊý¾ÝµÈ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¶Ô¸ÃÊý¾Ý¿âµÄÑù±¾¾ÙÐÐÁËÉó²é£¬£¬£¬ £¬£¬£¬ £¬È·ÈÏÕâЩÊý¾ÝÓÐÓò¢ÇÒ¸ÃÊý¾Ý¿â¾ßÓи߶ȵĿÉÐŶÈ¡£¡£¡£¡£¡£¡£¼øÓÚÃÀ¹ú2018ÄêµÄÖÐÆÚÑ¡¾Ù¼´½«µ½À´£¬£¬£¬ £¬£¬£¬ £¬ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»¹¥»÷ÕßÓÃÀ´ÆÆËðÑ¡¾Ù»ò¾ÙÐÐÉí·Ý͵ÇԵȶñÒâ»î¶¯¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://threatpost.com/up-to-35-million-2018-voter-records-for-sale-on-hacking-forum/138295/

4¡¢±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬£¬ £¬FBIÒѽéÈëÊÓ²ì

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


±¾ÖÜÒ»ONWASA£¨°ºË¹Â幩ˮºÍÎÛË®ÖÎÀí¾Ö£©Ðû²¼ÐÂÎųƣ¬£¬£¬ £¬£¬£¬ £¬±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳµÄÄÚ²¿ÅÌËã»úϵͳ£¨°üÀ¨Ð§ÀÍÆ÷ºÍСÎÒ˽¼ÒµçÄÔ£©Ôâµ½ÀÕË÷Èí¼þEmotet¹¥»÷¡£¡£¡£¡£¡£¡£ONWASAûÓÐÅû¶ÏêϸµÄÊê½ð½ð¶î¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷±¬·¢ÔÚ10ÔÂ4ÈÕ£¬£¬£¬ £¬£¬£¬ £¬ÇéÐÎËæºóÒÑ»ñµÃ¿ØÖÆ¡£¡£¡£¡£¡£¡£ËäȻûÓпͻ§ÐÅÏ¢Ôڴ˴ι¥»÷ÖÐÊܵ½Ó°Ï죬£¬£¬ £¬£¬£¬ £¬µ«Ðí´ó¶¼¾Ý¿âÐèÒªÖØÐÞ¡£¡£¡£¡£¡£¡£ÏÖÔÚFBI¡¢ÁìÍÁÇå¾²²¿ºÍ±±¿¨ÂÞÀ´ÄÉÖÝÕþ¸®ÒѽéÈëÊӲ졣¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/feds-investigate-after-hackers-attack-water-utility

5¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼ÄÜÔ´¹«Ë¾µÄÐÂAPT×éÖ¯GreyEnergy

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ESETÑо¿ÍŶӷ¢Ã÷Ò»¸öеÄAPT×éÖ¯GreyEnergy£¬£¬£¬ £¬£¬£¬ £¬¸ÃAPT×éÖ¯±»ÒÔΪÊÇBlackEnergyµÄ¼ÌÐøÕß¡£¡£¡£¡£¡£¡£ÔÚÒÑÍùÈýÄêÄÚ£¬£¬£¬ £¬£¬£¬ £¬GreyEnergyÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼µÄÄÜÔ´¹«Ë¾µÈ¸ß¼ÛֵĿµÄ¡£¡£¡£¡£¡£¡£GreyEnergyµÄ¶ñÒâÈí¼þ¿ò¼ÜÓëBlackEnergy¾ßÓÐÐí¶àÏàËÆÖ®´¦¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±²¢Ã»ÓÐÊӲ쵽רÃÅÕë¶ÔICSµÄ¶ñÒâÈí¼þÄ£¿£¿ £¿ £¿£¿£¿é£¬£¬£¬ £¬£¬£¬ £¬µ«GreyEnergyµÄ¹¥»÷Õ½ÂÔÒ»Ö±ÊÇÕë¶ÔÒªº¦»ù´¡ÉèÊ©ÖеÄSCADAÊÂÇéÕ¾ºÍЧÀÍÆ÷µÈ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí