×êÑÐÈËÔ±·¢ÏÖÃÀ¹úÎå¼ÒµçÐŹ«Ë¾Ò×ÊÜSIM¿¨»¥»»¹¥»÷£»Ë¼¿ÆTalosÅû¶ÎļþϵͳÖÎÀí¹¤¾ßE2fsprogsÖеÄRCE·ì϶

°ä²¼¹¦·ò 2020-01-13


1.×êÑÐÈËÔ±·¢ÏÖÃÀ¹úÎå¼ÒµçÐŹ«Ë¾Ò×ÊÜSIM¿¨»¥»»¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÆÕÁÖ˹¶Ù´óѧ°ä·¢µÄÒ»ÏîѧÊõ×êÑÐÅú×¢£¬ÃÀ¹úÎå¼ÒÖØÒªµÄÔ¤¸¶·ÑÎÞÏßÔËÓªÉÌÈÝÒ×Êܵ½SIM¿¨»¥»»¹¥»÷µÄÓ°Ï졣ƾ¾Ý×êÑÐÍŶӵÄ˵·¨£¬ÕâÎå¼ÒÔËÓªÉ̱ðÀëÊÇAT£¦T¡¢T-Mobile¡¢Tracfone¡¢US MobileºÍVerizon Wireless¡£SIM¿¨»¥»»¹¥»÷ÊÇÖ¸¹¥»÷ÕßÖµçÔËÓªÉ̿ͷþ²¢ÓÕÆ­µçÐŹ«Ë¾Ô±¹¤½«Êܺ¦Õߵĵ绰ºÅÂë¸ü¸ÄΪ¹¥»÷Õß½ÚÔìµÄSIM¿¨¡£×êÑÐÈËÔ±°µÊ¾¹¥»÷Õß¿ÉÄÜͨ¹ýÓÕÆ­Êܺ¦Õß²¦´òÌØ¶¨µÄµç»°ºÅÂë²úÉúͨ»°¼Í¼£¬¶øºóÀûÓÃÕâЩͨ»°¼Í¼À´ÑéÖ¤Éí·Ý²¢ÒªÇó¸ü»»SIM¿¨¡£×êÑÐÈËÔ±»¹·ÖÎöÁË140¸öÖØÒªµÄÔÚÏß·þÎñ£¨ÁìÓò´ÓÉ罻ýÌåµ½Óʼþ·þÎñÉÌ¡¢¼ÓÃÜÇ®±ÒÂòÂôÕ¾µãºÍÆóÒµ½â¾ö¹æ»®µÈ£©£¬·¢´Ë¿Ì17¸öÕ¾µãÉÏ£¬Ò»µ©¹¥»÷Õß½Ù³ÖÁËÓû§µÄµç»°ºÅÂ룬ËüÃǾÍÄܹ»³ÁÖÃÕË»§µÄÃÜÂë²¢»ñµÃÓû§ÕË»§µÄÆëÈ«½Ó¼ûȨÏÞ¡£


  Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/academic-research-finds-five-us-telcos-vulnerable-to-sim-swapping-attacks/


2.ÀÕË÷Èí¼þSodinokibi³õ´Î°ä²¼µÁÈ¡µÄÔ¼337MBÊý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÓÉÓÚÊܺ¦Õßδʵʱ֧¸¶Êê½ð£¬ÀÕË÷Èí¼þSodinokibi±³ºóµÄ¹¥»÷Õß³õ´Î°ä²¼ÁË´ÓÒ»ÃûÊܺ¦ÕßÄÇÀïÇÔÈ¡µÄÎļþ¡£×ÔÉϸöÔÂÒÔÀ´£¬Sodinokibi¹«¿ª°µÊ¾½«Ð§·ÂÀÕË÷Èí¼þMaze£¬ÔÚÊܺ¦Õß²»Ö§¸¶Êê½ðʱ¾Í°ä²¼´ÓÊܺ¦ÕßÄÇÀïÇÔÈ¡µÄÊý¾Ý¡£1ÔÂ11ÈÕSodinokibi¹¥»÷ÕßÔÚÒ»¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳Éϰ䲼ÁËÔ¼337MBÎļþµÄÁ´½Ó£¬¾Ý³ÆÕâЩÊý¾ÝÊôÓÚÃÀ¹úITÈËÔ±ÅäÖù«Ë¾Artech¡£Sodinokibi¹¥»÷Õß»¹°µÊ¾ÈôÊDz»Ö§¸¶Êê½ð£¬ËûÃǽ«°ä²¼¸ü¶à±»µÁÎļþ£¬Ô̺¬¹«Ë¾µÄ²ÆÕþÐÅÏ¢¡£Ä¿Ç°Artech¹ÙÍøÒѹعØ£¬µ«²»Ã÷ÏÔÊÇ·ñÓë´ËÊÂÓйØ£¬Artech²¢Î´¶Ô´Ë×÷³öÓÐ¹ØÆÀÂÛ¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sodinokibi-ransomware-publishes-stolen-data-for-the-first-time/


3.±öϦ·¨ÄáÑÇÖÝÆ¥×ȱ¤½áºÏÑ§ÇøÔâµ½ÀÕË÷Èí¼þ¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


±öϦ·¨ÄáÑÇÖÝÆ¥×ȱ¤½áºÏÑ§ÇøÔÚÐÂÄê¼ÙÆÚÆÚ¼äÔâµ½ÍøÂç¹¥»÷£¬µ¼ÖÂѧÌõĻ¥ÁªÍø·þÎñÆ÷ºÍµç×ÓÓʼþϵͳ±»·ÛË飬ѧÉúÎÞ·¨ÀûÓñʼDZ¾µçÄԺͻ¥ÁªÍøÉϿΡ£Æ¥×ȱ¤½áºÏÑ§ÇøÕÆ¹ÜÈËÕäÄÝÌØ¡¤Êæ¶û´Ä£¨Janet Schulze£©°µÊ¾Ñ§ÌÃÒÀÈ»Äܹ»½Ó¼ûѧÉúµÄÐÅÏ¢£¬²¢Çҵ绰ϵͳÄܹ»Õý³£¹¤×÷£¬µ«¸ÃÑ§ÇøµÄÍøÂçϵͳ̱»¾¡£¸ÃÊÂÎñûÓÐÔì³ÉÓ×ÎÒÐÅϢй¶£¬²¢ÇÒ½²ÊÚ¹¦·ò±íÒÑÓÚÉÏÖܶþ¸´Ô­Õý³£¡£¸ÃÑ§ÇøÈÔÔÚÓëÍøÂ簲ȫÍŶÓһ·¶Ô´ËÊÂÎñ½øÐе÷²é¡£


 Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cyberattack-pennsylvania-schools/


4.×êÑÐÈËÔ±·¢ÏÖÖØÒªÕë¶ÔÆóÒµµÄÐÂÀÕË÷Èí¼þAko


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖÖØÒªÕë¶ÔÆóÒµÍøÂçµÄÐÂÀÕË÷Èí¼þAko£¬Æ¾¾ÝKremezµÄ·ÖÎö£¬AkoÓëÀÕË÷Èí¼þMedusaLocker´æÔÚÀàËÆÖ®´¦£¬ÕâÅú×¢AkoÊǸÃÍŶӵÄ×îй¤×÷¡£Kremez°µÊ¾£º¡°ÕâÊÇÔÚ¿ª·¢µÄ°æ±¾ºÅΪ0.5µÄÐÂÀÕË÷Èí¼þ¼´·þÎñ²úÆ·£¬ËƺõÊܵ½MedusaLockerÐÐΪµÄÆô·¢£¬Ô̺¬ÆäÕë¶ÔÖ¸±êºÍ¼ÓÃܹý³ÌÖеķ´WindowsÐÐΪºÍ×¢²á±íÓ³ÉäÇý¶¯Æ÷½ûÓᱡ£¸üÔã¸âµÄÊÇ£¬¸ÃÀÕË÷Èí¼þ»áÔÚ¼ÓÃÜ֮ǰÇÔÈ¡Óû§µÄÊý¾Ý¡£Ako»áÔÚ¼ÓÃܵÄÎļþºó¸½¼ÓËæ»úµÄÀ©´óÃû£¬²¢ÔÚÎļþÖÐÔö³¤CECAEFBE×Ö¶ÎÏóÕ÷¡£AkoÅúʾÊܺ¦Õß½Ó¼ûhttp://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad[.]onionÒÔ»ñÈ¡Êê½ðÖ§¸¶×¢Ã÷¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ako-ransomware-another-day-another-infection-attacking-businesses/


5.˼¿ÆTalosÅû¶ÎļþϵͳÖÎÀí¹¤¾ßE2fsprogsÖеÄRCE·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalos×êÑÐÍŶÓÅû¶ÎļþϵͳÖÎÀí¹¤¾ßE2fsprogsÖеÄRCE·ì϶¡£E2fsprogsÊÇÒ»×éÓÃÓÚÓëext2¡¢ext3ºÍext4Îļþϵͳ½»»¥µÄʵÓ÷¨Ê½£¬¸ÃÈí¼þ±»ÊÓΪLinuxºÍÀàUnix²Ù×÷ϵͳµÄ±Ø±¸Èí¼þ£¬Ä¬ÈÏÔÚ´óÎÞÊýLinux¿¯ÐаæÖгö³§¸½´ø¡£¸Ã·ì϶£¨CVE-2019-5188£©´æÔÚÓÚE2fsprogs e2fsck rehash.cÎļþµÄmutate_name()º¯ÊýÖУ¬¹¥»÷Õß¿ÉÀûÓÃÌØÔìµÄext4Ŀ¼´¥·¢²Ö¿âÔ½½çдÈ룬´Ó¶øµ¼Ö´úÂëÖ´ÐС£¹¥»÷Õß±ØÒª·ÛËé·ÖÇøÀ´´¥·¢´Ë·ì϶¡£¸Ã·ì϶µÄCVSSÆÀ·ÖΪ7.5·Ö£¬Ó°ÏìÁËE2fsprogsµÄ1.43.3-1.45.3°æ±¾¡£E2fsprogsÒѾ­°ä²¼Á˸÷ì϶µÄ½¨¸´²¹¶¡¡£


 Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/01/e2fsprogs-remote-code-execution-vuln-jan-2020.html


6.·ðÂÞÀï´ïÖÝTCFFR¹«Ë¾ÔâºÚ¿ÍÈëÇÖ£¬Ô¼3500Ãû»¼ÕßÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


·ðÂÞÀï´ïÖÝÃæ²¿ÕûÐι«Ë¾TCFFRÓÚÈ¥Äê11Ô³ÉÎªÍøÂç¹¥»÷µÄÊܺ¦Õߣ¬Æ¾¾Ý¸ÃÍøÕ¾°ä²¼µÄÉêÃ÷£¬11ÔÂ8ÈÕÊ×´´ÈËRichard DavisÊÕµ½¹¥»÷ÕßµÄÄäÃûͨѶ£¬Ðû³Æ¸Ã¹«Ë¾µÄ·þÎñÆ÷Òѱ»ÈëÇÖ£¬²¢ÇҸù«Ë¾µÄÆëÈ«»¼ÕßÊý¾Ý±»µÁ¡£¹¥»÷ÕßÒªÇóÖ§¸¶Ò»±ÊÊê½ð£¬µ«¾ßÌå½ð¶îδ֪£¬¹¥»÷Õß»¹ÁªÏµÁËÔ¼15-20Ãû»¼ÕßÒªÇóËûÃÇÓ×ÎÒÖ§¸¶Ò»±ÊÊê½ð£¬²»È»½«°ä²¼ÆäÕÕÆ¬ºÍÓ×ÎÒÐÅÏ¢¡£Davis³Æ¶à´ï3500Ãû»¼ÕßµÄÊý¾Ý¿ÉÄܱ»µÁ£¬ÕâЩÊý¾Ý¿ÉÄÜÔ̺¬¼ÝÕÕ¡¢»¤ÕÕ¡¢¼Òͥסַ¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢»¼ÕßÕÕÆ¬ºÍÐÅÓþ¿¨Ö§¸¶Êý¾Ý¡£¸Ã¹«Ë¾ÒѾ­Í¨ÖªÁËFBIÍøÂç·¸×ïÖÐÐIJ¢Ð­Öú¶Ô´ËʽøÐе÷²é¡£


 Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/patients-of-hacked-surgical/