ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ43ÖÜ

°ä²¼¹¦·ò 2021-10-26

>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


±¾Öܹ²ÊÕ¼°²È«·ì϶61¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇLinux Kernel Bluetooth CMTPÄ£¿éÁ½´Î¿ªÊÍȨÏÞÌáÉý·ì϶£»Oracle MySQL Cluster Data Node»º³åÇøÒç³ö´úÂëÖ´Ðзì϶£»Google Chrome Skia¶ÑÒç³ö´úÂëÖ´Ðзì϶£»Oracle Fusion Middleware Oracle WebLogic Server Coherence ContainerIIOP´úÂëÖ´Ðзì϶£»AUVESY VersiondogÑéÖ¤»úÔìÈÆ¹ý·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÃÀ¹úFinCEN°ä²¼¹ØÓÚÀÕË÷¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨£»REvil³ÆÆäÍøÕ¾Òѱ»½Ù³Ö£¬¿ÉÄÜ»áÔÙ´ÎÖÕÖ¹ÔËÓª£»Symantec·¢ÏÖHarvesterÕë¶ÔÄÏÑǵçÐÅÐÐÒµµÄ¹¥»÷»î¶¯£»×êÑÐÈËÔ±·¢ÏÖ¸æ°×À¹½ØÀ©´óAllBlock²åÈë¸æ°×µÄ»î¶¯£»×êÑÐÈËÔ±·¢ÏÖLightBasinÍŻ﹥»÷È«ÇòµÄµçÐŹ«Ë¾¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


>³ÁÒª°²È«·ì϶Áбí


1. Linux Kernel Bluetooth CMTPÄ£¿éÁ½´Î¿ªÊÍȨÏÞÌáÉý·ì϶


Linux Kernel Bluetooth CMTPÄ£¿é´æÔÚÁ½´Î¿ªÊÍ·ì϶£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÌáÉýȨÏÞ¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1223/



2. Oracle MySQL Cluster Data Node»º³åÇøÒç³ö´úÂëÖ´Ðзì϶


Oracle MySQL Cluster´¦ÖÃData Node×÷Òµ´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1232/



3. Google Chrome Skia¶ÑÒç³ö´úÂëÖ´Ðзì϶


Google Chrome Skia´æÔÚ¶ÑÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html



4. Oracle Fusion Middleware Oracle WebLogic Server Coherence ContainerIIOP´úÂëÖ´Ðзì϶


Oracle Fusion Middleware Oracle WebLogic Server Coherence Container×é¼þ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://www.oracle.com/security-alerts/cpuoct2021.html



5. AUVESY VersiondogÑéÖ¤»úÔìÈÆ¹ý·ì϶


AUVESY VersiondogÑéÖ¤´æÔÚÉè¼Æ·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÎÞÐèÌṩËÁÒâ´ó¾ÖÑéÖ¤Óë·þÎñÆ÷³õʼ»¯»á»°£¬Î´ÊÚȨ½Ó¼ûϵͳ¡£


https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01


>³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢ÃÀ¹úFinCEN°ä²¼¹ØÓÚÀÕË÷¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨


ÃÀ¹ú²ÆÕþ²¿µÄ½ðÈÚ·¸×ï·¨ÂÉÍøÂç (FinCEN) ÔÚ10ÔÂ15ÈÕ°ä²¼Á˹ØÓÚÀÕË÷¹¥»÷Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£FinCEN·ÖÎöÁË2011Äê1ÔÂ1ÈÕÖÁ2021Äê6ÔÂ30ÈÕÆÚ¼äÌá½»µÄ2184·ÝSAR£¨¿ÉÒɻ»ã±¨£©£¬·¢ÏÖÁËԼĪ52ÒÚÃÀÔªµÄBTCÂòÂô¿ÉÄÜÓëÀÕË÷¹¥»÷µÄÓйØ¡£2021ÉϰëÄêÓëÀÕË÷¹¥»÷ÓйصÄSARÉæ¼°5.9ÒÚÃÀÔª£¬ÒѾ­³¬¹ýÁË2020ÄêÕûÄêµÄ4.16ÒÚÃÀÔª¡£»ã±¨»¹È·¶¨ÁË68ÖÖ»îÔ¾µÄÀÕË÷Èí¼þ±äÖÖ£¨×î³£¼ûµÄÊÇREvil/Sodinokibi¡¢Conti¡¢DarkSide¡¢AvaddonºÍPhobos£©¡£


Ô­ÎÄÁ´½Ó£º

https://www.fincen.gov/sites/default/files/shared/Financial%20Trend%20Analysis_Ransomeware%20508%20FINAL.pdf



2¡¢REvil³ÆÆäÍøÕ¾Òѱ»½Ù³Ö£¬¿ÉÄÜ»áÔÙ´ÎÖÕÖ¹ÔËÓª


10ÔÂ17ÈÕ£¬ÀÕË÷ÔËÓªÍÅ»ïREvilµÄ³ÉÔ±0_nedayÔÚºÚ¿ÍÂÛ̳XSSÉϳÆÓÐÈËÈëÇÖÁËËûÃǵķþÎñÆ÷¡£0_neday°µÊ¾£¬ÄªË¹¿Æ¹¦·ò12:00ÆðÍ·£¬¹¥»÷ÕßÀûÓÃÆä˽Կµ÷³öÁËREvil°µ²Ø·þÎñ£¬»¹³ÆËûÃÇûÓз¢ÏÖ·þÎñÆ÷Ôâµ½¹¥»÷µÄ¼£Ïó¡£µ«17ÈÕÍíÉÏ£¬0_nedayÔٴη¢Ìû³ÆËûÃǵķþÎñÆ÷Ôâµ½ÁËÈëÇÖ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßÈôºÎ»ñµÃµÄREvil˽Կ£¬×êÑÐÈËÔ±´§Ä¦ÕâÊÇ·¨Âɲ¿ÃÅËùΪ¡£´Ë±í£¬Õâ´Î¹¥»÷¿ÉÄܻᵼÖÂREvilÓÀÔ¶ÐԵĹعØ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/revil-ransomware-shuts-down-again-after-tor-sites-were-hijacked/



3¡¢Symantec·¢ÏÖHarvesterÕë¶ÔÄÏÑǵçÐÅÐÐÒµµÄ¹¥»÷»î¶¯


SymantecÔÚ10ÔÂ18ÈÕÅû¶ÁËÒ»¸öеÄÓɹú¶ÈÖ§³ÖµÄºÚ¿ÍÍÅ»ïHarvesterµÄ¹¥»÷»î¶¯¡£Õâ´Î¹¥»÷»î¶¯¶Ô×¼ÁËÄÏÑǵÄ×éÖ¯£¬³ö¸ñÊǰ¢¸»º¹£¬Õë¶ÔµçÐźÍITÐÐÒµµÄ¹«Ë¾ÒÔ¼°¹Ù·½×éÖ¯£¬ÆðÍ·ÓÚ2021Äê6Ô£¬×î½üÒ»´Î»î¶¯²úÉúÔÚ2021Äê10Ô¡£ÔÚ¼¼Êõ·½Ã棬¹¥»÷ÕßÔÚÖ¸±êÖÐ×°ÖÃÁËÒ»¸öÃûΪBackdoor.GraphonµÄ×Ô½ç˵ºóÃÅ£¬ÒÔ¼°ÆäËû×Ô½ç˵ÏÂÔØÆ÷ºÍ½ØÍ¼¹¤¾ß¡£Ä¿Ç°Éв»Ã÷ÏÔ³õʼϰȾý½éÊÇʲô£¬µ«×êÑÐÈËÔ±ÔÚ±»ºÚÉ豸ÉÏ·¢ÏֵĵÚÒ»¸ö¹ØÓÚÕâ´Î»î¶¯µÄÖ¤¾ÝÊǶñÒâURL¡£


Ô­ÎÄÁ´½Ó£º

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/harvester-new-apt-attacks-asia



4¡¢×êÑÐÈËÔ±·¢ÏÖ¸æ°×À¹½ØÀ©´óAllBlock²åÈë¸æ°×µÄ»î¶¯


ImpervaµÄ×êÑÐÈËÔ±ÔÚ8ÔÂÏÂÑ®·¢ÏÖÁËÒ»ÖÖеĸæ°×²åÈë»î¶¯¡£¸Ã»î¶¯ÀûÓÃÁËChromeºÍOperaä¯ÀÀÆ÷Éϵĸæ°×À¹½ØÀ©´ó·¨Ê½AllBlock£¬Õë¶ÔһЩ´óÐÍÍøÕ¾µÄÓû§¡£×êÑÐÈËÔ±³Æ£¬¸ÃÀ©´óÄܹ»½«ºÏ·¨URL³Á¶¨Ïòµ½Óɹ¥»÷Õß½ÚÔìµÄ´ÓÊôÁ´½Ó£¬²¢ÇÒ¿ª·¢Õß»¹Ê¹ÓÃÁ˶àÖÖ¼¼ÊõÀ´Èƹý¼ì²â£¬Ô̺¬Ã¿100ºÁÃë¶Ï¸ùÒ»´Îµ÷ÊÔ½ÚÔį̀¡£Ä¿Ç°£¬¸ÃÀ©´óÒÑ´ÓChromeÍøÉÏÀûÓõêÖÐɾ³ý¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123488/cyber-crime/ad-blocking-chrome-extension-allblock.html


5¡¢×êÑÐÈËÔ±·¢ÏÖLightBasinÍŻ﹥»÷È«ÇòµÄµçÐŹ«Ë¾


10ÔÂ19ÈÕ£¬CrowdStrike×êÑÐÈËÔ±³ÆLightBasinÔÚ´ÓǰÎåÄêÖÐÒ»Ïò¹¥»÷È«Çò¸÷µØµÄÍ¨Ñ¶ÍøÂç¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2016Äê¾ÍÆðÍ·»îÔ¾£¬ÖØÒªÕë¶ÔLinuxºÍSolarisϵͳ£¬×Ô2019ÄêÒÔÀ´ÒѾ­¹¥»÷ÁËÖÁÉÙ13¼ÒµçÐŹ«Ë¾¡£LightBasinµÄÖ¸±êϵͳÔ̺¬±í²¿DNS·þÎñÆ÷(eDNS)¡¢·þÎñ½»¸¶Æ½Ì¨ÏµÍ³(SDP)ºÍSIM/IMEIÅäÖã¬ÕâЩ¶¼ÊÇͨÓ÷Ö×éÎÞÏßµç·þÎñ(GPRS)ÍøÂçµÄÒ»²¿ÃÅ£¬Ôڳɹ¦ÈëÇÖÖ®ºó»á×°ÖÃ×Ô½ç˵¶ñÒâÈí¼þSLAPSTICK¡£


Ô­ÎÄÁ´½Ó£º

https://www.crowdstrike.com/blog/an-analysis-of-lightbasin-telecommunications-attacks/