Ñо¿ÍŶÓÅû¶Òѱ£´æ¶àÄêµÄLinuxºóÃÅRotaJakiro£»£»£»Î¢ÈíÅû¶IoTºÍOT×°±¸ÖеÄ25¸öRCEÎó²îBadAlloc

Ðû²¼Ê±¼ä 2021-04-30

1.Ñо¿ÍŶÓÅû¶Òѱ£´æ¶àÄêµÄLinuxºóÃÅRotaJakiro


1.jpg


Ñо¿ÍŶÓÅû¶×Ô2018ÄêÒÔÀ´¾Í±£´æµÄLinuxºóÃÅRotaJakiro£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÊÜѬȾµÄ×°±¸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢ ¡£¡£¡£¡£¡£¡£RotaJakiroÖ®ÒÔÊǵÃÃû£¬£¬£¬£¬£¬ÊÇÓÉÓÚËüʹÓÃÁËÂÖ»»¼ÓÃÜ£¬£¬£¬£¬£¬²¢ÇÒÔÚrootÕÊ»§ºÍ·ÇrootÕÊ»§ÖÐÖ´ÐÐʱÓÐËù²î±ð ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÆäʹÓÃÁ˶àÖÖ¼ÓÃÜËã·¨£¬£¬£¬£¬£¬°üÀ¨ÓÃÓÚ¶ÔÑù±¾ÖеÄ×ÊÔ´ÐÅÏ¢¾ÙÐмÓÃܵÄAESËã·¨£¬£¬£¬£¬£¬ÒÔ¼°ÓÃÓÚC2ͨѶµÄAES¡¢XOR¡¢ROTATE¼ÓÃܺÍZLIBѹËõ£¬£¬£¬£¬£¬Ö¼ÔÚ¾¡¿ÉÄÜÒþ²ØµØÔËÐÐ ¡£¡£¡£¡£¡£¡£¾ßÓÐÇÔȡװ±¸Ö¸ÎÆ¡¢ÎļþºÍ²å¼þÖÎÀí£¨ÅÌÎÊ¡¢ÏÂÔØºÍɾ³ý£©ºÍÖ´ÐÐÌØ¶¨²å¼þµÄ¹¦Ð§ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/117332/breaking-news/rotajakiro-linux-backdoor.html


2.Naikon APTÔÚÕë¶Ô¶«ÄÏÑǾüÊÂ×éÖ¯µÄ¹¥»÷ÖÐʹÓÃкóÃÅNebulae


2.jpg


Bitdefender·¢Ã÷£¬£¬£¬£¬£¬APT×éÖ¯NaikonÔÚÕë¶Ô¶«ÄÏÑǾüÊÂ×éÖ¯µÄ¹¥»÷»î¶¯ÖÐʹÓÃÁËкóÃÅNebulae ¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2010ÄêÒÔÀ´×îÏÈ»îÔ¾£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô·ÆÂɱö¡¢ÂíÀ´Î÷ÑÇ¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÐÂ¼ÓÆÂºÍÌ©¹úµÄÕþ¸®ºÍ¾üÊÂ×éÖ¯ ¡£¡£¡£¡£¡£¡£ÔÚ½üÆÚµÄ»î¶¯ÖУ¨2019Äê6ÔÂÖÁ2021Äê3Ô£©£¬£¬£¬£¬£¬NaikonʹÓÃÁËÕýµ±Èí¼þ¼ÓÔØNebulaeÀ´ÊµÏÖ³¤ÆÚÐÔ£¬£¬£¬£¬£¬¸ÃºóÃÅ¿ÉÒÔÍøÂçϵͳÐÅÏ¢¡¢Ê¹ÓÃÎļþºÍÎļþ¼Ð¡¢´ÓC2ÏÂÔØÎļþÒÔ¼°Ö´ÐС¢Áгö»òÖÕÖ¹ÊÜѬȾÉè±¹ØÁ¬ÄÀú³Ì ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/117321/apt/naikon-apt-nebulae-backdoor.html


3.΢ÈíÅû¶IoTºÍOT×°±¸ÖеÄ25¸öRCEÎó²îBadAlloc


3.jpg


΢ÈíÇå¾²Ñо¿Ö°Ô±ÔÚÎïÁªÍø£¨IoT£©×°±¸ºÍÔËÓªÊÖÒÕ£¨OT£©¹¤ÒµÏµÍ³Öз¢Ã÷ÁË25¸öÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¬£¬£¬£¬£¬±»Í³³ÆÎªBadAlloc ¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÊÇÓÉÓÚÕûÊýÒç³ö»òÎ§ÈÆµ¼ÖµÄ£¬£¬£¬£¬£¬ÓÉÓÚÄÚ´æ·ÖÅɹ¦Ð§ÖÐûÓоÙÐÐÊäÈëÑéÖ¤£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøù¦Ð§À´¾ÙÐжÑÒç³ö£¬£¬£¬£¬£¬´Ó¶øÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐжñÒâ´úÂë ¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÖ÷ÒªÓ°ÏìÁËÏûºÄÕß¡¢Ò½Áƺ͹¤ÒµµÄÍøÂ磬£¬£¬£¬£¬CISA½¨Òé×éÖ¯Ó¦ÓÿÉÓõũӦÉ̸üС¢Ö»¹ÜïÔÌ­ÏµÍ³ÍøÂçµÄ̻¶¡¢½«¿ØÖÆÏµÍ³µÄÍøÂçºÍÔ¶³Ì×°±¸ÖÃÓÚ·À»ðǽ֮ºó²¢ÓëÓªÒµÍøÂç¸ôÀëÒÔ¼°Ê¹ÓÃVPN¾ÙÐÐÔ¶³Ì»á¼û ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-finds-critical-code-execution-bugs-in-iot-ot-devices/


4.ºÚ¿ÍÂÛ̳OGUsersÔâµ½µÚËĴι¥»÷£¬£¬£¬£¬£¬ÆäÊý¾Ý¿â±»³öÊÛ


4.jpg


Çå¾²¹«Ë¾KELA³ÆOGUsersÒÑÈ·ÈÏÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬ÕâÊÇÆäÁ½ÄêÄÚÔâµ½µÄµÚËÄ´ÎÈëÇÖ ¡£¡£¡£¡£¡£¡£OGUsersÊÇÒ»¸öºÚ¿ÍÂÛ̳£¬£¬£¬£¬£¬Ö÷Òª³öÊÛͨ¹ýSIM½»Á÷¹¥»÷¡¢Æ¾Ö¤Ìî³ä¹¥»÷µÈ·½·¨»ñµÃµÄÉ罻ýÌåÕÊ»§ ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ2021Äê4ÔÂ11ÈÕ£¬£¬£¬£¬£¬ºÚ¿Í½«Web ShellÉÏ´«µ½ÁËOGUsersµÄЧÀÍÆ÷£¬£¬£¬£¬£¬²¢ÔÚ°µÍøÒÔ3000ÃÀÔªµÄ¼ÛÇ®³öÊÛÆäÊý¾Ý¿â£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ô¼350000¸ö»áÔ±µÄÓû§¼Í¼ºÍ˽ÈËÐÂÎÅ ¡£¡£¡£¡£¡£¡£ÔçÔÚÔÚ2019Äê5Ô¡¢2020Äê4ÔºÍ2020Äê11Ô£¬£¬£¬£¬£¬OGUsersÔâµ½ÁË3´Î¹¥»÷ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fourth-times-a-charm-ogusers-hacking-forum-hacked-again/


5.GoogleÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Chrome V8ÖеĴúÂëÖ´ÐÐÎó²î


5.jpg


GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËChrome V8ÖеĴúÂëÖ´ÐÐÎó²î ¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪ£¬£¬£¬£¬£¬Î»ÓÚä¯ÀÀÆ÷ʹÓõÄV8 JavaScriptÒýÇæÖУ¬£¬£¬£¬£¬ÊÇÓÉÓÚÊý¾ÝÑé֤ȱ·¦µ¼Ö嵀 ¡£¡£¡£¡£¡£¡£½«ÆäÓëɳºÐÌÓÒÝÎó²îÁ¬ÏµÊ¹ÓÿÉÒÔÔÚ²Ù×÷ϵͳÉÏÖ´ÐжñÒâ´úÂ룬£¬£¬£¬£¬ÓëÒѱ»ÐÞ¸´µÄCVE-2020-16040ºÍCVE-2020-15965Îó²îÏà¹Ø ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬´Ë´Î¸üл¹ÐÞ¸´ÁËANGLE×é¼þÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2021-21233£©ºÍV8×é¼þÖеÄÀàÐÍ»ìÏýÎó²î£¨CVE-2021-21230£©µÈÆäËü8¸öÎó²î ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/google-chrome-v8-bug-remote-code-execution/165662/


6.Ó¢¹úÌúÂ·ÍøÕ¾MerseyrailѬȾLockbit£¬£¬£¬£¬£¬¿Í»§ÐÅϢй¶


6.jpg


Merseyrail³ÆÆäÔâµ½LockbitÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬Óʼþϵͳ±»ÆÆËð ¡£¡£¡£¡£¡£¡£MerseyrailÊÇÓ¢¹úµÄÌúÂ·ÍøÕ¾£¬£¬£¬£¬£¬ÎªÓ¢¸ñÀ¼ÀûÎïÆÖÊеØÇøµÄ68¸ö³µÕ¾Ìṩ»ð³µÐ§ÀÍ ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÓÚ4ÔÂ18ÈÕÐû²¼Óʼþ£¬£¬£¬£¬£¬¼û¸æ¸Ã¹«Ë¾Óйش˴εĹ¥»÷ÊÂÎñ£¬£¬£¬£¬£¬²¢Éù³ÆÆäÒÑÇÔÈ¡ÁËÔ±¹¤ºÍ¿Í»§µÄÐÅÏ¢ ¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬¸ÃÓʼþÒ²±»·¢Ë͸øÁËÓ¢¹úµÄ¼¸¼Ò±¨ÉçºÍMerseyrailµÄÔ±¹¤£¬£¬£¬£¬£¬ÒÔÏò¹«Ë¾Ê©¼ÓѹÁ¦£¬£¬£¬£¬£¬ÆÈʹÆäÖ§¸¶Êê½ð ¡£¡£¡£¡£¡£¡£MerseyrailÒÑÉϱ¨¸øÓ¢¹úÕþ¸®£¬£¬£¬£¬£¬²¢ÕýÔÚÖ´·¨²¿·ÖµÄЭÖú϶ԸÃÊÂÎñÕö¿ªÊÓ²ì ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://news-block.com/uks-merseyrail-rail-network-likely-to-be-hit-by-lockbit-ransomware/