Ñо¿ÍŶÓÅû¶Òѱ£´æ¶àÄêµÄLinuxºóÃÅRotaJakiro£»Î¢ÈíÅû¶IoTºÍOT×°±¸ÖеÄ25¸öRCEÎó²îBadAlloc

Ðû²¼Ê±¼ä 2021-04-30

1.Ñо¿ÍŶÓÅû¶Òѱ£´æ¶àÄêµÄLinuxºóÃÅRotaJakiro


1.jpg


Ñо¿ÍŶÓÅû¶×Ô2018ÄêÒÔÀ´¾Í±£´æµÄLinuxºóÃÅRotaJakiro £¬Ö¼ÔÚ´ÓÊÜѬȾµÄ×°±¸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£RotaJakiroÖ®ÒÔÊǵÃÃû £¬ÊÇÓÉÓÚËüʹÓÃÁËÂÖ»»¼ÓÃÜ £¬²¢ÇÒÔÚrootÕÊ»§ºÍ·ÇrootÕÊ»§ÖÐÖ´ÐÐʱÓÐËù²î±ð¡£±ðµÄ £¬ÆäʹÓÃÁ˶àÖÖ¼ÓÃÜËã·¨ £¬°üÀ¨ÓÃÓÚ¶ÔÑù±¾ÖеÄ×ÊÔ´ÐÅÏ¢¾ÙÐмÓÃܵÄAESËã·¨ £¬ÒÔ¼°ÓÃÓÚC2ͨѶµÄAES¡¢XOR¡¢ROTATE¼ÓÃܺÍZLIBѹËõ £¬Ö¼ÔÚ¾¡¿ÉÄÜÒþ²ØµØÔËÐС£¾ßÓÐÇÔȡװ±¸Ö¸ÎÆ¡¢ÎļþºÍ²å¼þÖÎÀí£¨ÅÌÎÊ¡¢ÏÂÔØºÍɾ³ý£©ºÍÖ´ÐÐÌØ¶¨²å¼þµÄ¹¦Ð§¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/117332/breaking-news/rotajakiro-linux-backdoor.html


2.Naikon APTÔÚÕë¶Ô¶«ÄÏÑǾüÊÂ×éÖ¯µÄ¹¥»÷ÖÐʹÓÃкóÃÅNebulae


2.jpg


Bitdefender·¢Ã÷ £¬APT×éÖ¯NaikonÔÚÕë¶Ô¶«ÄÏÑǾüÊÂ×éÖ¯µÄ¹¥»÷Ô˶¯ÖÐʹÓÃÁËкóÃÅNebulae¡£¸Ã×éÖ¯×Ô2010ÄêÒÔÀ´×îÏÈ»îÔ¾ £¬Ö÷ÒªÕë¶Ô·ÆÂɱö¡¢ÂíÀ´Î÷ÑÇ¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÐÂ¼ÓÆÂºÍÌ©¹úµÄÕþ¸®ºÍ¾üÊÂ×éÖ¯¡£ÔÚ½üÆÚµÄÔ˶¯ÖУ¨2019Äê6ÔÂÖÁ2021Äê3Ô£© £¬NaikonʹÓÃÁËÕýµ±Èí¼þ¼ÓÔØNebulaeÀ´ÊµÏÖ³¤ÆÚÐÔ £¬¸ÃºóÃÅ¿ÉÒÔÍøÂçϵͳÐÅÏ¢¡¢Ê¹ÓÃÎļþºÍÎļþ¼Ð¡¢´ÓC2ÏÂÔØÎļþÒÔ¼°Ö´ÐС¢Áгö»òÖÕÖ¹ÊÜѬȾÉè±¹ØÁ¬ÄÀú³Ì¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/117321/apt/naikon-apt-nebulae-backdoor.html


3.΢ÈíÅû¶IoTºÍOT×°±¸ÖеÄ25¸öRCEÎó²îBadAlloc


3.jpg


΢ÈíÇå¾²Ñо¿Ö°Ô±ÔÚÎïÁªÍø£¨IoT£©×°±¸ºÍÔËÓªÊÖÒÕ£¨OT£©¹¤ÒµÏµÍ³Öз¢Ã÷ÁË25¸öÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î £¬±»Í³³ÆÎªBadAlloc¡£ÕâЩÎó²îÊÇÓÉÓÚÕûÊýÒç³ö»òÎ§ÈÆµ¼Ö嵀 £¬ÓÉÓÚÄÚ´æ·ÖÅɹ¦Ð§ÖÐûÓоÙÐÐÊäÈëÑéÖ¤ £¬¹¥»÷Õß¿ÉÒÔʹÓøù¦Ð§À´¾ÙÐжÑÒç³ö £¬´Ó¶øÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐжñÒâ´úÂë¡£ÕâЩÎó²îÖ÷ÒªÓ°ÏìÁËÏûºÄÕß¡¢Ò½Áƺ͹¤ÒµµÄÍøÂç £¬CISA½¨Òé×éÖ¯Ó¦ÓÿÉÓõũӦÉ̸üС¢Ö»¹ÜïÔÌ­ÏµÍ³ÍøÂçµÄ̻¶¡¢½«¿ØÖÆÏµÍ³µÄÍøÂçºÍÔ¶³Ì×°±¸ÖÃÓÚ·À»ðǽ֮ºó²¢ÓëÓªÒµÍøÂç¸ôÀëÒÔ¼°Ê¹ÓÃVPN¾ÙÐÐÔ¶³Ì»á¼û¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-finds-critical-code-execution-bugs-in-iot-ot-devices/


4.ºÚ¿ÍÂÛ̳OGUsersÔâµ½µÚËĴι¥»÷ £¬ÆäÊý¾Ý¿â±»³öÊÛ


4.jpg


Çå¾²¹«Ë¾KELA³ÆOGUsersÒÑÈ·ÈÏÆäÔâµ½¹¥»÷ £¬ÕâÊÇÆäÁ½ÄêÄÚÔâµ½µÄµÚËÄ´ÎÈëÇÖ¡£OGUsersÊÇÒ»¸öºÚ¿ÍÂÛ̳ £¬Ö÷Òª³öÊÛͨ¹ýSIM½»Á÷¹¥»÷¡¢Æ¾Ö¤Ìî³ä¹¥»÷µÈ·½·¨»ñµÃµÄÉ罻ýÌåÕÊ»§¡£¾ÝϤ £¬¹¥»÷±¬·¢ÔÚ2021Äê4ÔÂ11ÈÕ £¬ºÚ¿Í½«Web ShellÉÏ´«µ½ÁËOGUsersµÄ·þÎñÆ÷ £¬²¢ÔÚ°µÍøÒÔ3000ÃÀÔªµÄ¼ÛÇ®³öÊÛÆäÊý¾Ý¿â £¬ÆäÖаüÀ¨Ô¼350000¸ö»áÔ±µÄÓû§¼Í¼ºÍ˽ÈËÐÂÎÅ¡£ÔçÔÚÔÚ2019Äê5Ô¡¢2020Äê4ÔºÍ2020Äê11Ô £¬OGUsersÔâµ½ÁË3´Î¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fourth-times-a-charm-ogusers-hacking-forum-hacked-again/


5.GoogleÇå¾²¸üР£¬ÐÞ¸´Chrome V8ÖеĴúÂëÖ´ÐÐÎó²î


5.jpg


GoogleÐû²¼Çå¾²¸üР£¬ÐÞ¸´ÁËChrome V8ÖеĴúÂëÖ´ÐÐÎó²î¡£¸ÃÎó²î±»×·×ÙΪ £¬Î»ÓÚä¯ÀÀÆ÷ʹÓõÄV8 JavaScriptÒýÇæÖÐ £¬ÊÇÓÉÓÚÊý¾ÝÑé֤ȱ·¦µ¼ÖµÄ¡£½«ÆäÓëɳºÐÌÓÒÝÎó²îÍŽáʹÓÿÉÒÔÔÚ²Ù×÷ϵͳÉÏÖ´ÐжñÒâ´úÂë £¬ÓëÒѱ»ÐÞ¸´µÄCVE-2020-16040ºÍCVE-2020-15965Îó²îÏà¹Ø¡£±ðµÄ £¬´Ë´Î¸üл¹ÐÞ¸´ÁËANGLE×é¼þÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2021-21233£©ºÍV8×é¼þÖеÄÀàÐÍ»ìÏýÎó²î£¨CVE-2021-21230£©µÈÆäËü8¸öÎó²î¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/google-chrome-v8-bug-remote-code-execution/165662/


6.Ó¢¹úÌúÂ·ÍøÕ¾MerseyrailѬȾLockbit £¬¿Í»§ÐÅϢй¶


6.jpg


Merseyrail³ÆÆäÔâµ½LockbitÀÕË÷Èí¼þ¹¥»÷ £¬Óʼþϵͳ±»ÆÆËð¡£MerseyrailÊÇÓ¢¹úµÄÌúÂ·ÍøÕ¾ £¬ÎªÓ¢¸ñÀ¼ÀûÎïÆÖÊеØÇøµÄ68¸ö³µÕ¾Ìṩ»ð³µ·þÎñ¡£¹¥»÷ÕßÓÚ4ÔÂ18ÈÕÐû²¼Óʼþ £¬¼û¸æ¸Ã¹«Ë¾Óйش˴εĹ¥»÷ÊÂÎñ £¬²¢Éù³ÆÆäÒÑÇÔÈ¡ÁËÔ±¹¤ºÍ¿Í»§µÄÐÅÏ¢¡£Í¬Ê± £¬¸ÃÓʼþÒ²±»·¢Ë͸øÁËÓ¢¹úµÄ¼¸¼Ò±¨ÉçºÍMerseyrailµÄÔ±¹¤ £¬ÒÔÏò¹«Ë¾Ê©¼ÓѹÁ¦ £¬ÆÈʹÆäÖ§¸¶Êê½ð¡£MerseyrailÒÑÉϱ¨¸øÓ¢¹úÕþ¸® £¬²¢ÕýÔÚÖ´·¨²¿·ÖµÄЭÖú϶ԸÃÊÂÎñÕö¿ªÊӲ졣


Ô­ÎÄÁ´½Ó£º

https://news-block.com/uks-merseyrail-rail-network-likely-to-be-hit-by-lockbit-ransomware/