Ñо¿ÍŶÓÅû¶Òѱ£´æ¶àÄêµÄLinuxºóÃÅRotaJakiro£»£»£»Î¢ÈíÅû¶IoTºÍOT×°±¸ÖеÄ25¸öRCEÎó²îBadAlloc
Ðû²¼Ê±¼ä 2021-04-301.Ñо¿ÍŶÓÅû¶Òѱ£´æ¶àÄêµÄLinuxºóÃÅRotaJakiro

Ñо¿ÍŶÓÅû¶×Ô2018ÄêÒÔÀ´¾Í±£´æµÄLinuxºóÃÅRotaJakiro£¬£¬£¬£¬£¬£¬Ö¼ÔÚ´ÓÊÜѬȾµÄ×°±¸ÖÐÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£RotaJakiroÖ®ÒÔÊǵÃÃû£¬£¬£¬£¬£¬£¬ÊÇÓÉÓÚËüʹÓÃÁËÂÖ»»¼ÓÃÜ£¬£¬£¬£¬£¬£¬²¢ÇÒÔÚrootÕÊ»§ºÍ·ÇrootÕÊ»§ÖÐÖ´ÐÐʱÓÐËù²î±ð¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÆäʹÓÃÁ˶àÖÖ¼ÓÃÜËã·¨£¬£¬£¬£¬£¬£¬°üÀ¨ÓÃÓÚ¶ÔÑù±¾ÖеÄ×ÊÔ´ÐÅÏ¢¾ÙÐмÓÃܵÄAESËã·¨£¬£¬£¬£¬£¬£¬ÒÔ¼°ÓÃÓÚC2ͨѶµÄAES¡¢XOR¡¢ROTATE¼ÓÃܺÍZLIBѹËõ£¬£¬£¬£¬£¬£¬Ö¼ÔÚ¾¡¿ÉÄÜÒþ²ØµØÔËÐС£¡£¡£¡£¡£¾ßÓÐÇÔȡװ±¸Ö¸ÎÆ¡¢ÎļþºÍ²å¼þÖÎÀí£¨ÅÌÎÊ¡¢ÏÂÔØºÍɾ³ý£©ºÍÖ´ÐÐÌØ¶¨²å¼þµÄ¹¦Ð§¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/117332/breaking-news/rotajakiro-linux-backdoor.html
2.Naikon APTÔÚÕë¶Ô¶«ÄÏÑǾüÊÂ×éÖ¯µÄ¹¥»÷ÖÐʹÓÃкóÃÅNebulae

Bitdefender·¢Ã÷£¬£¬£¬£¬£¬£¬APT×éÖ¯NaikonÔÚÕë¶Ô¶«ÄÏÑǾüÊÂ×éÖ¯µÄ¹¥»÷»î¶¯ÖÐʹÓÃÁËкóÃÅNebulae¡£¡£¡£¡£¡£¸Ã×éÖ¯×Ô2010ÄêÒÔÀ´×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô·ÆÂɱö¡¢ÂíÀ´Î÷ÑÇ¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÐÂ¼ÓÆÂºÍÌ©¹úµÄÕþ¸®ºÍ¾üÊÂ×éÖ¯¡£¡£¡£¡£¡£ÔÚ½üÆÚµÄ»î¶¯ÖУ¨2019Äê6ÔÂÖÁ2021Äê3Ô£©£¬£¬£¬£¬£¬£¬NaikonʹÓÃÁËÕýµ±Èí¼þ¼ÓÔØNebulaeÀ´ÊµÏÖ³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬¸ÃºóÃÅ¿ÉÒÔÍøÂçϵͳÐÅÏ¢¡¢Ê¹ÓÃÎļþºÍÎļþ¼Ð¡¢´ÓC2ÏÂÔØÎļþÒÔ¼°Ö´ÐС¢Áгö»òÖÕÖ¹ÊÜѬȾÉè±¹ØÁ¬ÄÀú³Ì¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/117321/apt/naikon-apt-nebulae-backdoor.html
3.΢ÈíÅû¶IoTºÍOT×°±¸ÖеÄ25¸öRCEÎó²îBadAlloc

΢ÈíÇå¾²Ñо¿Ö°Ô±ÔÚÎïÁªÍø£¨IoT£©×°±¸ºÍÔËÓªÊÖÒÕ£¨OT£©¹¤ÒµÏµÍ³Öз¢Ã÷ÁË25¸öÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¬£¬£¬£¬£¬£¬±»Í³³ÆÎªBadAlloc¡£¡£¡£¡£¡£ÕâЩÎó²îÊÇÓÉÓÚÕûÊýÒç³ö»òÎ§ÈÆµ¼Öµģ¬£¬£¬£¬£¬£¬ÓÉÓÚÄÚ´æ·ÖÅɹ¦Ð§ÖÐûÓоÙÐÐÊäÈëÑéÖ¤£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøù¦Ð§À´¾ÙÐжÑÒç³ö£¬£¬£¬£¬£¬£¬´Ó¶øÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£ÕâЩÎó²îÖ÷ÒªÓ°ÏìÁËÏûºÄÕß¡¢Ò½Áƺ͹¤ÒµµÄÍøÂ磬£¬£¬£¬£¬£¬CISA½¨Òé×éÖ¯Ó¦ÓÿÉÓõũӦÉ̸üС¢Ö»¹ÜïÔÌÏµÍ³ÍøÂçµÄ̻¶¡¢½«¿ØÖÆÏµÍ³µÄÍøÂçºÍÔ¶³Ì×°±¸ÖÃÓÚ·À»ðǽ֮ºó²¢ÓëÓªÒµÍøÂç¸ôÀëÒÔ¼°Ê¹ÓÃVPN¾ÙÐÐÔ¶³Ì»á¼û¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-finds-critical-code-execution-bugs-in-iot-ot-devices/
4.ºÚ¿ÍÂÛ̳OGUsersÔâµ½µÚËĴι¥»÷£¬£¬£¬£¬£¬£¬ÆäÊý¾Ý¿â±»³öÊÛ

Çå¾²¹«Ë¾KELA³ÆOGUsersÒÑÈ·ÈÏÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬ÕâÊÇÆäÁ½ÄêÄÚÔâµ½µÄµÚËÄ´ÎÈëÇÖ¡£¡£¡£¡£¡£OGUsersÊÇÒ»¸öºÚ¿ÍÂÛ̳£¬£¬£¬£¬£¬£¬Ö÷Òª³öÊÛͨ¹ýSIM½»Á÷¹¥»÷¡¢Æ¾Ö¤Ìî³ä¹¥»÷µÈ·½·¨»ñµÃµÄÉ罻ýÌåÕÊ»§¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ2021Äê4ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿Í½«Web ShellÉÏ´«µ½ÁËOGUsersµÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬²¢ÔÚ°µÍøÒÔ3000ÃÀÔªµÄ¼ÛÇ®³öÊÛÆäÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ô¼350000¸ö»áÔ±µÄÓû§¼Í¼ºÍ˽ÈËÐÂÎÅ¡£¡£¡£¡£¡£ÔçÔÚÔÚ2019Äê5Ô¡¢2020Äê4ÔºÍ2020Äê11Ô£¬£¬£¬£¬£¬£¬OGUsersÔâµ½ÁË3´Î¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fourth-times-a-charm-ogusers-hacking-forum-hacked-again/
5.GoogleÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Chrome V8ÖеĴúÂëÖ´ÐÐÎó²î

GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËChrome V8ÖеĴúÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪ£¬£¬£¬£¬£¬£¬Î»ÓÚä¯ÀÀÆ÷ʹÓõÄV8 JavaScriptÒýÇæÖУ¬£¬£¬£¬£¬£¬ÊÇÓÉÓÚÊý¾ÝÑé֤ȱ·¦µ¼Öµġ£¡£¡£¡£¡£½«ÆäÓëɳºÐÌÓÒÝÎó²îÁ¬ÏµÊ¹ÓÿÉÒÔÔÚ²Ù×÷ϵͳÉÏÖ´ÐжñÒâ´úÂ룬£¬£¬£¬£¬£¬ÓëÒѱ»ÐÞ¸´µÄCVE-2020-16040ºÍCVE-2020-15965Îó²îÏà¹Ø¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬´Ë´Î¸üл¹ÐÞ¸´ÁËANGLE×é¼þÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2021-21233£©ºÍV8×é¼þÖеÄÀàÐÍ»ìÏýÎó²î£¨CVE-2021-21230£©µÈÆäËü8¸öÎó²î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/google-chrome-v8-bug-remote-code-execution/165662/
6.Ó¢¹úÌúÂ·ÍøÕ¾MerseyrailѬȾLockbit£¬£¬£¬£¬£¬£¬¿Í»§ÐÅϢй¶

Merseyrail³ÆÆäÔâµ½LockbitÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Óʼþϵͳ±»ÆÆË𡣡£¡£¡£¡£MerseyrailÊÇÓ¢¹úµÄÌúÂ·ÍøÕ¾£¬£¬£¬£¬£¬£¬ÎªÓ¢¸ñÀ¼ÀûÎïÆÖÊеØÇøµÄ68¸ö³µÕ¾Ìṩ»ð³µÐ§ÀÍ¡£¡£¡£¡£¡£¹¥»÷ÕßÓÚ4ÔÂ18ÈÕÐû²¼Óʼþ£¬£¬£¬£¬£¬£¬¼û¸æ¸Ã¹«Ë¾Óйش˴εĹ¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬²¢Éù³ÆÆäÒÑÇÔÈ¡ÁËÔ±¹¤ºÍ¿Í»§µÄÐÅÏ¢¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¸ÃÓʼþÒ²±»·¢Ë͸øÁËÓ¢¹úµÄ¼¸¼Ò±¨ÉçºÍMerseyrailµÄÔ±¹¤£¬£¬£¬£¬£¬£¬ÒÔÏò¹«Ë¾Ê©¼ÓѹÁ¦£¬£¬£¬£¬£¬£¬ÆÈʹÆäÖ§¸¶Êê½ð¡£¡£¡£¡£¡£MerseyrailÒÑÉϱ¨¸øÓ¢¹úÕþ¸®£¬£¬£¬£¬£¬£¬²¢ÕýÔÚÖ´·¨²¿·ÖµÄÐÖú϶ԸÃÊÂÎñÕö¿ªÊӲ졣¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news-block.com/uks-merseyrail-rail-network-likely-to-be-hit-by-lockbit-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ