ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ49ÖÜ

°ä²¼¹¦·ò 2019-12-16

>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê12ÔÂ09ÈÕÖÁ15ÈÕ¹²ÊÕ¼°²È«·ì϶57¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Chrome WebAudio´úÂëÖ´Ðзì϶; CA Release Automation DataManagement·´ÐòÁл¯´úÂëÖ´Ðзì϶£»Advantech DiagAnywhere ServerÎļþ´«Êä·þÎñÕ»Òç¶Âí½Å£»Micrsoft Windows Hyper-VÔ¶³Ì´úÂëÖ´Ðзì϶£»Adobe AcrobatºÍReader CVE-2019-16445ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇĪ˹¿Æ³ÇÊÐ¼à¿ØÏµÍ³½Ó¼ûȨÏÞÔÚ°µÍøÏúÊÛ£»¿ÆÂÞÀ­¶àÖÝIT·þÎñÉÌCTSÔâµ½ÀÕË÷Èí¼þ¹¥»÷£»ÀÕË÷Èí¼þSnatch¿Éͨ¹ý°²È«Ä£Ê½³ÁÆôÀ´Èƹýɱ¶¾Èí¼þ£»Î¢ÈíÖҸ淸×ïÍÅ»ïGALLIUM¹¥»÷È«ÇòµÄµçÐŹ«Ë¾£»¶ñÒâÈí¼þKrampus-3PCÖØÒª¶Ô×¼iphoneÓû§¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾Öܰ²È«ÍþвΪÖС£


>³ÁÒª°²È«·ì϶Áбí


1. Google Chrome WebAudio´úÂëÖ´Ðзì϶


Google Chrome WebAudio´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë £¬Ä¿Ç°ÒѾ­ÔÚÒ°ÀûÓá£

https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html


2. CA Release Automation DataManagement·´ÐòÁл¯´úÂëÖ´Ðзì϶


CA Release Automation DataManagement service´æÔÚ·´ÐòÁл¯·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://seclists.org/bugtraq/2019/Dec/16


3. Advantech DiagAnywhere ServerÎļþ´«Êä·þÎñÕ»Òç¶Âí½Å


Advantech DiagAnywhere ServerÎļþ´«Êä·þÎñ´æÔÚÕ»Òç¶Âí½Å £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2019.4660/


4. Micrsoft Windows Hyper-VÔ¶³Ì´úÂëÖ´Ðзì϶


Micrsoft Windows Hyper-V´æÔÚδÃ÷°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1471


5. Adobe AcrobatºÍReader CVE-2019-16445ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶


Adobe AcrobatºÍReader´¦ÖÃÄÚ´æ´æÔÚ¿ªÊͺóʹÓ÷ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£

https://helpx.adobe.com/security/products/acrobat/apsb19-55.html


>³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢ÄªË¹¿Æ³ÇÊÐ¼à¿ØÏµÍ³½Ó¼ûȨÏÞÔÚ°µÍøÏúÊÛ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


MBKh Mediaµ÷²é¼ÇÕßAndrey Kaganskikh·¢ÏÖĪ˹¿Æ³ÇÊÐ¼à¿ØÏµÍ³ºÍÃæ²¿¼ø±ðÊý¾ÝµÄ½Ó¼ûȨÏÞÔÚµØÏÂÂÛ̳ºÍ̸ÌìÊÒÖÐÏúÊÛ¡£Andrey°µÊ¾Âô·½ÊÇ·¨ÂÉÈËÔ±/µ±¾Ö¹ÙÔ± £¬Äܹ»µÇ¼Ī˹¿Æ³ÇÊмලϵͳµÄÊý¾Ý´¦Öúʹ洢¼¯³ÉÖÐÐÄ£¨YTKD£©¡£²É°ìÁËÉãÏñͷȨÏÞµÄÓû§½«»áÊÕµ½Ö¸Ïò³ÇÊÐCCTVϵͳµÄÒ»¸öÁ´½Ó £¬¸ÃÁ´½Ó¿É½Ó¼ûËùÓй«¹²ÉãÏñÍ· £¬Æä¿ÉÓù¦·òΪ5Ìì¡£´Ë±í £¬ÓµÓÐÎÞÏÞ½Ó¼ûȨÏ޵ĵǼʹ´¦¼ÛֵΪ30000¬²¼£¨470ÃÀÔª£©¡£µ÷²éÈËÔ±²âÊÔÁËÆäÕÕÆ¬ £¬Âô·½·µ»ØÁË238ÕÅͼƬ £¬ÕâЩͼƬÀ´×Ô140̨ÉãÏñÍ· £¬»¹ÁгöÁË×½Äõ½µÄ¾ßÌ嵨ַºÍ¹¦·ò £¬µ«·µ»ØµÄÕÕÆ¬¶¼²»Êǵ÷²éÈËÔ±µÄ £¬Õâ¿ÉÄÜÓëÉãÏñÍ·µÄÊýÁ¿ºÍËã·¨ÓйØ £¬ÏµÍ³¶ÔÆäÃæ²¿ÌصãµÄÆÀ¹ÀÀàËÆ¶ÈΪ67%¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/moscow-cops-sell-access-to-city-cctv-facial-recognition-data/


2¡¢¿ÆÂÞÀ­¶àÖÝIT·þÎñÉÌCTSÔâµ½ÀÕË÷Èí¼þ¹¥»÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿ÆÂÞÀ­¶àÖÝIT·þÎñÉÌCTSÔâÀÕË÷Èí¼þ¹¥»÷ £¬²¨¼°100¶à¼ÒÑÀ¿ÆÕïËù¡£CTSרΪÑÀ¿ÆÕïËùÌṩIT·þÎñ £¬Ô̺¬ÍøÂ簲ȫ¡¢Êý¾Ý±¸·ÝºÍIPÓïÒôµç»°µÈ¡£¸Ã¹«Ë¾ÓÚ11ÔÂ25ÈÕÔâµ½¹¥»÷ £¬µ¼ÖÂ100¶à¼ÒÑÀ¿ÆÕïËùµÄÍÆËã»úϰȾÁËÀÕË÷Èí¼þSodinokibi¡£CTS»Ø¾øÁ˹¥»÷ÕßË÷Òª70ÍòÃÀÔªÊê½ðµÄÒªÇó £¬ÓÉÓÚϵͳ²»ÐÝÖжÏ £¬Ä¿Ç°ºÜ¶àÑÀ¿ÆÕïËùÒÀÈ»ÎÞ·¨Õý³£½»Òס£


Ô­ÎÄÁ´½Ó£º

https://krebsonsecurity.com/2019/12/ransomware-at-colorado-it-provider-affects-100-dental-offices/


3¡¢ÀÕË÷Èí¼þSnatch¿Éͨ¹ý°²È«Ä£Ê½³ÁÆôÀ´Èƹýɱ¶¾Èí¼þ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÀÕË÷Èí¼þSnatchÔÚʹÓÃÒ»ÖÖǰËùδ¼ûµÄ¼¼ÇÉÀ´Èƹýɱ¶¾Èí¼þ £¬¾ßÌåÀ´Ëµ £¬ËüÄܹ»½«Êܺ¦ÕßµÄÍÆËã»úÒÔ°²È«Ä£Ê½³ÁÐÂÆô¶¯ £¬¶øºóÔËÐмÓÃܹý³Ì¡£´óÎÞÊýɱ¶¾Èí¼þ¶¼ÎÞ·¨ÔÚWindows°²È«Ä£Ê½ÏÂÆô¶¯ £¬Òò¶øSnatchÄÑÒÔ±»¼ì²âµ½¡£Æ¾¾ÝSophos LabsµÄ»ã±¨ £¬¸ÃÀÕË÷Èí¼þͨ¹ýWindows×¢²á±íÏîÔö³¤ÁËÒ»¸öÔÚ°²È«Ä£Ê½ÏÂÆô¶¯µÄ·þÎñ £¬¸Ã·þÎñ½«ÔËÐÐSnatch¡£×êÑÐÈËÔ±ÖÒ¸æ³ÆÕâÖÖģʽ¿ÉÄܻᱻÆäËüÀÕË÷Èí¼þËù·ÂÕÕ¡£Snatch×Ô2018ÄêÏļ¾ÒÔÀ´Ò»Ïò»îÔ¾ £¬ÆäÖØÒª½øÐÐÕë¶ÔÐԵĹ¥»÷¡£Óë´óÎÞÊýÀÕË÷Èí¼þ·ÖÆç £¬Snatch»¹»áÇÔÈ¡ÊÜϰȾϵͳÉϵÄÎļþ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/snatch-ransomware-reboots-pcs-in-windows-safe-mode-to-bypass-antivirus-apps/


4¡¢Î¢ÈíÖҸ淸×ïÍÅ»ïGALLIUM¹¥»÷È«ÇòµÄµçÐŹ«Ë¾


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


΢ÈíÍþвµý±¨ÖÐÐÄ£¨MSTIC£©ÖҸ淸×ïÍÅ»ïGALLIUMÔÚÕë¶ÔÊÀ½ç¸÷µØµÄµçÕÛ·þÎñÉ̽øÐгÖÐø²»ÐݵĹ¥»÷¡£¸Ã·¸×ïÍÅ»ï½øÐÐÁ˶à¸ö¹¥»÷»î¶¯ £¬MSTIC¹Û²ìµ½Õë¶Ô¶«ÄÏÑÇ¡¢Å·Ö޺ͷÇÖ޵ĵçÐÅÔËÓªÉ̵Ĺ¥»÷¡£GALLIUMÖØÒªÍ¨¹ýδ´ò²¹¶¡µÄWildFly/JBoss·þÎñÆ÷½øÐÐÈëÇÖ £¬Ò»µ©ÉøÈëµ½×éÖ¯µÄÍøÂçÖÐ £¬GALLIUM±ãÆðÍ·ÀûÓÃ×Ô½ç˵µÄ¶ñÒâÈí¼þÔÚÆóÒµÍøÂçÖкáÏòÒÆ¶¯ºÍÍøÂçÓòÍ´´¦¡£GALLIUM»¹Ê¹ÓÃSoftEther VPNÈí¼þÀ´¼ÓÇ¿¶ÔÖ¸±êÍøÂçµÄ½Ó¼ûºÍά³ÖÓÆ¾ÃÐÔ¡£Æ¾¾ÝMSTICµÄ»ã±¨ £¬GALLIUMµÄTTPºÍ¸Ã×é֯ʹÓõIJ¿ÃÅÓòÓë2018ÄêµÄOperation SoftCellÒ»Ñù¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-warns-of-gallium-threat-group-attacking-global-telcos/


5¡¢¶ñÒâÈí¼þKrampus-3PCÖØÒª¶Ô×¼iphoneÓû§


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ò»¸öÕë¶ÔiPhoneÓû§µÄ¶ñÒâ¸æ°×³Á¶¨Ïò»î¶¯ÒѾ­Ó°ÏìÁË100¶à¸ö³ö°æÉÌÍøÕ¾ £¬ÆäÖÐÔ̺¬ÔÚÏß±¨Ö½ÍøÕ¾ºÍ¹ú¼ÊÿÖÜÐÂÎÅÔÓÖ¾ÍøÕ¾µÈ¡£Æ¾¾ÝDSOÍŶӵÄ˵·¨ £¬¸Ã¶ñÒâÈí¼þKrampus-3PC¼Ù×°³ÉÔÓ»õµêµÄ³ê±ö¸æ°× £¬´ÓÓû§ÄÇÀïÊÕÍÅÔ²»°ºÍcookieÐÅÏ¢ £¬²¢ÇÒÔÚÓû§µã»÷¸æ°×ʱ³Á¶¨ÏòÖÁÒ»¸öÍøÂçÓ×ÎÒÐÅÏ¢µÄÐéÎ±ÍøÕ¾¡£¹¥»÷ÕßÊ×ÏÈÔÚ¸æ°×ƽ̨AdtechstackÉÏͶ·Å¸æ°× £¬¶øºóÀûÓÃÆ½Ì¨µÄAPI²åÈë¶ñÒâ´úÂë £¬ÕâЩ¶ñÒâ¸æ°×Ëæºó±»·Ö·¢¸ø´óÁ¿ÍøÕ¾¡£Krampus-3PC»á½«ÍøÂçµ½µÄÓû§ÐÅÏ¢·¢ËÍÖÁC2ÓòÃûboostsea2[.]com¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßµÄÉí·Ý¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/krampus-3pc-malware-iphone-users/151043/