ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ44ÖÜ

°ä²¼¹¦·ò 2021-11-01

>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


±¾Öܹ²ÊÕ¼°²È«·ì϶62¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache Storm getTopologyHistory·þÎñSHELLºÅÁî×¢Èë·ì϶£»Microsoft Azure GridPro´úÂëÖ´Ðзì϶£»Apple macOS bigsurÄں˴úÂëÖ´Ðзì϶£»BillQuick Web SuiteSQL×¢Èë·ì϶£»Penguin Aurora TV Box 41502δÊÚȨ½Ó¼û·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇWizardUpdateбäÖÖͨ¹ý¼ÙÒâºÏ·¨Èí¼þÈÆ¹ý¼ì²â£»Microsoft°ä²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄ·ÖÎö»ã±¨£»Emsisoft°ä²¼Õë¶ÔÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷£»×êÑÐÍŶÓÅû¶APT×éÖ¯LazarusÌáÒéµÄ¹©¸øÁ´¹¥»÷µÄϸ½Ú£»ÒÁÀÊʯÓ͹«Ë¾NIOPDCÔâµ½¹¥»÷£¬È«¹ú¼ÓÓÍÕ¾ÔËÓªÖжÏ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


>³ÁÒª°²È«·ì϶Áбí


1. Apache Storm getTopologyHistory·þÎñSHELLºÅÁî×¢Èë·ì϶


Apache Storm getTopologyHistory·þÎñ´æÔÚSHELLºÅÁî×¢Èë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿É×¢ÈëËÁÒâ´úÂë²¢ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐС£


https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E


2. Microsoft Azure GridPro´úÂëÖ´Ðзì϶


Microsoft Azure GridProÒªÇóÖÎÀí´æÔÚĿ¼±éÀú·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://seclists.org/fulldisclosure/2021/Oct/33


3. Apple macOS bigsurÄں˴úÂëÖ´Ðзì϶


Apple macOS bigsurÄں˴æÔÚ°²È«·ì϶£¬ÔÊÐí±¾µØ¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»Äں˸ߵÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://support.apple.com/zh-cn/HT212872


4. BillQuick Web SuiteSQL×¢Èë·ì϶


Bqe Software BillQuick Web Suite´æÔÚSQL×¢Èë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£


https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware


5. Penguin Aurora TV Box 41502δÊÚȨ½Ó¼û·ì϶


Penguin Aurora TV Box¶ÔÌØ¶¨Á´½Ó´¦ÖôæÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Î´ÊÚȨ½ÚÔìϵͳ¡£


https://www.cnvd.org.cn/flaw/show/2934166



 >³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢WizardUpdateбäÖÖͨ¹ý¼ÙÒâºÏ·¨Èí¼þÈÆ¹ý¼ì²â


×êÑÐÈËÔ±ÔÚ10ÔÂ22ÈÕÅû¶Á˶ñÒâÈí¼þWizardUpdate£¨±ðÃûUpdateAgent£©µÄбäÖÖ¡£WizardUpdate×î³õÓÚ2020Äê11Ô±»·¢ÏÖ£¬ÖØÒªÕë¶ÔmacOS¡£¸Ã±äÌ忪·¢ÁËеÄÖ°ÄÜ£¬ÀýÈçÀÄÓù«¹²ÔÆÀ´·Ö·¢¶ñÒâ¸æ°×Èí¼þAdload£¬²¢ÇÒ»¹ÄÜÈÆ¹ýAppleµÄ°²È«Ö°ÄÜGatekeeper¡£´Ë±í£¬ËüʹÓÃÁË͵¶ÉʽÏÂÔØ£¨Drive-by downloads£©µÄ·½Ê½½øÐзַ¢£¬Í¨¹ý¼ÙÒâºÏ·¨Èí¼þÀ´Èƹý¼ì²â£¬×êÑÐÈËÔ±ÉÐδй©Æä·ÂÕÕÁËÄÄЩÈí¼þ¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/updateagent-malware-variant-macos-software/


2¡¢Microsoft°ä²¼NOBELIUMÍŻ﹥»÷»î¶¯µÄ·ÖÎö»ã±¨


MicrosoftÍþвµý±¨ÖÐÐÄÔÚ10ÔÂ25ÈÕ°ä²¼Á˹ØÓÚNOBELIUMÍŻ﹥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£NOBELIUMÊÇ2020Äê12ÔÂÕë¶ÔSolarWindsµÄ¹©¸øÁ´¹¥»÷µÄÄ»ºóºÚÊÖ£¬×Ô2021Äê5ÔÂÒÔÀ´£¬¸ÃÍÅ»ïÔÚÃÀ¹úºÍÅ·ÖÞÌáÒéÁËÓÐÕë¶ÔÐԵĹ©¸øÁ´¹¥»÷¡£Õâ´Î»î¶¯²¢Î´ÀûÓÃÈκηì϶£¬¶øÊÇÀûÓÃÃÜÂëÅçÉä¡¢ÁîÅÆÍµÇÔ¡¢APIÀÄÓúÍÓã²æÊ½ÍøÂç´¹µöµÈ¶àÖÖ¼¼ÊõÀ´ÇÔÌØÈ¨ÕÊ»§µÄÍ´´¦£¬´Ó¶øÔÚÔÆ»·¾³ÖкáÏòÒÆ¶¯¡£


Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2021/10/25/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks/


3¡¢Emsisoft°ä²¼Õë¶ÔÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷


°²È«¹«Ë¾EmsisoftÔÚ10ÔÂ24ÈÕ¹«¿ªÁËÀÕË÷Èí¼þBlackMatterµÄ½âÃÜÆ÷¡£½ñÄêÔçЩʱ³½£¬×êÑÐÈËÔ±·¢ÏÖBlackMatterÖдæÔÚÒ»¸ö¿ÉÓÃÓÚ¸´Ô­¼ÓÃÜÎļþ·ì϶£¬²¢ÇÒËûÃÇÔÚ֮ǰһÏòûÓÐй©¸Ã·ì϶µÄ´æÔÚ£¬ÒÔÔ¤·À¸ÃÍŻィ¸´·ì϶¡£²»ÐÒµÄÊÇ£¬BlackMatterÔÚ9Ôµ׷¢ÏÖ²¢½¨¸´Á˸÷ì϶£¬Òò¶øÕâ¸ö½âÃÜÆ÷½öÄܽâÃÜ2021Äê7ÔÂÖÐÑ®ÖÁ9ÔÂÏÂѮ֮¼ä±»¼ÓÃܵÄÎļþ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123736/security/blackmatter-decryptor-pat-victims.html


4¡¢×êÑÐÍŶÓÅû¶APT×éÖ¯LazarusÌáÒéµÄ¹©¸øÁ´¹¥»÷µÄϸ½Ú


Kaspersky×êÑÐÍŶÓÓÚ±¾ÖܶþÅû¶ÁËLazarusÔÚ½üÆÚÌáÒéµÄ¹©¸øÁ´¹¥»÷¡£APT×éÖ¯Lazarus×Ô2009ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬ÀûÓÃMATA¹¥»÷¸÷¸öÐÐÒµµÄ×éÖ¯¡£ÔÚÕâ´Î»î¶¯ÖУ¬¸ÃÍÅ»ïÓÚ5Ô¹¥»÷ÁËÀ­ÍÑάÑǵÄIT¹©¸øÉÌ£¬ÓÖÔÚ6Ô·ÝÀûÓúóÃÅBLINDINGCANµÄбäÌå¹¥»÷Á˺«¹úÖǿ⡣×êÑÐÈËÔ±³Æ£¬×î½üµÄ»î¶¯Õ¹Ê¾ÁËÁ½¸öÇ÷Ïò£ºLazarusÒÀÈ»¶Ô¹ú·ÀÐÐÒµ¸ÐÐËÖ£¬²¢ÇÒ»¹µ«Ô¸Í¨¹ý¹©¸øÁ´¹¥»÷À´À©´óÆä¹¥»÷ÁìÓò¡£


Ô­ÎÄÁ´½Ó£º

https://usa.kaspersky.com/about/press-releases/2021_apt-actor-lazarus-attacks-defense-industry-develops-supply-chain-attack-capabilities


5¡¢ÒÁÀÊʯÓ͹«Ë¾NIOPDCÔâµ½¹¥»÷£¬È«¹ú¼ÓÓÍÕ¾ÔËÓªÖжÏ


ÒÁÀʹúÓÐʯÓͲúÆ··ÖÏú¹«Ë¾(NIOPDC)ÔÚ10ÔÂ26ÈÕÔâµ½¹¥»÷¡£NIOPDCÔÚÒÁÀÊÈ«¹úÁìÓòÄÚÕ¼Óг¬¹ý3500¸ö¼ÓÓÍÕ¾£¬ÓÉÓÚÎÞ·¨Ö§¸¶ÓöÈ£¬ÊÜÓ°ÏìµÄ¼ÓÓÍÕ¾ÔÚÔâµ½¹¥»÷ºóµ±¼´ÖжÏÁËÔËÓª¡£ºÜ¶à¼ÓÓÍÕ¾µÄ¸æ°×ÅÆÉ϶¼ÏÔʾ×Å¡°Khamenei£¡GA»Æ½ð¼×ȼÁÏÄØ £¿¡±ºÍ¡°Ãâ·ÑÆûÓÍ¡±µÄ×ÖÑù£¬´Ë±í£¬¼ÓÓÍÕ¾µÄÆÁÄ»ÉÏÏÔʾ×Å¡°cyebrattack 64411¡±µÄ×ÖÑù£¬ÆäÖÐ64411ÊǸùú×î¸ßÇ̳þAyatollah Ali Khamenei°ì¹«Êҵĵ绰¡£Éв»È·¶¨¹¥»÷ÕßµÄÉí·Ý£¬µ«ÒÁÀʵ±¾Ö´§¶ÈÕâÊÇÓɵжԹú¶ÈÌáÒéµÄÍøÂç¹¥»÷»î¶¯¡£Ä¿Ç°£¬¼ÓÓÍÕ¾µÄÔËÓªÒѸ´Ô­¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/123824/hacking/iranian-gas-stations-incident.html