Ñо¿Ö°Ô±Åû¶TCP/IPÖÐͳ³ÆÎªINFRA:HALTµÄ14¸öÎó²î£»£»£»£»£»Òâ´óÀûÀ­Æë°Â´óÇøÑ¬È¾ÀÕË÷Èí¼þRansomEXXÍøÂçÖÐÖ¹

Ðû²¼Ê±¼ä 2021-08-05
1.Ñо¿Ö°Ô±Åû¶TCP/IPÖÐͳ³ÆÎªINFRA:HALTµÄ14¸öÎó²î


1.jpg


Ñо¿Ö°Ô±Åû¶ÁËÔÚNicheStack TCP/IP¿ÍÕ»Öз¢Ã÷µÄͳ³ÆÎªINFRA:HALTµÄ14¸öÇå¾²Îó²î£¬£¬£¬ £¬Ó°ÏìÁËÁè¼Ý200¼Ò¹©Ó¦ÉÌÖÆÔìµÄOT×°±¸¡£ ¡£¡£¡£ÕâЩÎó²î¿ÉÒÔµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС¢¾Ü¾øÐ§ÀÍ (DoS)ºÍÐÅϢй¶¡¢TCPÓÕÆ­ºÍDNS»º´æÖж¾¡£ ¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îΪCVE-2020-25928ºÍCVE-2020-31226£¬£¬£¬ £¬ÆÀ·Ö»®·ÖΪ9.8ºÍ9.1£¬£¬£¬ £¬Ó°ÏìÁË¿ÍÕ»µÄDNS¿Í»§¶ËºÍHTTPЧÀÍÆ÷×é¼þ£¬£¬£¬ £¬¿ÉÓÃÀ´ÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐдúÂë²¢ÍêÈ«¿ØÖÆËü¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/08/critical-flaws-affect-embedded-tcpip.html


2.GoogleÐû²¼Çå¾²¸üУ¬£¬£¬ £¬ÐÞ¸´AndroidÖеÄ30¶à¸öÎó²î


2.jpg


GoogleÐû²¼Çå¾²¸üУ¬£¬£¬ £¬ÐÞ¸´ÁËAndroidÖеÄ30¶à¸öÎó²î¡£ ¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îÊÇýÌå¿ò¼ÜÖеÄCVE-2021-0519£¬£¬£¬ £¬¿ÉÓÃÀ´ÔÚAndroid 8.1ºÍ9°æ±¾µÄ×°±¸ÉÏÌáȨ£¬£¬£¬ £¬»òµ¼ÖÂAndroid 10ºÍ11ÉϵÄÐÅϢй¶¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬´Ë´Î¸üл¹»¹ÐÞ¸´Á˸ßͨ×é¼þºÍ¸ßͨ±ÕÔ´×é¼þÖжà¸öÑÏÖØµÄÎó²î£¬£¬£¬ £¬°üÀ¨CVE-2021-1972¡¢CVE-2021-1976¡¢CVE-2021-1916ºÍCVE-2021-1919µÈÎó²î¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/google-patches-high-risk-android-security-flaws


3.Òâ´óÀûÀ­Æë°Â´óÇøÑ¬È¾ÀÕË÷Èí¼þRansomEXXÍøÂçÖÐÖ¹


3.jpg


ÉÏÖÜÈÕÇåÔ磬£¬£¬ £¬Òâ´óÀûÀ­Æë°Â´óÇøÔâµ½ÀÕË÷Èí¼þRansomEXX¹¥»÷¡£ ¡£¡£¡£¹¥»÷Õß¼ÓÃÜÁËÆäÊý¾ÝÖÐÐĵÄËùÓÐÎļþ²¢ÖÐÖ¹ÁËITÍøÂ磬£¬£¬ £¬»¹Ó°ÏìÁËÆäCOVID-19ÒßÃç½ÓÖÖ¹ÒºÅÍøÕ¾¡£ ¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇË­ÒÔ¼°ËûÃǵÄÄ¿µÄÊÇʲô£¬£¬£¬ £¬Í¨³£ÀÕË÷ÍÅ»ï»áÔÚ¹¥»÷ʱ´úÇÔÈ¡Êý¾Ý×÷ΪÀÕË÷µÄ³ïÂ룬£¬£¬ £¬µ«¸ÃµØÇøµÄ¿µ½¡¡¢²ÆÎñºÍÔ¤ËãÊý¾Ý¶¼ÊÇÇå¾²µÄ¡£ ¡£¡£¡£ÐÂÎÅÈËÊ¿³Æ´Ë´Î¹¥»÷À´×ÔRansomEXX£¬£¬£¬ £¬ÓÉÓÚÊê½ð¼Í¼ÖÐÓÃÀ´ÓëºÚ¿Í̸ÅеİµÍøÁ´½ÓÊǸÃÍÅ»ïµÄTorÍøÕ¾£»£»£»£»£»µ«Ñо¿Ö°Ô±JAMESWT³Æ£¬£¬£¬ £¬Òâ´óÀûÓÐÖ¤¾ÝÅú×¢¹¥»÷ÊÇÓÉLockBit 2.0¾ÙÐеÄ£¬£¬£¬ £¬ÏÖÔÚÎÞ·¨·ÖÏí¸ü¶àÐÅÏ¢¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-italys-lazio-region-affects-covid-19-site/


4.ÃÀ¹ú·çͶ¹«Ë¾ATV³ÆÆäѬȾÀÕË÷Èí¼þй¶¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢


4.jpg


ÃÀ¹úΣº¦Í¶×ʹ«Ë¾Advanced Technology Ventures£¨ATV£©³ÆÆäÔâµ½ÀÕË÷Èí¼þ¹¥»÷¡£ ¡£¡£¡£ATV³Æ£¬£¬£¬ £¬2021Äê7ÔÂ9ÈÕ£¬£¬£¬ £¬¸Ã¹«Ë¾´ÓÆäµÚÈý·½¹©Ó¦ÉÌ´¦»ñϤ£¬£¬£¬ £¬¹«Ë¾´æ´¢²ÆÎñ±¨¸æÐÅÏ¢µÄÁ½Ì¨Ð§ÀÍÆ÷Ôâµ½ÁËÀÕË÷¹¥»÷ÇÒÊý¾Ý±»¼ÓÃÜ¡£ ¡£¡£¡£7ÔÂ26ÈÕ£¬£¬£¬ £¬¸Ã¹«Ë¾È·¶¨ÕâЩÊý¾ÝÔâµ½ÁËδ¾­ÊÚȨµÄ»á¼ûºÍй¶¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬´Ë´Î¹¥»÷»¹Ð¹Â¶Á˲¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬ £¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÉç»áÇå¾²ºÅÂëµÈ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/120816/data-breach/advanced-technology-ventures-ransomware-attack.html


5.½üÆÚLemonDuckµÄhands-on-keyboard¹¥»÷»î¶¯ÔöÌí


5.jpg


Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬ £¬½üÆÚLemonDuckµÄhands-on-keyboard¹¥»÷»î¶¯ÔöÌí¡£ ¡£¡£¡£¸Ã½©Ê¬ÍøÂçÓÚ2019ÄêÉϰëÄêÓÉÒÔÉ«ÁÐÇå¾²¹«Ë¾GuardicoreÊ״η¢Ã÷¡£ ¡£¡£¡£ÔÚÒÑÍùµÄÁ½ÄêÀ£¬£¬ £¬Ò»¾­ºÜСµÄÍÚ¿ó¶ñÒâÈí¼þÒѾ­ÑÝÄð³ÉÒ»¸öÖØ´óµÄ½©Ê¬ÍøÂ磬£¬£¬ £¬²¢ÇÒ½üÆÚÕýÔÚʵÑéͨ¹ýÊÖ¶¯¹¥»÷±»ÈëÇÖµÄÍøÂ磬£¬£¬ £¬Ñо¿Ö°Ô±³ÆÕâÊÇÒ»¸öΣÏÕµÄת±ä¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬Î¢Èí»¹×¢ÖØµ½£¬£¬£¬ £¬¸ÃÍÅ»ï×îÏÈÔÚËûÃÇÈëÇÖµÄϵͳÉÏ×°ÖÃÆäËû¶ñÒâÈí¼þ£¬£¬£¬ £¬ÈçRamnitµÈ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/lemonduck-botnet-evolves-to-allow-hands-on-keyboard-intrusions/


6.ÃÀ¹úNSAºÍCISAÁªºÏÐû²¼ÓйØKubernetes¼Ó¹ÌµÄÖ¸ÄÏ


6.jpg


ÃÀ¹úNSAºÍCISAÁªºÏÐû²¼ÁËÓйØKubernetes¼Ó¹ÌµÄÖ¸ÄÏ¡£ ¡£¡£¡£KubernetesÊÇÒ»ÖÖ¿ªÔ´ÈÝÆ÷±àÅÅϵͳ£¬£¬£¬ £¬ÓÃÓÚ×Ô¶¯°²ÅÅ¡¢À©Õ¹ºÍÖÎÀíÈÝÆ÷»¯Ó¦ÓóÌÐò¡£ ¡£¡£¡£¸ÃÖ¸ÄÏΪϵͳÖÎÀíÔ±Ìṩһ¸öÇå¾²»ù×¼£¬£¬£¬ £¬ÓÃÀ´¶ÔKubernetes¾ÙÐÐÉèÖÃÒÔµÖÓùÖÖÖÖÀàÐ͵Ĺ¥»÷¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬Ö¸ÄÏ»¹ÏêϸÏÈÈÝÁ˹«Ë¾ºÍÕþ¸®»ú¹¹¿ÉÒÔʵÑéµÄ»ù±¾»º½â²½·¥£¬£¬£¬ £¬°üÀ¨£ºÉ¨ÃèÈÝÆ÷ºÍPodÒÔÈ·ÈÏÊÇ·ñ±£´æÎó²î»ò¹ýʧÉèÖ㻣»£»£»£»ÒÔ¾¡¿ÉÄÜÉÙµÄȨÏÞÔËÐÐÈÝÆ÷ºÍPod£»£»£»£»£»Ê¹ÓÃÈÕÖ¾ÉóºËµÈ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/08/02/cisa-and-nsa-release-kubernetes-hardening-guidance