ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ42ÖÜ

Ðû²¼Ê±¼ä 2018-10-22

Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2018Äê10ÔÂ15ÈÕÖÁ21ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö £¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇLibssh CVE-2018-10933ЧÀÍÆ÷Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»£»£»Pivotal Spring Security OAuthȨÏÞÌáÉýÎó²î£»£»£»£»£»£»£»Dell EMC Secure Remote ServicesȨÏÞÌáÉýÎó²î£»£»£»£»£»£»£»Opto 22 PAC Control CVE-2018-14807»º³åÇøÒç³öÎó²î£»£»£»£»£»£»£»HPE Intelligent Management Center PLAT´úÂëÖ´ÐÐÎó²î¡£¡£¡£ ¡£¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹ú·À²¿£¨Îå½Ç´óÂ¥£©Ô¼3ÍòÃûÔ±¹¤µÄÂÃÐмͼй¶£»£»£»£»£»£»£»ÎÚ¿ËÀ¼Õþ¸®»ú¹¹ÔÙÔâAPT×éÖ¯BlackEnergyÏ®»÷£»£»£»£»£»£»£»Áè¼Ý3500ÍòÃÀ¹úÑ¡ÃñµÄ¼Í¼ÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ£»£»£»£»£»£»£»±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳÔâÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬£¬FBIÒѽéÈëÊӲ죻£»£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷Õë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼ÄÜÔ´¹«Ë¾µÄÐÂAPT×éÖ¯GreyEnergy¡£¡£¡£ ¡£¡£

ƾ֤ÒÔÉÏ×ÛÊö £¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£ ¡£¡£

¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí


1. Libssh CVE-2018-10933ЧÀÍÆ÷Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î


Libsshͨ¹ýÏòЧÀÍÆ÷ÌṩSSH2_MSG_USERAUTH_SUCCESSÐÂÎÅÀ´È¡´úЧÀÍÆ÷Õý³£ÆôÆôº½·ÝÑéÖ¤µÄSSH2_MSG_USERAUTH_REQUESTÐÂÎÅʱ±£´æÇå¾²Îó²î £¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬£¬ÎÞÐèÑé֤δÊÚȨ»á¼û¡£¡£¡£ ¡£¡£


https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release/

2. Pivotal Spring Security OAuthȨÏÞÌáÉýÎó²î


Pivotal Spring Security OAuth±£´æÇå¾²Îó²î £¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬£¬ÌáÉýȨÏÞ¡£¡£¡£ ¡£¡£

https://pivotal.io/security/cve-2018-15758

3. Dell EMC Secure Remote ServicesȨÏÞÌáÉýÎó²î


Dell EMC Secure Remote Services°üÀ¨¶à¸ö¾ßÓÐÈ«¾Ö¿É¶ÁȨÏÞµÄÉèÖÃÎļþ £¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬£¬ÌáÉýȨÏÞ¡£¡£¡£ ¡£¡£


https://www.dellemc.com/

4. Opto 22 PAC Control CVE-2018-14807»º³åÇøÒç³öÎó²î

Opto 22 PAC Control±£´æ»º³åÇøÒç³öÎó²î £¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£


https://www.opto22.com/support/resources-tools/knowledgebase/kb87547

5. HPE Intelligent Management Center PLAT´úÂëÖ´ÐÐÎó²î


HPE Intelligent Management Center PLAT±£´æÇå¾²Îó²î £¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£


https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03901en_us

Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÃÀ¹ú·À²¿£¨Îå½Ç´óÂ¥£©Ô¼3ÍòÃûÔ±¹¤µÄÂÃÐмͼй¶

welcome-°ÙÀÖ²©

ÃÀ¹ú¹ú·À²¿£¨Îå½Ç´óÂ¥£©µÄ²¿·Ö¾ü·½ºÍÎÄÖ°Ö°Ô±µÄСÎÒ˽¼ÒÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ýй¶ £¬£¬£¬£¬£¬£¬£¬Ô¼3ÍòÈËÊܵ½Ó°Ïì¡£¡£¡£ ¡£¡£ÕâÒ»Êý¾Ýй¶ÊÂÎñ¿ÉÄܱ¬·¢ÔÚ¼¸¸öÔÂǰ £¬£¬£¬£¬£¬£¬£¬µ«Ö±µ½×î½ü²Å±»·¢Ã÷¡£¡£¡£ ¡£¡£¸ÃÊÂÎñÉæ¼°µ½Ò»¼ÒΪ¹ú·À²¿ÌṩЧÀ͵ĵÚÈý·½¹©Ó¦ÉÌ £¬£¬£¬£¬£¬£¬£¬ÏÖÔڸù©Ó¦É̵ÄÉí·ÝÈÔÈ»²»Ã÷È·¡£¡£¡£ ¡£¡£ÕâÒ»ÊÂÎñÈÔÈ»ÔÚ½øÒ»²½µÄÊÓ²ìÖ®ÖÐ £¬£¬£¬£¬£¬£¬£¬µ«Ã»ÓÐÈκÎÉñÃØÐÅÏ¢Ô⵽й¶¡£¡£¡£ ¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/77097/data-breach/pentagon-travel-records-data-breach.html

2¡¢ÎÚ¿ËÀ¼Õþ¸®»ú¹¹ÔÙÔâAPT×éÖ¯BlackEnergyÏ®»÷

welcome-°ÙÀÖ²©


ÎÚ¿ËÀ¼Çå¾²¾Ö£¨SBU£©ÌåÏÖ×î½ü¶íÂÞ˹APT×éÖ¯BlackEnergyÔÙ´ÎÕë¶ÔÎÚ¿ËÀ¼Õþ¸®»ú¹¹µÄÐÅϢϵͳºÍµçÐÅϵͳÌᳫ¹¥»÷¡£¡£¡£ ¡£¡£SBUר¼ÒÖ¸³ö £¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËеĶñÒâÈí¼þ £¬£¬£¬£¬£¬£¬£¬Æä¹¦Ð§°üÀ¨Ô¶³ÌÖÎÀí²Ù×÷ϵͳÒÔ¼°Îļþ¸´ÖÆ¡¢¼à¿ØÓû§ÐÐΪºÍ×èµ²ÃÜÂëµÈ¡£¡£¡£ ¡£¡£Æ¾Ö¤SBUºÍÒ»¸öÇå¾²³§É̵ÄÊÓ²ì £¬£¬£¬£¬£¬£¬£¬¹¥»÷ÖÐÉæ¼°µ½µÄ¶ñÒâÈí¼þÊÇIndustroyerºóÃŵÄбäÌå¡£¡£¡£ ¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬£¬SBU»¹·¢Ã÷ÁËÊôÓÚ¸ÃAPT×éÖ¯µÄ¶ÀÍ̹¤¾ß¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.ukrinform.net/rubric-crime/2557323-russian-hackers-mount-cyberattack-on-ukraines-state-bodies.html

3¡¢Áè¼Ý3500ÍòÃÀ¹úÑ¡ÃñµÄ¼Í¼ÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ

welcome-°ÙÀÖ²©


±¾ÖÜÒ»Anomali LabsºÍIntel 471µÄÑо¿Ö°Ô±ÔÚ°µÍøÂÛ̳ÉÏ·¢Ã÷Ò»¸ö°üÀ¨´ó×ÚÑ¡ÃñÊý¾ÝµÄÊý¾Ý¿âÕýÔÚ³öÊÛ¡£¡£¡£ ¡£¡£¸ÃÊý¾Ý¿â°üÀ¨À´×Ô19¸öÖݵĶà´ï3500ÍòÌõÑ¡Ãñ¼Í¼¡£¡£¡£ ¡£¡£ÕâЩ¼Í¼°üÀ¨ÐÕÃû¡¢µç»°ºÅÂ롢סַ¡¢Í¶Æ±ÀúÊ·ºÍÆäËüͶƱÊý¾ÝµÈ¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±¶Ô¸ÃÊý¾Ý¿âµÄÑù±¾¾ÙÐÐÁËÉó²é £¬£¬£¬£¬£¬£¬£¬È·ÈÏÕâЩÊý¾ÝÓÐÓò¢ÇÒ¸ÃÊý¾Ý¿â¾ßÓи߶ȵĿÉÐŶÈ¡£¡£¡£ ¡£¡£¼øÓÚÃÀ¹ú2018ÄêµÄÖÐÆÚÑ¡¾Ù¼´½«µ½À´ £¬£¬£¬£¬£¬£¬£¬ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»¹¥»÷ÕßÓÃÀ´ÆÆËðÑ¡¾Ù»ò¾ÙÐÐÉí·Ý͵ÇԵȶñÒâ»î¶¯¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º
https://threatpost.com/up-to-35-million-2018-voter-records-for-sale-on-hacking-forum/138295/

4¡¢±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳÔâÀÕË÷Èí¼þ¹¥»÷ £¬£¬£¬£¬£¬£¬£¬FBIÒѽéÈëÊÓ²ì

welcome-°ÙÀÖ²©


±¾ÖÜÒ»ONWASA£¨°ºË¹Â幩ˮºÍÎÛË®ÖÎÀí¾Ö£©Ðû²¼ÐÂÎÅ³Æ £¬£¬£¬£¬£¬£¬£¬±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳµÄÄÚ²¿ÅÌËã»úϵͳ£¨°üÀ¨Ð§ÀÍÆ÷ºÍСÎÒ˽¼ÒµçÄÔ£©Ôâµ½ÀÕË÷Èí¼þEmotet¹¥»÷¡£¡£¡£ ¡£¡£ONWASAûÓÐÅû¶ÏêϸµÄÊê½ð½ð¶î¡£¡£¡£ ¡£¡£¸Ã¹¥»÷±¬·¢ÔÚ10ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬£¬ÇéÐÎËæºóÒÑ»ñµÃ¿ØÖÆ¡£¡£¡£ ¡£¡£ËäȻûÓпͻ§ÐÅÏ¢Ôڴ˴ι¥»÷ÖÐÊܵ½Ó°Ïì £¬£¬£¬£¬£¬£¬£¬µ«Ðí´ó¶¼¾Ý¿âÐèÒªÖØÐÞ¡£¡£¡£ ¡£¡£ÏÖÔÚFBI¡¢ÁìÍÁÇå¾²²¿ºÍ±±¿¨ÂÞÀ´ÄÉÖÝÕþ¸®ÒѽéÈëÊӲ졣¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/feds-investigate-after-hackers-attack-water-utility

5¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼ÄÜÔ´¹«Ë¾µÄÐÂAPT×éÖ¯GreyEnergy

welcome-°ÙÀÖ²©


ESETÑо¿ÍŶӷ¢Ã÷Ò»¸öеÄAPT×éÖ¯GreyEnergy £¬£¬£¬£¬£¬£¬£¬¸ÃAPT×éÖ¯±»ÒÔΪÊÇBlackEnergyµÄ¼ÌÐøÕß¡£¡£¡£ ¡£¡£ÔÚÒÑÍùÈýÄêÄÚ £¬£¬£¬£¬£¬£¬£¬GreyEnergyÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼µÄÄÜÔ´¹«Ë¾µÈ¸ß¼ÛֵĿµÄ¡£¡£¡£ ¡£¡£GreyEnergyµÄ¶ñÒâÈí¼þ¿ò¼ÜÓëBlackEnergy¾ßÓÐÐí¶àÏàËÆÖ®´¦¡£¡£¡£ ¡£¡£Ñо¿Ö°Ô±²¢Ã»ÓÐÊӲ쵽רÃÅÕë¶ÔICSµÄ¶ñÒâÈí¼þÄ£¿£¿£¿£¿£¿£¿£¿é £¬£¬£¬£¬£¬£¬£¬µ«GreyEnergyµÄ¹¥»÷Õ½ÂÔÒ»Ö±ÊÇÕë¶ÔÒªº¦»ù´¡ÉèÊ©ÖеÄSCADAÊÂÇéÕ¾ºÍЧÀÍÆ÷µÈ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/


ÉùÃ÷£º±¾×ÊѶÓɰÙÀÖ²©Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí