ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ42ÖÜ
Ðû²¼Ê±¼ä 2018-10-22Ò»¡¢±¾ÖÜÇ徲̬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹ú·À²¿£¨Îå½Ç´óÂ¥£©Ô¼3ÍòÃûÔ±¹¤µÄÂÃÐмÍ¼й¶£»ÎÚ¿ËÀ¼Õþ¸®»ú¹¹ÔÙÔâAPT×éÖ¯BlackEnergyÏ®»÷£»Áè¼Ý3500ÍòÃÀ¹úÑ¡ÃñµÄ¼Í¼ÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ£»±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳÔâÀÕË÷Èí¼þ¹¥»÷£¬FBIÒѽéÈëÊӲ죻Ñо¿ÍŶӷ¢Ã÷Õë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼ÄÜÔ´¹«Ë¾µÄÐÂAPT×éÖ¯GreyEnergy¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1. Libssh CVE-2018-10933·þÎñÆ÷Éí·ÝÑéÖ¤ÈƹýÎó²î
Libsshͨ¹ýÏò·þÎñÆ÷ÌṩSSH2_MSG_USERAUTH_SUCCESSÐÂÎÅÀ´È¡´ú·þÎñÆ÷Õý³£ÆôÆôº½·ÝÑéÖ¤µÄSSH2_MSG_USERAUTH_REQUESTÐÂÎÅʱ±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÎÞÐèÑé֤δÊÚȨ»á¼û¡£
2. Pivotal Spring Security OAuthȨÏÞÌáÉýÎó²î
Pivotal Spring Security OAuth±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÌáÉýȨÏÞ¡£
https://pivotal.io/security/cve-2018-157583. Dell EMC Secure Remote ServicesȨÏÞÌáÉýÎó²î
Dell EMC Secure Remote Services°üÀ¨¶à¸ö¾ßÓÐÈ«¾Ö¿É¶ÁȨÏÞµÄÉèÖÃÎļþ£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÌáÉýȨÏÞ¡£
4. Opto 22 PAC Control CVE-2018-14807»º³åÇøÒç³öÎó²î
Opto 22 PAC Control±£´æ»º³åÇøÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓóÌÐò»òÖ´ÐÐí§Òâ´úÂë¡£
5. HPE Intelligent Management Center PLAT´úÂëÖ´ÐÐÎó²î
HPE Intelligent Management Center PLAT±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§Òâ´úÂë¡£
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö

ÃÀ¹ú¹ú·À²¿£¨Îå½Ç´óÂ¥£©µÄ²¿·Ö¾ü·½ºÍÎÄÖ°Ö°Ô±µÄСÎÒ˽¼ÒÐÅÏ¢ºÍÐÅÓÿ¨Êý¾Ýй¶£¬Ô¼3ÍòÈËÊܵ½Ó°Ïì¡£ÕâÒ»Êý¾Ýй¶ÊÂÎñ¿ÉÄܱ¬·¢ÔÚ¼¸¸öÔÂÇ°£¬µ«Ö±µ½×î½ü²Å±»·¢Ã÷¡£¸ÃÊÂÎñÉæ¼°µ½Ò»¼ÒΪ¹ú·À²¿Ìṩ·þÎñµÄµÚÈý·½¹©Ó¦ÉÌ£¬ÏÖÔڸù©Ó¦É̵ÄÉí·ÝÈÔÈ»²»Ã÷È·¡£ÕâÒ»ÊÂÎñÈÔÈ»ÔÚ½øÒ»²½µÄÊÓ²ìÖ®ÖУ¬µ«Ã»ÓÐÈκÎÉñÃØÐÅÏ¢Ô⵽й¶¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/77097/data-breach/pentagon-travel-records-data-breach.html
2¡¢ÎÚ¿ËÀ¼Õþ¸®»ú¹¹ÔÙÔâAPT×éÖ¯BlackEnergyÏ®»÷

ÎÚ¿ËÀ¼Çå¾²¾Ö£¨SBU£©ÌåÏÖ×î½ü¶íÂÞ˹APT×éÖ¯BlackEnergyÔÙ´ÎÕë¶ÔÎÚ¿ËÀ¼Õþ¸®»ú¹¹µÄÐÅϢϵͳºÍµçÐÅϵͳÌᳫ¹¥»÷¡£SBUר¼ÒÖ¸³ö£¬¹¥»÷ÕßʹÓÃÁËеĶñÒâÈí¼þ£¬Æ书Ч°üÀ¨Ô¶³ÌÖÎÀí²Ù×÷ϵͳÒÔ¼°Îļþ¸´ÖÆ¡¢¼à¿ØÓû§ÐÐΪºÍ×èµ²ÃÜÂëµÈ¡£Æ¾Ö¤SBUºÍÒ»¸öÇå¾²³§É̵ÄÊӲ죬¹¥»÷ÖÐÉæ¼°µ½µÄ¶ñÒâÈí¼þÊÇIndustroyerºóÃŵÄбäÌå¡£±ðµÄ£¬SBU»¹·¢Ã÷ÁËÊôÓÚ¸ÃAPT×éÖ¯µÄ¶ÀÍ̹¤¾ß¡£
ÔÎÄÁ´½Ó£º
https://www.ukrinform.net/rubric-crime/2557323-russian-hackers-mount-cyberattack-on-ukraines-state-bodies.html
3¡¢Áè¼Ý3500ÍòÃÀ¹úÑ¡ÃñµÄ¼Í¼ÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ

±¾ÖÜÒ»Anomali LabsºÍIntel 471µÄÑо¿Ö°Ô±ÔÚ°µÍøÂÛ̳ÉÏ·¢Ã÷Ò»¸ö°üÀ¨´ó×ÚÑ¡ÃñÊý¾ÝµÄÊý¾Ý¿âÕýÔÚ³öÊÛ¡£¸ÃÊý¾Ý¿â°üÀ¨À´×Ô19¸öÖݵĶà´ï3500ÍòÌõÑ¡Ãñ¼Í¼¡£ÕâЩ¼Í¼°üÀ¨ÐÕÃû¡¢µç»°ºÅÂ롢סַ¡¢Í¶Æ±ÀúÊ·ºÍÆäËüͶƱÊý¾ÝµÈ¡£Ñо¿Ö°Ô±¶Ô¸ÃÊý¾Ý¿âµÄÑù±¾¾ÙÐÐÁËÉó²é£¬È·ÈÏÕâЩÊý¾ÝÓÐÓò¢ÇÒ¸ÃÊý¾Ý¿â¾ßÓи߶ȵĿÉÐŶȡ£¼øÓÚÃÀ¹ú2018ÄêµÄÖÐÆÚÑ¡¾Ù¼´½«µ½À´£¬ÕâЩ鶵ÄÊý¾Ý¿ÉÄܱ»¹¥»÷ÕßÓÃÀ´ÆÆËðÑ¡¾Ù»ò¾ÙÐÐÉí·Ý͵ÇԵȶñÒâÔ˶¯¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/up-to-35-million-2018-voter-records-for-sale-on-hacking-forum/138295/
4¡¢±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳÔâÀÕË÷Èí¼þ¹¥»÷£¬FBIÒѽéÈëÊÓ²ì

±¾ÖÜÒ»ONWASA£¨°ºË¹Â幩ˮºÍÎÛË®ÖÎÀí¾Ö£©Ðû²¼ÐÂÎųƣ¬±±¿¨ÂÞÀ´ÄÉÖÝË®ÎñϵͳµÄÄÚ²¿ÅÌËã»úϵͳ£¨°üÀ¨·þÎñÆ÷ºÍСÎÒ˽¼ÒµçÄÔ£©Ôâµ½ÀÕË÷Èí¼þEmotet¹¥»÷¡£ONWASAûÓÐÅû¶ÏêϸµÄÊê½ð½ð¶î¡£¸Ã¹¥»÷±¬·¢ÔÚ10ÔÂ4ÈÕ£¬ÇéÐÎËæºóÒÑ»ñµÃ¿ØÖÆ¡£ËäȻûÓпͻ§ÐÅÏ¢Ôڴ˴ι¥»÷ÖÐÊܵ½Ó°Ï죬µ«Ðí´ó¶¼¾Ý¿âÐèÒªÖØÐÞ¡£ÏÖÔÚFBI¡¢ÁìÍÁÇå¾²²¿ºÍ±±¿¨ÂÞÀ´ÄÉÖÝÕþ¸®ÒѽéÈëÊӲ졣
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/feds-investigate-after-hackers-attack-water-utility
5¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼ÄÜÔ´¹«Ë¾µÄÐÂAPT×éÖ¯GreyEnergy

ESETÑо¿ÍŶӷ¢Ã÷Ò»¸öеÄAPT×éÖ¯GreyEnergy£¬¸ÃAPT×éÖ¯±»ÒÔΪÊÇBlackEnergyµÄ¼ÌÐøÕß¡£ÔÚÒÑÍùÈýÄêÄÚ£¬GreyEnergyÖ÷ÒªÕë¶ÔÎÚ¿ËÀ¼ºÍ²¨À¼µÄÄÜÔ´¹«Ë¾µÈ¸ß¼ÛֵĿµÄ¡£GreyEnergyµÄ¶ñÒâÈí¼þ¿ò¼ÜÓëBlackEnergy¾ßÓÐÐí¶àÏàËÆÖ®´¦¡£Ñо¿Ö°Ô±²¢Ã»ÓÐÊӲ쵽רÃÅÕë¶ÔICSµÄ¶ñÒâÈí¼þÄ£¿é£¬µ«GreyEnergyµÄ¹¥»÷Õ½ÂÔÒ»Ö±ÊÇÕë¶ÔÒªº¦»ù´¡ÉèÊ©ÖеÄSCADAÊÂÇéÕ¾ºÍ·þÎñÆ÷µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.welivesecurity.com/2018/10/17/greyenergy-updated-arsenal-dangerous-threat-actors/
ÉùÃ÷£º±¾×ÊѶÓÉÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøάËûÃüÇ徲С×é·ÒëºÍÕûÀí