Ñо¿Ö°Ô±Åû¶TCP/IPÖÐͳ³ÆÎªINFRA:HALTµÄ14¸öÎó²î£»£»£»£»Òâ´óÀûÀ­Æë°Â´óÇøÑ¬È¾ÀÕË÷Èí¼þRansomEXXÍøÂçÖÐÖ¹

Ðû²¼Ê±¼ä 2021-08-05
1.Ñо¿Ö°Ô±Åû¶TCP/IPÖÐͳ³ÆÎªINFRA:HALTµÄ14¸öÎó²î


1.jpg


Ñо¿Ö°Ô±Åû¶ÁËÔÚNicheStack TCP/IP¿ÍÕ»Öз¢Ã÷µÄͳ³ÆÎªINFRA:HALTµÄ14¸öÇå¾²Îó²î£¬£¬£¬£¬Ó°ÏìÁËÁè¼Ý200¼Ò¹©Ó¦ÉÌÖÆÔìµÄOT×°±¸¡£¡£¡£¡£¡£ÕâЩÎó²î¿ÉÒÔµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС¢¾Ü¾øÐ§ÀÍ (DoS)ºÍÐÅϢй¶¡¢TCPÓÕÆ­ºÍDNS»º´æÖж¾¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îΪCVE-2020-25928ºÍCVE-2020-31226£¬£¬£¬£¬ÆÀ·Ö»®·ÖΪ9.8ºÍ9.1£¬£¬£¬£¬Ó°ÏìÁË¿ÍÕ»µÄDNS¿Í»§¶ËºÍHTTPЧÀÍÆ÷×é¼þ£¬£¬£¬£¬¿ÉÓÃÀ´ÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐдúÂë²¢ÍêÈ«¿ØÖÆËü¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/08/critical-flaws-affect-embedded-tcpip.html


2.GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´AndroidÖеÄ30¶à¸öÎó²î


2.jpg


GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÁËAndroidÖеÄ30¶à¸öÎó²î¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îÊÇýÌå¿ò¼ÜÖеÄCVE-2021-0519£¬£¬£¬£¬¿ÉÓÃÀ´ÔÚAndroid 8.1ºÍ9°æ±¾µÄ×°±¸ÉÏÌáȨ£¬£¬£¬£¬»òµ¼ÖÂAndroid 10ºÍ11ÉϵÄÐÅϢй¶¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬´Ë´Î¸üл¹»¹ÐÞ¸´Á˸ßͨ×é¼þºÍ¸ßͨ±ÕÔ´×é¼þÖжà¸öÑÏÖØµÄÎó²î£¬£¬£¬£¬°üÀ¨CVE-2021-1972¡¢CVE-2021-1976¡¢CVE-2021-1916ºÍCVE-2021-1919µÈÎó²î¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/google-patches-high-risk-android-security-flaws


3.Òâ´óÀûÀ­Æë°Â´óÇøÑ¬È¾ÀÕË÷Èí¼þRansomEXXÍøÂçÖÐÖ¹


3.jpg


ÉÏÖÜÈÕÇåÔ磬£¬£¬£¬Òâ´óÀûÀ­Æë°Â´óÇøÔâµ½ÀÕË÷Èí¼þRansomEXX¹¥»÷¡£¡£¡£¡£¡£¹¥»÷Õß¼ÓÃÜÁËÆäÊý¾ÝÖÐÐĵÄËùÓÐÎļþ²¢ÖÐÖ¹ÁËITÍøÂ磬£¬£¬£¬»¹Ó°ÏìÁËÆäCOVID-19ÒßÃç½ÓÖÖ¹ÒºÅÍøÕ¾¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇË­ÒÔ¼°ËûÃǵÄÄ¿µÄÊÇʲô£¬£¬£¬£¬Í¨³£ÀÕË÷ÍÅ»ï»áÔÚ¹¥»÷ʱ´úÇÔÈ¡Êý¾Ý×÷ΪÀÕË÷µÄ³ïÂ룬£¬£¬£¬µ«¸ÃµØÇøµÄ¿µ½¡¡¢²ÆÎñºÍÔ¤ËãÊý¾Ý¶¼ÊÇÇå¾²µÄ¡£¡£¡£¡£¡£ÐÂÎÅÈËÊ¿³Æ´Ë´Î¹¥»÷À´×ÔRansomEXX£¬£¬£¬£¬ÓÉÓÚÊê½ð¼Í¼ÖÐÓÃÀ´ÓëºÚ¿Í̸ÅеİµÍøÁ´½ÓÊǸÃÍÅ»ïµÄTorÍøÕ¾£»£»£»£»µ«Ñо¿Ö°Ô±JAMESWT³Æ£¬£¬£¬£¬Òâ´óÀûÓÐÖ¤¾ÝÅú×¢¹¥»÷ÊÇÓÉLockBit 2.0¾ÙÐеÄ£¬£¬£¬£¬ÏÖÔÚÎÞ·¨·ÖÏí¸ü¶àÐÅÏ¢¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ransomware-attack-hits-italys-lazio-region-affects-covid-19-site/


4.ÃÀ¹ú·çͶ¹«Ë¾ATV³ÆÆäѬȾÀÕË÷Èí¼þй¶¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢


4.jpg


ÃÀ¹úΣº¦Í¶×ʹ«Ë¾Advanced Technology Ventures£¨ATV£©³ÆÆäÔâµ½ÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£ATV³Æ£¬£¬£¬£¬2021Äê7ÔÂ9ÈÕ£¬£¬£¬£¬¸Ã¹«Ë¾´ÓÆäµÚÈý·½¹©Ó¦ÉÌ´¦»ñϤ£¬£¬£¬£¬¹«Ë¾´æ´¢²ÆÎñ±¨¸æÐÅÏ¢µÄÁ½Ì¨Ð§ÀÍÆ÷Ôâµ½ÁËÀÕË÷¹¥»÷ÇÒÊý¾Ý±»¼ÓÃÜ¡£¡£¡£¡£¡£7ÔÂ26ÈÕ£¬£¬£¬£¬¸Ã¹«Ë¾È·¶¨ÕâЩÊý¾ÝÔâµ½ÁËδ¾­ÊÚȨµÄ»á¼ûºÍй¶¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬´Ë´Î¹¥»÷»¹Ð¹Â¶Á˲¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÉç»áÇå¾²ºÅÂëµÈ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/120816/data-breach/advanced-technology-ventures-ransomware-attack.html


5.½üÆÚLemonDuckµÄhands-on-keyboard¹¥»÷»î¶¯ÔöÌí


5.jpg


Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬½üÆÚLemonDuckµÄhands-on-keyboard¹¥»÷»î¶¯ÔöÌí¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÓÚ2019ÄêÉϰëÄêÓÉÒÔÉ«ÁÐÇå¾²¹«Ë¾GuardicoreÊ״η¢Ã÷¡£¡£¡£¡£¡£ÔÚÒÑÍùµÄÁ½ÄêÀ£¬£¬£¬Ò»¾­ºÜСµÄÍÚ¿ó¶ñÒâÈí¼þÒѾ­ÑÝÄð³ÉÒ»¸öÖØ´óµÄ½©Ê¬ÍøÂ磬£¬£¬£¬²¢ÇÒ½üÆÚÕýÔÚʵÑéͨ¹ýÊÖ¶¯¹¥»÷±»ÈëÇÖµÄÍøÂ磬£¬£¬£¬Ñо¿Ö°Ô±³ÆÕâÊÇÒ»¸öΣÏÕµÄת±ä¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Î¢Èí»¹×¢ÖØµ½£¬£¬£¬£¬¸ÃÍÅ»ï×îÏÈÔÚËûÃÇÈëÇÖµÄϵͳÉÏ×°ÖÃÆäËû¶ñÒâÈí¼þ£¬£¬£¬£¬ÈçRamnitµÈ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/lemonduck-botnet-evolves-to-allow-hands-on-keyboard-intrusions/


6.ÃÀ¹úNSAºÍCISAÁªºÏÐû²¼ÓйØKubernetes¼Ó¹ÌµÄÖ¸ÄÏ


6.jpg


ÃÀ¹úNSAºÍCISAÁªºÏÐû²¼ÁËÓйØKubernetes¼Ó¹ÌµÄÖ¸ÄÏ¡£¡£¡£¡£¡£KubernetesÊÇÒ»ÖÖ¿ªÔ´ÈÝÆ÷±àÅÅϵͳ£¬£¬£¬£¬ÓÃÓÚ×Ô¶¯°²ÅÅ¡¢À©Õ¹ºÍÖÎÀíÈÝÆ÷»¯Ó¦ÓóÌÐò¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏΪϵͳÖÎÀíÔ±Ìṩһ¸öÇå¾²»ù×¼£¬£¬£¬£¬ÓÃÀ´¶ÔKubernetes¾ÙÐÐÉèÖÃÒÔµÖÓùÖÖÖÖÀàÐ͵Ĺ¥»÷¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ö¸ÄÏ»¹ÏêϸÏÈÈÝÁ˹«Ë¾ºÍÕþ¸®»ú¹¹¿ÉÒÔʵÑéµÄ»ù±¾»º½â²½·¥£¬£¬£¬£¬°üÀ¨£ºÉ¨ÃèÈÝÆ÷ºÍPodÒÔÈ·ÈÏÊÇ·ñ±£´æÎó²î»ò¹ýʧÉèÖ㻣»£»£»ÒÔ¾¡¿ÉÄÜÉÙµÄȨÏÞÔËÐÐÈÝÆ÷ºÍPod£»£»£»£»Ê¹ÓÃÈÕÖ¾ÉóºËµÈ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/08/02/cisa-and-nsa-release-kubernetes-hardening-guidance