ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ21ÖÜ
Ðû²¼Ê±¼ä 2018-05-28
Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2018Äê05ÔÂ21ÈÕÖÁ27ÈÕ¹²ÊÕ¼Çå¾²Îó²î47¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇGNU glibcÍâµØ»º³åÇøÒç³öÎó²î£»£»£»£»Foxit Reader U3DͼÐζà¸öí§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»Trend Micro Email Encryption GatewayÏÂÁî×¢ÈëÎó²î£»£»£»£»Intel¶à¸öCPUÓ²¼þCVE-2018-3640ÐÅϢй¶Îó²î£»£»£»£»D-Link DIR-550AºÍDIR-604MÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿ÍŶӷ¢Ã÷ʹÓÃGoogle PlayºÍFackbookµÄAPT¹¥»÷»î¶¯RedDawn£»£»£»£»Ñо¿ÍŶӷ¢Ã÷·¸·¨ÍÅ»ïChryseneÕë¶ÔÖж«ºÍÓ¢¹úICSÍøÂçµÄ¹¥»÷»î¶¯£»£»£»£»Ñо¿Ö°Ô±·¢Ã÷½©Ê¬ÍøÂçBrain FoodÔÚÒ»ÖÜÄÚѬȾԼ2400¸öÍøÕ¾£»£»£»£»Çå¾²Ñо¿Ö°Ô±·¢Ã÷D-Link DIR-620·ÓÉÆ÷Öб£´æºóÃÅÕË»§£»£»£»£»Ñо¿ÍŶӷ¢Ã÷Õë¶Ô°Í»ù˹̹µÄAPT×éÖ¯ConfuciusÓëPatchwork±£´æ¹ØÁª¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1¡¢GNU glibcÍâµØ»º³åÇøÒç³öÎó²î
GNU C Library mempcpyº¯ÊýÔÚAVX-512-optimizedʵÏÖÖб£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþ£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⡣¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://sourceware.org/bugzilla/show_bug.cgi?id=23196
2¡¢Foxit Reader U3DͼÐζà¸öí§Òâ´úÂëÖ´ÐÐÎó²î
Foxit Reader´¦Öóͷ£PDFÖеÄU3DͼÐα£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþ£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://srcincite.io/advisories/src-2018-0016/
3¡¢Trend Micro Email Encryption GatewayÏÂÁî×¢ÈëÎó²î
Trend Micro Encryption for Email LauncherServer±£´æÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://www.zerodayinitiative.com/advisories/ZDI-18-416/
4¡¢Intel¶à¸öCPUÓ²¼þCVE-2018-3640ÐÅϢй¶Îó²î
Intel CPUÈôʹÓÃÍÆ²âÖ´ÐÐÇÒÖ´ÐÐÍÆ²â¶Áȡϵͳ¼Ä´æÆ÷µÄÇéÐÎϱ£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îͨ¹ý²àÐŵÀÆÊÎö»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://www.kb.cert.org/vuls/id/180049
5¡¢D-Link DIR-550AºÍDIR-604MÔ¶³Ì´úÂëÖ´ÐÐÎó²î
D-Link DIR-550AºÍDIR-604M´¦Öóͷ£Î±ÔìHTTPÇëÇó±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐвÙ×÷ϵͳÏÂÁî¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£ºhttps://fortiguard.com/zeroday/FG-VD-18-060
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃGoogle PlayºÍFackbookµÄAPT¹¥»÷»î¶¯RedDawn

Ñо¿Ö°Ô±·¢Ã÷Õë¶Ô³¯ÏÊDZÌÓÕßµÄÒ»ÏîÖØ´óµÄÌØ¹¤»î¶¯¡£¡£¡£¡£¸ÃAPT×éÖ¯±»³ÆÎªSun Team£¬£¬£¬£¬Ö÷ҪʹÓÃGoogle PlayºÍFacebook×÷Ϊ¹¥»÷ǰÑÔ£¬£¬£¬£¬ËüÏÔʾÁËÒÆ¶¯ÍþвÐÎÊÆÉú³¤µÄËÙÂÊÓжà¿ì£¬£¬£¬£¬ÓÉÓÚ¸ÃAPT½«Õ½ÂÔ×ªÒÆµ½×¨×¢Óڴ˲¿·Ö¡£¡£¡£¡£¾ÝÊÓ²ìËüµÄÑо¿Ö°Ô±³Æ£¬£¬£¬£¬ËüÔÚGoogle PlayÖÐÐû²¼ÁËÈý¸ö¡°Î´Ðû²¼¡±µÄ²âÊÔ°æÓ¦ÓóÌÐò£¬£¬£¬£¬ÆäÄ¿µÄÊǽ²º«ÓïµÄÓû§¡£¡£¡£¡£ËûÃÇαװ³ÉFood Ingredients Info¡¢ast AppLockºÍAppLockFree¡£¡£¡£¡£Food Ingredients InfoºÍFast AppLockÓÃÓÚ͵͵ÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬ÈçÁªÏµÈË¡¢ÐÅÏ¢¡¢Í¨»°Â¼ÒôºÍÕÕÆ¬£¬£¬£¬£¬²¢ÇÒ»¹Äܹ»´ÓC2ЧÀÍÆ÷ÎüÊÕÏÂÁîºÍÆäËû¿ÉÖ´ÐÐÎļþ£¨.dex£©£¬£¬£¬£¬AppLockFreeËÆºõÊÇÕì̽ÊÂÇéµÄÒ»²¿·Ö£¬£¬£¬£¬ÎªÎ´À´µÄÒ»ÂÖ¹¥»÷µÓÚ¨»ù´¡¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/reddawn-espionage-campaign-shows-mobile-apts-on-the-rise/132081/
2¡¢Ñо¿ÍŶӷ¢Ã÷·¸·¨ÍÅ»ïChryseneÕë¶ÔÖж«ºÍÓ¢¹úICSÍøÂçµÄ¹¥»÷»î¶¯

Ñо¿ÍŶӷ¢Ã÷·¸·¨ÍÅ»ïChryseneÒ»Ö±ÒÔÀ´¶¼Õë¶ÔÖж«ºÍÓ¢¹ú×éÖ¯µÄ¹¤ÒµÍøÂç¡£¡£¡£¡£¹¤ÒµÍøÂçÇå¾²¹«Ë¾Dragos³ÆÆäΪ¡°Chrysene¡±£¬£¬£¬£¬¸ÃÍÅ»ïÓëOilRigºÍGreenbugÓйأ¬£¬£¬£¬Ö÷Òª¼¯ÖÐÔÚ°¢À²®º£ÍåµØÇø£¬£¬£¬£¬²¢ÇÒ¼ÓÈëÁËShamoonºÍShamoon 2¹¥»÷¡£¡£¡£¡£Æ¾Ö¤DragosµÄ˵·¨£¬£¬£¬£¬Chrysene´Ó֮ǰµÄOilRigºÍGreenbugµÄÌØ¹¤»î¶¯ÑÝ±ä¶øÀ´£¬£¬£¬£¬ËûÃǵŤ¾ß¡¢ÊÖÒպͳÌÐòÖØµþ£¬£¬£¬£¬µ«ÓëÕâЩÆäËûÕûÌåÏà±È£¬£¬£¬£¬ChryseneÔÚÊÖÒÕÄÜÁ¦·½ÃæÓÐ×ÅÏÔ×ŵÄǰ½ø¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/chrysene-group-targets-ics-networks-middle-east-uk
3¡¢Ñо¿Ö°Ô±·¢Ã÷½©Ê¬ÍøÂçBrain FoodÔÚÒ»ÖÜÄÚѬȾԼ2400¸öÍøÕ¾

½©Ê¬ÍøÂçBrain Foodͨ¹ý¶ñÒâPHP¾ç±¾Ñ¬È¾Õýµ±ÍøÕ¾£¬£¬£¬£¬²¢Ðû²¼Ã°³ä¼õ·ÊÒ©ºÍ²¹ÄÔÒ©µÄ¹ã¸æ¡£¡£¡£¡£ProofpointÑо¿Ö°Ô±³Æ¸Ã½©Ê¬ÍøÂçÒѾѬȾÁËÔ¼5000¸öÍøÕ¾£¬£¬£¬£¬ÓòÃûÍйÜЧÀÍÉÌGoDaddyÊܵ½µÄÓ°Ïì×î´ó£¬£¬£¬£¬Ô¼Õ¼5000¸öÍøÕ¾µÄ40%£¬£¬£¬£¬Æä´ÎÒÀÐòÊÇDreamHost¡¢UnitedLayerºÍCyrusOne¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/malicious-php-script-infects-2400-websites-in-the-past-week/132161/
4¡¢Çå¾²Ñо¿Ö°Ô±·¢Ã÷D-Link DIR-620·ÓÉÆ÷Öб£´æºóÃÅÕË»§

¿¨°Í˹»ùʵÑéÊÒµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷D-Link DIR-620·ÓÉÆ÷¹Ì¼þÖб£´æÒ»¸öºóÃÅÕË»§£¨CVE-2018-6213£©£¬£¬£¬£¬¿Éµ¼Ö¹¥»÷Õßͨ¹ý»¥ÁªÍø½ÓÊܸÃ×°±¸¡£¡£¡£¡£³öÓÚÇ徲˼Á¿Ñо¿Ö°Ô±Ã»ÓÐÅû¶¸ÃºóÃÅÕË»§µÄÓû§ÃûºÍÃÜÂ룬£¬£¬£¬Ñо¿Ö°Ô±ÌåÏÖ×°±¸ËùÓÐÕßÎÞ·¨½ûÓøúóÃÅÕË»§¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers/
5¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶Ô°Í»ù˹̹µÄAPT×éÖ¯ConfuciusÓëPatchwork±£´æ¹ØÁª

Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷APT×éÖ¯ConfuciusÕë¶Ô°Í»ù˹̹µÄй¥»÷»î¶¯£¬£¬£¬£¬¸Ã»î¶¯Í¨¹ý2¸öеÄÍøÕ¾ºÍÓÐÓúÉÔØ¹¥»÷Ä¿µÄ£¬£¬£¬£¬°üÀ¨Android¶ñÒâÓ¦ÓÃFuddi DuniyaÒÔ¼°Ò»¸ö¶ñÒâ̸ÌìÓ¦Óᣡ£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ConfuciusºÍPatchworkʹÓõĶñÒâÈí¼þÖаüÀ¨¸ü¶àµÄ¹²Ïí´úÂë¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/confucius-update-new-tools-and-techniques-further-connections-with-patchwork/