ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ49ÖÜ

°ä²¼¹¦·ò 2019-12-16

>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê12ÔÂ09ÈÕÖÁ15ÈÕ¹²ÊÕ¼°²È«·ì϶57¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Chrome WebAudio´úÂëÖ´Ðзì϶; CA Release Automation DataManagement·´ÐòÁл¯´úÂëÖ´Ðзì϶ £»Advantech DiagAnywhere ServerÎļþ´«Êä·þÎñÕ»Òç¶Âí½Å £»Micrsoft Windows Hyper-VÔ¶³Ì´úÂëÖ´Ðзì϶ £»Adobe AcrobatºÍReader CVE-2019-16445ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇĪ˹¿Æ³ÇÊÐ¼à¿ØÏµÍ³½Ó¼ûȨÏÞÔÚ°µÍøÏúÊÛ £»¿ÆÂÞÀ­¶àÖÝIT·þÎñÉÌCTSÔâµ½ÀÕË÷Èí¼þ¹¥»÷ £»ÀÕË÷Èí¼þSnatch¿Éͨ¹ý°²È«Ä£Ê½³ÁÆôÀ´Èƹýɱ¶¾Èí¼þ £»Î¢ÈíÖҸ淸×ïÍÅ»ïGALLIUM¹¥»÷È«ÇòµÄµçÐŹ«Ë¾ £»¶ñÒâÈí¼þKrampus-3PCÖØÒª¶Ô×¼iphoneÓû§¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


>³ÁÒª°²È«·ì϶Áбí


1. Google Chrome WebAudio´úÂëÖ´Ðзì϶


Google Chrome WebAudio´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÖ´ÐÐËÁÒâ´úÂ룬ĿǰÒѾ­ÔÚÒ°ÀûÓá£

https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_31.html


2. CA Release Automation DataManagement·´ÐòÁл¯´úÂëÖ´Ðзì϶


CA Release Automation DataManagement service´æÔÚ·´ÐòÁл¯·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://seclists.org/bugtraq/2019/Dec/16


3. Advantech DiagAnywhere ServerÎļþ´«Êä·þÎñÕ»Òç¶Âí½Å


Advantech DiagAnywhere ServerÎļþ´«Êä·þÎñ´æÔÚÕ»Òç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÖ´ÐÐËÁÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2019.4660/


4. Micrsoft Windows Hyper-VÔ¶³Ì´úÂëÖ´Ðзì϶


Micrsoft Windows Hyper-V´æÔÚδÃ÷°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÖ´ÐÐËÁÒâ´úÂë¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1471


5. Adobe AcrobatºÍReader CVE-2019-16445ÄÚ´æÃýÎóÒýÓôúÂëÖ´Ðзì϶


Adobe AcrobatºÍReader´¦ÖÃÄÚ´æ´æÔÚ¿ªÊͺóʹÓ÷ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÖ´ÐÐËÁÒâ´úÂë¡£

https://helpx.adobe.com/security/products/acrobat/apsb19-55.html


>³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢ÄªË¹¿Æ³ÇÊÐ¼à¿ØÏµÍ³½Ó¼ûȨÏÞÔÚ°µÍøÏúÊÛ


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


MBKh Mediaµ÷²é¼ÇÕßAndrey Kaganskikh·¢ÏÖĪ˹¿Æ³ÇÊÐ¼à¿ØÏµÍ³ºÍÃæ²¿¼ø±ðÊý¾ÝµÄ½Ó¼ûȨÏÞÔÚµØÏÂÂÛ̳ºÍ̸ÌìÊÒÖÐÏúÊÛ¡£Andrey°µÊ¾Âô·½ÊÇ·¨ÂÉÈËÔ±/µ±¾Ö¹ÙÔ±£¬Äܹ»µÇ¼Ī˹¿Æ³ÇÊмලϵͳµÄÊý¾Ý´¦Öúʹ洢¼¯³ÉÖÐÐÄ£¨YTKD£©¡£²É°ìÁËÉãÏñͷȨÏÞµÄÓû§½«»áÊÕµ½Ö¸Ïò³ÇÊÐCCTVϵͳµÄÒ»¸öÁ´½Ó£¬¸ÃÁ´½Ó¿É½Ó¼ûËùÓй«¹²ÉãÏñÍ·£¬Æä¿ÉÓù¦·òΪ5Ìì¡£´Ë±í£¬ÓµÓÐÎÞÏÞ½Ó¼ûȨÏ޵ĵǼʹ´¦¼ÛֵΪ30000¬²¼£¨470ÃÀÔª£©¡£µ÷²éÈËÔ±²âÊÔÁËÆäÕÕÆ¬£¬Âô·½·µ»ØÁË238ÕÅͼƬ£¬ÕâЩͼƬÀ´×Ô140̨ÉãÏñÍ·£¬»¹ÁгöÁË×½Äõ½µÄ¾ßÌ嵨ַºÍ¹¦·ò£¬µ«·µ»ØµÄÕÕÆ¬¶¼²»Êǵ÷²éÈËÔ±µÄ£¬Õâ¿ÉÄÜÓëÉãÏñÍ·µÄÊýÁ¿ºÍËã·¨ÓйØ£¬ÏµÍ³¶ÔÆäÃæ²¿ÌصãµÄÆÀ¹ÀÀàËÆ¶ÈΪ67%¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/moscow-cops-sell-access-to-city-cctv-facial-recognition-data/


2¡¢¿ÆÂÞÀ­¶àÖÝIT·þÎñÉÌCTSÔâµ½ÀÕË÷Èí¼þ¹¥»÷


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


¿ÆÂÞÀ­¶àÖÝIT·þÎñÉÌCTSÔâÀÕË÷Èí¼þ¹¥»÷£¬²¨¼°100¶à¼ÒÑÀ¿ÆÕïËù¡£CTSרΪÑÀ¿ÆÕïËùÌṩIT·þÎñ£¬Ô̺¬ÍøÂ簲ȫ¡¢Êý¾Ý±¸·ÝºÍIPÓïÒôµç»°µÈ¡£¸Ã¹«Ë¾ÓÚ11ÔÂ25ÈÕÔâµ½¹¥»÷£¬µ¼ÖÂ100¶à¼ÒÑÀ¿ÆÕïËùµÄÍÆËã»úϰȾÁËÀÕË÷Èí¼þSodinokibi¡£CTS»Ø¾øÁ˹¥»÷ÕßË÷Òª70ÍòÃÀÔªÊê½ðµÄÒªÇó£¬ÓÉÓÚϵͳ²»ÐÝÖжÏ£¬Ä¿Ç°ºÜ¶àÑÀ¿ÆÕïËùÒÀÈ»ÎÞ·¨Õý³£½»Òס£


Ô­ÎÄÁ´½Ó£º

https://krebsonsecurity.com/2019/12/ransomware-at-colorado-it-provider-affects-100-dental-offices/


3¡¢ÀÕË÷Èí¼þSnatch¿Éͨ¹ý°²È«Ä£Ê½³ÁÆôÀ´Èƹýɱ¶¾Èí¼þ


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ÀÕË÷Èí¼þSnatchÔÚʹÓÃÒ»ÖÖǰËùδ¼ûµÄ¼¼ÇÉÀ´Èƹýɱ¶¾Èí¼þ£¬¾ßÌåÀ´Ëµ£¬ËüÄܹ»½«Êܺ¦ÕßµÄÍÆËã»úÒÔ°²È«Ä£Ê½³ÁÐÂÆô¶¯£¬¶øºóÔËÐмÓÃܹý³Ì¡£´óÎÞÊýɱ¶¾Èí¼þ¶¼ÎÞ·¨ÔÚWindows°²È«Ä£Ê½ÏÂÆô¶¯£¬Òò¶øSnatchÄÑÒÔ±»¼ì²âµ½¡£Æ¾¾ÝSophos LabsµÄ»ã±¨£¬¸ÃÀÕË÷Èí¼þͨ¹ýWindows×¢²á±íÏîÔö³¤ÁËÒ»¸öÔÚ°²È«Ä£Ê½ÏÂÆô¶¯µÄ·þÎñ£¬¸Ã·þÎñ½«ÔËÐÐSnatch¡£×êÑÐÈËÔ±ÖÒ¸æ³ÆÕâÖÖģʽ¿ÉÄܻᱻÆäËüÀÕË÷Èí¼þËù·ÂÕÕ¡£Snatch×Ô2018ÄêÏļ¾ÒÔÀ´Ò»Ïò»îÔ¾£¬ÆäÖØÒª½øÐÐÕë¶ÔÐԵĹ¥»÷¡£Óë´óÎÞÊýÀÕË÷Èí¼þ·ÖÆç£¬Snatch»¹»áÇÔÈ¡ÊÜϰȾϵͳÉϵÄÎļþ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/snatch-ransomware-reboots-pcs-in-windows-safe-mode-to-bypass-antivirus-apps/


4¡¢Î¢ÈíÖҸ淸×ïÍÅ»ïGALLIUM¹¥»÷È«ÇòµÄµçÐŹ«Ë¾


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


΢ÈíÍþвµý±¨ÖÐÐÄ£¨MSTIC£©ÖҸ淸×ïÍÅ»ïGALLIUMÔÚÕë¶ÔÊÀ½ç¸÷µØµÄµçÕÛ·þÎñÉ̽øÐгÖÐø²»ÐݵĹ¥»÷¡£¸Ã·¸×ïÍÅ»ï½øÐÐÁ˶à¸ö¹¥»÷»î¶¯£¬MSTIC¹Û²ìµ½Õë¶Ô¶«ÄÏÑÇ¡¢Å·Ö޺ͷÇÖ޵ĵçÐÅÔËÓªÉ̵Ĺ¥»÷¡£GALLIUMÖØÒªÍ¨¹ýδ´ò²¹¶¡µÄWildFly/JBoss·þÎñÆ÷½øÐÐÈëÇÖ£¬Ò»µ©ÉøÈëµ½×éÖ¯µÄÍøÂçÖУ¬GALLIUM±ãÆðÍ·ÀûÓÃ×Ô½ç˵µÄ¶ñÒâÈí¼þÔÚÆóÒµÍøÂçÖкáÏòÒÆ¶¯ºÍÍøÂçÓòÍ´´¦¡£GALLIUM»¹Ê¹ÓÃSoftEther VPNÈí¼þÀ´¼ÓÇ¿¶ÔÖ¸±êÍøÂçµÄ½Ó¼ûºÍά³ÖÓÆ¾ÃÐÔ¡£Æ¾¾ÝMSTICµÄ»ã±¨£¬GALLIUMµÄTTPºÍ¸Ã×é֯ʹÓõIJ¿ÃÅÓòÓë2018ÄêµÄOperation SoftCellÒ»Ñù¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-warns-of-gallium-threat-group-attacking-global-telcos/


5¡¢¶ñÒâÈí¼þKrampus-3PCÖØÒª¶Ô×¼iphoneÓû§


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Ò»¸öÕë¶ÔiPhoneÓû§µÄ¶ñÒâ¸æ°×³Á¶¨Ïò»î¶¯ÒѾ­Ó°ÏìÁË100¶à¸ö³ö°æÉÌÍøÕ¾£¬ÆäÖÐÔ̺¬ÔÚÏß±¨Ö½ÍøÕ¾ºÍ¹ú¼ÊÿÖÜÐÂÎÅÔÓÖ¾ÍøÕ¾µÈ¡£Æ¾¾ÝDSOÍŶӵÄ˵·¨£¬¸Ã¶ñÒâÈí¼þKrampus-3PC¼Ù×°³ÉÔÓ»õµêµÄ³ê±ö¸æ°×£¬´ÓÓû§ÄÇÀïÊÕÍÅÔ²»°ºÍcookieÐÅÏ¢£¬²¢ÇÒÔÚÓû§µã»÷¸æ°×ʱ³Á¶¨ÏòÖÁÒ»¸öÍøÂçÓ×ÎÒÐÅÏ¢µÄÐéÎ±ÍøÕ¾¡£¹¥»÷ÕßÊ×ÏÈÔÚ¸æ°×ƽ̨AdtechstackÉÏͶ·Å¸æ°×£¬¶øºóÀûÓÃÆ½Ì¨µÄAPI²åÈë¶ñÒâ´úÂ룬ÕâЩ¶ñÒâ¸æ°×Ëæºó±»·Ö·¢¸ø´óÁ¿ÍøÕ¾¡£Krampus-3PC»á½«ÍøÂçµ½µÄÓû§ÐÅÏ¢·¢ËÍÖÁC2ÓòÃûboostsea2[.]com¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßµÄÉí·Ý¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/krampus-3pc-malware-iphone-users/151043/