Ñо¿Ö°Ô±·¢Ã÷ÃÀ¹úÎå¼ÒµçÐŹ«Ë¾Ò×ÊÜSIM¿¨½»Á÷¹¥»÷£»£»£»£»£»£»Ë¼¿ÆTalosÅû¶ÎļþϵͳÖÎÀí¹¤¾ßE2fsprogsÖеÄRCEÎó²î

Ðû²¼Ê±¼ä 2020-01-13


1.Ñо¿Ö°Ô±·¢Ã÷ÃÀ¹úÎå¼ÒµçÐŹ«Ë¾Ò×ÊÜSIM¿¨½»Á÷¹¥»÷


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÆÕÁÖ˹¶Ù´óѧ½ÒÏþµÄÒ»ÏîѧÊõÑо¿Åú×¢£¬£¬£¬£¬£¬ £¬£¬ÃÀ¹úÎå¼ÒÖ÷ÒªµÄÔ¤¸¶·ÑÎÞÏßÔËÓªÉÌÈÝÒ×Êܵ½SIM¿¨½»Á÷¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿ÍŶӵÄ˵·¨£¬£¬£¬£¬£¬ £¬£¬ÕâÎå¼ÒÔËÓªÉÌ»®·ÖÊÇAT£¦T¡¢T-Mobile¡¢Tracfone¡¢US MobileºÍVerizon Wireless¡£¡£¡£¡£¡£¡£¡£¡£SIM¿¨½»Á÷¹¥»÷ÊÇÖ¸¹¥»÷ÕßÖµçÔËÓªÉ̿ͷþ²¢ÓÕÆ­µçÐŹ«Ë¾Ô±¹¤½«Êܺ¦Õߵĵ绰ºÅÂë¸ü¸ÄΪ¹¥»÷Õß¿ØÖƵÄSIM¿¨¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ¹¥»÷Õß¿ÉÄÜͨ¹ýÓÕÆ­Êܺ¦Õß²¦´òÌØ¶¨µÄµç»°ºÅÂ뱬·¢Í¨»°¼Í¼£¬£¬£¬£¬£¬ £¬£¬È»ºóʹÓÃÕâЩͨ»°¼Í¼À´ÑéÖ¤Éí·Ý²¢ÇëÇóÌæ»»SIM¿¨¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹ÆÊÎöÁË140¸öÖ÷ÒªµÄÔÚÏßЧÀÍ£¨¹æÄ£´ÓÉ罻ýÌåµ½ÓʼþЧÀÍÉÌ¡¢¼ÓÃÜÇ®±ÒÉúÒâÕ¾µãºÍÆóÒµ½â¾ö¼Æ»®µÈ£©£¬£¬£¬£¬£¬ £¬£¬·¢Ã÷ÔÚ17¸öÕ¾µãÉÏ£¬£¬£¬£¬£¬ £¬£¬Ò»µ©¹¥»÷ÕßÐ®ÖÆÁËÓû§µÄµç»°ºÅÂ룬£¬£¬£¬£¬ £¬£¬ËüÃǾͿÉÒÔÖØÖÃÕË»§µÄÃÜÂë²¢»ñµÃÓû§ÕË»§µÄÍêÈ«»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£¡£


  Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/academic-research-finds-five-us-telcos-vulnerable-to-sim-swapping-attacks/


2.ÀÕË÷Èí¼þSodinokibiÊ×´ÎÐû²¼ÍµÈ¡µÄÔ¼337MBÊý¾Ý


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÓÉÓÚÊܺ¦Õßδʵʱ֧¸¶Êê½ð£¬£¬£¬£¬£¬ £¬£¬ÀÕË÷Èí¼þSodinokibi±³ºóµÄ¹¥»÷ÕßÊ×´ÎÐû²¼ÁË´ÓÒ»ÃûÊܺ¦ÕßÄÇÀïÇÔÈ¡µÄÎļþ¡£¡£¡£¡£¡£¡£¡£¡£×ÔÉϸöÔÂÒÔÀ´£¬£¬£¬£¬£¬ £¬£¬Sodinokibi¹ûÕæÌåÏÖ½«Ð§·ÂÀÕË÷Èí¼þMaze£¬£¬£¬£¬£¬ £¬£¬ÔÚÊܺ¦Õß²»Ö§¸¶Êê½ðʱ¾ÍÐû²¼´ÓÊܺ¦ÕßÄÇÀïÇÔÈ¡µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£1ÔÂ11ÈÕSodinokibi¹¥»÷ÕßÔÚÒ»¸ö¶íÂÞ˹ºÚ¿ÍÂÛ̳ÉÏÐû²¼ÁËÔ¼337MBÎļþµÄÁ´½Ó£¬£¬£¬£¬£¬ £¬£¬¾Ý³ÆÕâЩÊý¾ÝÊôÓÚÃÀ¹úITÖ°Ô±ÉèÖù«Ë¾Artech¡£¡£¡£¡£¡£¡£¡£¡£Sodinokibi¹¥»÷Õß»¹ÌåÏÖÈôÊDz»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬ £¬£¬ËûÃǽ«Ðû²¼¸ü¶à±»µÁÎļþ£¬£¬£¬£¬£¬ £¬£¬°üÀ¨¹«Ë¾µÄ²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚArtech¹ÙÍøÒѹرÕ£¬£¬£¬£¬£¬ £¬£¬µ«²»ÇåÎúÊÇ·ñÓë´ËÊÂÓйØ£¬£¬£¬£¬£¬ £¬£¬Artech²¢Î´¶Ô´Ë×÷³öÏà¹ØÌ¸ÂÛ¡£¡£¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/sodinokibi-ransomware-publishes-stolen-data-for-the-first-time/


3.±öϦ·¨ÄáÑÇÖÝÆ¥×ȱ¤ÁªºÏÑ§ÇøÔâµ½ÀÕË÷Èí¼þ¹¥»÷


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


±öϦ·¨ÄáÑÇÖÝÆ¥×ȱ¤ÁªºÏÑ§ÇøÔÚÐÂÄê¼ÙÆÚʱ´úÔâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬ £¬£¬µ¼ÖÂѧУµÄ»¥ÁªÍøÐ§ÀÍÆ÷ºÍµç×ÓÓʼþϵͳ±»ÆÆË𣬣¬£¬£¬£¬ £¬£¬Ñ§ÉúÎÞ·¨Ê¹ÓÃÌõ¼Ç±¾µçÄԺͻ¥ÁªÍøÉϿΡ£¡£¡£¡£¡£¡£¡£¡£Æ¥×ȱ¤ÁªºÏÑ§ÇøÈÏÕæÈËÕäÄÝÌØ¡¤Êæ¶û´Ä£¨Janet Schulze£©ÌåÏÖѧУÈÔÈ»¿ÉÒÔ»á¼ûѧÉúµÄÐÅÏ¢£¬£¬£¬£¬£¬ £¬£¬²¢Çҵ绰ϵͳ¿ÉÒÔÕý³£ÊÂÇ飬£¬£¬£¬£¬ £¬£¬µ«¸ÃÑ§ÇøµÄÍøÂçϵͳ̱»¾¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñûÓÐÔì³ÉСÎÒ˽¼ÒÐÅϢй¶£¬£¬£¬£¬£¬ £¬£¬²¢ÇÒ½Ìѧʱ¼ä±íÒÑÓÚÉÏÖܶþ»Ö¸´Õý³£¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÑ§ÇøÈÔÔÚÓëÍøÂçÇå¾²ÍŶÓÒ»Æð¶Ô´ËÊÂÎñ¾ÙÐÐÊӲ졣¡£¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cyberattack-pennsylvania-schools/


4.Ñо¿Ö°Ô±·¢Ã÷Ö÷ÒªÕë¶ÔÆóÒµµÄÐÂÀÕË÷Èí¼þAko


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±·¢Ã÷Ö÷ÒªÕë¶ÔÆóÒµÍøÂçµÄÐÂÀÕË÷Èí¼þAko£¬£¬£¬£¬£¬ £¬£¬Æ¾Ö¤KremezµÄÆÊÎö£¬£¬£¬£¬£¬ £¬£¬AkoÓëÀÕË÷Èí¼þMedusaLocker±£´æÏàËÆÖ®´¦£¬£¬£¬£¬£¬ £¬£¬ÕâÅú×¢AkoÊǸÃÍŶӵÄ×îÐÂÊÂÇé¡£¡£¡£¡£¡£¡£¡£¡£KremezÌåÏÖ£º¡°ÕâÊÇÕýÔÚ¿ª·¢µÄ°æ±¾ºÅΪ0.5µÄÐÂÀÕË÷Èí¼þ¼´Ð§ÀͲúÆ·£¬£¬£¬£¬£¬ £¬£¬ËƺõÊܵ½MedusaLockerÐÐΪµÄÆô·¢£¬£¬£¬£¬£¬ £¬£¬°üÀ¨ÆäÕë¶ÔÄ¿µÄºÍ¼ÓÃÜÀú³ÌÖеķ´WindowsÐÐΪºÍ×¢²á±íÓ³ÉäÇý¶¯Æ÷½ûÓᱡ£¡£¡£¡£¡£¡£¡£¡£¸üÔã¸âµÄÊÇ£¬£¬£¬£¬£¬ £¬£¬¸ÃÀÕË÷Èí¼þ»áÔÚ¼ÓÃÜ֮ǰÇÔÈ¡Óû§µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£Ako»áÔÚ¼ÓÃܵÄÎļþºó¸½¼ÓËæ»úµÄÀ©Õ¹Ãû£¬£¬£¬£¬£¬ £¬£¬²¢ÔÚÎļþÖÐÌí¼ÓCECAEFBE×ֶαê¼Ç¡£¡£¡£¡£¡£¡£¡£¡£AkoָʾÊܺ¦Õß»á¼ûhttp://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad[.]onionÒÔ»ñÈ¡Êê½ðÖ§¸¶ËµÃ÷¡£¡£¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ako-ransomware-another-day-another-infection-attacking-businesses/


5.˼¿ÆTalosÅû¶ÎļþϵͳÖÎÀí¹¤¾ßE2fsprogsÖеÄRCEÎó²î


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


˼¿ÆTalosÑо¿ÍŶÓÅû¶ÎļþϵͳÖÎÀí¹¤¾ßE2fsprogsÖеÄRCEÎó²î¡£¡£¡£¡£¡£¡£¡£¡£E2fsprogsÊÇÒ»×éÓÃÓÚÓëext2¡¢ext3ºÍext4Îļþϵͳ½»»¥µÄÊÊÓóÌÐò£¬£¬£¬£¬£¬ £¬£¬¸ÃÈí¼þ±»ÊÓΪLinuxºÍÀàUnix²Ù×÷ϵͳµÄ±Ø±¸Èí¼þ£¬£¬£¬£¬£¬ £¬£¬Ä¬ÈÏÔÚ´ó´ó¶¼Linux¿¯ÐаæÖгö³§¸½´ø¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-5188£©±£´æÓÚE2fsprogs e2fsck rehash.cÎļþµÄmutate_name()º¯ÊýÖУ¬£¬£¬£¬£¬ £¬£¬¹¥»÷Õß¿ÉʹÓÃÌØÖÆµÄext4Ŀ¼´¥·¢¿ÍÕ»Ô½½çдÈ룬£¬£¬£¬£¬ £¬£¬´Ó¶øµ¼Ö´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÐè񻮮Ëð·ÖÇøÀ´´¥·¢´ËÎó²î¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ7.5·Ö£¬£¬£¬£¬£¬ £¬£¬Ó°ÏìÁËE2fsprogsµÄ1.43.3-1.45.3°æ±¾¡£¡£¡£¡£¡£¡£¡£¡£E2fsprogsÒѾ­Ðû²¼Á˸ÃÎó²îµÄÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/01/e2fsprogs-remote-code-execution-vuln-jan-2020.html


6.·ðÂÞÀï´ïÖÝTCFFR¹«Ë¾ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬ £¬£¬Ô¼3500Ãû»¼ÕßÐÅϢй¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


·ðÂÞÀï´ïÖÝÃæ²¿ÕûÐι«Ë¾TCFFRÓÚÈ¥Äê11Ô³ÉÎªÍøÂç¹¥»÷µÄÊܺ¦Õߣ¬£¬£¬£¬£¬ £¬£¬Æ¾Ö¤¸ÃÍøÕ¾Ðû²¼µÄÉùÃ÷£¬£¬£¬£¬£¬ £¬£¬11ÔÂ8ÈÕÊ×´´ÈËRichard DavisÊÕµ½¹¥»÷ÕßµÄÄäÃûͨѶ£¬£¬£¬£¬£¬ £¬£¬Éù³Æ¸Ã¹«Ë¾µÄЧÀÍÆ÷Òѱ»ÈëÇÖ£¬£¬£¬£¬£¬ £¬£¬²¢ÇҸù«Ë¾µÄÍêÕû»¼ÕßÊý¾Ý±»µÁ¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÒªÇóÖ§¸¶Ò»±ÊÊê½ð£¬£¬£¬£¬£¬ £¬£¬µ«Ïêϸ½ð¶îδ֪£¬£¬£¬£¬£¬ £¬£¬¹¥»÷Õß»¹ÁªÏµÁËÔ¼15-20Ãû»¼ÕßÒªÇóËûÃÇСÎÒ˽¼ÒÖ§¸¶Ò»±ÊÊê½ð£¬£¬£¬£¬£¬ £¬£¬²»È»½«Ðû²¼ÆäÕÕÆ¬ºÍСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£Davis³Æ¶à´ï3500Ãû»¼ÕßµÄÊý¾Ý¿ÉÄܱ»µÁ£¬£¬£¬£¬£¬ £¬£¬ÕâЩÊý¾Ý¿ÉÄܰüÀ¨¼ÝÕÕ¡¢»¤ÕÕ¡¢¼Òͥסַ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢»¼ÕßÕÕÆ¬ºÍÐÅÓÿ¨Ö§¸¶Êý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒѾ­Í¨ÖªÁËFBIÍøÂç·¸·¨ÖÐÐIJ¢Ð­Öú¶Ô´ËʾÙÐÐÊӲ졣¡£¡£¡£¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/patients-of-hacked-surgical/