ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ21ÖÜ

Ðû²¼Ê±¼ä 2018-05-28

Ò»¡¢±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
        2018Äê05ÔÂ21ÈÕÖÁ27ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´47¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇGNU glibcµ±µØ»º³åÇøÒç³ö©¶´£»Foxit Reader U3DͼÐζà¸öÈÎÒâ´úÂëÖ´ÐЩ¶´£»Trend Micro Email Encryption GatewayÃüÁî×¢Èë©¶´£»Intel¶à¸öCPUÓ²¼þCVE-2018-3640ÐÅϢй¶©¶´£»D-Link DIR-550AºÍDIR-604MÔ¶³Ì´úÂëÖ´ÐЩ¶´ ¡£

        ±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÑо¿ÍŶӷ¢ÏÖÀûÓÃGoogle PlayºÍFackbookµÄAPT¹¥»÷»î¶¯RedDawn£»Ñо¿ÍŶӷ¢ÏÖ·¸×ïÍÅ»ïChryseneÕë¶ÔÖж«ºÍÓ¢¹úICSÍøÂçµÄ¹¥»÷»î¶¯£»Ñо¿ÈËÔ±·¢ÏÖ½©Ê¬ÍøÂçBrain FoodÔÚÒ»ÖÜÄÚѬȾԼ2400¸öÍøÕ¾£»Äþ¾²Ñо¿ÈËÔ±·¢ÏÖD-Link DIR-620·ÓÉÆ÷ÖдæÔÚºóÃÅÕË»§£»Ñо¿ÍŶӷ¢ÏÖÕë¶Ô°Í»ù˹̹µÄAPT×éÖ¯ConfuciusÓëPatchwork´æÔÚ¹ØÁª ¡£

        ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖÐ ¡£


¶þ¡¢ÖØÒªÄþ¾²Â©¶´Áбí
1¡¢GNU glibcµ±µØ»º³åÇøÒç³ö©¶´

        GNU C Library mempcpyº¯ÊýÔÚAVX-512-optimizedʵÏÖÖдæÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÎļþ£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½Í߽⠡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£ºhttps://sourceware.org/bugzilla/show_bug.cgi?id=23196
2¡¢Foxit Reader U3DͼÐζà¸öÈÎÒâ´úÂëÖ´ÐЩ¶´

        Foxit Reader´¦ÖÃPDFÖеÄU3DͼÐδæÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÎļþ£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë ¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£ºhttps://srcincite.io/advisories/src-2018-0016/
3¡¢Trend Micro Email Encryption GatewayÃüÁî×¢Èë©¶´

        Trend Micro Encryption for Email LauncherServer´æÔÚÃüÁî×¢Èë©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë ¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£ºhttps://www.zerodayinitiative.com/advisories/ZDI-18-416/
4¡¢Intel¶à¸öCPUÓ²¼þCVE-2018-3640ÐÅϢй¶©¶´

        Intel CPUÈôÀûÓÃÍÆ²âÖ´ÐÐÇÒÖ´ÐÐÍÆ²â¶Áȡϵͳ¼Ä´æÆ÷µÄÇé¿öÏ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíµ±µØ¹¥»÷Õß¿ÉÒÔÀûÓ鶴ͨ¹ý²àÐŵÀ·ÖÎö»ñÈ¡Ãô¸ÐÐÅÏ¢ ¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£ºhttps://www.kb.cert.org/vuls/id/180049
5¡¢D-Link DIR-550AºÍDIR-604MÔ¶³Ì´úÂëÖ´ÐЩ¶´

        D-Link DIR-550AºÍDIR-604M´¦ÖÃαÔìHTTPÇëÇó´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓé¶´Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐвÙ×÷ϵͳÃüÁî ¡£

        Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£ºhttps://fortiguard.com/zeroday/FG-VD-18-060


Èý¡¢ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢Ñо¿ÍŶӷ¢ÏÖÀûÓÃGoogle PlayºÍFackbookµÄAPT¹¥»÷»î¶¯RedDawn

×ðÁú¶¶È¦ - Ϊdu¶øÉú

        Ñо¿ÈËÔ±·¢ÏÖÕë¶Ô³¯ÏÊÅÑÌÓÕßµÄÒ»ÏîÅÓ´óµÄ¼äµý»î¶¯ ¡£¸ÃAPT×éÖ¯±»³ÆÎªSun Team£¬Ö÷ҪʹÓÃGoogle PlayºÍFacebook×÷Ϊ¹¥»÷ý½é£¬ËüÏÔʾÁËÒÆ¶¯ÍþвÐÎÊÆÉú³¤µÄËÙ¶ÈÓжà¿ì£¬ÒòΪ¸ÃAPT½«¼ÆÄ±×ªÒƵ½×¨×¢Óڴ˲¿ÃÅ ¡£¾ÝÊÓ²ìËüµÄÑо¿ÈËÔ±³Æ£¬ËüÔÚGoogle PlayÖÐÐû²¼ÁËÈý¸ö¡°Î´Ðû²¼¡±µÄ²âÊÔ°æÓ¦Ó÷¨Ê½£¬ÆäÄ¿±êÊǽ²º«ÓïµÄÓû§ ¡£ËûÃÇαװ³ÉFood Ingredients Info¡¢ast AppLockºÍAppLockFree ¡£Food Ingredients InfoºÍFast AppLockÓÃÓÚ͵͵ÇÔÈ¡Ãô¸ÐÊý¾Ý£¬ÈçÁªÏµÈË¡¢ÐÅÏ¢¡¢Í¨»°Â¼ÒôºÍÕÕÆ¬£¬¶øÇÒ»¹Äܹ»´ÓC2·þÎñÆ÷½ÓÊÕÃüÁîºÍÆäËû¿ÉÖ´ÐÐÎļþ£¨.dex£©£¬AppLockFreeËÆºõÊÇÕì²ìÊÂÇéµÄÒ»²¿ÃÅ£¬ÎªÎ´À´µÄÒ»ÂÖ¹¥»÷µì»ù»ù´¡ ¡£

        Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/reddawn-espionage-campaign-shows-mobile-apts-on-the-rise/132081/

2¡¢Ñо¿ÍŶӷ¢ÏÖ·¸×ïÍÅ»ïChryseneÕë¶ÔÖж«ºÍÓ¢¹úICSÍøÂçµÄ¹¥»÷»î¶¯

×ðÁú¶¶È¦ - Ϊdu¶øÉú

        Ñо¿ÍŶӷ¢ÏÖ·¸×ïÍÅ»ïChryseneÒ»Ö±ÒÔÀ´¶¼Õë¶ÔÖж«ºÍÓ¢¹ú×éÖ¯µÄ¹¤ÒµÍøÂç ¡£¹¤ÒµÍøÂçÄþ¾²¹«Ë¾Dragos³ÆÆäΪ¡°Chrysene¡±£¬¸ÃÍÅ»ïÓëOilRigºÍGreenbugÓйØ£¬Ö÷Òª¼¯ÖÐÔÚ°¢À­²®º£Í嵨Óò£¬¶øÇÒ¼ÓÈëÁËShamoonºÍShamoon 2¹¥»÷ ¡£Æ¾¾ÝDragosµÄ˵·¨£¬Chrysene´Ó֮ǰµÄOilRigºÍGreenbugµÄ¼äµý»î¶¯ÑÝ±ä¶øÀ´£¬ËûÃǵŤ¾ß¡¢¼¼ÊõºÍ·¨Ê½Öصþ£¬µ«ÓëÕâЩÆäËûÍÅÌåÏà±È£¬ChryseneÔÚ¼¼ÊõÄÜÁ¦·½ÃæÓÐ×ÅÏÔ×ŵĽø²½ ¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/chrysene-group-targets-ics-networks-middle-east-uk

3¡¢Ñо¿ÈËÔ±·¢ÏÖ½©Ê¬ÍøÂçBrain FoodÔÚÒ»ÖÜÄÚѬȾԼ2400¸öÍøÕ¾

×ðÁú¶¶È¦ - Ϊdu¶øÉú

        ½©Ê¬ÍøÂçBrain Foodͨ¹ý¶ñÒâPHP½Å±¾Ñ¬È¾ºÏ·¨ÍøÕ¾£¬²¢Ðû²¼¼Ùð¼õ·ÊÒ©ºÍ²¹ÄÔÒ©µÄ¹ã¸æ ¡£ProofpointÑо¿ÈËÔ±³Æ¸Ã½©Ê¬ÍøÂçÒѾ­Ñ¬È¾ÁËÔ¼5000¸öÍøÕ¾£¬ÓòÃûÍйܷþÎñÉÌGoDaddyÊܵ½µÄÓ°Ïì×î´ó£¬Ô¼Õ¼5000¸öÍøÕ¾µÄ40%£¬Æä´ÎÒÀÐòÊÇDreamHost¡¢UnitedLayerºÍCyrusOne ¡£

        Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/malicious-php-script-infects-2400-websites-in-the-past-week/132161/

4¡¢Äþ¾²Ñо¿ÈËÔ±·¢ÏÖD-Link DIR-620·ÓÉÆ÷ÖдæÔÚºóÃÅÕË»§

×ðÁú¶¶È¦ - Ϊdu¶øÉú

        ¿¨°Í˹»ùʵÑéÊÒµÄÄþ¾²Ñо¿ÈËÔ±·¢ÏÖD-Link DIR-620·ÓÉÆ÷¹Ì¼þÖдæÔÚÒ»¸öºóÃÅÕË»§£¨CVE-2018-6213£©£¬¿Éµ¼Ö¹¥»÷Õßͨ¹ý»¥ÁªÍø½Ó¹Ü¸ÃÉ豸 ¡£³öÓÚÄþ¾²¿¼ÂÇÑо¿ÈËԱûÓÐÅû¶¸ÃºóÃÅÕË»§µÄÓû§ÃûºÍÃÜÂ룬Ñо¿ÈËÔ±ÌåÏÖÉ豸ËùÓÐÕßÎÞ·¨½ûÓøúóÃÅÕË»§ ¡£

        Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/backdoor-account-found-in-d-link-dir-620-routers/

5¡¢Ñо¿ÍŶӷ¢ÏÖÕë¶Ô°Í»ù˹̹µÄAPT×éÖ¯ConfuciusÓëPatchwork´æÔÚ¹ØÁª

×ðÁú¶¶È¦ - Ϊdu¶øÉú

        Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢ÏÖAPT×éÖ¯ConfuciusÕë¶Ô°Í»ù˹̹µÄй¥»÷»î¶¯£¬¸Ã»î¶¯Í¨¹ý2¸öеÄÍøÕ¾ºÍÓÐЧºÉÔØ¹¥»÷Ä¿±ê£¬°üÂÞAndroid¶ñÒâÓ¦ÓÃFuddi DuniyaÒÔ¼°Ò»¸ö¶ñÒâÁÄÌìÓ¦Óà ¡£Ñо¿ÈËÔ±·¢ÏÖConfuciusºÍPatchworkʹÓõĶñÒâÈí¼þÖаüÂÞ¸ü¶àµÄ¹²Ïí´úÂë ¡£

        Ô­ÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/confucius-update-new-tools-and-techniques-further-connections-with-patchwork/