์ •๋ณด ยท ํ…Œํฌ
2021 Hot๐Ÿ”ฅ ๋ณด์•ˆ ์‚ฌ๊ฑด ์‚ฌ๊ณ  - ์ƒ๋ฐ˜๊ธฐ

๊ฐœ์š”

๋‹ค์‚ฌ๋‹ค๋‚œ ํ–ˆ๋˜ 2021, ์ฝ”๋กœ๋‚˜๋กœ ์ธํ•ด ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์—์„œ ๋น ๋ฅธ ์†๋„๋กœ ๋””์ง€ํ„ธํ™”๊ฐ€ ์ง„ํ–‰๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๊ทธ๋กœ์ธํ•ด ๋‹ค์–‘ํ•œ ์†Œํ”„ํŠธ์›จ์–ด ๋ฐ ์„œ๋น„์Šค์—์„œ ์ทจ์•ฝ์  ๋ฐ ๋ณด์•ˆ ์‚ฌ๊ณ ๊ฐ€ ๋ฐœ์ƒํ–ˆ๋˜ ํ•ด๊ฐ€ ์•„๋‹Œ๊ฐ€ ์‹ถ์Šต๋‹ˆ๋‹ค. ๊ทธ ์ค‘ Hot๐Ÿ”ฅ ํ–ˆ๋˜ CVE์™€ ๋ณด์•ˆ ์‚ฌ๊ฑด/์‚ฌ๊ณ  ๋“ค์„ ๋Œ์•„๋ณด๋Š” ์‹œ๊ฐ„์„ ๊ฐ€์ ธ๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค! ๋จผ์ € ์˜ฌํ•ด ์ƒ๋ฐ˜๊ธฐ์— ์ผ์–ด๋‚ฌ๋˜ ๋ณด์•ˆ ์‚ฌ๊ฑด๊ณผ ์‚ฌ๊ณ ๋ฅผ ์•Œ์•„๋ณด๋Ÿฌ ์ถœ๋ฐœํ•˜์‹œ์ฃ !

Solarwinds

  • ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ, Supply Chain Attack

2021๋…„ ํ•ซ ํ‚ค์›Œ๋“œ ์ค‘ ํ•˜๋‚˜๋Š” Supply Chain Attack(๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ) ์ด ์•„๋‹๊นŒ ์‹ถ์Šต๋‹ˆ๋‹ค. ๊ตญ๋‚ด ๋ณด์•ˆ ๋ชจ๋“ˆ ํšŒ์‚ฌ์ธ ๋ฒ ๋ผํฌํŠธ[1] ๋ถ€ํ„ฐ ์ „์„ธ๊ณ„ ๋งŽ์€ ํšŒ์‚ฌ์—์„œ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋Š” Solarwinds๊นŒ์ง€, ์ผ์ƒ์†์—์„œ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋Š” ์†Œํ”„ํŠธ์›จ์–ด๊ฐ€ ๊ณต๊ธ‰๋ง ๊ณต๊ฒฉ์— ๋‹นํ•  ๊ฒฝ์šฐ ์–ด๋””๊นŒ์ง€ ํ”ผํ•ด๋ฅผ ์ž…์„ ์ˆ˜ ์žˆ๋Š”์ง€๋ฅผ ๋ณด์—ฌ์ค€ ์‚ฌ๋ก€์ž…๋‹ˆ๋‹ค.

Supply_chain_network.png

https://en.wikipedia.org/wiki/Supply_chain_attack#/media/File:Supply_chain_network.png

2020๋…„ 12์›” 8์ผ, ๊ธ€๋กœ๋ฒŒ ์ •๋ณด๋ณด์•ˆ ๊ธฐ์—… FireEye๊ฐ€ ์ •๋ถ€ ํ›„์›์„ ๋ฐ›๋Š” ํ•ด์ปค ๊ทธ๋ฃน์œผ๋กœ๋ถ€ํ„ฐ ๊ณต๊ฒฉ๋‹นํ•ด ์ž์‚ฌ์˜ โ€œFireEye Red Teamโ€ ํˆด์ด ํƒˆ์ทจ๋‹นํ•œ ์‚ฌ์‹ค์„ ๋ฐœํ‘œํ–ˆ์Šต๋‹ˆ๋‹ค. ํ•ด๋‹น ๊ณต๊ฒฉ์€ Solarwinds๋ผ๋Š” ๊ธฐ์—…์˜ ์†”๋ฃจ์…˜์„ ํ†ตํ•ด ๊ฐํ–‰๋˜์—ˆ์œผ๋ฉฐ, Solarwinds Orion์˜ Update ์„œ๋ฒ„๋ฅผ ํ†ตํ•ด ์•…์„ฑ ํŒŒ์ผ์ด ์ „ํŒŒ๋œ ๊ฒƒ์œผ๋กœ ๋“œ๋Ÿฌ๋‚ฌ์Šต๋‹ˆ๋‹ค. Solorigate ๋˜๋Š” Sunburst๋ผ๊ณ  ๋ถˆ๋ฆฌ๋Š” ์ด ๊ณต๊ฒฉ์€ ์ฃผ์š” IT ๊ธฐ์—…๋“ค๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ๋ฏธ๊ตญ์˜ ์—ฌ๋Ÿฌ ์ •๋ถ€ ๋ถ€์ฒ˜๊นŒ์ง€ ์˜ํ–ฅ์„ ๋ฏธ์นœ ์ •ํ™ฉ์ด ๋ฐœ๊ฒฌ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๋ฏธ CISA(Cybersecurity and Infrastructure Security Agency)๋Š” ์˜ํ–ฅ์„ ๋ฐ›๋Š” ๋ฒ„์ „๊ณผ์˜ ์—ฐ๊ฒฐ์„ ์ฆ‰์‹œ ๋Š๊ฑฐ๋‚˜ ์ „์›์„ ์ฐจ๋‹จํ•˜๋ผ๋Š” ๊ธด๊ธ‰ ์กฐ์น˜๋ฅผ ๋ฐœํ‘œํ•˜์˜€์Šต๋‹ˆ๋‹ค.[2] ๊ณต๊ฒฉ์— ์‚ฌ์šฉ๋œ ๋ฐฉ๋ฒ•๊ณผ ํƒ€์ž„๋ผ์ธ์€ ๋“œ๋ฆผํ•ต ๊ฒŒ์‹œ๊ธ€[3] ์—์„œ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

[1] https://dreamhack.io/forum/community/552
[2] https://cyber.dhs.gov/ed/21-01/
[3] https://dreamhack.io/forum/community/619

Sudo

  • ๊ถŒํ•œ ์ƒ์Šน, Elevation of Privilege
  • CVE-2021-3156

Sudo ํ”„๋กœ๊ทธ๋žจ์€ Linux์—์„œ root ๊ถŒํ•œ์˜ ๋ช…๋ น์„ ์ˆ˜ํ–‰ํ•˜๊ธฐ ์œ„ํ•ด์„œ ์‚ฌ์šฉํ•˜๋Š” ํ”„๋กœ๊ทธ๋žจ์ž…๋‹ˆ๋‹ค. ํ•ด๋‹น ํ”„๋กœ๊ทธ๋žจ์—์„œ ์ธ์ž๋ฅผ ํŒŒ์‹ฑํ•˜๋Š” ๊ณผ์ •์—์„œ \ ๋ฌธ์ž๋ฅผ ์ ์ ˆํ•˜๊ฒŒ ์ฒ˜๋ฆฌํ•˜์ง€ ๋ชปํ•ด์„œ Buffer Overflow๊ฐ€ ๋ฐœ์ƒํ•˜๊ณ , ๊ณต๊ฒฉ์ž๋Š” ํ•ด๋‹น ์ทจ์•ฝ์ ์„ ํ†ตํ•ด์„œ ์ผ๋ฐ˜ ์‚ฌ์šฉ์ž์—์„œ root๋กœ ๊ถŒํ•œ ์ƒ์Šน์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ํŒจ์น˜ ์ปค๋ฐ‹์€ [1], [2]์—์„œ ํ™•์ธํ•ด๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ์ทจ์•ฝ์ ์€ ๋ฌด๋ ค 10๋…„ ๋™์•ˆ ์•„๋ฌด๋„ ๋ฐœ๊ฒฌํ•˜์ง€ ๋ชปํ•œ ์ทจ์•ฝ์ ์ด์—ˆ๋Š”๋ฐ์š”. ์ด๋ ‡๊ฒŒ ํŒŒ๊ธ‰๋ ฅ์ด ๋†’์€ ์ทจ์•ฝ์ ์ด 10๋…„ ๋™์•ˆ ๊ฝ๊ฝ ์ˆจ์–ด์žˆ๋˜ ๊ฒŒ ๋†€๋ผ์šธ ๋”ฐ๋ฆ„์ž…๋‹ˆ๋‹ค. ์˜คํ”ˆ์†Œ์Šค์— ์ˆจ์–ด์žˆ๋Š” ๋ณด๋ฌผ๊ณผ๋„ ๊ฐ™์€ ์ทจ์•ฝ์ ์„ ํ•จ๊ป˜ ์ฐพ์•„๋ณด์•„์š”.

[1] https://github.com/sudo-project/sudo/commit/1f8638577d0c80a4ff864a2aad80a0d95488e9a8
[2] https://github.com/sudo-project/sudo/commit/b301b46b79c6e2a76d530fa36d05992e74952ee8

vCenter

  • ์›๊ฒฉ ์ฝ”๋“œ ์‹คํ–‰, Remote Code Execution
  • CVE-2021-21972

vCenter๋Š” VMware vSphere ํ™˜๊ฒฝ ์ œ์–ด๋ฅผ ์œ„ํ•œ ์ค‘์•™ ์ง‘์ค‘์‹ ํ”Œ๋žซํผ์„ ์ œ๊ณตํ•˜๋Š” ์„œ๋ฒ„ ๊ด€๋ฆฌ ์†Œํ”„ํŠธ์›จ์–ด์ž…๋‹ˆ๋‹ค.
vCenter์˜ ํ”Œ๋Ÿฌ๊ทธ์ธ ์ค‘ ํ•˜๋‚˜์ธ uploadova์€ ์••์ถ• ํŒŒ์ผ์„ ๋ฐ›์•„ ์ง€์ •๋œ ๊ฒฝ๋กœ์— ์••์ถ• ํ•ด์ œํ•˜์—ฌ ํŒŒ์ผ์„ ์ƒ์„ฑํ•˜๋Š”๋ฐ, ์••์ถ• ํŒŒ์ผ๋“ค์˜ ์ด๋ฆ„์— ๋Œ€ํ•œ ๊ฒ€์ฆ์˜ ๋ถ€์žฌ๋กœ ์ž„์˜ ๊ฒฝ๋กœ๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋Š” Zip Slip[1] ๊ณต๊ฒฉ์ด ๊ฐ€๋Šฅํ•œ ๋ฌธ์ œ๊ฐ€ ์žˆ์—ˆ์Šต๋‹ˆ๋‹ค. ๊ณต๊ฒฉ์ž๋Š” ์ด๋ฅผ ํ†ตํ•ด jsp ํŒŒ์ผ ๋˜๋Š” ์„ค์ • ํŒŒ์ผ์„ ์ž„์˜๋กœ ์ƒ์„ฑํ•˜์—ฌ ์›ํ•˜๋Š” ๋ช…๋ น์–ด๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

ํ•ด๋‹น CVE๋Š” ์ทจ์•ฝ์ ์˜ ์‹ฌ๊ฐ์„ฑ ๋“ฑ์„ ๊ณ ๋ คํ•˜์—ฌ ์ˆ˜์น˜๋กœ ํ‘œ๊ธฐํ•˜๋Š” CVSS ์—์„œ 9.8์ (3.x ๋ฒ„์ „), 10์ (2.0 ๋ฒ„์ „)์œผ๋กœ ์ฑ…์ •๋˜์—ˆ์Šต๋‹ˆ๋‹ค.[2] ๋†’์€ ์ ์ˆ˜๋ฅผ ๋ฐ›์€ ์ด์œ ๋กœ๋Š” ์ทจ์•ฝ์ ์˜ ์‹ฌ๊ฐ์„ฑ๋„ ์กด์žฌํ•˜์ง€๋งŒ, ๋ฌธ์ œ์ ์ด ๋ฐœ์ƒํ•˜๋Š” ๊ธฐ๋Šฅ์— ๋Œ€ํ•œ ์˜ฌ๋ฐ”๋ฅธ ์ ‘๊ทผ ์ œ์–ด๊ฐ€ ์ด๋ฃจ์–ด์ง€์ง€์•Š์•„ ์ž„์˜ ์‚ฌ์šฉ์ž๊ฐ€ ์•…์šฉํ•  ์ˆ˜ ์žˆ์–ด ๋”์šฑ ๋” ๋†’์€ ์ ์ˆ˜๊ฐ€ ๋ถ€์—ฌ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๋” ์ž์„ธํ•œ ๋‚ด์šฉ์€ [3]์—์„œ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

[1] https://github.com/snyk/zip-slip-vulnerability
[2] https://nvd.nist.gov/vuln/detail/CVE-2021-21972
[3] https://swarm.ptsecurity.com/unauth-rce-vmware/

PHP

  • ๋ฐฑ๋„์–ด, Backdoor

PHP ๋ฐฑ๋„์–ด ์‚ฌ๊ฑด์€ ๋“œ๋ฆผ๋ ˆํ„ฐ๋ฅผ[1] ํ†ตํ•ด ์†Œ์‹์„ ์ „ํ•˜๊ธฐ๋„ ํ•˜์˜€์Šต๋‹ˆ๋‹ค. 2021๋…„ 3์›” 28์ผ PHP 8.1.0-dev ๋ฒ„์ „์ด ๋ฐฑ๋„์–ด๊ฐ€ ํฌํ•จ๋œ ์ฑ„๋กœ ๋ฐฐํฌ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๐Ÿ˜ฑ ์ด์šฉ์ž์˜ โ€œHTTP_USER_AGENTTโ€ ํ—ค๋”์˜ ๊ฐ’์ด zerodium ๋ฌธ์ž์—ด์ด ์žˆ๋Š” ๊ฒฝ์šฐ ํ•ด๋‹น ๊ฐ’์„ ๊ทธ๋Œ€๋กœ PHP๋ฅผ ํ†ตํ•ด ์‹คํ–‰ํ•˜๋Š” ๋ฌด์‹œ๋ฌด์‹œํ•œ ๋ฐฑ๋„์–ด ์ฝ”๋“œ์˜€์Šต๋‹ˆ๋‹ค.[2] [3]

PHP ๊ฐœ๋ฐœ์ž์ธ Nikita Popov๋Š” ํ•ดํ‚น์„ ๋‹นํ–ˆ๋‹ค๋Š” ์‚ฌ์‹ค์„ ์ธ์ง€ ํ•œ ๋’ค, php.internals๋ฅผ ๊ตฌ๋…ํ•˜๊ณ  ์žˆ๋Š” ์‚ฌ์šฉ์ž๋“ค์—๊ฒŒ ์•„๋ž˜์™€ ๊ฐ™์ด ํ•œ ํ†ต์˜ ๋ฉ”์ผ[4]์„ ๋ฐœ์†กํ–ˆ์Šต๋‹ˆ๋‹ค. ํ•ด๋‹น ๋ฉ”์ผ์˜ ๋‚ด์šฉ์€ โ€œ๋ฌด์Šจ ์ผ์ด ์ผ์–ด๋‚ฌ๋Š”์ง€๋Š” ์ž˜ ๋ชจ๋ฅด์ง€๋งŒ, ๊ฐœ๋ณ„ ๊นƒ ๊ณ„์ •์ด ํ•ดํ‚น๋‹นํ•œ ๊ฒƒ์ด ์•„๋‹Œ PHP ๊นƒ ์„œ๋ฒ„๊ฐ€ ํ•ดํ‚น๋‹นํ•œ ๊ฒƒ ๊ฐ™๋‹ค.โ€์™€ ํ•จ๊ป˜ ์•ž์œผ๋กœ ์–ด๋–ค ๋ฐฉ์‹์œผ๋กœ ๊นƒ ์›Œํฌ ํ”Œ๋กœ์šฐ๋ฅผ ๋ณ€๊ฒฝํ• ์ง€๋ฅผ ํฌํ•จํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๊นƒ์„œ๋ฒ„๋ฅผ ๋”์ด์ƒ PHP๊ฐ€ ์ž์ฒด์ ์œผ๋กœ ๊ด€๋ฆฌํ•˜์ง€ ์•Š๊ณ  ๋‹จ์ˆœํžˆ ๋ฏธ๋Ÿฌ ์šฉ๋„๋กœ๋งŒ ์‚ฌ์šฉํ•˜๋˜ ๊นƒํ—ˆ๋ธŒ ๋ ˆํฌ๋ฅผ ๋ฉ”์ธ ์ŠคํŠธ๋ฆผ์œผ๋กœ ์‚ฌ์šฉํ•  ๊ฒƒ์„ ์•ฝ์†ํ–ˆ์Šต๋‹ˆ๋‹ค.

[1] https://dreamhack.io/forum/community/849
[2] https://github.com/php/php-src/commit/c730aa26bd52829a49f2ad284b181b7e82a68d7d
[3] https://github.com/php/php-src/commit/2b0f239b211c7544ebc7a4cd2c977a5b7a11ed8a
[4] https://news-web.php.net/php.internals/113838

MS Exchange Server

  • Server Side Request Forgery
  • CVE-2021-26855

Exchange Server๋Š” ์‚ฌ์šฉ์ž์˜ ์š”์ฒญ์„ ์ฒ˜๋ฆฌํ•  ๋•Œ X-BEResource ๋ผ๋Š” ์ฟ ํ‚ค๋ฅผ ํ†ตํ•ด ์š”์ฒญ์„ ์ฒ˜๋ฆฌํ•  ๋ฐฑ์—”๋“œ ์„œ๋ฒ„๋ฅผ ์ง€์ •ํ•ฉ๋‹ˆ๋‹ค. ์ด๋•Œ X-BEResource ์ฟ ํ‚ค๊ฐ’์— ๋Œ€ํ•ด ๋ถˆ์ถฉ๋ถ„ํ•œ ๊ฒ€์ฆ์œผ๋กœ ์ธํ•ด ์š”์ฒญ ๊ฒฝ๋กœ๋ฅผ ๋ณ€์กฐํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ธ์ฆ ์—†์ด Exchange Server ๋‚ด๋ถ€๋กœ ์ž„์˜์˜ ์š”์ฒญ์„ ๋ณด๋‚ผ ์ˆ˜ ์žˆ๋Š” ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•ฉ๋‹ˆ๋‹ค.[1]

[1] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26855

  • ์ž„์˜ ํŒŒ์ผ ์ž‘์„ฑ โ†’ ์ž„์˜ ์ฝ”๋“œ ์‹คํ–‰, Arbitrary File Write โ†’ Remote Code Execution
  • CVE-2021-27065

Exchange server์—์„œ ๊ฐ€์ƒ ๋””๋ ‰ํ„ฐ๋ฆฌ๋ฅผ ์„ค์ •ํ•˜๋ฉด ์„ค์ • ์ •๋ณด๋ฅผ ์„œ๋ฒ„ ๋‚ด์˜ ํŒŒ์ผ ํ˜•ํƒœ๋กœ ์ €์žฅํ•˜๋ฉฐ, ํ•ด๋‹น ์„ค์ • ํŒŒ์ผ์˜ ๊ฒฝ๋กœ ๋ฐ ์ด๋ฆ„์„ ์‚ฌ์šฉ์ž๊ฐ€ ์ž…๋ ฅํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ๋•Œ, ์ €์žฅํ•  ์„ค์ • ํŒŒ์ผ์˜ ํ™•์žฅ์ž๋ฅผ ๊ฒ€์‚ฌํ•˜์ง€ ์•Š์•„ aspx ํŒŒ์ผ์„ ์ƒ์„ฑํ•  ์ˆ˜ ์žˆ๊ฒŒ ๋ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ, ์„ค์ • ํŒŒ์ผ ๋‚ด์— ์ €์žฅ๋˜๋Š” ๋ฆฌ์†Œ์Šค ๋‚ด์šฉ์˜ ์ผ๋ถ€๋Š” ์‚ฌ์šฉ์ž์—๊ฒŒ ์ž…๋ ฅ๋ฐ›๋Š” ํŒŒ๋ผ๋ฏธํ„ฐ๋กœ๋ถ€ํ„ฐ ๋งŒ๋“ค์–ด์ง€๊ฒŒ ๋˜๋ฉฐ, ๊ณต๊ฒฉ์ž๊ฐ€ ์ž„์˜์˜ ๋‚ด์šฉ์„ ํŒŒ์ผ์— ํฌํ•จ์‹œํ‚ฌ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๊ฒฐ๊ณผ์ ์œผ๋กœ ๊ณต๊ฒฉ์ž๊ฐ€ aspx ์›น์‰˜์„ ํ†ตํ•ด ์„œ๋ฒ„๋‚ด์—์„œ ์ž„์˜ ์ฝ”๋“œ๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ๋Š” ์ทจ์•ฝ์ ์„ ๋ฐœ์ƒํ•ฉ๋‹ˆ๋‹ค.[1]

[1] https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-27065

MS Internet explorer

  • ์›๊ฒฉ ์ฝ”๋“œ ์‹คํ–‰, Remote Code Execution
  • CVE-2021-26411, CVE-2021-27085

ms-ie-1.png

https://techcommunity.microsoft.com/t5/microsoft-365-blog/microsoft-365-apps-say-farewell-to-internet-explorer-11-and/ba-p/1591666

MS๋Š” 2022๋…„ 6์›” IE์˜ ๊ธฐ์ˆ ์ง€์›์„ ์ข…๋ฃŒํ•œ๋‹ค๊ณ  ํ•ฉ๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ IE์˜ ์ธ๊ธฐ(?)๋Š” ์—ฌ์ „ํ•œ๋ฐ์š”. ํŠนํžˆ ๊ตญ๋‚ด์—์„œ๋Š” ๊ณต์ธ์ธ์ฆ์„œ ์„œ๋น„์Šค ๋“ฑ์— ์˜ํ•ด ๋ฐ˜๊ฐ•์ œ์ ์œผ๋กœ IE๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜๋ฐ–์— ์—†์—ˆ์œผ๋ฉฐ, IE ํ™˜๊ฒฝ์—์„œ๋งŒ ์‚ฌ์šฉ๊ฐ€๋Šฅํ•œ ์—…๋ฌด์šฉ ์†Œํ”„ํŠธ์›จ์–ด๋„ ์—ฌ์ „ํžˆ ์ ์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ์ฆ‰, ์—ฌ์ „ํžˆ ํ•ด์ปค๋“ค์˜ ํƒ€๊ฒŸ์ธ ๊ฒƒ์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ์—ˆ์Šต๋‹ˆ๋‹ค. IE๋ฅผ ํ†ตํ•œ ๊ณต๊ฒฉ์˜ ๋Œ€์ƒ์€ ๊ณต๊ณต๊ธฐ๊ด€ ์‚ฌ๋žŒ๋“ค์—๊ฒŒ๋งŒ ๊ทธ์น˜์ง€ ์•Š๊ณ  IE๋ฅผ ํƒ€๊ฒŸ์œผ๋กœ ์ทจ์•ฝ์  ์—ฐ๊ตฌํ•˜๋Š” ๊ตญ๋‚ด ํ•ด์ปค๋“ค๋˜ํ•œ ๊ณต๊ฒฉ์˜ ํƒ€๊ฒŸ์ด ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๊ตฌ๊ธ€ TAGํŒ€์— ๋”ฐ๋ฅด๋ฉด ๋ถํ•œ๋ฐœ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ ์บ ํŽ˜์ธ์ด ์‹ค์ œ๋กœ ์žˆ์—ˆ๊ณ [1], ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ํšŒ์‚ฌ์ธ ์—”ํ‚ค์—์„œ ํ•ด๋‹น ๊ณต๊ฒฉ์— ์‚ฌ์šฉ๋œ ์ทจ์•ฝ์ ์„ ๋ถ„์„ํ•˜์—ฌ ๊ณต๊ฐœํ–ˆ์Šต๋‹ˆ๋‹ค.[2] ๋“œ๋ฆผ๋ ˆํ„ฐ๋ฅผ ํ†ตํ•ด ์‹ค์ œ ๊ณต๊ฒฉ์„ ์‹œ๋„ํ•œ ํŠธ์œ„ํ„ฐ ๋ฉ”์‹œ์ง€๋ฅผ ๊ณต์œ ํ•˜์˜€์œผ๋‹ˆ ํ™•์ธํ•ด๋ณด์„ธ์š”![3]

[1] https://blog.google/threat-analysis-group/update-campaign-targeting-security-researchers/
[2] https://enki.co.kr/blog/2021/02/04/ie_0day
[3] https://dreamhack.io/forum/community/754

Zoom

  • ์›๊ฒฉ ์ฝ”๋“œ ์‹คํ–‰, Remote Code Execution
  • CVE-2021-34407

COVID-19๋กœ ์ธํ•ด ์žฌํƒ๊ทผ๋ฌด๊ฐ€ ์ผ์ƒ์ด ๋œ ์ง€๊ธˆ ๋‹ค์–‘ํ•œ ์›๊ฒฉ ์—…๋ฌด ์‹œ์Šคํ…œ์˜ ์‚ฌ์šฉ๋ฅ ์€ ์ ์  ๋†’์•„์ง€๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ถ”์„ธ์— ๋ฏผ๊ฐํ•œ ํ•ด์ปค๋“ค ์—ญ์‹œ ํ™”์ƒ ํšŒ์˜ ํ”„๋กœ๊ทธ๋žจ์ธ Zoom์„ ํƒ€๊ฒŸ์œผ๋กœ ์ทจ์•ฝ์  ๋ถ„์„ ์—ฐ๊ตฌ๋ฅผ ์ง„ํ–‰ํ•˜์˜€์Šต๋‹ˆ๋‹ค. ํฌ๋กฌ ๋ธŒ๋ผ์šฐ์ €์™€ ์œˆ๋„์šฐ ์ปค๋„๋“ฑ์„ ๋น„๋กฏํ•ด ์†Œ์œ„ ๋งํ•˜๋Š” Big Company๋“ค์˜ ์†Œํ”„ํŠธ์›จ์–ด์˜ ์ทจ์•ฝ์ ์„ ์ฐพ๊ณ  ํฌ์ƒํ•˜๋Š” ๋Œ€ํšŒ์ธ Pwn2Own์—์„œ๋„ ์˜ฌํ•ด Zoom์„ ์‹ ๊ทœ ์นดํ…Œ๊ณ ๋ฆฌ๋กœ ํฌํ•จ์‹œ์ผฐ์Šต๋‹ˆ๋‹ค. ์ด ์ทจ์•ฝ์ ์€ Pwn2Own์„ ํ†ตํ•ด Responsible Disclosure ์ ˆ์ฐจ๋ฅผ ๋ฐŸ์•˜์ง€๋งŒ, ๋งŒ์•ฝ In The Wild์—์„œ ๋Œ์•„๋‹ค๋…”๋‹ค๋ฉด, ๋Œ€๋ถ€๋ถ„์˜ ๊ธฐ์—…์€ ๋งˆ๋น„๊ฐ€ ๋˜์—ˆ์„ ๊ฒ๋‹ˆ๋‹ค.[1]

Zoom์—์„œ ์•”ํ˜ธํ™”๋œ ์ฑ„ํŒ…์— ๋Œ€ํ•œ ํ•ธ๋“œ์…ฐ์ดํฌ๊ฐ€ ์ด๋ฃจ์–ด์งˆ ๋•Œ, ๋‘ ํด๋ผ์ด์–ธํŠธ๋Š” RSA/ECDSA ์ธ์ฆ์„œ๋ฅผ ์ด์šฉํ•˜์—ฌ ํ‚ค๋ฅผ ๊ตํ™˜ํ•ฉ๋‹ˆ๋‹ค. ECDSA ์ธ์ฆ์„œ๋ฅผ ์“ฐ๋Š” ๊ฒฝ์šฐ AES๋กœ Key๋ฅผ ๋ณตํ˜ธํ™”ํ•˜๋Š”๋ฐ, ์ด ๋•Œ Key์˜ ํฌ๊ธฐ์™€ ์ƒ๊ด€ ์—†์ด Output buffer๋ฅผ 1024๋ฐ”์ดํŠธ๋กœ ๊ณ ์ • ํ›„ ์ž„์˜ ํฌ๊ธฐ์˜ ์ž…๋ ฅ์„ ๋ณตํ˜ธํ™”ํ•˜์—ฌ ํž™ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ ์ทจ์•ฝ์ ์ด ๋ฐœ์ƒํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด๋ฅผ ๊ณต๋žตํ•˜๊ธฐ ์œ„ํ•ด ๊ณต๊ฒฉ์ž๋“ค์€ Path traversal๋กœ ์ž„์˜ GIF ํŒŒ์ผ์„ ๋‚ด๋ ค๋ฐ›์•„ 32๋น„ํŠธ ํ”„๋กœ์„ธ์Šค์—์„œ์˜ Heap spray๋ฅผ ์ˆ˜ํ–‰ํ•˜์˜€๊ณ , ๊ณต๊ฒฉ์˜ ์•ˆ์ •์„ฑ์„ ์œ„ํ•ด ์ถ”๊ฐ€๋กœ Information disclosure primitive๋ฅผ ๊ตฌ์„ฑํ•˜์˜€์Šต๋‹ˆ๋‹ค.

[1] https://sector7.computest.nl/post/2021-08-zoom/

Dependency Confusion; NPM, Yarn, Pip, RubyGems, Gradle, Maven, NuGet, โ€ฆ

  • ์›๊ฒฉ ์ฝ”๋“œ ์‹คํ–‰, Remote Code Execution

์˜ฌํ•ด 2์›”์— ๋ฐœํ‘œ๋˜์–ด ํ˜„์žฌ๊นŒ์ง€๋„ ์œ ํšจํ•œ ์ด ๊ณต๊ฒฉ์€ ์š”์ฆ˜ ๊ฐœ๋ฐœ์ž๋“ค์˜ ๋ฐฐํฌ ์›Œํฌํ”Œ๋กœ์šฐ์— ๊ฝค ํฐ ํƒ€๊ฒฉ์„ ์ค„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํšŒ์‚ฌ ์ฐจ์›์˜ Private repository์— JS, Python, Ruby, โ€ฆ ๋“ฑ ํŒจํ‚ค์ง€๋ฅผ ์˜ฌ๋ ค ๋ฐฐํฌํ•˜๋Š” ๊ฒฝ์šฐ ์‹ ๊ฒฝ์จ์•ผ ํ•  ๊ณต๊ฒฉ์ž…๋‹ˆ๋‹ค.

์•„์ด๋””์–ด๋Š” ์ด๋ ‡์Šต๋‹ˆ๋‹ค. ๋งŒ์•ฝ ์–ด๋–ค ํŒจํ‚ค์ง€ my-package๋ฅผ ํšŒ์‚ฌ ๋‚ด์—์„œ๋งŒ ๋ฐฐํฌํ•ด์•ผ ํ•œ๋‹ค๋ฉด, ํšŒ์‚ฌ ๋‚ด๋ถ€์—์„œ๋งŒ ์ ‘๊ทผ ๊ฐ€๋Šฅํ•œ ํŒจํ‚ค์ง€ ์ €์žฅ์†Œ(repository)๋ฅผ ํ•˜๋‚˜ ๋งŒ๋“  ๋’ค ๊ทธ ๊ณณ์— ํŒจํ‚ค์ง€๋ฅผ ์˜ฌ๋ฆฝ๋‹ˆ๋‹ค. ๋ฐฐํฌํ•  ๋•Œ๋Š” ํ•ด๋‹น ํŒจํ‚ค์ง€์˜ ์ด๋ฆ„, ๋ฒ„์ „์œผ๋กœ ์˜์กด์„ฑ์„ ์ถ”๊ฐ€ํ•˜์—ฌ ๋ฐฐํฌํ•˜๊ฒŒ ๋ฉ๋‹ˆ๋‹ค.

ํ•˜์ง€๋งŒ ๋ชจ๋“  ํŒจํ‚ค์ง€๋ฅผ ํšŒ์‚ฌ ๋‚ด๋ถ€ ์ €์žฅ์†Œ์—์„œ ์„œ๋น™ํ•˜๊ธฐ์—๋Š” ํ”„๋กœ์ ํŠธ๋“ค์ด ๊ฐ€์ง€๋Š” ํŒจํ‚ค์ง€ ์˜์กด์„ฑ์ด ๋„ˆ๋ฌด ๋งŽ์Šต๋‹ˆ๋‹ค. ๊ฐ€๋ น express ์›น ์„œ๋ฒ„๋ฅผ ๊ฐ€์ ธ๋‹ค ์“ฐ๋ ค๋ฉด ๊ณต๊ฐœ ์ €์žฅ์†Œ(ex. npmjs.com)์—์„œ ๋ฐ›๋Š” ๊ฒƒ์ด ํ˜„๋ช…ํ•˜๊ฒ ์ฃ . ์ด์ฏค์—์„œ, my-package๊ฐ€ ๋งŒ์•ฝ ๊ณต๊ฐœ ๋ ˆํฌ์ง€ํ† ๋ฆฌ์—๋„ ์กด์žฌํ•œ๋‹ค๋ฉด ์–ด๋–จ๊นŒ์š”?

์‹คํ—˜์˜ ๊ฒฐ๊ณผ๋Š” ๋†€๋ผ์› ์Šต๋‹ˆ๋‹ค. ๊ณต๊ฒฉ์ž๊ฐ€ ๋™์ผํ•œ ์ด๋ฆ„, ๋™์ผํ•œ ๋ฒ„์ „์˜ ํŒจํ‚ค์ง€๋ฅผ ์˜ฌ๋ ค๋†“์•˜๋”๋‹ˆ, ๋งŽ์€ ๊ธฐ์—…๋“ค์—์„œ ๊ณต๊ฒฉ์ž์˜ ํŒจํ‚ค์ง€๋ฅผ ๋Œ€์‹  ๋ฐ›๊ฒŒ ๋œ ๊ฒƒ์ด์ฃ . ์ด ๋ฐฉ๋ฒ•์œผ๋กœ ํšŒ์‚ฌ ๋‚ด๋ถ€์— ์นจํˆฌํ•˜์—ฌ ์ฝ”๋“œ๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์—ˆ์Šต๋‹ˆ๋‹ค. ์ด๋ฅผ ๋ง‰๊ธฐ ์œ„ํ•ด์„œ๋Š” repository ์ฃผ์†Œ๋ฅผ ํšŒ์‚ฌ ๋‚ด๋ถ€๋กœ ์ œํ•œํ•˜๊ฑฐ๋‚˜, ํŒจํ‚ค์ง€์˜ ํ•ด์‹œ๋ฅผ ๊ฒ€์‚ฌํ•˜๊ฑฐ๋‚˜ (package-lock.json, Pipfile.lock ๋“ฑ), repository ์ฃผ์†Œ์˜ ์ˆœ์„œ๋ฅผ ๋ฐ”๊พธ๋Š” ๋ฐฉ๋ฒ•์ด ์žˆ์Šต๋‹ˆ๋‹ค. ๋” ์ž์„ธํ•œ ์ •๋ณด๋Š” [1], [2]์—์„œ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

[1] https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610
[2] https://azure.microsoft.com/en-us/resources/3-ways-to-mitigate-risk-using-private-package-feeds/

GitLab

  • ์›๊ฒฉ ์ฝ”๋“œ ์‹คํ–‰, Remote Code Execution
  • CVE-2021-22205

Gitlab์€ ๊นƒ ์ €์žฅ์†Œ ๋ฐ CI/CD, ์ด์Šˆ ์ถ”์ , ๋ณด์•ˆ์„ฑ ํ…Œ์ŠคํŠธ ๋“ฑ์˜ ๊ธฐ๋Šฅ์„ ๊ฐ–์ถ˜ ์›น ๊ธฐ๋ฐ˜์˜ ๋ฐ๋ธŒ์˜ต์Šค ํ”Œ๋žซํผ์œผ๋กœ ๋Œ€์ค‘์ ์œผ๋กœ ๋งŽ์ด ์‚ฌ์šฉ๋˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ํ•ด๋‹น ์ทจ์•ฝ์ ์€ Gitlab์˜ ํŒŒ์ผ์„ ์ฒ˜๋ฆฌํ•˜๋Š” ์„œ๋น„์Šค์—์„œ ์‚ฌ์šฉํ•˜๋Š” ExifTool์—์„œ ๋ฐœ์ƒํ•œ CVE-2021-22204์— ์˜ํ•ด ์›๊ฒฉ ์ฝ”๋“œ ์‹คํ–‰์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ์ฒ˜์Œ CVE๊ฐ€ ๊ณต๊ฐœ๋œ ์‹œ์ ์—์„œ๋Š” gitlab์˜ ๊ณ„์ •/๊ถŒํ•œ์„ ๊ฐ€์ง„ ์œ ์ €๊ฐ€ ์•…์šฉ ๊ฐ€๋Šฅํ•˜๋‹ค๊ณ  ๊ณต๊ฐœ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ํ•ด์ปค๋“ค์˜ ์—ฐ๊ตฌ๊ฐ€ ์ด์–ด์กŒ์œผ๋ฉฐ ๊ถŒํ•œ์ด ์—†๋Š” ์ƒํƒœ์—์„œ๋„ ํ•ด๋‹น ์ทจ์•ฝ์ ์„ ์•…์šฉํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ๊ฒƒ์ด ๋ฐํ˜€์ง€๋ฉฐ, ๋”์šฑ ๋” ํŒŒ๊ธ‰๋ ฅ์ด ์ฆ๊ฐ€ํ•œ ์ทจ์•ฝ์ ์ž…๋‹ˆ๋‹ค.[1] [2]

์˜ฌํ•ด ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ๋ฐฉ์–ด๋Œ€ํšŒ ๋ณธ์„ (CCE)์—์„œ๋Š” ์ด ์ทจ์•ฝ์ ์„ ์ด์šฉํ•œ ๋ฌธ์ œ๊ฐ€ ์ถœ์ œ๋˜๊ธฐ๋„ ํ•˜์˜€์Šต๋‹ˆ๋‹ค.

[1] https://gitlab.com/gitlab-org/gitlab/-/issues/327121
[2] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22204

Colonial Pipeline Ransomeware

  • ๋žœ์„ฌ์›จ์–ด, Ransomware

์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์€ ๋ณดํ†ต ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„ ๋‚ด์—์„œ ์ด๋ฃจ์–ด์ง€๊ธฐ ๋•Œ๋ฌธ์— ์ผ๋ฐ˜์ธ๋“ค์—๊ฒŒ๋Š” ํ˜„์‹ค์ ์œผ๋กœ ๊ทธ ํ”ผํ•ด๊ฐ€ ์™€๋‹ฟ์ง€ ์•Š์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ํ•ด๋‹น ์‚ฌ๊ฑด์€ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์˜ ์˜ํ–ฅ์ด ์–ด๋–ป๊ฒŒ ์‹ค์ƒํ™œ๊นŒ์ง€ ๋ฏธ์น  ์ˆ˜ ์žˆ๋Š”์ง€ ๋‹ค์‹œ ํ•œ๋ฒˆ ์ƒ๊ฐํ•˜๊ฒŒ ๋˜๋Š” ์‚ฌ๊ฑด์ž…๋‹ˆ๋‹ค.

5์›” 7์ผ ๋ฏธ๊ตญ ์ตœ๋Œ€์˜ ์—ฐ๋ฃŒ ํŒŒ์ดํ”„๋ผ์ธ์ธ Colonial Pipeline์ด Ransomware์˜ ๊ณต๊ฒฉ์„ ํƒ์ง€ํ•˜๊ณ , ์ด์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•ด ํŒŒ์ดํ”„๋ผ์ธ์˜ ์šด์˜์„ ์ค‘๋‹จํ–ˆ์Šต๋‹ˆ๋‹ค. Colonial Pipeline์€ ๊ฑธํ”„๋งŒ์— ์œ„์น˜ํ•œ ์ •์œ ๊ณต์žฅ์—์„œ ๋ฏธ๊ตญ ๋‚จ๋ถ€ ๋ฐ ๋™๋ถ€๋กœ ์ •์œ ๋ฅผ ์šด์†กํ•˜๊ธฐ ์œ„ํ•ด ์„ค์น˜๋œ ํŒŒ์ดํ”„๋ผ์ธ์ž…๋‹ˆ๋‹ค. ๊ธธ์ด๋Š” 5500๋งˆ์ผ์— ๋‹ฌํ•˜๊ณ  ํ•˜๋ฃจ์— ์•ฝ 250๋งŒ ๋ฐฐ๋Ÿด์„ ์šด์†กํ•˜์—ฌ ๋™๋ถ€ํ•ด์•ˆ์—์„œ ์†Œ๋ชจ๋˜๋Š” ์—ฐ๋ฃŒ์˜ 45%๋ฅผ ๋‹ด๋‹นํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.

colonial-1.png

์†ก์œ ๊ด€ ์šด์˜์ค‘๋‹จ์˜ ์˜ํ–ฅ์œผ๋กœ ๋ฒ„์ง€๋‹ˆ์•„์ฃผ, ์กฐ์ง€์•„์ฃผ, ๋…ธ์Šค์บ๋กค๋ผ์ด๋‚˜์ฃผ, ์‚ฌ์šฐ์Šค์บ๋กค๋ผ์ด๋‚˜์ฃผ ๋“ฑ์—์„œ๋Š” ๊ธฐ๋ฆ„์„ ๊ตฌ์ž…ํ•˜๊ธฐ ์œ„ํ•ด์„œ ๋งŽ์€ ์‚ฌ์šฉ์ž๊ฐ€ ๋ชฐ๋ฆฌ๋ฉด์„œ 5์›” 18์ผ ๊ธฐ์ค€์œผ๋กœ ์•ฝ 10,600๊ฐœ์˜ ์ฃผ์œ ์†Œ์— ์—ฐ๋ฃŒ๊ฐ€ ๊ณ ๊ฐˆ๋˜์—ˆ์œผ๋ฉฐ, ์—ฐ๋ฃŒ ๋ถ€์กฑ์œผ๋กœ ํ•ญ๊ณต๊ธฐ ์ผ์ •๋“ฑ์˜ ์ฐจ์งˆ์ด ๋ฐœ์ƒํ•˜๊ธฐ๋„ ํ–ˆ์Šต๋‹ˆ๋‹ค.[1]

์šด์˜์ค‘๋‹จ 2์ผ ๋’ค์ธ 5์›” 9์ผ๋ถ€ํ„ฐ ์ผ๋ถ€ ํŒŒ์ดํ”„ ์ธก์„ ๋“ค์˜ ๊ฐ€๋™์„ ์‹œ์ž‘ํ–ˆ์œผ๋ฉฐ, 12์ผ ์šด์˜ ์žฌ๊ฐœ๋ฅผ ํ•˜๊ฒ ๋‹ค๋Š” ์„ฑ๋ช…์„ ๋ฐœํ‘œํ–ˆ์Šต๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ์™„์ „ํžˆ ์ •์ƒํ™”๋œ ๊ฒƒ์€ ์•„๋‹ˆ๋ฉฐ ๊ฐ„ํ—์ ์ธ ์šด์˜์ค‘๋‹จ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Œ์„ ์ด์•ผ๊ธฐํ–ˆ์Šต๋‹ˆ๋‹ค.

FBI๋“ฑ ์ •๋ถ€ ๊ธฐ๊ด€์€ ์ˆ˜์‚ฌ์— ์ฐฉ์ˆ˜ํ–ˆ์œผ๋ฉฐ, ํ•ด๋‹น ๊ณต๊ฒฉ์„ DarkSide๋ผ๋Š” ๋žœ์„ฌ์›จ์–ด ๋ฒ”์ฃ„์ง‘๋‹จ์˜ ์†Œํ–‰์œผ๋กœ ์ถ”์ •ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์‹ค์ œ๋กœ ์‚ฌ๊ฑด ๋ฐœ์ƒ ๋‹น์ผ, Darkside๋Š” ๋‹คํฌ๋„ท์— ์‚ฌ๊ณผ๋ฌธ์„ ๊ณต๊ฐœํ–ˆ์œผ๋ฉฐ "Colonial Pipeline"๋ฅผ ์ง์ ‘์ ์œผ๋กœ ์–ธ๊ธ‰ํ•˜์ง€๋Š” ์•Š์•˜์ง€๋งŒ โ€œ์˜ค๋Š˜์˜ ๋‰ด์Šคโ€๋ผ๋Š” ๋ง์„ ์‚ฌ์šฉํ•˜๋ฉฐ โ€œ์šฐ๋ฆฌ์˜ ๋ชฉํ‘œ๋Š” ๋ˆ์„ ๋ฒ„๋Š” ๊ฒƒ์ด์ง€ ์‚ฌํšŒ์  ๋ฌธ์ œ๋ฅผ ์ผ์œผํ‚ค๋ ค๋Š” ๊ฒŒ ์•„๋‹ˆ๋‹คโ€ ๋ผ๊ณ  ์ด์•ผ๊ธฐํ–ˆ์Šต๋‹ˆ๋‹ค.

๋žœ์„ฌ์›จ์–ด ๊ทธ๋ฃน์€ ์‚ฌ๊ฑด ์ฆ‰์‹œ 75 ๋น„ํŠธ์ฝ”์ธ (๋‹น์‹œ 500๋งŒ ๋‹ฌ๋Ÿฌ, ํ•œํ™” 50์–ต ์ƒ๋‹น)์„ ์š”๊ตฌํ•˜์˜€๊ณ , Colonial Pipeline๋Š” ํ•ด๋‹น ๊ธˆ์•ก์„ ์ง€๋ถˆํ•˜์˜€๋‹ค๊ณ  ํ•ฉ๋‹ˆ๋‹ค. FBI๋Š” 6์›” 7์ผ ์†ก์œ ๊ด€ ๋ณต๊ตฌ๋ฅผ ์œ„ํ•ด ์ง€๋ถˆํ•œ ๋น„ํŠธ์ฝ”์ธ์˜ ์ผ๋ถ€๋ฅผ ํšŒ์ˆ˜ํ–ˆ๋‹ค๊ณ  ๋ฐํ˜”์Šต๋‹ˆ๋‹ค. ๋žœ์„ฌ์›จ์–ด๋กœ ๋ฒŒ์–ด๋“ค์ธ ์ž๊ธˆ์ด ์ €์žฅ๋œ ์ง€๊ฐ‘์˜ ๊ฐœ์ธํ‚ค๋ฅผ ๊ฐ€์ง€๊ณ  ๋น„ํŠธ์ฝ”์ธ์„ ํšŒ์ˆ˜ํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค๊ณ  ๊ณตํ‘œํ–ˆ์œผ๋‚˜, ๊ฐœ์ธํ‚ค๋ฅผ ์–ป์€ ๊ฒฝ์œ„์— ๋Œ€ํ•ด์„œ๋Š” ์ž์„ธํžˆ ๋ฐํžˆ์ง€ ์•Š์•˜์Šต๋‹ˆ๋‹ค.

์ด ํ›„ 11์›”์—๋Š” ๋ฏธ ์ •๋ถ€์—์„œ ๋žœ์„ฌ์›จ์–ด ๋ฒ”์ฃ„ ์ง‘๋‹จ์˜ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•˜๋Š” ์ž์—๊ฒŒ ์ตœ๋Œ€ ์ฒœ๋งŒ ๋‹ฌ๋Ÿฌ๋ฅผ ๋ณด์ƒํ•œ๋‹ค๋Š” ๋ฐœํ‘œ๋ฅผ ํ•˜๋ฉฐ, ์ ๊ทน์ ์ธ ์ˆ˜์‚ฌ๋ฅผ ์ง„ํ–‰ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ํ‹ฐ์˜ค๋ฆฌ๋Š” ๋“œ๋ฆผ๋ ˆํ„ฐ๋ฅผ ํ†ตํ•ด ์ง€๊ธˆ๋„ ์ผ์–ด๋‚˜๊ณ  ์žˆ๋Š” ๋‹ค์–‘ํ•œ ๋žœ์„ฌ์›จ์–ด ์‚ฌ๊ฑด ์†Œ์‹์„ ์ „ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค.[2] ์•„์ง ๋“œ๋ฆผํ•ต์„ ๊ฐ€์ž…ํ•˜์ง€ ์•Š์•˜๋‹ค๋ฉด, ์–ด์„œ ๊ฐ€์ž…ํ•ด์ฃผ์„ธ์š”! (https://dreamhack.io/)

[1] https://www.state.gov/reward-offers-for-information-to-bring-darkside-ransomware-variant-co-conspirators-to-justice/
[2] https://dreamhack.io/forum/community/964

๋งˆ์น˜๋ฉฐ

๋ณธ ๊ธ€์€ 2021๋…„ ์ƒ๋ฐ˜๊ธฐ์— ๋ฐœ์ƒํ•œ Hot๐Ÿ”ฅ ํ–ˆ๋˜ CVE์™€ ๋ณด์•ˆ ์‚ฌ๊ฑด/์‚ฌ๊ณ ๋ฅผ ๋‹ค๋ฃจ์–ด๋ณด์•˜์Šต๋‹ˆ๋‹ค. 2021๋…„ ํ•˜๋ฐ˜๊ธฐ๋Š” ๋‹ค์Œ ๊ธ€์—์„œ ๋‹ค๋ฃจ๋„๋ก ํ•˜๊ฒ ์Šต๋‹ˆ๋‹ค.๐Ÿ˜‹ ๋‹ค์Œ ์‹œ๊ฐ„์— ๋งŒ๋‚˜์š”~ ๐Ÿ‘‹

finish-1.png

About Theori

ํ‹ฐ์˜ค๋ฆฌ(Theori)๋Š” ํ˜์‹ ์ ์ด๊ณ  ํƒ„ํƒ„ํ•œ ๊ธฐ์ˆ ๋ ฅ์œผ๋กœ ๋‹ค์–‘ํ•œ ๋‚œ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๋Š” ์‚ฌ์ด๋ฒ„๋ณด์•ˆ R&D ์Šคํƒ€ํŠธ์—…์ž…๋‹ˆ๋‹ค. ํ‹ฐ์˜ค๋ฆฌ๋Š” 2016๋…„์— ์„ค๋ฆฝ๋˜์–ด ์ •๋ถ€ ๊ธฐ๊ด€ ๋ฐ ๊ธฐ์—… ๊ณ ๊ฐ๋“ค์„ ๋Œ€์ƒ์œผ๋กœ ์ฐจ๋ณ„์„ฑ ์žˆ๋Š” ๋ณด์•ˆ ์ปจ์„คํŒ… ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ, ๋‚œ์ œ๊ธ‰ ๋ณด์•ˆ ์—ฐ๊ตฌ ํ”„๋กœ์ ํŠธ ๋“ฑ ์•„๋ฌด๋‚˜ ํ•˜์ง€ ๋ชปํ•˜๋Š” ์ผ๋“ค์„ ๋…๋ณด์ ์œผ๋กœ ํ•ด๋‚ด๋ฉฐ ๋†’์€ ํ€„๋ฆฌํ‹ฐ์˜ ์—ฐ๊ตฌ ๊ธฐ๋ฐ˜ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์„ธ๊ณ„์  ๊ธฐ์ˆ ๋ ฅ์„ ๋ฐ”ํƒ•์œผ๋กœ ๊พธ์ค€ํ•˜๊ณ  ํ˜์‹ ์ ์ธ ์—ฐ๊ตฌ๊ฐœ๋ฐœ ๊ณผ์ •์„ ํ†ตํ•ด ํ˜„์žฌ์˜ ๊ธฐ์ˆ ์ด๋‚˜ ํ•ด๊ฒฐ์ฑ…์— ๋งŒ์กฑํ•˜์ง€ ์•Š๊ณ  ์ƒˆ๋กœ์šด ๊ธฐ์ˆ ๊ณผ ์ฐฝ์˜์ ์ธ ์•„์ด๋””์–ด๋ฅผ ์œ„ํ•ด ํ•ญ์ƒ ๋…ธ๋ ฅํ•˜๋Š” ์—ฐ๊ตฌ ์ค‘์‹ฌ์  ์ง‘๋‹จ์ž…๋‹ˆ๋‹ค. ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ต์œก, ๋ณด์•ˆ ์ปจ์„คํŒ…, ๋ฒ„๊ทธ๋ฐ”์šดํ‹ฐ ์šด์˜ ๋ฐ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ์œ„ํ˜‘ ์ •๋ณด ์ œ๊ณต์— ๋„์›€์ด ํ•„์š”ํ•˜์‹œ๋ฉด ์–ธ์ œ๋“  ํ‹ฐ์˜ค๋ฆฌ์—๊ฒŒ ์—ฐ๋ฝ์ฃผ์„ธ์š”!

#2021_hot_cve
์ž‘์„ฑ์ž ์ •๋ณด