¿À´ÃÀÇ Å°¿öµå : ¾ÖÇðú Áß±¹, Ç÷¡½Ã, ¾Èµå·ÎÀ̵å, PHP
»çÀ̹ö ¹üÁË ´ëÀÀÇÏ´Â Á¤ºÎ ´ÜÀ§ ¿òÁ÷ÀÓ Á¡Á¡ Ä¿Áö°í ÀÖ¾î
[º¸¾È´º½º ¹®°¡¿ë] ¾ÖÇÃÀÌ ±×µ¿¾È Á¶¿ëÇÏ´Ù Çß´õ´Ï ÆÀ ÄîÀÌ ¾îÁ¦ Áß±¹ ºÎÃѸ®¸¦ ¸¸³µ±º¿ä. ±×·¯¸é¼ Áß±¹Àº ¶Ç È£ÁÖ º¯È£»ç¶ó´Â ½ÃÀåÀ» °³Ã´Çß°í¿ä. ¿µ±¹ ±¹°¡±â°üÀº °æÂû °æ·Â ¾ø¾îµµ ÄÄÇ»ÅÍ ±â¼ú ÃâÁßÇÑ ÀÎÀ縦 »Ì°í ÀÖ°í, À̶õ¿¡¼´Â ±¹°¡ ÁÖ¿ä ½Ã¼³ ±Ùó¿¡¼ ½ºÆÄÀ̸¦ Àâ¾Ò´Ù°í ÇÕ´Ï´Ù. ¾Èµå·ÎÀ̵å´Â ¹Ù¶÷ Àß³¯ ¾øÀ¸´Ï ¾Æ´Â »ç¶÷ÇÑÅ× ¿À´Â ¹®ÀÚµµ Á¶½ÉÇؼ ¹ÞÀ¸¼¼¿ä. ¾îÁ¦´Â °æÁ¦, ¿À´ÃÀº ±¹°¡, Á¤º¸º¸¾ÈÀÇ È°µ¿ºÐ¾ß ½ºÄÉÀÏÀÌ ³²´Ù¸¨´Ï´Ù. ±×¸¸Å ÇØÄ¿µéÀÇ ¿òÁ÷ÀÓÀº ´õ »¡¶óÁö°í ÀÖÁö¿ä. ¾îµµºñ Áö³ ÁÖ¿¡ ÆÐÄ¡Çߴµ¥ ¹ú½á ¶Õ¸®´Ù´¢.
¡ã ¡°¾ÖÇà »çÀå ¿Ô´Ù¸ç?¡± ¡°½². ±×³É Æò»ó½Ãó·³ ÇൿÇØ.¡±
1. ¾ÖÇÃ, Áß±¹ÀÇ Áß°£ÀÚ °ø°Ý ÀÎÁ¤(Infosecurity Magazine)
http://www.infosecurity-magazine.com/news/apple-admits-mitm-icloud-attack/
Áß±¹ ´ç±¹ÀÌ ¾ÖÇÃÀÇ ¾ÆÀÌŬ¶ó¿ìµå¸¦ ÅëÇØ Áß°£ÀÚ °ø°ÝÀ» ½ÇÇàÇÏ°í ÀÖ´Ù´Â °É ¿©·¯ Àü¹®°¡°¡ ÁÖÀåÇÑ ¹Ù ÀÖÁö¸¸ ¾ÖÇÃÀº ±× µ¿¾È °è¼Ó ħ¹¬À» ÁöÄÑ¿Ô¾úÁÒ. Àû¾îµµ Áß±¹À» ¾ð±ÞÇÏÁö´Â ¾Ê¾Ò½À´Ï´Ù. ±×·¯´Ù°¡ µåµð¾î °ø½ÄÀûÀ¸·Î ÀÎÁ¤Çß½À´Ï´Ù. ÇÏÁö¸¸ ¾ÆÀÌŬ¶ó¿ìµå ¼¹ö ÀÚü°¡ ±×µé ¼Õ¿¡ ³Ñ¾î°£ °Ç ¾Æ´Ï¶ó°í ÇÕ´Ï´Ù.
2. ÆÀ Äî, º£ÀÌ¡ ¹æ¹®ÇØ Áß±¹ Á¤ºÎ ÀÎ»ç ¸¸³ª(Security Week)
http://www.securityweek.com/apple-ceo-meets-chinese-official-amid-icloud-hacking-row
¾ÖÇðú Áß±¹ÀÇ ½Å°æÀüÀÌ ¿¹»ç·ÓÁö ¾ÊÀº °¡¿îµ¥ ÆÀ ÄîÀÌ Áß±¹ ºÎÃѸ®¸¦ ¸¸³µ´Ù´Â ¼Ò½ÄÀÔ´Ï´Ù. ¹Ù·Î ¾îÁ¦ ÀÏÀÔ´Ï´Ù. ´ëÈ ÁÖÁ¦´Â »ç¿ëÀÚÀÇ Á¤º¸ º¸È£, Á¤º¸ ¹× Åë½Å ºÐ¾ßÀÇ Çùµ¿ °È¿´´Ù°í Áß±¹ ¾ð·ÐÀº ÀüÇÏ°í Àִµ¥¿ä, ¾ÆÁ÷ ¾ÖÇÃÀÇ °ø½Ä ÀÔÀåÀº ³ª¿À°í ÀÖÁö ¾ÊÀº »óÅÂÀÔ´Ï´Ù. ÀÌ°Í ¶§¹®¿¡ ±×µ¿¾È Áß±¹À» ¾ð±ÞÇÏÁö ¾Ê°í È¥ÀÚ ²þ²þ ¾Î¾Æ¿Ô´ø °Íµµ °°½À´Ï´Ù.
3. ¿µ±¹ ±¹°¡¹üÁ˼ö»ç±¹(Àϸí NCA), »çÀ̹ö ¹üÁË Àü´ã¹Ý Àοø ´Ã·Á(Infosecurity Magazine)
http://www.infosecurity-magazine.com/news/nca-touts-for-new-recruits-to/
¼ö»ç°ü °æ·ÂÀÌ ¾ø´õ¶óµµ ÀοøÀ» È®ÃæÇÏ°Ú´Ù´Â NCA´Â ´ë½Å ¼ÒÇÁÆ®¿þ¾î °³¹ß, ³×Æ®¿öÅ© ¿£Áö´Ï¾î¸µ, µðÁöÅÐ Æ÷·»½Ä, ¿Â¶óÀÎ ¼ö»ç ±â¼ú·ÂÀ» °®Ãá »ç¶÷À» »Ì°Ú´Ù°í ÇÕ´Ï´Ù. »çÀ̹ö ¹üÁË°¡ ´õ ÀÌ»ó ±âÁ¸ ¹üÁËÀÇ °ç°¡Áö°¡ ¾Æ´Ï¶ó ÁÖ·ù Áß Çϳª·Î ÀÎÁöµÇ°í ÀÖ½À´Ï´Ù. ÁÁ¾ÆÇØ¾ß Çϳª ¸»¾Æ¾ß Çϳª...
4. À̶õ ´ç±¹ ¿øÀÚ·Î º¸À¯ Áö¿ª¿¡¼ »çÀ̹ö ½ºÆÄÀÌ Ã¼Æ÷(Security Week)
http://www.securityweek.com/iran-arrests-spies-province-nuclear-reactor
À̶õÀÇ ºÎ½Ã¸£ Áö¿ªÀº À̶õ¿¡¼ À¯ÀÏÇÏ°Ô ¿øÀڷΰ¡ Á¸ÀçÇÏ´Â °÷ÀÔ´Ï´Ù. ±×·¡¼ÀÎÁö À̶õÀÇ °æÁ¦, »ê¾÷, ±º»ç, »ó¾÷ÀÇ Çãºê¶ó°íµµ ºÒ¸®Áö¿ä. ¹Ù·Î ÀÌ°÷¿¡¼ »çÀ̹ö ½ºÆÄÀ̵éÀ» °Ë°ÅÇÏ´Â µ¥¿¡ ¼º°øÇߴٴµ¥ ¾ÆÁ÷ ÇØÄ¿µéÀÇ ±¹Àû°ú ¼ýÀÚ´Â ¹àÈ÷Áö ¾Ê°í ÀÖ½À´Ï´Ù.
5. Áö³ ÁÖ ÆÐÄ¡ µÈ Ç÷¡½Ã, ¹ú½á °ø·« ½ÃÀÛ(Threat Post)
http://threatpost.com/exploit-for-patched-flash-vulnerability-already-in-two-exploit-kits/108972
ÆÐÄ¡µÈÁö ÀÌÁ¦ 1ÁÖÀϹۿ¡ ¾È Áö³µ´Âµ¥, ¹ú½á Ç÷¡½Ã Ãë¾àÁ¡ÀÇ ÀͽºÇ÷ÎÀÕ Å¶ÀÌ µ¹¾Æ´Ù´Ï°í ÀÖ½À´Ï´Ù. ÇÑ Àü¹®°¡´Â ÆÐÄ¡°¡ ÀÌ·¸°Ô »¡¸® ¹«¿ëÁö¹°ÀÌ µÇ¾î¹ö¸®´Â °Ç óÀ½ º¸´Â ÀÏÀ̶ó°í ÇÕ´Ï´Ù. ÀÌ¹Ì ÇØÄ¿µé »çÀÌ¿¡¼´Â ÀÌ Ãë¾àÁ¡À» °ø·«ÇÑ ÇÇ¿¡½ºÅ¸(Fiesta)¿Í ¾Þ±Û·¯(Angler)¶ó´Â ÀͽºÇ÷ÎÀÕ Å¶ÀÌ Àº¹ÐÇÏ°Ô µ¹¾Æ´Ù´Ï°í ÀÖ´ä´Ï´Ù.
6. NIST, ÇÏÀÌÆÛ¹ÙÀÌÀú º¸¾È °¡ÀÌµå ¹ß°£(Threat Post)
http://threatpost.com/nist-publishes-draft-hypervisor-security-guide/108966
ÇÏÀÌÆÛ¹ÙÀÌÀú¶õ ÇÁ·Î¼¼¼³ª ¸Þ¸ð¸®¿Í °°Àº ´Ù¾çÇÑ ÄÄÇ»ÅÍ ÀÚ¿ø¿¡ ¼·Î ´Ù¸¥ °¢Á¾ ¿î¿µ ü°è(OS)ÀÇ Á¢±Ù ¹æ¹ýÀ» ÅëÁ¦ÇÏ´Â ¾ãÀº °èÃþÀÇ ¼ÒÇÁÆ®¿þ¾î, Áï ´Ù¼öÀÇ OS¸¦ ÇϳªÀÇ ÄÄÇ»ÅÍ ½Ã½ºÅÛ¿¡¼ °¡µ¿ÇÒ ¼ö ÀÖ°Ô ÇÏ´Â ¼ÒÇÁÆ®¿þ¾î¶ó°í ³×À̹ö ¹é°ú¿¡ ³ª¿Í Àֳ׿ä. NIST¿¡¼ 3³â° ½Ã¸®Áî·Î ¹ß°£ÇÏ°í ÀÖ´Â °¡»óÈ º¸¾È °¡À̵åÀÇ ÀÏȯÀÔ´Ï´Ù. À̹ø ÁÖ¿¡ ³ª¿Â °Ç ÃʾÈÀÌ°í ´ëÁßÀÇ ÀÇ°ßÀ» ¼ö·ÅÇÏ´Â °Ç 11¿ù 10ÀϱîÁöÀÔ´Ï´Ù.
7. PHP, Ãë¾àÁ¡ ÆÐÄ¡(Threat Post)
http://threatpost.com/php-patches-vulnerabilities-including-remote-code-execution-flaw/108960
5.6.1, 5.5.17, 5.4,33¹öÀü¿¡¼ ¹ß°ßµÈ ¹öÆÛ ¿ÀÆÛºí·Î¿ì¿Í ¿ø°Ý ÄÚµå ½ÇÇàÀ» °¡´ÉÇÏ°Ô ÇÏ´Â PHPÀÇ Ãë¾àÁ¡ÀÌ ÆÐÄ¡µÇ¾ú½À´Ï´Ù. CVE-2014-3669, CVE-2014-3668, CVE-2014-3670ÀÌ ÁÖ·Î ´Ù·ïÁø Ãë¾àÁ¡À̶ó°í ÇÕ´Ï´Ù.
8. ¾Èµå·ÎÀ̵å À̹ÌÁö¿¡ ÄÚµå ¼û±è °¡´É(The Register)
http://www.theregister.co.uk/2014/10/22/android_can_be_tricked_into_loading_malware_obfuscated_in_pngs/
¾Èµå·ÎÀ̵å üÁ¦¿¡¼ ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î¸¦ ¸¶Ä¡ À̹ÌÁö ÆÄÀÏÀÎ °Íó·³ ÆÐŰ¡ ÇÏ°í Àº´ÐÇÏ´Â °É °¡´ÉÄÉ ÇØÁÖ´Â Ãë¾àÁ¡ÀÌ ¹ß°ßµÇ¾ú½À´Ï´Ù. ¾ó¸¶ Àü µ¿¿µ»ó ¾È¿¡ µ¥ÀÌÅ͸¦ ¼û°Ü¼ »©µ¹¸®´Â ±â»ç°¡ º¸¾È´º½º¿¡¼ ³ª°¬´Âµ¥¿ä, ±×°Í°ú ¹º°¡ ºñ½ÁÇØ º¸ÀÔ´Ï´Ù.
9. Áß±¹ APT ´Üü, È£ÁÖ º¯È£»çµé °ø°Ý(The Register)
http://www.theregister.co.uk/2014/10/21/bakers_dozen_of_apt_groups_popping_aussie_biz/
¹ú¸¸ ÂѾư¡¸é ²ÜÀ» µþ ¼ö ÀÖÁÒ. ÇØÄ¿µé ÂѾư¡µµ ¸¶Âù°¡ÁöÀÔ´Ï´Ù. Áß±¹ÀÌ È£ÁÖ º¯È£»çµéÀ» °ø°ÝÇÏ°í ÀÖ´Ù¸é, ±×°÷¿¡µµ ¹º°¡ ²ÜÀÌ ÀÖ´Ù´Â ¼Ò¸®ÀÔ´Ï´Ù. ¾Æ´Ï³ª ´Ù¸¦±î ¿©·¯ ±â¾÷ÀÇ Áß¿äÇÑ Á¤º¸µéÀÌ ´Ù·®À¸·Î µµ³´çÇߴٳ׿ä. ¾ÕÀ¸·Î º¯È£»ç »ç¹«½Çµµ ¾ÈÀüÇÏÁö ¸øÇÏ°Ô µÇ¾ú½À´Ï´Ù.
10. ¾Èµå·ÎÀÌµå ·£¼¶¿þ¾î ÄÝ·¯(Koler)ÀÇ ¿ú ¹öÀü , SMS ÅëÇØ ¹øÁ®(SC Magazine)
http://www.scmagazine.com/worm-variant-of-android-ransomware-koler-spreads-via-sms/article/378785/
¼ºÀÎ »çÀÌÆ®¿¡ Á¢¼ÓÇÑ ÀûÀÌ ÀÖ´Â »ç¿ëÀÚ¸¦ ÁÖ·Î ³ë¸° ȸé Àá±ÝÇü ·£¼¶¿þ¾îÀÎ ÄÝ·¯°¡ ¹ß°ßµÈ °Ç Áö³ 5¿ùÀ̾úÁÒ. ±×·±µ¥ ÀÌ ·£¼¶¿þ¾î°¡ ¿úÀÇ ÇüÅ·ΠÁö±Ý µ¹¾Æ´Ù´Ï°í ÀÖ´Ù´Â ¼Ò½ÄÀÔ´Ï´Ù. Àüȱ⿡ ÄÝ·¯°¡ ħÀÔÇÏ¸é ±× Àüȱ⿡ ÀúÀåµÈ ¸ðµç ¿¬¶ôó¿¡ ¾Ç¼º ¹®ÀÚ¸¦ º¸³»°í, ±× ¹®ÀÚ¿¡ ¿¬°áµÈ ¸µÅ©¸¦ Ŭ¸¯Çϸé ȸéÀÌ Àá±é´Ï´Ù. ÀÌÁ¦ ¾Æ´Â »ç¶÷ÇÑÅ× ¹®ÀÚ°¡ ¿Íµµ Á¶½ÉÇØ¾ß ÇÕ´Ï´Ù.
[±¹Á¦ºÎ ¹®°¡¿ë ±âÀÚ(globoan@boannews.com)]
<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(http://www.boannews.com/) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>