¿À´ÃÀÇ Å°¿öµå : À̶õ, FBI, ¿ÀÇÂVPN, Ãë¾àÁ¡ ÆÐÄ¡
À̶õ Á¤ºÎµµ ÇØÅ·¿¡ °ü¿©ÇÏ°í Àִ°¡? À̶õ ÃøÀº ºÎÁ¤ Áß
¼Ò´Ï ÇÈó½º »çÅ ´õ Å©°Ô ¹øÁö°í ÀÖ¾î FBI °æ°í
[º¸¾È´º½º ¹®°¡¿ë] ¼Ò´Ï ÇÈó½º ÇØÅ· »ç°ÇÀÌ ÀÏÆĸ¸ÆÄ ÆÛÁö°í ÀÖ½À´Ï´Ù. ¿µÈ ¸î °³°¡ ÆÛÁö°í ÀÖ´Ù´Â ¼Ò¹®ÀÌ Àִµ¥, ±×°Íº¸´Ù ´õ ºü¸£°Ô ¸Ö¿þ¾î°¡ ÆÛÁö°í ÀÖ´Ù°í FBI°¡ °ø½Ä ¹ßÇ¥¸¦ Ç߳׿ä. °Ô´Ù°¡ ÀÌ ¸Ö¿þ¾î°¡ ÆÄÀÏÀ» ÈÉÄ¥ »Ó ¾Æ´Ï¶ó Çϵå¿þ¾î¸¦ ½Ï Áö¿î´Ù°íµµ ÇÕ´Ï´Ù. ¹Ì±¹ ±â¾÷µé¿¡°Ô´Â ÀÌ¿Í °ü·ÃÇÑ °æ°í°¡ ´Ù ³ª°£ »óŶó°í±îÁö Çϳ׿ä. ÀÚ¼¼ÇÑ º¸µµ´Â °ðÀ̾î Çϵµ·Ï ÇÏ°Ú½À´Ï´Ù.
¼¼°è ¡®ÇØÅ·¡¯ Á¤¼¼°¡ ½É»óÄ¡ ¾Ê½À´Ï´Ù. À̶õ Á¤ºÎµµ ÇØÅ· ºÎ´ë¸¦ ¿î¿µÇÏ°í ÀÖ´Â µíÇÑ Á¤È²ÀÌ Æ÷ÂøµÇ°í ÀÖ°í, Á¤Ä¡ÀûÀÎ Àǵµ¸¦ ³ë°ñÀûÀ¸·Î µå·¯³»°í ÀÖ½À´Ï´Ù. ¹°·Ð À̶õ Á¤ºÎ´Â À̸¦ °·ÂÈ÷ ºÎÀÎÇÏ°í ÀÖ°í¿ä. ¿©±â¿¡ ÇÙ °ü·Ã ³íÀïÀÌ ³¢¾îÀÖ¾î ÀÌ°Ô ¸ðÇÔÀÏ °¡´É¼ºµµ ¾øÁö ¾Ê½À´Ï´Ù. ±¹Á¦ °ü°è´Â ÂüÀ¸·Î º¹ÀâÇÕ´Ï´Ù. ¾Æ´Ï, Àΰ£ÀÇ ÀÌÇØ°ü°è¶õ °Ô ´Ù ±×·± °É±î¿ä. ±×·± ¿ÍÁß¿¡ ¸ðÁú¶ó¿Í IBM¿¡¼ Á¦¶§ Á¦¶§ ÆÐÄ¡¸¦ ¹ßÇ¥Çؼ Ãß°¡ »ç°í¸¦ »çÀü¿¡ Â÷´ÜÇß½À´Ï´Ù.
1. À̶õ, ¼¼°è Áß¿ä ÀÎÇÁ¶ó ÇØÅ·°ú ¿¬°ü ÀÖ¾î(Threat Post)
http://threatpost.com/report-connects-iran-to-critical-infrastructure-hacks-worldwide/109666
À̶õÀÌ µÚ¸¦ ºÁÁÖ´Â ÇØÄ¿µé ÀÎÇÁ¶ó ¾÷ü °ø°Ý(Security Week)
http://www.securityweek.com/iranian-sponsored-hackers-hit-critical-infrastructure-companies-research
À̶õ ÇØÄ¿µé Ä¡¸íÀûÀÎ ÀÎÇÁ¶ó ³ë·Á(SC Magazine)
http://www.scmagazine.com/cylance-report-details-operation-cleaver-attacks-on-companies-in-multiple-countries/article/386280/
À̶õ Á¤ºÎ¸¦ µÚ¿¡ ¾÷Àº µíÇÑ ÇØÄ¿µéÀÌ È°µ¿À» ÆîÄ¡°í ÀÖ½À´Ï´Ù. ƯÈ÷ ¼¼°è ¿©±âÀú±âÀÇ Ä¡¸íÀûÀÎ ÀÎÇÁ¶ó¸¦ ³ë¸®°í ÀÖ´Ù°í ÇÕ´Ï´Ù. º¸¾È ȸ»çÀÎ »çÀÏ·±½º(Cylance)°¡ ÃÖ±Ù ¹ß°£ÇÑ º¸°í¼¿¡ µû¸£¸é À̶õÀÇ ÇØÅ· ´É·Â°ú µ¿±â°¡ ¹ü»óÄ¡ ¾Ê´Ù¸ç, ¿À·¡µÈ ¼÷ÀûÀÎ ¹Ì±¹°ú À̽º¶ó¿¤¸¸À» ³ë¸®´Â °ÍÀÌ ¾Æ´Ï¶ó´Â Á¡¿¡ ÁÖ¸ñÇÒ ÇÊ¿ä°¡ ÀÖ´Ù°í Çß½À´Ï´Ù. ±×·± Á¡°ú ´õºÒ¾î ÀÎÇÁ¶ó¸¦ ÁÖ·Î °ø°ÝÇÏ´Â °É·Î ºÁ¼ ½ÇÁúÀûÀÎ À̵溸´Ù´Â ±¹Á¦ Á¤¼¼¿¡ ¾î¶² ¡®¿µÇâ·Â¡¯À» ³¢Ä¡±â À§Çؼ°¡ ¾Æ´Ò±î, ÇÏ´Â Àü¹®°¡µéÀÇ ºÐ¼®ÀÌ ÀÖ½À´Ï´Ù. À̸¦ ±×³É ³öµÎ¸é °á±¹ ¹°¸®ÀûÀÎ ¾ÈÀü±îÁö À§ÇùÀ» ¹ÞÀ» ¼ö ÀÖ°Ô µÉ °ÍÀ̶ó´Â ¿ì·Á°¡ °è¼ÓÇؼ ³ª¿À°í Àִµ¥¿ä, ¾î¶»°Ô º¸¸é ÀÌ¹Ì ³ª¸§ÀÇ ¿µÇâ·ÂÀ» °¡Á®°¬³×¿ä. ÇÏÁö¸¸ À̶õ Á¤ºÎ ÃøÀº ±Ù°Å ¾ø´Â ºñ³À̸ç ÇÙ °ü·Ã Åä·Ð¿¡¼ À¯¸®ÇÑ À§Ä¡¸¦ ¼±Á¡ÇÏ°íÀÚ ÇÏ´Â ¼ú¼ö¶ó°í °·ÂÇÏ°Ô ºñÆÇÇß½À´Ï´Ù.
2. FBI Æı«·Â ³ôÀº ¸Ö¿þ¾î ÃâÇö °ø°Ý(Infosecurity Magazine)
http://www.infosecurity-magazine.com/news/fbi-warns-us-firms-of-malware/
FBI ¹Ì±¹ »ç¾÷üµé¿¡ ¿ÍÀÌÆÛ ¸Ö¿þ¾î Á¶½ÉÇÒ °Í ´çºÎ(Threat Post)
http://threatpost.com/fbi-warns-us-businesses-of-possible-wiper-malware-attacks/109662
FBI ¼Ò´Ï ÇÈó½º »çÅ ÀÌÈÄ µð½ºÅ© ´ºÅ© ¸Ö¿þ¾î °æ°í(The Register)
http://www.theregister.co.uk/2014/12/02/malware_warning_follows_sony_megahack/
¼Ò´Ï ÇÈó½º »çÅ ¼ö»ç ÁßÀÎ FBI, µ¥ÀÌÅÍ À¯Ã⠽ɰ¢ÇØ(Security Week)
http://www.securityweek.com/fbi-probing-sony-hack-data-leaks-emerge
FBI, ¹Ì±¹ ±â¾÷µé¿¡ µ¥ÀÌÅÍ Áö¿ì´Â ¸Ö¿þ¾î °æ°í(SC Magazine)
http://www.scmagazine.com/fbi-warns-us-firms-of-data-wiping-malware-following-sony-attack/article/386267/
¼Ò´Ï ÇØÅ· : FBIÀÇ ¸Ö¿þ¾î °æ°í(CU Infosecurity)
http://www.cuinfosecurity.com/sony-hack-fbi-issues-malware-alert-a-7628
FBI °æ°í ¡°Å¸±êÇü °ø°Ý, ÈÉÄ¡´Â °Í¿¡ ±×Ä¡Áö ¾Ê¾Æ¡±(Dark Reading)
http://www.darkreading.com/attacks-breaches/fbi-warning-shows-targeted-attacks-dont-just-steal-anymore/d/d-id/1317826?
¿À´ÃÀº FBI ¼Ò½ÄÀÌ ÇØ¿Ü º¸¾È ¸Åü Çìµå¶óÀÎÀ» ½Ï¾µÀÌ Çß½À´Ï´Ù. ¹«½¼ ÀÏÀÎÁö ´ë·« Á¦¸ñ¸¸ ºÁµµ ¾Æ½Ã°ÚÁÒ? Áö³ ÁÖ¿¡ ¼Ò´Ï ÇÈ󽺸¦ ÇØÅ·ÇÏ´Â µ¥ »ç¿ëµÇ¾ú´ø ¼ö¹ý ȤÀº ¸Ö¿þ¾î°¡ °è¼ÓÇؼ ÆÛÁö°í ÀÖ´Â µí ÇÕ´Ï´Ù. °Ô´Ù°¡ ±×³É Á¤º¸¸¦ ÈÉÄ¡´Â °Ô ¾Æ´Ï¶ó ÇÇÇØÀÚ ½Ã½ºÅÛÀÇ ÆÄÀϵ鵵 ´Ù Áö¿ì´Â ±â´ÉÀ» °¡Áö°í ÀÖ´Ù°í Çϳ׿ä. ¼Ò´Ï ÇÈó½º »ç°ÇÀ» ¼ö»çÇÏ°í ÀÖ´Â FBI¿¡¼ Á÷Á¢ ³ª¿Â °æ°íÀÌ´Ï ½Å·Ú¼ºÀÌ ³ô½À´Ï´Ù. ÀÚ¼¼ÇÑ º¸µµ´Â ¿À´Ã ¾È¿¡ µ¶¸³ ±â»ç·Î ¿Ã¸®µµ·Ï ÇÏ°Ú½À´Ï´Ù.
3. ¿ÀÇÂVPN, ºü¸£°Ô µµ½º ¿À·ù ¼öÁ¤(Infosecurity Magazine)
http://www.infosecurity-magazine.com/news/openvpn-moves-swiftly-to-patch-dos/
¿ÀÇÂVPN, µµ½º Ãë¾àÁ¡ ÆÐÄ¡ ¹èÆ÷(Threat Post)
http://threatpost.com/openvpn-patches-denial-of-service-vulnerability/109674
¿ÀÇÂVPN, 2005³â ÀÌÈÄ Ã³À½ »õ ¹öÀü ¹ßÇ¥(Security Week)
http://www.securityweek.com/openvpn-versions-released-2005-affected-critical-flaw
Áö³ 11¿ù¸», ¿ÀÇÂVPN¿¡ CVE-2014-8104 Ãë¾àÁ¡ÀÌ º¸°íµÇ¾ú°í, ¹Ù·Î ¾îÁ¦ ÇȽº°¡ ¹ßÇ¥µÇ¾ú½À´Ï´Ù. TLS ÀÎÁõ Ŭ¶óÀ̾ðÆ®¿¡¼ ±²ÀåÈ÷ ªÀº ÄÁÆ®·Ñ ä³Î ÆÐŶÀ» Àü¼ÛÇØ ¼¹ö¸¦ ¸Á°¡Æ®¸± ¼ö ÀÖ°Ô ÇØÁÖ´Â Ãë¾àÁ¡À¸·Î µå¶ó°¡³ª ´ãÀÚ³ëºñÄ¡(Dragana Damjanovic)°¡ óÀ½ ¹ß°ßÇØ Á¦º¸ÇÑ °ÍÀÔ´Ï´Ù. 2005³âºÎÅÍ ¹ßÇ¥µÈ 2.x ¹öÀüÀº ÀüºÎ Ãë¾àÇÑ °ÍÀ¸·Î µå·¯³µÀ¸¸ç 3.x ¹öÀüµéÀº ¾ÈÀüÇÏ´Ù°í ¾Ë·ÁÁ® ÀÖ½À´Ï´Ù. ÀÌ Ãë¾àÁ¡À» °ø°ÝÇßÀ» ¶§ ¿µÇâÀ» ¹Þ´Â °Ç ¼¹ö»ÓÀÌÁö °³ÀÎÁ¤º¸ µîÀº ¾ÈÀüÇÏ´Ù°í ÇÕ´Ï´Ù.
4. ¸ðÁú¶ó, Ãë¾àÁ¡ ¼öÁ¤ÇÏ°í ÆÄÀ̾îÆø½º 34¿¡¼ SSL 3.0 ºñÈ°¼ºÈ ½ÃÄÑ(Security Week)
http://www.securityweek.com/mozilla-fixes-vulnerabilities-disables-ssl-30-firefox-34
ÆÄÀ̾îÆø½º 34, SSL 3.0 Áö¿ø ¾È ÇÏ°í Ä¡¸íÀû ¹ö±× ¼öÁ¤(SC Magazine)
http://www.scmagazine.com/mozilla-addresses-poodle-by-disabling-ssl-30/article/386277/
Ǫµé °ø°ÝÀ¸·Î ÀÎÇØ SSL 3.0ÀÌ ¹®Á¦·Î ´ëµÎµÇ¸é¼ ÀÌ¿¡ ´ëÇÑ Áö¿øÀÌ ÇϳªÇϳª ²÷±â°í ÀÖ½À´Ï´Ù. Å©·Òµµ À̸¦ °èȹÇÏ°í ÀÖ°í, ¾ÆÁ÷ ¿Ïº®È÷ Áö¿øÀ» ²÷Àº °Ç ¾Æ´ÏÁö¸¸ ÀÌ¹Ì ÇöÀçÀÇ Å©·Ò ¹öÀü¿¡¼´Â SSL 3.0ÀÌ ºñÈ°¼ºÈ µÇ¾î Àֱ⵵ ÇÕ´Ï´Ù. °Å±â¿¡ À̾î ÆÄÀ̾îÆø½º 34¿¡¼µµ SSL 3.0¿¡ ´ëÇÑ Áö¿øÀÌ ²÷°å½À´Ï´Ù. ´õºÒ¾î ¿©´ü °¡Áö Ãë¾àÁ¡µµ ¼öÁ¤µÇ¾ú´Ù°í ÇÕ´Ï´Ù. ÀÌÁß ¼¼ °¡Áö´Â ¿ø°Ý ÄÚµå ½ÇÇàÀ» °¡´ÉÇÏ°Ô ÇØÁÖ´Â ¡®Ä¡¸íÀû¡¯ÀÎ Ãë¾àÁ¡À̾ú´Ù°í ÇÕ´Ï´Ù.
5. IBM, ¿£µåÆ÷ÀÎÆ® °ü¸® Á¦Ç°¿¡¼ ½É°¢ÇÑ ÄÚµå ½ÇÇà ¹ö±× ¼öÁ¤ÇØ(Threat Post)
http://threatpost.com/ibm-fixes-serious-code-execution-bug-in-endpoint-manager-product/109671
¸ðÁú¶ó¿¡ À̾î IBMµµ ½É°¢ÇÑ Ãë¾àÁ¡À» °íÃÆ´Ù°í ÇÕ´Ï´Ù. À̹ø¿¡´Â IBMÀÇ ¿£µåÆ÷ÀÎÆ® ¸Å´ÏÀú(Endpoint Manager)¶ó´Â Á¦Ç°¿¡¼ ¹ß°ßµÈ ¿ø°Ý ÄÚµå ½ÇÇà Ãë¾àÁ¡À» ¼öÁ¤Ç߳׿ä. ÀÌ Ãë¾àÁ¡Àº ±×°ÍÀÌ ¼³Ä¡µÇ¾î ÀÖ´Â PC»Ó ¾Æ´Ï¶ó °°ÀÌ ¿¬µ¿µÇ´Â ¸ð¹ÙÀÏ ±â±â ÀüºÎ¿¡±îÁö ¿µÇâÀ» ¹ÌÄ¡±â ¶§¹®¿¡ »ó´çÈ÷ ¡®Ä¡¸íÀû¡¯ÀÌ°í À§ÇèÇÑ Ãë¾àÁ¡À̾ú½À´Ï´Ù. °Ô´Ù°¡ ±× ±â±â Á¾·ù°¡ ·¦Å¾, ÀüÈ±â »Ó ¾Æ´Ï¶ó POS ±â±âµµ Æ÷ÇԵǾî ÀÖ¾ú±â ¶§¹®¿¡ ´õ´õ¿í Å« »ç°ÇÀ¸·Î ¹øÁú ¼ö ÀÖ¾ú´Ù°í ÇÕ´Ï´Ù. ¸ðÀÇ ÇØÅ· ÆÀ°ú ÇÔ²² ÀÌ Ãë¾àÁ¡À» ¹ß°ßÇÑ IBMÀº À̹ø¿¡ ÆÐÄ¡¸¦ Çϱä ÇßÁö¸¸ ¿©ÀüÈ÷ ¿ìȸÇؼ °ø°Ý´çÇÒ °¡´É¼ºÀÌ ³²¾Æ Àֱ⠶§¹®¿¡ °è¼ÓÇؼ ÁÖ½ÃÇÏ°í ÀÖ°Ú´Ù°í ÇÕ´Ï´Ù.
[±¹Á¦ºÎ ¹®°¡¿ë ±âÀÚ(globoan@boannews.com)]
<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(http://www.boannews.com/) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>