1、微软称谷歌发现漏洞被俄方APT组织利用
标题:MICROSOFT SAYS RUSSIAN APT GROUP BEHIND ZERO-DAY ATTACKS
作者信息:November 1, 2016 , 5:50 pm by Michael Mimoso
//BEGIN
Microsoft has singled out Sofacy, an APT group long thought to have ties to Russia’s military intelligence arm GRU, as the entity behind targeted attacks leveraging Windows kernel and Adobe Flash zero days in targeted attacks.
微软称最新被Google披露的2个0day漏洞后面有一个APT组织在利用,这个APT组织似乎与俄罗斯的秘密军事情报组织相关联,据称被用来采取定向攻击,分别利用Windows内核的0day漏洞1个以及Adobe的Flash的0day漏洞1个。
//END
Yesterday’s abrupt disclosure by Google was in accordance with its internal policies, which gives vendors 60 days to patch critical vulnerabilities, or notify users about the risk and any workarounds or temporary mitigations, and seven days to at a minimum report on critical flaws under active exploitation. “Seven days is an aggressive timeline and may be too short for some vendors to update their products, but it should be enough time to publish advice about possible mitigations, such as temporarily disabling a service, restricting access, or contacting the vendor for more information,” Google said in 2013 upon publicizing its disclosure policy.
Google在昨天“突然”公开这2个0day漏洞的被利用的消息使得微软和Adobe多少有些措不及防,微软并称这种方式并不合适,“我们的责任是保护我们的用户的资产安全”。但是Google声称它是按照该公司自身的漏洞披露策略:通报给厂商后,给其60天的修补时间或者通知用户风险的存在,并建议用户的临时防护策略。对正在被利用的严重级别的漏洞则只给7天的时间。“七天虽然比较短,但是给用户发布临时避险措施和方法还是足够的:比如可以暂停某些服务、限制某些访问策略以及直接联系开发商等等”以上这是Google在2013年公布的其漏洞发布策略。
点评:MS,谷歌,俄罗斯的所谓APT组织都是大角色。 |