¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿ÃÅÔâµ½ÀÕË÷¹¥»÷´óÁ¿Êý¾Ýй¶
Ðû²¼Ê±¼ä 2023-08-071¡¢¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿ÃÅÔâµ½ÀÕË÷¹¥»÷´óÁ¿Êý¾Ýй¶
¾Ý8ÔÂ4ÈÕ±¨µÀ£¬ÃÀ¹ú¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿ÃÅ(CDHE)Ôâµ½ÀÕË÷¹¥»÷£¬µ¼ÖÂÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶Ê¼þ¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£ÊÓ²ìÏÔʾ£¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ·ÃÎÊÁËCDHEµÄϵͳ£¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý¡£CDHEûÓÐ͸¶Óм¸¶àÈËÊܵ½Ó°Ï죬µ«ÓÉÓÚÎ¥¹æµÄʱ¼ä¿ç¶È´Ó2004Äêµ½2020Ä꣬¿ÉÄÜÉæ¼°´óÁ¿Ñ§ÉúºÍÔ±¹¤¡£CDHE½«ÎªÊÜÓ°ÏìµÄ¸öÈËÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿Ø·þÎñ¡£
https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/
2¡¢Ñо¿ÈËÔ±ÑÝʾÈçºÎÔ½ÓüÌØ˹ÀÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿
¾ÝýÌå8ÔÂ6ÈÕ±¨µÀ£¬°ØÁÖ¹¤Òµ´óѧµÄÑо¿ÈËÔ±¿ª·¢ÁËÒ»ÖÖÒªÁ죬¿ÉÒÔÔ½Óü×îÐÂÌØ˹À³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ¡£´ËÍ⣬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØ˹ÀÔÚÆä·þÎñÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿£¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨¹¦Ð§£¬Èç×ùÒμÓÈȵȸ¶·Ñ¹¦Ð§¡£ÌØ˹ÀµÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU£¬Òò´ËÑо¿ÈËÔ±¿ÉÒÔʵÑéÀûÓÃ֮ǰ·¢Ïֵĩ¶´ÊµÏÖÔ½Óü¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ¾ÙÐеÄBlackHat 2023Ñݽ²ÖйûÈ»¡£
https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/
3¡¢AhnLab·¢ÏÖÕë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit
ýÌå8ÔÂ5Èճƣ¬AhnLab·¢ÏÖÀûÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ£¿éRootkit£¬¿ÉÔÚGitHubÉÏ»ñÈ¡£¬ÓëÆäËüRootkit²îÒ죬Ëü»¹Ìṩ·´Ïòshell¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£©£¬ÔÚ±»Ñ¬È¾ÏµÍ³ÉÏ´ò¿ªÌض¨¶Ë¿Ú£¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´½¨Á¢C2Á¬½Ó¡£×Ô2022ÄêÒÔÀ´£¬ÖÁÉÙÓÐ4¸ö²îÒìµÄ»î¶¯ÀûÓÃÁËReptile¡£Ñо¿ÈËÔ±³Æ£¬ÓÉÓÚ´úÂ뿪Դ£¬ReptileºÜÈÝÒ×±»ÖÖÖÖ¹¥»÷ÍÅ»ïÀûÓá£
https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html
4¡¢PaperCutÐÞ¸´NG/MF´òÓ¡¹ÜÀíÈí¼þ©¶´CVE-2023-39143
8ÔÂ5ÈÕ±¨µÀ³Æ£¬Ñо¿ÈËÔ±ÔÚWindows°æ±¾PaperCut´òÓ¡¹ÜÀíÈí¼þÖз¢ÏÖÁËÒ»¸öеĩ¶´£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£ÕâÊÇÒ»¸ö·¾¶±éÀú©¶´£¨CVE-2023-39143£©£¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«ÈÎÒâÎļþ£¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾¡£Ñо¿ÈËÔ±³Æ£¬¸Ã©¶´Ö»Ó°ÏìÍⲿÉ豸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÅäÖõķþÎñÆ÷£¬µ«´ó¶àÊýWindows PaperCut·þÎñÆ÷¶¼ÆôÓÃÁ˸ù¦Ð§¡£Ä¿Ç°£¬¸Ã©¶´Òѱ»ÐÞ¸´¡£
https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html
5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úÕþ¸®³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶
ýÌå8ÔÂ3ÈÕ±¨µÀ£¬Íâ°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËÒ»ÆðÊý¾Ýй¶Ê¼þ£¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢¡£SercoµÄ¿Í»§°üÂÞÃÀ¹ú¹úÍÁÄþ¾²²¿¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úÇ鱨»ú¹¹ºÍ¶à¸öÎä×°¶ÓÎ飬2022ÄêÊÕÈ볬57ÒÚÃÀÔª¡£Ð¹Â¶Ô´ÓÚÆ丣Àû¹ÜÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)·þÎñÆ÷Ôâµ½¹¥»÷¡£¹¥»÷ʼÓÚ5Ô·ݣ¬CBIZÔÚ6ÔÂ5ÈÕ½ÓÄÉ´ëÊ©»º½â¸Ãʼþ£¬SercoÓÚ6ÔÂ30ÈÕ»ñϤ´Ë´Î¹¥»÷ºÍй¶Ê¼þ¡£
https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/
6¡¢Trend MicroÐû²¼½üÆÚBatloader¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß
8ÔÂ7ÈÕ£¬Trend MicroÐû²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£Ñо¿ÈËÔ±·¢ÏÖ£¬Batloader±³ºóµÄºÚ¿Í£¨ÃüÃûΪWater Minyades£©ÒÑ¿ªÊ¼Ê¹Óà Pyarmor ProÀ´»ìÏýÆäÖ÷Òª¶ñÒâPython½Å±¾¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»Ö±ÔÚʹÓÃPyarmor£¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor³ß¶È°æ±¾¡£³ýÁËÈƹý¼¼ÊõÖ®Í⣬Batloader»¹Ê¹ÓÃÖÖÖÖ·½Ê½À´Ôö¼Ó¼ì²âµÄÄѶȣ¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß¡£
https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html