¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿ÃÅÔâµ½ÀÕË÷¹¥»÷´óÁ¿Êý¾Ýй¶

Ðû²¼Ê±¼ä 2023-08-07

1¡¢¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿ÃÅÔâµ½ÀÕË÷¹¥»÷´óÁ¿Êý¾Ýй¶

 

¾Ý8ÔÂ4ÈÕ±¨µÀ £¬ÃÀ¹ú¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿ÃÅ(CDHE)Ôâµ½ÀÕË÷¹¥»÷ £¬µ¼ÖÂÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶Ê¼þ¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£ÊÓ²ìÏÔʾ £¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ·ÃÎÊÁËCDHEµÄϵͳ £¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý¡£CDHEûÓÐ͸¶Óм¸¶àÈËÊܵ½Ó°Ïì £¬µ«ÓÉÓÚÎ¥¹æµÄʱ¼ä¿ç¶È´Ó2004Äêµ½2020Äê £¬¿ÉÄÜÉæ¼°´óÁ¿Ñ§ÉúºÍÔ±¹¤¡£CDHE½«ÎªÊÜÓ°ÏìµÄ¸öÈËÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿Ø·þÎñ¡£


https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/


2¡¢Ñо¿ÈËÔ±ÑÝʾÈçºÎÔ½ÓüÌØ˹À­ÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿


¾ÝýÌå8ÔÂ6ÈÕ±¨µÀ £¬°ØÁÖ¹¤Òµ´óѧµÄÑо¿ÈËÔ±¿ª·¢ÁËÒ»ÖÖÒªÁì £¬¿ÉÒÔÔ½Óü×îÐÂÌØ˹À­³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ¡£´ËÍâ £¬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØ˹À­ÔÚÆä·þÎñÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿ £¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨¹¦Ð§ £¬Èç×ùÒμÓÈȵȸ¶·Ñ¹¦Ð§¡£ÌØ˹À­µÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU £¬Òò´ËÑо¿ÈËÔ±¿ÉÒÔʵÑéÀûÓÃ֮ǰ·¢Ïֵĩ¶´ÊµÏÖÔ½Óü¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ¾ÙÐеÄBlackHat 2023Ñݽ²ÖйûÈ»¡£


https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/


3¡¢AhnLab·¢ÏÖÕë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit


ýÌå8ÔÂ5ÈÕ³Æ £¬AhnLab·¢ÏÖÀûÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ£¿éRootkit £¬¿ÉÔÚGitHubÉÏ»ñÈ¡ £¬ÓëÆäËüRootkit²îÒì £¬Ëü»¹Ìṩ·´Ïòshell¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£© £¬ÔÚ±»Ñ¬È¾ÏµÍ³ÉÏ´ò¿ªÌض¨¶Ë¿Ú £¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´½¨Á¢C2Á¬½Ó¡£×Ô2022ÄêÒÔÀ´ £¬ÖÁÉÙÓÐ4¸ö²îÒìµÄ»î¶¯ÀûÓÃÁËReptile¡£Ñо¿ÈËÔ±³Æ £¬ÓÉÓÚ´úÂ뿪Դ £¬ReptileºÜÈÝÒ×±»ÖÖÖÖ¹¥»÷ÍÅ»ïÀûÓá£


https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html


4¡¢PaperCutÐÞ¸´NG/MF´òÓ¡¹ÜÀíÈí¼þ©¶´CVE-2023-39143 


8ÔÂ5ÈÕ±¨µÀ³Æ £¬Ñо¿ÈËÔ±ÔÚWindows°æ±¾PaperCut´òÓ¡¹ÜÀíÈí¼þÖз¢ÏÖÁËÒ»¸öеĩ¶´ £¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£ÕâÊÇÒ»¸ö·¾¶±éÀú©¶´£¨CVE-2023-39143£© £¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«ÈÎÒâÎļþ £¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾¡£Ñо¿ÈËÔ±³Æ £¬¸Ã©¶´Ö»Ó°ÏìÍⲿÉ豸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÅäÖõķþÎñÆ÷ £¬µ«´ó¶àÊýWindows PaperCut·þÎñÆ÷¶¼ÆôÓÃÁ˸ù¦Ð§¡£Ä¿Ç° £¬¸Ã©¶´Òѱ»ÐÞ¸´¡£


https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html


5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úÕþ¸®³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶


ýÌå8ÔÂ3ÈÕ±¨µÀ £¬Íâ°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËÒ»ÆðÊý¾Ýй¶Ê¼þ £¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢¡£SercoµÄ¿Í»§°üÂÞÃÀ¹ú¹úÍÁÄþ¾²²¿¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úÇ鱨»ú¹¹ºÍ¶à¸öÎä×°¶ÓÎé £¬2022ÄêÊÕÈ볬57ÒÚÃÀÔª¡£Ð¹Â¶Ô´ÓÚÆ丣Àû¹ÜÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)·þÎñÆ÷Ôâµ½¹¥»÷¡£¹¥»÷ʼÓÚ5Ô·Ý £¬CBIZÔÚ6ÔÂ5ÈÕ½ÓÄÉ´ëÊ©»º½â¸Ãʼþ £¬SercoÓÚ6ÔÂ30ÈÕ»ñϤ´Ë´Î¹¥»÷ºÍй¶Ê¼þ¡£


https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/


6¡¢Trend MicroÐû²¼½üÆÚBatloader¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß


8ÔÂ7ÈÕ £¬Trend MicroÐû²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß¡£Ñо¿ÈËÔ±·¢ÏÖ £¬Batloader±³ºóµÄºÚ¿Í£¨ÃüÃûΪWater Minyades£©ÒÑ¿ªÊ¼Ê¹Óà Pyarmor ProÀ´»ìÏýÆäÖ÷Òª¶ñÒâPython½Å±¾¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»Ö±ÔÚʹÓÃPyarmor £¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor³ß¶È°æ±¾¡£³ýÁËÈƹý¼¼ÊõÖ®Íâ £¬Batloader»¹Ê¹ÓÃÖÖÖÖ·½Ê½À´Ôö¼Ó¼ì²âµÄÄѶÈ £¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß¡£


https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html