¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶
Ðû²¼Ê±¼ä 2023-08-071¡¢¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶
¾Ý8ÔÂ4ÈÕ±¨µÀ£¬ÃÀ¹ú¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿·Ö(CDHE)Ôâµ½ÀÕË÷¹¥»÷£¬µ¼ÖÂÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£ÊÓ²ìÏÔʾ£¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ»á¼ûÁËCDHEµÄϵͳ£¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý¡£CDHEûÓÐ͸¶Óм¸¶àÈËÊܵ½Ó°Ï죬µ«ÓÉÓÚÎ¥¹æµÄʱ¼ä¿ç¶È´Ó2004Äêµ½2020Ä꣬¿ÉÄÜÉæ¼°´ó×ÚѧÉúºÍÔ±¹¤¡£CDHE½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿Ø·þÎñ¡£
https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/
2¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÔ½ÓüÌØ˹ÀÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿
¾ÝýÌå8ÔÂ6ÈÕ±¨µÀ£¬°ØÁÖ¹¤Òµ´óѧµÄÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖÒªÁ죬¿ÉÒÔÔ½Óü×îÐÂÌØ˹À³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ¡£±ðµÄ£¬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØ˹ÀÔÚÆä·þÎñÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿£¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨¹¦Ð§£¬Èç×ùÒμÓÈȵȸ¶·Ñ¹¦Ð§¡£ÌØ˹ÀµÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU£¬Òò´ËÑо¿Ö°Ô±¿ÉÒÔʵÑéʹÓÃ֮ǰ·¢Ã÷µÄÎó²îʵÏÖÔ½Óü¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ¾ÙÐеÄBlackHat 2023Ñݽ²ÖйûÕæ¡£
https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/
3¡¢AhnLab·¢Ã÷Õë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit
ýÌå8ÔÂ5Èճƣ¬AhnLab·¢Ã÷ʹÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷Ô˶¯¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ£¿éRootkit£¬¿ÉÔÚGitHubÉÏ»ñÈ¡£¬ÓëÆäËüRootkit²î±ð£¬Ëü»¹Ìṩ·´Ïòshell¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£©£¬ÔÚ±»Ñ¬È¾ÏµÍ³ÉÏ·¿ªÌض¨¶Ë¿Ú£¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´½¨ÉèC2ÅþÁ¬¡£×Ô2022ÄêÒÔÀ´£¬ÖÁÉÙÓÐ4¸ö²î±ðµÄÔ˶¯Ê¹ÓÃÁËReptile¡£Ñо¿Ö°Ô±³Æ£¬ÓÉÓÚ´úÂ뿪Դ£¬ReptileºÜÈÝÒ×±»ÖÖÖÖ¹¥»÷ÍÅ»ïʹÓá£
https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html
4¡¢PaperCutÐÞ¸´NG/MF´òÓ¡ÖÎÀíÈí¼þÎó²îCVE-2023-39143
8ÔÂ5ÈÕ±¨µÀ³Æ£¬Ñо¿Ö°Ô±ÔÚWindows°æ±¾PaperCut´òÓ¡ÖÎÀíÈí¼þÖз¢Ã÷ÁËÒ»¸öеÄÎó²î£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£ÕâÊÇÒ»¸ö·¾¶±éÀúÎó²î£¨CVE-2023-39143£©£¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«í§ÒâÎļþ£¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾¡£Ñо¿Ö°Ô±³Æ£¬¸ÃÎó²îÖ»Ó°ÏìÍⲿװ±¸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÉèÖõķþÎñÆ÷£¬µ«´ó´ó¶¼Windows PaperCut·þÎñÆ÷¶¼ÆôÓÃÁ˸ù¦Ð§¡£ÏÖÔÚ£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£
https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html
5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úÕþ¸®³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶
ýÌå8ÔÂ3ÈÕ±¨µÀ£¬Íâ°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢¡£SercoµÄ¿Í»§°üÀ¨ÃÀ¹úÁìÍÁÇå¾²²¿¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úÇ鱨»ú¹¹ºÍ¶à¸öÎä×°²½¶Ó£¬2022ÄêÊÕÈ볬57ÒÚÃÀÔª¡£Ð¹Â¶Ô´ÓÚÆ丣ÀûÖÎÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)·þÎñÆ÷Ôâµ½¹¥»÷¡£¹¥»÷ʼÓÚ5Ô·ݣ¬CBIZÔÚ6ÔÂ5ÈÕ½ÓÄɲ½·¥»º½â¸ÃÊÂÎñ£¬SercoÓÚ6ÔÂ30ÈÕ»ñϤ´Ë´Î¹¥»÷ºÍй¶ÊÂÎñ¡£
https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/
6¡¢Trend MicroÐû²¼½üÆÚBatloader¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ
8ÔÂ7ÈÕ£¬Trend MicroÐû²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£Ñо¿Ö°Ô±·¢Ã÷£¬Batloader±³ºóµÄºÚ¿Í£¨ÃüÃûΪWater Minyades£©ÒÑ×îÏÈʹÓà Pyarmor ProÀ´»ìÏýÆäÖ÷Òª¶ñÒâPython¾ç±¾¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»Ö±ÔÚʹÓÃPyarmor£¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor±ê×¼°æ±¾¡£³ýÁËÈƹýÊÖÒÕÖ®Í⣬Batloader»¹Ê¹ÓÃÖÖÖÖ·½·¨À´ÔöÌí¼ì²âµÄÄѶȣ¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß¡£
https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html