Adobe½¨¸´ÁËFlash PlayerÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶£»IntelÖзì϶CrossTalk¿É±»ÀûÓÿçCPUÄÚºËй¶Êý¾Ý

°ä²¼¹¦·ò 2020-06-11

1.Adobe½¨¸´ÁËFlash PlayerÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Adobe°ä²¼°²È«¸üУ¬½¨¸´ÁËAdobe Flash Player¡¢Adobe Experience ManagerºÍAdobe FramemakerÖеÄ10¸ö°²È«·ì϶¡£Õâ´Î¸üÐÂÖнÏΪÑϳÁµÄ·ì϶ÊÇFlash PlayerÖб»×·×ÙΪCVE-2020-9633µÄ·ì϶£¬¿É±»ÀûÓÃÔ¶³ÌÖ´ÐÐËÁÒâ´úÂ룬ӰÏìÁË×ÀÃæÔËÐеġ¢ºÏÓÃÓÚGoogle ChromeµÄÒÔ¼°ºÏÓÃÓÚMicrosoft EdgeºÍInternet Explorer 11µÄAdobe Flash Player¡£´Ë±í£¬Õâ´Î¸üл¹½¨¸´ÁËExperience ManagerÖеÄ6¸ö·ì϶£¬¿ÉÄܵ¼ÖÂÐÅϢй¶»òÔÚä¯ÀÀÆ÷ÖÐÖ´ÐÐËÁÒâJavaScript£¬ÒÔ¼°FramemakerÖеÄ3¸öÔ¶³Ì´úÂëÖ´Ðзì϶¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-remote-code-execution-bug-in-flash-player/


2.IntelÖзì϶CrossTalk£¬¿É±»ÀûÓÿçCPUÄÚºËй¶Êý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÉÀ¼Ò»Ëù´óѧµÄ×êÑÐÈËÔ±·¢ÏÖIntelÖеķì϶CrossTalk£¬¿É±»ÀûÓÃʹ¹¥»÷ÕßÔÚÒ»¸öÄÚºËÉÏÖ´ÐдúÂëÒÔÇÔÈ¡ÁíÒ»¸öÄÚºËÉÏµÄÆäËûÈí¼þÖеÄÃô¸ÐÊý¾Ý£¬¸Ã·ì϶ӰÏìÁËIntelËùÓбʼDZ¾¡¢Ì¨Ê½»úºÍ·þÎñÆ÷µÄCPU¡£¸¥ÀïÒ®´óѧµÄϵͳºÍÍøÂ簲ȫ×飨VUSec£©Ëµ£¬CrossTalk·ì϶ÊÇÁíÒ»ÖÖMDS£¨Î¢ÏµÍ³½á¹¹Êý¾Ý²ÉÑù£©¹¥»÷£¬¾ßÌåÀ´Ëµ¸Ã·ì϶ÊÇÔÚCPUµÄ»º´æÏµÍ³Line Fill Buffer£¨LBF£©´¦ÖÃÊý¾Ýʱ¶ÔÊý¾ÝÌáÒé¹¥»÷µÄ¡£Ä¿Ç°£¬¸Ã·ì϶ÒѾ­±»½¨¸´£¬Í¬Ê±ÆäPoCÒѾ­°ä²¼¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-crosstalk-attack-impacts-intels-mobile-desktop-and-server-cpus/


3.Ó¡¶È¹ú·ÀÆóÒµBEMLÔâµ½¹¥»÷£¬ÆäÃô¸ÐÊý¾ÝÔÚ°µÍøÏúÊÛ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¡¶È¹ú·ÀÆóÒµBharat Earth Movers Limited (BEML) Ôâµ½¹¥»÷£¬µ¼ÖÂÆäÄÚ²¿Ãô¸ÐÎļþй¶²¢ÔÚ°µÍø±»ÏúÊÛ¡£Õâ´Îй¶Êý¾ÝÔ̺¬µç×ÓÓʼþ¡¢°ì¹«ÊÒ±¸Íü¼¡¢¿Í»§¼Í¼ºÍ¹«Ë¾»õÔË·¢Æ±¡£¾ÝϤ£¬Ð¹Â¶²úÉúÔÚ2020Äê5ÔÂ25ÈÕ£¬ºÚ¿ÍÇÔÈ¡ÁË7ÃûBEMLÔ±¹¤µÄµÇ¼ʹ´¦£¬²¢Í¨¹ýÕâЩµç×ÓÓʼþÕÊ»§½Ó¼ûÃô¸ÐÎļþ¡£Ò»µ©¹¥»÷Õ߳ɹ¦µÇ¼Ա¹¤µç×ÓÓʼþÕÊ»§£¬±ã»á½«¾ÉÃÜÂë¸ÄΪFreeKashm£¡rºÍGoToHellBJP !! 1Ö®ÀàµÄ×ÖÑù£¬Òò¶øCybleÒÔΪ´ËʳöÓÚÕþÖζ¯»ú£¬²¢ÒÉ»óºÚ¿ÍÀ´×ÔÁÚ¹úµ±¾Ö¡£µ«ÊÇÊÂÎñÈÔÔÚµ÷²éÖУ¬Ä¿Ç°Éв»Ã÷ÏÔÄ»ºóºÚÊÖ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/dark-web-hacker-leaks-indian-defense-contractor-data/


4.¶ñÒâÈí¼þValakÀûÓÃвå¼þÇÔÈ¡Óû§OutlookµÇ¼ʹ´¦


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍøÂ簲ȫ¹«Ë¾SentinelOneµÄ×êÑÐÈËÔ±·¢ÏÖ£¬¶ñÒâÈí¼þValakÀûÓÃÁËвå¼þclientgrabber£¬Ö¼ÔÚ´Ó±»Ï°È¾ÍÆËã»úµÄ×¢²á±íÖÐÇÔÈ¡OutlookµÇ¼ʹ´¦¡£ÓÉÓÚOutlookµÄ×îа汾£¨15ºÍ16£©½«ÃÜÂë´æ´¢ÔÚ×¢²á±íÖÐ·ÖÆçµÄµØÎ»£¬²¢Ê¹ÓÃÁËеĵļÓÃܲ½Öè¡£Òò¶øclientgrabber½«ÏȽøÐмø±ð£¬¶øºóËÑË÷ÃÜÔ¿²¢È·¶¨Æä¼ÓÃܲ½Ö裬ÒÔ¼°¸ÃÖµÊÇ·ñÔ̺¬Äܹ»½âÃܵÄÃÜÂëÊý¾Ý¡£´Ë±í£¬Cybereason»¹´§Ä¦ValakÀ´×Ô¶íÂÞ˹£¬²¢³ÆÓÐÈË·¢ÏÔìä´«²¼ÁËUrsnif(GoziµÄ±äÖÖ)ºÍÒøÐÐľÂíIcedIDµÈ¶ñÒâÈí¼þ£¬¶øÕâÁ½ÖÖ¶ñÒâÈí¼þ¶¼À´×Ô¶íÂÞ˹¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/valak-malware-gets-new-plugin-to-steal-outlook-login-credentials/


5.ºÚ¿ÍÒÔºÚÈËÎÊÌâΪµö¶üÌáÒé´¹µö¹¥»÷£¬·Ö·¢Trickbot


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍøÂ簲ȫ×éÖ¯Abuse.ch·¢ÏÖеĴ¹µö»î¶¯£¬ºÚ¿Í¼Ù×°³É¹ú¶ÈÐÐÕþÖÎÀí²¿ÃÅ·¢ËÍ´¹µöÓʼþ£¬ÒªÇó½Ó¹ÜÕß¶ÔBlack Lives Matte½øÐÐÄäÃûͶƱ£¬ÒÔ·Ö·¢¶ñÒâÈí¼þTrickbot¡£¸ÃÓʼþÖÐÔ̺¬ÃûΪe-vote_form_3438.docµÄÎļþ£¬Êܺ¦Õß´ò¿ª¸ÃÎĵµÊ±»áÊÕµ½Ò»ÌõÐÂÎÅ£¬ÌáÐÑËûÃDZØÒªÆôÓñà×ëºÍÆôÓÃÄÚÈÝÒԲ鿴ÄÚÈÝ¡£Ò»µ©Êܺ¦Õßµã»÷ÆôÓ㬸ÃWordÎĵµ½«ÏÂÔØTrickBot²¢Ö´ÐÐËüµÄºê¡£TrickBotÔÚÖ´ÐÐʱ»¹»á½«ÆäËû¶ñÒâÀûÓÃÏÂÔØµ½ÊÜϰȾµÄÍÆËã»ú£¬ÒÔÇÔÈ¡Îļþ¡¢ÃÜÂë¡¢°²È«ÃÜÔ¿£¬²¢ÔÚÕû¸öÍøÂçÖкáÏò´«²¼£¬ÒÔЭÖúÆäËûºÚ¿Í×°ÖÃÀÕË÷Èí¼þ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fake-black-lives-matter-voting-campaign-spreads-trickbot-malware/


6.·ðÂÞÂ×ÈøITϵͳϰȾÀÕË÷Èí¼þ£¬Òѳﱸ֧¸¶Êê½ð


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


·ðÂÞÂ×ÈøITϵͳÓÚ6ÔÂ5ÈÕÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬²¢±»ÀÕË÷¼ÛÖµ½ü30ÍòÃÀÔªµÄ±ÈÌØ±Ò£¬¶øÄ¿Ç°¸ÃÊе±¾Ö¹ÙÔ±°µÊ¾£¬Òѳﱸ֧¸¶Êê½ðÒÔ±£»¤ËûÃǵÄÊý¾Ý¡£·ðÂÞÂ×ÈøÊг¤Steve HoltÓÚ±¾ÖܶþµÄ²É·ÃÖаµÊ¾£¬ÆäÔâµ½ºÚ¿ÍÍÅ»ïDoppelPaymerµÄ¹¥»÷£¬²¢±»Ë÷Òª30±ÈÌØ±Ò£¨Ô¼ºÏ29.1ÍòÃÀÔª£©µÄÊê½ð£¬²¢ÇÒ¸ÃÍÅ»ïÔÚ¹¥»÷·ðÂÞÂ×ÈøµÄÒ»Ó×ʱÄÚËÆºõ»¹Í¬Ê±ÈëÇÖÁËÁí±íËÄÃûÊܺ¦ÕßµÄÍøÂç¡£5ÔÂÏÂÑ®£¬KrebsOnSecurity±ã·¢ÏÖ·ðÂÞÂ×ÈøITϵͳϰȾÁËÀÕË÷Èí¼þ²¢Í¨Öª¸ÃÊеĹÙÔ±£¬µ«Ö±µ½12ÌìºóºÚ¿Í²Å·¢ÆðÁ˹¥»÷£¬Hold SecurityÊ×´´ÈËAlex Holden°µÊ¾£¬ÕâÖÖÇé¿öºÜ³£¼û£¬ºÚ¿Í×é֯ͨ³£ÆÚ´ýÊýÖÜ»òÊýÔÂÖ®¾ÃÔÙÆô¶¯¶ñÒâÈí¼þ¡£


Ô­ÎÄÁ´½Ó£º

https://krebsonsecurity.com/2020/06/florence-ala-hit-by-ransomware-12-days-after-being-alerted-by-krebsonsecurity/