MIT·¢ÏÖÕë¶ÔApple M1 CPUµÄ¹¥»÷·½Ê½PACMAN
°ä²¼¹¦·ò 2022-06-131¡¢MIT×êÑÐÍŶӷ¢ÏÖÕë¶ÔApple M1 CPUµÄ¹¥»÷·½Ê½PACMAN
¾ÝýÌå6ÔÂ11ÈÕ±¨Â·£¬ÂéÊ¡Àí¹¤Ñ§Ôº£¨MIT£©µÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖеÄÓ²¼þ¹¥»÷¼¼ÊõPACMAN£¬Äܹ»ÈƹýApple M1 CPUÉϵÄÖ¸ÕëÑéÖ¤¡£Ö¸ÕëÉí·ÝÑéÖ¤´úÂë(PAC)ÓÃÀ´¼ì²âºÍÔ¤·ÀÄÚ´æÖÐÖ¸ÕëµÄÒâ±í¸ü¸Ä£¬ÕâÖÖÐµĹ¥»÷·½Ê½¿É±»ÓµÓÐÎïÀí½Ó¼ûȨÏ޵Ĺ¥»÷ÕßÓÃÀ´½Ó¼û´øÓÐApple M1 CPUµÄMacµÄµ×²ãÎļþϵͳ£¬²¢¿ÉÄܵ¼ÖÂËÁÒâ´úÂëÖ´ÐС£Apple¹«Ë¾°µÊ¾£¬ÕâÖÖ²àÐÅ·¹¥»÷»¹±ØÒªÆäËü°²È«·ì϶ÄÜÁ¦ÉúЧ£¬Òò¶ø²»»á¶ÔMacÓû§×é³ÉÍþв¡£
https://securityaffairs.co/wordpress/132154/hacking/pacman-attack-apple-m1-cpus.html
2¡¢Confluence·þÎñÆ÷Ôâµ½AvosLockerµÈÀÕË÷ÍÅ»ïµÄ¹¥»÷
ýÌå6ÔÂ11Èճƣ¬¶à¸öÀÕË÷ÍÅ»ïÀûÓÃOGNL×¢Èë·ì϶(CVE-2022-26134)¹¥»÷Atlassian Confluence·þÎñÆ÷¡£Prodaft·¢ÏÖ£¬AvosLockerÍÅ»ïÔÚ´ó¹æÄ£É¨Ãè²¢ÈëÇÖ¶³öµÄConfluence·þÎñÆ÷£¬ÒѾ³É¹¦Ï°È¾ÁËÃÀ¹ú¡¢Å·Ö޺ͰĴóÀûÑǵȵØÓòµÄ¶à¸ö×éÖ¯¡£´Ë±í£¬²¿ÃÅÒÑÔâµ½¹¥»÷µÄÖ¸±ê»ã±¨£¬ÀÕË÷Èí¼þCerber2021£¨Ò²³ÆCerberImposter£©Ò²ÔÚÕë¶Ôδ´ò²¹¶¡µÄConfluenceÊ·ý¡£Î¢ÈíÒ²ÔÚ6ÔÂ10ÈÕ֤ʵ£¬ËûÃǼì²âµ½ÓÐConfluence·þÎñÆ÷±»ÓÃÀ´×°ÖÃCerber2021¡£
https://www.bleepingcomputer.com/news/security/confluence-servers-hacked-to-deploy-avoslocker-cerber2021-ransomware/
3¡¢×êÑÐÍŶӷ¢ÏÖÕë¶ÔÀ¶¡ÃÀÖÞµÄLinux¶ñÒâÈí¼þSymbiote
¾Ý6ÔÂ9ÈÕ±¨Â·£¬BlackBerryºÍIntezer·¢ÏÖÁËÒ»ÖÖеÄÏÕЩ²»³ÉÄܼì²âµ½µÄLinux¶ñÒâÈí¼þSymbiote¡£¾ÝÐÅ£¬Symbiote±³ºóµÄÔËÓªÍÅ»ïÓÚ2021Äê11ÔÂ¾ÍÆðÍ·¿ª·¢¸Ã¶ñÒâÈí¼þ£¬ÖØÒªÀûÓÃËüÀ´¹¥»÷À¶¡ÃÀÖ޵ĽðÈÚÐÐÒµ£¬Ô̺¬°ÍÎ÷ÒøÐкÍCaixaµÈÒøÐС£¸Ã¶ñÒâÈí¼þ»áϰȾָ±êϵͳÉÏËùÓÐÔÚÔËÐеĹý³Ì£¬ÇÔÈ¡ÕÊ»§Í´´¦£¬²¢Îª¹¥»÷ÕßÌṩºóÃŽӼûȨÏÞ¡£Ëü»¹Ê¹ÓÃÁËÀ©´óµÄ²®¿ËÀûÊý¾Ý°ü¹ýÂËÆ÷(eBPF)Ö°ÄÜÀ´°µ²ØÆäÍøÂçÁ÷Á¿£¬ÒÔÈÆ¹ý°²È«¹¤¾ßµÄ¼ì²â¡£
https://thehackernews.com/2022/06/symbiote-stealthy-linux-malware.html
4¡¢ÒÁÀÊLycaeumÀûÓÃеÄDNSºóÃŹ¥»÷Öж«µÄÄÜÔ´ÐÐÒµ
ZscalerÔÚ6ÔÂ9Èճƣ¬ÒÁÀÊAPT×éÖ¯LycaeumÀûÓûùÓÚ.NETµÄDNSºóÃŹ¥»÷Öж«µÄÄÜÔ´ºÍµçÐÅÐÐÒµµÄ¹«Ë¾¡£LyceumÒ²³ÆHexane»òSpilrin£¬Ö®Ç°Ê¹ÓÃDNSËí·ºóÃŹ¥»÷Öж«µÄͨÕÛ·þÎñÌṩÉÌ¡£Õâ´Î»î¶¯Ê¹ÓõÄжñÒâÈí¼þÊÇ¿ªÔ´¹¤¾ß¡°DIG.net¡±µÄ¶¨Ôì°æ±¾£¬¿ÉÓÃÓÚ½øÐÐDNS½Ù³Ö¹¥»÷¡¢Ö´ÐкÅÁî¡¢·Ö·¢ÆäËüpayloadºÍй¶Êý¾Ý¡£¹¥»÷ʼÓÚÒ»¸ö´øÓжñÒâºêµÄWordÎĵµ£¬¼Ù×°³ÉÒÁÀʾüÊÂÖ÷ÌâµÄÐÂÎű¨Â·¡£µ±Ö¸±êÆôÓúêÖ®ºó£¬DNSºóÃŽ«Ö±½Ó±»·ÅÈëStartupÎļþ¼Ð¡£
https://www.bleepingcomputer.com/news/security/iranian-hackers-target-energy-sector-with-new-dns-backdoor/
5¡¢ÃÀ¹úÒ½ÁÆ»ú¹¹YRMC֪ͨԼ70Íò»¼Õ߯äÊý¾Ý¿ÉÄÜй¶
¾ÝýÌå6ÔÂ11ÈÕ±¨Â·£¬ÃÀ¹úÑÇÀûÉ£ÄÇÖÝÓÈÂíµØÓòÒ½ÁÆÖÐÐÄ(YRMC)³ÆÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£4ÔÂ25ÈÕ£¬YRMC·¢ÏÖ²¿ÃÅÄÚ²¿ÏµÍ³Ï°È¾ÁËÀÕË÷Èí¼þ¡£Ö®ºó£¬¸Ã»ú¹¹µ±¼´²ÉÈ¡Ðж¯£¬¹Ø¹ØÁËϵͳ²¢Óë·¨Âɲ¿ÃŹµÍ¨¡£¾µ÷²é£¬¹¥»÷ÕßÔÚ4ÔÂ21ÈÕÖÁ4ÔÂ25ÈÕ½Ó¼ûÁËYRMCµÄÍøÂ磬²¢ÓÚ´ËÆÚ¼äɾ³ýÁËϵͳÖеIJ¿ÃÅÎļþ¡£Õâ´ÎÊÂÎñ¿ÉÄÜй¶ÁËÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢½¡È«±£ÏÕÐÅÏ¢ºÍÒ½ÁÆÐÅÏ¢µÈ£¬Éæ¼°Ô¼700000Ãû»¼Õß¡£YRMCÒÑÏòÊÜÓ°ÏìµÄ»¼Õß·¢ËÍ֪ͨÓʼþ£¬²¢ÎªÇкÏǰÌáµÄÈËÌṩÃâ·ÑµÄÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ¡£
https://www.databreaches.net/yuma-regional-medical-center-notifying-approximately-700000-patients-of-ransomware-attack/
6¡¢Unit 42°ä²¼¹ØÓÚÀÕË÷Èí¼þ¼Ò×åHelloXDµÄ·ÖÎö»ã±¨
6ÔÂ10ÈÕ£¬Unit 42°ä²¼Á˹ØÓÚÀÕË÷Èí¼þ¼Ò×åHelloXDµÄ¼¼Êõ·ÖÎö»ã±¨¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äê11Ô³õ´Î±»·¢ÏÖ£¬»ùÓÚй¶µÄBabukÔ´´úÂë¡£Hello XDĿǰ²¢Î´Ê¹ÓÃTorÖ§¸¶ÍøÕ¾£¬¶øÊÇÖ±½Óͨ¹ýTOX̸Ìì·þÎñ½øÐн»Éæ¡£×êÑÐÈËÔ±·¢ÏÔìäÖÐÒ»¸öÑù±¾×°ÖÃÁËMicroBackdoor£¬ÕâÊÇÒ»¸ö¿ªÔ´ºóÃÅ£¬¿É±»ÓÃÀ´ä¯ÀÀÎļþϵͳ¡¢ÉÏ´«ºÍÏÂÔØÎļþ¡¢Ö´ÐкÅÁî²¢½«Æä×ÔÉí´ÓϵͳÖÐɾ³ý¡£´Ë±í£¬ÔÚÑù±¾·ÖÎöÆÚ¼ä£¬Unit 42·¢ÏÖÁËÒ»¸öǶÈëʽIPµØÖ·£¬Ê¹Æä´§¶È¿ª·¢Õß¿ÉÄÜÊǶíÂÞ˹ÍÅ»ïx4k£¬Ò²³ÆÎªL4ckyguyºÍunKn0wn¡£
https://unit42.paloaltonetworks.com/helloxd-ransomware/


¾©¹«Íø°²±¸11010802024551ºÅ