Ó¢ÌØ¶ûÈ·ÈÏAlder Lake CPUµÄUEFI BIOSÔ´´úÂëй©

°ä²¼¹¦·ò 2022-10-10
1¡¢Ó¢ÌضûÈ·ÈÏAlder Lake CPUµÄUEFI BIOSÔ´´úÂëй©

      

¾ÝýÌå10ÔÂ9ÈÕ±¨Â·£¬Ó¢ÌضûÒѾ­Ö¤Êµ£¬Alder Lake cpuµÄUEFI BIOSÔ´´úÂëй¶¡£Alder LakeÊǵÚ12´úÓ¢ÌØ¶û¿á¦ÖÃÆ÷£¬ÓÚ2021Äê11Ô°䲼¡£ÉÏÖÜÎ壬TwitterÓû§freak°ä²¼Á˾ݳÆÊÇAlder LakeµÄUEFI¹Ì¼þÔ´´úÂëµÄÁ´½Ó£¬¸ÃÁ´½ÓÖ¸ÏòGitHub´æ´¢¿âICE_TEA_BIOS£¬ÆäÖÐÔ̺¬5.97 GBµÄÎļþ¡¢Ô´´úÂ롢˽Կ¡¢¸ü¸ÄÈÕÖ¾ºÍ±àÒ빤¾ß¡£ÎļþµÄ×îй¦·ò´ÁΪ22Äê9ÔÂ30ÈÕ£¬Ä¿Ç°Éв»Ã÷ÏÔÔ´´úÂëÊÇÔÚÍøÂç¹¥»÷ÆÚ¼ä±»µÁ»¹ÊDZ»ÄÚ²¿ÈËԱй¶¡£²»Í⣬ӢÌضûÒÑÈ·ÈÏÔ´´úÂëÊÇÕæÊµµÄ£¬ÊÇËüµÄרÓÐUEFI´úÂë¡£


https://www.bleepingcomputer.com/news/security/intel-confirms-leaked-alder-lake-bios-source-code-is-authentic/


2¡¢Ó¢¹úEasylifeÎ¥·´Êý¾Ý±£»¤ºÍÓªÏú·¨±»·£¿î150ÍòÓ¢°÷

      

10ÔÂ6ÈÕ±¨Â·³Æ£¬Ó¢¹úÁãÊÛÉÌEasylifeÒòÎ¥·´Êý¾Ý±£»¤ºÍÓªÏú·¨¶ø±»¸Ã¹úµÄÐÅÏ¢¼à¹Ü»ú¹¹·£¿î½ü150ÍòÓ¢°÷¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©°µÊ¾£¬EasylifeÔÚδ¾­¿Í»§Ô޳ɵÄÇé¿öÏÂʹÓÃÆäÓ×ÎÒÐÅÏ¢ÏòËûÃÇÍÆÏú½¡È«ÓйزúÆ·£¬¶øÕâÖÖ¡°ÒþÐΡ±Êý¾Ý´¦Öó¤¶Ì·¨µÄ¡£¼à¹Ü»ú¹¹µÄÁíÒ»Ïîµ÷²é·¢ÏÖ£¬ÔÚ2019Äê8ÔÂÖÁ2020Äê8ÔÂÆÚ¼ä£¬EasylifeÏòÔڵ绰ƫºÃ·þÎñ(TPS)×¢²áµÄÈ˲¦´òÁ˳¬¹ý130Íò´ÎÀ¬»øÓªÏúµç»°¡£ICOÒòÎ¥·´Êý¾Ý±£»¤·¨¶ÔEasylife·£¿î135ÍòÓ¢°÷£¬ÒòÓªÏúµç»°·£¿î13ÍòÓ¢°÷¡£


https://www.infosecurity-magazine.com/news/retailer-easylife-fined-15m-data/


3¡¢Synopsys×êÑÐÈËÔ±Åû¶Ò˼ÒÖÇÄÜÕÕÃ÷ϵͳÖеÄ2¸ö·ì϶

      

ýÌå10ÔÂ7ÈÕ±¨Â·³Æ£¬Synopsys×êÑÐÈËÔ±·¢ÏÖÒ˼ÒÖÇÄÜÕÕÃ÷ϵͳÖдæÔÚ2¸ö·ì϶¡£ÆäÖÐÒ»¸ö·ì϶׷×ÙΪCVE-2022-39064£¬¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ýºÍ̸·¢ËͶñÒâ֡ʹÒ˼ҵÄTR?DFRIµÆÅÝÉÁ¶¯£¬ÈôÊÇÂŴγÁ¸´·¢ËͶñÒâÐÂÎÅ£¬µÆÅÝ»áÖ´Ðгö³§³ÁÖã¬Ö®ºóÓû§ÎÞ·¨Í¨¹ýÒ˼ÒÖÇÄܼҾÓÀûÓûòTR?DFRIÒ£¿ØÆ÷½ÚÔìµÆÅÝ¡£ÁíÒ»¸ö·ì϶ΪCVE-2022-39065£¬¿Éµ¼ÖÂTR?DFRI¶ÔÉ豸Ò£¿ØÆ÷ºÍÒ˼ÒÖÇÄܼҾÓÀûÓÃûÓÐÏìÓ¦¡£ 


https://therecord.media/researchers-find-bugs-in-ikea-smart-lighting-system/


4¡¢Ó¢¹ú±£ÏÕÂòÂôËùÀͺÏÉ罫³ÁÆôϵͳÒÔÓ¦¶Ô½üÆÚµÄ¹¥»÷ÊÂÎñ

      

¾Ý10ÔÂ7ÈÕ±¨Â·£¬Ó¢¹ú±£ÏÕÂòÂôËùÀͺÏÉ磨Lloyd¡¯s of London£©Í¨¹ý³ÁÆôÆäϵͳÀ´Ó¦¶Ô¿ÉÄܵÄÍøÂç¹¥»÷¡£Lloyd'sÔÚÆäÍøÂçÉϼì²âµ½ÁËÒì³£»î¶¯£¬²¢ÔÚµ÷²é¸ÃÎÊÌâ¡£´Ë±í£¬Ëü»¹³ÁÖÃÁËÍøÂçºÍϵͳ£¬²¢¹Ø¹ØÁË±í²¿ÏνÓ£¬Ô̺¬LloydµÄÊÚȨƽ̨¡£¸Ã¹«Ë¾°µÊ¾£¬ËûÃÇÒÑ֪ͨÊг¡²Î¼ÓÕߺÍÓйظ÷·½£¬Ò»µ©µ÷²éʵÏÖ£¬½«»áÌṩ¸ü¶àÐÅÏ¢¡£¸Ã¹«Ë¾²¢Î´¹«¿ª¹¥»÷ϸ½Ú£¬µ«Õë¶Ô¸ÃÊÂÎñ²ÉÈ¡µÄ´ëÊ©Åú×¢Õâ¿ÉÄÜÊÇÀÕË÷¹¥»÷¡£


https://www.databreaches.net/lloyds-of-london-reboots-its-network/


5¡¢BlackByteÀûÓÃWindowsÇý¶¯·¨Ê½ÖеķìÏ¶ÈÆ¹ý¼ì²â

      

SophosÔÚ10ÔÂ4ÈÕ³ÆÆä·¢ÏÖÁËBlackByteÔËÓªÍÅ»ïÔÚʹÓõÄ×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯·¨Ê½(BYOVD)¹¥»÷À´Èƹý°²È«²úÆ·¡£¹¥»÷ÕßÀûÓÃÁ˺Ϸ¨µÄÇý¶¯·¨Ê½RTCore64.sysÖеķì϶£¨CVE-2019-16098£©£¬¸Ã·ì϶¿É±»¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÓÃÓÚ¶ÁÈ¡ºÍдÈëËÁÒâÄڴ棬²¢µ¼ÖÂȨÏÞÌáÉý¡¢´úÂëÖ´ÐлòÐÅϢй¶¡£¸ÃÈÆ¹ý¼¼Êõ¿É½ûÓó¬¹ý1000¸öÇý¶¯·¨Ê½£¬°²È«²úÆ·ÒÀ¸½ÕâЩÇý¶¯·¨Ê½À´Ìṩ±£»¤¡£´Ë±í£¬¶ÔÀÕË÷Èí¼þÑù±¾µÄ·ÖÎö·¢ÏÖËüÓ뿪Դ¹¤¾ßEDRSandblastʹÓõÄEDRÈÆ¹ýʵÏÖÓкܶàÀàËÆÖ®´¦¡£


https://news.sophos.com/en-us/2022/10/04/blackbyte-ransomware-returns/


6¡¢Zscaler³ÆÐ¶ñÒâÈí¼þLilithBotÓëEternityÍÅ»ïÓйØ

      

10ÔÂ5ÈÕ£¬ZscalerÅû¶ÁËжñÒâÈí¼þLilithBotÓëEternityÍÅ»ïÖ®¼äµÄ¹ØÏµ¡£EternityÔËÓª×ÅÒ»¸öͬÃûµÄ¶ñÒâÈí¼þ¼´·þÎñ(MaaS)£¬Óë¶íÂÞ˹Jester GroupÓйØ¡£LilithBotÓÉEternityͨ¹ýרÓõÄTelegram channel·Ö·¢£¬Äܹ»Í¨¹ýTor½øÐвɰì¡£ËüÓµÓи߼¶Ö°ÄÜ£¬¿ÉÓÃ×÷miner¡¢stealerºÍclipper¡£¹¥»÷Õßͨ¹ýÔö³¤ÐÂÖ°ÄÜ£¨Ô̺¬·´µ÷ÊÔÖ°Äܺͷ´Ðé¹¹»ú²é³­£©À´²»ÐݼÓÇ¿¶ñÒâÈí¼þ¡£´Ë±í£¬×êÑÐÈËÔ±»¹ÌṩÁ˹¥»÷ÓйصÄIOCÒÔ¼°MITRE ATT&CK¼¼Êõϸ½Ú¡£


https://www.zscaler.com/blogs/security-research/analysis-lilithbot-malware-and-eternity-threat-group