TPM 2.0¿âÖÐ2¸ö»º³åÇøÒç¶Âí½Å¿ÉÓ°ÏìÊýÊ®ÒŲ́É豸

°ä²¼¹¦·ò 2023-03-06

1¡¢TPM 2.0¿âÖÐ2¸ö»º³åÇøÒç¶Âí½Å¿ÉÓ°ÏìÊýÊ®ÒŲ́É豸


¾ÝýÌå3ÔÂ3ÈÕ±¨Â· £¬¿ÉÐÅÆ½Ì¨Ä£¿é(TPM)2.0²Î¿¼¿â¹æ·¶ÖдæÔÚÁ½¸ö»º³åÇøÒç¶Âí½Å £¬¿ÉÄܻᵼÖÂÐÅϢй¶»òȨÏÞÌáÉý ¡£ËüÃDZðÀëÊÇÔ½½ç¶ÁÈ¡·ì϶£¨CVE-2023-1017£©ºÍÔ½½çдÈë·ì϶£¨ CVE-2023-1018£© £¬¶¼Óë¹æ·¶ÈôºÎ´¦ÖÃijЩTPMºÅÁîµÄ²ÎÊýÓÐ¹Ø £¬¿É±»¾­¹ýÉí·ÝÑéÖ¤µÄ±¾µØ¹¥»÷Õßͨ¹ý·¢ËÍÌØÔìºÅÁîÔÚTPMÄÚÖ´ÐдúÂëÀ´ÀûÓà ¡£QuarkslabÖ¸³ö £¬¸Ã·ì϶¿ÉÄÜ»áÓ°ÏìÊýÊ®ÒŲ́É豸 ¡£


https://thehackernews.com/2023/03/new-flaws-in-tpm-20-library-pose-threat.html


2¡¢Î¢Èí°ä²¼¸üн¨¸´Intel CPUµÄMMIO³Â¾ÉÊý¾Ý·ì϶


¾Ý3ÔÂ2ÈÕ±¨Â· £¬Î¢Èí°ä²¼ÁË´ø±í°²È«¸üР£¬½¨¸´ÁËIntel CPUµÄMMIO³Â¾ÉÊý¾Ý£¨Memory Mapped I/O Stale Data£©·ì϶ ¡£·ì϶×î³õÓÉIntelÓÚ2022Äê6ÔÂ14ÈÕÅû¶ £¬¿ÉÓÃÀ´ÔÚÐé¹¹»úÖÐÔËÐеĹý³Ì½Ó¼ûÁíÒ»¸öÐé¹¹»úÖеÄÊý¾Ý ¡£ÕâЩ·ì϶Ô̺¬¹²Ïí»º³åÇøÊý¾Ý¶ÁÈ ¡£¨CVE-2022-21123£©¡¢ ¹²Ïí»º³åÇøÊý¾Ý²ÉÑù£¨CVE-2022-21125£©¡¢ÌØÊâ¼Ä·ÅÆ÷»º³åÇøÊý¾Ý²ÉÑù¸üУ¨CVE-2022-21127£©ºÍÉ豸¼Ä·ÅÆ÷²¿ÃÅдÈ루CVE-2022-21166£© ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-security-updates-for-intel-cpu-flaws/


3¡¢×êÑÐÈËÔ±Åû¶Õë¶ÔÄ«Î÷¸ç½ðÈÚ»ú¹¹µÄATM¶ñÒâÈí¼þFiXS


ýÌå3ÔÂ4ÈÕ³Æ £¬Metabase QµÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪFiXSµÄÐÂÐÍATM¶ñÒâÈí¼þ ¡£×Ô2023Äê2ÔÂÒÔÀ´ £¬¸Ã¶ñÒâÈí¼þ±»ÓÃÓÚ¹¥»÷Ä«Î÷¸çµÄÒøÐÐ ¡£FiXSµÄÏÔÖøÌØµãÖ®Ò»ÊÇÀûÓÃWindows GetTickCount API £¬ÔÚ×îºóÒ»´ÎATM»ú³ÁÆô30·ÖÖÓºóÈ¡¿î ¡£Ä¿Ç° £¬³õʼ¹¥»÷ÔØÌåÉв»Ã÷ÏÔ £¬µ«FiXSÀûÓÃÁËÒ»¸ö±í²¿¼üÅÌ£¨ÀàËÆÓÚPloutus£© ¡£´Ë±í £¬ËüÓ빩¸øÉÌÎÞ¹Ø £¬Õë¶ÔÈκÎÖ§³ÖCEN XFSµÄATM ¡£


https://www.metabaseq.com/fixs-atms-malware/


4¡¢ÀÕË÷ÍÅ»ïPlay¹«¿ª´Ó¼ÓÖݰ¿ËÀ¼ÊÐÇÔÈ¡µÄÔ¼10GBÊý¾Ý


3ÔÂ5ÈÕ±¨Â·³Æ £¬ÀÕË÷ÍÅ»ïPlayÒÑÆðͷй¶´Ó°Â¿ËÀ¼ÊÐÇÔÈ¡µÄÊý¾Ý ¡£°Â¿ËÀ¼ÊÐÓÚ2ÔÂ10ÈÕÅû¶ÁËÒ»´ÎÀÕË÷¹¥»÷ £¬¹¥»÷»î¶¯Ê¼ÓÚ2ÔÂ8ÈÕ ¡£Å¦Ô¼ÊÐÓÚ2ÔÂ14ÈÕ°ä·¢³Æ £¬ÓÉÓÚÊܵ½ÀÕË÷¹¥»÷Ó°Ïì £¬±¾µØ½øÈ봹Σ״̬ ¡£3ÔÂ3ÈÕ £¬Å¦Ô¼Êгƹ¥»÷Õß´ÓÆäϵͳÖлñÈ¡Á˲¿ÃÅÎļþ £¬²¢ÍþвҪ¹«¿ª ¡£Ä¿Ç° £¬PlayÔÚÆäÍøÕ¾°ä²¼ÁË10GBµÄRARÎĵµ £¬Éæ¼°Éí·ÝÖ¤ºÍ»¤ÕÕµÈÓ×ÎÒÐÅÏ¢ÒÔ¼°²ÆÕþÐÅÏ¢ £¬²¢°µÊ¾ÈôÊÇûÓз´Ó³ £¬½«ÉÏ´«ÆëÈ«µÄת´¢ÐÅÏ¢ ¡£


https://securityaffairs.com/143037/cyber-crime/play-ransomware-leaks-city-of-oakland.html


5¡¢Mustang PandaÀûÓÃкóÃÅMQsTTang¹¥»÷Å·ÖÞµÄ×éÖ¯


3ÔÂ2ÈÕ £¬ESETÅû¶ÁËMustang PandaÀûÓÃкóÃÅMQsTTangµÄ¹¥»÷»î¶¯ ¡£»î¶¯Ê¼ÓÚ2023Äê1Ô £¬ESET»¹·¢ÏÖÕë¶Ô±£¼ÓÀûÑÇ¡¢°Ä´óÀûÑÇÒÔ¼°Öйų́ÍåµÄ×éÖ¯µÄ¹¥»÷ £¬Åú×¢¹¥»÷³ÁµãÊÇÅ·ÖÞºÍÑÇÖÞ ¡£MQsTTangÖ§³Ö³£¼ûµÄºóÃÅÖ°ÄÜ £¬ÆäÌØµãÖ®Ò»ÊÇʹÓÃMQTTºÍ̸½øÐÐC&CͨѶ ¡£Õâ¸öкóÃÅÌṩÁËÒ»ÖÖÔ¶³Ìshell £¬Ã»ÓÐÈκÎÓë¸ÃÍÅ»ïµÄÆäËü¶ñÒâÈí¼þÓйصĸ½¼ÓÖ°ÄÜ ¡£È»¶ø £¬ÕâÅú×¢Mustang PandaÔÚΪÆä¹¤¾ßË÷Çóеļ¼ÊõÕ» ¡£


https://www.welivesecurity.com/2023/03/02/mqsttang-mustang-panda-latest-backdoor-treads-new-ground-qt-mqtt/


6¡¢½ðÈÚ¼¼Êõ¹«Ë¾Hatch Bank½ü14Íò¿Í»§µÄÓ×ÎÒÐÅϢй¶


ýÌå3ÔÂ2ÈÕ±¨Â· £¬Hatch Bankй© £¬ºÚ¿ÍÀûÓÃGoAnywhere MFTÈí¼þÖеķì϶ÇÔÈ¡ÁËÆä139493¸ö¿Í»§µÄÊý¾Ý ¡£Hatch BankÊÇÒ»¼Ò½ðÈÚ¼¼Êõ¹«Ë¾ £¬ÔÊÐíÓׯóÒµ´ÓÆäËû½ðÈÚ»ú¹¹»ñµÃÒøÐзþÎñ ¡£2023Äê1ÔÂ29ÈÕ £¬FortraµÃÖªÆäÔâµ½ÁËÍøÂç¹¥»÷ ¡£2ÔÂ3ÈÕ £¬Hatch BankÊÕµ½FortraµÄ֪ͨ £¬»ñϤÆäÔÚFortra GoAnywhereµÄÎļþÔ⵽δ¾­ÊÚȨµÄ½Ó¼û ¡£Í¨¹ý¶Ô±»µÁÊý¾ÝµÄÉó²é £¬È·¶¨¿Í»§µÄÐÕÃûºÍÉç»á°²È«ºÅÂë±»¹¥»÷ÕßµÁÓà ¡£¸Ã¹«Ë¾½«ÎªÊÜÓ°ÏìÓû§Ìṩ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ ¡£


https://www.bleepingcomputer.com/news/security/hatch-bank-discloses-data-breach-after-goanywhere-mft-hack/