TPM 2.0¿âÖÐ2¸ö»º³åÇøÒç¶Âí½Å¿ÉÓ°ÏìÊýÊ®ÒŲ́É豸
°ä²¼¹¦·ò 2023-03-061¡¢TPM 2.0¿âÖÐ2¸ö»º³åÇøÒç¶Âí½Å¿ÉÓ°ÏìÊýÊ®ÒŲ́É豸
¾ÝýÌå3ÔÂ3ÈÕ±¨Â·£¬¿ÉÐÅÆ½Ì¨Ä£¿é(TPM)2.0²Î¿¼¿â¹æ·¶ÖдæÔÚÁ½¸ö»º³åÇøÒç¶Âí½Å£¬¿ÉÄܻᵼÖÂÐÅϢй¶»òȨÏÞÌáÉý¡£ËüÃDZðÀëÊÇÔ½½ç¶ÁÈ¡·ì϶£¨CVE-2023-1017£©ºÍÔ½½çдÈë·ì϶£¨ CVE-2023-1018£©£¬¶¼Óë¹æ·¶ÈôºÎ´¦ÖÃijЩTPMºÅÁîµÄ²ÎÊýÓйأ¬¿É±»¾¹ýÉí·ÝÑéÖ¤µÄ±¾µØ¹¥»÷Õßͨ¹ý·¢ËÍÌØÔìºÅÁîÔÚTPMÄÚÖ´ÐдúÂëÀ´ÀûÓá£QuarkslabÖ¸³ö£¬¸Ã·ì϶¿ÉÄÜ»áÓ°ÏìÊýÊ®ÒŲ́É豸¡£
https://thehackernews.com/2023/03/new-flaws-in-tpm-20-library-pose-threat.html
2¡¢Î¢Èí°ä²¼¸üн¨¸´Intel CPUµÄMMIO³Â¾ÉÊý¾Ý·ì϶
¾Ý3ÔÂ2ÈÕ±¨Â·£¬Î¢Èí°ä²¼ÁË´ø±í°²È«¸üУ¬½¨¸´ÁËIntel CPUµÄMMIO³Â¾ÉÊý¾Ý£¨Memory Mapped I/O Stale Data£©·ì϶¡£·ì϶×î³õÓÉIntelÓÚ2022Äê6ÔÂ14ÈÕÅû¶£¬¿ÉÓÃÀ´ÔÚÐé¹¹»úÖÐÔËÐеĹý³Ì½Ó¼ûÁíÒ»¸öÐé¹¹»úÖеÄÊý¾Ý¡£ÕâЩ·ì϶Ô̺¬¹²Ïí»º³åÇøÊý¾Ý¶ÁÈ¡£¨CVE-2022-21123£©¡¢ ¹²Ïí»º³åÇøÊý¾Ý²ÉÑù£¨CVE-2022-21125£©¡¢ÌØÊâ¼Ä·ÅÆ÷»º³åÇøÊý¾Ý²ÉÑù¸üУ¨CVE-2022-21127£©ºÍÉ豸¼Ä·ÅÆ÷²¿ÃÅдÈ루CVE-2022-21166£©¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-security-updates-for-intel-cpu-flaws/
3¡¢×êÑÐÈËÔ±Åû¶Õë¶ÔÄ«Î÷¸ç½ðÈÚ»ú¹¹µÄATM¶ñÒâÈí¼þFiXS
ýÌå3ÔÂ4Èճƣ¬Metabase QµÄ×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖÃûΪFiXSµÄÐÂÐÍATM¶ñÒâÈí¼þ¡£×Ô2023Äê2ÔÂÒÔÀ´£¬¸Ã¶ñÒâÈí¼þ±»ÓÃÓÚ¹¥»÷Ä«Î÷¸çµÄÒøÐС£FiXSµÄÏÔÖøÌØµãÖ®Ò»ÊÇÀûÓÃWindows GetTickCount API£¬ÔÚ×îºóÒ»´ÎATM»ú³ÁÆô30·ÖÖÓºóÈ¡¿î¡£Ä¿Ç°£¬³õʼ¹¥»÷ÔØÌåÉв»Ã÷ÏÔ£¬µ«FiXSÀûÓÃÁËÒ»¸ö±í²¿¼üÅÌ£¨ÀàËÆÓÚPloutus£©¡£´Ë±í£¬ËüÓ빩¸øÉÌÎ޹أ¬Õë¶ÔÈκÎÖ§³ÖCEN XFSµÄATM¡£
https://www.metabaseq.com/fixs-atms-malware/
4¡¢ÀÕË÷ÍÅ»ïPlay¹«¿ª´Ó¼ÓÖݰ¿ËÀ¼ÊÐÇÔÈ¡µÄÔ¼10GBÊý¾Ý
3ÔÂ5ÈÕ±¨Â·³Æ£¬ÀÕË÷ÍÅ»ïPlayÒÑÆðͷй¶´Ó°Â¿ËÀ¼ÊÐÇÔÈ¡µÄÊý¾Ý¡£°Â¿ËÀ¼ÊÐÓÚ2ÔÂ10ÈÕÅû¶ÁËÒ»´ÎÀÕË÷¹¥»÷£¬¹¥»÷»î¶¯Ê¼ÓÚ2ÔÂ8ÈÕ¡£Å¦Ô¼ÊÐÓÚ2ÔÂ14ÈÕ°ä·¢³Æ£¬ÓÉÓÚÊܵ½ÀÕË÷¹¥»÷Ó°Ï죬±¾µØ½øÈ봹Σ״̬¡£3ÔÂ3ÈÕ£¬Å¦Ô¼Êгƹ¥»÷Õß´ÓÆäϵͳÖлñÈ¡Á˲¿ÃÅÎļþ£¬²¢ÍþвҪ¹«¿ª¡£Ä¿Ç°£¬PlayÔÚÆäÍøÕ¾°ä²¼ÁË10GBµÄRARÎĵµ£¬Éæ¼°Éí·ÝÖ¤ºÍ»¤ÕÕµÈÓ×ÎÒÐÅÏ¢ÒÔ¼°²ÆÕþÐÅÏ¢£¬²¢°µÊ¾ÈôÊÇûÓз´Ó³£¬½«ÉÏ´«ÆëÈ«µÄת´¢ÐÅÏ¢¡£
https://securityaffairs.com/143037/cyber-crime/play-ransomware-leaks-city-of-oakland.html
5¡¢Mustang PandaÀûÓÃкóÃÅMQsTTang¹¥»÷Å·ÖÞµÄ×éÖ¯
3ÔÂ2ÈÕ£¬ESETÅû¶ÁËMustang PandaÀûÓÃкóÃÅMQsTTangµÄ¹¥»÷»î¶¯¡£»î¶¯Ê¼ÓÚ2023Äê1Ô£¬ESET»¹·¢ÏÖÕë¶Ô±£¼ÓÀûÑÇ¡¢°Ä´óÀûÑÇÒÔ¼°Öйų́ÍåµÄ×éÖ¯µÄ¹¥»÷£¬Åú×¢¹¥»÷³ÁµãÊÇÅ·ÖÞºÍÑÇÖÞ¡£MQsTTangÖ§³Ö³£¼ûµÄºóÃÅÖ°ÄÜ£¬ÆäÌØµãÖ®Ò»ÊÇʹÓÃMQTTºÍ̸½øÐÐC&CͨѶ¡£Õâ¸öкóÃÅÌṩÁËÒ»ÖÖÔ¶³Ìshell£¬Ã»ÓÐÈκÎÓë¸ÃÍÅ»ïµÄÆäËü¶ñÒâÈí¼þÓйصĸ½¼ÓÖ°ÄÜ¡£È»¶ø£¬ÕâÅú×¢Mustang PandaÔÚΪÆä¹¤¾ßË÷Çóеļ¼ÊõÕ»¡£
https://www.welivesecurity.com/2023/03/02/mqsttang-mustang-panda-latest-backdoor-treads-new-ground-qt-mqtt/
6¡¢½ðÈÚ¼¼Êõ¹«Ë¾Hatch Bank½ü14Íò¿Í»§µÄÓ×ÎÒÐÅϢй¶
ýÌå3ÔÂ2ÈÕ±¨Â·£¬Hatch Bankй©£¬ºÚ¿ÍÀûÓÃGoAnywhere MFTÈí¼þÖеķì϶ÇÔÈ¡ÁËÆä139493¸ö¿Í»§µÄÊý¾Ý¡£Hatch BankÊÇÒ»¼Ò½ðÈÚ¼¼Êõ¹«Ë¾£¬ÔÊÐíÓׯóÒµ´ÓÆäËû½ðÈÚ»ú¹¹»ñµÃÒøÐзþÎñ¡£2023Äê1ÔÂ29ÈÕ£¬FortraµÃÖªÆäÔâµ½ÁËÍøÂç¹¥»÷¡£2ÔÂ3ÈÕ£¬Hatch BankÊÕµ½FortraµÄ֪ͨ£¬»ñϤÆäÔÚFortra GoAnywhereµÄÎļþÔ⵽δ¾ÊÚȨµÄ½Ó¼û¡£Í¨¹ý¶Ô±»µÁÊý¾ÝµÄÉó²é£¬È·¶¨¿Í»§µÄÐÕÃûºÍÉç»á°²È«ºÅÂë±»¹¥»÷ÕßµÁÓ᣸ù«Ë¾½«ÎªÊÜÓ°ÏìÓû§Ìṩ12¸öÔµÄÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ¡£
https://www.bleepingcomputer.com/news/security/hatch-bank-discloses-data-breach-after-goanywhere-mft-hack/


¾©¹«Íø°²±¸11010802024551ºÅ