GoogleÔÚÈýÐÇExynosоƬ×éÖз¢ÏÖ18¸ö°²È«·ì϶
°ä²¼¹¦·ò 2023-03-171¡¢GoogleÔÚÈýÐÇExynosоƬ×éÖз¢ÏÖ18¸ö°²È«·ì϶
¾Ý3ÔÂ16ÈÕ±¨Â·£¬Google Project ZeroÔÚÒÆ¶¯É豸¡¢¿É´©´÷É豸ºÍÆû³µÖÐʹÓõÄÈýÐÇExynosоƬ×éÖз¢ÏÖÁË18¸ö·ì϶¡£ÆäÖÐ4¸ö·ì϶½ÏΪÑϳÁ£¬¿Éµ¼Ö´ӻ¥ÁªÍøµ½»ù´øµÄÔ¶³Ì´úÂëÖ´ÐУ¬Ô̺¬CVE-2023-24033ºÍÆäËü3¸öÉÐδ·ÖÅäCVE-IDµÄ·ì϶¡£¹¥»÷ÕßÖ»±ØÒªÖªÂ·Ö¸±êµÄµç»°ºÅÂë¾ÍÄܹ»ÀûÓÃÕâЩ·ì϶£¬ÎÞÐèÓëÓû§½»»¥¡£ÈýÐÇÒѾÏòÆäËü¹©¸øÉÌÌṩÏàʶ¾öÊÜÓ°ÏìоƬ×éÖÐÕâЩ·ì϶µÄ°²È«¸üУ¬µ«Ã¿¸öÔì×÷ÉÌÕë¶ÔÆäÉ豸µÄ²¹¶¡¹¦·ò±í»áÓÐËù·ÖÆç¡£ÔÚ²¹¶¡¿ÉÓÃ֮ǰ£¬Óû§Äܹ»Í¨¹ý½ûÓÃWi-Fiͨ»°ºÍLTEÓïÒô(VoLTE)À´Ô¤·À»ù´øÔ¶³Ì´úÂëÖ´Ðй¥»÷¡£
https://securityaffairs.com/143582/hacking/baseband-flaws-samsung-exynos.html
2¡¢º½¿Õ¹«Ë¾Safran GroupϵͳÅäÖÃÃýÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶
¾ÝýÌå3ÔÂ15ÈÕ±¨Â·£¬·¨¹úµÄ¿ç¹úº½¿Õ¹«Ë¾Safran GroupϵͳÅäÖÃÃýÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£ÕâÊÇÈ«ÇòµÚ°Ë´óº½¿Õº½Ì칩¸øÉÌ£¬2022ÄêµÄÊÕÈ볬¹ý190ÒÚÅ·Ôª¡£×êÑÐÈËÔ±·¢ÏÖ£¬¿ªÔ´ÊÓÆµÍ¨»°ÀûÓ÷¨Ê½Jitsi MeetµÄ²âÊÔ°æÅäÖÃÖÐʹÓÃÁËÒ»¸ö¹«¿ªµÄ»·¾³Îļþ¡£¾Ý¹À¼Æ£¬¸ÃÎļþÒѹ«¿ªÁËÒ»Äê°ë×óÓÒ¡£Ð¹Â¶ÐÅÏ¢Ô̺¬LaravelÀûÓ÷¨Ê½ÃÜÔ¿¡¢JSON WebÁîÅÆ(JWT)ÃÜÔ¿¡¢MySQLÍ´´¦ºÍSMTPÍ´´¦µÈ£¬ÕâЩÃÜÔ¿ºÍÍ´´¦¿É±»¹¥»÷ÕßÓÃÀ´½Ó¼ûÍøÕ¾ºó¶Ë¡¢Ô±¹¤ÍÆËã»úºÍÆäËü·þÎñÆ÷¡£
https://cybernews.com/security/key-aerospace-player-leaks-sensitive-data/
3¡¢Latitude FinanceÔâµ½¹¥»÷й¶³¬¹ý30Íò¿Í»§µÄÐÅÏ¢
ýÌå3ÔÂ15Èճƣ¬½ðÈÚ´û¿î»ú¹¹Latitude FinanceÔâµ½ºÚ¿Í¹¥»÷£¬³¬¹ý300000·Ý¿Í»§Éí·ÝÖ¤Ã÷Îļþ±»µÁ¡£¸Ã¹«Ë¾°µÊ¾£¬´Óǰ¼¸ÌìÔÚÆäϵͳÉϼì²âµ½Òì³£»î¶¯¡£ÔÚ¹«Ë¾²ÉÈ¡´ëʩǰ£¬ºÚ¿ÍÇÔÈ¡ÁËÔ±¹¤µÄµÇ¼ÐÅÏ¢£¬ÒÔ½Ó¼ûÆäËüÁ½¼Ò·þÎñÌṩÉ̳ÖÓеĿͻ§ÐÅÏ¢¡£ÆäÖеÚÒ»¼ÒÌṩÉÌй¶ÁËÔ¼103000·ÝÉí·ÝÖ¤Ã÷Îļþ£¬µÚ¶þ¼ÒÌṩÉÌй¶ÁËÔ¼225000Ìõ¿Í»§¼Í¼¡£¸Ã¹«Ë¾°µÊ¾£¬¹¥»÷Ô´×Ը÷þÎñʹÓõÄÒ»¸ö¹©¸øÉÌ¡£
https://7news.com.au/business/retail/latitude-financial-hacked-as-300000-customer-identification-documents-stolen--c-10056836
4¡¢LockBitÐû³Æ¶Ôµ¼ÖÂEssendantÔËÓªÖжϵĹ¥»÷ÕÆ¹Ü
3ÔÂ15ÈÕ±¨Â·£¬°ì¹«ÓÃÆ··ÖÏúÉÌEssendantÔâµ½ÀÕË÷ÍÅ»ïLockBitµÄ¹¥»÷¡£×Ô3ÔÂ6ÈÕÍíÉÏÆðÍ·£¬Essendant²úÉúÖжϣ¬¿Í»§ÎÞ·¨Ï¶©µ¥»òÁªÏµEssendantµÄ¿Í»§·þÎñ¡£¸Ã¹«Ë¾ÓÚ3ÔÂ7ÈÕ֪ͨÆä¿Í»§³Á´óÍøÂçÖжÏÊÂÎñ¡£3ÔÂ14ÈÕ£¬LockBitÐû³Æ¶ÔEssendantµÄÍøÂç¹¥»÷ÕÆ¹Ü¡£ÔÚLockBitÉêÃ÷ºó£¬¸Ã¹«Ë¾Ì¸µ½ÆäÔÚ½øÐеĸ´Ô¹¤×÷£¬Ô̺¬¼´½«ÊµÏÖµÄϵͳËãÕÊ£¬µ«×îеÄÌû×ÓÒÀÈ»½«¸ÃÊÂÎñ¹é×ïÓÚ¡°ÍøÂçÖжϡ±¡£
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-essendant-attack-company-says-network-outage-/
5¡¢ÃÀ¹úUSMS 350GBµÄ·¨ÂÉÐÅÏ¢ÒÔ15ÍòÃÀÔªÔÚºÚ¿ÍÂÛ̳ÏúÊÛ
ýÌå3ÔÂ15ÈÕ±¨Â·³Æ£¬ÃÀÍõ·¨¾¯¾Ö(USMS)µÄ350 GBÊý¾ÝÔÚÒ»¸ö¶íÓïºÚ¿ÍÂÛ̳ÉÏÏúÊÛ¡£¾ÝÂô¼Ò³Æ£¬¸ÃÊý¾Ý¿âµÄÊÛ¼ÛΪ150000ÃÀÔª£¬ÆäÖÐÔ̺¬2021ÄêÖÁ2023Äê2ÔÂÆÚ¼äÀ´×ÔÎļþ·þÎñÆ÷ºÍ¹¤×÷ÍÆËã»úµÄÎļþ£¬²»»áÏñexeÎļþºÍ¿âÄÇÑù·ºÀÄ¡£ÕâЩÐÅÏ¢Ô̺¬¾üÊ»ùµØºÍÆäËü¸ß¶È°²È«ÇøÓòµÄº½ÅľµÍ·ºÍÕÕÆ¬¡¢»¤ÕÕºÍÉí·ÝÖ¤¼þµÄ¸´Ó¡¼þ£¬ÒÔ¼°ÇÔÌýºÍ¼à¶½¹«ÃñµÄ¾ßÌåÐÅÏ¢¡£»¹Ô̺¬ÓйØ×ï·¸¡¢ÖúÅÉÍ·×Ӻͷ·¶¾¼¯ÍŵÄÐÅÏ¢£¬²¿ÃÅÎļþ±»ÏóÕ÷Ϊ»úÃÜ»ò¾øÃÜ¡£USMSÉÐδ¶Ô´ËÊÂ×÷³ö»ØÓ¦¡£
https://www.bleepingcomputer.com/news/security/hacker-selling-data-allegedly-stolen-in-us-marshals-service-hack/
6¡¢Check Point°ä²¼¹ØÓÚ×¢È뷨ʽdotRunpeXµÄ·ÖÎö»ã±¨
3ÔÂ15ÈÕ£¬Check Point Research°ä²¼Á˹ØÓÚ×¢È뷨ʽdotRunpeX¼°ÆäÓë¾É°æ±¾µÄ¹ØÏµµÄ·ÖÎö»ã±¨¡£DotRunpeXÊÇÒ»ÖÖʹÓÃProcess Hollowing¼¼ÊõÔÚ.NETÖбàдµÄÐÂÐÍ×¢È뷨ʽ£¬ÓÃÓÚϰȾӵÓи÷ÀàÒÑÖª¶ñÒâÈí¼þϵÁеÄϵͳ¡£Ïà±Å×ھɰ汾£¬Ð°汾ӵÓÐÊܶ¨Ôì°æKoiVMÐé¹¹Æ÷±£»¤¡¢¸ß¶È¿ÉÅäÖᢸü¶àUACÈÆ¹ý¼¼ÊõºÍʹÓõ¥Ò»µÄXOR½âÃÜҪעÈëµÄÖØÒªpayloadµÈÌØµã¡£ÀàËÆÖ®´¦ÊÇÓÃ.NET±àдµÄ64λ¿ÉÖ´ÐÐÎļþ.exeºÍÓÃÀ´×¢È뼸¸ö·ÖÆçµÄ¶ñÒâÈí¼þ¼Ò×åµÈ¡£
https://research.checkpoint.com/2023/dotrunpex-demystifying-new-virtualized-net-injector-used-in-the-wild/


¾©¹«Íø°²±¸11010802024551ºÅ