Ó¢ÌØ¶ûµ÷²éMSI·ì϶µ¼ÖµÄBoot Guard˽Կй¶ÊÂÎñ

°ä²¼¹¦·ò 2023-05-10

1¡¢Ó¢Ìضûµ÷²éMSI·ì϶µ¼ÖµÄBoot Guard˽Կй¶ÊÂÎñ


¾ÝýÌå5ÔÂ8ÈÕ±¨Â· £¬Ó¢ÌضûÔÚµ÷²éÆäBoot Guard°²È«Ö°ÄÜʹÓõÄ˽ԿµÄй¶ÊÂÎñ¡£3Ô £¬Money MessageÍŻ﹥»÷ÁËÍÆËã»úÓ²¼þÔì×÷ÉÌMSI £¬Ðû³ÆÒÑÇÔÈ¡1.5TBÊý¾Ý £¬Éæ¼°¹Ì¼þ¡¢Ô´´úÂëºÍÊý¾Ý¿â¡£²¢ÀÕË÷400ÍòÃÀÔª £¬ÔÚδÊÕµ½Êê½ðºóÆðͷй¶MSIµÄÊý¾Ý¡£¾ÝϤ £¬Ð¹Â¶µÄÔ´´úÂëÔ̺¬57¿îMSI²úÆ·µÄ¾µÏñÊðÃû˽ԿºÍ116¿îMSI²úÆ·µÄIntel Boot Guard˽Կ¡£Ó¢ÌضûÔÚ»ý¼«µ÷²é´ËÊ £¬×êÑÐÈËԱй© £¬Õû¸öÓ¢ÌØ¶ûÉú̬ϵͳ¶¼Êܵ½ÁËÕâ´ÎMSIÊý¾Ýй¶µÄÓ°Ïì¡£


https://www.bleepingcomputer.com/news/security/intel-investigating-leak-of-intel-boot-guard-private-keys-after-msi-breach/


2¡¢Î¢Èí°ä²¼3Ô·ݰ²È«¸üР£¬½¨¸´Á½¸öÒѱ»ÀûÓõķì϶


5ÔÂ9ÈÕ £¬Î¢Èí°ä²¼3Ô·ÝÖܶþ²¹¶¡ £¬½¨¸´ÁËÔ̺¬3¸ö0 dayÔÚÄÚµÄ38¸ö·ì϶(²»Ô̺¬5ÔÂ5ÈÕ½¨¸´µÄ11¸öMicrosoft Edge·ì϶)¡£Õâ´Î½¨¸´µÄ3¸ö0 dayÖÐ £¬ÓÐÁ½¸öÔÚ¹¥»÷Öб»ÀûÓà £¬ÁíÒ»¸öÒѹ«¿ªÅû¶¡£±»ÀûÓõķì϶ÊÇWin32kÄÚºËÇý¶¯·¨Ê½ÖеÄÌáȨ·ì϶£¨CVE-2023-29336£©ºÍ°²È«Æô¶¯°²È«Ö°ÄÜÈÆ¹ý·ì϶£¨CVE-2023-24932£© £¬ºóÕ߿ɱ»ÓÃÓÚ×°ÖÃBlackLotus UEFI bootkit¡£Òѹ«¿ªÅû¶µÄÊÇWindows OLEµÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2023-29325£©¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2023-patch-tuesday-fixes-3-zero-days-38-flaws/


3¡¢OT&P HealthcareÔâµ½¹¥»÷Ô¼10ÍòÃû»¼ÕßµÄÐÅϢй¶


¾Ý5ÔÂ8ÈÕ±¨Â· £¬ÖйúÏã¸ÛµÄÒ½ÁƱ£½¡¹«Ë¾OT&P HealthcareÔâµ½ÍøÂç¹¥»÷ £¬Ô¼10ÍòÃû»¼ÕßµÄÐÅϢй¶¡£¸Ã¹«Ë¾µÄIT²¿ÃÅÔÚÉÏÖÜËÄ·¢ÏÖ¡°ÏµÍ³²»²»±ä¡±µÄÎÊÌâ £¬µ÷²é·¢ÏÔìäÔâµ½Á˹¥»÷ £¬²¢µ±¼´¹Ø¹ØÁ˸Ãϵͳ¡£×êÑÐÈËÔ¹ØýÔÚÆÀ¹À¹¥»÷µÄ¹æÄ£ £¬Éв»È·¶¨Óм¸¶àÊý¾Ý±»µÁ £¬µ«Ò»Ð©»¼ÕßµÄÉí·ÝÖ¤ºÍ»¤ÕÕºÅÂë±»Öü´æÔÚϵͳÖС£´ÓĿǰ¹«¿ªµÄÐÅÏ¢À´¿´ £¬»¹²»Ã÷ÏÔÕâÊÇ·ñΪÀÕË÷Èí»÷ £¬ÓÉÓÚûÓÐÌá¼°ÈκÎÒªÇó¡£


https://www.databreaches.net/hk-personal-data-medical-history-of-100000-otp-healthcare-patients-may-have-been-compromised-in-cyberattack/


4¡¢Ó¢¹úCapita¹«Ë¾AWS´æ´¢Í°ÅäÖÃÃýÎóй¶655 GBÊý¾Ý


ýÌå5ÔÂ5ÈÕ³Æ £¬Ó¢¹ú±í°ü¹«Ë¾CapitaµÄAWS´æ´¢Í°×Ô2016ÄêÒÔÀ´Ò»Ïò¶³öÔÚÍøÉÏ £¬ÆäÖÐÔ̺¬Ô¼3000¸öÎļþ £¬×Ü´óÓ×Ϊ655 GB¡£ÕâЩÊý¾ÝÔ̺¬Èí¼þÎļþ¡¢·þÎñÆ÷ͼÏñ¡¢´óÁ¿Excel±í¸ñ¡¢PowerPointÎļþºÍÎı¾Îļþ £¬ÆäÖÐÒ»¸öÎı¾Ô̺¬CapitaÒ»¸öϵͳµÄµÇ¼ÐÅÏ¢¡£´æ´¢Í°ÉÏûÓÐÃÜÂë £¬ÈκÎ֪·ºÍ²Âµ½ÍøÖ·µÄÈ˶¼Äܹ»½Ó¼ûÕâЩÎļþ £¬GrayHatWarfareÒ²²¶»ñÁ˸ÃÔÆ·þÎñÆ÷µÄ¾ßÌåÐÅÏ¢¾ÝϤ¡£Ä¿Ç° £¬CapitaÒѽ«ÕâЩÊý¾Ý±£»¤ÆðÀ´¡£


https://candid.technology/capita-database-exposed-since-2016/


5¡¢Î¢Èí·¢ÏÖ¶à¸öºÚ¿ÍÍÅ»ïÀûÓÃPapercut·ì϶µÄ¹¥»÷»î¶¯


ýÌå5ÔÂ9ÈÕ±¨Â· £¬Î¢Èí·¢ÏÖÓëÒÁÀÊÓйصÄÍÅ»ïMango SandstormºÍMint SandstormÀûÓÃPaperCut MF/NGÖзì϶µÄ¹¥»÷»î¶¯¡£ÕâÊÇÒ»¸ö½Ó¼û½ÚÔì²»µ±·ì϶£¨CVE-2023-27350£© £¬¿ÉÓÃÀ´ÈƹýÉí·ÝÑéÖ¤²¢ÔÚSYSTEMÖÐÖ´ÐдúÂë¡£ÆäÖÐMint SandstormµÄÀûÓÃ»î¶¯ËÆºõÊÇ»úÓöÖ÷ÒåµÄ £¬Ó°ÏìÁ˸÷¸öÐÐÒµºÍµØÓòµÄ×éÖ¯¡£Mango SandstormµÄÀûÓûÒÀÈ»ºÜµÍ £¬¹¥»÷ÕßʹÓÃÏÈǰÈëÇֵŤ¾ßÏνӵ½ËûÃǵÄC2»ù´¡ÉèÊ©¡£


https://securityaffairs.com/145952/apt/iranian-apt-papercut-exploitation.html


6¡¢Malwarebyte°ä²¼4Ô·ÝÀÕË÷Èí¼þÌ¬ÊÆµÄ·ÖÎö»ã±¨


5ÔÂ8ÈÕ £¬Malwarebyte°ä²¼Á˹ØÓÚ4Ô·ÝÀÕË÷Èí¼þÌ¬ÊÆµÄ·ÖÎö»ã±¨¡£4Ô £¬LockBitÈÔά³Ôìäµ±ÏȵÄְλ £¬Ëü»¹¿ª·¢³öÁËmacOS±äÌå¡£Æä´ÎÊÇALPHV¡¢BianLianºÍRoyal¡£Êܵ½ÀÕË÷¹¥»÷×î¶àµÄ¹ú¶ÈÊÇÃÀ¹ú£¨Õ¼±È48%£© £¬Æä´ÎÊǼÓÄôó£¨5%£©ºÍµÂ¹ú£¨4%£©µÈ¡£ÊÜ´ËÀ๥»÷Ó°Ïì×îÑϳÁµÄÊÇ·þÎñÒµ £¬Æä´ÎÊÇÒ½ÁƱ£½¡ºÍ¹«ÓÃÉèÊ©¡£4Ô·ݳöÏÖ¼¸¸öеÄÀÕË÷Èí¼þ £¬±ðÀëΪAkira¡¢CrossLock¡¢Trigona¡¢Dunghill LeakºÍMoney Message¡£


https://www.malwarebytes.com/blog/threat-intelligence/2023/05/ransomware-review-may-2023