¿ÆÂÞÀ­¶àÖݸߵµ½ÌÓý²¿ÃÅÔâµ½ÀÕË÷¹¥»÷´óÁ¿Êý¾Ýй¶

°ä²¼¹¦·ò 2023-08-07

1¡¢¿ÆÂÞÀ­¶àÖݸߵµ½ÌÓý²¿ÃÅÔâµ½ÀÕË÷¹¥»÷´óÁ¿Êý¾Ýй¶

 

¾Ý8ÔÂ4ÈÕ±¨Â·£¬ÃÀ¹ú¿ÆÂÞÀ­¶àÖݸߵµ½ÌÓý²¿ÃÅ(CDHE)Ôâµ½ÀÕË÷¹¥»÷£¬µ¼ÖÂÁËһ·´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£µ÷²éÏÔʾ£¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ½Ó¼ûÁËCDHEµÄϵͳ£¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý¡£CDHEûÓÐй©Óм¸¶àÈËÊܵ½Ó°Ï죬µ«ÓÉÓÚÎ¥¹æµÄ¹¦·ò¿ç¶È´Ó2004Äêµ½2020Ä꣬¿ÉÄÜÉæ¼°´óÁ¿Ñ§ÉúºÍÔ±¹¤¡£CDHE½«ÎªÊÜÓ°ÏìµÄÓ×ÎÒÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿Ø·þÎñ¡£


https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/


2¡¢×êÑÐÈËÔ±ÑÝʾÈôºÎÔ½ÓüÌØË¹À­ÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿


¾ÝýÌå8ÔÂ6ÈÕ±¨Â·£¬°ØÁÖ¹¤Òµ´óѧµÄ×êÑÐÈËÔ±¿ª·¢ÁËÒ»ÖÖ²½Ö裬Äܹ»Ô½Óü×îÐÂÌØË¹À­³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ¡£´Ë±í£¬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØË¹À­ÔÚÆä·þÎñÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿£¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨Ö°ÄÜ£¬Èç×ùÒμÓÈȵȸ¶·ÑÖ°ÄÜ¡£ÌØË¹À­µÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU£¬Òò¶ø×êÑÐÈËÔ±Äܹ»³¢ÊÔÀûÓÃ֮ǰ·¢Ïֵķì϶ʵÏÖÔ½Óü¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ½øÐеÄBlackHat 2023Ñݽ²Öй«¿ª¡£


https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/


3¡¢AhnLab·¢ÏÖÕë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit


ýÌå8ÔÂ5Èճƣ¬AhnLab·¢ÏÖÀûÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ£¿éRootkit£¬¿ÉÔÚGitHubÉÏ»ñÈ¡£¬ÓëÆäËüRootkit·ÖÆç£¬Ëü»¹Ìṩ·´Ïòshell¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£©£¬ÔÚ±»Ï°È¾ÏµÍ³ÉÏ´ò¿ªÌض¨¶Ë¿Ú£¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´³ÉÁ¢C2ÏνÓ¡£×Ô2022ÄêÒÔÀ´£¬ÖÁÉÙÓÐ4¸ö·ÖÆçµÄ»î¶¯ÀûÓÃÁËReptile¡£×êÑÐÈËÔ±³Æ£¬ÓÉÓÚ´úÂ뿪Դ£¬ReptileºÜÈÝÒ×±»¸÷À๥»÷ÍÅ»ïÀûÓá£


https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html


4¡¢PaperCut½¨¸´NG/MF´òÓ¡ÖÎÀíÈí¼þ·ì϶CVE-2023-39143 


8ÔÂ5ÈÕ±¨Â·³Æ£¬×êÑÐÈËÔ±ÔÚWindows°æ±¾PaperCut´òÓ¡ÖÎÀíÈí¼þÖз¢ÏÖÁËÒ»¸öеķì϶£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£ÕâÊÇÒ»¸öõè¾¶±éÀú·ì϶£¨CVE-2023-39143£©£¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«ËÁÒâÎļþ£¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾¡£×êÑÐÈËÔ±³Æ£¬¸Ã·ì϶ֻӰÏì±í²¿É豸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÅäÖõķþÎñÆ÷£¬µ«´óÎÞÊýWindows PaperCut·þÎñÆ÷¶¼ÆôÓÃÁ˸ÃÖ°ÄÜ¡£Ä¿Ç°£¬¸Ã·ì϶Òѱ»½¨¸´¡£


https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html


5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úµ±¾Ö³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶


ýÌå8ÔÂ3ÈÕ±¨Â·£¬±í°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËһ·Êý¾Ýй¶ÊÂÎñ£¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢¡£SercoµÄ¿Í»§Ô̺¬ÃÀ¹úºÓɽ°²È«Êý¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úµý±¨»ú¹¹ºÍ¶à¸öÎä×°¶ÓÁУ¬2022ÄêÊÕÈ볬57ÒÚÃÀÔª¡£Ð¹Â¶Ô´ÓÚÆä¸£ÀûÖÎÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)·þÎñÆ÷Ôâµ½¹¥»÷¡£¹¥»÷ʼÓÚ5Ô·Ý£¬CBIZÔÚ6ÔÂ5ÈÕ²ÉÈ¡´ëÊ©»º½â¸ÃÊÂÎñ£¬SercoÓÚ6ÔÂ30ÈÕ»ñϤÕâ´Î¹¥»÷ºÍй¶ÊÂÎñ¡£


https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/


6¡¢Trend Micro°ä²¼½üÆÚBatloader¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨


8ÔÂ7ÈÕ£¬Trend Micro°ä²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£×êÑÐÈËÔ±·¢ÏÖ£¬Batloader±³ºóµÄºÚ¿Í£¨¶¨ÃûΪWater Minyades£©ÒÑÆðͷʹÓà Pyarmor ProÀ´»ìºÏÆäÖØÒª¶ñÒâPython¾ç±¾¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»ÏòÔÚʹÓÃPyarmor£¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor³ß¶È°æ±¾¡£³ýÁËÈÆ¹ý¼¼ÊõÖ®±í£¬Batloader»¹Ê¹Óø÷À෽ʽÀ´Ôö³¤¼ì²âµÄÄѶÈ£¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß¡£


https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html