¿ÆÂÞÀ¶àÖݸߵµ½ÌÓý²¿ÃÅÔâµ½ÀÕË÷¹¥»÷´óÁ¿Êý¾Ýй¶
°ä²¼¹¦·ò 2023-08-071¡¢¿ÆÂÞÀ¶àÖݸߵµ½ÌÓý²¿ÃÅÔâµ½ÀÕË÷¹¥»÷´óÁ¿Êý¾Ýй¶
¾Ý8ÔÂ4ÈÕ±¨Â·£¬ÃÀ¹ú¿ÆÂÞÀ¶àÖݸߵµ½ÌÓý²¿ÃÅ(CDHE)Ôâµ½ÀÕË÷¹¥»÷£¬µ¼ÖÂÁËһ·´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£µ÷²éÏÔʾ£¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ½Ó¼ûÁËCDHEµÄϵͳ£¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý¡£CDHEûÓÐй©Óм¸¶àÈËÊܵ½Ó°Ï죬µ«ÓÉÓÚÎ¥¹æµÄ¹¦·ò¿ç¶È´Ó2004Äêµ½2020Ä꣬¿ÉÄÜÉæ¼°´óÁ¿Ñ§ÉúºÍÔ±¹¤¡£CDHE½«ÎªÊÜÓ°ÏìµÄÓ×ÎÒÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿Ø·þÎñ¡£
https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/
2¡¢×êÑÐÈËÔ±ÑÝʾÈôºÎÔ½ÓüÌØË¹ÀÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿
¾ÝýÌå8ÔÂ6ÈÕ±¨Â·£¬°ØÁÖ¹¤Òµ´óѧµÄ×êÑÐÈËÔ±¿ª·¢ÁËÒ»ÖÖ²½Ö裬Äܹ»Ô½Óü×îÐÂÌØË¹À³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ¡£´Ë±í£¬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØË¹ÀÔÚÆä·þÎñÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿£¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨Ö°ÄÜ£¬Èç×ùÒμÓÈȵȸ¶·ÑÖ°ÄÜ¡£ÌØË¹ÀµÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU£¬Òò¶ø×êÑÐÈËÔ±Äܹ»³¢ÊÔÀûÓÃ֮ǰ·¢Ïֵķì϶ʵÏÖÔ½Óü¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ½øÐеÄBlackHat 2023Ñݽ²Öй«¿ª¡£
https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/
3¡¢AhnLab·¢ÏÖÕë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit
ýÌå8ÔÂ5Èճƣ¬AhnLab·¢ÏÖÀûÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ£¿éRootkit£¬¿ÉÔÚGitHubÉÏ»ñÈ¡£¬ÓëÆäËüRootkit·ÖÆç£¬Ëü»¹Ìṩ·´Ïòshell¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£©£¬ÔÚ±»Ï°È¾ÏµÍ³ÉÏ´ò¿ªÌض¨¶Ë¿Ú£¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´³ÉÁ¢C2Ïνӡ£×Ô2022ÄêÒÔÀ´£¬ÖÁÉÙÓÐ4¸ö·ÖÆçµÄ»î¶¯ÀûÓÃÁËReptile¡£×êÑÐÈËÔ±³Æ£¬ÓÉÓÚ´úÂ뿪Դ£¬ReptileºÜÈÝÒ×±»¸÷À๥»÷ÍÅ»ïÀûÓá£
https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html
4¡¢PaperCut½¨¸´NG/MF´òÓ¡ÖÎÀíÈí¼þ·ì϶CVE-2023-39143
8ÔÂ5ÈÕ±¨Â·³Æ£¬×êÑÐÈËÔ±ÔÚWindows°æ±¾PaperCut´òÓ¡ÖÎÀíÈí¼þÖз¢ÏÖÁËÒ»¸öеķì϶£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£ÕâÊÇÒ»¸öõè¾¶±éÀú·ì϶£¨CVE-2023-39143£©£¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«ËÁÒâÎļþ£¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾¡£×êÑÐÈËÔ±³Æ£¬¸Ã·ì϶ֻӰÏì±í²¿É豸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÅäÖõķþÎñÆ÷£¬µ«´óÎÞÊýWindows PaperCut·þÎñÆ÷¶¼ÆôÓÃÁ˸ÃÖ°ÄÜ¡£Ä¿Ç°£¬¸Ã·ì϶Òѱ»½¨¸´¡£
https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html
5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úµ±¾Ö³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶
ýÌå8ÔÂ3ÈÕ±¨Â·£¬±í°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËһ·Êý¾Ýй¶ÊÂÎñ£¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢¡£SercoµÄ¿Í»§Ô̺¬ÃÀ¹úºÓɽ°²È«Êý¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úµý±¨»ú¹¹ºÍ¶à¸öÎä×°¶ÓÁУ¬2022ÄêÊÕÈ볬57ÒÚÃÀÔª¡£Ð¹Â¶Ô´ÓÚÆä¸£ÀûÖÎÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)·þÎñÆ÷Ôâµ½¹¥»÷¡£¹¥»÷ʼÓÚ5Ô·ݣ¬CBIZÔÚ6ÔÂ5ÈÕ²ÉÈ¡´ëÊ©»º½â¸ÃÊÂÎñ£¬SercoÓÚ6ÔÂ30ÈÕ»ñϤÕâ´Î¹¥»÷ºÍй¶ÊÂÎñ¡£
https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/
6¡¢Trend Micro°ä²¼½üÆÚBatloader¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
8ÔÂ7ÈÕ£¬Trend Micro°ä²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£×êÑÐÈËÔ±·¢ÏÖ£¬Batloader±³ºóµÄºÚ¿Í£¨¶¨ÃûΪWater Minyades£©ÒÑÆðͷʹÓà Pyarmor ProÀ´»ìºÏÆäÖØÒª¶ñÒâPython¾ç±¾¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»ÏòÔÚʹÓÃPyarmor£¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor³ß¶È°æ±¾¡£³ýÁËÈÆ¹ý¼¼ÊõÖ®±í£¬Batloader»¹Ê¹Óø÷À෽ʽÀ´Ôö³¤¼ì²âµÄÄѶȣ¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß¡£
https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html


¾©¹«Íø°²±¸11010802024551ºÅ