Windows¸üе¼ÖÂÀ¶ÆÁ²¢ÏÔʾUNSUPPORTED_PROCESSOR
°ä²¼¹¦·ò 2023-08-251¡¢Windows¸üе¼ÖÂÀ¶ÆÁ²¢ÏÔʾUNSUPPORTED_PROCESSOR
¾ÝýÌå8ÔÂ24ÈÕ±¨Â·£¬½üÆÚ°ä²¼µÄWindows 10ºÍ Windows 11µÄ8Ô·ÝÔ¤ÀÀ¸üпɵ¼ÖÂÀ¶ÆÁ£¬²¢Ö¸³ö²»Ö§³ÖµÄ´¦ÖÃÆ÷ÎÊÌâ¡£ÓÐÎÊÌâµÄ¸üбðÀëΪKB5029351(Win 11)ºÍKB5029331 (Win 10)£¬ËüÃÇÉæ¼°ËÑË÷ÀûÓý¨¸´ºÍÒýÈëеı¸·ÝÀûÓá£ÊÜÓ°ÏìÓû§³Æ£¬ÔÚ×°ÖÃ8ÔÂ2ÈÕ°ä²¼µÄ¸üк󣬻á³öÏÖÀ¶ÆÁ²¢ÏÔʾÃýÎóÐÅÏ¢¡°UNSUPPORTED_PROCESSOR¡±¡£²¿ÃÅÓû§³Æ£¬ÓÐÎÊÌâµÄ¿ÉÑ¡¸üÐÂÔÚ¼¸´Î³ÁÆôºó»á×Ô¶¯»Ø¹ö¡£Î¢ÈíÔÚµ÷²éÕâÒ»ÎÊÌ⣬ÒÔÈ·¶¨ËüÊÇ·ñÓë΢ÈíÓйأ¬²¢½¨ÒéÓöµ½BSODÃýÎóµÄÓû§Ê¹Ó÷´À¡ÖÐÐÄÌá½»»ã±¨¡£
https://www.bleepingcomputer.com/news/microsoft/new-windows-updates-cause-unsupported-processor-blue-screens/
2¡¢ESETÅû¶ͨ¹ýSpacecolon¹¤¾ß¼¯·Ö·¢ScarabµÄ»î¶¯
ESETÔÚ8ÔÂ23ÈÕÅû¶ÁËͨ¹ýÒ»¸öÓ×Ð͹¤¾ß¼¯Spacecolon·Ö·¢ÀÕË÷Èí¼þScarabµÄ»î¶¯¡£SpacecolonÄܹ»×·Òäµ½2020Äê5Ô£¬×îа汾±àÒëÓÚ½ñÄê5Ô¡£ËüÓÉÈý¸öDelphi×é¼þ×é³É£¬±ðÀëΪScHackTool¡¢ScInstallerºÍScService¡£¹¥»÷Õßͨ¹ýÈëÇÖWeb·þÎñÆ÷»ò±©Á¦ÆÆ½âRDPÍ´´¦½øÈëÖ¸±ê£¬»¹»áƾ¾Ý±ØÒªÌṩ¶àÖÖµÚÈý·½ºì¶Ó¹¤¾ß£¬×îÖÕ»á×°ÖÃÀÕË÷Èí¼þScarab¡£´Ë±í£¬¹¥»÷ÕßËÆºõÔڳﱸ·Ö·¢ÐµÄÀÕË÷Èí¼þScRansom£¬µ«ÊÇ×êÑÐÈËÔ±ÉÐδÔÚÒ°±í·¢ÏÖËü£¬´§Ä¦ÆäÈÔ´¦ÓÚ¿ª·¢½×¶Î¡£
https://www.welivesecurity.com/en/eset-research/scarabs-colon-izing-vulnerable-servers/
3¡¢3ǧ¶ą̀Openfire·þÎñÆ÷佨¸´·ì϶CVE-2023-32315
¾Ý8ÔÂ24ÈÕ±¨Â·£¬Vulncheck×êÑÐÈËÔ±·¢ÏÖ£¬³¬¹ý3000̨Openfire·þÎñÆ÷ÈÝÒ×Êܵ½Openfire·ì϶µÄÓ°Ïì¡£ÕâÊÇÒ»¸öõè¾¶±éÀú·ì϶£¨CVE-2023-32315£©£¬ÓÚ5ÔÂ23ÈÕÅû¶£¬ÏÖÒѱ»½¨¸´¡£µ«ÔÚ6Ô·ÝÓб¨Â·³Æ£¬¸Ã·ì϶±»ÀûÓÃÀ´´´½¨ÖÎÀíÔ±Óû§²¢ÔÚ佨¸´µÄ·þÎñÆ÷ÖÐÉÏ´«¶ñÒâ²å¼þ¡£VulnCheck³Æ£¬ShodanɨÃè·¢ÏÖÁË6324̨¶³öµÄOpenfire·þÎñÆ÷£¬ÆäÖÐ50%£¨3162̨£©Î´´ò²¹¶¡£¬ÒÀÈ»ÈÝÒ×Êܵ½¸Ã·ì϶µÄÓ°Ïì¡£
https://securityaffairs.com/149811/breaking-news/openfire-servers-exposed-new-exploit.html
4¡¢×êÑÐÈËÔ±¼ì²âµ½Ê®¼¸¸öÕë¶ÔRoblox¿ª·¢ÕߵĶñÒâNPM°ü
ReversingLabsÔÚ8ÔÂ22ÈÕ³ÆÆä¼ì²âµ½Ê®¼¸¸ö¶ñÒâNPM°ü£¬Ö¼ÔÚ×°ÖÿªÔ´ÐÅÏ¢ÇÔÈ¡·¨Ê½Luna Grabber¡£¸Ã»î¶¯Ê¼ÓÚ8Ô³õ£¬Ê¹ÓÃÁ˼Ù×°³ÉºÏ·¨°ünoblox.jsµÄÄ£¿é¡£¸Ã»î¶¯Õë¶ÔµÄÊÇRobloxÓÎϷƽ̨µÄ¿ª·¢ÈËÔ±£¬ºÏ·¨µÄnoblox.js°üÊÇÒ»¸ö¿ªÔ´Roblox API·â×°·¨Ê½¡£ReversingLabs½«Õâ´Î»î¶¯ÃèÊöΪ2021Äê10Ô·¢ÏÖµÄÒ»´Î¹¥»÷µÄ³ÁÑÝ£¬µ«¶þÕßÒ²´æÔÚ·ÖÆç£¬³ö¸ñÊÇлÏÂÔØÁËÒ»¸ö¿ÉÖ´ÐÐÎļþÀ´×°ÖÃLuna Grabber¡£¾ÝϤ£¬ÕâÊÇnpmÉÏ·¢Ïֵĺ±¼ûµÄ¶à½×¶ÎϰȾ°¸ÀýÖ®Ò»¡£
https://www.reversinglabs.com/blog/fake-roblox-api-packages-luna-grabber-npm
5¡¢Check Point°ä²¼2023ÄêÄêÖа²È«Ì¬ÊƵķÖÎö»ã±¨
8ÔÂ23ÈÕ£¬Check Point°ä²¼ÁË2023ÄêÄêÖÐÍøÂç°²È«Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£½ö½ñÄêµÚ¶þ¼¾¶È£¬Ã¿ÖÜÍøÂç¹¥»÷¾ÍÔö³¤ÁË8%£¬ÕâÊÇ´ÓǰÁ½ÄêÀ´×îÏÔÖøµÄÔö·ù¡£¹¥»÷Õß²»½öÀûÓÃ×îм¼Êõ£¬»¹ÀûÓÃÒѹ«¿ªÅû¶µÄ·ì϶À´Ö´ÐжñÒâ»î¶¯¡£ÉϰëÄ꣬¹²ÓÐ48¸öÀÕË÷ÍÅ»ïÐû³ÆÈëÇÖ²¢ÀÕË÷ÁË2200¶à¸öÖ¸±ê¡£³ýÁËLockbitºÍAlphvµÈÀÏÅÆ¹¥»÷Õߣ¬»¹ÓÐRoyalºÍPlayµÈÐÂÃæÅÓ¡£»ã±¨»¹Ö¸³ö£¬ÍøÂç°²ÂúÊÇÒ»¸ö¶¯Ì¬µÄÕ½³¡£¬ÆóÒµ±ØÒª½áºÏ×îеÄÈËΪÖÇÄÜÇý¶¯µÄ·ÀÓùºÍ¶Ô¾É·ì϶µÄÉî¿ÌÏàʶ£¬Æ¾¾Ý²»Ðݱ䶯µÄÍþÐ²Ì¬ÊÆÀ´¿ª·¢×Ô¼ºµÄ°²È«Õ½Êõ¡£
https://pages.checkpoint.com/2023-mid-year-cyber-security-report.html
6¡¢Sophos°ä²¼2023ÄêÉϰëÄê¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
8ÔÂ23ÈÕ£¬Sophos°ä²¼Á˹ØÓÚ2023ÄêÉϰëÄê¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£ÀÕË÷Èí¼þÔÚÖ¸±êÍøÂçÉÏÆÆ·ÑµÄ¹¦·òÔ½À´Ô½ÉÙ£¬ÉϰëÄ꣬ÀÕË÷¹¥»÷ÕßÍ£¶Ù¹¦·òµÄÖÐλÊý´Ó2022ÄêµÄ9Ìì½µÖÁ5Ìì¡£ËùÓй¥»÷ÀàÐ͵Ä×ÜÌåÍ£¶Ù¹¦·òΪ8Ì죬µÍÓÚ2022ÄêµÄ10Ìì¡£ÀÕË÷¹¥»÷Õ¼½ñÄê¼Í¼µÄËùÓй¥»÷µÄ68.75%¡£43.42%µÄ¹¥»÷²úÉúÁËÊý¾Ýй¶£¬±ÈÈ¥ÄêÔö³¤ÁË1.3%¡£²é¿´ÓйØÈÕÆÚºÍ¹¦·òµÄÊý¾Ý·¢ÏÖ£¬¹¥»÷Õ߸üϲ»¶ÔÚÖܶþ¡¢ÖÜÈýºÍÖÜËÄÌáÒé¹¥»÷¡£Ô¶³Ì×ÀÃæºÍ̸(RDP)ÒÀÈ»ÊDZ»ÀûÓÃ×î¶àµÄ¹¤¾ßÖ®Ò»£¬Í³¼ÆÊý¾ÝÏÔʾ£¬95%µÄ¹¥»÷¶¼Ê¹ÓÃÁËRDP¡£
https://news.sophos.com/en-us/2023/08/23/active-adversary-for-tech-leaders/


¾©¹«Íø°²±¸11010802024551ºÅ