Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼Îó²îÅû¶ָÄÏ£» £»£»£»£»BlindSide¹¥»÷¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR

Ðû²¼Ê±¼ä 2020-09-16

1.Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼Îó²îÅû¶ָÄÏ


1.jpg


Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼ÁËÎó²îÅû¶ָÄÏ£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖú¹«Ë¾ÊµÑéÎó²îÅû¶Á÷³Ì»òÔÚÒѾ­½¨ÉèÎó²îÅû¶Á÷³ÌµÄÇéÐÎÏÂ¶ÔÆä¾ÙÐÐˢС£¡£¡£¡£ ¡£¡£¡£NCSCÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃÖ¸Äϲ¢²»ÊÇÒ»¸öÎó²îÅû¶µÄ¹æÔòÊֲᣬ£¬£¬£¬£¬£¬¶øÊÇΪ¸üºÃµÄʵÑéÌṩÁËÐëÒªµÄÐÅÏ¢¡£¡£¡£¡£ ¡£¡£¡£ÆäÖ÷Òª·ÖΪÈý¸öÖ÷Òª²¿·Ö£¬£¬£¬£¬£¬£¬ÐÎòÁËÔõÑù½«ÍⲿÎó²îÐÅÏ¢¶¨Ïò¸øºÏÊʵÄÈË£¬£¬£¬£¬£¬£¬ÒÔ¼°±¨¸æÐè×ñÕչرÕÎó²îµÄ¿ò¼Ü±ê×¼¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/uk-government-releases-toolkit-to-easily-disclose-vulnerabilities/


2.Aqua SecurityÐû²¼2020ÄêCloud Native Threat±¨¸æ


2.jpg


Aqua Security¸ú×Ù²¢ÆÊÎöÁË2019Äê6ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ16371Æð¹¥»÷£¬£¬£¬£¬£¬£¬Ðû²¼ÁË2020ÄêCloud Native Threat±¨¸æ¡£¡£¡£¡£ ¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬½ñÄêÄêÍ·Õë¶ÔÔÆÏµÍ³µÄ¹¥»÷ÔÚ¼¤Ôö£¬£¬£¬£¬£¬£¬Ïà±ÈÉÏÒ»ÄêÔöÌíÁË250£¥¡£¡£¡£¡£ ¡£¡£¡£ÔÚÕâЩ¹¥»÷ʱ´ú£¬£¬£¬£¬£¬£¬ºÚ¿ÍÊÔͼ»ñµÃ¶ÔÃÛ¹ÞЧÀÍÆ÷µÄ¿ØÖÆÈ¨£¬£¬£¬£¬£¬£¬È»ºóÏÂÔØ²¢°²ÅŶñÒâÈÝÆ÷¾µÏñ¡£¡£¡£¡£ ¡£¡£¡£AquaÌåÏÖ£¬£¬£¬£¬£¬£¬ÕâЩ¾µÏñÖÐÓÐ95£¥ÊÇÕë¶ÔÍÚ¿ó¼ÓÃÜÇ®±ÒµÄ£¬£¬£¬£¬£¬£¬¶øÆäÓàÔòÓÃÓÚÉèÖÃDDoS»ù´¡ÉèÊ©¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/vast-majority-of-cyber-attacks-on-cloud-servers-aim-to-mine-cryptocurrency/


3.BlindSide¹¥»÷¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR


3.png


ËÕÀèÊÀÁª°îÀí¹¤Ñ§ÔºµÈ´óѧµÄÑо¿Ö°Ô±·¢Ã÷ÁËеÄBlindSide¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬Æä¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR¡£¡£¡£¡£ ¡£¡£¡£ÍƲâÖ´ÐÐÊÇÏÖ´ú´¦Öóͷ£Æ÷µÄÒ»ÖÖÌá¸ßÐÔÄܵĹ¦Ð§£¬£¬£¬£¬£¬£¬BlindSide¿ÉÒÔʹÓÃÈí¼þÓ¦ÓóÌÐòÖеÄÎó²î£¬£¬£¬£¬£¬£¬²¢ÔÚÍÆ²âÖ´ÐÐÓòÖÐÖØ¸´Ê¹ÓøÃÎó²î£¬£¬£¬£¬£¬£¬Öظ´Ì½²âÄڴ棬£¬£¬£¬£¬£¬Ö±µ½¹¥»÷ÕßÈÆ¹ýASLR¡£¡£¡£¡£ ¡£¡£¡£ÓÉÓڴ˹¥»÷±¬·¢ÔÚÍÆ²âÖ´ÐеĹæÄ£ÄÚ£¬£¬£¬£¬£¬£¬Òò´ËËùÓÐʧ°ÜµÄ̽²â¶¼»á±»ÑïÆú£¬£¬£¬£¬£¬£¬²¢²»»áÓ°ÏìCPU»òÆäÎȹÌÐÔ¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/new-blindside-attack-uses-speculative-execution-to-bypass-aslr/


4.FBIÖÒÑÔÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÄ¿¼¤Ôö


4.png


Áª°îÊÓ²ì¾Ö£¨FBI£©ÖÒÑÔÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÄ¿¼¤Ôö¡£¡£¡£¡£ ¡£¡£¡£Æ¾Ö¤Ìî³äÊÇÏà¶Ô½ÏеÄÊõÓ£¬£¬£¬£¬£¬ÔçÏȺڿÍֻʹÓÃÕâÀ๥»÷Õë¶ÔÔÚÏßÓÎÏ·ºÍʳÎï¶©¹ºÕÊ»§¡£¡£¡£¡£ ¡£¡£¡£¿ÉÊÇËæ×ÅÕâÖÖÕ½ÂÔµÄÀֳɣ¬£¬£¬£¬£¬£¬¸ü¶àºÚ¿Í×é֯ת¶øÕë¶ÔÔÚÏßÒøÐÐЧÀͺͼÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡½ðÈÚ×ʲú¡£¡£¡£¡£ ¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬£¬×Ô2017ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬ÆäÊÕµ½Á˽ü5ÍòÆðÕë¶ÔÃÀ¹ú½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µ¼ÖµÄÕÊ»§ÐÅϢй¶ÊÂÎñµÄ±¨¸æ£¬£¬£¬£¬£¬£¬Êܺ¦Õß°üÀ¨ÒøÐС¢½ðÈÚЧÀÍÌṩÉÌ¡¢°ü¹Ü¹«Ë¾ºÍͶ×ʹ«Ë¾¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-says-credential-stuffing-attacks-are-behind-some-recent-bank-hacks/


5.Staples¹«Ë¾Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬¿Í»§¶©µ¥Êý¾Ýй¶


5.png


°ì¹«ÁãÊÛ¹«Ë¾Staples·¢³öÁËÊý¾Ýй¶֪ͨÊ飬£¬£¬£¬£¬£¬ÉùÃ÷Æä9ÔÂ2ÈÕ×óÓÒÔâµ½Á˺ڿ͹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§¶©µ¥Êý¾Ýй¶¡£¡£¡£¡£ ¡£¡£¡£¸ÃÊÂÎñй¶µÄÐÅÏ¢°üÀ¨¿Í»§µÄÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÐÅÓÿ¨ºÅºóËÄλ¡¢²úÆ·±¾Ç®¡¢½»»õºÍ¶©¹ºµÄ²úÆ·¡£¡£¡£¡£ ¡£¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬£¬£¬£¬²¢Ã»ÓÐÃô¸ÐÊý¾Ý±»Ð¹Â¶£¬£¬£¬£¬£¬£¬°üÀ¨ÕÊ»§Æ¾Ö¤ºÍÍêÕûµÄÖ§¸¶¿¨Êý¾Ý¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/108271/data-breach/staples-data-breach.html


6.ºÚ¿ÍÈëÇÖÃÀ¹úÍËÎéÎäÊ¿ÊÂÎñ²¿£¬£¬£¬£¬£¬£¬ÇÔÈ¡4.6ÍòÎäÊ¿ÐÅÏ¢


6.png


ÍËÎéÎäÊ¿ÊÂÎñ²¿£¨VA£©ÌåÏÖ£¬£¬£¬£¬£¬£¬ÓÐδ¾­ÊÚȨµÄÓû§»á¼ûÁËÓÉVA½ðÈÚЧÀÍÖÐÐÄ£¨FSC£©ÖÎÀíµÄÔÚÏßÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬»ñÈ¡ÁËԼĪ46000ÃûÍËÎéÎäÊ¿µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£ ¡£¡£¡£¸¥¼ªÄáÑÇÖÝÌåÏÖ£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÉí·ÝÑé֤ЭÒéÀ´»á¼ûFSCÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬È»ºó×ªÒÆÁËÍËÎéÎäÊ¿ÖÎÀí¾ÖÔ­±¾ÍýÏëÖ§¸¶¸øÒ½ÁƱ£½¡ÌṩÉÌÓÃÓÚÃÀ¹úÍËÎéÎäÊ¿µÄÒ½ÁƵĿî×Ó¡£¡£¡£¡£ ¡£¡£¡£Ö»¹Ü¹ÙÔ±ÃÇÈÔÔÚÊÓ²ìÕâÆðÊÂÎñ£¬£¬£¬£¬£¬£¬µ«VAÒÔΪ£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜ»¹ÇÔÈ¡ÁËÍËÎéÎäÊ¿µÄ¼Í¼£¬£¬£¬£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/department-of-veteran-affairs-discloses-breach-impacting-46000-veterans/