¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶

Ðû²¼Ê±¼ä 2023-08-07

1¡¢¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶

 

¾Ý8ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬ÃÀ¹ú¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿·Ö(CDHE)Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬µ¼ÖÂÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ»á¼ûÁËCDHEµÄϵͳ£¬£¬£¬£¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý¡£¡£¡£¡£¡£¡£CDHEûÓÐ͸¶Óм¸¶àÈËÊܵ½Ó°Ï죬£¬£¬£¬µ«ÓÉÓÚÎ¥¹æµÄʱ¼ä¿ç¶È´Ó2004Äêµ½2020Ä꣬£¬£¬£¬¿ÉÄÜÉæ¼°´ó×ÚѧÉúºÍÔ±¹¤¡£¡£¡£¡£¡£¡£CDHE½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£


https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/


2¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÔ½ÓüÌØË¹À­ÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿


¾ÝýÌå8ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬°ØÁÖ¹¤Òµ´óѧµÄÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖÒªÁ죬£¬£¬£¬¿ÉÒÔÔ½Óü×îÐÂÌØË¹À­³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØË¹À­ÔÚÆäЧÀÍÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿£¬£¬£¬£¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨¹¦Ð§£¬£¬£¬£¬Èç×ùÒμÓÈȵȸ¶·Ñ¹¦Ð§¡£¡£¡£¡£¡£¡£ÌØË¹À­µÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±¿ÉÒÔʵÑéʹÓÃ֮ǰ·¢Ã÷µÄÎó²îʵÏÖÔ½Óü¡£¡£¡£¡£¡£¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ¾ÙÐеÄBlackHat 2023Ñݽ²ÖйûÕæ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/


3¡¢AhnLab·¢Ã÷Õë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit


ýÌå8ÔÂ5Èճƣ¬£¬£¬£¬AhnLab·¢Ã÷ʹÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ£¿£¿£¿ £¿£¿£¿£¿£¿éRootkit£¬£¬£¬£¬¿ÉÔÚGitHubÉÏ»ñÈ¡£¬£¬£¬£¬ÓëÆäËüRootkit²î±ð£¬£¬£¬£¬Ëü»¹Ìṩ·´Ïòshell¡£¡£¡£¡£¡£¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£©£¬£¬£¬£¬ÔÚ±»Ñ¬È¾ÏµÍ³ÉÏ·­¿ªÌض¨¶Ë¿Ú£¬£¬£¬£¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´½¨ÉèC2ÅþÁ¬¡£¡£¡£¡£¡£¡£×Ô2022ÄêÒÔÀ´£¬£¬£¬£¬ÖÁÉÙÓÐ4¸ö²î±ðµÄ»î¶¯Ê¹ÓÃÁËReptile¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ÓÉÓÚ´úÂ뿪Դ£¬£¬£¬£¬ReptileºÜÈÝÒ×±»ÖÖÖÖ¹¥»÷ÍÅ»ïʹÓᣡ£¡£¡£¡£¡£


https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html


4¡¢PaperCutÐÞ¸´NG/MF´òÓ¡ÖÎÀíÈí¼þÎó²îCVE-2023-39143 


8ÔÂ5ÈÕ±¨µÀ³Æ£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚWindows°æ±¾PaperCut´òÓ¡ÖÎÀíÈí¼þÖз¢Ã÷ÁËÒ»¸öеÄÎó²î£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸ö·¾¶±éÀúÎó²î£¨CVE-2023-39143£©£¬£¬£¬£¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«í§ÒâÎļþ£¬£¬£¬£¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬¸ÃÎó²îÖ»Ó°ÏìÍⲿװ±¸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÉèÖõÄЧÀÍÆ÷£¬£¬£¬£¬µ«´ó´ó¶¼Windows PaperCutЧÀÍÆ÷¶¼ÆôÓÃÁ˸ù¦Ð§¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html


5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úÕþ¸®³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶


ýÌå8ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬Íâ°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢¡£¡£¡£¡£¡£¡£SercoµÄ¿Í»§°üÀ¨ÃÀ¹úÁìÍÁÇå¾²²¿¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úÇ鱨»ú¹¹ºÍ¶à¸öÎä×°²½¶Ó£¬£¬£¬£¬2022ÄêÊÕÈ볬57ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£Ð¹Â¶Ô´ÓÚÆä¸£ÀûÖÎÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)ЧÀÍÆ÷Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ5Ô·Ý£¬£¬£¬£¬CBIZÔÚ6ÔÂ5ÈÕ½ÓÄɲ½·¥»º½â¸ÃÊÂÎñ£¬£¬£¬£¬SercoÓÚ6ÔÂ30ÈÕ»ñϤ´Ë´Î¹¥»÷ºÍй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/


6¡¢Trend MicroÐû²¼½üÆÚBatloader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


8ÔÂ7ÈÕ£¬£¬£¬£¬Trend MicroÐû²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬Batloader±³ºóµÄºÚ¿Í£¨ÃüÃûΪWater Minyades£©ÒÑ×îÏÈʹÓà Pyarmor ProÀ´»ìÏýÆäÖ÷Òª¶ñÒâPython¾ç±¾¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»Ö±ÔÚʹÓÃPyarmor£¬£¬£¬£¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor±ê×¼°æ±¾¡£¡£¡£¡£¡£¡£³ýÁËÈÆ¹ýÊÖÒÕÖ®Í⣬£¬£¬£¬Batloader»¹Ê¹ÓÃÖÖÖÖ·½·¨À´ÔöÌí¼ì²âµÄÄѶÈ£¬£¬£¬£¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß¡£¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html