GoogleÔÚÈýÐÇExynosоƬ×éÖз¢Ã÷18¸öÇå¾²Îó²î
Ðû²¼Ê±¼ä 2023-03-171¡¢GoogleÔÚÈýÐÇExynosоƬ×éÖз¢Ã÷18¸öÇå¾²Îó²î
¾Ý3ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬Google Project ZeroÔÚÒÆ¶¯×°±¸¡¢¿ÉÒÂ×Å×°±¸ºÍÆû³µÖÐʹÓõÄÈýÐÇExynosоƬ×éÖз¢Ã÷ÁË18¸öÎó²î¡£¡£¡£¡£¡£¡£ÆäÖÐ4¸öÎó²î½ÏΪÑÏÖØ£¬£¬£¬£¬£¬¿Éµ¼Ö´ӻ¥ÁªÍøµ½»ù´øµÄÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬°üÀ¨CVE-2023-24033ºÍÆäËü3¸öÉÐδ·ÖÅÉCVE-IDµÄÎó²î¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÖ»ÐèÒªÖªµÀÄ¿µÄµÄµç»°ºÅÂë¾Í¿ÉÒÔʹÓÃÕâЩÎó²î£¬£¬£¬£¬£¬ÎÞÐèÓëÓû§½»»¥¡£¡£¡£¡£¡£¡£ÈýÐÇÒѾÏòÆäËü¹©Ó¦ÉÌÌṩÏàʶ¾öÊÜÓ°ÏìоƬ×éÖÐÕâЩÎó²îµÄÇå¾²¸üУ¬£¬£¬£¬£¬µ«Ã¿¸öÖÆÔìÉÌÕë¶ÔÆä×°±¸µÄ²¹¶¡Ê±¼ä±í»áÓÐËù²î±ð¡£¡£¡£¡£¡£¡£ÔÚ²¹¶¡¿ÉÓÃ֮ǰ£¬£¬£¬£¬£¬Óû§¿ÉÒÔͨ¹ý½ûÓÃWi-Fiͨ»°ºÍLTEÓïÒô(VoLTE)À´±ÜÃâ»ù´øÔ¶³Ì´úÂëÖ´Ðй¥»÷¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/143582/hacking/baseband-flaws-samsung-exynos.html
2¡¢º½¿Õ¹«Ë¾Safran GroupϵͳÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶
¾ÝýÌå3ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬·¨¹úµÄ¿ç¹úº½¿Õ¹«Ë¾Safran GroupϵͳÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£ÕâÊÇÈ«ÇòµÚ°Ë´óº½¿Õº½Ì칩ӦÉÌ£¬£¬£¬£¬£¬2022ÄêµÄÊÕÈëÁè¼Ý190ÒÚÅ·Ôª¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬¿ªÔ´ÊÓÆµÍ¨»°Ó¦ÓóÌÐòJitsi MeetµÄ²âÊÔ°æÉèÖÃÖÐʹÓÃÁËÒ»¸ö¹ûÕæµÄÇéÐÎÎļþ¡£¡£¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬£¬£¬¸ÃÎļþÒѹûÕæÁËÒ»Äê°ë×óÓÒ¡£¡£¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨LaravelÓ¦ÓóÌÐòÃÜÔ¿¡¢JSON WebÁîÅÆ(JWT)ÃÜÔ¿¡¢MySQLƾ֤ºÍSMTPƾ֤µÈ£¬£¬£¬£¬£¬ÕâЩÃÜÔ¿ºÍƾ֤¿É±»¹¥»÷ÕßÓÃÀ´»á¼ûÍøÕ¾ºó¶Ë¡¢Ô±¹¤ÅÌËã»úºÍÆäËüЧÀÍÆ÷¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/key-aerospace-player-leaks-sensitive-data/
3¡¢Latitude FinanceÔâµ½¹¥»÷й¶Áè¼Ý30Íò¿Í»§µÄÐÅÏ¢
ýÌå3ÔÂ15Èճƣ¬£¬£¬£¬£¬½ðÈÚ´û¿î»ú¹¹Latitude FinanceÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬Áè¼Ý300000·Ý¿Í»§Éí·Ý֤ʵÎļþ±»µÁ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬ÒÑÍù¼¸ÌìÔÚÆäϵͳÉϼì²âµ½Òì³£»£»£»£»£»î¶¯¡£¡£¡£¡£¡£¡£ÔÚ¹«Ë¾½ÓÄɲ½·¥Ç°£¬£¬£¬£¬£¬ºÚ¿ÍÇÔÈ¡ÁËÔ±¹¤µÄµÇ¼ÐÅÏ¢£¬£¬£¬£¬£¬ÒÔ»á¼ûÆäËüÁ½¼ÒЧÀÍÌṩÉ̳ÖÓеĿͻ§ÐÅÏ¢¡£¡£¡£¡£¡£¡£ÆäÖеÚÒ»¼ÒÌṩÉÌй¶ÁËÔ¼103000·ÝÉí·Ý֤ʵÎļþ£¬£¬£¬£¬£¬µÚ¶þ¼ÒÌṩÉÌй¶ÁËÔ¼225000Ìõ¿Í»§¼Í¼¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬¹¥»÷Ô´×Ô¸ÃЧÀÍʹÓõÄÒ»¸ö¹©Ó¦ÉÌ¡£¡£¡£¡£¡£¡£
https://7news.com.au/business/retail/latitude-financial-hacked-as-300000-customer-identification-documents-stolen--c-10056836
4¡¢LockBitÉù³Æ¶Ôµ¼ÖÂEssendantÔËÓªÖÐÖ¹µÄ¹¥»÷ÈÏÕæ
3ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬°ì¹«ÓÃÆ··ÖÏúÉÌEssendantÔâµ½ÀÕË÷ÍÅ»ïLockBitµÄ¹¥»÷¡£¡£¡£¡£¡£¡£×Ô3ÔÂ6ÈÕÍíÉÏ×îÏÈ£¬£¬£¬£¬£¬Essendant±¬·¢ÖÐÖ¹£¬£¬£¬£¬£¬¿Í»§ÎÞ·¨Ï¶©µ¥»òÁªÏµEssendantµÄ¿Í»§Ð§ÀÍ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ3ÔÂ7ÈÕ֪ͨÆä¿Í»§ÖØ´óÍøÂçÖÐÖ¹ÊÂÎñ¡£¡£¡£¡£¡£¡£3ÔÂ14ÈÕ£¬£¬£¬£¬£¬LockBitÉù³Æ¶ÔEssendantµÄÍøÂç¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£ÔÚLockBitÉùÃ÷ºó£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ì¸µ½ÆäÕýÔÚ¾ÙÐеĻָ´ÊÂÇ飬£¬£¬£¬£¬°üÀ¨¼´½«Íê³ÉµÄϵͳÕûÀí£¬£¬£¬£¬£¬µ«×îеÄÌû×ÓÈÔÈ»½«¸ÃÊÂÎñ¹é×ïÓÚ¡°ÍøÂçÖÐÖ¹¡±¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-essendant-attack-company-says-network-outage-/
5¡¢ÃÀ¹úUSMS 350GBµÄÖ´·¨ÐÅÏ¢ÒÔ15ÍòÃÀÔªÔÚºÚ¿ÍÂÛ̳³öÊÛ
ýÌå3ÔÂ15ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬ÃÀÍõ·¨¾¯¾Ö(USMS)µÄ350 GBÊý¾ÝÔÚÒ»¸ö¶íÓïºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£¡£¡£¡£¡£¡£¾ÝÂô¼Ò³Æ£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿âµÄÊÛ¼ÛΪ150000ÃÀÔª£¬£¬£¬£¬£¬ÆäÖаüÀ¨2021ÄêÖÁ2023Äê2ÔÂʱ´úÀ´×ÔÎļþЧÀÍÆ÷ºÍÊÂÇéÅÌËã»úµÄÎļþ£¬£¬£¬£¬£¬²»»áÏñexeÎļþºÍ¿âÄÇÑùÂþÒç¡£¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢°üÀ¨¾üÊ»ùµØºÍÆäËü¸ß¶ÈÇå¾²ÇøÓòµÄº½ÅľµÍ·ºÍÕÕÆ¬¡¢»¤ÕÕºÍÉí·ÝÖ¤¼þµÄ¸´Ó¡¼þ£¬£¬£¬£¬£¬ÒÔ¼°ÇÔÌýºÍ¼àÊÓ¹«ÃñµÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£»£»£»£»£»¹°üÀ¨ÓйØ×ï·¸¡¢°ïÆøÑæÄ¿ºÍ··¶¾¼¯ÍŵÄÐÅÏ¢£¬£¬£¬£¬£¬²¿·ÖÎļþ±»±ê¼ÇΪÉñÃØ»ò¾øÃÜ¡£¡£¡£¡£¡£¡£USMSÉÐδ¶Ô´ËÊÂ×÷³ö»ØÓ¦¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hacker-selling-data-allegedly-stolen-in-us-marshals-service-hack/
6¡¢Check PointÐû²¼¹ØÓÚ×¢Èë³ÌÐòdotRunpeXµÄÆÊÎö±¨¸æ
3ÔÂ15ÈÕ£¬£¬£¬£¬£¬Check Point ResearchÐû²¼Á˹ØÓÚ×¢Èë³ÌÐòdotRunpeX¼°ÆäÓë¾É°æ±¾µÄ¹ØÏµµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£DotRunpeXÊÇÒ»ÖÖʹÓÃProcess HollowingÊÖÒÕÔÚ.NETÖбàдµÄÐÂÐÍ×¢Èë³ÌÐò£¬£¬£¬£¬£¬ÓÃÓÚѬȾ¾ßÓÐÖÖÖÖÒÑÖª¶ñÒâÈí¼þϵÁеÄϵͳ¡£¡£¡£¡£¡£¡£Ïà±ÈÓھɰ汾£¬£¬£¬£¬£¬Ð°汾¾ßÓÐÊܶ¨ÖưæKoiVMÐéÄâÆ÷±£»£»£»£»£»¤¡¢¸ß¶È¿ÉÉèÖᢸü¶àUACÈÆ¹ýÊÖÒÕºÍʹÓüòÆÓµÄXOR½âÃÜҪעÈëµÄÖ÷ÒªpayloadµÈÌØµã¡£¡£¡£¡£¡£¡£ÏàËÆÖ®´¦ÊÇÓÃ.NET±àдµÄ64λ¿ÉÖ´ÐÐÎļþ.exeºÍÓÃÀ´×¢È뼸¸ö²î±ðµÄ¶ñÒâÈí¼þ¼Ò×åµÈ¡£¡£¡£¡£¡£¡£
https://research.checkpoint.com/2023/dotrunpex-demystifying-new-virtualized-net-injector-used-in-the-wild/


¾©¹«Íø°²±¸11010802024551ºÅ