¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶

Ðû²¼Ê±¼ä 2023-08-07

1¡¢¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶

 

¾Ý8ÔÂ4ÈÕ±¨µÀ£¬£¬£¬ÃÀ¹ú¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿·Ö(CDHE)Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬µ¼ÖÂÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ»á¼ûÁËCDHEµÄϵͳ£¬£¬£¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý¡£¡£¡£¡£CDHEûÓÐ͸¶Óм¸¶àÈËÊܵ½Ó°Ï죬£¬£¬µ«ÓÉÓÚÎ¥¹æµÄʱ¼ä¿ç¶È´Ó2004Äêµ½2020Ä꣬£¬£¬¿ÉÄÜÉæ¼°´ó×ÚѧÉúºÍÔ±¹¤¡£¡£¡£¡£CDHE½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£


https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/


2¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÔ½ÓüÌØË¹À­ÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿


¾ÝýÌå8ÔÂ6ÈÕ±¨µÀ£¬£¬£¬°ØÁÖ¹¤Òµ´óѧµÄÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖÒªÁ죬£¬£¬¿ÉÒÔÔ½Óü×îÐÂÌØË¹À­³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ¡£¡£¡£¡£±ðµÄ£¬£¬£¬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØË¹À­ÔÚÆäЧÀÍÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿£¬£¬£¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨¹¦Ð§£¬£¬£¬Èç×ùÒμÓÈȵȸ¶·Ñ¹¦Ð§¡£¡£¡£¡£ÌØË¹À­µÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU£¬£¬£¬Òò´ËÑо¿Ö°Ô±¿ÉÒÔʵÑéʹÓÃ֮ǰ·¢Ã÷µÄÎó²îʵÏÖÔ½Óü¡£¡£¡£¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ¾ÙÐеÄBlackHat 2023Ñݽ²ÖйûÕæ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/


3¡¢AhnLab·¢Ã÷Õë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit


ýÌå8ÔÂ5Èճƣ¬£¬£¬AhnLab·¢Ã÷ʹÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£¡£¡£¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ £¿£¿£¿£¿£¿£¿éRootkit£¬£¬£¬¿ÉÔÚGitHubÉÏ»ñÈ¡£¡£¡£¡£¬£¬£¬ÓëÆäËüRootkit²î±ð£¬£¬£¬Ëü»¹Ìṩ·´Ïòshell¡£¡£¡£¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£©£¬£¬£¬ÔÚ±»Ñ¬È¾ÏµÍ³ÉÏ·­¿ªÌض¨¶Ë¿Ú£¬£¬£¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´½¨ÉèC2ÅþÁ¬¡£¡£¡£¡£×Ô2022ÄêÒÔÀ´£¬£¬£¬ÖÁÉÙÓÐ4¸ö²î±ðµÄ»î¶¯Ê¹ÓÃÁËReptile¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬ÓÉÓÚ´úÂ뿪Դ£¬£¬£¬ReptileºÜÈÝÒ×±»ÖÖÖÖ¹¥»÷ÍÅ»ïʹÓᣡ£¡£¡£


https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html


4¡¢PaperCutÐÞ¸´NG/MF´òÓ¡ÖÎÀíÈí¼þÎó²îCVE-2023-39143 


8ÔÂ5ÈÕ±¨µÀ³Æ£¬£¬£¬Ñо¿Ö°Ô±ÔÚWindows°æ±¾PaperCut´òÓ¡ÖÎÀíÈí¼þÖз¢Ã÷ÁËÒ»¸öеÄÎó²î£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£ÕâÊÇÒ»¸ö·¾¶±éÀúÎó²î£¨CVE-2023-39143£©£¬£¬£¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«í§ÒâÎļþ£¬£¬£¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬¸ÃÎó²îÖ»Ó°ÏìÍⲿװ±¸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÉèÖõÄЧÀÍÆ÷£¬£¬£¬µ«´ó´ó¶¼Windows PaperCutЧÀÍÆ÷¶¼ÆôÓÃÁ˸ù¦Ð§¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£


https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html


5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úÕþ¸®³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶


ýÌå8ÔÂ3ÈÕ±¨µÀ£¬£¬£¬Íâ°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢¡£¡£¡£¡£SercoµÄ¿Í»§°üÀ¨ÃÀ¹úÁìÍÁÇå¾²²¿¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úÇ鱨»ú¹¹ºÍ¶à¸öÎä×°²½¶Ó£¬£¬£¬2022ÄêÊÕÈ볬57ÒÚÃÀÔª¡£¡£¡£¡£Ð¹Â¶Ô´ÓÚÆä¸£ÀûÖÎÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)ЧÀÍÆ÷Ôâµ½¹¥»÷¡£¡£¡£¡£¹¥»÷ʼÓÚ5Ô·ݣ¬£¬£¬CBIZÔÚ6ÔÂ5ÈÕ½ÓÄɲ½·¥»º½â¸ÃÊÂÎñ£¬£¬£¬SercoÓÚ6ÔÂ30ÈÕ»ñϤ´Ë´Î¹¥»÷ºÍй¶ÊÂÎñ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/


6¡¢Trend MicroÐû²¼½üÆÚBatloader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


8ÔÂ7ÈÕ£¬£¬£¬Trend MicroÐû²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬Batloader±³ºóµÄºÚ¿Í£¨ÃüÃûΪWater Minyades£©ÒÑ×îÏÈʹÓà Pyarmor ProÀ´»ìÏýÆäÖ÷Òª¶ñÒâPython¾ç±¾¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»Ö±ÔÚʹÓÃPyarmor£¬£¬£¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor±ê×¼°æ±¾¡£¡£¡£¡£³ýÁËÈÆ¹ýÊÖÒÕÖ®Í⣬£¬£¬Batloader»¹Ê¹ÓÃÖÖÖÖ·½·¨À´ÔöÌí¼ì²âµÄÄѶȣ¬£¬£¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html