Realtek SoCÖеķì϶ӰÏì¶à¸öOEMµÄÊý°ÙÍòÉ豸

°ä²¼¹¦·ò 2022-08-17
1¡¢Realtek SoCÖеķì϶ӰÏì¶à¸öOEMµÄÊý°ÙÍòÉ豸

      

¾Ý8ÔÂ16ÈÕ±¨Â· £¬×êÑÐÈËÔ±°ä²¼ÁËÀûÓÃRealtek RTL819xƬÉÏϵͳ£¨SoC£©µÄÍøÂçÉ豸Öзì϶µÄ¹¥»÷´úÂë £¬Ô¤¼ÆÊÜÓ°ÏìÉ豸¶à´ïÊý°ÙÍǫ̀¡£ÕâÊÇ»ùÓÚ²Ö¿âµÄ»º³åÇøÒç¶Âí½Å£¨CVE-2022-27255£© £¬CVSSÆÀ·ÖΪ9.8 £¬¿ÉÓÃÀ´½ÚÔì¶à¸öԭʼÉ豸Ôì×÷ÉÌ(OEM)µÄÉ豸 £¬Ô̺¬Â·ÓÉÆ÷¡¢APºÍÖÐ¼ÌÆ÷µÈ¡£¾ßÌåÀ´Ëµ £¬Ô¶³Ì¹¥»÷Õß¿Éͨ¹ýÆäÀûÓôøÓжñÒâSDPÊý¾ÝµÄSIPÊý¾Ý°üÖ´ÐдúÂë¶øÎÞÐèÉí·ÝÑéÖ¤ £¬RealtekÒÑÔÚ3Ô·ݽ¨¸´¸Ã·ì϶¡£


https://www.bleepingcomputer.com/news/security/exploit-out-for-critical-realtek-flaw-affecting-many-networking-devices/


2¡¢°¢¸ùÍ¢¿Æ¶û¶àÍß˾·¨»ú¹¹Ôâµ½PlayÍÅ»ïµÄÀÕË÷¹¥»÷

      

¾ÝýÌå8ÔÂ15ÈÕ±¨Â· £¬°¢¸ùÍ¢¿Æ¶û¶àÍß˾·¨»ú¹¹ÔÚÔâµ½PlayÍÅ»ïµÄÀÕË÷Èí¼þ¹¥»÷ºóITϵͳ¹Ø¹Ø¡£¹¥»÷²úÉúÔÚ8ÔÂ13ÈÕ £¬ÏµÍ³ºÍÍøÂçÃÅ»§ÖÐ¶ÏÆÈʹԱ¹¤Ê¹ÓñʺÍÖ½À´Ìá½»¹Ù·½Îļþ¡£Clar¨ªn±¨Â·³Æ £¬¹¥»÷Ó°ÏìÁË˾·¨»ú¹¹µÄϵͳºÍÊý¾Ý¿â £¬ÊǺ¹ÇàÉÏÕë¶Ô¹«¹²»ú¹¹×îÑϳÁµÄ¹¥»÷¡£¹ÌÈ»¸Ã»ú¹¹ÉÐδÅû¶Õâ´Î¹¥»÷µÄϸ½Ú £¬µ«ÓмÇÕßй© £¬¼ÓÃÜÎļþÔö³¤ÁË¡°.Play¡±À©´óÃû £¬Õâ¿ÉÄÜÓë2022Äê6ÔÂÆðÍ·»îÔ¾µÄÐÂÀÕË÷ÍÅ»ïPlayÓйØ¡£


https://www.bleepingcomputer.com/news/security/argentinas-judiciary-of-c-rdoba-hit-by-play-ransomware-attack/


3¡¢Î¢Èí³ÆÒÑ×èÖ¹SEABORGIUMÍÅ»ï½üÆÚµÄ´¹µö¹¥»÷»î¶¯

      

¾Ý΢Èí8ÔÂ15ÈÕй© £¬ÆäÒÑ×èÖ¹ÁËSEABORGIUMÍŻҲ³ÆColdRiverºÍTA446£©½üÆÚµÄ¹¥»÷»î¶¯¡£¸ÃÍÅ»ïÓë¶íÂÞ˹ÓйØ £¬ÖØÒªÕë¶Ô±±Ô¼¹ú¶È £¬ÇÔÈ¡µç×ÓÓʼþºÍÎļþµÈ¡£SEABORGIUMÊ×ÏÈͨ¹ýµç×ÓÓʼþ¡¢É罻ýÌåºÍLinkedInÕÊ»§´´½¨Î±ÔìÉí·Ý £¬²¢ÓøÃÐéαÉí·ÝÁªÏµ¸ÐÐËÖµÄÈËÀ´³ÉÁ¢ÈÚÇ¢µÄ¹ØÏµ £¬×îÖÕ·¢ËÍ´¹µöÓʼþ¡£Î¢Èí°µÊ¾ÒѲÉÈ¡Ðж¯ £¬½ûÓÃÁËÓÃÓڼල¡¢´¹µöºÍÇÔÈ¡µç×ÓÓʼþµÄÕÊ»§ £¬²¢¹«¿ªÁË69¸öÓë¹¥»÷»î¶¯ÓйصÄÓò¡£


https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/


4¡¢Symantec·¢ÏÖShuckwormÕë¶ÔÎÚ¿ËÀ¼×éÖ¯µÄ¹¥»÷»î¶¯

      

8ÔÂ15ÈÕ £¬Symantec³Æ·¢ÏÖÕë¶ÔÎÚ¿ËÀ¼µÄShuckwormËÆºõÔÚÏòÖ¸±ê·Ö·¢ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£»î¶¯ÓÚ7ÔÂ15ÈÕÆðÍ· £¬Ê¼ÓÚÒ»¸öͨ¹ýϵͳĬÈÏä¯ÀÀÆ÷ÏÂÔØµÄ×Ô½âѹ7-ZipÎļþ £¬Ëæºómshta.exe»áÏÂÔØÒ»¸öXMLÎļþ £¬¸ÃÎļþ¿ÉÄܼÙ×°³ÉHTMLÀûÓ÷¨Ê½(HTA)Îļþ £¬¶øºóÖ´ÐÐPowerShellÇÔÈ¡·¨Ê½¡£±»Ï°È¾É豸Öл¹ÓÐÁ½¸öÔ̺¬juiceºÍjustice×ÖÑùµÄVBSÏÂÔØÆ÷ £¬·ÖÎö·¢ÏÖËüÃÇÊÇPterodoºóÃÅ£»×êÑÐÈËÔ±»¹·¢ÏÖÁ˶à¸öÔ̺¬ntuser×ÖÑùµÄ¿ÉÒÉÎļþ £¬´óÎÞÊý±»¼ì²âΪGiddomeºóÃÅ¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/russia-ukraine-shuckworm


5¡¢×êÑÐÈËÔ±¼ì²âµ½¶à¸öÖ¼ÔÚÖ´ÐÐDDoS¹¥»÷µÄ¶ñÒâPyPi°ü

      

ýÌå8ÔÂ15ÈÕ³Æ £¬Checkmarx×êÑÐÈËÔ±¼ì²âµ½Ê®¼¸¸ö¶ñÒâPyPi°ü £¬Ö¼ÔÚ¶ÔCounter-Strike 1.6·þÎñÆ÷Ö´ÐÐDDoS¹¥»÷¡£ËüÃÇÓÉÃûΪ¡°devfather777¡±µÄÓû§°ä²¼ £¬Ê¹ÓÃÁËÓëÊ¢ÐÐÈí¼þ°üÀàËÆµÄÃû³ÆÀ´ÓÕÆ­Èí¼þ¿ª·¢ÈËÔ± £¬ÈçGesnim(·ÂÕÕGensim)ºÍipaddres(·ÂÕÕipaddress)µÈ¡£×êÑÐÈËÔ±³Æ £¬ÅäÖúÅÁî¶ñÒâÈí¼þ½«Ö¸±êÖ÷»úÔö³¤µ½DDoS botÖÐ £¬Ïò¶íÂÞ˹Counter-Strike 1.6 ·þÎñÆ÷·¢ËÍÁ÷Á¿ £¬Ö¸±êËÆºõÊÇͨ¹ýϰȾ´óÁ¿µÄÉ豸À´·¢ËÍ×ã¹»¶àµÄÁ÷Á¿Ê¹·þÎñÆ÷Òò²»Ê¤³Á¸º¶ø¹Ø¹Ø¡£


https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-aim-ddos-attacks-at-counter-strike-servers/


6¡¢Kaspersky°ä²¼2022ÄêQ2ÒÆ¶¯ÍþÐ²Ì¬ÊÆµÄͳ¼Æ»ã±¨

      

8ÔÂ15ÈÕ £¬Kaspersky°ä²¼Á˹ØÓÚ2022ÄêQ2ÒÆ¶¯ÍþÐ²Ì¬ÊÆµÄͳ¼Æ»ã±¨¡£2022ÄêµÚ¶þ¼¾¶È £¬Kaspersky¼ì²âµ½ÁË405684¸ö¶ñÒâ×°Öðü £¬»·±ÈÏ÷¼õ110933¸ö £¬Í¬±ÈÏ÷¼õ480421¸ö¡£Òƶ¯¶ñÒâÈí¼þ°´ÀàÐÍÖÐ £¬AdWareÕ¼±È×î´ó £¬Îª25.28% £¬Æä´ÎÊÇRiskTool£¨20.81%£©ºÍľÂí£¨20.49%£©¡£Ôâµ½ÒÆ¶¯¶ñÒâÈí¼þ¹¥»÷×î¶àµÄ¹ú¶ÈÊÇÒÁÀÊ£¨26.91%£© £¬Æä´ÎÊÇÒ²ÃÅ£¨17.97%£©ºÍÉ³ÌØ°¢À­²®£¨12.63%£©¡£


https://securelist.com/it-threat-evolution-in-q2-2022-mobile-statistics/107123/