Ó¢ÌØ¶ûÈ·ÈÏAlder Lake CPUµÄUEFI BIOSÔ´´úÂëй©

°ä²¼¹¦·ò 2022-10-10
1¡¢Ó¢ÌضûÈ·ÈÏAlder Lake CPUµÄUEFI BIOSÔ´´úÂëй©

      

¾ÝýÌå10ÔÂ9ÈÕ±¨Â· £¬Ó¢ÌضûÒѾ­Ö¤Êµ £¬Alder Lake cpuµÄUEFI BIOSÔ´´úÂëй¶¡£Alder LakeÊǵÚ12´úÓ¢ÌØ¶û¿á¦ÖÃÆ÷ £¬ÓÚ2021Äê11Ô°䲼¡£ÉÏÖÜÎå £¬TwitterÓû§freak°ä²¼Á˾ݳÆÊÇAlder LakeµÄUEFI¹Ì¼þÔ´´úÂëµÄÁ´½Ó £¬¸ÃÁ´½ÓÖ¸ÏòGitHub´æ´¢¿âICE_TEA_BIOS £¬ÆäÖÐÔ̺¬5.97 GBµÄÎļþ¡¢Ô´´úÂ롢˽Կ¡¢¸ü¸ÄÈÕÖ¾ºÍ±àÒ빤¾ß¡£ÎļþµÄ×îй¦·ò´ÁΪ22Äê9ÔÂ30ÈÕ £¬Ä¿Ç°Éв»Ã÷ÏÔÔ´´úÂëÊÇÔÚÍøÂç¹¥»÷ÆÚ¼ä±»µÁ»¹ÊDZ»ÄÚ²¿ÈËԱй¶¡£²»Íâ £¬Ó¢ÌضûÒÑÈ·ÈÏÔ´´úÂëÊÇÕæÊµµÄ £¬ÊÇËüµÄרÓÐUEFI´úÂë¡£


https://www.bleepingcomputer.com/news/security/intel-confirms-leaked-alder-lake-bios-source-code-is-authentic/


2¡¢Ó¢¹úEasylifeÎ¥·´Êý¾Ý± £»¤ºÍÓªÏú·¨±»·£¿î150ÍòÓ¢°÷

      

10ÔÂ6ÈÕ±¨Â·³Æ £¬Ó¢¹úÁãÊÛÉÌEasylifeÒòÎ¥·´Êý¾Ý± £»¤ºÍÓªÏú·¨¶ø±»¸Ã¹úµÄÐÅÏ¢¼à¹Ü»ú¹¹·£¿î½ü150ÍòÓ¢°÷¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©°µÊ¾ £¬EasylifeÔÚδ¾­¿Í»§Ô޳ɵÄÇé¿öÏÂʹÓÃÆäÓ×ÎÒÐÅÏ¢ÏòËûÃÇÍÆÏú½¡È«ÓйزúÆ· £¬¶øÕâÖÖ¡°ÒþÐΡ±Êý¾Ý´¦Öó¤¶Ì·¨µÄ¡£¼à¹Ü»ú¹¹µÄÁíÒ»Ïîµ÷²é·¢ÏÖ £¬ÔÚ2019Äê8ÔÂÖÁ2020Äê8ÔÂÆÚ¼ä £¬EasylifeÏòÔڵ绰ƫºÃ·þÎñ(TPS)×¢²áµÄÈ˲¦´òÁ˳¬¹ý130Íò´ÎÀ¬»øÓªÏúµç»°¡£ICOÒòÎ¥·´Êý¾Ý± £»¤·¨¶ÔEasylife·£¿î135ÍòÓ¢°÷ £¬ÒòÓªÏúµç»°·£¿î13ÍòÓ¢°÷¡£


https://www.infosecurity-magazine.com/news/retailer-easylife-fined-15m-data/


3¡¢Synopsys×êÑÐÈËÔ±Åû¶Ò˼ÒÖÇÄÜÕÕÃ÷ϵͳÖеÄ2¸ö·ì϶

      

ýÌå10ÔÂ7ÈÕ±¨Â·³Æ £¬Synopsys×êÑÐÈËÔ±·¢ÏÖÒ˼ÒÖÇÄÜÕÕÃ÷ϵͳÖдæÔÚ2¸ö·ì϶¡£ÆäÖÐÒ»¸ö·ì϶׷×ÙΪCVE-2022-39064 £¬¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ýºÍ̸·¢ËͶñÒâ֡ʹÒ˼ҵÄTR?DFRIµÆÅÝÉÁ¶¯ £¬ÈôÊÇÂŴγÁ¸´·¢ËͶñÒâÐÂÎÅ £¬µÆÅÝ»áÖ´Ðгö³§³ÁÖà £¬Ö®ºóÓû§ÎÞ·¨Í¨¹ýÒ˼ÒÖÇÄܼҾÓÀûÓûòTR?DFRIÒ£¿ØÆ÷½ÚÔìµÆÅÝ¡£ÁíÒ»¸ö·ì϶ΪCVE-2022-39065 £¬¿Éµ¼ÖÂTR?DFRI¶ÔÉ豸Ò£¿ØÆ÷ºÍÒ˼ÒÖÇÄܼҾÓÀûÓÃûÓÐÏìÓ¦¡£ 


https://therecord.media/researchers-find-bugs-in-ikea-smart-lighting-system/


4¡¢Ó¢¹ú±£ÏÕÂòÂôËùÀͺÏÉ罫³ÁÆôϵͳÒÔÓ¦¶Ô½üÆÚµÄ¹¥»÷ÊÂÎñ

      

¾Ý10ÔÂ7ÈÕ±¨Â· £¬Ó¢¹ú±£ÏÕÂòÂôËùÀͺÏÉ磨Lloyd¡¯s of London£©Í¨¹ý³ÁÆôÆäϵͳÀ´Ó¦¶Ô¿ÉÄܵÄÍøÂç¹¥»÷¡£Lloyd'sÔÚÆäÍøÂçÉϼì²âµ½ÁËÒì³ £»î¶¯ £¬²¢ÔÚµ÷²é¸ÃÎÊÌâ¡£´Ë±í £¬Ëü»¹³ÁÖÃÁËÍøÂçºÍϵͳ £¬²¢¹Ø¹ØÁË±í²¿ÏνÓ £¬Ô̺¬LloydµÄÊÚȨƽ̨¡£¸Ã¹«Ë¾°µÊ¾ £¬ËûÃÇÒÑ֪ͨÊг¡²Î¼ÓÕߺÍÓйظ÷·½ £¬Ò»µ©µ÷²éʵÏÖ £¬½«»áÌṩ¸ü¶àÐÅÏ¢¡£¸Ã¹«Ë¾²¢Î´¹«¿ª¹¥»÷ϸ½Ú £¬µ«Õë¶Ô¸ÃÊÂÎñ²ÉÈ¡µÄ´ëÊ©Åú×¢Õâ¿ÉÄÜÊÇÀÕË÷¹¥»÷¡£


https://www.databreaches.net/lloyds-of-london-reboots-its-network/


5¡¢BlackByteÀûÓÃWindowsÇý¶¯·¨Ê½ÖеķìÏ¶ÈÆ¹ý¼ì²â

      

SophosÔÚ10ÔÂ4ÈÕ³ÆÆä·¢ÏÖÁËBlackByteÔËÓªÍÅ»ïÔÚʹÓõÄ×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯·¨Ê½(BYOVD)¹¥»÷À´Èƹý°²È«²úÆ·¡£¹¥»÷ÕßÀûÓÃÁ˺Ϸ¨µÄÇý¶¯·¨Ê½RTCore64.sysÖеķì϶£¨CVE-2019-16098£© £¬¸Ã·ì϶¿É±»¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÓÃÓÚ¶ÁÈ¡ºÍдÈëËÁÒâÄÚ´æ £¬²¢µ¼ÖÂȨÏÞÌáÉý¡¢´úÂëÖ´ÐлòÐÅϢй¶¡£¸ÃÈÆ¹ý¼¼Êõ¿É½ûÓó¬¹ý1000¸öÇý¶¯·¨Ê½ £¬°²È«²úÆ·ÒÀ¸½ÕâЩÇý¶¯·¨Ê½À´Ìṩ± £»¤¡£´Ë±í £¬¶ÔÀÕË÷Èí¼þÑù±¾µÄ·ÖÎö·¢ÏÖËüÓ뿪Դ¹¤¾ßEDRSandblastʹÓõÄEDRÈÆ¹ýʵÏÖÓкܶàÀàËÆÖ®´¦¡£


https://news.sophos.com/en-us/2022/10/04/blackbyte-ransomware-returns/


6¡¢Zscaler³ÆÐ¶ñÒâÈí¼þLilithBotÓëEternityÍÅ»ïÓйØ

      

10ÔÂ5ÈÕ £¬ZscalerÅû¶ÁËжñÒâÈí¼þLilithBotÓëEternityÍÅ»ïÖ®¼äµÄ¹ØÏµ¡£EternityÔËÓª×ÅÒ»¸öͬÃûµÄ¶ñÒâÈí¼þ¼´·þÎñ(MaaS) £¬Óë¶íÂÞ˹Jester GroupÓйØ¡£LilithBotÓÉEternityͨ¹ýרÓõÄTelegram channel·Ö·¢ £¬Äܹ»Í¨¹ýTor½øÐвɰì¡£ËüÓµÓи߼¶Ö°ÄÜ £¬¿ÉÓÃ×÷miner¡¢stealerºÍclipper¡£¹¥»÷Õßͨ¹ýÔö³¤ÐÂÖ°ÄÜ£¨Ô̺¬·´µ÷ÊÔÖ°Äܺͷ´Ðé¹¹»ú²é³­£©À´²»ÐݼÓÇ¿¶ñÒâÈí¼þ¡£´Ë±í £¬×êÑÐÈËÔ±»¹ÌṩÁ˹¥»÷ÓйصÄIOCÒÔ¼°MITRE ATT&CK¼¼Êõϸ½Ú¡£


https://www.zscaler.com/blogs/security-research/analysis-lilithbot-malware-and-eternity-threat-group