¿ÆÂÞÀ­¶àÖݸߵµ½ÌÓý²¿ÃÅÔâµ½ÀÕË÷¹¥»÷´óÁ¿Êý¾Ýй¶

°ä²¼¹¦·ò 2023-08-07

1¡¢¿ÆÂÞÀ­¶àÖݸߵµ½ÌÓý²¿ÃÅÔâµ½ÀÕË÷¹¥»÷´óÁ¿Êý¾Ýй¶

 

¾Ý8ÔÂ4ÈÕ±¨Â· £¬ÃÀ¹ú¿ÆÂÞÀ­¶àÖݸߵµ½ÌÓý²¿ÃÅ(CDHE)Ôâµ½ÀÕË÷¹¥»÷ £¬µ¼ÖÂÁËһ·´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ ¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷ ¡£µ÷²éÏÔʾ £¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ½Ó¼ûÁËCDHEµÄϵͳ £¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý ¡£CDHEûÓÐй©Óм¸¶àÈËÊܵ½Ó°Ïì £¬µ«ÓÉÓÚÎ¥¹æµÄ¹¦·ò¿ç¶È´Ó2004Äêµ½2020Äê £¬¿ÉÄÜÉæ¼°´óÁ¿Ñ§ÉúºÍÔ±¹¤ ¡£CDHE½«ÎªÊÜÓ°ÏìµÄÓ×ÎÒÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿Ø·þÎñ ¡£


https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/


2¡¢×êÑÐÈËÔ±ÑÝʾÈôºÎÔ½ÓüÌØË¹À­ÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿


¾ÝýÌå8ÔÂ6ÈÕ±¨Â· £¬°ØÁÖ¹¤Òµ´óѧµÄ×êÑÐÈËÔ±¿ª·¢ÁËÒ»ÖÖ²½Öè £¬Äܹ»Ô½Óü×îÐÂÌØË¹À­³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ ¡£´Ë±í £¬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØË¹À­ÔÚÆä·þÎñÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿ £¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨Ö°ÄÜ £¬Èç×ùÒμÓÈȵȸ¶·ÑÖ°ÄÜ ¡£ÌØË¹À­µÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU £¬Òò¶ø×êÑÐÈËÔ±Äܹ»³¢ÊÔÀûÓÃ֮ǰ·¢Ïֵķì϶ʵÏÖÔ½Óü ¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ½øÐеÄBlackHat 2023Ñݽ²Öй«¿ª ¡£


https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/


3¡¢AhnLab·¢ÏÖÕë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit


ýÌå8ÔÂ5ÈÕ³Æ £¬AhnLab·¢ÏÖÀûÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯ ¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ£¿éRootkit £¬¿ÉÔÚGitHubÉÏ»ñÈ¡ £¬ÓëÆäËüRootkit·ÖÆç £¬Ëü»¹Ìṩ·´Ïòshell ¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£© £¬ÔÚ±»Ï°È¾ÏµÍ³ÉÏ´ò¿ªÌض¨¶Ë¿Ú £¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´³ÉÁ¢C2ÏνÓ ¡£×Ô2022ÄêÒÔÀ´ £¬ÖÁÉÙÓÐ4¸ö·ÖÆçµÄ»î¶¯ÀûÓÃÁËReptile ¡£×êÑÐÈËÔ±³Æ £¬ÓÉÓÚ´úÂ뿪Դ £¬ReptileºÜÈÝÒ×±»¸÷À๥»÷ÍÅ»ïÀûÓà ¡£


https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html


4¡¢PaperCut½¨¸´NG/MF´òÓ¡ÖÎÀíÈí¼þ·ì϶CVE-2023-39143 


8ÔÂ5ÈÕ±¨Â·³Æ £¬×êÑÐÈËÔ±ÔÚWindows°æ±¾PaperCut´òÓ¡ÖÎÀíÈí¼þÖз¢ÏÖÁËÒ»¸öеķì϶ £¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐÐ ¡£ÕâÊÇÒ»¸öõè¾¶±éÀú·ì϶£¨CVE-2023-39143£© £¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«ËÁÒâÎļþ £¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾ ¡£×êÑÐÈËÔ±³Æ £¬¸Ã·ì϶ֻӰÏì±í²¿É豸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÅäÖõķþÎñÆ÷ £¬µ«´óÎÞÊýWindows PaperCut·þÎñÆ÷¶¼ÆôÓÃÁ˸ÃÖ°ÄÜ ¡£Ä¿Ç° £¬¸Ã·ì϶Òѱ»½¨¸´ ¡£


https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html


5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úµ±¾Ö³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶


ýÌå8ÔÂ3ÈÕ±¨Â· £¬±í°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËһ·Êý¾Ýй¶ÊÂÎñ £¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢ ¡£SercoµÄ¿Í»§Ô̺¬ÃÀ¹úºÓɽ°²È«Êý¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úµý±¨»ú¹¹ºÍ¶à¸öÎä×°¶ÓÁÐ £¬2022ÄêÊÕÈ볬57ÒÚÃÀÔª ¡£Ð¹Â¶Ô´ÓÚÆä¸£ÀûÖÎÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)·þÎñÆ÷Ôâµ½¹¥»÷ ¡£¹¥»÷ʼÓÚ5Ô·Ý £¬CBIZÔÚ6ÔÂ5ÈÕ²ÉÈ¡´ëÊ©»º½â¸ÃÊÂÎñ £¬SercoÓÚ6ÔÂ30ÈÕ»ñϤÕâ´Î¹¥»÷ºÍй¶ÊÂÎñ ¡£


https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/


6¡¢Trend Micro°ä²¼½üÆÚBatloader¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨


8ÔÂ7ÈÕ £¬Trend Micro°ä²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨ ¡£×êÑÐÈËÔ±·¢ÏÖ £¬Batloader±³ºóµÄºÚ¿Í£¨¶¨ÃûΪWater Minyades£©ÒÑÆðͷʹÓà Pyarmor ProÀ´»ìºÏÆäÖØÒª¶ñÒâPython¾ç±¾ ¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»ÏòÔÚʹÓÃPyarmor £¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor³ß¶È°æ±¾ ¡£³ýÁËÈÆ¹ý¼¼ÊõÖ®±í £¬Batloader»¹Ê¹Óø÷À෽ʽÀ´Ôö³¤¼ì²âµÄÄѶÈ £¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß ¡£


https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html