¸ßͨæçÁúоƬ¸ßΣÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂ˽Կй¶£»£»£»£»DMSÔâGandCrab¹¥»÷£»£»£»£»ÍÚ¿óÈí¼þBeapy

Ðû²¼Ê±¼ä 2019-04-26
1.¸ßͨæçÁúоƬ¸ßΣÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¸ßͨоƬ×é±£´æÒ»¸ö²àÐŵÀ¹¥»÷Îó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2018-11976£©¿ÉÔÊÐí¹¥»÷Õß´Ó¸ßͨоƬµÄQSEEÇå¾²ÇøÓòÖмìË÷¼ÓÃÜ˽Կ¡£¡£¡£¡£¡£QSEEÊǸßͨоƬµÄ¿ÉÐÅÖ´ÐÐÇéÐΣ¨TEE£©£¬£¬£¬£¬£¬£¬ÀàËÆÓÚÓ¢ÌØ¶ûµÄSGX¡£¡£¡£¡£¡£Æ¾Ö¤NCCÑо¿Ö°Ô±Keegan RyanµÄ±íÊö£¬£¬£¬£¬£¬£¬¸ßͨоƬµÄ¼ÓÃÜÊðÃûËã·¨ECDSA£¨ÍÖÔ²ÇúÏßËã·¨£©±£´æÎó²î£¬£¬£¬£¬£¬£¬¿Éͨ¹ýËæ»úÊýµÄһЩbitÍÆ²â³ö256λECDSAÃÜÔ¿¡£¡£¡£¡£¡£¸ÃÎó²îµÄʹÓÃÐèҪװ±¸µÄrootȨÏÞ¡£¡£¡£¡£¡£ÓÐ46¿î¸ßͨоƬ×éÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬°üÀ¨¶à¿îæçÁúоƬ¡£¡£¡£¡£¡£¸ÃÎó²îµÄÐÞ¸´²¹¶¡ÒѾ­°üÀ¨ÔÚGoogleÐû²¼µÄ4ÔÂAndroidÇå¾²¸üÐÂÖС£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/security-flaw-lets-attackers-recover-private-keys-from-qualcomm-chips/

2.DMSÔâGandCrab¹¥»÷£¬£¬£¬£¬£¬£¬Ô¼38¸öÒ½ÁÆÖÐÐĵÄÊý¾ÝÊÜÓ°Ïì

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ò½ÁÆÕ˵¥Ð§ÀÍÌṩÉÌDoctors¡¯ Management Service£¨DMS£©Ôâµ½ÀÕË÷Èí¼þGandCrab¹¥»÷£¬£¬£¬£¬£¬£¬½ü38¸öÒ½ÁÆÖÐÐĵϼÕßÊý¾ÝÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬°üÀ¨±´¸¥ÀûÍâ¿ÆÐ­»á¡¢ÐÂÓ¢¸ñÀ¼Éñ¾­Ñо¿Ëù¡¢ÐÂÓ¢¸ñÀ¼ÉçÇøÒ½ÁÆÐ§À͵È¡£¡£¡£¡£¡£ÊÜËðÊý¾Ý°üÀ¨»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢°ü¹Ü¡¢Ò½Áưü¹Ü/Ò½ÁƽòÌùÐÅÏ¢µÈ¡£¡£¡£¡£¡£ÊÓ²ìЧ¹ûÅú×¢¶ÔDMSÍøÂçµÄ³õʼδÊÚȨ»á¼û±¬·¢ÔÚ2017Äê4ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬Í¨¹ýDMSÊÂÇéÕ¾ÉϵÄRDPЭÒé¾ÙÐÐÈëÇÖ¡£¡£¡£¡£¡£DMSÒÑ´Ó±¸·ÝÖлָ´ÁËÊý¾Ý£¬£¬£¬£¬£¬£¬ÎÞÐèÖ§¸¶Êê½ð¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/doctors-management-service-hit-with-gandcrab-ransomware-attack-compromising-patient-data-b6eebd02

3.Å·ÖÞÖÆÔìÉÌAebi SchmidtÔâδ֪ÀÕË÷Èí¼þ¹¥»÷

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ÈðÊ¿ÊÐÕþºÍũҵ»úÐµÖÆÔìÉÌAebi Schmidt³ÉΪÀÕË÷Èí¼þ¹¥»÷µÄ×îÐÂÊܺ¦Õß¡£¡£¡£¡£¡£¾ÝTechCrunch±¨µÀ£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÑÏÖØÓ°ÏìÁËAebi SchmidtµÄÅ·ÖÞ»ùµØ£¬£¬£¬£¬£¬£¬µ¼ÖÂÐí¶àϵͳÎÞ·¨ÔËÐУ¬£¬£¬£¬£¬£¬°üÀ¨Ïà¹ØÖÆÔìӪҵϵͳ¡£¡£¡£¡£¡£¸Ã¹«Ë¾µÄµç×ÓÓʼþЧÀÍÒ²Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬²¿·ÖÔ±¹¤±»ÆÈ×îÏÈÐÝÎÞн¼Ù¡£¡£¡£¡£¡£Aebi Schmidt³Æ¹¥»÷µÄÔµ¹ÊÔ­ÓÉÈÔδȷ¶¨¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/unknown-ransomware-cripples-computer-systems-of-aebi-schmidt-ffa880fb

4.жñÒâÍÚ¿óÈí¼þBeapy£¬£¬£¬£¬£¬£¬ÒÑѬȾÁè¼Ý1.2Íò¸öÓû§

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÈüÃÅÌú¿ËÑо¿Ö°Ô±·¢Ã÷жñÒâÍÚ¿óÈí¼þBeapyµÄ¹¥»÷»î¶¯ÔÚ½üÆÚì­Éý¡£¡£¡£¡£¡£BeapyÊ״ηºÆðÓÚ1Ô·ݣ¬£¬£¬£¬£¬£¬×ÔÈýÔ·ÝÒÔÀ´ÒѾ­ÔÚ732¸öÆóÒµÖÐÒý·¢ÁËÁè¼Ý1.2ÍòÆðѬȾÊÂÎñ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý´¹ÂÚÓʼþÈö²¥£¬£¬£¬£¬£¬£¬Ò»µ©Êܺ¦Õß·­¿ª¶ñÒ⸽¼þ£¬£¬£¬£¬£¬£¬¶ñÒ⸽¼þ¾Í»áÊÍ·ÅNSAºÚ¿Í¹¤¾ßDoublePulsar£¬£¬£¬£¬£¬£¬ÔÚÊÜѬȾµÄÅÌËã»úÉϽ¨ÉèºóÃŲ¢Ê¹ÓÃNSAµÄEternalBlueÎó²îʹÓúáÏòÈö²¥¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÁè¼Ý80£¥µÄBeapyѬȾ¶¼±¬·¢ÔÚÖйú¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2019/04/25/cryptojacking-nsa-malware/

5.¹¥»÷ÕßÀÄÓÃGitHubЧÀÍÍйÜÍøÂç´¹ÂÚ¹¤¾ß°ü


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ProofpointÑо¿ÍŶӷ¢Ã÷¶ñÒâ¹¥»÷ÕßÀÄÓÃGitHubµÄÍøÒ³¼Ä´æÐ§ÀÍÀ´ÍйÜÍøÂç´¹ÂÚ¹¤¾ß°ü¡£¡£¡£¡£¡£ÕâÖÖÒªÁìʹµÃ¹¥»÷Õß¿ÉÒÔʹÓÃgithub.ioÓòÃûÈÆ¹ý°×Ãûµ¥µÈ·ÀÓù²½·¥¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÕâЩ´¹ÂÚ¹¤¾ß°ü´ó´ó¶¼ÓÃÓÚÍøÂçÊܺ¦Õߵį¾Ö¤£¨ÀýÈçÒøÐÐÕË»§Æ¾Ö¤£©µÈÃô¸ÐÐÅÏ¢²¢·¢ËÍÖÁ¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£¡£¡£GitHubÒÑÔÚ4ÔÂ19ÈÕ½ÓÄɲ½·¥½ûÓÃÁËÕâЩ¶ñÒâÕË»§¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/github-service-abused-by-attackers-to-host-phishing-kits/

6.TA505ʹÓÃLOLBinsºÍServHelperÃé×¼½ðÈÚ¹«Ë¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


CybereasonÑо¿Ö°Ô±·¢Ã÷·¸·¨ÍÅ»ïTA505µÄй¥»÷»î¶¯Ê¹ÓöàÖÖÓÕÆ­ÊÖÒÕÃé×¼½ðÈÚ»ú¹¹¡£¡£¡£¡£¡£¸ÃÍÅ»ï½ÓÄÉÁ˶àÖÖÕ½ÂÔÀ´Ìӱܼì²â£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶Ô½ðÈÚÆóÒµµÄÌØ¶¨ÕË»§¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁ˶à¸öC2ÓòÃûÒÔÈÆ¹ýºÚÃûµ¥¼ì²â£¬£¬£¬£¬£¬£¬²¢ÔÚÄ¿µÄϵͳÉÏÊÍ·ÅServHelperºóÃÅ¡£¡£¡£¡£¡£¸ÃServHelper±äÌåÒÀÀµÓÚËĸöLOLBinsºÍÍâµØÏµÍ³Àú³ÌʵÑé¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬±ðµÄ£¬£¬£¬£¬£¬£¬ServHelper»¹Ê¹ÓÃÁËSectigo RSA Code Signing CAÊðÃûµÄÓÐÓÃÖ¤ÊéÀ´Ìӱܼì²â¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/ta505-group-uses-lolbins-and-servhelper-backdoor-to-compromise-financial-firms-00550f4d