Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷£¬£¬£¬£¬£¬Ó°ÏìZen¼Ü¹¹£»£»£»£»£»£»ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔÕþ¸®ÉñÃØÈí¼þºÍÊý¾Ý
Ðû²¼Ê±¼ä 2020-03-091.Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷£¬£¬£¬£¬£¬Ó°ÏìZen¼Ü¹¹
¸ñÀ´ÄÊÖÒÕ´óѧÐû²¼µÄһƪÐÂÂÛÎÄÏêϸÏÈÈÝÁËÁ½ÖÖеÄAMD CPU²àÐŵÀ¹¥»÷£¬£¬£¬£¬£¬¼´Collide+ProbeºÍLoad+Reload¹¥»÷£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýʹÓÃL1D»º´æÕ¹Íû±äÁ¿À´×ß©AMD´¦Öóͷ£Æ÷µÄÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ¸ÃÎó²îÓ°ÏìÁË´Ó2011Äêµ½2019ÄêµÄËùÓÐAMD´¦Öóͷ£Æ÷£¬£¬£¬£¬£¬ÕâÒâζ×ÅZen¼Ü¹¹Ò»¨Üµ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£¸Ã´óѧÌåÏÖËüÒÑÓÚ2019Äê8ÔÂ23ÈÕÏòAMDÅû¶ÁËÕâЩÎó²î£¬£¬£¬£¬£¬µ«AMDÉÐδÐû²¼Î¢´úÂë¸üУ¬£¬£¬£¬£¬²¢³ÆÕâЩ¹¥»÷²¢²»ÊÇеĻùÓÚÍÆ²âµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/
2.¹¥»÷ÕßʹÓÃÓâÆÚÖ¤ÊéÈö²¥¶ñÒâÈí¼þBuerakºÍMokes
¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»ÖÖÐµĹ¥»÷ÒªÁ죬£¬£¬£¬£¬¹¥»÷Õßαװ³ÉÓâÆÚµÄÇå¾²Ö¤ÊéÀ´Èö²¥BuerakºÍMokes¡£¡£¡£¡£¡£¡£¡£ÔÚÊÜѬȾµÄÍøÕ¾ÉÏ£¬£¬£¬£¬£¬¹¥»÷ÕßÏÔʾһ¸öÖÒÑÔ¸ÃÍøÕ¾µÄÇå¾²Ö¤ÊéÒѾÓâÆÚµÄ֪ͨ£¬£¬£¬£¬£¬µ«¸Ãֻ֪ͨÊÇÒ»¸öÁýÕÖÔÚÍøÒ³ÉϵÄiframe£¨µØµãÀ¸ÈÔÏÔʾÕýµ±µÄµØµã£©¡£¡£¡£¡£¡£¡£¡£µ±Óû§µã»÷֪ͨÉϵġ°×°Öá±°´Å¥Ê±£¬£¬£¬£¬£¬½«ÏÂÔØCertificate_Update_v02.2020.exeÎļþ£¬£¬£¬£¬£¬¸ÃÎļþÏÖʵÉÏÊÇBuerak»òMokes¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2020Äê1ÔÂÖÐÑ®·¢Ã÷ÁËÕâЩÊÜѬȾµÄÍøÕ¾£¬£¬£¬£¬£¬Êܺ¦Õß°üÀ¨¶¯ÎïÔ°ºÍÆû³µÅä¼þ¹©Ó¦ÉÌ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.tripwire.com/state-of-security/security-data-protection/expired-certificates-used-as-disguise-to-spread-buerak-mokes-malware/
3.APT×é֯ʹÓÃCVE-2020-0688¹¥»÷ExchangeЧÀÍÆ÷
¾ÝZDNet±¨µÀ£¬£¬£¬£¬£¬¶à¸öÓÉÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯ÕýÔÚʹÓÃCVE-2020-0688À´½ÓÊÜExchangeµç×ÓÓʼþЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʵÑé×îÔçÊÇÓÉÓ¢¹úÍøÂçÇå¾²¹«Ë¾VolexityÓÚÉÏÖÜÎå·¢Ã÷µÄ£¬£¬£¬£¬£¬²¢±»¹ú·À²¿µÄÐÂÎÅÈËʿȷÈÏ¡£¡£¡£¡£¡£¡£¡£VolexityûÓйûÕæÊ¹ÓøÃÎó²îµÄAPT×éÖ¯µÄÃû³Æ¡£¡£¡£¡£¡£¡£¡£CVE-2020-0688ÊÇ΢ÈíÔÚ2ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´µÄÒ»¸öÎó²î£¬£¬£¬£¬£¬ExchangeЧÀÍÆ÷ÔÚ×°ÖÃʱ²¢Ã»ÓÐΪ¿ØÖÆÃæ°å½¨ÉèΨһµÄ¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬ÕâÒâζ׏¥»÷Õß¿ÉÒÔʹÓøÃÃÜÔ¿ºÍͨ¹ý·¢ËͶñÒâÇëÇóÔÚЧÀÍÆ÷ºó¶ËÒÔSYSTEMÌØÈ¨Ö´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/multiple-nation-state-groups-are-hacking-microsoft-exchange-servers/
4.ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔÕþ¸®ÉñÃØÈí¼þºÍÊý¾Ý
ÃÀ¹ú˾·¨²¿Ö¸¿ØÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©µÄǰÊðÀíÉó²é³¤ÇÔÈ¡Õþ¸®Èí¼þºÍÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÆðËßÊéÏÔʾ£¬£¬£¬£¬£¬²é¶û˹¡¤°®µÂ»ª×È£¨Charles K. Edwards£©ÔÚ2011ÄêÖÁ2013ÄêÔøÈÎDHSÊðÀíÉó²é³¤£¬£¬£¬£¬£¬ÔÚ2013Äê12ÔÂжÈιÙÖ°ºó£¬£¬£¬£¬£¬°®µÂ»ª×ÈÓëVenkataµÈÈ˼ÓÈëÁË´ÓÁìÍÁÇå¾²²¿Éó²é³¤°ì¹«ÊÒ£¨OIG£©ÇÔÈ¡ÉñÃØºÍרÓÐÈí¼þµÄÍýÏë¡£¡£¡£¡£¡£¡£¡£°®µÂ»ª×È»¹½¨ÉèÁË×Ô¼ºµÄ¹«Ë¾£¬£¬£¬£¬£¬²¢Ïëͨ¹ý¸Ã¹«Ë¾ÏòÃÀ¹úũҵ²¿µÄOIG³öÊÛ±»µÁDHS-OIGÈí¼þµÄÔöÇ¿°æÒÔIJȡ±©Àû¡£¡£¡£¡£¡£¡£¡£Ë¾·¨²¿»¹³Æ°®µÂ»ª×ȵÈÈË»¹ÇÔÈ¡ÁËÃô¸ÐµÄÕþ¸®Êý¾Ý¿â£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÁìÍÁÇå¾²²¿ºÍÃÀ¹úÓÊÕþЧÀ;֣¨USPS£©Ô±¹¤µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/former-dhs-official-charged-with-theft-of-confidential-government-databases/
5.Ó¡¶ÈÐéαÊÖÒÕÖ§³Ö¹«Ë¾Õ©Æ4ÍòÊܺ¦Õß׬Ǯ800ÍòÃÀÔª
Ó¡¶ÈÒ»Ãû´óѧÍËѧÉúAmit ChauhanÈÏ¿ÉʹÓÃÐéαÊÖÒÕÖ§³Öթƹ«Ë¾´Ó4ÍòÃûÊܺ¦ÕßÊÖÖÐÆÈ¡ÁËÁè¼Ý800ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£ChauhanÓÚ2019Äê1Ô½¨ÉèÁËÒ»¼ÒÐéαµÄÊÖÒÕÖ§³Öºô½ÐÖÐÐĹ«Ë¾TechSupport£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒªÇó×·ÇóÊÖÒÕÖ§³ÖµÄÊܺ¦ÕßÉÏÏß²¢µã»÷ÌØ¶¨µÄµ¯´°£¬£¬£¬£¬£¬´Ëʱ¶ñÒâÈí¼þ½«±»¼¤»î²¢ÇÔÈ¡Êܺ¦ÕߵIJÆÎñÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Chauhan¼°Æäͬ»ïKumarÒѱ»¾¯·½¹ØÑº£¬£¬£¬£¬£¬²¢Æ¾Ö¤Ó¡¶ÈµÄ¡¶IT·¨°¸¡·±»ÆðËß¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/fake-tech-support-company-dupes-40k/
6.ÀÕË÷Èí¼þPwndLockerбäÖÖÍêÈ«×÷Ϊshellcode¿ª·¢
Crypsis Group·¢Ã÷ÀÕË÷Èí¼þPwndLockerµÄÒ»¸öбäÖÖÍêÈ«×÷ΪShellcode¿ª·¢¡£¡£¡£¡£¡£¡£¡£Í¨³£¶ñÒâÈí¼þ×÷Õß½öÔÚÏÂÔØÆ÷ºÍÖ²Èë³ÌÐòÖÐʹÓÃshellcode£¬£¬£¬£¬£¬ÓÉÓÚ½¨ÉèºÍʵÏÖ´ËÀà´úÂë¿ÉÄܺÜÊÇÖØ´óÇÒºÄʱ¡£¡£¡£¡£¡£¡£¡£Crypsis GroupµÄ¸ß¼¶ÕÕÁÏMatt ThaxtonÌåÏÖ£¬£¬£¬£¬£¬PwndLockerʹÓÃshellcode£¨»òÓëλÖÃÎ޹صĴúÂ룩ʹËü³ÉΪ±ÈÆäËûÀÕË÷Èí¼þ¸üÖØ´ó¡¢¸üÄÑÒÔ·¢Ã÷µÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬ÕâÖÖ´úÂëͨ³£²»×¤ÁôÔÚ´ÅÅÌÉÏ£¬£¬£¬£¬£¬²¢ÇÒ¾³£±»×¢Èëµ½ÆäËûÕýµ±Àú³ÌÖС£¡£¡£¡£¡£¡£¡£Thaxton³ÆÕâÊÇÊ׸öʹÓÃshellcode¿ª·¢µÄÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£PwndLocker»¹ÊµÏÖÁË×Ô½ç˵µÄ¼ÓÃÜËã·¨£¬£¬£¬£¬£¬µ«¸ÃËã·¨Ïà¶Ô½ÏÈõ£¬£¬£¬£¬£¬Çå¾²³§ÉÌEmsisoftÌåÏÖÒѾ¿ª·¢³öPwndLockerµÄ½âÃÜÆ÷¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/attacks-breaches/new-ransomware-variant-developed-entirely-as-shellcode/d/d-id/1337260