Realtek SoCÖеÄÎó²îÓ°Ïì¶à¸öOEMµÄÊý°ÙÍò×°±¸

Ðû²¼Ê±¼ä 2022-08-17
1¡¢Realtek SoCÖеÄÎó²îÓ°Ïì¶à¸öOEMµÄÊý°ÙÍò×°±¸

      

¾Ý8ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬Ñо¿Ö°Ô±Ðû²¼ÁËʹÓÃRealtek RTL819xƬÉÏϵͳ£¨SoC£©µÄÍøÂç×°±¸ÖÐÎó²îµÄ¹¥»÷´úÂ룬£¬£¬£¬£¬£¬ £¬Ô¤¼ÆÊÜÓ°Ïì×°±¸¶à´ïÊý°ÙÍǫ̀¡£¡£¡£¡£¡£¡£ÕâÊÇ»ùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¨CVE-2022-27255£©£¬£¬£¬£¬£¬£¬ £¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬£¬ £¬¿ÉÓÃÀ´¿ØÖƶà¸öԭʼװ±¸ÖÆÔìÉÌ(OEM)µÄ×°±¸£¬£¬£¬£¬£¬£¬ £¬°üÀ¨Â·ÓÉÆ÷¡¢APºÍÖÐ¼ÌÆ÷µÈ¡£¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬£¬ £¬Ô¶³Ì¹¥»÷Õß¿Éͨ¹ýÆäʹÓôøÓжñÒâSDPÊý¾ÝµÄSIPÊý¾Ý°üÖ´ÐдúÂë¶øÎÞÐèÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬ £¬RealtekÒÑÔÚ3Ô·ÝÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/exploit-out-for-critical-realtek-flaw-affecting-many-networking-devices/


2¡¢°¢¸ùÍ¢¿Æ¶û¶àÍß˾·¨»ú¹¹Ôâµ½PlayÍÅ»ïµÄÀÕË÷¹¥»÷

      

¾ÝýÌå8ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬°¢¸ùÍ¢¿Æ¶û¶àÍß˾·¨»ú¹¹ÔÚÔâµ½PlayÍÅ»ïµÄÀÕË÷Èí¼þ¹¥»÷ºóITϵͳ¹Ø±Õ¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ8ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬ £¬ÏµÍ³ºÍÍøÂçÃÅ»§ÖÐÖ¹ÆÈʹԱ¹¤Ê¹ÓñʺÍÖ½À´Ìá½»¹Ù·½Îļþ¡£¡£¡£¡£¡£¡£Clar¨ªn±¨µÀ³Æ£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Ó°ÏìÁË˾·¨»ú¹¹µÄϵͳºÍÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ £¬ÊÇÀúÊ·ÉÏÕë¶Ô¹«¹²»ú¹¹×îÑÏÖØµÄ¹¥»÷¡£¡£¡£¡£¡£¡£ËäÈ»¸Ã»ú¹¹ÉÐδÅû¶´Ë´Î¹¥»÷µÄϸ½Ú£¬£¬£¬£¬£¬£¬ £¬µ«ÓмÇÕß͸¶£¬£¬£¬£¬£¬£¬ £¬¼ÓÃÜÎļþÌí¼ÓÁË¡°.Play¡±À©Õ¹Ãû£¬£¬£¬£¬£¬£¬ £¬Õâ¿ÉÄÜÓë2022Äê6ÔÂ×îÏÈ»îÔ¾µÄÐÂÀÕË÷ÍÅ»ïPlayÓйء£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/argentinas-judiciary-of-c-rdoba-hit-by-play-ransomware-attack/


3¡¢Î¢Èí³ÆÒÑ×èÖ¹SEABORGIUMÍÅ»ï½üÆÚµÄ´¹ÂÚ¹¥»÷»î¶¯

      

¾Ý΢Èí8ÔÂ15ÈÕ͸¶£¬£¬£¬£¬£¬£¬ £¬ÆäÒÑ×èÖ¹ÁËSEABORGIUMÍŻҲ³ÆColdRiverºÍTA446£©½üÆÚµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓë¶íÂÞ˹Óйأ¬£¬£¬£¬£¬£¬ £¬Ö÷ÒªÕë¶Ô±±Ô¼¹ú¼Ò£¬£¬£¬£¬£¬£¬ £¬ÇÔÈ¡µç×ÓÓʼþºÍÎļþµÈ¡£¡£¡£¡£¡£¡£SEABORGIUMÊ×ÏÈͨ¹ýµç×ÓÓʼþ¡¢É罻ýÌåºÍLinkedInÕÊ»§½¨ÉèαÔìÉí·Ý£¬£¬£¬£¬£¬£¬ £¬²¢ÓøÃÐéαÉí·ÝÁªÏµ¸ÐÐËȤµÄÈËÀ´½¨ÉèÈÚÇ¢µÄ¹ØÏµ£¬£¬£¬£¬£¬£¬ £¬×îÖÕ·¢ËÍ´¹ÂÚÓʼþ¡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖÒѽÓÄÉÐж¯£¬£¬£¬£¬£¬£¬ £¬½ûÓÃÁËÓÃÓÚ¼àÊÓ¡¢´¹ÂÚºÍÇÔÈ¡µç×ÓÓʼþµÄÕÊ»§£¬£¬£¬£¬£¬£¬ £¬²¢¹ûÕæÁË69¸öÓë¹¥»÷»î¶¯Ïà¹ØµÄÓò¡£¡£¡£¡£¡£¡£


https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/


4¡¢Symantec·¢Ã÷ShuckwormÕë¶ÔÎÚ¿ËÀ¼×éÖ¯µÄ¹¥»÷»î¶¯

      

8ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ £¬Symantec³Æ·¢Ã÷Õë¶ÔÎÚ¿ËÀ¼µÄShuckwormËÆºõÕýÔÚÏòÄ¿µÄ·Ö·¢ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£»£»£»£»£»£»î¶¯ÓÚ7ÔÂ15ÈÕ×îÏÈ£¬£¬£¬£¬£¬£¬ £¬Ê¼ÓÚÒ»¸öͨ¹ýϵͳĬÈÏä¯ÀÀÆ÷ÏÂÔØµÄ×Ô½âѹ7-ZipÎļþ£¬£¬£¬£¬£¬£¬ £¬Ëæºómshta.exe»áÏÂÔØÒ»¸öXMLÎļþ£¬£¬£¬£¬£¬£¬ £¬¸ÃÎļþ¿ÉÄÜαװ³ÉHTMLÓ¦ÓóÌÐò(HTA)Îļþ£¬£¬£¬£¬£¬£¬ £¬È»ºóÖ´ÐÐPowerShellÇÔÈ¡³ÌÐò¡£¡£¡£¡£¡£¡£±»Ñ¬È¾×°±¸ÖÐÉÐÓÐÁ½¸ö°üÀ¨juiceºÍjustice×ÖÑùµÄVBSÏÂÔØÆ÷£¬£¬£¬£¬£¬£¬ £¬ÆÊÎö·¢Ã÷ËüÃÇÊÇPterodoºóÃÅ£»£»£»£»£»£»Ñо¿Ö°Ô±»¹·¢Ã÷Á˶à¸ö°üÀ¨ntuser×ÖÑùµÄ¿ÉÒÉÎļþ£¬£¬£¬£¬£¬£¬ £¬´ó´ó¶¼±»¼ì²âΪGiddomeºóÃÅ¡£¡£¡£¡£¡£¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/russia-ukraine-shuckworm


5¡¢Ñо¿Ö°Ô±¼ì²âµ½¶à¸öÖ¼ÔÚÖ´ÐÐDDoS¹¥»÷µÄ¶ñÒâPyPi°ü

      

ýÌå8ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬ £¬CheckmarxÑо¿Ö°Ô±¼ì²âµ½Ê®¼¸¸ö¶ñÒâPyPi°ü£¬£¬£¬£¬£¬£¬ £¬Ö¼ÔÚ¶ÔCounter-Strike 1.6ЧÀÍÆ÷Ö´ÐÐDDoS¹¥»÷¡£¡£¡£¡£¡£¡£ËüÃÇÓÉÃûΪ¡°devfather777¡±µÄÓû§Ðû²¼£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓÃÁËÓëÊ¢ÐÐÈí¼þ°üÏàËÆµÄÃû³ÆÀ´ÓÕÆ­Èí¼þ¿ª·¢Ö°Ô±£¬£¬£¬£¬£¬£¬ £¬ÈçGesnim(Ä£ÄâGensim)ºÍipaddres(Ä£Äâipaddress)µÈ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬ £¬ÉèÖÃÏÂÁî¶ñÒâÈí¼þ½«Ä¿µÄÖ÷»úÌí¼Óµ½DDoS botÖУ¬£¬£¬£¬£¬£¬ £¬Ïò¶íÂÞ˹Counter-Strike 1.6 ЧÀÍÆ÷·¢ËÍÁ÷Á¿£¬£¬£¬£¬£¬£¬ £¬Ä¿µÄËÆºõÊÇͨ¹ýѬȾ´ó×ÚµÄ×°±¸À´·¢ËÍ×ã¹»¶àµÄÁ÷Á¿Ê¹Ð§ÀÍÆ÷Òò²»¿°Öظº¶ø¹Ø±Õ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-aim-ddos-attacks-at-counter-strike-servers/


6¡¢KasperskyÐû²¼2022ÄêQ2ÒÆ¶¯ÍþÐ²Ì¬ÊÆµÄͳ¼Æ±¨¸æ

      

8ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ £¬KasperskyÐû²¼Á˹ØÓÚ2022ÄêQ2ÒÆ¶¯ÍþÐ²Ì¬ÊÆµÄͳ¼Æ±¨¸æ¡£¡£¡£¡£¡£¡£2022ÄêµÚ¶þ¼¾¶È£¬£¬£¬£¬£¬£¬ £¬Kaspersky¼ì²âµ½ÁË405684¸ö¶ñÒâ×°Öðü£¬£¬£¬£¬£¬£¬ £¬»·±ÈïÔÌ­110933¸ö£¬£¬£¬£¬£¬£¬ £¬Í¬±ÈïÔÌ­480421¸ö¡£¡£¡£¡£¡£¡£Òƶ¯¶ñÒâÈí¼þ°´ÀàÐÍÖУ¬£¬£¬£¬£¬£¬ £¬AdWareÕ¼±È×î´ó£¬£¬£¬£¬£¬£¬ £¬Îª25.28%£¬£¬£¬£¬£¬£¬ £¬Æä´ÎÊÇRiskTool£¨20.81%£©ºÍľÂí£¨20.49%£©¡£¡£¡£¡£¡£¡£Ôâµ½ÒÆ¶¯¶ñÒâÈí¼þ¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÒÁÀÊ£¨26.91%£©£¬£¬£¬£¬£¬£¬ £¬Æä´ÎÊÇÒ²ÃÅ£¨17.97%£©ºÍÉ³ÌØ°¢À­²®£¨12.63%£©¡£¡£¡£¡£¡£¡£


https://securelist.com/it-threat-evolution-in-q2-2022-mobile-statistics/107123/