¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶

Ðû²¼Ê±¼ä 2023-08-07

1¡¢¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶

 

¾Ý8ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÃÀ¹ú¿ÆÂÞÀ­¶àÖݸߵȽÌÓý²¿·Ö(CDHE)Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ»á¼ûÁËCDHEµÄϵͳ£¬£¬£¬£¬£¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý¡£¡£¡£¡£¡£¡£CDHEûÓÐ͸¶Óм¸¶àÈËÊܵ½Ó°Ï죬£¬£¬£¬£¬µ«ÓÉÓÚÎ¥¹æµÄʱ¼ä¿ç¶È´Ó2004Äêµ½2020Ä꣬£¬£¬£¬£¬¿ÉÄÜÉæ¼°´ó×ÚѧÉúºÍÔ±¹¤¡£¡£¡£¡£¡£¡£CDHE½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£


https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/


2¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÔ½ÓüÌØË¹À­ÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿


¾ÝýÌå8ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬£¬°ØÁÖ¹¤Òµ´óѧµÄÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖÒªÁ죬£¬£¬£¬£¬¿ÉÒÔÔ½Óü×îÐÂÌØË¹À­³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØË¹À­ÔÚÆäЧÀÍÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿£¬£¬£¬£¬£¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨¹¦Ð§£¬£¬£¬£¬£¬Èç×ùÒμÓÈȵȸ¶·Ñ¹¦Ð§¡£¡£¡£¡£¡£¡£ÌØË¹À­µÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±¿ÉÒÔʵÑéʹÓÃ֮ǰ·¢Ã÷µÄÎó²îʵÏÖÔ½Óü¡£¡£¡£¡£¡£¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ¾ÙÐеÄBlackHat 2023Ñݽ²ÖйûÕæ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/


3¡¢AhnLab·¢Ã÷Õë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit


ýÌå8ÔÂ5Èճƣ¬£¬£¬£¬£¬AhnLab·¢Ã÷ʹÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ £¿£¿ £¿£¿éRootkit£¬£¬£¬£¬£¬¿ÉÔÚGitHubÉÏ»ñÈ¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬ÓëÆäËüRootkit²î±ð£¬£¬£¬£¬£¬Ëü»¹Ìṩ·´Ïòshell¡£¡£¡£¡£¡£¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£©£¬£¬£¬£¬£¬ÔÚ±»Ñ¬È¾ÏµÍ³ÉÏ·­¿ªÌض¨¶Ë¿Ú£¬£¬£¬£¬£¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´½¨ÉèC2ÅþÁ¬¡£¡£¡£¡£¡£¡£×Ô2022ÄêÒÔÀ´£¬£¬£¬£¬£¬ÖÁÉÙÓÐ4¸ö²î±ðµÄ»î¶¯Ê¹ÓÃÁËReptile¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬ÓÉÓÚ´úÂ뿪Դ£¬£¬£¬£¬£¬ReptileºÜÈÝÒ×±»ÖÖÖÖ¹¥»÷ÍÅ»ïʹÓᣡ£¡£¡£¡£¡£


https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html


4¡¢PaperCutÐÞ¸´NG/MF´òÓ¡ÖÎÀíÈí¼þÎó²îCVE-2023-39143 


8ÔÂ5ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚWindows°æ±¾PaperCut´òÓ¡ÖÎÀíÈí¼þÖз¢Ã÷ÁËÒ»¸öеÄÎó²î£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸ö·¾¶±éÀúÎó²î£¨CVE-2023-39143£©£¬£¬£¬£¬£¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«í§ÒâÎļþ£¬£¬£¬£¬£¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬¸ÃÎó²îÖ»Ó°ÏìÍⲿװ±¸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÉèÖõÄЧÀÍÆ÷£¬£¬£¬£¬£¬µ«´ó´ó¶¼Windows PaperCutЧÀÍÆ÷¶¼ÆôÓÃÁ˸ù¦Ð§¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html


5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úÕþ¸®³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶


ýÌå8ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬£¬Íâ°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢¡£¡£¡£¡£¡£¡£SercoµÄ¿Í»§°üÀ¨ÃÀ¹úÁìÍÁÇå¾²²¿¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úÇ鱨»ú¹¹ºÍ¶à¸öÎä×°²½¶Ó£¬£¬£¬£¬£¬2022ÄêÊÕÈ볬57ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£Ð¹Â¶Ô´ÓÚÆä¸£ÀûÖÎÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)ЧÀÍÆ÷Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ5Ô·ݣ¬£¬£¬£¬£¬CBIZÔÚ6ÔÂ5ÈÕ½ÓÄɲ½·¥»º½â¸ÃÊÂÎñ£¬£¬£¬£¬£¬SercoÓÚ6ÔÂ30ÈÕ»ñϤ´Ë´Î¹¥»÷ºÍй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/


6¡¢Trend MicroÐû²¼½üÆÚBatloader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


8ÔÂ7ÈÕ£¬£¬£¬£¬£¬Trend MicroÐû²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬Batloader±³ºóµÄºÚ¿Í£¨ÃüÃûΪWater Minyades£©ÒÑ×îÏÈʹÓà Pyarmor ProÀ´»ìÏýÆäÖ÷Òª¶ñÒâPython¾ç±¾¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»Ö±ÔÚʹÓÃPyarmor£¬£¬£¬£¬£¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor±ê×¼°æ±¾¡£¡£¡£¡£¡£¡£³ýÁËÈÆ¹ýÊÖÒÕÖ®Í⣬£¬£¬£¬£¬Batloader»¹Ê¹ÓÃÖÖÖÖ·½·¨À´ÔöÌí¼ì²âµÄÄѶȣ¬£¬£¬£¬£¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß¡£¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html