¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶
Ðû²¼Ê±¼ä 2023-08-071¡¢¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶
¾Ý8ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿·Ö(CDHE)Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£¡£¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ»á¼ûÁËCDHEµÄϵͳ£¬£¬£¬£¬£¬£¬£¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý¡£¡£¡£CDHEûÓÐ͸¶Óм¸¶àÈËÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬µ«ÓÉÓÚÎ¥¹æµÄʱ¼ä¿ç¶È´Ó2004Äêµ½2020Ä꣬£¬£¬£¬£¬£¬£¬¿ÉÄÜÉæ¼°´ó×ÚѧÉúºÍÔ±¹¤¡£¡£¡£CDHE½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿ØÐ§ÀÍ¡£¡£¡£
https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/
2¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÔ½ÓüÌØË¹ÀÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿
¾ÝýÌå8ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬°ØÁÖ¹¤Òµ´óѧµÄÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖÒªÁ죬£¬£¬£¬£¬£¬£¬¿ÉÒÔÔ½Óü×îÐÂÌØË¹À³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØË¹ÀÔÚÆäЧÀÍÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨¹¦Ð§£¬£¬£¬£¬£¬£¬£¬Èç×ùÒμÓÈȵȸ¶·Ñ¹¦Ð§¡£¡£¡£ÌØË¹ÀµÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU£¬£¬£¬£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±¿ÉÒÔʵÑéʹÓÃ֮ǰ·¢Ã÷µÄÎó²îʵÏÖÔ½Óü¡£¡£¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ¾ÙÐеÄBlackHat 2023Ñݽ²ÖйûÕæ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/
3¡¢AhnLab·¢Ã÷Õë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit
ýÌå8ÔÂ5Èճƣ¬£¬£¬£¬£¬£¬£¬AhnLab·¢Ã÷ʹÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£¡£¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ£¿£¿£¿éRootkit£¬£¬£¬£¬£¬£¬£¬¿ÉÔÚGitHubÉÏ»ñÈ¡£¬£¬£¬£¬£¬£¬£¬ÓëÆäËüRootkit²î±ð£¬£¬£¬£¬£¬£¬£¬Ëü»¹Ìṩ·´Ïòshell¡£¡£¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£©£¬£¬£¬£¬£¬£¬£¬ÔÚ±»Ñ¬È¾ÏµÍ³ÉÏ·¿ªÌض¨¶Ë¿Ú£¬£¬£¬£¬£¬£¬£¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´½¨ÉèC2ÅþÁ¬¡£¡£¡£×Ô2022ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬£¬ÖÁÉÙÓÐ4¸ö²î±ðµÄ»î¶¯Ê¹ÓÃÁËReptile¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ´úÂ뿪Դ£¬£¬£¬£¬£¬£¬£¬ReptileºÜÈÝÒ×±»ÖÖÖÖ¹¥»÷ÍÅ»ïʹÓᣡ£¡£
https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html
4¡¢PaperCutÐÞ¸´NG/MF´òÓ¡ÖÎÀíÈí¼þÎó²îCVE-2023-39143
8ÔÂ5ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚWindows°æ±¾PaperCut´òÓ¡ÖÎÀíÈí¼þÖз¢Ã÷ÁËÒ»¸öеÄÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£ÕâÊÇÒ»¸ö·¾¶±éÀúÎó²î£¨CVE-2023-39143£©£¬£¬£¬£¬£¬£¬£¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«í§ÒâÎļþ£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÖ»Ó°ÏìÍⲿװ±¸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÉèÖõÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬µ«´ó´ó¶¼Windows PaperCutЧÀÍÆ÷¶¼ÆôÓÃÁ˸ù¦Ð§¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£
https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html
5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úÕþ¸®³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶
ýÌå8ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Íâ°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢¡£¡£¡£SercoµÄ¿Í»§°üÀ¨ÃÀ¹úÁìÍÁÇå¾²²¿¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úÇ鱨»ú¹¹ºÍ¶à¸öÎä×°²½¶Ó£¬£¬£¬£¬£¬£¬£¬2022ÄêÊÕÈ볬57ÒÚÃÀÔª¡£¡£¡£Ð¹Â¶Ô´ÓÚÆä¸£ÀûÖÎÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)ЧÀÍÆ÷Ôâµ½¹¥»÷¡£¡£¡£¹¥»÷ʼÓÚ5Ô·ݣ¬£¬£¬£¬£¬£¬£¬CBIZÔÚ6ÔÂ5ÈÕ½ÓÄɲ½·¥»º½â¸ÃÊÂÎñ£¬£¬£¬£¬£¬£¬£¬SercoÓÚ6ÔÂ30ÈÕ»ñϤ´Ë´Î¹¥»÷ºÍй¶ÊÂÎñ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/
6¡¢Trend MicroÐû²¼½üÆÚBatloader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
8ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬Trend MicroÐû²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Batloader±³ºóµÄºÚ¿Í£¨ÃüÃûΪWater Minyades£©ÒÑ×îÏÈʹÓà Pyarmor ProÀ´»ìÏýÆäÖ÷Òª¶ñÒâPython¾ç±¾¡£¡£¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»Ö±ÔÚʹÓÃPyarmor£¬£¬£¬£¬£¬£¬£¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor±ê×¼°æ±¾¡£¡£¡£³ýÁËÈÆ¹ýÊÖÒÕÖ®Í⣬£¬£¬£¬£¬£¬£¬Batloader»¹Ê¹ÓÃÖÖÖÖ·½·¨À´ÔöÌí¼ì²âµÄÄѶȣ¬£¬£¬£¬£¬£¬£¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß¡£¡£¡£
https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html


¾©¹«Íø°²±¸11010802024551ºÅ