Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷£¬ £¬£¬£¬Ó°ÏìZen¼Ü¹¹£»£»£»£»£»ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔÕþ¸®ÉñÃØÈí¼þºÍÊý¾Ý

Ðû²¼Ê±¼ä 2020-03-09

1.Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷£¬ £¬£¬£¬Ó°ÏìZen¼Ü¹¹


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¸ñÀ­´ÄÊÖÒÕ´óѧÐû²¼µÄһƪÐÂÂÛÎÄÏêϸÏÈÈÝÁËÁ½ÖÖеÄAMD CPU²àÐŵÀ¹¥»÷£¬ £¬£¬£¬¼´Collide+ProbeºÍLoad+Reload¹¥»÷£¬ £¬£¬£¬¹¥»÷Õß¿Éͨ¹ýʹÓÃL1D»º´æÕ¹Íû±äÁ¿À´×ß©AMD´¦Öóͷ£Æ÷µÄÉñÃØÊý¾Ý¡£¡£¡£ ¡£Ñо¿Ö°Ô±³Æ¸ÃÎó²îÓ°ÏìÁË´Ó2011Äêµ½2019ÄêµÄËùÓÐAMD´¦Öóͷ£Æ÷£¬ £¬£¬£¬ÕâÒâζ×ÅZen¼Ü¹¹Ò»¨Üµ½Ó°Ïì¡£¡£¡£ ¡£¸Ã´óѧÌåÏÖËüÒÑÓÚ2019Äê8ÔÂ23ÈÕÏòAMDÅû¶ÁËÕâЩÎó²î£¬ £¬£¬£¬µ«AMDÉÐδÐû²¼Î¢´úÂë¸üУ¬ £¬£¬£¬²¢³ÆÕâЩ¹¥»÷²¢²»ÊÇеĻùÓÚÍÆ²âµÄ¹¥»÷¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/


2.¹¥»÷ÕßʹÓÃÓâÆÚÖ¤ÊéÈö²¥¶ñÒâÈí¼þBuerakºÍMokes


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»ÖÖÐµĹ¥»÷ÒªÁ죬 £¬£¬£¬¹¥»÷Õßαװ³ÉÓâÆÚµÄÇå¾²Ö¤ÊéÀ´Èö²¥BuerakºÍMokes¡£¡£¡£ ¡£ÔÚÊÜѬȾµÄÍøÕ¾ÉÏ£¬ £¬£¬£¬¹¥»÷ÕßÏÔʾһ¸öÖÒÑÔ¸ÃÍøÕ¾µÄÇå¾²Ö¤ÊéÒѾ­ÓâÆÚµÄ֪ͨ£¬ £¬£¬£¬µ«¸Ãֻ֪ͨÊÇÒ»¸öÁýÕÖÔÚÍøÒ³ÉϵÄiframe£¨µØµãÀ¸ÈÔÏÔʾÕýµ±µÄµØµã£©¡£¡£¡£ ¡£µ±Óû§µã»÷֪ͨÉϵġ°×°Öá±°´Å¥Ê±£¬ £¬£¬£¬½«ÏÂÔØCertificate_Update_v02.2020.exeÎļþ£¬ £¬£¬£¬¸ÃÎļþÏÖʵÉÏÊÇBuerak»òMokes¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÔÚ2020Äê1ÔÂÖÐÑ®·¢Ã÷ÁËÕâЩÊÜѬȾµÄÍøÕ¾£¬ £¬£¬£¬Êܺ¦Õß°üÀ¨¶¯ÎïÔ°ºÍÆû³µÅä¼þ¹©Ó¦ÉÌ¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.tripwire.com/state-of-security/security-data-protection/expired-certificates-used-as-disguise-to-spread-buerak-mokes-malware/


3.APT×é֯ʹÓÃCVE-2020-0688¹¥»÷ExchangeЧÀÍÆ÷


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¾ÝZDNet±¨µÀ£¬ £¬£¬£¬¶à¸öÓÉÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯ÕýÔÚʹÓÃCVE-2020-0688À´½ÓÊÜExchangeµç×ÓÓʼþЧÀÍÆ÷¡£¡£¡£ ¡£¹¥»÷ʵÑé×îÔçÊÇÓÉÓ¢¹úÍøÂçÇå¾²¹«Ë¾VolexityÓÚÉÏÖÜÎå·¢Ã÷µÄ£¬ £¬£¬£¬²¢±»¹ú·À²¿µÄÐÂÎÅÈËʿȷÈÏ¡£¡£¡£ ¡£VolexityûÓйûÕæÊ¹ÓøÃÎó²îµÄAPT×éÖ¯µÄÃû³Æ¡£¡£¡£ ¡£CVE-2020-0688ÊÇ΢ÈíÔÚ2ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´µÄÒ»¸öÎó²î£¬ £¬£¬£¬ExchangeЧÀÍÆ÷ÔÚ×°ÖÃʱ²¢Ã»ÓÐΪ¿ØÖÆÃæ°å½¨ÉèΨһµÄ¼ÓÃÜÃÜÔ¿£¬ £¬£¬£¬ÕâÒâζ׏¥»÷Õß¿ÉÒÔʹÓøÃÃÜÔ¿ºÍͨ¹ý·¢ËͶñÒâÇëÇóÔÚЧÀÍÆ÷ºó¶ËÒÔSYSTEMÌØÈ¨Ö´ÐжñÒâ´úÂë¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/multiple-nation-state-groups-are-hacking-microsoft-exchange-servers/


4.ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔÕþ¸®ÉñÃØÈí¼þºÍÊý¾Ý


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÃÀ¹ú˾·¨²¿Ö¸¿ØÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©µÄǰÊðÀíÉó²é³¤ÇÔÈ¡Õþ¸®Èí¼þºÍÉñÃØÊý¾Ý¡£¡£¡£ ¡£ÆðËßÊéÏÔʾ£¬ £¬£¬£¬²é¶û˹¡¤°®µÂ»ª×È£¨Charles K. Edwards£©ÔÚ2011ÄêÖÁ2013ÄêÔøÈÎDHSÊðÀíÉó²é³¤£¬ £¬£¬£¬ÔÚ2013Äê12ÔÂжÈιÙÖ°ºó£¬ £¬£¬£¬°®µÂ»ª×ÈÓëVenkataµÈÈ˼ÓÈëÁË´ÓÁìÍÁÇå¾²²¿Éó²é³¤°ì¹«ÊÒ£¨OIG£©ÇÔÈ¡ÉñÃØºÍרÓÐÈí¼þµÄÍýÏë¡£¡£¡£ ¡£°®µÂ»ª×È»¹½¨ÉèÁË×Ô¼ºµÄ¹«Ë¾£¬ £¬£¬£¬²¢Ïëͨ¹ý¸Ã¹«Ë¾ÏòÃÀ¹úũҵ²¿µÄOIG³öÊÛ±»µÁDHS-OIGÈí¼þµÄÔöÇ¿°æÒÔIJȡ±©Àû¡£¡£¡£ ¡£Ë¾·¨²¿»¹³Æ°®µÂ»ª×ȵÈÈË»¹ÇÔÈ¡ÁËÃô¸ÐµÄÕþ¸®Êý¾Ý¿â£¬ £¬£¬£¬ÆäÖаüÀ¨ÁìÍÁÇå¾²²¿ºÍÃÀ¹úÓÊÕþЧÀ;֣¨USPS£©Ô±¹¤µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/former-dhs-official-charged-with-theft-of-confidential-government-databases/


5.Ó¡¶ÈÐéαÊÖÒÕÖ§³Ö¹«Ë¾Õ©Æ­4ÍòÊܺ¦Õß׬Ǯ800ÍòÃÀÔª


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ó¡¶ÈÒ»Ãû´óѧÍËѧÉúAmit ChauhanÈÏ¿ÉʹÓÃÐéαÊÖÒÕÖ§³ÖÕ©Æ­¹«Ë¾´Ó4ÍòÃûÊܺ¦ÕßÊÖÖÐÆ­È¡ÁËÁè¼Ý800ÍòÃÀÔª¡£¡£¡£ ¡£ChauhanÓÚ2019Äê1Ô½¨ÉèÁËÒ»¼ÒÐéαµÄÊÖÒÕÖ§³Öºô½ÐÖÐÐĹ«Ë¾TechSupport£¬ £¬£¬£¬¸Ã¹«Ë¾ÒªÇó×·ÇóÊÖÒÕÖ§³ÖµÄÊܺ¦ÕßÉÏÏß²¢µã»÷ÌØ¶¨µÄµ¯´°£¬ £¬£¬£¬´Ëʱ¶ñÒâÈí¼þ½«±»¼¤»î²¢ÇÔÈ¡Êܺ¦ÕߵIJÆÎñÊý¾Ý¡£¡£¡£ ¡£Chauhan¼°Æäͬ»ïKumarÒѱ»¾¯·½¹ØÑº£¬ £¬£¬£¬²¢Æ¾Ö¤Ó¡¶ÈµÄ¡¶IT·¨°¸¡·±»ÆðËß¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/fake-tech-support-company-dupes-40k/


6.ÀÕË÷Èí¼þPwndLockerбäÖÖÍêÈ«×÷Ϊshellcode¿ª·¢


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Crypsis Group·¢Ã÷ÀÕË÷Èí¼þPwndLockerµÄÒ»¸öбäÖÖÍêÈ«×÷ΪShellcode¿ª·¢¡£¡£¡£ ¡£Í¨³£¶ñÒâÈí¼þ×÷Õß½öÔÚÏÂÔØÆ÷ºÍÖ²Èë³ÌÐòÖÐʹÓÃshellcode£¬ £¬£¬£¬ÓÉÓÚ½¨ÉèºÍʵÏÖ´ËÀà´úÂë¿ÉÄܺÜÊÇÖØ´óÇÒºÄʱ¡£¡£¡£ ¡£Crypsis GroupµÄ¸ß¼¶ÕÕÁÏMatt ThaxtonÌåÏÖ£¬ £¬£¬£¬PwndLockerʹÓÃshellcode£¨»òÓëλÖÃÎ޹صĴúÂ룩ʹËü³ÉΪ±ÈÆäËûÀÕË÷Èí¼þ¸üÖØ´ó¡¢¸üÄÑÒÔ·¢Ã÷µÄÀÕË÷Èí¼þ£¬ £¬£¬£¬ÕâÖÖ´úÂëͨ³£²»×¤ÁôÔÚ´ÅÅÌÉÏ£¬ £¬£¬£¬²¢ÇÒ¾­³£±»×¢Èëµ½ÆäËûÕýµ±Àú³ÌÖС£¡£¡£ ¡£Thaxton³ÆÕâÊÇÊ׸öʹÓÃshellcode¿ª·¢µÄÀÕË÷Èí¼þ¡£¡£¡£ ¡£PwndLocker»¹ÊµÏÖÁË×Ô½ç˵µÄ¼ÓÃÜËã·¨£¬ £¬£¬£¬µ«¸ÃËã·¨Ïà¶Ô½ÏÈõ£¬ £¬£¬£¬Çå¾²³§ÉÌEmsisoftÌåÏÖÒѾ­¿ª·¢³öPwndLockerµÄ½âÃÜÆ÷¡£¡£¡£ ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/attacks-breaches/new-ransomware-variant-developed-entirely-as-shellcode/d/d-id/1337260