Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷ £¬£¬ £¬£¬Ó°ÏìZen¼Ü¹¹£» £»£»£»£»£»ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔÕþ¸®ÉñÃØÈí¼þºÍÊý¾Ý

Ðû²¼Ê±¼ä 2020-03-09

1.Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷ £¬£¬ £¬£¬Ó°ÏìZen¼Ü¹¹


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¸ñÀ­´ÄÊÖÒÕ´óѧÐû²¼µÄһƪÐÂÂÛÎÄÏêϸÏÈÈÝÁËÁ½ÖÖеÄAMD CPU²àÐŵÀ¹¥»÷ £¬£¬ £¬£¬¼´Collide+ProbeºÍLoad+Reload¹¥»÷ £¬£¬ £¬£¬¹¥»÷Õß¿Éͨ¹ýʹÓÃL1D»º´æÕ¹Íû±äÁ¿À´×ß©AMD´¦Öóͷ£Æ÷µÄÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ¸ÃÎó²îÓ°ÏìÁË´Ó2011Äêµ½2019ÄêµÄËùÓÐAMD´¦Öóͷ£Æ÷ £¬£¬ £¬£¬ÕâÒâζ×ÅZen¼Ü¹¹Ò»¨Üµ½Ó°Ïì¡£¡£¡£¡£¡£¡£¸Ã´óѧÌåÏÖËüÒÑÓÚ2019Äê8ÔÂ23ÈÕÏòAMDÅû¶ÁËÕâЩÎó²î £¬£¬ £¬£¬µ«AMDÉÐδÐû²¼Î¢´úÂë¸üР£¬£¬ £¬£¬²¢³ÆÕâЩ¹¥»÷²¢²»ÊÇеĻùÓÚÍÆ²âµÄ¹¥»÷¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/


2.¹¥»÷ÕßʹÓÃÓâÆÚÖ¤ÊéÈö²¥¶ñÒâÈí¼þBuerakºÍMokes


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»ÖÖÐµĹ¥»÷ÒªÁì £¬£¬ £¬£¬¹¥»÷Õßαװ³ÉÓâÆÚµÄÇå¾²Ö¤ÊéÀ´Èö²¥BuerakºÍMokes¡£¡£¡£¡£¡£¡£ÔÚÊÜѬȾµÄÍøÕ¾ÉÏ £¬£¬ £¬£¬¹¥»÷ÕßÏÔʾһ¸öÖÒÑÔ¸ÃÍøÕ¾µÄÇå¾²Ö¤ÊéÒѾ­ÓâÆÚµÄ֪ͨ £¬£¬ £¬£¬µ«¸Ãֻ֪ͨÊÇÒ»¸öÁýÕÖÔÚÍøÒ³ÉϵÄiframe£¨µØµãÀ¸ÈÔÏÔʾÕýµ±µÄµØµã£©¡£¡£¡£¡£¡£¡£µ±Óû§µã»÷֪ͨÉϵġ°×°Öá±°´Å¥Ê± £¬£¬ £¬£¬½«ÏÂÔØCertificate_Update_v02.2020.exeÎļþ £¬£¬ £¬£¬¸ÃÎļþÏÖʵÉÏÊÇBuerak»òMokes¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2020Äê1ÔÂÖÐÑ®·¢Ã÷ÁËÕâЩÊÜѬȾµÄÍøÕ¾ £¬£¬ £¬£¬Êܺ¦Õß°üÀ¨¶¯ÎïÔ°ºÍÆû³µÅä¼þ¹©Ó¦ÉÌ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.tripwire.com/state-of-security/security-data-protection/expired-certificates-used-as-disguise-to-spread-buerak-mokes-malware/


3.APT×é֯ʹÓÃCVE-2020-0688¹¥»÷ExchangeЧÀÍÆ÷


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¾ÝZDNet±¨µÀ £¬£¬ £¬£¬¶à¸öÓÉÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯ÕýÔÚʹÓÃCVE-2020-0688À´½ÓÊÜExchangeµç×ÓÓʼþЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¹¥»÷ʵÑé×îÔçÊÇÓÉÓ¢¹úÍøÂçÇå¾²¹«Ë¾VolexityÓÚÉÏÖÜÎå·¢Ã÷µÄ £¬£¬ £¬£¬²¢±»¹ú·À²¿µÄÐÂÎÅÈËʿȷÈÏ¡£¡£¡£¡£¡£¡£VolexityûÓйûÕæÊ¹ÓøÃÎó²îµÄAPT×éÖ¯µÄÃû³Æ¡£¡£¡£¡£¡£¡£CVE-2020-0688ÊÇ΢ÈíÔÚ2ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´µÄÒ»¸öÎó²î £¬£¬ £¬£¬ExchangeЧÀÍÆ÷ÔÚ×°ÖÃʱ²¢Ã»ÓÐΪ¿ØÖÆÃæ°å½¨ÉèΨһµÄ¼ÓÃÜÃÜÔ¿ £¬£¬ £¬£¬ÕâÒâζ׏¥»÷Õß¿ÉÒÔʹÓøÃÃÜÔ¿ºÍͨ¹ý·¢ËͶñÒâÇëÇóÔÚЧÀÍÆ÷ºó¶ËÒÔSYSTEMÌØÈ¨Ö´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/multiple-nation-state-groups-are-hacking-microsoft-exchange-servers/


4.ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔÕþ¸®ÉñÃØÈí¼þºÍÊý¾Ý


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÃÀ¹ú˾·¨²¿Ö¸¿ØÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©µÄǰÊðÀíÉó²é³¤ÇÔÈ¡Õþ¸®Èí¼þºÍÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£ÆðËßÊéÏÔʾ £¬£¬ £¬£¬²é¶û˹¡¤°®µÂ»ª×È£¨Charles K. Edwards£©ÔÚ2011ÄêÖÁ2013ÄêÔøÈÎDHSÊðÀíÉó²é³¤ £¬£¬ £¬£¬ÔÚ2013Äê12ÔÂжÈιÙÖ°ºó £¬£¬ £¬£¬°®µÂ»ª×ÈÓëVenkataµÈÈ˼ÓÈëÁË´ÓÁìÍÁÇå¾²²¿Éó²é³¤°ì¹«ÊÒ£¨OIG£©ÇÔÈ¡ÉñÃØºÍרÓÐÈí¼þµÄÍýÏë¡£¡£¡£¡£¡£¡£°®µÂ»ª×È»¹½¨ÉèÁË×Ô¼ºµÄ¹«Ë¾ £¬£¬ £¬£¬²¢Ïëͨ¹ý¸Ã¹«Ë¾ÏòÃÀ¹úũҵ²¿µÄOIG³öÊÛ±»µÁDHS-OIGÈí¼þµÄÔöÇ¿°æÒÔIJȡ±©Àû¡£¡£¡£¡£¡£¡£Ë¾·¨²¿»¹³Æ°®µÂ»ª×ȵÈÈË»¹ÇÔÈ¡ÁËÃô¸ÐµÄÕþ¸®Êý¾Ý¿â £¬£¬ £¬£¬ÆäÖаüÀ¨ÁìÍÁÇå¾²²¿ºÍÃÀ¹úÓÊÕþЧÀ;֣¨USPS£©Ô±¹¤µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/former-dhs-official-charged-with-theft-of-confidential-government-databases/


5.Ó¡¶ÈÐéαÊÖÒÕÖ§³Ö¹«Ë¾Õ©Æ­4ÍòÊܺ¦Õß׬Ǯ800ÍòÃÀÔª


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ó¡¶ÈÒ»Ãû´óѧÍËѧÉúAmit ChauhanÈÏ¿ÉʹÓÃÐéαÊÖÒÕÖ§³ÖÕ©Æ­¹«Ë¾´Ó4ÍòÃûÊܺ¦ÕßÊÖÖÐÆ­È¡ÁËÁè¼Ý800ÍòÃÀÔª¡£¡£¡£¡£¡£¡£ChauhanÓÚ2019Äê1Ô½¨ÉèÁËÒ»¼ÒÐéαµÄÊÖÒÕÖ§³Öºô½ÐÖÐÐĹ«Ë¾TechSupport £¬£¬ £¬£¬¸Ã¹«Ë¾ÒªÇó×·ÇóÊÖÒÕÖ§³ÖµÄÊܺ¦ÕßÉÏÏß²¢µã»÷ÌØ¶¨µÄµ¯´° £¬£¬ £¬£¬´Ëʱ¶ñÒâÈí¼þ½«±»¼¤»î²¢ÇÔÈ¡Êܺ¦ÕߵIJÆÎñÊý¾Ý¡£¡£¡£¡£¡£¡£Chauhan¼°Æäͬ»ïKumarÒѱ»¾¯·½¹ØÑº £¬£¬ £¬£¬²¢Æ¾Ö¤Ó¡¶ÈµÄ¡¶IT·¨°¸¡·±»ÆðËß¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/fake-tech-support-company-dupes-40k/


6.ÀÕË÷Èí¼þPwndLockerбäÖÖÍêÈ«×÷Ϊshellcode¿ª·¢


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Crypsis Group·¢Ã÷ÀÕË÷Èí¼þPwndLockerµÄÒ»¸öбäÖÖÍêÈ«×÷ΪShellcode¿ª·¢¡£¡£¡£¡£¡£¡£Í¨³£¶ñÒâÈí¼þ×÷Õß½öÔÚÏÂÔØÆ÷ºÍÖ²Èë³ÌÐòÖÐʹÓÃshellcode £¬£¬ £¬£¬ÓÉÓÚ½¨ÉèºÍʵÏÖ´ËÀà´úÂë¿ÉÄܺÜÊÇÖØ´óÇÒºÄʱ¡£¡£¡£¡£¡£¡£Crypsis GroupµÄ¸ß¼¶ÕÕÁÏMatt ThaxtonÌåÏÖ £¬£¬ £¬£¬PwndLockerʹÓÃshellcode£¨»òÓëλÖÃÎ޹صĴúÂ룩ʹËü³ÉΪ±ÈÆäËûÀÕË÷Èí¼þ¸üÖØ´ó¡¢¸üÄÑÒÔ·¢Ã÷µÄÀÕË÷Èí¼þ £¬£¬ £¬£¬ÕâÖÖ´úÂëͨ³£²»×¤ÁôÔÚ´ÅÅÌÉÏ £¬£¬ £¬£¬²¢ÇÒ¾­³£±»×¢Èëµ½ÆäËûÕýµ±Àú³ÌÖС£¡£¡£¡£¡£¡£Thaxton³ÆÕâÊÇÊ׸öʹÓÃshellcode¿ª·¢µÄÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£PwndLocker»¹ÊµÏÖÁË×Ô½ç˵µÄ¼ÓÃÜËã·¨ £¬£¬ £¬£¬µ«¸ÃËã·¨Ïà¶Ô½ÏÈõ £¬£¬ £¬£¬Çå¾²³§ÉÌEmsisoftÌåÏÖÒѾ­¿ª·¢³öPwndLockerµÄ½âÃÜÆ÷¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/attacks-breaches/new-ransomware-variant-developed-entirely-as-shellcode/d/d-id/1337260