Á½ÖÖеÄAMD²àÐÅ·¹¥»÷£¬Ó°ÏìZen¼Ü¹¹£»ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔµ±¾Ö»úÃÜÈí¼þºÍÊý¾Ý

°ä²¼¹¦·ò 2020-03-09

1.Á½ÖÖеÄAMD²àÐÅ·¹¥»÷£¬Ó°ÏìZen¼Ü¹¹


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¸ñÀ­´Ä¼¼Êõ´óѧ°ä²¼µÄһƪÐÂÂÛÎľßÌå½éÉÜÁËÁ½ÖÖеÄAMD CPU²àÐÅ·¹¥»÷£¬¼´Collide+ProbeºÍLoad+Reload¹¥»÷£¬¹¥»÷Õß¿Éͨ¹ý°Ñ³ÖL1D»º´æÔ¤²â±äÁ¿À´Ð¹Â©AMD´¦ÖÃÆ÷µÄ»úÃÜÊý¾Ý¡£×êÑÐÈËÔ±³Æ¸Ã·ì϶ӰÏìÁË´Ó2011Äêµ½2019ÄêµÄËùÓÐAMD´¦ÖÃÆ÷£¬ÕâÒâζ×ÅZen¼Ü¹¹Ò²Êܵ½Ó°Ïì¡£¸Ã´óѧ°µÊ¾ËüÒÑÓÚ2019Äê8ÔÂ23ÈÕÏòAMDÅû¶ÁËÕâЩ·ì϶£¬µ«AMDÉÐδ°ä²¼Î¢´úÂë¸üУ¬²¢³ÆÕâЩ¹¥»÷²¢²»ÊÇеĻùÓÚ´§Ä¦µÄ¹¥»÷¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/


2.¹¥»÷ÕßÀûÓùýÆÚÖ¤Êé´«²¼¶ñÒâÈí¼þBuerakºÍMokes


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ù³¢ÊÔÊÒ·¢ÏÖÒ»ÖÖÐµĹ¥»÷²½Ö裬¹¥»÷Õß¼Ù×°³É¹ýÆÚµÄ°²È«Ö¤ÊéÀ´´«²¼BuerakºÍMokes¡£ÔÚÊÜϰȾµÄÍøÕ¾ÉÏ£¬¹¥»÷ÕßÏÔʾһ¸öÖÒ¸æ¸ÃÍøÕ¾µÄ°²È«Ö¤ÊéÒѾ­¹ýÆÚµÄ֪ͨ£¬µ«¸Ãֻ֪ͨÊÇÒ»¸ö¸²¸ÇÔÚÍøÒ³ÉϵÄiframe£¨µØÖ·À¸ÈÔÏÔʾºÏ·¨µÄµØÖ·£©¡£µ±Óû§µã»÷֪ͨÉϵġ°×°Öá±°´Å¥Ê±£¬½«ÏÂÔØCertificate_Update_v02.2020.exeÎļþ£¬¸ÃÎļþÏÖʵÉÏÊÇBuerak»òMokes¡£×êÑÐÈËÔ±ÔÚ2020Äê1ÔÂÖÐÑ®·¢ÏÖÁËÕâЩÊÜϰȾµÄÍøÕ¾£¬Êܺ¦ÕßÔ̺¬¶¯ÎïÔ°ºÍÆû³µÅä¼þ¹©¸øÉÌ¡£


Ô­ÎÄÁ´½Ó£º

https://www.tripwire.com/state-of-security/security-data-protection/expired-certificates-used-as-disguise-to-spread-buerak-mokes-malware/


3.APT×éÖ¯ÀûÓÃCVE-2020-0688¹¥»÷Exchange·þÎñÆ÷


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾ÝZDNet±¨Â·£¬¶à¸öÓɵ±¾ÖÖ§³ÖµÄºÚ¿Í×éÖ¯ÔÚÀûÓÃCVE-2020-0688À´ÊÕÊÜExchangeµç×ÓÓʼþ·þÎñÆ÷¡£¹¥»÷³¢ÊÔ×îÔçÊÇÓÉÓ¢¹úÍøÂ簲ȫ¹«Ë¾VolexityÓÚÉÏÖÜÎå·¢Ïֵ쬲¢±»¹ú·À²¿µÄÐÂÎÅÈËʿȷÈÏ¡£VolexityûÓй«¿ªÀûÓø÷ì϶µÄAPT×éÖ¯µÄÃû³Æ¡£CVE-2020-0688ÊÇ΢ÈíÔÚ2Ô°²È«¸üÐÂÖн¨¸´µÄÒ»¸ö·ì϶£¬Exchange·þÎñÆ÷ÔÚ×°ÖÃʱ²¢Ã»ÓÐΪ½ÚÔìÃæ°å´´½¨Î¨Ò»µÄ¼ÓÃÜÃÜÔ¿£¬ÕâÒâζ׏¥»÷ÕßÄܹ»ÀûÓøÃÃÜÔ¿ºÍͨ¹ý·¢ËͶñÒâÒªÇóÔÚ·þÎñÆ÷ºó¶ËÒÔSYSTEMÌØÈ¨Ö´ÐжñÒâ´úÂë¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/multiple-nation-state-groups-are-hacking-microsoft-exchange-servers/


4.ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔµ±¾Ö»úÃÜÈí¼þºÍÊý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹ú˾·¨²¿Ö¸¿ØÃÀ¹úºÓɽ°²È«Êý£¨DHS£©µÄǰ´úÀí¼ì²ì³¤ÇÔÈ¡µ±¾ÖÈí¼þºÍ»úÃÜÊý¾Ý¡£¸æ×´ÊéÏÔʾ£¬²é¶û˹¡¤°®µÂ»ª×È£¨Charles K. Edwards£©ÔÚ2011ÄêÖÁ2013ÄêÔøÈÎDHS´úÀí¼ì²ì³¤£¬ÔÚ2013Äê12ÔÂжÈιÙÖ°ºó£¬°®µÂ»ª×Å×ëVenkataµÈÈ˲μÓÁË´ÓºÓɽ°²È«Êý¼ì²ì³¤°ì¹«ÊÒ£¨OIG£©ÇÔÈ¡»úÃܺÍרÓÐÈí¼þµÄ´òËã¡£°®µÂ»ª×È»¹³ÉÁ¢ÁË×Ô¼ºµÄ¹«Ë¾£¬²¢Ïëͨ¹ý¸Ã¹«Ë¾ÏòÃÀ¹úũҵ²¿µÄOIGÏúÊÛ±»µÁDHS-OIGÈí¼þµÄ¼ÓÇ¿°æÒÔIJȡ±©Àû¡£Ë¾·¨²¿»¹³Æ°®µÂ»ª×ȵÈÈË»¹ÇÔÈ¡ÁËÃô¸ÐµÄµÐÔÖÊý¾Ý¿â£¬ÆäÖÐÔ̺¬ºÓɽ°²È«ÊýºÍÃÀ¹úÓÊÕþ·þÎñ¾Ö£¨USPS£©Ô±¹¤µÄÓ×ÎÒÉí·ÝÐÅÏ¢£¨PII£©¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/former-dhs-official-charged-with-theft-of-confidential-government-databases/


5.Ó¡¶ÈÐéα¼¼ÊõÖ§³Ö¹«Ë¾Ú¿Æ­4ÍòÊܺ¦Õß»ñÀû800ÍòÃÀÔª


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ó¡¶ÈÒ»Ãû´óѧÍËѧÉúAmit ChauhanÈÏ¿ÉÀûÓÃÐéα¼¼ÊõÖ§³¶à¿Æ­¹«Ë¾´Ó4ÍòÃûÊܺ¦ÕßÊÖÖÐÆ­È¡Á˳¬¹ý800ÍòÃÀÔª¡£ChauhanÓÚ2019Äê1Ô³ÉÁ¢ÁËÒ»¼ÒÐéαµÄ¼¼ÊõÖ§³Öºô½ÐÖÐÐĹ«Ë¾TechSupport£¬¸Ã¹«Ë¾ÒªÇó×·Çó¼¼ÊõÖ§³ÖµÄÊܺ¦ÕßÉÏÏß²¢µã»÷ÌØ¶¨µÄµ¯´°£¬´Ëʱ¶ñÒâÈí¼þ½«±»¼¤»î²¢ÇÔÈ¡Êܺ¦ÕߵIJÆÕþÊý¾Ý¡£Chauhan¼°Æäͬ»ïKumarÒѱ»¾¯·½¹ØÑº£¬²¢Æ¾¾ÝÓ¡¶ÈµÄ¡¶IT·¨°¸¡·±»¸æ×´¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/fake-tech-support-company-dupes-40k/


6.ÀÕË÷Èí¼þPwndLockerбäÖÖÆëÈ«×÷Ϊshellcode¿ª·¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Crypsis Group·¢ÏÖÀÕË÷Èí¼þPwndLockerµÄÒ»¸öбäÖÖÆëÈ«×÷ΪShellcode¿ª·¢¡£Í¨³£¶ñÒâÈí¼þ×÷Õß½ö±ÉÈËÔØÆ÷ºÍÖ²È뷨ʽÖÐʹÓÃshellcode£¬ÓÉÓÚ´´½¨ºÍʵÏÖ´ËÀà´úÂë¿ÉÄܼ«¶È¸´ÔÓÇÒºÄʱ¡£Crypsis GroupµÄ¸ß¼¶ÕÕ·÷Matt Thaxton°µÊ¾£¬PwndLockerʹÓÃshellcode£¨»òÓëµØÎ»Î޹صĴúÂ룩ʹËü³ÉΪ±ÈÆäËûÀÕË÷Èí¼þ¸ü¸´ÔÓ¡¢¸üÄÑÒÔ·¢ÏÖµÄÀÕË÷Èí¼þ£¬ÕâÖÖ´úÂëͨ³£²»×¤ÁôÔÚ´ÅÅÌÉÏ£¬²¢ÇÒʱʱ±»×¢Èëµ½ÆäËûºÏ·¨¹ý³ÌÖС£Thaxton³ÆÕâÊÇÊ׸öʹÓÃshellcode¿ª·¢µÄÀÕË÷Èí¼þ¡£PwndLocker»¹ÊµÏÖÁË×Ô½ç˵µÄ¼ÓÃÜËã·¨£¬µ«¸ÃËã·¨Ïà¶Ô½ÏÈõ£¬°²È«³§ÉÌEmsisoft°µÊ¾ÒѾ­¿ª·¢³öPwndLockerµÄ½âÃÜÆ÷¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/attacks-breaches/new-ransomware-variant-developed-entirely-as-shellcode/d/d-id/1337260