Intel CPUÒ×ÊÜÐÂSnoop¹¥»÷ £¬¿Éй¶»º´æÊý¾Ý£»½ðÈÚ¹«Ë¾ÔÆÊý¾Ý¿âй¶425GBÊý¾Ý

°ä²¼¹¦·ò 2020-03-18

1.Ç÷Ïò¿Æ¼¼½¨¸´ÆóÒµ°²È«²úÆ·ÖеÄÁ½¸ö0day £¬Òѱ»ÀûÓÃ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


±¾ÖÜÒ»Ç÷Ïò¿Æ¼¼°ä²¼°²È«¸üР£¬½¨¸´ÁËÁ½¸öÒÑÔÚÒ°±íÀûÓõÄ0dayºÍÁí±í3¸öÑϳÁ·ì϶¡£ÕâÁ½¸ö0dayÓ°ÏìÁ˸ù«Ë¾µÄÆóÒµ°²È«²úÆ·Apex OneºÍOfficeScan XG £¬Ç÷Ïò¿Æ¼¼ÉÐδ°ä²¼Óë¹¥»÷ÓйصÄÈκξßÌåÐÅÏ¢¡£ÕâÁ½¸ö0day±ðÀëΪ£ºCVE-2020-8467 £¬CVSS 9.1 £¬Apex OneºÍOfficeScanµÄǨá㹤¾ß×é¼þÖеķì϶ £¬¿Éµ¼ÖÂRCE £¬¹¥»÷±ØÒªÓû§Éí·ÝÈÏÖ¤£»CVE-2020-8468 £¬CVSS 8.0 £¬Apex OneºÍOfficeScan´úÀíÊܵ½ÄÚÈÝÑé֤תÒå·ì϶µÄÓ°Ïì £¬¿ÉÔÊÐí¹¥»÷Õ߰ѳÖijЩ´úÀí¿Í»§¶Ë×é¼þ £¬¹¥»÷±ØÒªÓû§Éí·ÝÈÏÖ¤¡£´Ë±í £¬Ç÷Ïò¿Æ¼¼»¹½¨¸´ÁËÈý¸öCVSSµÃ·ÖΪ10·ÖµÄÑϳÁ·ì϶ £¬Ô̺¬CVE-2020-8470¡¢CVE-2020-8598ºÍCVE-2020-8599 £¬ÕâÈý¸ö·ì϶¿ÉÔÊÐí¹¥»÷ÕßÒÔSYSTEMȨÏÞɾ³ýÈκÎÎļþ¡¢Ö´ÐÐËÁÒâ´úÂë»òÔÚËÁÒâõè¾¶ÏÂдÈëËÁÒâÊý¾Ý²¢ÈƹýRootµÇ¼ £¬ÀûÓÃÕâÈý¸ö·ì϶¾ù²»±ØÒªÉí·ÝÑéÖ¤¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/two-trend-micro-zero-days-exploited-in-the-wild-by-hackers/


2.Intel CPUÒ×ÊÜÐÂSnoop¹¥»÷ £¬¿Éй¶»º´æÊý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Intel CPUÈÝÒ×Êܵ½Ðµġ°Snoop¡±¹¥»÷Ó°Ïì £¬¸Ã¹¥»÷¿ÉÄÜ»áй©CPUÄÚ²¿´æ´¢Æ÷£¨»º´æ£©ÖеÄÊý¾Ý¡£Intel°µÊ¾2018Äê8ÔÂÕë¶ÔForeshadow£¨L1TF£©·ì϶°ä²¼µÄ²¹¶¡Ò²ºÏÓÃÓÚ´Ëй¥»÷¡£AWSÈí¼þ¹¤³ÌʦPawel Wieczorkiewicz·¢ÏÖ²¢»ã±¨Á˴˹¥»÷²½Öè £¬¸Ã¹¥»÷±»ÃèÊöΪ¡°Snoop¸¨ÖúL1Êý¾Ý²É¼¯¡± £¬»òÖ»ÊÇ¡°Snoop¡±£¨CVE-2020-0550£©¡£ÔÚ¼¼Êõ²ãÃæÉÏ £¬ÐµÄSnoop¹¥»÷ÀûÓÃÁ˶༶»º´æ¡¢»º´æÒ»ÖÂÐÔºÍ×ÜÏß¼àÌýµÈCPU»úÔì¡£IntelÁгöÁËÒ×Êܹ¥»÷µÄCPUÁбí £¬¸ÃÁбíÖÐÔ̺¬CoreºÍXeon´¦ÖÃÆ÷µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/intel-cpus-vulnerable-to-new-snoop-attack/


3.APT36ÀûÓÃйڲ¡¶¾Ö÷Ìâ´«²¼Crimson RAT


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ëæ×ÅÈ«Çòйڲ¡¶¾µÄ·¢×÷ £¬Ô½À´Ô½¶àµÄ¹¥»÷ÕßÀûÓÃÈËÃǵÄÕð¾ªÀ´É¢²¼ÃýÎóµÄÐÅÏ¢ºÍÌáÒéڲƭ¼°¶ñÒâÈí¼þ¹¥»÷¡£APT36Ò²¸ÏÉÏÁËÕâÒ»³±Ë® £¬×î½üMalwarebytes LabsµÄRed DripÍŶӻ㱨³ÆAPT36ÔÚÀûÓý¡È«Õ÷ѯµö¶üÎĵ·´´«²¼Crimson RAT¡£APT36±»ÒÔΪÊǰͻù˹̹µ±¾ÖÔÞÖúµÄ¹¥»÷Õß £¬ËüÖØÒªÕë¶ÔÓ¡¶ÈµÄ¹ú·À²¿¡¢Ê¹¹ÝºÍµ±¾Ö»ú¹¹¡£¸Ã×éÖ¯×Ô2016ÄêÆð»îÔ¾ £¬ÆäÍøÂç¼äµý»î¶¯µÄÖ÷ÕÅÊÇ´ÓÓ¡¶ÈÍøÂçÓë°Í»ù˹̹¾üÊÂºÍ±í½»ÀûÒæÓйصÄÃô¸ÐÐÅÏ¢¡£Crimson RATͨ¹ý.Net±àд £¬ÆäÖ°ÄÜÔ̺¬ÇÔÈ¡ä¯ÀÀÆ÷Í´´¦¡¢Ã¶¾Ù¹ý³ÌºÍ´ÅÅÌÇý¶¯Æ÷Ŀ¼¡¢½Ó¹ÜC&CÎļþ¡¢Ê¹ÓÃ×Ô½ç˵µÄTCPºÍ̸½øÐÐC£¦CͨѶ¡¢ÆÁÄ»½ØÍ¼µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/threat-analysis/2020/03/apt36-jumps-on-the-coronavirus-bandwagon-delivers-crimson-rat/


4.FireEye°ä²¼2017µ½2019ÄêÀÕË÷Èí¼þ²¿ÊðÇ÷Ïò»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



FireEye MandiantµÄ×êÑÐÈËÔ±¶Ô2017Äêµ½2019ÄêµÄÀÕË÷Èí¼þ¹¥»÷Êý¾Ý½øÐÐÁË»ØÊ× £¬ÒÔ¼ø±ð³ö³õʼÈëÇÖý½é¡¢¹¥»÷ÕßÔÚÊÜÏ°È¾ÍøÂçÉϵľùÔÈפÁô¹¦·òÒÔ¼°¹¥»÷Õßͨ³£Æ«²îÓÚ²¿ÊðÀÕË÷Èí¼þµÄ¹¦·òµÈ¹²Í¬Ìصã¡£ËûÃǵÄ×êÑÐÅú×¢ £¬ÔÚ´óÎÞÊýÊÂÎñÖÐ £¬¹¥»÷Õß½øÈëÍøÂçºóÖÁÉÙÆÚ´ýÈýÌì¼´¿É¼ø±ð¹Ø¼üϵͳ²¢×÷ΪÀÕË÷Èí¼þ¹¥»÷µÄÖ¸±ê¡£ÔÚ´óÎÞÊý£¨75£¥£©µÄ°¸ÀýÖÐ £¬´ÓµÚÒ»Åú¶ñÒâ»î¶¯µ½²¿ÊðÀÕË÷Èí¼þÖ®¼äÖÁÉÙ¾­¹ýÁËÈýÌì £¬ÕâÒâζ×ÅÈôÊÇÊܺ¦Õß×éÖ¯¿ÉÄÜ×㹻Ѹ¿ìµØ·¢ÏÖ³õʼ»î¶¯ £¬ËûÃǾÍÓлúÓö×èÖ¹¹¥»÷¡£×êÑл¹ÏÔʾ £¬ÔÚËÄ·ÖÖ®ÈýÒÔÉÏ£¨76£¥£©µÄÊÂÎñÖÐ £¬¹¥»÷Õß²¿ÊðÀÕË÷Èí¼þµÄ¹¦·òÊÇÔÚÕý³£°ì¹«¹¦·òÖ®±í£¨27%ÊÇÔÚÖÜÄ© £¬49%ÊÇÔÚ¹¤×÷ÈÕµÄÉÏÎç8µã֮ǰ»òÏÂÎç6µãÖ®ºó£© £¬ÕâÒ»Ç÷Ïò͹ÏÔÁËÓ¦¼±´òËãµÄ±ØÒªÐÔ¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/threat-research/2020/03/they-come-in-the-night-ransomware-deployment-trends.html


5.½ðÈÚ¹«Ë¾AdvantageºÍArgusÔÆÊý¾Ý¿âй¶425GBÊý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


vpnMentor×êÑÐÈËÔ±·¢ÏÖÒ»¸öÊôÓÚ½ðÈÚ¹«Ë¾Advantage Capital FundingºÍArgus Capital FundingµÄ¿É¹«¿ª½Ó¼ûµÄÊý¾Ý¿âй¶ÁË425GBÃô¸ÐÎļþ¡£¸ÃÊý¾Ý¿âÓëÕâÁ½¸ö¹«Ë¾¿ª·¢µÄMCA WizardÀûÓÃÓйØ £¬¸ÃÀûÓô˿ÌÒѲ»ÔÙÔÚ¹Ù·½ÀûÓÃÉ̵êÖÐÌṩ¡£vpnMentor³õ´ÎÔÚ2019Äê12Ô·¢ÏÖÁ˸ÃÊý¾Ý¿â £¬Êý¾Ý¿âÖÐÔ̺¬À´×ÔAdvantageºÍArgusµÄ¸öÈË˾·¨ºÍ²ÆÕþÎļþ £¬Ô̺¬ÐÅÓþ»ã±¨¡¢ÒøÐжÔÕʵ¥¡¢ºÏͬ¡¢Ë¾·¨Îļþ¡¢¼ÝÊ»ÅÆÕÕ¸±±¾¡¢²É°ì¶©µ¥ºÍÊÕÌõ¡¢ÄÉ˰É걨±í¡¢Éç»á±£ÏÕÐÅÏ¢ÒÔ¼°ÂòÂô»ã±¨¡£ÕâЩ¼Í¼²»½öÓëAdvantageºÍArgusÓйØ £¬»¹Ó°ÏìÁËËûÃǵĿͻ§¡¢³Ð°üÉÌ¡¢Ô±¹¤ºÍºÏ×÷ͬ°é¡£vpnMentor³¢ÊÔÓëAdvantageºÍArgusÁªÏµ £¬µ«²¢Î´µÃµ½»Ø¸´ £¬×êÑÐÈËÔ±×îÖÕÖ±½ÓÓëAWSÁªÏµ £¬¸ÃÊý¾Ý¿âÓÚ2020Äê1ÔÂ9ÈչعØ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/financial-apps-leak-425gb-in-company-data-through-open-database/


6.ÃÀ¹úÒÁÀûŵÒÁÖÝ´óѧй¶1700¶àÃûÔ±¹¤Êý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹úÒÁÀûŵÒÁÖݶÅÅåÆæÑ§Ôº¹ÙԱ֤ʵ¸Ã´óѧÔâ·êÊý¾Ýй¶ÊÂÎñ £¬ÊÜÓ°ÏìµÄÈËÔ̺¬1755ÃûÏÖÈκÍǰ¹ÍÔ±¡£¸Ã´óѧÌ󤲼À³¶÷¡¤¿¨ÆÕÍУ¨Brian Caputo£©°µÊ¾ £¬Ô±¹¤µÄÓ×ÎÒºÍ˰ÎñÐÅÏ¢¶¼±»Éæ¼° £¬µ«·¸×ï·Ö×Ó»ñÈ¡»ò½«ÕâЩÐÅÏ¢ÓÃÓÚڲƭÖ÷ÕŵĿÉÄÜÐÔºÜÓס£¸Ã´óѧ»¹Ãâ·ÑΪÊÜÓ°ÏìµÄ¹ÍÔ±ÌṩÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ¡£¹ØÓÚй¶ÊÇÈôºÎ²úÉúµÄµ÷²éÉÐÎÞ¶¨ÂÛ £¬¸Ã´óѧҲûÓÐ×¢Ã÷ÊÂÎñ²úÉúµÄ¹¦·òºÍÃô¸ÐÊý¾ÝÈôºÎй¶µÄϸ½Ú¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/illinois-college-suffers-data/