Intel CPUÒ×ÊÜÐÂSnoop¹¥»÷£¬¿Éй¶»º´æÊý¾Ý£»½ðÈÚ¹«Ë¾ÔÆÊý¾Ý¿âй¶425GBÊý¾Ý
°ä²¼¹¦·ò 2020-03-181.Ç÷Ïò¿Æ¼¼½¨¸´ÆóÒµ°²È«²úÆ·ÖеÄÁ½¸ö0day£¬Òѱ»ÀûÓÃ

±¾ÖÜÒ»Ç÷Ïò¿Æ¼¼°ä²¼°²È«¸üУ¬½¨¸´ÁËÁ½¸öÒÑÔÚÒ°±íÀûÓõÄ0dayºÍÁí±í3¸öÑϳÁ·ì϶¡£ÕâÁ½¸ö0dayÓ°ÏìÁ˸ù«Ë¾µÄÆóÒµ°²È«²úÆ·Apex OneºÍOfficeScan XG£¬Ç÷Ïò¿Æ¼¼ÉÐδ°ä²¼Óë¹¥»÷ÓйصÄÈκξßÌåÐÅÏ¢¡£ÕâÁ½¸ö0day±ðÀëΪ£ºCVE-2020-8467£¬CVSS 9.1£¬Apex OneºÍOfficeScanµÄǨá㹤¾ß×é¼þÖеķì϶£¬¿Éµ¼ÖÂRCE£¬¹¥»÷±ØÒªÓû§Éí·ÝÈÏÖ¤£»CVE-2020-8468£¬CVSS 8.0£¬Apex OneºÍOfficeScan´úÀíÊܵ½ÄÚÈÝÑé֤תÒå·ì϶µÄÓ°Ï죬¿ÉÔÊÐí¹¥»÷Õ߰ѳÖijЩ´úÀí¿Í»§¶Ë×é¼þ£¬¹¥»÷±ØÒªÓû§Éí·ÝÈÏÖ¤¡£´Ë±í£¬Ç÷Ïò¿Æ¼¼»¹½¨¸´ÁËÈý¸öCVSSµÃ·ÖΪ10·ÖµÄÑϳÁ·ì϶£¬Ô̺¬CVE-2020-8470¡¢CVE-2020-8598ºÍCVE-2020-8599£¬ÕâÈý¸ö·ì϶¿ÉÔÊÐí¹¥»÷ÕßÒÔSYSTEMȨÏÞɾ³ýÈκÎÎļþ¡¢Ö´ÐÐËÁÒâ´úÂë»òÔÚËÁÒâõè¾¶ÏÂдÈëËÁÒâÊý¾Ý²¢ÈƹýRootµÇ¼£¬ÀûÓÃÕâÈý¸ö·ì϶¾ù²»±ØÒªÉí·ÝÑéÖ¤¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/two-trend-micro-zero-days-exploited-in-the-wild-by-hackers/
2.Intel CPUÒ×ÊÜÐÂSnoop¹¥»÷£¬¿Éй¶»º´æÊý¾Ý
Intel CPUÈÝÒ×Êܵ½Ðµġ°Snoop¡±¹¥»÷Ó°Ï죬¸Ã¹¥»÷¿ÉÄÜ»áй©CPUÄÚ²¿´æ´¢Æ÷£¨»º´æ£©ÖеÄÊý¾Ý¡£Intel°µÊ¾2018Äê8ÔÂÕë¶ÔForeshadow£¨L1TF£©·ì϶°ä²¼µÄ²¹¶¡Ò²ºÏÓÃÓÚ´Ëй¥»÷¡£AWSÈí¼þ¹¤³ÌʦPawel Wieczorkiewicz·¢ÏÖ²¢»ã±¨Á˴˹¥»÷²½Ö裬¸Ã¹¥»÷±»ÃèÊöΪ¡°Snoop¸¨ÖúL1Êý¾Ý²É¼¯¡±£¬»òÖ»ÊÇ¡°Snoop¡±£¨CVE-2020-0550£©¡£ÔÚ¼¼Êõ²ãÃæÉÏ£¬ÐµÄSnoop¹¥»÷ÀûÓÃÁ˶༶»º´æ¡¢»º´æÒ»ÖÂÐÔºÍ×ÜÏß¼àÌýµÈCPU»úÔì¡£IntelÁгöÁËÒ×Êܹ¥»÷µÄCPUÁÐ±í£¬¸ÃÁбíÖÐÔ̺¬CoreºÍXeon´¦ÖÃÆ÷µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/intel-cpus-vulnerable-to-new-snoop-attack/
3.APT36ÀûÓÃйڲ¡¶¾Ö÷Ìâ´«²¼Crimson RAT
Ëæ×ÅÈ«Çòйڲ¡¶¾µÄ·¢×÷£¬Ô½À´Ô½¶àµÄ¹¥»÷ÕßÀûÓÃÈËÃǵÄÕð¾ªÀ´É¢²¼ÃýÎóµÄÐÅÏ¢ºÍÌáÒéڲƼ°¶ñÒâÈí¼þ¹¥»÷¡£APT36Ò²¸ÏÉÏÁËÕâÒ»³±Ë®£¬×î½üMalwarebytes LabsµÄRed DripÍŶӻ㱨³ÆAPT36ÔÚÀûÓý¡È«Õ÷ѯµö¶üÎĵ·´´«²¼Crimson RAT¡£APT36±»ÒÔΪÊǰͻù˹̹µ±¾ÖÔÞÖúµÄ¹¥»÷Õߣ¬ËüÖØÒªÕë¶ÔÓ¡¶ÈµÄ¹ú·À²¿¡¢Ê¹¹ÝºÍµ±¾Ö»ú¹¹¡£¸Ã×éÖ¯×Ô2016ÄêÆð»îÔ¾£¬ÆäÍøÂç¼äµý»î¶¯µÄÖ÷ÕÅÊÇ´ÓÓ¡¶ÈÍøÂçÓë°Í»ù˹̹¾üÊÂºÍ±í½»ÀûÒæÓйصÄÃô¸ÐÐÅÏ¢¡£Crimson RATͨ¹ý.Net±àд£¬ÆäÖ°ÄÜÔ̺¬ÇÔÈ¡ä¯ÀÀÆ÷Í´´¦¡¢Ã¶¾Ù¹ý³ÌºÍ´ÅÅÌÇý¶¯Æ÷Ŀ¼¡¢½Ó¹ÜC&CÎļþ¡¢Ê¹ÓÃ×Ô½ç˵µÄTCPºÍ̸½øÐÐC£¦CͨѶ¡¢ÆÁÄ»½ØÍ¼µÈ¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/threat-analysis/2020/03/apt36-jumps-on-the-coronavirus-bandwagon-delivers-crimson-rat/
4.FireEye°ä²¼2017µ½2019ÄêÀÕË÷Èí¼þ²¿ÊðÇ÷Ïò»ã±¨
FireEye MandiantµÄ×êÑÐÈËÔ±¶Ô2017Äêµ½2019ÄêµÄÀÕË÷Èí¼þ¹¥»÷Êý¾Ý½øÐÐÁË»ØÊ×£¬ÒÔ¼ø±ð³ö³õʼÈëÇÖý½é¡¢¹¥»÷ÕßÔÚÊÜÏ°È¾ÍøÂçÉϵľùÔÈפÁô¹¦·òÒÔ¼°¹¥»÷Õßͨ³£Æ«²îÓÚ²¿ÊðÀÕË÷Èí¼þµÄ¹¦·òµÈ¹²Í¬Ìص㡣ËûÃǵÄ×êÑÐÅú×¢£¬ÔÚ´óÎÞÊýÊÂÎñÖУ¬¹¥»÷Õß½øÈëÍøÂçºóÖÁÉÙÆÚ´ýÈýÌì¼´¿É¼ø±ð¹Ø¼üϵͳ²¢×÷ΪÀÕË÷Èí¼þ¹¥»÷µÄÖ¸±ê¡£ÔÚ´óÎÞÊý£¨75£¥£©µÄ°¸ÀýÖУ¬´ÓµÚÒ»Åú¶ñÒâ»î¶¯µ½²¿ÊðÀÕË÷Èí¼þÖ®¼äÖÁÉÙ¾¹ýÁËÈýÌ죬ÕâÒâζ×ÅÈôÊÇÊܺ¦Õß×éÖ¯¿ÉÄÜ×㹻Ѹ¿ìµØ·¢ÏÖ³õʼ»î¶¯£¬ËûÃǾÍÓлúÓö×èÖ¹¹¥»÷¡£×êÑл¹ÏÔʾ£¬ÔÚËÄ·ÖÖ®ÈýÒÔÉÏ£¨76£¥£©µÄÊÂÎñÖУ¬¹¥»÷Õß²¿ÊðÀÕË÷Èí¼þµÄ¹¦·òÊÇÔÚÕý³£°ì¹«¹¦·òÖ®±í£¨27%ÊÇÔÚÖÜÄ©£¬49%ÊÇÔÚ¹¤×÷ÈÕµÄÉÏÎç8µã֮ǰ»òÏÂÎç6µãÖ®ºó£©£¬ÕâÒ»Ç÷Ïò͹ÏÔÁËÓ¦¼±´òËãµÄ±ØÒªÐÔ¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2020/03/they-come-in-the-night-ransomware-deployment-trends.html
5.½ðÈÚ¹«Ë¾AdvantageºÍArgusÔÆÊý¾Ý¿âй¶425GBÊý¾Ý
vpnMentor×êÑÐÈËÔ±·¢ÏÖÒ»¸öÊôÓÚ½ðÈÚ¹«Ë¾Advantage Capital FundingºÍArgus Capital FundingµÄ¿É¹«¿ª½Ó¼ûµÄÊý¾Ý¿âй¶ÁË425GBÃô¸ÐÎļþ¡£¸ÃÊý¾Ý¿âÓëÕâÁ½¸ö¹«Ë¾¿ª·¢µÄMCA WizardÀûÓÃÓйأ¬¸ÃÀûÓô˿ÌÒѲ»ÔÙÔÚ¹Ù·½ÀûÓÃÉ̵êÖÐÌṩ¡£vpnMentor³õ´ÎÔÚ2019Äê12Ô·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬Êý¾Ý¿âÖÐÔ̺¬À´×ÔAdvantageºÍArgusµÄ¸öÈË˾·¨ºÍ²ÆÕþÎļþ£¬Ô̺¬ÐÅÓþ»ã±¨¡¢ÒøÐжÔÕʵ¥¡¢ºÏͬ¡¢Ë¾·¨Îļþ¡¢¼ÝÊ»ÅÆÕÕ¸±±¾¡¢²É°ì¶©µ¥ºÍÊÕÌõ¡¢ÄÉ˰É걨±í¡¢Éç»á±£ÏÕÐÅÏ¢ÒÔ¼°ÂòÂô»ã±¨¡£ÕâЩ¼Í¼²»½öÓëAdvantageºÍArgusÓйأ¬»¹Ó°ÏìÁËËûÃǵĿͻ§¡¢³Ð°üÉÌ¡¢Ô±¹¤ºÍºÏ×÷ͬ°é¡£vpnMentor³¢ÊÔÓëAdvantageºÍArgusÁªÏµ£¬µ«²¢Î´µÃµ½»Ø¸´£¬×êÑÐÈËÔ±×îÖÕÖ±½ÓÓëAWSÁªÏµ£¬¸ÃÊý¾Ý¿âÓÚ2020Äê1ÔÂ9Èչعء£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/financial-apps-leak-425gb-in-company-data-through-open-database/
6.ÃÀ¹úÒÁÀûŵÒÁÖÝ´óѧй¶1700¶àÃûÔ±¹¤Êý¾Ý
ÃÀ¹úÒÁÀûŵÒÁÖݶÅÅåÆæÑ§Ôº¹ÙԱ֤ʵ¸Ã´óѧÔâ·êÊý¾Ýй¶ÊÂÎñ£¬ÊÜÓ°ÏìµÄÈËÔ̺¬1755ÃûÏÖÈκÍǰ¹ÍÔ±¡£¸Ã´óѧÌ󤲼À³¶÷¡¤¿¨ÆÕÍУ¨Brian Caputo£©°µÊ¾£¬Ô±¹¤µÄÓ×ÎÒºÍ˰ÎñÐÅÏ¢¶¼±»Éæ¼°£¬µ«·¸×ï·Ö×Ó»ñÈ¡»ò½«ÕâЩÐÅÏ¢ÓÃÓÚÚ²ÆÖ÷ÕŵĿÉÄÜÐÔºÜÓס£¸Ã´óѧ»¹Ãâ·ÑΪÊÜÓ°ÏìµÄ¹ÍÔ±ÌṩÐÅÓþ¼à¿ØºÍÉí·Ý±£»¤·þÎñ¡£¹ØÓÚй¶ÊÇÈôºÎ²úÉúµÄµ÷²éÉÐÎÞ¶¨ÂÛ£¬¸Ã´óѧҲûÓÐ×¢Ã÷ÊÂÎñ²úÉúµÄ¹¦·òºÍÃô¸ÐÊý¾ÝÈôºÎй¶µÄϸ½Ú¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/illinois-college-suffers-data/


¾©¹«Íø°²±¸11010802024551ºÅ