Eclypsium·¢ÏÖ3¸ö½Ó¿Ú¿ÉÈÆ¹ýUEFIµÄ°²È«Êèµ¼Ö°ÄÜ
°ä²¼¹¦·ò 2022-08-15
¾Ý8ÔÂ12ÈÕ±¨Â·£¬EclypsiumÔÚ3¸öµÚÈý·½Í³Ò»¿ÉÀ©´ó¹Ì¼þ½Ó¿Ú(UEFI)Êèµ¼¼ÓÔØ·¨Ê½Öз¢ÏÖÁ˰²È«Ö°ÄÜÈÆ¹ý·ì϶£¬¿ÉÓÃÀ´ÈƹýUEFI°²È«Êèµ¼Ö°ÄÜ¡£ÕâÊÇÓÉMicrosoftÊðÃûºÍÑéÖ¤µÄÌØ¶¨¹©¸øÉ̵ÄÊèµ¼¼ÓÔØ·¨Ê½£¬±ðÀëΪEurosoftÊèµ¼¼ÓÔØ·¨Ê½(CVE-2022-34301)¡¢New Horizon Data Systems IncÊèµ¼¼ÓÔØ·¨Ê½(CVE-2022-34302)ºÍCrypto ProÊèµ¼¼ÓÔØ·¨Ê½(CVE-20220-34303)¡£¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩ·ì϶ÔÚÖ¸±êÉϳÉÁ¢ÓƾÃÐÔ£¬¶ø²»»áÓÉÓÚ³ÁÐÂ×°ÖÃϵͳ±»É¾³ý£¬Î¢ÈíÒÑͨ¹ýÉÏÖܰ䲼µÄÖܶþ²¹¶¡½øÐн¨¸´¡£
https://thehackernews.com/2022/08/researchers-uncover-uefi-secure-boot.html
2¡¢¹È¸èÒòÍøÂçAndroidµØÎ»Êý¾Ý±»°Ä´óÀûÑÇ·£¿î6000ÍòÃÀÔª
¾ÝýÌå8ÔÂ13ÈÕ±¨Â·£¬¹È¸è±»°Ä´óÀûÑǾºÕùÓëÏû·ÑÕßίԱ»á(ACCC)·£¿î6000ÍòÃÀÔª£¬ÓÉÓÚÆäÔÚ2017Äê1ÔÂÖÁ2018Äê12ÔÂÍøÂçºÍʹÓðĴóÀûÑÇAndroidÓû§µÄµØÎ»Êý¾Ý¡£¸Ã»ú¹¹°µÊ¾£¬¼´±ãÓû§ÔÚÉ豸ÉèÖÃÖнûÓÃÁ˵ØÎ»º¹Çà¼Í¼£¬µ«¹È¸èÈÔÔÚ¸ú×ÙÆäÓû§µÄAndroidÊÖ»ú¡£Óû§±»Îóµ¼²¢ÒÔΪ¸ÃÉèÖÿɽûÓõØÎ»¸ú×Ù£¬µ«ÏÖʵÉÏÁíÒ»¸öĬÈÏ´ò¿ªµÄWeb & App ActivityÕÊ»§ÉèÖÿÉÓÃÀ´ÍøÂç¡¢´æ´¢ºÍʹÓÃÓ×ÎÒµØÎ»Êý¾Ý¡£ACCC¹À¼Æ£¬Óг¬¹ý130Íò°Ä´óÀûÑǾÓÃñµÄÊܵ½Ó°Ïì¡£
https://www.bleepingcomputer.com/news/google/google-fined-60-million-over-android-location-data-collection/
3¡¢KillnetÐû³Æ¶ÔLockheed MartinÔâµ½µÄDDoS¹¥»÷ÕÆ¹Ü
ýÌå8ÔÂ13ÈÕ±¨Â·£¬ºÚ¿ÍÍÅ»ïKillnetÐû³Æ¶Ôº½¿Õº½ÌìºÍ¹ú·À¹«Ë¾Âå¿ËÏ£µÂÂí¶¡£¨Lockheed Martin£©Ôâµ½µÄDDoS¹¥»÷ÕÆ¹Ü¡£¸ÃÍÅ»ï×Ô3ÔÂÒÔÀ´Ò»Ïò»îÔ¾£¬Ôø¶ÔÒâ´óÀû¡¢ÂÞÂíÄáÑÇ¡¢Ä¦¶û¶àÍß¡¢½Ý¿Ë¹²ºÍ¹ú¡¢Á¢ÌÕÍð¡¢Å²ÍþºÍÀÍÑάÑǵȹú¶È½øÐÐDDoS¹¥»÷¡£´Ë±í£¬Ëü»¹ÔÚTelegramÉϰ䲼ÁËÒ»¶ÎÊÓÆµ£¬Ðû³ÆÇÔÈ¡Á˸ù«Ë¾Ô±¹¤µÄÓ×ÎÒÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂëºÍÕÕÆ¬µÈ¡£Ä¿Ç°£¬Lockheed Martin²¢Î´¶Ô´ËÊÂ×ö³ö»Ø¸´¡£
https://securityaffairs.co/wordpress/134341/hacking/killnet-lockheed-martin.html
4¡¢Lucky Mouseͨ¹ýľÂí»¯MiMi·Ö·¢ºóÃÅrshellºÍHyperBro
¾ÝýÌå8ÔÂ13Èճƣ¬SEKOIAºÍTrend MicroÅû¶ÁËLucky MouseÀûÓÃľÂí»¯¿çƽ̨¼´Ê±Í¨Ñ¶ÀûÓ÷¨Ê½MiMi·Ö·¢ºóÃŵĻ¡£SEKOIA·¢ÏÖ×Ô½ñÄê5ÔÂ26ÈÕ£¬¸ÃÀûÓõÄmacOS°æ±¾2.3.0±»´Û¸Ä²¢Ö²ÈëÁ˶ñÒâJavaScript´úÂ룬Õâ¿ÉÄÜÊǵÚÒ»¸öÊÜϰȾµÄmacOS±äÌå¡£TrendMicro·¢ÏÖÁËÀûÓÃrshellÕë¶ÔLinuxºÍÀûÓÃHyperBroÕë¶ÔWindowsµÄ¾ÉµÄľÂí»¯MiMi£¬×îÔçµÄLinux rshellÑù±¾³Ê´Ë¿Ì2021Äê6Ô¡£
https://thehackernews.com/2022/08/chinese-hackers-backdoored-mimi-chat.html
5¡¢CISAºÍFBI¹«¿ªÀÕË÷Èí¼þZeppelinµÄTTPµÈ¾ßÌåÐÅÏ¢
8ÔÂ11ÈÕ£¬CISAºÍFBI°ä²¼Á˹ØÓÚÀÕË÷Èí¼þZeppelinµÄ½áºÏÍøÂ簲ȫÕ÷ѯ(CSA)¡£ZeppelinÊÇ»ùÓÚDelphiµÄVega¶ñÒâÈí¼þ¼Ò×åµÄÑܳö²úÆ·£¬×÷ΪRaaS£¬´Ó2019Äêµ½2022Äê6Ô±»ÓÃÀ´¹¥»÷ÁË´óÁ¿µÄµÄÆóÒµºÍ¹Ø¼ü»ù´¡ÉèÊ©£¬Ô̺¬¹ú·À³Ð°üÉÌ¡¢½ÌÓý»ú¹¹¡¢Ôì×÷É̺ͼ¼Êõ¹«Ë¾£¬³ö¸ñÊÇÒ½ÁÆÐÐÒµµÄ×éÖ¯¡£¸ÃÕ÷ѯ»¹¸æ·¢Á˸ÃÀÕË÷Èí¼þµÄÕ½Êõ¡¢¼¼ÊõºÍ·¨Ê½(TTP)ÒÔ¼°Í×ÐÖ¸±ê(IOC)£¬À´Ô®ÊÖ°²È«ÈËÔ±¼ì²âºÍ·ÀÓù´ËÀ๥»÷¡£
https://www.cisa.gov/uscert/ncas/alerts/aa22-223a
6¡¢ÂíÀ´Î÷ÑÇÖ§¸¶Íø¹ØÆ½Ì¨iPay88µÄÓû§Ö§¸¶¿¨ÐÅϢй¶
ýÌå8ÔÂ11Èճƣ¬ÂíÀ´Î÷ÑÇÖ§¸¶Íø¹ØÆ½Ì¨iPay88µÄÓû§µÄÖ§¸¶¿¨ÐÅÏ¢¿ÉÄÜй¶¡£iPay88ÊÇÂíÀ´Î÷ÑÇ×î´óµÄÖ§¸¶Íø¹ØÆ½Ì¨Ö®Ò»£¬Îª¸ÃµØÓòµÄ¶à¶àÉ̼ÒÌṩPOS½â¾ö¹æ»®¡£¸Ã¹«Ë¾°ä²¼ÉêÃ÷³ÆÆäÔÚ5ÔÂ31ÈÕ·¢ÏÖÁËй¶ÊÂÎñ²¢ÆðÍ·µ÷²é£¬×Ô7ÔÂ20ÈÕÒÔÀ´Ã»Óз¢ÏÖ½øÒ»²½µÄ¿ÉÒɻ¡£Ä¿Ç°£¬ÂíÀ´Î÷Ñǹú¶ÈÒøÐУ¨BNM£©ÒÑÅúʾ¸÷ÒøÐе±¼´Í¨ÖªÊÜÓ°ÏìµÄ³Ö¿¨ÈË£¬ÒÔ½øÒ»²½±£»¤ËûÃÇÃâÔâÚ¿Æ»òδ¾ÊÚȨµÄÂòÂô·çÏÕ¡£
https://soyacincau.com/2022/08/11/ipay88-cybersecurity-incident-card-data-compromised-xrs/


¾©¹«Íø°²±¸11010802024551ºÅ