Ó¢ÌØ¶ûµ÷²éMSI·ì϶µ¼ÖµÄBoot Guard˽Կй¶ÊÂÎñ
°ä²¼¹¦·ò 2023-05-101¡¢Ó¢Ìضûµ÷²éMSI·ì϶µ¼ÖµÄBoot Guard˽Կй¶ÊÂÎñ
¾ÝýÌå5ÔÂ8ÈÕ±¨Â·£¬Ó¢ÌضûÔÚµ÷²éÆäBoot Guard°²È«Ö°ÄÜʹÓõÄ˽ԿµÄй¶ÊÂÎñ¡£3Ô£¬Money MessageÍŻ﹥»÷ÁËÍÆËã»úÓ²¼þÔì×÷ÉÌMSI£¬Ðû³ÆÒÑÇÔÈ¡1.5TBÊý¾Ý£¬Éæ¼°¹Ì¼þ¡¢Ô´´úÂëºÍÊý¾Ý¿â¡£²¢ÀÕË÷400ÍòÃÀÔª£¬ÔÚδÊÕµ½Êê½ðºóÆðͷй¶MSIµÄÊý¾Ý¡£¾ÝϤ£¬Ð¹Â¶µÄÔ´´úÂëÔ̺¬57¿îMSI²úÆ·µÄ¾µÏñÊðÃû˽ԿºÍ116¿îMSI²úÆ·µÄIntel Boot Guard˽Կ¡£Ó¢ÌضûÔÚ»ý¼«µ÷²é´ËÊ£¬×êÑÐÈËԱй©£¬Õû¸öÓ¢ÌØ¶ûÉú̬ϵͳ¶¼Êܵ½ÁËÕâ´ÎMSIÊý¾Ýй¶µÄÓ°Ïì¡£
https://www.bleepingcomputer.com/news/security/intel-investigating-leak-of-intel-boot-guard-private-keys-after-msi-breach/
2¡¢Î¢Èí°ä²¼3Ô·ݰ²È«¸üУ¬½¨¸´Á½¸öÒѱ»ÀûÓõķì϶
5ÔÂ9ÈÕ£¬Î¢Èí°ä²¼3Ô·ÝÖܶþ²¹¶¡£¬½¨¸´ÁËÔ̺¬3¸ö0 dayÔÚÄÚµÄ38¸ö·ì϶(²»Ô̺¬5ÔÂ5ÈÕ½¨¸´µÄ11¸öMicrosoft Edge·ì϶)¡£Õâ´Î½¨¸´µÄ3¸ö0 dayÖУ¬ÓÐÁ½¸öÔÚ¹¥»÷Öб»ÀûÓã¬ÁíÒ»¸öÒѹ«¿ªÅû¶¡£±»ÀûÓõķì϶ÊÇWin32kÄÚºËÇý¶¯·¨Ê½ÖеÄÌáȨ·ì϶£¨CVE-2023-29336£©ºÍ°²È«Æô¶¯°²È«Ö°ÄÜÈÆ¹ý·ì϶£¨CVE-2023-24932£©£¬ºóÕ߿ɱ»ÓÃÓÚ×°ÖÃBlackLotus UEFI bootkit¡£Òѹ«¿ªÅû¶µÄÊÇWindows OLEµÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2023-29325£©¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2023-patch-tuesday-fixes-3-zero-days-38-flaws/
3¡¢OT&P HealthcareÔâµ½¹¥»÷Ô¼10ÍòÃû»¼ÕßµÄÐÅϢй¶
¾Ý5ÔÂ8ÈÕ±¨Â·£¬ÖйúÏã¸ÛµÄÒ½ÁƱ£½¡¹«Ë¾OT&P HealthcareÔâµ½ÍøÂç¹¥»÷£¬Ô¼10ÍòÃû»¼ÕßµÄÐÅϢй¶¡£¸Ã¹«Ë¾µÄIT²¿ÃÅÔÚÉÏÖÜËÄ·¢ÏÖ¡°ÏµÍ³²»²»±ä¡±µÄÎÊÌ⣬µ÷²é·¢ÏÔìäÔâµ½Á˹¥»÷£¬²¢µ±¼´¹Ø¹ØÁ˸Ãϵͳ¡£×êÑÐÈËÔ¹ØýÔÚÆÀ¹À¹¥»÷µÄ¹æÄ££¬Éв»È·¶¨Óм¸¶àÊý¾Ý±»µÁ£¬µ«Ò»Ð©»¼ÕßµÄÉí·ÝÖ¤ºÍ»¤ÕÕºÅÂë±»Öü´æÔÚϵͳÖС£´ÓĿǰ¹«¿ªµÄÐÅÏ¢À´¿´£¬»¹²»Ã÷ÏÔÕâÊÇ·ñΪÀÕË÷Èí»÷£¬ÓÉÓÚûÓÐÌá¼°ÈκÎÒªÇó¡£
https://www.databreaches.net/hk-personal-data-medical-history-of-100000-otp-healthcare-patients-may-have-been-compromised-in-cyberattack/
4¡¢Ó¢¹úCapita¹«Ë¾AWS´æ´¢Í°ÅäÖÃÃýÎóй¶655 GBÊý¾Ý
ýÌå5ÔÂ5Èճƣ¬Ó¢¹ú±í°ü¹«Ë¾CapitaµÄAWS´æ´¢Í°×Ô2016ÄêÒÔÀ´Ò»Ïò¶³öÔÚÍøÉÏ£¬ÆäÖÐÔ̺¬Ô¼3000¸öÎļþ£¬×Ü´óÓ×Ϊ655 GB¡£ÕâЩÊý¾ÝÔ̺¬Èí¼þÎļþ¡¢·þÎñÆ÷ͼÏñ¡¢´óÁ¿Excel±í¸ñ¡¢PowerPointÎļþºÍÎı¾Îļþ£¬ÆäÖÐÒ»¸öÎı¾Ô̺¬CapitaÒ»¸öϵͳµÄµÇ¼ÐÅÏ¢¡£´æ´¢Í°ÉÏûÓÐÃÜÂ룬ÈκÎ֪·ºÍ²Âµ½ÍøÖ·µÄÈ˶¼Äܹ»½Ó¼ûÕâЩÎļþ£¬GrayHatWarfareÒ²²¶»ñÁ˸ÃÔÆ·þÎñÆ÷µÄ¾ßÌåÐÅÏ¢¾ÝϤ¡£Ä¿Ç°£¬CapitaÒѽ«ÕâЩÊý¾Ý±£»¤ÆðÀ´¡£
https://candid.technology/capita-database-exposed-since-2016/
5¡¢Î¢Èí·¢ÏÖ¶à¸öºÚ¿ÍÍÅ»ïÀûÓÃPapercut·ì϶µÄ¹¥»÷»î¶¯
ýÌå5ÔÂ9ÈÕ±¨Â·£¬Î¢Èí·¢ÏÖÓëÒÁÀÊÓйصÄÍÅ»ïMango SandstormºÍMint SandstormÀûÓÃPaperCut MF/NGÖзì϶µÄ¹¥»÷»î¶¯¡£ÕâÊÇÒ»¸ö½Ó¼û½ÚÔì²»µ±·ì϶£¨CVE-2023-27350£©£¬¿ÉÓÃÀ´ÈƹýÉí·ÝÑéÖ¤²¢ÔÚSYSTEMÖÐÖ´ÐдúÂë¡£ÆäÖÐMint SandstormµÄÀûÓÃ»î¶¯ËÆºõÊÇ»úÓöÖ÷ÒåµÄ£¬Ó°ÏìÁ˸÷¸öÐÐÒµºÍµØÓòµÄ×éÖ¯¡£Mango SandstormµÄÀûÓûÒÀÈ»ºÜµÍ£¬¹¥»÷ÕßʹÓÃÏÈǰÈëÇֵŤ¾ßÏνӵ½ËûÃǵÄC2»ù´¡ÉèÊ©¡£
https://securityaffairs.com/145952/apt/iranian-apt-papercut-exploitation.html
6¡¢Malwarebyte°ä²¼4Ô·ÝÀÕË÷Èí¼þÌ¬ÊÆµÄ·ÖÎö»ã±¨
5ÔÂ8ÈÕ£¬Malwarebyte°ä²¼Á˹ØÓÚ4Ô·ÝÀÕË÷Èí¼þÌ¬ÊÆµÄ·ÖÎö»ã±¨¡£4Ô£¬LockBitÈÔά³Ôìäµ±ÏȵÄְ룬Ëü»¹¿ª·¢³öÁËmacOS±äÌå¡£Æä´ÎÊÇALPHV¡¢BianLianºÍRoyal¡£Êܵ½ÀÕË÷¹¥»÷×î¶àµÄ¹ú¶ÈÊÇÃÀ¹ú£¨Õ¼±È48%£©£¬Æä´ÎÊǼÓÄôó£¨5%£©ºÍµÂ¹ú£¨4%£©µÈ¡£ÊÜ´ËÀ๥»÷Ó°Ïì×îÑϳÁµÄÊÇ·þÎñÒµ£¬Æä´ÎÊÇÒ½ÁƱ£½¡ºÍ¹«ÓÃÉèÊ©¡£4Ô·ݳöÏÖ¼¸¸öеÄÀÕË÷Èí¼þ£¬±ðÀëΪAkira¡¢CrossLock¡¢Trigona¡¢Dunghill LeakºÍMoney Message¡£
https://www.malwarebytes.com/blog/threat-intelligence/2023/05/ransomware-review-may-2023


¾©¹«Íø°²±¸11010802024551ºÅ