Binarly·¢ÏÖÓ°ÏìUEFIÖÐͼÏñ½âÎö×é¼þµÄ·ì϶LogoFAIL
°ä²¼¹¦·ò 2023-12-04¾ÝýÌå11ÔÂ30ÈÕ±¨Â·£¬Binarly·¢ÏÖÁËͳ³ÆÎªLogoFAILµÄ¶à¸ö°²È«·ì϶£¬¿ÉÓ°Ïì¸÷¸ö¹©¸øÉ̵ÄUEFI´úÂëÖеÄͼÏñ½âÎö×é¼þ¡£×êÑÐÈËÔ±·¢ÏÖ£¬¹¥»÷ÕßÄܹ»½«¶ñÒâͼÏñ»òlogo´æ´¢ÔÚEFIϵͳ·ÖÇø(ESP)»ò¹Ì¼þ¸üеÄδÊðÃû²¿ÃÅÖС£ÒÔÕâÖÖ·½Ê½Ö²Èë¶ñÒâÈí¼þ¿ÉÈ·±£ÔÚϵͳÖгÖÐø´æÔÚ£¬ÏÕЩ²»»á±»·¢ÏÖ¡£BinarlyÒѾȷ¶¨Ó¢Ìضû¡¢ºê³ž¡¢åÚÏëºÍÆäËü¹©¸øÉ̵ÄÊý°Ù¸öÐͺſÉÄÜ´æÔÚ·ì϶£¬¶¨ÔìUEFI¹Ì¼þ´úÂëµÄÈý´ó¶ÀÁ¢ÌṩÉÌAMI¡¢InsydeºÍPhoenixÒ²ÊÇÈç´Ë¡£Ä¿Ç°£¬¸Ã·ì϶µÄ¾ßÌåÓ°ÏìÁìÓòÈÔÔÚÈ·¶¨ÖС£
https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/
2¡¢ÃÀ¹ú¹«Ë¾StaplesÔâµ½ÍøÂç¹¥»÷ÒµÎñÔËÓªÊܵ½Ó°Ïì
ýÌå11ÔÂ30Èճƣ¬ÃÀ¹ú°ì¹«ÓÃÆ·ÁãÊÛÉÌStaplesÔâµ½ÍøÂç¹¥»÷ºó¹Ø¹ØÁ˲¿ÃÅϵͳ¡£×ÔÉÏÖÜÒ»ÒÔÀ´£¬StaplesÓöµ½Á˸÷ÀàÄÚ²¿ÔËÓªÎÊÌ⣬Ô̺¬ÎÞ·¨½Ó¼ûZendesk¡¢VPNÔ±¹¤ÃÅ»§¡¢´òÓ¡µç×ÓÓʼþºÍʹÓõ绰Ïߵȡ£ÓÐÔ±¹¤³Æ£¬ËùÓж¼´¦ÓÚå´»ú״̬£¬ÔÚÃŵ깤×÷ÎÞ·¨½Ó¼ûµç×ÓÓʼþ¡¢bizfit¡¢pogsºÍµç×Ó·þÎñ̨¡£Staples°µÊ¾ËûÃÇÔÚ11ÔÂ27ÈÕ·¢ÏÖ¹¥»÷ºóµ±¼´²ÉÈ¡ÁËÏìÓ¦´ëÊ©£¬µ«Õâµ¼ÖÂÆäºó¶Ü´¦Öúͽ»¸¶ÒÔ¼°Í¨Ñ¶Çþ·ºÍ¿Í»§·þÎñÁÙʱÖжϡ£¾ÝϤ£¬Õâ´Î¹¥»÷ÖÐûÓÐ×°ÖÃÀÕË÷Èí¼þ£¬Ò²Ã»ÓÐÎļþ±»¼ÓÃÜ¡£
https://www.bleepingcomputer.com/news/security/staples-confirms-cyberattack-behind-service-outages-delivery-issues/
3¡¢Ô¼60¼ÒÐÅÓþºÏ×÷ÉçÒò¹©¸øÉ̱»ÀÕË÷¹¥»÷·þÎñÁÙʱÖжÏ
12ÔÂ2ÈÕ±¨Â·³Æ£¬ÔÆ·þÎñÌṩÉÌOngoing OperationsÔâµ½ÁËÀÕË÷¹¥»÷£¬Ëü´ÓÊôÓÚÐÅÓþÉç¼¼Êõ¹«Ë¾Trellance¡£¹ú¶ÈÐÅÓþÉçÖÎÀí¾Ö(NCUA)°µÊ¾£¬²¿ÃÅÐÅÓþÉçÊÕµ½ÁËÀ´×ÔOngoing OperationsµÄÐÅÏ¢£¬Ð¹Â©¸Ã¹«Ë¾ÔÚ11ÔÂ26ÈÕÔâµ½ÁËÀÕË÷¹¥»÷¡£Ä¿Ç°£¬µ÷²éÈÔÔÚ½øÐÐÖУ¬ÏÖÒÑÈ·ÈÏÔ¼60¼ÒÐÅÓþºÏ×÷ÉçÓÉÓÚµÚÈý·½·þÎñÌṩÉÌÔâµ½¹¥»÷£¬ÔÚ¾Àú¿Ï¶¨Ë®Æ½µÄ·þÎñÖжϡ£
https://therecord.media/credit-unions-facing-outages-due-to-ransomware
4¡¢Å²ÍþÀ͹¤ºÍ¸£ÀûÖÎÀí¾ÖÒòÊý¾Ýй¶±»·£¿î185ÍòÃÀÔª
¾Ý12ÔÂ3ÈÕ±¨Â·£¬Å²ÍþÀ͹¤ºÍ¸£ÀûÖÎÀí¾Ö(NAV)±»Å²Íþ¼à¹Ü¾Ö£¨Datatilsynet£©·£¿î170ÍòÅ·Ôª¡£Å²ÍþÊý¾Ý±£»¤¾ÖÔÚNAVµÄÉó¼ÆÖз¢ÏÖÁË12ÆðÎ¥·´Ó×ÎÒÊý¾Ý±£»¤ÌõÀýµÄÐÐΪ¡£×÷Ϊµ÷²éµÄÒ»²¿ÃÅ£¬DPA·¢ÏÖ½ÚÔìÕßδÄܲÉÈ¡Êʵ±µÄ¼¼ÊõºÍ×éÖ¯´ëÊ©À´±£»¤Ó×ÎÒÊý¾Ý£¬ÀýÈçITϵͳûÓеõ½³ä·ÖµÄ±£»¤¡£´Ë±í£¬¹ý¶àµÄÔ±¹¤Äܹ»½Ó¼ûÓ×ÎÒÊý¾Ý£¬ÔÚijЩÇé¿öÏÂÔ̺¬¼«¶ÈÃô¸ÐµÄÊý¾Ý¡£Í¬Ê±£¬½ÚÔìÕßδÄܶÔÔ±¹¤Ê¹ÓÃITϵͳ½øÐÐϵͳµÄ½ÚÔì¡£
https://www.databreaches.net/norwegian-labor-and-welfare-administration-fined-for-data-protection-failures/
5¡¢Unit 42Åû¶Õë¶ÔÖж«¡¢·ÇÖÞºÍÃÀ¹úµÈµØµÄ¹¥»÷»î¶¯
Unit 42ÔÚ12ÔÂ1ÈÕÅû¶ÁËкóÃÅAgent Raccoon£¬Ëü±»ÓÃÓÚÕë¶ÔÖж«¡¢·ÇÖÞºÍÃÀ¹úµÈµØµÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯ÖØÒªÕë¶Ô½ÌÓý¡¢·¿µØ²ú¡¢ÁãÊÛ¡¢·ÇͶ»ú×éÖ¯¡¢µçÐŹ«Ë¾ºÍµ±¾Ö»ú¹¹£¬¹¥»÷ÍŻﱻUnit 42×·×ÙΪCL-STA-0002¡£ºóÃÅÓÃ.NET¿ª·¢£¬²¢ÀûÓÃÓòÃû·þÎñ(DNS)ºÍ̸ÓëC2»ù´¡ÉèÊ©³ÉÁ¢Òñ±ÎµÄͨѶͨ·¡£Agent RaccoonÔÚÂŴι¥»÷ÖÐÓëÆäËüÁ½¸ö¹¤¾ß½áºÏʹÓã¬ÆäÖÐÒ»¸öÊÇÇÔÈ¡Óû§Í´´¦µÄNetwork Provider DLLÄ£¿éNtospy£¬ÁíÒ»¸öÊDZ»³ÆÎªMimiliteµÄ¶¨Ôì°æMimikatz¡£
https://unit42.paloaltonetworks.com/new-toolset-targets-middle-east-africa-usa/
6¡¢Kaspersky°ä²¼2023ÄêQ3 ITÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨
12ÔÂ1ÈÕ£¬Kaspersky°ä²¼ÁË2023ÄêµÚÈý¼¾¶ÈITÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£»ã±¨ÖÐÌá¼°µÄÓÐÕë¶ÔÐԵĹ¥»÷·ÖÎöÔ̺¬£ºÀûÓÃDroxiDatºÍCobalt Strike¹¥»÷ÄÜÔ´ÐÐÒµ¡¢ÀûÓÃCVE-2023-23397·ì϶µÄ¹¥»÷¡¢Õë¶Ô¹¤¿ØÐÐÒµµÄ¹¥»÷Öг£¼ûµÄTTPºÍαÔìµÄTelegramÀûÓõȡ£ÆäËü¶ñÒâÈí¼þÔ̺¬£ºÕë¶ÔLinuxµÄ¹©¸øÁ´¹¥»÷¡¢CubaÀÕË÷ÍŻй¶µÄLockbit 3¹¹½¨Æ÷¡¢²»ÐÝ·¢Õ¹µÄ¶ñÒâÈí¼þ¸ñ¾ÖÒÔ¼°cryptor¡¢stealerºÍbanking TrojanµÈ¡£
https://securelist.com/it-threat-evolution-q3-2023/111171/


¾©¹«Íø°²±¸11010802024551ºÅ