¸ßͨæçÁúоƬ¸ßΣÎó²î£¬£¬£¬ £¬£¬£¬£¬¿Éµ¼ÖÂ˽Կй¶£»£»£»£»DMSÔâGandCrab¹¥»÷£»£»£»£»ÍÚ¿óÈí¼þBeapy

Ðû²¼Ê±¼ä 2019-04-26
1.¸ßͨæçÁúоƬ¸ßΣÎó²î£¬£¬£¬ £¬£¬£¬£¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¸ßͨоƬ×é±£´æÒ»¸ö²àÐŵÀ¹¥»÷Îó²î£¬£¬£¬ £¬£¬£¬£¬¸ÃÎó²î£¨CVE-2018-11976£©¿ÉÔÊÐí¹¥»÷Õß´Ó¸ßͨоƬµÄQSEEÇå¾²ÇøÓòÖмìË÷¼ÓÃÜ˽Կ¡£¡£¡£¡£QSEEÊǸßͨоƬµÄ¿ÉÐÅÖ´ÐÐÇéÐΣ¨TEE£©£¬£¬£¬ £¬£¬£¬£¬ÀàËÆÓÚÓ¢ÌØ¶ûµÄSGX¡£¡£¡£¡£Æ¾Ö¤NCCÑо¿Ö°Ô±Keegan RyanµÄ±íÊö£¬£¬£¬ £¬£¬£¬£¬¸ßͨоƬµÄ¼ÓÃÜÊðÃûËã·¨ECDSA£¨ÍÖÔ²ÇúÏßËã·¨£©±£´æÎó²î£¬£¬£¬ £¬£¬£¬£¬¿Éͨ¹ýËæ»úÊýµÄһЩbitÍÆ²â³ö256λECDSAÃÜÔ¿¡£¡£¡£¡£¸ÃÎó²îµÄʹÓÃÐèҪװ±¸µÄrootȨÏÞ¡£¡£¡£¡£ÓÐ46¿î¸ßͨоƬ×éÊܵ½Ó°Ï죬£¬£¬ £¬£¬£¬£¬°üÀ¨¶à¿îæçÁúоƬ¡£¡£¡£¡£¸ÃÎó²îµÄÐÞ¸´²¹¶¡ÒѾ­°üÀ¨ÔÚGoogleÐû²¼µÄ4ÔÂAndroidÇå¾²¸üÐÂÖС£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/security-flaw-lets-attackers-recover-private-keys-from-qualcomm-chips/

2.DMSÔâGandCrab¹¥»÷£¬£¬£¬ £¬£¬£¬£¬Ô¼38¸öÒ½ÁÆÖÐÐĵÄÊý¾ÝÊÜÓ°Ïì

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ò½ÁÆÕ˵¥Ð§ÀÍÌṩÉÌDoctors¡¯ Management Service£¨DMS£©Ôâµ½ÀÕË÷Èí¼þGandCrab¹¥»÷£¬£¬£¬ £¬£¬£¬£¬½ü38¸öÒ½ÁÆÖÐÐĵϼÕßÊý¾ÝÊܵ½Ó°Ï죬£¬£¬ £¬£¬£¬£¬°üÀ¨±´¸¥ÀûÍâ¿ÆÐ­»á¡¢ÐÂÓ¢¸ñÀ¼Éñ¾­Ñо¿Ëù¡¢ÐÂÓ¢¸ñÀ¼ÉçÇøÒ½ÁÆÐ§À͵ȡ£¡£¡£¡£ÊÜËðÊý¾Ý°üÀ¨»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬ £¬£¬£¬£¬ÀýÈçÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢°ü¹Ü¡¢Ò½Áưü¹Ü/Ò½ÁƽòÌùÐÅÏ¢µÈ¡£¡£¡£¡£ÊÓ²ìЧ¹ûÅú×¢¶ÔDMSÍøÂçµÄ³õʼδÊÚȨ»á¼û±¬·¢ÔÚ2017Äê4ÔÂ1ÈÕ£¬£¬£¬ £¬£¬£¬£¬Í¨¹ýDMSÊÂÇéÕ¾ÉϵÄRDPЭÒé¾ÙÐÐÈëÇÖ¡£¡£¡£¡£DMSÒÑ´Ó±¸·ÝÖлָ´ÁËÊý¾Ý£¬£¬£¬ £¬£¬£¬£¬ÎÞÐèÖ§¸¶Êê½ð¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/doctors-management-service-hit-with-gandcrab-ransomware-attack-compromising-patient-data-b6eebd02

3.Å·ÖÞÖÆÔìÉÌAebi SchmidtÔâδ֪ÀÕË÷Èí¼þ¹¥»÷

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

ÈðÊ¿ÊÐÕþºÍũҵ»úÐµÖÆÔìÉÌAebi Schmidt³ÉΪÀÕË÷Èí¼þ¹¥»÷µÄ×îÐÂÊܺ¦Õß¡£¡£¡£¡£¾ÝTechCrunch±¨µÀ£¬£¬£¬ £¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÑÏÖØÓ°ÏìÁËAebi SchmidtµÄÅ·ÖÞ»ùµØ£¬£¬£¬ £¬£¬£¬£¬µ¼ÖÂÐí¶àϵͳÎÞ·¨ÔËÐУ¬£¬£¬ £¬£¬£¬£¬°üÀ¨Ïà¹ØÖÆÔìӪҵϵͳ¡£¡£¡£¡£¸Ã¹«Ë¾µÄµç×ÓÓʼþЧÀÍÒ²Êܵ½Ó°Ï죬£¬£¬ £¬£¬£¬£¬²¿·ÖÔ±¹¤±»ÆÈ×îÏÈÐÝÎÞн¼Ù¡£¡£¡£¡£Aebi Schmidt³Æ¹¥»÷µÄÔµ¹ÊÔ­ÓÉÈÔδȷ¶¨¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/unknown-ransomware-cripples-computer-systems-of-aebi-schmidt-ffa880fb

4.жñÒâÍÚ¿óÈí¼þBeapy£¬£¬£¬ £¬£¬£¬£¬ÒÑѬȾÁè¼Ý1.2Íò¸öÓû§

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÈüÃÅÌú¿ËÑо¿Ö°Ô±·¢Ã÷жñÒâÍÚ¿óÈí¼þBeapyµÄ¹¥»÷»î¶¯ÔÚ½üÆÚì­Éý¡£¡£¡£¡£BeapyÊ״ηºÆðÓÚ1Ô·Ý£¬£¬£¬ £¬£¬£¬£¬×ÔÈýÔ·ÝÒÔÀ´ÒѾ­ÔÚ732¸öÆóÒµÖÐÒý·¢ÁËÁè¼Ý1.2ÍòÆðѬȾÊÂÎñ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý´¹ÂÚÓʼþÈö²¥£¬£¬£¬ £¬£¬£¬£¬Ò»µ©Êܺ¦Õß·­¿ª¶ñÒ⸽¼þ£¬£¬£¬ £¬£¬£¬£¬¶ñÒ⸽¼þ¾Í»áÊÍ·ÅNSAºÚ¿Í¹¤¾ßDoublePulsar£¬£¬£¬ £¬£¬£¬£¬ÔÚÊÜѬȾµÄÅÌËã»úÉϽ¨ÉèºóÃŲ¢Ê¹ÓÃNSAµÄEternalBlueÎó²îʹÓúáÏòÈö²¥¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÁè¼Ý80£¥µÄBeapyѬȾ¶¼±¬·¢ÔÚÖйú¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2019/04/25/cryptojacking-nsa-malware/

5.¹¥»÷ÕßÀÄÓÃGitHubЧÀÍÍйÜÍøÂç´¹ÂÚ¹¤¾ß°ü


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ProofpointÑо¿ÍŶӷ¢Ã÷¶ñÒâ¹¥»÷ÕßÀÄÓÃGitHubµÄÍøÒ³¼Ä´æÐ§ÀÍÀ´ÍйÜÍøÂç´¹ÂÚ¹¤¾ß°ü¡£¡£¡£¡£ÕâÖÖÒªÁìʹµÃ¹¥»÷Õß¿ÉÒÔʹÓÃgithub.ioÓòÃûÈÆ¹ý°×Ãûµ¥µÈ·ÀÓù²½·¥¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÕâЩ´¹ÂÚ¹¤¾ß°ü´ó´ó¶¼ÓÃÓÚÍøÂçÊܺ¦Õߵį¾Ö¤£¨ÀýÈçÒøÐÐÕË»§Æ¾Ö¤£©µÈÃô¸ÐÐÅÏ¢²¢·¢ËÍÖÁ¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£¡£GitHubÒÑÔÚ4ÔÂ19ÈÕ½ÓÄɲ½·¥½ûÓÃÁËÕâЩ¶ñÒâÕË»§¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/github-service-abused-by-attackers-to-host-phishing-kits/

6.TA505ʹÓÃLOLBinsºÍServHelperÃé×¼½ðÈÚ¹«Ë¾


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


CybereasonÑо¿Ö°Ô±·¢Ã÷·¸·¨ÍÅ»ïTA505µÄй¥»÷»î¶¯Ê¹ÓöàÖÖÓÕÆ­ÊÖÒÕÃé×¼½ðÈÚ»ú¹¹¡£¡£¡£¡£¸ÃÍÅ»ï½ÓÄÉÁ˶àÖÖÕ½ÂÔÀ´Ìӱܼì²â£¬£¬£¬ £¬£¬£¬£¬Ö÷ÒªÕë¶Ô½ðÈÚÆóÒµµÄÌØ¶¨ÕË»§¾ÙÐд¹ÂÚ¹¥»÷¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁ˶à¸öC2ÓòÃûÒÔÈÆ¹ýºÚÃûµ¥¼ì²â£¬£¬£¬ £¬£¬£¬£¬²¢ÔÚÄ¿µÄϵͳÉÏÊÍ·ÅServHelperºóÃÅ¡£¡£¡£¡£¸ÃServHelper±äÌåÒÀÀµÓÚËĸöLOLBinsºÍÍâµØÏµÍ³Àú³ÌʵÑé¶ñÒâ»î¶¯£¬£¬£¬ £¬£¬£¬£¬±ðµÄ£¬£¬£¬ £¬£¬£¬£¬ServHelper»¹Ê¹ÓÃÁËSectigo RSA Code Signing CAÊðÃûµÄÓÐÓÃÖ¤ÊéÀ´Ìӱܼì²â¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/ta505-group-uses-lolbins-and-servhelper-backdoor-to-compromise-financial-firms-00550f4d