Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷£¬£¬£¬Ó°ÏìZen¼Ü¹¹£»£»£»£»£»£»ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔÕþ¸®ÉñÃØÈí¼þºÍÊý¾Ý
Ðû²¼Ê±¼ä 2020-03-091.Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷£¬£¬£¬Ó°ÏìZen¼Ü¹¹
¸ñÀ´ÄÊÖÒÕ´óѧÐû²¼µÄһƪÐÂÂÛÎÄÏêϸÏÈÈÝÁËÁ½ÖÖеÄAMD CPU²àÐŵÀ¹¥»÷£¬£¬£¬¼´Collide+ProbeºÍLoad+Reload¹¥»÷£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýʹÓÃL1D»º´æÕ¹Íû±äÁ¿À´×ß©AMD´¦Öóͷ£Æ÷µÄÉñÃØÊý¾Ý¡£¡£¡£Ñо¿Ö°Ô±³Æ¸ÃÎó²îÓ°ÏìÁË´Ó2011Äêµ½2019ÄêµÄËùÓÐAMD´¦Öóͷ£Æ÷£¬£¬£¬ÕâÒâζ×ÅZen¼Ü¹¹Ò»¨Üµ½Ó°Ïì¡£¡£¡£¸Ã´óѧÌåÏÖËüÒÑÓÚ2019Äê8ÔÂ23ÈÕÏòAMDÅû¶ÁËÕâЩÎó²î£¬£¬£¬µ«AMDÉÐδÐû²¼Î¢´úÂë¸üУ¬£¬£¬²¢³ÆÕâЩ¹¥»÷²¢²»ÊÇеĻùÓÚÍÆ²âµÄ¹¥»÷¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/
2.¹¥»÷ÕßʹÓÃÓâÆÚÖ¤ÊéÈö²¥¶ñÒâÈí¼þBuerakºÍMokes
¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»ÖÖÐµĹ¥»÷ÒªÁ죬£¬£¬¹¥»÷Õßαװ³ÉÓâÆÚµÄÇå¾²Ö¤ÊéÀ´Èö²¥BuerakºÍMokes¡£¡£¡£ÔÚÊÜѬȾµÄÍøÕ¾ÉÏ£¬£¬£¬¹¥»÷ÕßÏÔʾһ¸öÖÒÑÔ¸ÃÍøÕ¾µÄÇå¾²Ö¤ÊéÒѾÓâÆÚµÄ֪ͨ£¬£¬£¬µ«¸Ãֻ֪ͨÊÇÒ»¸öÁýÕÖÔÚÍøÒ³ÉϵÄiframe£¨µØµãÀ¸ÈÔÏÔʾÕýµ±µÄµØµã£©¡£¡£¡£µ±Óû§µã»÷֪ͨÉϵġ°×°Öá±°´Å¥Ê±£¬£¬£¬½«ÏÂÔØCertificate_Update_v02.2020.exeÎļþ£¬£¬£¬¸ÃÎļþÏÖʵÉÏÊÇBuerak»òMokes¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2020Äê1ÔÂÖÐÑ®·¢Ã÷ÁËÕâЩÊÜѬȾµÄÍøÕ¾£¬£¬£¬Êܺ¦Õß°üÀ¨¶¯ÎïÔ°ºÍÆû³µÅä¼þ¹©Ó¦ÉÌ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.tripwire.com/state-of-security/security-data-protection/expired-certificates-used-as-disguise-to-spread-buerak-mokes-malware/
3.APT×é֯ʹÓÃCVE-2020-0688¹¥»÷ExchangeЧÀÍÆ÷
¾ÝZDNet±¨µÀ£¬£¬£¬¶à¸öÓÉÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯ÕýÔÚʹÓÃCVE-2020-0688À´½ÓÊÜExchangeµç×ÓÓʼþЧÀÍÆ÷¡£¡£¡£¹¥»÷ʵÑé×îÔçÊÇÓÉÓ¢¹úÍøÂçÇå¾²¹«Ë¾VolexityÓÚÉÏÖÜÎå·¢Ã÷µÄ£¬£¬£¬²¢±»¹ú·À²¿µÄÐÂÎÅÈËʿȷÈÏ¡£¡£¡£VolexityûÓйûÕæÊ¹ÓøÃÎó²îµÄAPT×éÖ¯µÄÃû³Æ¡£¡£¡£CVE-2020-0688ÊÇ΢ÈíÔÚ2ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´µÄÒ»¸öÎó²î£¬£¬£¬ExchangeЧÀÍÆ÷ÔÚ×°ÖÃʱ²¢Ã»ÓÐΪ¿ØÖÆÃæ°å½¨ÉèΨһµÄ¼ÓÃÜÃÜÔ¿£¬£¬£¬ÕâÒâζ׏¥»÷Õß¿ÉÒÔʹÓøÃÃÜÔ¿ºÍͨ¹ý·¢ËͶñÒâÇëÇóÔÚЧÀÍÆ÷ºó¶ËÒÔSYSTEMÌØÈ¨Ö´ÐжñÒâ´úÂë¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/multiple-nation-state-groups-are-hacking-microsoft-exchange-servers/
4.ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔÕþ¸®ÉñÃØÈí¼þºÍÊý¾Ý
ÃÀ¹ú˾·¨²¿Ö¸¿ØÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©µÄǰÊðÀíÉó²é³¤ÇÔÈ¡Õþ¸®Èí¼þºÍÉñÃØÊý¾Ý¡£¡£¡£ÆðËßÊéÏÔʾ£¬£¬£¬²é¶û˹¡¤°®µÂ»ª×È£¨Charles K. Edwards£©ÔÚ2011ÄêÖÁ2013ÄêÔøÈÎDHSÊðÀíÉó²é³¤£¬£¬£¬ÔÚ2013Äê12ÔÂжÈιÙÖ°ºó£¬£¬£¬°®µÂ»ª×ÈÓëVenkataµÈÈ˼ÓÈëÁË´ÓÁìÍÁÇå¾²²¿Éó²é³¤°ì¹«ÊÒ£¨OIG£©ÇÔÈ¡ÉñÃØºÍרÓÐÈí¼þµÄÍýÏë¡£¡£¡£°®µÂ»ª×È»¹½¨ÉèÁË×Ô¼ºµÄ¹«Ë¾£¬£¬£¬²¢Ïëͨ¹ý¸Ã¹«Ë¾ÏòÃÀ¹úũҵ²¿µÄOIG³öÊÛ±»µÁDHS-OIGÈí¼þµÄÔöÇ¿°æÒÔIJȡ±©Àû¡£¡£¡£Ë¾·¨²¿»¹³Æ°®µÂ»ª×ȵÈÈË»¹ÇÔÈ¡ÁËÃô¸ÐµÄÕþ¸®Êý¾Ý¿â£¬£¬£¬ÆäÖаüÀ¨ÁìÍÁÇå¾²²¿ºÍÃÀ¹úÓÊÕþЧÀ;֣¨USPS£©Ô±¹¤µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/former-dhs-official-charged-with-theft-of-confidential-government-databases/
5.Ó¡¶ÈÐéαÊÖÒÕÖ§³Ö¹«Ë¾Õ©Æ4ÍòÊܺ¦Õß׬Ǯ800ÍòÃÀÔª
Ó¡¶ÈÒ»Ãû´óѧÍËѧÉúAmit ChauhanÈÏ¿ÉʹÓÃÐéαÊÖÒÕÖ§³Öթƹ«Ë¾´Ó4ÍòÃûÊܺ¦ÕßÊÖÖÐÆÈ¡ÁËÁè¼Ý800ÍòÃÀÔª¡£¡£¡£ChauhanÓÚ2019Äê1Ô½¨ÉèÁËÒ»¼ÒÐéαµÄÊÖÒÕÖ§³Öºô½ÐÖÐÐĹ«Ë¾TechSupport£¬£¬£¬¸Ã¹«Ë¾ÒªÇó×·ÇóÊÖÒÕÖ§³ÖµÄÊܺ¦ÕßÉÏÏß²¢µã»÷ÌØ¶¨µÄµ¯´°£¬£¬£¬´Ëʱ¶ñÒâÈí¼þ½«±»¼¤»î²¢ÇÔÈ¡Êܺ¦ÕߵIJÆÎñÊý¾Ý¡£¡£¡£Chauhan¼°Æäͬ»ïKumarÒѱ»¾¯·½¹ØÑº£¬£¬£¬²¢Æ¾Ö¤Ó¡¶ÈµÄ¡¶IT·¨°¸¡·±»ÆðËß¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/fake-tech-support-company-dupes-40k/
6.ÀÕË÷Èí¼þPwndLockerбäÖÖÍêÈ«×÷Ϊshellcode¿ª·¢
Crypsis Group·¢Ã÷ÀÕË÷Èí¼þPwndLockerµÄÒ»¸öбäÖÖÍêÈ«×÷ΪShellcode¿ª·¢¡£¡£¡£Í¨³£¶ñÒâÈí¼þ×÷Õß½öÔÚÏÂÔØÆ÷ºÍÖ²Èë³ÌÐòÖÐʹÓÃshellcode£¬£¬£¬ÓÉÓÚ½¨ÉèºÍʵÏÖ´ËÀà´úÂë¿ÉÄܺÜÊÇÖØ´óÇÒºÄʱ¡£¡£¡£Crypsis GroupµÄ¸ß¼¶ÕÕÁÏMatt ThaxtonÌåÏÖ£¬£¬£¬PwndLockerʹÓÃshellcode£¨»òÓëλÖÃÎ޹صĴúÂ룩ʹËü³ÉΪ±ÈÆäËûÀÕË÷Èí¼þ¸üÖØ´ó¡¢¸üÄÑÒÔ·¢Ã÷µÄÀÕË÷Èí¼þ£¬£¬£¬ÕâÖÖ´úÂëͨ³£²»×¤ÁôÔÚ´ÅÅÌÉÏ£¬£¬£¬²¢ÇÒ¾³£±»×¢Èëµ½ÆäËûÕýµ±Àú³ÌÖС£¡£¡£Thaxton³ÆÕâÊÇÊ׸öʹÓÃshellcode¿ª·¢µÄÀÕË÷Èí¼þ¡£¡£¡£PwndLocker»¹ÊµÏÖÁË×Ô½ç˵µÄ¼ÓÃÜËã·¨£¬£¬£¬µ«¸ÃËã·¨Ïà¶Ô½ÏÈõ£¬£¬£¬Çå¾²³§ÉÌEmsisoftÌåÏÖÒѾ¿ª·¢³öPwndLockerµÄ½âÃÜÆ÷¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/attacks-breaches/new-ransomware-variant-developed-entirely-as-shellcode/d/d-id/1337260


¾©¹«Íø°²±¸11010802024551ºÅ