Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷£¬£¬£¬Ó°ÏìZen¼Ü¹¹£»£»£»£»£»£»ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔÕþ¸®ÉñÃØÈí¼þºÍÊý¾Ý

Ðû²¼Ê±¼ä 2020-03-09

1.Á½ÖÖеÄAMD²àÐŵÀ¹¥»÷£¬£¬£¬Ó°ÏìZen¼Ü¹¹


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¸ñÀ­´ÄÊÖÒÕ´óѧÐû²¼µÄһƪÐÂÂÛÎÄÏêϸÏÈÈÝÁËÁ½ÖÖеÄAMD CPU²àÐŵÀ¹¥»÷£¬£¬£¬¼´Collide+ProbeºÍLoad+Reload¹¥»÷£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýʹÓÃL1D»º´æÕ¹Íû±äÁ¿À´×ß©AMD´¦Öóͷ£Æ÷µÄÉñÃØÊý¾Ý¡£¡£¡£Ñо¿Ö°Ô±³Æ¸ÃÎó²îÓ°ÏìÁË´Ó2011Äêµ½2019ÄêµÄËùÓÐAMD´¦Öóͷ£Æ÷£¬£¬£¬ÕâÒâζ×ÅZen¼Ü¹¹Ò»¨Üµ½Ó°Ïì¡£¡£¡£¸Ã´óѧÌåÏÖËüÒÑÓÚ2019Äê8ÔÂ23ÈÕÏòAMDÅû¶ÁËÕâЩÎó²î£¬£¬£¬µ«AMDÉÐδÐû²¼Î¢´úÂë¸üУ¬£¬£¬²¢³ÆÕâЩ¹¥»÷²¢²»ÊÇеĻùÓÚÍÆ²âµÄ¹¥»÷¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/


2.¹¥»÷ÕßʹÓÃÓâÆÚÖ¤ÊéÈö²¥¶ñÒâÈí¼þBuerakºÍMokes


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷Ò»ÖÖÐµĹ¥»÷ÒªÁ죬£¬£¬¹¥»÷Õßαװ³ÉÓâÆÚµÄÇå¾²Ö¤ÊéÀ´Èö²¥BuerakºÍMokes¡£¡£¡£ÔÚÊÜѬȾµÄÍøÕ¾ÉÏ£¬£¬£¬¹¥»÷ÕßÏÔʾһ¸öÖÒÑÔ¸ÃÍøÕ¾µÄÇå¾²Ö¤ÊéÒѾ­ÓâÆÚµÄ֪ͨ£¬£¬£¬µ«¸Ãֻ֪ͨÊÇÒ»¸öÁýÕÖÔÚÍøÒ³ÉϵÄiframe£¨µØµãÀ¸ÈÔÏÔʾÕýµ±µÄµØµã£©¡£¡£¡£µ±Óû§µã»÷֪ͨÉϵġ°×°Öá±°´Å¥Ê±£¬£¬£¬½«ÏÂÔØCertificate_Update_v02.2020.exeÎļþ£¬£¬£¬¸ÃÎļþÏÖʵÉÏÊÇBuerak»òMokes¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2020Äê1ÔÂÖÐÑ®·¢Ã÷ÁËÕâЩÊÜѬȾµÄÍøÕ¾£¬£¬£¬Êܺ¦Õß°üÀ¨¶¯ÎïÔ°ºÍÆû³µÅä¼þ¹©Ó¦ÉÌ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.tripwire.com/state-of-security/security-data-protection/expired-certificates-used-as-disguise-to-spread-buerak-mokes-malware/


3.APT×é֯ʹÓÃCVE-2020-0688¹¥»÷ExchangeЧÀÍÆ÷


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¾ÝZDNet±¨µÀ£¬£¬£¬¶à¸öÓÉÕþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯ÕýÔÚʹÓÃCVE-2020-0688À´½ÓÊÜExchangeµç×ÓÓʼþЧÀÍÆ÷¡£¡£¡£¹¥»÷ʵÑé×îÔçÊÇÓÉÓ¢¹úÍøÂçÇå¾²¹«Ë¾VolexityÓÚÉÏÖÜÎå·¢Ã÷µÄ£¬£¬£¬²¢±»¹ú·À²¿µÄÐÂÎÅÈËʿȷÈÏ¡£¡£¡£VolexityûÓйûÕæÊ¹ÓøÃÎó²îµÄAPT×éÖ¯µÄÃû³Æ¡£¡£¡£CVE-2020-0688ÊÇ΢ÈíÔÚ2ÔÂÇå¾²¸üÐÂÖÐÐÞ¸´µÄÒ»¸öÎó²î£¬£¬£¬ExchangeЧÀÍÆ÷ÔÚ×°ÖÃʱ²¢Ã»ÓÐΪ¿ØÖÆÃæ°å½¨ÉèΨһµÄ¼ÓÃÜÃÜÔ¿£¬£¬£¬ÕâÒâζ׏¥»÷Õß¿ÉÒÔʹÓøÃÃÜÔ¿ºÍͨ¹ý·¢ËͶñÒâÇëÇóÔÚЧÀÍÆ÷ºó¶ËÒÔSYSTEMÌØÈ¨Ö´ÐжñÒâ´úÂë¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/multiple-nation-state-groups-are-hacking-microsoft-exchange-servers/


4.ÃÀ¹úDHSǰ¹ÙÔ±±»¿ØÍµÇÔÕþ¸®ÉñÃØÈí¼þºÍÊý¾Ý


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÃÀ¹ú˾·¨²¿Ö¸¿ØÃÀ¹úÁìÍÁÇå¾²²¿£¨DHS£©µÄǰÊðÀíÉó²é³¤ÇÔÈ¡Õþ¸®Èí¼þºÍÉñÃØÊý¾Ý¡£¡£¡£ÆðËßÊéÏÔʾ£¬£¬£¬²é¶û˹¡¤°®µÂ»ª×È£¨Charles K. Edwards£©ÔÚ2011ÄêÖÁ2013ÄêÔøÈÎDHSÊðÀíÉó²é³¤£¬£¬£¬ÔÚ2013Äê12ÔÂжÈιÙÖ°ºó£¬£¬£¬°®µÂ»ª×ÈÓëVenkataµÈÈ˼ÓÈëÁË´ÓÁìÍÁÇå¾²²¿Éó²é³¤°ì¹«ÊÒ£¨OIG£©ÇÔÈ¡ÉñÃØºÍרÓÐÈí¼þµÄÍýÏë¡£¡£¡£°®µÂ»ª×È»¹½¨ÉèÁË×Ô¼ºµÄ¹«Ë¾£¬£¬£¬²¢Ïëͨ¹ý¸Ã¹«Ë¾ÏòÃÀ¹úũҵ²¿µÄOIG³öÊÛ±»µÁDHS-OIGÈí¼þµÄÔöÇ¿°æÒÔIJȡ±©Àû¡£¡£¡£Ë¾·¨²¿»¹³Æ°®µÂ»ª×ȵÈÈË»¹ÇÔÈ¡ÁËÃô¸ÐµÄÕþ¸®Êý¾Ý¿â£¬£¬£¬ÆäÖаüÀ¨ÁìÍÁÇå¾²²¿ºÍÃÀ¹úÓÊÕþЧÀ;֣¨USPS£©Ô±¹¤µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/former-dhs-official-charged-with-theft-of-confidential-government-databases/


5.Ó¡¶ÈÐéαÊÖÒÕÖ§³Ö¹«Ë¾Õ©Æ­4ÍòÊܺ¦Õß׬Ǯ800ÍòÃÀÔª


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ó¡¶ÈÒ»Ãû´óѧÍËѧÉúAmit ChauhanÈÏ¿ÉʹÓÃÐéαÊÖÒÕÖ§³ÖÕ©Æ­¹«Ë¾´Ó4ÍòÃûÊܺ¦ÕßÊÖÖÐÆ­È¡ÁËÁè¼Ý800ÍòÃÀÔª¡£¡£¡£ChauhanÓÚ2019Äê1Ô½¨ÉèÁËÒ»¼ÒÐéαµÄÊÖÒÕÖ§³Öºô½ÐÖÐÐĹ«Ë¾TechSupport£¬£¬£¬¸Ã¹«Ë¾ÒªÇó×·ÇóÊÖÒÕÖ§³ÖµÄÊܺ¦ÕßÉÏÏß²¢µã»÷ÌØ¶¨µÄµ¯´°£¬£¬£¬´Ëʱ¶ñÒâÈí¼þ½«±»¼¤»î²¢ÇÔÈ¡Êܺ¦ÕߵIJÆÎñÊý¾Ý¡£¡£¡£Chauhan¼°Æäͬ»ïKumarÒѱ»¾¯·½¹ØÑº£¬£¬£¬²¢Æ¾Ö¤Ó¡¶ÈµÄ¡¶IT·¨°¸¡·±»ÆðËß¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/fake-tech-support-company-dupes-40k/


6.ÀÕË÷Èí¼þPwndLockerбäÖÖÍêÈ«×÷Ϊshellcode¿ª·¢


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Crypsis Group·¢Ã÷ÀÕË÷Èí¼þPwndLockerµÄÒ»¸öбäÖÖÍêÈ«×÷ΪShellcode¿ª·¢¡£¡£¡£Í¨³£¶ñÒâÈí¼þ×÷Õß½öÔÚÏÂÔØÆ÷ºÍÖ²Èë³ÌÐòÖÐʹÓÃshellcode£¬£¬£¬ÓÉÓÚ½¨ÉèºÍʵÏÖ´ËÀà´úÂë¿ÉÄܺÜÊÇÖØ´óÇÒºÄʱ¡£¡£¡£Crypsis GroupµÄ¸ß¼¶ÕÕÁÏMatt ThaxtonÌåÏÖ£¬£¬£¬PwndLockerʹÓÃshellcode£¨»òÓëλÖÃÎ޹صĴúÂ룩ʹËü³ÉΪ±ÈÆäËûÀÕË÷Èí¼þ¸üÖØ´ó¡¢¸üÄÑÒÔ·¢Ã÷µÄÀÕË÷Èí¼þ£¬£¬£¬ÕâÖÖ´úÂëͨ³£²»×¤ÁôÔÚ´ÅÅÌÉÏ£¬£¬£¬²¢ÇÒ¾­³£±»×¢Èëµ½ÆäËûÕýµ±Àú³ÌÖС£¡£¡£Thaxton³ÆÕâÊÇÊ׸öʹÓÃshellcode¿ª·¢µÄÀÕË÷Èí¼þ¡£¡£¡£PwndLocker»¹ÊµÏÖÁË×Ô½ç˵µÄ¼ÓÃÜËã·¨£¬£¬£¬µ«¸ÃËã·¨Ïà¶Ô½ÏÈõ£¬£¬£¬Çå¾²³§ÉÌEmsisoftÌåÏÖÒѾ­¿ª·¢³öPwndLockerµÄ½âÃÜÆ÷¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.darkreading.com/attacks-breaches/new-ransomware-variant-developed-entirely-as-shellcode/d/d-id/1337260