Ó¢ÌØ¶ûÊÓ²ìMSIÎó²îµ¼ÖµÄBoot Guard˽Կй¶ÊÂÎñ

Ðû²¼Ê±¼ä 2023-05-10

1¡¢Ó¢ÌضûÊÓ²ìMSIÎó²îµ¼ÖµÄBoot Guard˽Կй¶ÊÂÎñ


¾ÝýÌå5ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬Ó¢ÌضûÕýÔÚÊÓ²ìÆäBoot GuardÇå¾²¹¦Ð§Ê¹ÓõÄ˽ԿµÄй¶ÊÂÎñ¡£¡£¡£3Ô£¬£¬£¬£¬£¬£¬ £¬Money MessageÍŻ﹥»÷ÁËÅÌËã»úÓ²¼þÖÆÔìÉÌMSI£¬£¬£¬£¬£¬£¬ £¬Éù³ÆÒÑÇÔÈ¡1.5TBÊý¾Ý£¬£¬£¬£¬£¬£¬ £¬Éæ¼°¹Ì¼þ¡¢Ô´´úÂëºÍÊý¾Ý¿â¡£¡£¡£²¢ÀÕË÷400ÍòÃÀÔª£¬£¬£¬£¬£¬£¬ £¬ÔÚδÊÕµ½Êê½ðºó×îÏÈй¶MSIµÄÊý¾Ý¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬ £¬Ð¹Â¶µÄÔ´´úÂë°üÀ¨57¿îMSI²úÆ·µÄ¾µÏñÊðÃû˽ԿºÍ116¿îMSI²úÆ·µÄIntel Boot Guard˽Կ¡£¡£¡£Ó¢ÌضûÕýÔÚÆð¾¢ÊÓ²ì´ËÊ£¬£¬£¬£¬£¬£¬ £¬Ñо¿Ö°Ô±Í¸Â¶£¬£¬£¬£¬£¬£¬ £¬Õû¸öÓ¢ÌØ¶ûÉú̬ϵͳ¶¼Êܵ½ÁË´Ë´ÎMSIÊý¾Ýй¶µÄÓ°Ïì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/intel-investigating-leak-of-intel-boot-guard-private-keys-after-msi-breach/


2¡¢Î¢ÈíÐû²¼3Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬£¬ £¬ÐÞ¸´Á½¸öÒѱ»Ê¹ÓõÄÎó²î


5ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ £¬Î¢ÈíÐû²¼3Ô·ÝÖܶþ²¹¶¡£¬£¬£¬£¬£¬£¬ £¬ÐÞ¸´Á˰üÀ¨3¸ö0 dayÔÚÄÚµÄ38¸öÎó²î(²»°üÀ¨5ÔÂ5ÈÕÐÞ¸´µÄ11¸öMicrosoft EdgeÎó²î)¡£¡£¡£´Ë´ÎÐÞ¸´µÄ3¸ö0 dayÖУ¬£¬£¬£¬£¬£¬ £¬ÓÐÁ½¸öÔÚ¹¥»÷Öб»Ê¹Ó㬣¬£¬£¬£¬£¬ £¬ÁíÒ»¸öÒѹûÕæÅû¶¡£¡£¡£±»Ê¹ÓõÄÎó²îÊÇWin32kÄÚºËÇý¶¯³ÌÐòÖеÄÌáȨÎó²î£¨CVE-2023-29336£©ºÍÇå¾²Æô¶¯Çå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2023-24932£©£¬£¬£¬£¬£¬£¬ £¬ºóÕ߿ɱ»ÓÃÓÚ×°ÖÃBlackLotus UEFI bootkit¡£¡£¡£ÒѹûÕæÅû¶µÄÊÇWindows OLEµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-29325£©¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2023-patch-tuesday-fixes-3-zero-days-38-flaws/


3¡¢OT&P HealthcareÔâµ½¹¥»÷Ô¼10ÍòÃû»¼ÕßµÄÐÅϢй¶


¾Ý5ÔÂ8ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬ÖйúÏã¸ÛµÄÒ½ÁƱ£½¡¹«Ë¾OT&P HealthcareÔâµ½ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ £¬Ô¼10ÍòÃû»¼ÕßµÄÐÅϢй¶¡£¡£¡£¸Ã¹«Ë¾µÄIT²¿·ÖÔÚÉÏÖÜËÄ·¢Ã÷¡°ÏµÍ³²»Îȹ̡±µÄÎÊÌ⣬£¬£¬£¬£¬£¬ £¬ÊӲ췢Ã÷ÆäÔâµ½Á˹¥»÷£¬£¬£¬£¬£¬£¬ £¬²¢Á¬Ã¦¹Ø±ÕÁ˸Ãϵͳ¡£¡£¡£Ñо¿Ö°Ô±ÕýÔÚÆÀ¹À¹¥»÷µÄ¹æÄ££¬£¬£¬£¬£¬£¬ £¬Éв»È·¶¨Óм¸´ó¶¼¾Ý±»µÁ£¬£¬£¬£¬£¬£¬ £¬µ«Ò»Ð©»¼ÕßµÄÉí·ÝÖ¤ºÍ»¤ÕÕºÅÂë±»Öü±£´æÏµÍ³ÖС£¡£¡£´ÓÏÖÔÚ¹ûÕæµÄÐÅÏ¢À´¿´£¬£¬£¬£¬£¬£¬ £¬»¹²»ÇåÎúÕâÊÇ·ñΪÀÕË÷Èí»÷£¬£¬£¬£¬£¬£¬ £¬ÓÉÓÚûÓÐÌá¼°ÈκÎÒªÇ󡣡£¡£


https://www.databreaches.net/hk-personal-data-medical-history-of-100000-otp-healthcare-patients-may-have-been-compromised-in-cyberattack/


4¡¢Ó¢¹úCapita¹«Ë¾AWS´æ´¢Í°ÉèÖùýʧй¶655 GBÊý¾Ý


ýÌå5ÔÂ5Èճƣ¬£¬£¬£¬£¬£¬ £¬Ó¢ÍâÑó°ü¹«Ë¾CapitaµÄAWS´æ´¢Í°×Ô2016ÄêÒÔÀ´Ò»Ö±Ì»Â¶ÔÚÍøÉÏ£¬£¬£¬£¬£¬£¬ £¬ÆäÖаüÀ¨Ô¼3000¸öÎļþ£¬£¬£¬£¬£¬£¬ £¬×ܾÞϸΪ655 GB¡£¡£¡£ÕâЩÊý¾Ý°üÀ¨Èí¼þÎļþ¡¢Ð§ÀÍÆ÷ͼÏñ¡¢´ó×ÚExcel±í¸ñ¡¢PowerPointÎļþºÍÎı¾Îļþ£¬£¬£¬£¬£¬£¬ £¬ÆäÖÐÒ»¸öÎı¾°üÀ¨CapitaÒ»¸öϵͳµÄµÇ¼ÐÅÏ¢¡£¡£¡£´æ´¢Í°ÉÏûÓÐÃÜÂ룬£¬£¬£¬£¬£¬ £¬ÈκÎÖªµÀºÍ²Âµ½ÍøÖ·µÄÈ˶¼¿ÉÒÔ»á¼ûÕâЩÎļþ£¬£¬£¬£¬£¬£¬ £¬GrayHatWarfareÒ²²¶»ñÁ˸ÃÔÆÐ§ÀÍÆ÷µÄÏêϸÐÅÏ¢¾ÝϤ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ £¬CapitaÒѽ«ÕâЩÊý¾Ý±£»£»£»£»£» £»£»£»¤ÆðÀ´¡£¡£¡£


https://candid.technology/capita-database-exposed-since-2016/


5¡¢Î¢Èí·¢Ã÷¶à¸öºÚ¿ÍÍÅ»ïʹÓÃPapercutÎó²îµÄ¹¥»÷»î¶¯


ýÌå5ÔÂ9ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ £¬Î¢Èí·¢Ã÷ÓëÒÁÀÊÓйصÄÍÅ»ïMango SandstormºÍMint SandstormʹÓÃPaperCut MF/NGÖÐÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£ÕâÊÇÒ»¸ö»á¼û¿ØÖƲ»µ±Îó²î£¨CVE-2023-27350£©£¬£¬£¬£¬£¬£¬ £¬¿ÉÓÃÀ´ÈƹýÉí·ÝÑéÖ¤²¢ÔÚSYSTEMÖÐÖ´ÐдúÂë¡£¡£¡£ÆäÖÐMint SandstormµÄʹÓÃ»î¶¯ËÆºõÊÇʱ»úÖ÷ÒåµÄ£¬£¬£¬£¬£¬£¬ £¬Ó°ÏìÁ˸÷¸öÐÐÒµºÍµØÇøµÄ×éÖ¯¡£¡£¡£Mango SandstormµÄʹÓûÈÔÈ»ºÜµÍ£¬£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßʹÓÃÏÈǰÈëÇֵŤ¾ßÅþÁ¬µ½ËûÃǵÄC2»ù´¡ÉèÊ©¡£¡£¡£


https://securityaffairs.com/145952/apt/iranian-apt-papercut-exploitation.html


6¡¢MalwarebyteÐû²¼4Ô·ÝÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ


5ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬ £¬MalwarebyteÐû²¼Á˹ØÓÚ4Ô·ÝÀÕË÷Èí¼þÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£4Ô£¬£¬£¬£¬£¬£¬ £¬LockBitÈÔ¼á³ÖÆäÁìÏȵÄְ룬£¬£¬£¬£¬£¬ £¬Ëü»¹¿ª·¢³öÁËmacOS±äÌå¡£¡£¡£Æä´ÎÊÇALPHV¡¢BianLianºÍRoyal¡£¡£¡£Êܵ½ÀÕË÷¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÃÀ¹ú£¨Õ¼±È48%£©£¬£¬£¬£¬£¬£¬ £¬Æä´ÎÊǼÓÄôó£¨5%£©ºÍµÂ¹ú£¨4%£©µÈ¡£¡£¡£ÊÜ´ËÀ๥»÷Ó°Ïì×îÑÏÖØµÄÊÇЧÀÍÒµ£¬£¬£¬£¬£¬£¬ £¬Æä´ÎÊÇÒ½ÁƱ£½¡ºÍ¹«ÓÃÉèÊ©¡£¡£¡£4Ô·ݷºÆð¼¸¸öеÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬ £¬»®·ÖΪAkira¡¢CrossLock¡¢Trigona¡¢Dunghill LeakºÍMoney Message¡£¡£¡£


https://www.malwarebytes.com/blog/threat-intelligence/2023/05/ransomware-review-may-2023