¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶
Ðû²¼Ê±¼ä 2023-08-071¡¢¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿·ÖÔâµ½ÀÕË÷¹¥»÷´ó×ÚÊý¾Ýй¶
¾Ý8ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬ÃÀ¹ú¿ÆÂÞÀ¶àÖݸߵȽÌÓý²¿·Ö(CDHE)Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬µ¼ÖÂÁËÒ»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£CDHEÓÚ6ÔÂ19ÈÕÒâʶµ½ÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬¹¥»÷ÕßÔÚ6ÔÂ11ÈÕÖÁ6ÔÂ19ÈÕ»á¼ûÁËCDHEµÄϵͳ£¬£¬£¬£¬²¢´Ó¸ÃϵͳÖÐÇÔÈ¡ÁË2004ÄêÖÁ2020ÄêµÄÊý¾Ý¡£¡£¡£¡£¡£¡£CDHEûÓÐ͸¶Óм¸¶àÈËÊܵ½Ó°Ï죬£¬£¬£¬µ«ÓÉÓÚÎ¥¹æµÄʱ¼ä¿ç¶È´Ó2004Äêµ½2020Ä꣬£¬£¬£¬¿ÉÄÜÉæ¼°´ó×ÚѧÉúºÍÔ±¹¤¡£¡£¡£¡£¡£¡£CDHE½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩ24¸öÔµÄÉí·Ý͵ÇÔ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£
https://www.databreaches.net/massive-data-breach-could-impact-many-who-attended-or-worked-for-public-schools-in-colorado/
2¡¢Ñо¿Ö°Ô±ÑÝʾÔõÑùÔ½ÓüÌØË¹ÀÐÅÏ¢ÓéÀÖϵͳ²¢ÇÔÈ¡ÃÜÔ¿
¾ÝýÌå8ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬°ØÁÖ¹¤Òµ´óѧµÄÑо¿Ö°Ô±¿ª·¢ÁËÒ»ÖÖÒªÁ죬£¬£¬£¬¿ÉÒÔÔ½Óü×îÐÂÌØË¹À³µÐÍÖÐʹÓõĻùÓÚAMDµÄÐÅÏ¢ÓéÀÖϵͳ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¸Ã¹¥»÷»¹ÄÜ»ñÈ¡ÌØË¹ÀÔÚÆäЧÀÍÍøÂçÖÐÓÃÓÚÆû³µÑéÖ¤µÄΨһӲ¼þ°ó¶¨RSAÃÜÔ¿£¬£¬£¬£¬²¢Í¨¹ýµçѹ¹ÊÕϼ¤»îÈí¼þµÄËø¶¨¹¦Ð§£¬£¬£¬£¬Èç×ùÒμÓÈȵȸ¶·Ñ¹¦Ð§¡£¡£¡£¡£¡£¡£ÌØË¹ÀµÄÐÅÏ¢ÓéÀÖAPU»ùÓÚÒ×±»¹¥»÷µÄAMD Zen 1 CPU£¬£¬£¬£¬Òò´ËÑо¿Ö°Ô±¿ÉÒÔʵÑéʹÓÃ֮ǰ·¢Ã÷µÄÎó²îʵÏÖÔ½Óü¡£¡£¡£¡£¡£¡£¹¥»÷µÄϸ½Ú½«ÓÚ8ÔÂ9ÈÕ¾ÙÐеÄBlackHat 2023Ñݽ²ÖйûÕæ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets/
3¡¢AhnLab·¢Ã÷Õë¶Ôº«¹úµÄLinux¶ñÒâÈí¼þReptile Rootkit
ýÌå8ÔÂ5Èճƣ¬£¬£¬£¬AhnLab·¢Ã÷ʹÓÃReptileÕë¶Ôº«¹úµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£ReptileÊÇÒ»¸öÕë¶ÔLinuxϵͳµÄ¿ªÔ´ÄÚºËÄ£¿£¿£¿£¿£¿£¿£¿£¿éRootkit£¬£¬£¬£¬¿ÉÔÚGitHubÉÏ»ñÈ¡£¬£¬£¬£¬ÓëÆäËüRootkit²î±ð£¬£¬£¬£¬Ëü»¹Ìṩ·´Ïòshell¡£¡£¡£¡£¡£¡£ËüÖ§³Ö¶Ë¿ÚÇÃÃÅ£¨Port Knocking£©£¬£¬£¬£¬ÔÚ±»Ñ¬È¾ÏµÍ³ÉÏ·¿ªÌض¨¶Ë¿Ú£¬£¬£¬£¬²¢ÆÚ´ý¹¥»÷Õß·¢Ë͵ÄMagic PacketÀ´½¨ÉèC2ÅþÁ¬¡£¡£¡£¡£¡£¡£×Ô2022ÄêÒÔÀ´£¬£¬£¬£¬ÖÁÉÙÓÐ4¸ö²î±ðµÄ»î¶¯Ê¹ÓÃÁËReptile¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ÓÉÓÚ´úÂ뿪Դ£¬£¬£¬£¬ReptileºÜÈÝÒ×±»ÖÖÖÖ¹¥»÷ÍÅ»ïʹÓᣡ£¡£¡£¡£¡£
https://securityaffairs.com/149203/malware/reptile-rootkit-south-korea.html
4¡¢PaperCutÐÞ¸´NG/MF´òÓ¡ÖÎÀíÈí¼þÎó²îCVE-2023-39143
8ÔÂ5ÈÕ±¨µÀ³Æ£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚWindows°æ±¾PaperCut´òÓ¡ÖÎÀíÈí¼þÖз¢Ã÷ÁËÒ»¸öеÄÎó²î£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£ÕâÊÇÒ»¸ö·¾¶±éÀúÎó²î£¨CVE-2023-39143£©£¬£¬£¬£¬¿É¶ÁÈ¡¡¢É¾³ýºÍÉÏ´«í§ÒâÎļþ£¬£¬£¬£¬Ó°ÏìÁËPaperCut NG/MF 22.1.3֮ǰµÄ°æ±¾¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬¸ÃÎó²îÖ»Ó°ÏìÍⲿװ±¸¼¯³ÉÉèÖÃÒÑÇл»µÄ·ÇĬÈÏÉèÖõÄЧÀÍÆ÷£¬£¬£¬£¬µ«´ó´ó¶¼Windows PaperCutЧÀÍÆ÷¶¼ÆôÓÃÁ˸ù¦Ð§¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2023/08/researchers-uncover-new-high-severity.html
5¡¢CBIZ¹«Ë¾±»ºÚµ¼ÖÂÃÀ¹úÕþ¸®³Ð°üÉÌSercoÉÏÍòÈËÐÅϢй¶
ýÌå8ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬Íâ°ü¹«Ë¾Serco GroupµÄÃÀÖÞ·Ö¹«Ë¾Serco IncÅû¶ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Éæ¼°10000¶àÈ˵ÄÐÅÏ¢¡£¡£¡£¡£¡£¡£SercoµÄ¿Í»§°üÀ¨ÃÀ¹úÁìÍÁÇå¾²²¿¡¢Ë¾·¨²¿¡¢¹úÎñÔº¡¢ÃÀ¹úÇ鱨»ú¹¹ºÍ¶à¸öÎä×°²½¶Ó£¬£¬£¬£¬2022ÄêÊÕÈ볬57ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£Ð¹Â¶Ô´ÓÚÆä¸£ÀûÖÎÀíÌṩÉÌCBIZµÄMoveITÍйÜÎļþ´«Êä(MFT)ЧÀÍÆ÷Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ5Ô·ݣ¬£¬£¬£¬CBIZÔÚ6ÔÂ5ÈÕ½ÓÄɲ½·¥»º½â¸ÃÊÂÎñ£¬£¬£¬£¬SercoÓÚ6ÔÂ30ÈÕ»ñϤ´Ë´Î¹¥»÷ºÍй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-govt-contractor-serco-discloses-data-breach-after-moveit-attacks/
6¡¢Trend MicroÐû²¼½üÆÚBatloader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
8ÔÂ7ÈÕ£¬£¬£¬£¬Trend MicroÐû²¼Á˹ØÓÚ½üÆÚBatloader¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬Batloader±³ºóµÄºÚ¿Í£¨ÃüÃûΪWater Minyades£©ÒÑ×îÏÈʹÓà Pyarmor ProÀ´»ìÏýÆäÖ÷Òª¶ñÒâPython¾ç±¾¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2022Äê12ÔÂÒÔÀ´Ò»Ö±ÔÚʹÓÃPyarmor£¬£¬£¬£¬µ«Ö®Ç°Ê¹ÓõÄÊÇPyarmor±ê×¼°æ±¾¡£¡£¡£¡£¡£¡£³ýÁËÈÆ¹ýÊÖÒÕÖ®Í⣬£¬£¬£¬Batloader»¹Ê¹ÓÃÖÖÖÖ·½·¨À´ÔöÌí¼ì²âµÄÄѶȣ¬£¬£¬£¬ÆäÖÐÖ®Ò»ÊÇʹÓôóÐÍMSIÎļþ×÷Ϊ´«Ê乤¾ß¡£¡£¡£¡£¡£¡£
https://www.trendmicro.com/en_us/research/23/h/batloader-campaigns-use-pyarmor-pro-for-evasion.html


¾©¹«Íø°²±¸11010802024551ºÅ