Eclypsium·¢Ã÷3¸ö½Ó¿Ú¿ÉÈÆ¹ýUEFIµÄÇå¾²Ö¸µ¼¹¦Ð§

Ðû²¼Ê±¼ä 2022-08-15
1¡¢Eclypsium·¢Ã÷3¸ö½Ó¿Ú¿ÉÈÆ¹ýUEFIµÄÇå¾²Ö¸µ¼¹¦Ð§

      

¾Ý8ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬EclypsiumÔÚ3¸öµÚÈý·½Í³Ò»¿ÉÀ©Õ¹¹Ì¼þ½Ó¿Ú(UEFI)Ö¸µ¼¼ÓÔØ³ÌÐòÖз¢Ã÷ÁËÇå¾²¹¦Ð§ÈƹýÎó²î£¬£¬£¬£¬£¬¿ÉÓÃÀ´ÈƹýUEFIÇå¾²Ö¸µ¼¹¦Ð§¡£¡£¡£¡£¡£ÕâÊÇÓÉMicrosoftÊðÃûºÍÑéÖ¤µÄÌØ¶¨¹©Ó¦É̵ÄÖ¸µ¼¼ÓÔØ³ÌÐò£¬£¬£¬£¬£¬»®·ÖΪEurosoftÖ¸µ¼¼ÓÔØ³ÌÐò(CVE-2022-34301)¡¢New Horizon Data Systems IncÖ¸µ¼¼ÓÔØ³ÌÐò(CVE-2022-34302)ºÍCrypto ProÖ¸µ¼¼ÓÔØ³ÌÐò(CVE-20220-34303)¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÔÚÄ¿µÄÉϽ¨É賤ÆÚÐÔ£¬£¬£¬£¬£¬¶ø²»»áÓÉÓÚÖØÐÂ×°ÖÃϵͳ±»É¾³ý£¬£¬£¬£¬£¬Î¢ÈíÒÑͨ¹ýÉÏÖÜÐû²¼µÄÖܶþ²¹¶¡¾ÙÐÐÐÞ¸´¡£¡£¡£¡£¡£


https://thehackernews.com/2022/08/researchers-uncover-uefi-secure-boot.html


2¡¢¹È¸èÒòÍøÂçAndroidλÖÃÊý¾Ý±»°Ä´óÀûÑÇ·£¿£¿£¿£¿£¿î6000ÍòÃÀÔª

      

¾ÝýÌå8ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬¹È¸è±»°Ä´óÀûÑǾºÕùÓëÏûºÄÕßίԱ»á(ACCC)·£¿£¿£¿£¿£¿î6000ÍòÃÀÔª£¬£¬£¬£¬£¬ÓÉÓÚÆäÔÚ2017Äê1ÔÂÖÁ2018Äê12ÔÂÍøÂçºÍʹÓðĴóÀûÑÇAndroidÓû§µÄλÖÃÊý¾Ý¡£¡£¡£¡£¡£¸Ã»ú¹¹ÌåÏÖ£¬£¬£¬£¬£¬×ÝÈ»Óû§ÔÚ×°±¸ÉèÖÃÖнûÓÃÁËλÖÃÀúÊ·¼Í¼£¬£¬£¬£¬£¬µ«¹È¸èÈÔÔÚ¸ú×ÙÆäÓû§µÄAndroidÊÖ»ú¡£¡£¡£¡£¡£Óû§±»Îóµ¼²¢ÒÔΪ¸ÃÉèÖÿɽûÓÃλÖøú×Ù£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÁíÒ»¸öĬÈÏ·­¿ªµÄWeb & App ActivityÕÊ»§ÉèÖÿÉÓÃÀ´ÍøÂç¡¢´æ´¢ºÍʹÓÃСÎÒ˽¼ÒλÖÃÊý¾Ý¡£¡£¡£¡£¡£ACCCÔ¤¼Æ£¬£¬£¬£¬£¬ÓÐÁè¼Ý130Íò°Ä´óÀûÑÇסÃñµÄÊܵ½Ó°Ïì¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/google/google-fined-60-million-over-android-location-data-collection/


3¡¢KillnetÉù³Æ¶ÔLockheed MartinÔâµ½µÄDDoS¹¥»÷ÈÏÕæ

      

ýÌå8ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬ºÚ¿ÍÍÅ»ïKillnetÉù³Æ¶Ôº½¿Õº½ÌìºÍ¹ú·À¹«Ë¾Âå¿ËÏ£µÂÂí¶¡£¡£¡£¡£¡£¨Lockheed Martin£©Ôâµ½µÄDDoS¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¸ÃÍÅ»ï×Ô3ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬Ôø¶ÔÒâ´óÀû¡¢ÂÞÂíÄáÑÇ¡¢Ä¦¶û¶àÍß¡¢½Ý¿Ë¹²ºÍ¹ú¡¢Á¢ÌÕÍð¡¢Å²ÍþºÍÀ­ÍÑάÑǵȹú¼Ò¾ÙÐÐDDoS¹¥»÷¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ëü»¹ÔÚTelegramÉÏÐû²¼ÁËÒ»¶ÎÊÓÆµ£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡Á˸ù«Ë¾Ô±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëºÍÕÕÆ¬µÈ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Lockheed Martin²¢Î´¶Ô´ËÊÂ×ö³ö»Ø¸´¡£¡£¡£¡£¡£


https://securityaffairs.co/wordpress/134341/hacking/killnet-lockheed-martin.html


4¡¢Lucky Mouseͨ¹ýľÂí»¯MiMi·Ö·¢ºóÃÅrshellºÍHyperBro

      

¾ÝýÌå8ÔÂ13Èճƣ¬£¬£¬£¬£¬SEKOIAºÍTrend MicroÅû¶ÁËLucky MouseʹÓÃľÂí»¯¿çƽ̨¼´Ê±Í¨Ñ¶Ó¦ÓóÌÐòMiMi·Ö·¢ºóÃŵĻ¡£¡£¡£¡£¡£SEKOIA·¢Ã÷×Ô½ñÄê5ÔÂ26ÈÕ£¬£¬£¬£¬£¬¸ÃÓ¦ÓõÄmacOS°æ±¾2.3.0±»¸Ä¶¯²¢Ö²ÈëÁ˶ñÒâJavaScript´úÂ룬£¬£¬£¬£¬Õâ¿ÉÄÜÊǵÚÒ»¸öÊÜѬȾµÄmacOS±äÌå¡£¡£¡£¡£¡£TrendMicro·¢Ã÷ÁËʹÓÃrshellÕë¶ÔLinuxºÍʹÓÃHyperBroÕë¶ÔWindowsµÄ¾ÉµÄľÂí»¯MiMi£¬£¬£¬£¬£¬×îÔçµÄLinux rshellÑù±¾·ºÆðÔÚ2021Äê6Ô¡£¡£¡£¡£¡£


https://thehackernews.com/2022/08/chinese-hackers-backdoored-mimi-chat.html


5¡¢CISAºÍFBI¹ûÕæÀÕË÷Èí¼þZeppelinµÄTTPµÈÏêϸÐÅÏ¢

      

8ÔÂ11ÈÕ£¬£¬£¬£¬£¬CISAºÍFBIÐû²¼Á˹ØÓÚÀÕË÷Èí¼þZeppelinµÄÁªºÏÍøÂçÇå¾²×Éѯ(CSA)¡£¡£¡£¡£¡£ZeppelinÊÇ»ùÓÚDelphiµÄVega¶ñÒâÈí¼þ¼Ò×åµÄÑÜÉú²úÆ·£¬£¬£¬£¬£¬×÷ΪRaaS£¬£¬£¬£¬£¬´Ó2019Äêµ½2022Äê6Ô±»ÓÃÀ´¹¥»÷ÁË´ó×ÚµÄµÄÆóÒµºÍÒªº¦»ù´¡ÉèÊ©£¬£¬£¬£¬£¬°üÀ¨¹ú·À³Ð°üÉÌ¡¢½ÌÓý»ú¹¹¡¢ÖÆÔìÉ̺ÍÊÖÒÕ¹«Ë¾£¬£¬£¬£¬£¬ÌØÊâÊÇÒ½ÁÆÐÐÒµµÄ×éÖ¯¡£¡£¡£¡£¡£¸Ã×Éѯ»¹½ÒÆÆÁ˸ÃÀÕË÷Èí¼þµÄÕ½ÂÔ¡¢ÊÖÒպͳÌÐò(TTP)ÒÔ¼°Í×Эָ±ê(IOC)£¬£¬£¬£¬£¬À´×ÊÖúÇå¾²Ö°Ô±¼ì²âºÍ·ÀÓù´ËÀ๥»÷¡£¡£¡£¡£¡£


https://www.cisa.gov/uscert/ncas/alerts/aa22-223a


6¡¢ÂíÀ´Î÷ÑÇÖ§¸¶Íø¹ØÆ½Ì¨iPay88µÄÓû§Ö§¸¶¿¨ÐÅϢй¶

      

ýÌå8ÔÂ11Èճƣ¬£¬£¬£¬£¬ÂíÀ´Î÷ÑÇÖ§¸¶Íø¹ØÆ½Ì¨iPay88µÄÓû§µÄÖ§¸¶¿¨ÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¡£iPay88ÊÇÂíÀ´Î÷ÑÇ×î´óµÄÖ§¸¶Íø¹ØÆ½Ì¨Ö®Ò»£¬£¬£¬£¬£¬Îª¸ÃµØÇøµÄÖÚ¶àÉ̼ÒÌṩPOS½â¾ö¼Æ»®¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ðû²¼ÉùÃ÷³ÆÆäÔÚ5ÔÂ31ÈÕ·¢Ã÷ÁËй¶ÊÂÎñ²¢×îÏÈÊӲ죬£¬£¬£¬£¬×Ô7ÔÂ20ÈÕÒÔÀ´Ã»Óз¢Ã÷½øÒ»²½µÄ¿ÉÒɻ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÂíÀ´Î÷Ñǹú¼ÒÒøÐУ¨BNM£©ÒÑָʾ¸÷ÒøÐÐÁ¬Ã¦Í¨ÖªÊÜÓ°ÏìµÄ³Ö¿¨ÈË£¬£¬£¬£¬£¬ÒÔ½øÒ»²½±£»£»£»£»¤ËûÃÇÃâÔâÕ©Æ­»òδ¾­ÊÚȨµÄÉúÒâΣº¦¡£¡£¡£¡£¡£


https://soyacincau.com/2022/08/11/ipay88-cybersecurity-incident-card-data-compromised-xrs/