åÚÏëÐÞ¸´ÆäÌõ¼Ç±¾µÄUEFI¹Ì¼þÖÐÎó²î£¬£¬£¬£¬£¬£¬£¬Ó°Ïì70¶à¿îÐͺÅ
Ðû²¼Ê±¼ä 2022-07-14
¾Ý7ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬åÚÏëÐÞ¸´ÁËÆäÌõ¼Ç±¾µçÄÔµÄUEFI¹Ì¼þÖеÄÈý¸ö»º³åÇøÒç³öÎó²î¡£¡£¡£ÕâЩÎó²î»®·ÖΪReadyBootDxeÇý¶¯³ÌÐòÖеĻº³åÇøÒç³öÎó²î£¨CVE-2022-1890£©ÒÔ¼°SystemLoadDefaultDxeÇý¶¯³ÌÐòÖеĻº³åÇøÒç³ö£¨CVE-2022-1891ºÍCVE-2022-1892£©¡£¡£¡£ESETÑо¿Ö°Ô±Ú¹Êͳƣ¬£¬£¬£¬£¬£¬£¬ÕâЩÎó²îÊÇÓÉÓÚת´ï¸øUEFIÔËÐÐʱЧÀͺ¯ÊýGetVariableµÄDataSize²ÎÊýÑéÖ¤²»³ä·Öµ¼Öµģ¬£¬£¬£¬£¬£¬£¬¿É±»ÓÃÀ´ÔÚÆ½Ì¨Æô¶¯µÄÔçÆÚ½×¶ÎʵÏÖí§Òâ´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬²¢Ð®ÖƲÙ×÷ϵͳִÐÐÁ÷³ÌÒÔ¼°½ûÓÃһЩÖ÷ÒªµÄÇå¾²¹¦Ð§¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-uefi-firmware-flaws-impact-over-70-lenovo-laptop-models/
2¡¢Á¢ÌÕÍðÄÜÔ´¹«Ë¾Ignitis GroupÔâµ½´ó¹æÄ£DDoS¹¥»÷
¾ÝýÌå7ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Á¢ÌÕÍðÄÜÔ´¹«Ë¾Ignitis GroupÔâµ½Á˽üÊ®ÄêÀ´×î´ó¹æÄ£µÄÍøÂç¹¥»÷¡£¡£¡£ÉÏÖÜÁù£¬£¬£¬£¬£¬£¬£¬Õë¶Ô¸Ã¹«Ë¾µÄDDoS¹¥»÷µ¼ÖÂÆäÊý×ÖЧÀͺÍÍøÕ¾ÒòÖÐÖ¹¡£¡£¡£IgnitisÔÚ7ÔÂ9ÈÕ·¢Ìû£¬£¬£¬£¬£¬£¬£¬ËüÒѾÄܹ»ÖÎÀíºÍÏÞÖÆ¹¥»÷¶ÔÆäϵͳµÄÓ°Ï죬£¬£¬£¬£¬£¬£¬²¢ÇÒûÓз¢Ã÷ÈκÎÎ¥¹æÐÐΪ£¬£¬£¬£¬£¬£¬£¬È»¶ø£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÈÔÔÚ¾ÙÐÐÖС£¡£¡£ºÚ¿ÍÍÅ»ïKillnetÔÚÆäTelegramÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¶Ô´Ë´Î¹¥»÷ÊÂÎñÈÏÕæ¡£¡£¡£Á¢ÌÕÍð¹ú·À²¿¸±²¿³¤ÔÚ½ÒÏþ½²»°Ê±ÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬²»ÒªÌ«¹ý¹Ø×¢´ËÀàÍøÂç¹¥»÷¡£¡£¡£
https://www.infosecurity-magazine.com/news/lithuanian-energy-ddos-attack/
3¡¢È¥ÖÐÐÄ»¯ÉúÒâËùUniswapÔâµ½´¹ÂÚ¹¥»÷Ëðʧ800ÍòÃÀÔª
¾ÝCheck Point 7ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬È¥ÖÐÐÄ»¯¼ÓÃÜÇ®±ÒÉúÒâËùUniswapÔâµ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ëðʧ¸ß´ï800ÍòÃÀÔª£¨7500 ETH£©¡£¡£¡£¸ÃÊÂÎñÓÚÖÜÒ»Ê×´ÎÆØ¹â£¬£¬£¬£¬£¬£¬£¬BinanceµÄCEOÔÚTwitterÉÏ·¢Îijƣ¬£¬£¬£¬£¬£¬£¬ÔÚETHÇø¿éÁ´Éϼì²âµ½Uniswap V3µÄDZÔÚÎó²î¡£¡£¡£UniswapÊ×´´ÈËHayden Adams֤ʵÕâÊÇÒ»´Î´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÓëÐÒé×Ô¼ºÎ޹ء£¡£¡£¹¥»÷ÕßÏòUniswapÓû§¿ÕͶÁ˶ñÒâ´ú±Ò£¬£¬£¬£¬£¬£¬£¬½«ËûÃÇÓÕµ¼ÖÁÒ»¸ö´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬£¬£¬È»ºó´ÓÄ¿µÄµÄÇ®°üÖÐÇÔÈ¡×ʽ𡣡£¡£
https://blog.checkpoint.com/2022/07/12/8-million-dollars-stolen-in-a-uniswap-phishing-attack/
4¡¢Aerojet RocketdyneÒòÎ¥·´ÍøÂçÇå¾²¹æÔòÖ§¸¶900ÍòÃÀÔª
ýÌå7ÔÂ12Èճƣ¬£¬£¬£¬£¬£¬£¬º½¿Õº½ÌìºÍ¹ú·À¹«Ë¾Aerojet RocketdyneÒÑÔÞ³ÉÖ§¸¶900ÍòÃÀÔª£¬£¬£¬£¬£¬£¬£¬À´Ï¢Õù¹ØÓÚÆäÎ¥·´ÍøÂçÇå¾²¹æÔòµÄËßËÏ¡£¡£¡£¸Ã¹«Ë¾µÄǰԱ¹¤Æ¾Ö¤¡¶ÐéαË÷Åâ·¨¡·Ïò·¨ÔºÌáÆðËßËÏ£¬£¬£¬£¬£¬£¬£¬ÌåÏÖËûÔÚ¹«Ë¾µ£µ±ÍøÂçÇå¾²¡¢ºÏ¹æºÍ¿ØÖƸ߼¶×ܼàʱ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÊÐíÌṩ1000ÍòÖÁ1500ÍòÃÀÔªµÄÔ¤ËãÒÔ¼°5ÖÁ10ÃûÔ±¹¤ºÍ25Ãû³Ð°üÉÌ£¬£¬£¬£¬£¬£¬£¬ÒÔÌá¸ßÅÌËã»úÇå¾²ÐÔ¡£¡£¡£µ«ÊÂÇéʱ´ú£¬£¬£¬£¬£¬£¬£¬Ëû·¢Ã÷¸Ã¹«Ë¾Ã»ÓÐÖª×ãÓë¹ú·À²¿¡¢NASA»òÆäËüÕþ¸®»ú¹¹Ç©ÊðÌõÔ¼µÄÍøÂçÇå¾²ÒªÇ󡣡£¡£AerojetµÄ½²»°È˾ܾøÔÚÏ¢ÕùÐÒéÖÐÈÏ¿ÉÓÐ×£¬£¬£¬£¬£¬£¬²¢¾Ü¾øÖÃÆÀ¡£¡£¡£
https://therecord.media/rocket-maker-agrees-to-pay-9-million-to-settle-allegations-of-cybersecurity-violations/
5¡¢Î¢Èí³Æ×ÔÈ¥Äê9ÔÂAiTM´¹ÂڻÒѹ¥»÷Áè¼Ý10000¸ö×éÖ¯
7ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼µÄ×îб¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃAiTM´¹ÂÚÍøÕ¾×÷Ϊ½øÒ»²½½ðÈÚڲƵÄÇÐÈëµã¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Ò»¸ö´ó¹æÄ£µÄ´¹ÂڻʹÓÃÖÐÐÄÈË£¨AiTM£©´¹ÂÚÍøÕ¾ÇÔÈ¡ÃÜÂë¡¢Ð®ÖÆÓû§µÄµÇ¼»á»°²¢Ìø¹ýÈÏÖ¤Àú³Ì£¬£¬£¬£¬£¬£¬£¬×ÝÈ»Óû§ÒÑÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»áʹÓÃÇÔÈ¡µÄƾ֤ºÍ»á»°cookie»á¼ûÄ¿µÄ»§µÄÓÊÏ䣬£¬£¬£¬£¬£¬£¬²¢¶ÔÆäËüÄ¿µÄÖ´ÐÐBEC¹¥»÷¡£¡£¡£Í³¼ÆÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬´Ó2021Äê9ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬£¬AiTM´¹ÂڻÒÑÕë¶ÔÁË10000¶à¸ö×éÖ¯¡£¡£¡£
https://www.microsoft.com/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/
6¡¢Unit42Ðû²¼ChromeLoader¶ñÒâÈí¼þ»î¶¯µÄÆÊÎö±¨¸æ
Unit42ÔÚ7ÔÂ12ÈÕÐû²¼Á˹ØÓÚChromeLoader¶ñÒâÈí¼þ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÏÈÈÝÁËChromeLoaderµÄ¶à¸ö±äÌ壬£¬£¬£¬£¬£¬£¬ÆäÖеÚÒ»¸öWindows±äÖÖÓÚ½ñÄê1ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬macOS°æ±¾ÓÚ3Ô·ݷºÆð£¬£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬×îÔçÉæ¼°¸Ã¶ñÒâÈí¼þµÄ¹¥»÷¿ÉÒÔ×·Ëݵ½2021Äê12Ô¡£¡£¡£ChromeLoaderÖ÷ÒªÓÃÓÚä¯ÀÀÆ÷Ð®ÖÆºÍadware»î¶¯£¬£¬£¬£¬£¬£¬£¬ÒÔISO»òDMGÎļþÏÂÔØµÄÐÎʽ·Ö·¢¡£¡£¡£¿£¿£¿£¿£¿ª·¢ÕßûÓÐʹÓÃWindows¿ÉÖ´ÐÐÎļþ(.exe)»ò¶¯Ì¬Á´½Ó¿â(.dll)µÈ¹Å°å¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬¶øÊÇʹÓÃä¯ÀÀÆ÷À©Õ¹×÷Ϊ×îÖÕpayload¡£¡£¡£
https://unit42.paloaltonetworks.com/chromeloader-malware/


¾©¹«Íø°²±¸11010802024551ºÅ