¸ßͨæçÁúоƬ¸ßΣÎó²î £¬¿Éµ¼ÖÂ˽Կй¶£»DMSÔâGandCrab¹¥»÷£»ÍÚ¿óÈí¼þBeapy

Ðû²¼Ê±¼ä 2019-04-26
1.¸ßͨæçÁúоƬ¸ßΣÎó²î £¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¸ßͨоƬ×é±£´æÒ»¸ö²àÐŵÀ¹¥»÷Îó²î £¬¸ÃÎó²î£¨CVE-2018-11976£©¿ÉÔÊÐí¹¥»÷Õß´Ó¸ßͨоƬµÄQSEEÇå¾²ÇøÓòÖмìË÷¼ÓÃÜ˽Կ¡£QSEEÊǸßͨоƬµÄ¿ÉÐÅÖ´ÐÐÇéÐΣ¨TEE£© £¬ÀàËÆÓÚÓ¢ÌØ¶ûµÄSGX¡£Æ¾Ö¤NCCÑо¿Ö°Ô±Keegan RyanµÄ±íÊö £¬¸ßͨоƬµÄ¼ÓÃÜÊðÃûËã·¨ECDSA£¨ÍÖÔ²ÇúÏßËã·¨£©±£´æÎó²î £¬¿Éͨ¹ýËæ»úÊýµÄһЩbitÍÆ²â³ö256λECDSAÃÜÔ¿¡£¸ÃÎó²îµÄʹÓÃÐèҪװ±¸µÄrootȨÏÞ¡£ÓÐ46¿î¸ßͨоƬ×éÊܵ½Ó°Ïì £¬°üÀ¨¶à¿îæçÁúоƬ¡£¸ÃÎó²îµÄÐÞ¸´²¹¶¡ÒѾ­°üÀ¨ÔÚGoogleÐû²¼µÄ4ÔÂAndroidÇå¾²¸üÐÂÖС£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/security-flaw-lets-attackers-recover-private-keys-from-qualcomm-chips/

2.DMSÔâGandCrab¹¥»÷ £¬Ô¼38¸öÒ½ÁÆÖÐÐĵÄÊý¾ÝÊÜÓ°Ïì

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ò½ÁÆÕ˵¥·þÎñÌṩÉÌDoctors¡¯ Management Service£¨DMS£©Ôâµ½ÀÕË÷Èí¼þGandCrab¹¥»÷ £¬½ü38¸öÒ½ÁÆÖÐÐĵϼÕßÊý¾ÝÊܵ½Ó°Ïì £¬°üÀ¨±´¸¥ÀûÍâ¿ÆÐ­»á¡¢ÐÂÓ¢¸ñÀ¼Éñ¾­Ñо¿Ëù¡¢ÐÂÓ¢¸ñÀ¼ÉçÇøÒ½ÁÆ·þÎñµÈ¡£ÊÜËðÊý¾Ý°üÀ¨»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢ £¬ÀýÈçÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢°ü¹Ü¡¢Ò½Áưü¹Ü/Ò½ÁƽòÌùÐÅÏ¢µÈ¡£ÊÓ²ìЧ¹ûÅú×¢¶ÔDMSÍøÂçµÄ³õʼδÊÚȨ»á¼û±¬·¢ÔÚ2017Äê4ÔÂ1ÈÕ £¬Í¨¹ýDMSÊÂÇéÕ¾ÉϵÄRDPЭÒé¾ÙÐÐÈëÇÖ¡£DMSÒÑ´Ó±¸·ÝÖлָ´ÁËÊý¾Ý £¬ÎÞÐèÖ§¸¶Êê½ð¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/doctors-management-service-hit-with-gandcrab-ransomware-attack-compromising-patient-data-b6eebd02

3.Å·ÖÞÖÆÔìÉÌAebi SchmidtÔâδ֪ÀÕË÷Èí¼þ¹¥»÷

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

ÈðÊ¿ÊÐÕþºÍũҵ»úÐµÖÆÔìÉÌAebi Schmidt³ÉΪÀÕË÷Èí¼þ¹¥»÷µÄ×îÐÂÊܺ¦Õß¡£¾ÝTechCrunch±¨µÀ £¬ÀÕË÷Èí¼þ¹¥»÷ÑÏÖØÓ°ÏìÁËAebi SchmidtµÄÅ·ÖÞ»ùµØ £¬µ¼ÖÂÐí¶àϵͳÎÞ·¨ÔËÐÐ £¬°üÀ¨Ïà¹ØÖÆÔìӪҵϵͳ¡£¸Ã¹«Ë¾µÄµç×ÓÓʼþ·þÎñÒ²Êܵ½Ó°Ïì £¬²¿·ÖÔ±¹¤±»ÆÈ×îÏÈÐÝÎÞн¼Ù¡£Aebi Schmidt³Æ¹¥»÷µÄÔµ¹ÊÔ­ÓÉÈÔδȷ¶¨¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/unknown-ransomware-cripples-computer-systems-of-aebi-schmidt-ffa880fb

4.жñÒâÍÚ¿óÈí¼þBeapy £¬ÒÑѬȾÁè¼Ý1.2Íò¸öÓû§

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÈüÃÅÌú¿ËÑо¿Ö°Ô±·¢Ã÷жñÒâÍÚ¿óÈí¼þBeapyµÄ¹¥»÷Ô˶¯ÔÚ½üÆÚì­Éý¡£BeapyÊ״ηºÆðÓÚ1ÔÂ·Ý £¬×ÔÈýÔ·ÝÒÔÀ´ÒѾ­ÔÚ732¸öÆóÒµÖÐÒý·¢ÁËÁè¼Ý1.2ÍòÆðѬȾÊÂÎñ¡£¸Ã¶ñÒâÈí¼þͨ¹ý´¹ÂÚÓʼþÈö²¥ £¬Ò»µ©Êܺ¦Õß·­¿ª¶ñÒ⸽¼þ £¬¶ñÒ⸽¼þ¾Í»áÊÍ·ÅNSAºÚ¿Í¹¤¾ßDoublePulsar £¬ÔÚÊÜѬȾµÄÅÌËã»úÉϽ¨ÉèºóÃŲ¢Ê¹ÓÃNSAµÄEternalBlueÎó²îʹÓúáÏòÈö²¥¡£Ñо¿Ö°Ô±³ÆÁè¼Ý80£¥µÄBeapyѬȾ¶¼±¬·¢ÔÚÖйú¡£


Ô­ÎÄÁ´½Ó£º

https://techcrunch.com/2019/04/25/cryptojacking-nsa-malware/

5.¹¥»÷ÕßÀÄÓÃGitHub·þÎñÍйÜÍøÂç´¹ÂÚ¹¤¾ß°ü


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ProofpointÑо¿ÍŶӷ¢Ã÷¶ñÒâ¹¥»÷ÕßÀÄÓÃGitHubµÄÍøÒ³¼Ä´æ·þÎñÀ´ÍйÜÍøÂç´¹ÂÚ¹¤¾ß°ü¡£ÕâÖÖÒªÁìʹµÃ¹¥»÷Õß¿ÉÒÔʹÓÃgithub.ioÓòÃûÈÆ¹ý°×Ãûµ¥µÈ·ÀÓù²½·¥¡£Ñо¿Ö°Ô±·¢Ã÷ÕâЩ´¹ÂÚ¹¤¾ß°ü´ó´ó¶¼ÓÃÓÚÍøÂçÊܺ¦Õߵį¾Ö¤£¨ÀýÈçÒøÐÐÕË»§Æ¾Ö¤£©µÈÃô¸ÐÐÅÏ¢²¢·¢ËÍÖÁ¹¥»÷ÕߵķþÎñÆ÷¡£GitHubÒÑÔÚ4ÔÂ19ÈÕ½ÓÄɲ½·¥½ûÓÃÁËÕâЩ¶ñÒâÕË»§¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/github-service-abused-by-attackers-to-host-phishing-kits/

6.TA505ʹÓÃLOLBinsºÍServHelperÃé×¼½ðÈÚ¹«Ë¾


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


CybereasonÑо¿Ö°Ô±·¢Ã÷·¸·¨ÍÅ»ïTA505µÄй¥»÷Ô˶¯Ê¹ÓöàÖÖÓÕÆ­ÊÖÒÕÃé×¼½ðÈÚ»ú¹¹¡£¸ÃÍÅ»ï½ÓÄÉÁ˶àÖÖÕ½ÂÔÀ´Ìӱܼì²â £¬Ö÷ÒªÕë¶Ô½ðÈÚÆóÒµµÄÌØ¶¨ÕË»§¾ÙÐд¹ÂÚ¹¥»÷¡£¹¥»÷ÕßʹÓÃÁ˶à¸öC2ÓòÃûÒÔÈÆ¹ýºÚÃûµ¥¼ì²â £¬²¢ÔÚÄ¿µÄϵͳÉÏÊÍ·ÅServHelperºóÃÅ¡£¸ÃServHelper±äÌåÒÀÀµÓÚËĸöLOLBinsºÍÍâµØÏµÍ³Àú³ÌʵÑé¶ñÒâÔ˶¯ £¬±ðµÄ £¬ServHelper»¹Ê¹ÓÃÁËSectigo RSA Code Signing CAÊðÃûµÄÓÐÓÃÖ¤ÊéÀ´Ìӱܼì²â¡£


Ô­ÎÄÁ´½Ó£º

https://cyware.com/news/ta505-group-uses-lolbins-and-servhelper-backdoor-to-compromise-financial-firms-00550f4d