Ñо¿ÈËÔ±ÑÝÊ¾ÈÆ¹ýCPUÖЩ¶´SpectreÓ²¼þ·ÀÓùµÄÐÂÒªÁì

Ðû²¼Ê±¼ä 2022-03-14

Ñо¿ÈËÔ±ÑÝÊ¾ÈÆ¹ýCPUÖЩ¶´SpectreÓ²¼þ·ÀÓùµÄÐÂÒªÁì


¾ÝýÌå3ÔÂ8ÈÕ±¨µÀ£¬VUSecÑо¿ÈËÔ±ÑÝʾÁËÈÆ¹ýCPUÖЩ¶´SpectreÓ²¼þ·ÀÓù´ëÊ©µÄÐÂÒªÁìBHI£¨»òSpectre-BHB£© ¡£µÍȨÏ޵Ĺ¥»÷ÕßÀûÓøÃ©¶´£¬¿ÉÒÔÏòÄ¿±êµÄÀúÊ·¼ÇͶ¶¾£¬²¢ÆÛÆ­ÄÚºËÌø×ªµ½×¢Èë´úÂëµÄλÖ㬲¢ÔÚÄÇÀïÖ´ÐÐÕÒµ½µÄ´úÂë ¡£Ñо¿ÈËÔ±»¹Ðû²¼ÁËÒ»¸öPoC£¬ÑÝʾÈçºÎÇÔȡĿ±êϵͳµÄrootÃÜÂë ¡£3ÔÂ9ÈÕ£¬3¸öCPUÖÆÔìÉÌÓ¢ÌØ¶û¡¢AMDºÍArm¾ùÐû²¼Á˹ØÓڸé¶´µÄÄþ¾²Í¨¸æ£¬²¢¸½Óлº½â´ëÊ©ºÍÄþ¾²½¨Òé ¡£


https://www.csoonline.com/article/3652525/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.html


¶íÂÞ˹¶à¸ö¹Ù·½ÍøÕ¾Ôâµ½¹©Ó¦Á´¹¥»÷µ¼Ö·ÃÎÊÖжÏ


¾Ý3ÔÂ9ÈÕ±¨µÀ³Æ£¬¶íÂÞ˹¶à¸öÕþ¸®»ú¹¹µÄÍøÕ¾ÒòÔâµ½¹©Ó¦Á´¹¥»÷·ÃÎÊÖÐ¶Ï ¡£¸Ã¹úÕþ¸®ÌåÏÖ£¬¹¥»÷·¢ÉúÔÚ±¾Öܶþ£¨3ÔÂ8ÈÕ£©£¬ÊÜÓ°ÏìµÄ»ú¹¹°üÂÞÄÜÔ´²¿¡¢¹ú¼Òͳ¼Æ¾Ö¡¢¹ú¼Ò¼àÓü¾Ö¡¢¹ú¼Ò·¨¾¯¾Ö¡¢¹ú¼Ò·´Â¢¶Ï¾ÖºÍÎÄ»¯²¿µÈ ¡£¾ÝϤ£¬¹¥»÷ÕßÊ×ÏÈÈëÇÖÁËÓÃÓÚ¸ú×Ù¶à¸öÕþ¸®»ú¹¹ÍøÕ¾·ÃÎÊÕßÊýÁ¿µÄͳ¼Æ×é¼þ£¬½ø¶øÈëÇÖÕâÐ©ÍøÕ¾ ¡£¶íÂÞ˹Êý×ÖÉú³¤²¿Éù³Æ£¬ÕâÐ©ÍøÕ¾ÔÚÔâµ½¹¥»÷ºóµÄһСʱÄÚÒѱ»»Ö¸´ ¡£


https://securityaffairs.co/wordpress/128853/breaking-news/russian-government-sites-supply-chain-attack.html


Lumen³ÆEmotetµÄÐÂÒ»ÂֻÒÑѬȾÁè¼Ý10Íǫ̀É豸


LumenÔÚ3ÔÂ8ÈÕÐû²¼³ÂË߳ƽ©Ê¬ÍøÂçEmotetÔÚ10¸öÔµĶÌÔÝͣЪºó£¬ÕýÇ¿ÊÆ¹éÀ´ ¡£×Ô2021Äê11ÔÂÒÔÀ´£¬¸Ã»î¶¯ÒÑʹÓÃTrickBotѬȾÁËÔ¼130000¸öÉ豸£¬±é²¼179¸ö¹ú¼ÒºÍµØÓò£¬µ«ÉÐδµ½´ïÒÔǰµÄ¹æÄ££¨Áè¼Ý160Íǫ̀É豸£© ¡£EmotetµÄбäÌå½ÓÄÉÁËÍÖÔ²ÇúÏß¼ÓÃÜ(ECC)È¡´úÔ­À´µÄRSA¼ÓÃÜ·½°¸£¬ÇÒÐÂÔöÁË´ÓÄ¿±êÖÐÊÕ¼¯ÔËÐнø³ÌÁбíÖ®ÍâµÄϵͳÐÅÏ¢µÄ¹¦Ð§ ¡£¾ÝϤ£¬Emotet°üÂÞ½ü200̨C2·þÎñÆ÷£¬ÆäÖдó²¿ÃÅÓòλÓÚÃÀ¹ú¡¢µÂ¹úºÍ·¨¹úµÈµØ£¬Ö÷ÒªÕë¶ÔÑÇÖÞµÄÄ¿±ê ¡£


https://thehackernews.com/2022/03/emotet-botnets-latest-resurgence.html


Abnormal·¢ÏÖ½üÆÚ·Ö·¢BazarBackdoorµÄµöÓã»î¶¯


3ÔÂ9ÈÕ£¬Abnormal SecurityÐû²¼Á˹ØÓÚÁ÷´«BazarBackdoorµÄµöÓã»î¶¯µÄ³ÂËß ¡£BazarBackdoorÊÇTrickBot¿ª·¢µÄºóÃÅ£¬Ä¿Ç°ÕýÓÉConti²Ù¿Ø ¡£»î¶¯¿ªÊ¼ÓÚ2021Äê12Ô£¬Ö¼ÔÚ°²×°Cobalt Strike»òÀÕË÷Èí¼þ ¡£¹¥»÷ÕßʹÓÃÁ˹«Ë¾ÁªÏµ±í¸ñ£¬¶ø·Ç³£¼ûµÄµöÓãÓʼþ ¡£ÔÚÒ»´Î¹¥»÷ÖУ¬¹¥»÷Õßαװ³ÉÒ»¼Ò¼ÓÄôó½¨Öþ¹«Ë¾µÄÔ±¹¤²¢Ìá½»²úÎ﹩Ӧ±¨¼ÛÇëÇó£¬Ä¿±êÔڻظ´ºó¾Í»áÊÕµ½Î±×°³ÉЭÉÌÎļþµÄ¶ñÒâISOÎļþ ¡£´ËÍ⣬¹¥»÷Õß»¹Ê¹ÓÃÁËÎļþ¹²Ïí·þÎñ£¬ÈçTransferNowºÍWeTransfer£¬ÒÔ·À´¥·¢Äþ¾²¾¯±¨ ¡£


https://www.bleepingcomputer.com/news/security/corporate-website-contact-forms-used-to-spread-bazarbackdoor-malware/


ProofpointÅû¶TA416¹¥»÷Å·ÖÞ¶à¸öÍâ½»»ú¹¹µÄÏêÇé


ProofpointÔÚ3ÔÂ7ÈÕÅû¶ÁËAPT×éÖ¯TA416£¨ÓÖ³ÆMustang Panda£©¹¥»÷Å·ÖÞ¶à¸öÍâ½»»ú¹¹µÄÏêϸÐÅÏ¢ ¡£TA416×Ô2020Äê8ÔÂÒÔÀ´¾ÍÒ»Ö±Õë¶ÔÅ·ÖÞÍâ½»µÄ»ú¹¹ ¡£½ñÄê1ÔÂ17ÈÕ£¬Proofpoint·¢ÏÖ¸ÃÍÅ»ïʹÓÃеķַ¢·½Ê½£¬´ËʱµÄ¹¥»÷¼ÆÄ±Ò²·¢ÉúÁ˱仯£¬ÀûÓÃdropper·Ö·¢4¸ö×é¼þ£º¶ñÒâÈí¼þPlugX¡¢loader¡¢DLLËÑË÷ÃüÁî½Ù³Ö·¨Ê½(½ø³Ì¼ÓÔØ·¨Ê½)ºÍPDFÓÕ¶üÎļþ ¡£Ñо¿ÈËÔ±ÔÚ2ÔÂ28ÈÕ·¢ÏÖ£¬¹¥»÷ÕßÃé×¼Á˱±Ô¼¹ú¼ÒµÄÄÑÃñºÍÒÆÃñ·þÎñ²¿Ãŵĸ߼¶¹ÙÔ± ¡£


https://www.proofpoint.com/us/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european


SymantecÐû²¼¹ØÓÚ¶ñÒâÈí¼þDaxinµÄ¼¼Êõ·ÖÎö³ÂËß


3ÔÂ9ÈÕ£¬SymantecÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þDaxinµÄͨÐźÍÍøÂ繦ЧµÄ¼¼Êõ·ÖÎö³ÂËß ¡£³ÂËßÖ¸³ö£¬DaxinÔÚÃÜÔ¿½»»»ÆÚ¼äÖ§³ÖÁ½ÖÖ¼ÆËã¹²ÏíÃÜÔ¿µÄÒªÁ죬²¢ÓÉinitiatorͨ¹ý±ÈÁ¦Ñ¡Ôñ¸üºÏÊʵÄÒ»ÖÖ£¬Õâ¿ÉÄÜÊÇΪÁËÔÚÉý¼¶¶ñÒâÍøÂçʱ²»»áµ¼ÖÂÖÐ¶Ï ¡£´ËÍ⣬³ýÁË2¸öºóÃÅÖ®¼äµÄͨÐÅ£¬¸Ã¶ñÒâÈí¼þ»¹Ö§³Ö2ÖÖÌØ±ðµÄͨÐÅÒªÁ죬ÊʺϿçԽĿ±ê×éÖ¯µÄ½çÏÞ½øÐÐͨÐÅ£ºÆäÒ»ÊÇʹÓÃHTTPÏûÏ¢À´·â×°ºóÃÅͨÐÅ£¬ÁíÒ»ÖÖÊǶñÒâÇý¶¯·¨Ê½ÅäÖÃΪÓëÔ¶³ÌTCP·þÎñÆ÷ͨÐÅÀ´½øÐкóÃÅͨÐÅ ¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage-analysis



Äþ¾²¹¤¾ß


Master_Librarian


Éó¼Æ Unix/*BSD/Linux ϵͳ¿âÒÔ·¢ÏÖ¹«¹²Äþ¾²Â©¶´µÄ¼òµ¥¹¤¾ß ¡£


https://github.com/CoolerVoid/master_librarian


geowifi


ͨ¹ý BSSID ºÍ SSID ÔÚ²îÒìµÄ¹«¹²Êý¾Ý¿âÉÏËÑË÷ WiFi µØÀíλÖÃÊý¾Ý ¡£


https://github.com/GONZOsint/geowifi


wslu


ÕâÊÇ Windows 10 Linux ×ÓϵͳµÄʵÓ÷¨Ê½¼¯ºÏ ¡£


https://github.com/wslutilities/wslu


SysWhispers3


ͨ¹ýÉú³É¿ÉÓÃÓÚ½øÐÐÖ±½Óϵͳµ÷ÓõÄÍ·Îļþ/ASM ÎļþÀ´×ÊÖúÈÆ¹ý ¡£


https://securityonline.info/syswhispers3-av-edr-evasion-via-direct-system-calls/


frogy


×ÓÓòö¾Ù½Å±¾£¬Ö¼ÔÚ´´½¨Ò»¸ö¿ªÔ´¹¥»÷Ãæ¹ÜÀí½â¾ö·½°¸ ¡£


https://github.com/iamthefrogy/frogy



Äþ¾²·ÖÎö


REvil ³ÉÔ±±»Òý¶Éµ½ÃÀ¹úÊÜÉó Kaseya ¹¥»÷ʼþ


https://www.bleepingcomputer.com/news/security/revil-ransomware-member-extradited-to-us-to-stand-trial-for-kaseya-attack/


¶íÂÞ˹´´½¨×Ô¼ºµÄ TLS Ö¤Êé·¢±í»ú¹¹ÒÔÈÆ¹ýÖÆ²Ã


https://www.bleepingcomputer.com/news/security/russia-creates-its-own-tls-certificate-authority-to-bypass-sanctions/


CISAÐÂÔö½ü 100 ¸ö Conti ¶ñÒâ»î¶¯µÄÓòÃûµÄ IoC


https://www.bleepingcomputer.com/news/security/cisa-updates-conti-ransomware-alert-with-nearly-100-domain-names/


΢ÈíÐû²¼ÍƳöÊÊÓÃÓÚ PC ºÍÒÆ¶¯É豸µÄ Defender Ô¤ÀÀ°æ


https://news.softpedia.com/news/microsoft-announces-microsoft-defender-preview-for-pc-and-mobile-535016.shtml


½ü30% µÄÑÏÖØµÄ WordPress ²å¼þ©¶´Ã»Óв¹¶¡


https://www.bleepingcomputer.com/news/security/nearly-30-percent-of-critical-wordpress-plugin-bugs-dont-get-a-patch/


Î÷ÃÅ×Ó½â¾öÁË 90 ¶à¸öÓ°ÏìµÚÈý·½×é¼þµÄ©¶´


https://www.securityweek.com/siemens-addresses-over-90-vulnerabilities-affecting-third-party-components