GoogleÔÚÈýÐÇExynosоƬ×éÖз¢ÏÖ18¸öÄþ¾²Â©¶´
Ðû²¼Ê±¼ä 2023-03-171¡¢GoogleÔÚÈýÐÇExynosоƬ×éÖз¢ÏÖ18¸öÄþ¾²Â©¶´
¾Ý3ÔÂ16ÈÕ±¨µÀ£¬Google Project ZeroÔÚÒƶ¯É豸¡¢¿É´©×ÅÉ豸ºÍÆû³µÖÐʹÓõÄÈýÐÇExynosоƬ×éÖз¢ÏÖÁË18¸ö©¶´¡£ÆäÖÐ4¸ö©¶´½ÏΪÑÏÖØ£¬¿Éµ¼Ö´ӻ¥ÁªÍøµ½»ù´øµÄÔ¶³Ì´úÂëÖ´ÐУ¬°üÂÞCVE-2023-24033ºÍÆäËü3¸öÉÐδ·ÖÅäCVE-IDµÄ©¶´¡£¹¥»÷ÕßÖ»ÐèÒªÖªµÀÄ¿±êµÄµç»°ºÅÂë¾Í¿ÉÒÔÀûÓÃÕâЩ©¶´£¬ÎÞÐèÓëÓû§½»»¥¡£ÈýÐÇÒѾÏòÆäËü¹©Ó¦ÉÌÌṩÁ˽â¾öÊÜÓ°ÏìоƬ×éÖÐÕâЩ©¶´µÄÄþ¾²¸üУ¬µ«Ã¿¸öÖÆÔìÉÌÕë¶ÔÆäÉ豸µÄ²¹¶¡Ê±¼ä±í»áÓÐËù²îÒì¡£ÔÚ²¹¶¡¿ÉÓÃ֮ǰ£¬Óû§¿ÉÒÔͨ¹ý½ûÓÃWi-Fiͨ»°ºÍLTEÓïÒô(VoLTE)À´·ÀÖ¹»ù´øÔ¶³Ì´úÂëÖ´Ðй¥»÷¡£
https://securityaffairs.com/143582/hacking/baseband-flaws-samsung-exynos.html
2¡¢º½¿Õ¹«Ë¾Safran GroupϵͳÅäÖôíÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶
¾ÝýÌå3ÔÂ15ÈÕ±¨µÀ£¬·¨¹úµÄ¿ç¹úº½¿Õ¹«Ë¾Safran GroupϵͳÅäÖôíÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£ÕâÊÇÈ«ÇòµÚ°Ë´óº½¿Õº½Ì칩ӦÉÌ£¬2022ÄêµÄÊÕÈëÁè¼Ý190ÒÚÅ·Ôª¡£Ñо¿ÈËÔ±·¢ÏÖ£¬¿ªÔ´ÊÓƵͨ»°Ó¦Ó÷¨Ê½Jitsi MeetµÄ²âÊÔ°æÅäÖÃÖÐʹÓÃÁËÒ»¸ö¹ûÈ»µÄ»·¾³Îļþ¡£¾ÝÔ¤¼Æ£¬¸ÃÎļþÒѹûÈ»ÁËÒ»Äê°ë×óÓÒ¡£Ð¹Â¶ÐÅÏ¢°üÂÞLaravelÓ¦Ó÷¨Ê½ÃÜÔ¿¡¢JSON WebÁîÅÆ(JWT)ÃÜÔ¿¡¢MySQLƾ¾ÝºÍSMTPƾ¾ÝµÈ£¬ÕâЩÃÜÔ¿ºÍƾ¾Ý¿É±»¹¥»÷ÕßÓÃÀ´·ÃÎÊÍøÕ¾ºó¶Ë¡¢Ô±¹¤¼ÆËã»úºÍÆäËü·þÎñÆ÷¡£
https://cybernews.com/security/key-aerospace-player-leaks-sensitive-data/
3¡¢Latitude FinanceÔâµ½¹¥»÷й¶Áè¼Ý30Íò¿Í»§µÄÐÅÏ¢
ýÌå3ÔÂ15Èճƣ¬½ðÈÚ´û¿î»ú¹¹Latitude FinanceÔâµ½ºÚ¿Í¹¥»÷£¬Áè¼Ý300000·Ý¿Í»§Éí·ÝÖ¤Ã÷Îļþ±»µÁ¡£¸Ã¹«Ë¾ÌåÏÖ£¬¹ýÈ¥¼¸ÌìÔÚÆäϵͳÉϼì²âµ½Òì³£»î¶¯¡£ÔÚ¹«Ë¾½ÓÄÉ´ëÊ©Ç°£¬ºÚ¿ÍÇÔÈ¡ÁËÔ±¹¤µÄµÇ¼ÐÅÏ¢£¬ÒÔ·ÃÎÊÆäËüÁ½¼Ò·þÎñÌṩÉ̳ÖÓеĿͻ§ÐÅÏ¢¡£ÆäÖеÚÒ»¼ÒÌṩÉÌй¶ÁËÔ¼103000·ÝÉí·ÝÖ¤Ã÷Îļþ£¬µÚ¶þ¼ÒÌṩÉÌй¶ÁËÔ¼225000Ìõ¿Í»§¼Ç¼¡£¸Ã¹«Ë¾ÌåÏÖ£¬¹¥»÷Ô´×Ը÷þÎñʹÓõÄÒ»¸ö¹©Ó¦ÉÌ¡£
https://7news.com.au/business/retail/latitude-financial-hacked-as-300000-customer-identification-documents-stolen--c-10056836
4¡¢LockBitÉù³Æ¶Ôµ¼ÖÂEssendantÔËÓªÖжϵĹ¥»÷ÂôÁ¦
3ÔÂ15ÈÕ±¨µÀ£¬°ì¹«ÓÃÆ··ÖÏúÉÌEssendantÔâµ½ÀÕË÷ÍÅ»ïLockBitµÄ¹¥»÷¡£×Ô3ÔÂ6ÈÕÍíÉÏ¿ªÊ¼£¬Essendant·¢ÉúÖжϣ¬¿Í»§ÎÞ·¨Ï¶©µ¥»òÁªÏµEssendantµÄ¿Í»§·þÎñ¡£¸Ã¹«Ë¾ÓÚ3ÔÂ7ÈÕ֪ͨÆä¿Í»§ÖØ´óÍøÂçÖжÏʼþ¡£3ÔÂ14ÈÕ£¬LockBitÉù³Æ¶ÔEssendantµÄÍøÂç¹¥»÷ÂôÁ¦¡£ÔÚLockBitÉùÃ÷ºó£¬¸Ã¹«Ë¾Ì¸µ½ÆäÕýÔÚ½øÐеĻָ´ÊÂÇ飬°üÂÞ¼´½«Íê³ÉµÄϵͳÇåÀí£¬µ«×îеÄÌû×ÓÈÔÈ»½«¸Ãʼþ¹é¾ÌÓÚ¡°ÍøÂçÖжϡ±¡£
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-essendant-attack-company-says-network-outage-/
5¡¢ÃÀ¹úUSMS 350GBµÄÖ´·¨ÐÅÏ¢ÒÔ15ÍòÃÀÔªÔÚºÚ¿ÍÂÛ̳³öÊÛ
ýÌå3ÔÂ15ÈÕ±¨µÀ³Æ£¬ÃÀ¹ú·¨¾¯¾Ö(USMS)µÄ350 GBÊý¾ÝÔÚÒ»¸ö¶íÓïºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£¾ÝÂô¼Ò³Æ£¬¸ÃÊý¾Ý¿âµÄÊÛ¼ÛΪ150000ÃÀÔª£¬ÆäÖаüÂÞ2021ÄêÖÁ2023Äê2ÔÂÆÚ¼äÀ´×ÔÎļþ·þÎñÆ÷ºÍÊÂÇé¼ÆËã»úµÄÎļþ£¬²»»áÏñexeÎļþºÍ¿âÄÇÑù·ºÀÄ¡£ÕâЩÐÅÏ¢°üÂÞ¾üÊ»ùµØºÍÆäËü¸ß¶ÈÄþ¾²ÇøÓòµÄº½ÅľµÍ·ºÍÕÕƬ¡¢»¤ÕÕºÍÉí·ÝÖ¤¼þµÄ¸´Ó¡¼þ£¬ÒÔ¼°ÇÔÌýºÍ¼àÊÓ¹«ÃñµÄÏêϸÐÅÏ¢¡£»¹°üÂÞÓйØ×ï·¸¡¢°ïÅÉÍ·Ä¿ºÍ··¶¾¼¯ÍŵÄÐÅÏ¢£¬²¿ÃÅÎļþ±»±ê־Ϊ»úÃÜ»ò¾øÃÜ¡£USMSÉÐδ¶Ô´ËÊÂ×÷³ö»ØÓ¦¡£
https://www.bleepingcomputer.com/news/security/hacker-selling-data-allegedly-stolen-in-us-marshals-service-hack/
6¡¢Check PointÐû²¼¹ØÓÚ×¢È뷨ʽdotRunpeXµÄ·ÖÎö³ÂËß
3ÔÂ15ÈÕ£¬Check Point ResearchÐû²¼Á˹ØÓÚ×¢È뷨ʽdotRunpeX¼°ÆäÓë¾É°æ±¾µÄ¹ØϵµÄ·ÖÎö³ÂËß¡£DotRunpeXÊÇÒ»ÖÖʹÓÃProcess Hollowing¼¼ÊõÔÚ.NETÖбàдµÄÐÂÐÍ×¢È뷨ʽ£¬ÓÃÓÚѬȾ¾ßÓÐÖÖÖÖÒÑÖª¶ñÒâÈí¼þϵÁеÄϵͳ¡£Ïà±ÈÓھɰ汾£¬Ð°汾¾ßÓÐÊܶ¨ÖÆ°æKoiVMÐéÄâÆ÷±£»¤¡¢¸ß¶È¿ÉÅäÖᢸü¶àUACÈƹý¼¼ÊõºÍʹÓüòµ¥µÄXOR½âÃÜҪעÈëµÄÖ÷ÒªpayloadµÈÌص㡣ÏàËÆÖ®´¦ÊÇÓÃ.NET±àдµÄ64λ¿ÉÖ´ÐÐÎļþ.exeºÍÓÃÀ´×¢È뼸¸ö²îÒìµÄ¶ñÒâÈí¼þ¼Ò×åµÈ¡£
https://research.checkpoint.com/2023/dotrunpex-demystifying-new-virtualized-net-injector-used-in-the-wild/