åÚÏëÐÞ¸´ÆäÌõ¼Ç±¾µÄUEFI¹Ì¼þÖÐÎó²î£¬£¬£¬£¬£¬£¬Ó°Ïì70¶à¿îÐͺÅ
Ðû²¼Ê±¼ä 2022-07-14
¾Ý7ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬åÚÏëÐÞ¸´ÁËÆäÌõ¼Ç±¾µçÄÔµÄUEFI¹Ì¼þÖеÄÈý¸ö»º³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£¡£ÕâЩÎó²î»®·ÖΪReadyBootDxeÇý¶¯³ÌÐòÖеĻº³åÇøÒç³öÎó²î£¨CVE-2022-1890£©ÒÔ¼°SystemLoadDefaultDxeÇý¶¯³ÌÐòÖеĻº³åÇøÒç³ö£¨CVE-2022-1891ºÍCVE-2022-1892£©¡£¡£¡£¡£¡£¡£ESETÑо¿Ö°Ô±Ú¹Êͳƣ¬£¬£¬£¬£¬£¬ÕâЩÎó²îÊÇÓÉÓÚת´ï¸øUEFIÔËÐÐʱЧÀͺ¯ÊýGetVariableµÄDataSize²ÎÊýÑéÖ¤²»³ä·Öµ¼Öµģ¬£¬£¬£¬£¬£¬¿É±»ÓÃÀ´ÔÚÆ½Ì¨Æô¶¯µÄÔçÆÚ½×¶ÎʵÏÖí§Òâ´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬²¢Ð®ÖƲÙ×÷ϵͳִÐÐÁ÷³ÌÒÔ¼°½ûÓÃһЩÖ÷ÒªµÄÇå¾²¹¦Ð§¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-uefi-firmware-flaws-impact-over-70-lenovo-laptop-models/
2¡¢Á¢ÌÕÍðÄÜÔ´¹«Ë¾Ignitis GroupÔâµ½´ó¹æÄ£DDoS¹¥»÷
¾ÝýÌå7ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Á¢ÌÕÍðÄÜÔ´¹«Ë¾Ignitis GroupÔâµ½Á˽üÊ®ÄêÀ´×î´ó¹æÄ£µÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£ÉÏÖÜÁù£¬£¬£¬£¬£¬£¬Õë¶Ô¸Ã¹«Ë¾µÄDDoS¹¥»÷µ¼ÖÂÆäÊý×ÖЧÀͺÍÍøÕ¾ÒòÖÐÖ¹¡£¡£¡£¡£¡£¡£IgnitisÔÚ7ÔÂ9ÈÕ·¢Ìû£¬£¬£¬£¬£¬£¬ËüÒѾÄܹ»ÖÎÀíºÍÏÞÖÆ¹¥»÷¶ÔÆäϵͳµÄÓ°Ï죬£¬£¬£¬£¬£¬²¢ÇÒûÓз¢Ã÷ÈκÎÎ¥¹æÐÐΪ£¬£¬£¬£¬£¬£¬È»¶ø£¬£¬£¬£¬£¬£¬¹¥»÷ÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£ºÚ¿ÍÍÅ»ïKillnetÔÚÆäTelegramÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬¶Ô´Ë´Î¹¥»÷ÊÂÎñÈÏÕæ¡£¡£¡£¡£¡£¡£Á¢ÌÕÍð¹ú·À²¿¸±²¿³¤ÔÚ½ÒÏþ½²»°Ê±ÖÒÑԳƣ¬£¬£¬£¬£¬£¬²»ÒªÌ«¹ý¹Ø×¢´ËÀàÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/lithuanian-energy-ddos-attack/
3¡¢È¥ÖÐÐÄ»¯ÉúÒâËùUniswapÔâµ½´¹ÂÚ¹¥»÷Ëðʧ800ÍòÃÀÔª
¾ÝCheck Point 7ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬È¥ÖÐÐÄ»¯¼ÓÃÜÇ®±ÒÉúÒâËùUniswapÔâµ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬Ëðʧ¸ß´ï800ÍòÃÀÔª£¨7500 ETH£©¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚÖÜÒ»Ê×´ÎÆØ¹â£¬£¬£¬£¬£¬£¬BinanceµÄCEOÔÚTwitterÉÏ·¢Îijƣ¬£¬£¬£¬£¬£¬ÔÚETHÇø¿éÁ´Éϼì²âµ½Uniswap V3µÄDZÔÚÎó²î¡£¡£¡£¡£¡£¡£UniswapÊ×´´ÈËHayden Adams֤ʵÕâÊÇÒ»´Î´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬ÓëÐÒé×Ô¼ºÎ޹ء£¡£¡£¡£¡£¡£¹¥»÷ÕßÏòUniswapÓû§¿ÕͶÁ˶ñÒâ´ú±Ò£¬£¬£¬£¬£¬£¬½«ËûÃÇÓÕµ¼ÖÁÒ»¸ö´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬£¬È»ºó´ÓÄ¿µÄµÄÇ®°üÖÐÇÔÈ¡×ʽ𡣡£¡£¡£¡£¡£
https://blog.checkpoint.com/2022/07/12/8-million-dollars-stolen-in-a-uniswap-phishing-attack/
4¡¢Aerojet RocketdyneÒòÎ¥·´ÍøÂçÇå¾²¹æÔòÖ§¸¶900ÍòÃÀÔª
ýÌå7ÔÂ12Èճƣ¬£¬£¬£¬£¬£¬º½¿Õº½ÌìºÍ¹ú·À¹«Ë¾Aerojet RocketdyneÒÑÔÞ³ÉÖ§¸¶900ÍòÃÀÔª£¬£¬£¬£¬£¬£¬À´Ï¢Õù¹ØÓÚÆäÎ¥·´ÍøÂçÇå¾²¹æÔòµÄËßËÏ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾µÄǰԱ¹¤Æ¾Ö¤¡¶ÐéαË÷Åâ·¨¡·Ïò·¨ÔºÌáÆðËßËÏ£¬£¬£¬£¬£¬£¬ÌåÏÖËûÔÚ¹«Ë¾µ£µ±ÍøÂçÇå¾²¡¢ºÏ¹æºÍ¿ØÖƸ߼¶×ܼàʱ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÊÐíÌṩ1000ÍòÖÁ1500ÍòÃÀÔªµÄÔ¤ËãÒÔ¼°5ÖÁ10ÃûÔ±¹¤ºÍ25Ãû³Ð°üÉÌ£¬£¬£¬£¬£¬£¬ÒÔÌá¸ßÅÌËã»úÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£µ«ÊÂÇéʱ´ú£¬£¬£¬£¬£¬£¬Ëû·¢Ã÷¸Ã¹«Ë¾Ã»ÓÐÖª×ãÓë¹ú·À²¿¡¢NASA»òÆäËüÕþ¸®»ú¹¹Ç©ÊðÌõÔ¼µÄÍøÂçÇå¾²ÒªÇ󡣡£¡£¡£¡£¡£AerojetµÄ½²»°È˾ܾøÔÚÏ¢ÕùÐÒéÖÐÈÏ¿ÉÓÐ×£¬£¬£¬£¬£¬²¢¾Ü¾øÖÃÆÀ¡£¡£¡£¡£¡£¡£
https://therecord.media/rocket-maker-agrees-to-pay-9-million-to-settle-allegations-of-cybersecurity-violations/
5¡¢Î¢Èí³Æ×ÔÈ¥Äê9ÔÂAiTM´¹ÂڻÒѹ¥»÷Áè¼Ý10000¸ö×éÖ¯
7ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼µÄ×îб¨¸æ³Æ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃAiTM´¹ÂÚÍøÕ¾×÷Ϊ½øÒ»²½½ðÈÚڲƵÄÇÐÈëµã¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Ò»¸ö´ó¹æÄ£µÄ´¹ÂڻʹÓÃÖÐÐÄÈË£¨AiTM£©´¹ÂÚÍøÕ¾ÇÔÈ¡ÃÜÂë¡¢Ð®ÖÆÓû§µÄµÇ¼»á»°²¢Ìø¹ýÈÏÖ¤Àú³Ì£¬£¬£¬£¬£¬£¬×ÝÈ»Óû§ÒÑÆôÓöàÒòËØÈÏÖ¤£¨MFA£©¡£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬¹¥»÷Õß»áʹÓÃÇÔÈ¡µÄƾ֤ºÍ»á»°cookie»á¼ûÄ¿µÄ»§µÄÓÊÏ䣬£¬£¬£¬£¬£¬²¢¶ÔÆäËüÄ¿µÄÖ´ÐÐBEC¹¥»÷¡£¡£¡£¡£¡£¡£Í³¼ÆÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬´Ó2021Äê9ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬AiTM´¹ÂڻÒÑÕë¶ÔÁË10000¶à¸ö×éÖ¯¡£¡£¡£¡£¡£¡£
https://www.microsoft.com/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/
6¡¢Unit42Ðû²¼ChromeLoader¶ñÒâÈí¼þ»î¶¯µÄÆÊÎö±¨¸æ
Unit42ÔÚ7ÔÂ12ÈÕÐû²¼Á˹ØÓÚChromeLoader¶ñÒâÈí¼þ»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÏÈÈÝÁËChromeLoaderµÄ¶à¸ö±äÌ壬£¬£¬£¬£¬£¬ÆäÖеÚÒ»¸öWindows±äÖÖÓÚ½ñÄê1ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬macOS°æ±¾ÓÚ3Ô·ݷºÆð£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬×îÔçÉæ¼°¸Ã¶ñÒâÈí¼þµÄ¹¥»÷¿ÉÒÔ×·Ëݵ½2021Äê12Ô¡£¡£¡£¡£¡£¡£ChromeLoaderÖ÷ÒªÓÃÓÚä¯ÀÀÆ÷Ð®ÖÆºÍadware»î¶¯£¬£¬£¬£¬£¬£¬ÒÔISO»òDMGÎļþÏÂÔØµÄÐÎʽ·Ö·¢¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿ª·¢ÕßûÓÐʹÓÃWindows¿ÉÖ´ÐÐÎļþ(.exe)»ò¶¯Ì¬Á´½Ó¿â(.dll)µÈ¹Å°å¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬¶øÊÇʹÓÃä¯ÀÀÆ÷À©Õ¹×÷Ϊ×îÖÕpayload¡£¡£¡£¡£¡£¡£
https://unit42.paloaltonetworks.com/chromeloader-malware/