GoogleÔÚÈýÐÇExynosоƬ×éÖз¢Ã÷18¸öÇå¾²Îó²î

Ðû²¼Ê±¼ä 2023-03-17

1¡¢GoogleÔÚÈýÐÇExynosоƬ×éÖз¢Ã÷18¸öÇå¾²Îó²î


¾Ý3ÔÂ16ÈÕ±¨µÀ£¬£¬£¬Google Project ZeroÔÚÒÆ¶¯×°±¸¡¢¿ÉÒÂ×Å×°±¸ºÍÆû³µÖÐʹÓõÄÈýÐÇExynosоƬ×éÖз¢Ã÷ÁË18¸öÎó²î¡£¡£¡£ÆäÖÐ4¸öÎó²î½ÏΪÑÏÖØ£¬£¬£¬¿Éµ¼Ö´ӻ¥ÁªÍøµ½»ù´øµÄÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬°üÀ¨CVE-2023-24033ºÍÆäËü3¸öÉÐδ·ÖÅÉCVE-IDµÄÎó²î¡£¡£¡£¹¥»÷ÕßÖ»ÐèÒªÖªµÀÄ¿µÄµÄµç»°ºÅÂë¾Í¿ÉÒÔʹÓÃÕâЩÎó²î£¬£¬£¬ÎÞÐèÓëÓû§½»»¥¡£¡£¡£ÈýÐÇÒѾ­ÏòÆäËü¹©Ó¦ÉÌÌṩÏàʶ¾öÊÜÓ°ÏìоƬ×éÖÐÕâЩÎó²îµÄÇå¾²¸üУ¬£¬£¬µ«Ã¿¸öÖÆÔìÉÌÕë¶ÔÆä×°±¸µÄ²¹¶¡Ê±¼ä±í»áÓÐËù²î±ð¡£¡£¡£ÔÚ²¹¶¡¿ÉÓÃ֮ǰ£¬£¬£¬Óû§¿ÉÒÔͨ¹ý½ûÓÃWi-Fiͨ»°ºÍLTEÓïÒô(VoLTE)À´±ÜÃâ»ù´øÔ¶³Ì´úÂëÖ´Ðй¥»÷¡£¡£¡£


https://securityaffairs.com/143582/hacking/baseband-flaws-samsung-exynos.html


2¡¢º½¿Õ¹«Ë¾Safran GroupϵͳÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶


¾ÝýÌå3ÔÂ15ÈÕ±¨µÀ£¬£¬£¬·¨¹úµÄ¿ç¹úº½¿Õ¹«Ë¾Safran GroupϵͳÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£ÕâÊÇÈ«ÇòµÚ°Ë´óº½¿Õº½Ì칩ӦÉÌ£¬£¬£¬2022ÄêµÄÊÕÈëÁè¼Ý190ÒÚÅ·Ôª¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬¿ªÔ´ÊÓÆµÍ¨»°Ó¦ÓóÌÐòJitsi MeetµÄ²âÊÔ°æÉèÖÃÖÐʹÓÃÁËÒ»¸ö¹ûÕæµÄÇéÐÎÎļþ¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬¸ÃÎļþÒѹûÕæÁËÒ»Äê°ë×óÓÒ¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨LaravelÓ¦ÓóÌÐòÃÜÔ¿¡¢JSON WebÁîÅÆ(JWT)ÃÜÔ¿¡¢MySQLƾ֤ºÍSMTPƾ֤µÈ£¬£¬£¬ÕâЩÃÜÔ¿ºÍƾ֤¿É±»¹¥»÷ÕßÓÃÀ´»á¼ûÍøÕ¾ºó¶Ë¡¢Ô±¹¤ÅÌËã»úºÍÆäËüЧÀÍÆ÷¡£¡£¡£


https://cybernews.com/security/key-aerospace-player-leaks-sensitive-data/


3¡¢Latitude FinanceÔâµ½¹¥»÷й¶Áè¼Ý30Íò¿Í»§µÄÐÅÏ¢


ýÌå3ÔÂ15Èճƣ¬£¬£¬½ðÈÚ´û¿î»ú¹¹Latitude FinanceÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬Áè¼Ý300000·Ý¿Í»§Éí·Ý֤ʵÎļþ±»µÁ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬ÒÑÍù¼¸ÌìÔÚÆäϵͳÉϼì²âµ½Òì³£»£»£»î¶¯¡£¡£¡£ÔÚ¹«Ë¾½ÓÄɲ½·¥Ç°£¬£¬£¬ºÚ¿ÍÇÔÈ¡ÁËÔ±¹¤µÄµÇ¼ÐÅÏ¢£¬£¬£¬ÒÔ»á¼ûÆäËüÁ½¼ÒЧÀÍÌṩÉ̳ÖÓеĿͻ§ÐÅÏ¢¡£¡£¡£ÆäÖеÚÒ»¼ÒÌṩÉÌй¶ÁËÔ¼103000·ÝÉí·Ý֤ʵÎļþ£¬£¬£¬µÚ¶þ¼ÒÌṩÉÌй¶ÁËÔ¼225000Ìõ¿Í»§¼Í¼¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬¹¥»÷Ô´×Ô¸ÃЧÀÍʹÓõÄÒ»¸ö¹©Ó¦ÉÌ¡£¡£¡£


https://7news.com.au/business/retail/latitude-financial-hacked-as-300000-customer-identification-documents-stolen--c-10056836


4¡¢LockBitÉù³Æ¶Ôµ¼ÖÂEssendantÔËÓªÖÐÖ¹µÄ¹¥»÷ÈÏÕæ


3ÔÂ15ÈÕ±¨µÀ£¬£¬£¬°ì¹«ÓÃÆ··ÖÏúÉÌEssendantÔâµ½ÀÕË÷ÍÅ»ïLockBitµÄ¹¥»÷¡£¡£¡£×Ô3ÔÂ6ÈÕÍíÉÏ×îÏÈ£¬£¬£¬Essendant±¬·¢ÖÐÖ¹£¬£¬£¬¿Í»§ÎÞ·¨Ï¶©µ¥»òÁªÏµEssendantµÄ¿Í»§Ð§ÀÍ¡£¡£¡£¸Ã¹«Ë¾ÓÚ3ÔÂ7ÈÕ֪ͨÆä¿Í»§ÖØ´óÍøÂçÖÐÖ¹ÊÂÎñ¡£¡£¡£3ÔÂ14ÈÕ£¬£¬£¬LockBitÉù³Æ¶ÔEssendantµÄÍøÂç¹¥»÷ÈÏÕæ¡£¡£¡£ÔÚLockBitÉùÃ÷ºó£¬£¬£¬¸Ã¹«Ë¾Ì¸µ½ÆäÕýÔÚ¾ÙÐеĻָ´ÊÂÇ飬£¬£¬°üÀ¨¼´½«Íê³ÉµÄϵͳÕûÀí£¬£¬£¬µ«×îеÄÌû×ÓÈÔÈ»½«¸ÃÊÂÎñ¹é×ïÓÚ¡°ÍøÂçÖÐÖ¹¡±¡£¡£¡£


https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-essendant-attack-company-says-network-outage-/


5¡¢ÃÀ¹úUSMS 350GBµÄÖ´·¨ÐÅÏ¢ÒÔ15ÍòÃÀÔªÔÚºÚ¿ÍÂÛ̳³öÊÛ


ýÌå3ÔÂ15ÈÕ±¨µÀ³Æ£¬£¬£¬ÃÀÍõ·¨¾¯¾Ö(USMS)µÄ350 GBÊý¾ÝÔÚÒ»¸ö¶íÓïºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£¡£¡£¾ÝÂô¼Ò³Æ£¬£¬£¬¸ÃÊý¾Ý¿âµÄÊÛ¼ÛΪ150000ÃÀÔª£¬£¬£¬ÆäÖаüÀ¨2021ÄêÖÁ2023Äê2ÔÂʱ´úÀ´×ÔÎļþЧÀÍÆ÷ºÍÊÂÇéÅÌËã»úµÄÎļþ£¬£¬£¬²»»áÏñexeÎļþºÍ¿âÄÇÑùÂþÒç¡£¡£¡£ÕâЩÐÅÏ¢°üÀ¨¾üÊ»ùµØºÍÆäËü¸ß¶ÈÇå¾²ÇøÓòµÄº½ÅľµÍ·ºÍÕÕÆ¬¡¢»¤ÕÕºÍÉí·ÝÖ¤¼þµÄ¸´Ó¡¼þ£¬£¬£¬ÒÔ¼°ÇÔÌýºÍ¼àÊÓ¹«ÃñµÄÏêϸÐÅÏ¢¡£¡£¡£»£»£»¹°üÀ¨ÓйØ×ï·¸¡¢°ïÆøÑæÄ¿ºÍ··¶¾¼¯ÍŵÄÐÅÏ¢£¬£¬£¬²¿·ÖÎļþ±»±ê¼ÇΪÉñÃØ»ò¾øÃÜ¡£¡£¡£USMSÉÐδ¶Ô´ËÊÂ×÷³ö»ØÓ¦¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hacker-selling-data-allegedly-stolen-in-us-marshals-service-hack/


6¡¢Check PointÐû²¼¹ØÓÚ×¢Èë³ÌÐòdotRunpeXµÄÆÊÎö±¨¸æ


3ÔÂ15ÈÕ£¬£¬£¬Check Point ResearchÐû²¼Á˹ØÓÚ×¢Èë³ÌÐòdotRunpeX¼°ÆäÓë¾É°æ±¾µÄ¹ØÏµµÄÆÊÎö±¨¸æ¡£¡£¡£DotRunpeXÊÇÒ»ÖÖʹÓÃProcess HollowingÊÖÒÕÔÚ.NETÖбàдµÄÐÂÐÍ×¢Èë³ÌÐò£¬£¬£¬ÓÃÓÚѬȾ¾ßÓÐÖÖÖÖÒÑÖª¶ñÒâÈí¼þϵÁеÄϵͳ¡£¡£¡£Ïà±ÈÓھɰ汾£¬£¬£¬Ð°汾¾ßÓÐÊܶ¨ÖưæKoiVMÐéÄâÆ÷±£»£»£»¤¡¢¸ß¶È¿ÉÉèÖᢸü¶àUACÈÆ¹ýÊÖÒÕºÍʹÓüòÆÓµÄXOR½âÃÜҪעÈëµÄÖ÷ÒªpayloadµÈÌØµã¡£¡£¡£ÏàËÆÖ®´¦ÊÇÓÃ.NET±àдµÄ64λ¿ÉÖ´ÐÐÎļþ.exeºÍÓÃÀ´×¢È뼸¸ö²î±ðµÄ¶ñÒâÈí¼þ¼Ò×åµÈ¡£¡£¡£


https://research.checkpoint.com/2023/dotrunpex-demystifying-new-virtualized-net-injector-used-in-the-wild/