GoogleÔÚÈýÐÇExynosоƬ×éÖз¢Ã÷18¸öÇå¾²Îó²î
Ðû²¼Ê±¼ä 2023-03-171¡¢GoogleÔÚÈýÐÇExynosоƬ×éÖз¢Ã÷18¸öÇå¾²Îó²î
¾Ý3ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬Google Project ZeroÔÚÒÆ¶¯×°±¸¡¢¿ÉÒÂ×Å×°±¸ºÍÆû³µÖÐʹÓõÄÈýÐÇExynosоƬ×éÖз¢Ã÷ÁË18¸öÎó²î¡£¡£¡£¡£ÆäÖÐ4¸öÎó²î½ÏΪÑÏÖØ£¬£¬£¬£¬¿Éµ¼Ö´ӻ¥ÁªÍøµ½»ù´øµÄÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬°üÀ¨CVE-2023-24033ºÍÆäËü3¸öÉÐδ·ÖÅÉCVE-IDµÄÎó²î¡£¡£¡£¡£¹¥»÷ÕßÖ»ÐèÒªÖªµÀÄ¿µÄµÄµç»°ºÅÂë¾Í¿ÉÒÔʹÓÃÕâЩÎó²î£¬£¬£¬£¬ÎÞÐèÓëÓû§½»»¥¡£¡£¡£¡£ÈýÐÇÒѾÏòÆäËü¹©Ó¦ÉÌÌṩÏàʶ¾öÊÜÓ°ÏìоƬ×éÖÐÕâЩÎó²îµÄÇå¾²¸üУ¬£¬£¬£¬µ«Ã¿¸öÖÆÔìÉÌÕë¶ÔÆä×°±¸µÄ²¹¶¡Ê±¼ä±í»áÓÐËù²î±ð¡£¡£¡£¡£ÔÚ²¹¶¡¿ÉÓÃ֮ǰ£¬£¬£¬£¬Óû§¿ÉÒÔͨ¹ý½ûÓÃWi-Fiͨ»°ºÍLTEÓïÒô(VoLTE)À´±ÜÃâ»ù´øÔ¶³Ì´úÂëÖ´Ðй¥»÷¡£¡£¡£¡£
https://securityaffairs.com/143582/hacking/baseband-flaws-samsung-exynos.html
2¡¢º½¿Õ¹«Ë¾Safran GroupϵͳÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶
¾ÝýÌå3ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬·¨¹úµÄ¿ç¹úº½¿Õ¹«Ë¾Safran GroupϵͳÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£ÕâÊÇÈ«ÇòµÚ°Ë´óº½¿Õº½Ì칩ӦÉÌ£¬£¬£¬£¬2022ÄêµÄÊÕÈëÁè¼Ý190ÒÚÅ·Ôª¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬¿ªÔ´ÊÓÆµÍ¨»°Ó¦ÓóÌÐòJitsi MeetµÄ²âÊÔ°æÉèÖÃÖÐʹÓÃÁËÒ»¸ö¹ûÕæµÄÇéÐÎÎļþ¡£¡£¡£¡£¾ÝÔ¤¼Æ£¬£¬£¬£¬¸ÃÎļþÒѹûÕæÁËÒ»Äê°ë×óÓÒ¡£¡£¡£¡£Ð¹Â¶ÐÅÏ¢°üÀ¨LaravelÓ¦ÓóÌÐòÃÜÔ¿¡¢JSON WebÁîÅÆ(JWT)ÃÜÔ¿¡¢MySQLƾ֤ºÍSMTPƾ֤µÈ£¬£¬£¬£¬ÕâЩÃÜÔ¿ºÍƾ֤¿É±»¹¥»÷ÕßÓÃÀ´»á¼ûÍøÕ¾ºó¶Ë¡¢Ô±¹¤ÅÌËã»úºÍÆäËüЧÀÍÆ÷¡£¡£¡£¡£
https://cybernews.com/security/key-aerospace-player-leaks-sensitive-data/
3¡¢Latitude FinanceÔâµ½¹¥»÷й¶Áè¼Ý30Íò¿Í»§µÄÐÅÏ¢
ýÌå3ÔÂ15Èճƣ¬£¬£¬£¬½ðÈÚ´û¿î»ú¹¹Latitude FinanceÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬Áè¼Ý300000·Ý¿Í»§Éí·Ý֤ʵÎļþ±»µÁ¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬ÒÑÍù¼¸ÌìÔÚÆäϵͳÉϼì²âµ½Òì³£»£»£»£»£»î¶¯¡£¡£¡£¡£ÔÚ¹«Ë¾½ÓÄɲ½·¥Ç°£¬£¬£¬£¬ºÚ¿ÍÇÔÈ¡ÁËÔ±¹¤µÄµÇ¼ÐÅÏ¢£¬£¬£¬£¬ÒÔ»á¼ûÆäËüÁ½¼ÒЧÀÍÌṩÉ̳ÖÓеĿͻ§ÐÅÏ¢¡£¡£¡£¡£ÆäÖеÚÒ»¼ÒÌṩÉÌй¶ÁËÔ¼103000·ÝÉí·Ý֤ʵÎļþ£¬£¬£¬£¬µÚ¶þ¼ÒÌṩÉÌй¶ÁËÔ¼225000Ìõ¿Í»§¼Í¼¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬¹¥»÷Ô´×Ô¸ÃЧÀÍʹÓõÄÒ»¸ö¹©Ó¦ÉÌ¡£¡£¡£¡£
https://7news.com.au/business/retail/latitude-financial-hacked-as-300000-customer-identification-documents-stolen--c-10056836
4¡¢LockBitÉù³Æ¶Ôµ¼ÖÂEssendantÔËÓªÖÐÖ¹µÄ¹¥»÷ÈÏÕæ
3ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬°ì¹«ÓÃÆ··ÖÏúÉÌEssendantÔâµ½ÀÕË÷ÍÅ»ïLockBitµÄ¹¥»÷¡£¡£¡£¡£×Ô3ÔÂ6ÈÕÍíÉÏ×îÏÈ£¬£¬£¬£¬Essendant±¬·¢ÖÐÖ¹£¬£¬£¬£¬¿Í»§ÎÞ·¨Ï¶©µ¥»òÁªÏµEssendantµÄ¿Í»§Ð§ÀÍ¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ3ÔÂ7ÈÕ֪ͨÆä¿Í»§ÖØ´óÍøÂçÖÐÖ¹ÊÂÎñ¡£¡£¡£¡£3ÔÂ14ÈÕ£¬£¬£¬£¬LockBitÉù³Æ¶ÔEssendantµÄÍøÂç¹¥»÷ÈÏÕæ¡£¡£¡£¡£ÔÚLockBitÉùÃ÷ºó£¬£¬£¬£¬¸Ã¹«Ë¾Ì¸µ½ÆäÕýÔÚ¾ÙÐеĻָ´ÊÂÇ飬£¬£¬£¬°üÀ¨¼´½«Íê³ÉµÄϵͳÕûÀí£¬£¬£¬£¬µ«×îеÄÌû×ÓÈÔÈ»½«¸ÃÊÂÎñ¹é×ïÓÚ¡°ÍøÂçÖÐÖ¹¡±¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-essendant-attack-company-says-network-outage-/
5¡¢ÃÀ¹úUSMS 350GBµÄÖ´·¨ÐÅÏ¢ÒÔ15ÍòÃÀÔªÔÚºÚ¿ÍÂÛ̳³öÊÛ
ýÌå3ÔÂ15ÈÕ±¨µÀ³Æ£¬£¬£¬£¬ÃÀÍõ·¨¾¯¾Ö(USMS)µÄ350 GBÊý¾ÝÔÚÒ»¸ö¶íÓïºÚ¿ÍÂÛ̳ÉϳöÊÛ¡£¡£¡£¡£¾ÝÂô¼Ò³Æ£¬£¬£¬£¬¸ÃÊý¾Ý¿âµÄÊÛ¼ÛΪ150000ÃÀÔª£¬£¬£¬£¬ÆäÖаüÀ¨2021ÄêÖÁ2023Äê2ÔÂʱ´úÀ´×ÔÎļþЧÀÍÆ÷ºÍÊÂÇéÅÌËã»úµÄÎļþ£¬£¬£¬£¬²»»áÏñexeÎļþºÍ¿âÄÇÑùÂþÒç¡£¡£¡£¡£ÕâЩÐÅÏ¢°üÀ¨¾üÊ»ùµØºÍÆäËü¸ß¶ÈÇå¾²ÇøÓòµÄº½ÅľµÍ·ºÍÕÕÆ¬¡¢»¤ÕÕºÍÉí·ÝÖ¤¼þµÄ¸´Ó¡¼þ£¬£¬£¬£¬ÒÔ¼°ÇÔÌýºÍ¼àÊÓ¹«ÃñµÄÏêϸÐÅÏ¢¡£¡£¡£¡£»£»£»£»£»¹°üÀ¨ÓйØ×ï·¸¡¢°ïÆøÑæÄ¿ºÍ··¶¾¼¯ÍŵÄÐÅÏ¢£¬£¬£¬£¬²¿·ÖÎļþ±»±ê¼ÇΪÉñÃØ»ò¾øÃÜ¡£¡£¡£¡£USMSÉÐδ¶Ô´ËÊÂ×÷³ö»ØÓ¦¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hacker-selling-data-allegedly-stolen-in-us-marshals-service-hack/
6¡¢Check PointÐû²¼¹ØÓÚ×¢Èë³ÌÐòdotRunpeXµÄÆÊÎö±¨¸æ
3ÔÂ15ÈÕ£¬£¬£¬£¬Check Point ResearchÐû²¼Á˹ØÓÚ×¢Èë³ÌÐòdotRunpeX¼°ÆäÓë¾É°æ±¾µÄ¹ØÏµµÄÆÊÎö±¨¸æ¡£¡£¡£¡£DotRunpeXÊÇÒ»ÖÖʹÓÃProcess HollowingÊÖÒÕÔÚ.NETÖбàдµÄÐÂÐÍ×¢Èë³ÌÐò£¬£¬£¬£¬ÓÃÓÚѬȾ¾ßÓÐÖÖÖÖÒÑÖª¶ñÒâÈí¼þϵÁеÄϵͳ¡£¡£¡£¡£Ïà±ÈÓھɰ汾£¬£¬£¬£¬Ð°汾¾ßÓÐÊܶ¨ÖưæKoiVMÐéÄâÆ÷±£»£»£»£»£»¤¡¢¸ß¶È¿ÉÉèÖᢸü¶àUACÈÆ¹ýÊÖÒÕºÍʹÓüòÆÓµÄXOR½âÃÜҪעÈëµÄÖ÷ÒªpayloadµÈÌØµã¡£¡£¡£¡£ÏàËÆÖ®´¦ÊÇÓÃ.NET±àдµÄ64λ¿ÉÖ´ÐÐÎļþ.exeºÍÓÃÀ´×¢È뼸¸ö²î±ðµÄ¶ñÒâÈí¼þ¼Ò×åµÈ¡£¡£¡£¡£
https://research.checkpoint.com/2023/dotrunpex-demystifying-new-virtualized-net-injector-used-in-the-wild/