TPM 2.0¿âÖÐ2¸ö»º³åÇøÒç³öÎó²î¿ÉÓ°ÏìÊýÊ®ÒŲ́װ±¸
Ðû²¼Ê±¼ä 2023-03-061¡¢TPM 2.0¿âÖÐ2¸ö»º³åÇøÒç³öÎó²î¿ÉÓ°ÏìÊýÊ®ÒŲ́װ±¸
¾ÝýÌå3ÔÂ3ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÐÅÆ½Ì¨Ä£¿£¿£¿£¿£¿é(TPM)2.0²Î¿¼¿â¹æ·¶Öб£´æÁ½¸ö»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄܻᵼÖÂÐÅϢй¶»òȨÏÞÌáÉý¡£¡£¡£ËüÃÇ»®·ÖÊÇÔ½½ç¶ÁÈ¡Îó²î£¨CVE-2023-1017£©ºÍÔ½½çдÈëÎó²î£¨ CVE-2023-1018£©£¬£¬£¬£¬£¬£¬£¬£¬¶¼Óë¹æ·¶ÈçÄÇÀïÖÃijЩTPMÏÂÁîµÄ²ÎÊýÓйأ¬£¬£¬£¬£¬£¬£¬£¬¿É±»¾ÓÉÉí·ÝÑéÖ¤µÄÍâµØ¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆÏÂÁîÔÚTPMÄÚÖ´ÐдúÂëÀ´Ê¹Óᣡ£¡£QuarkslabÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄÜ»áÓ°ÏìÊýÊ®ÒŲ́װ±¸¡£¡£¡£
https://thehackernews.com/2023/03/new-flaws-in-tpm-20-library-pose-threat.html
2¡¢Î¢ÈíÐû²¼¸üÐÂÐÞ¸´Intel CPUµÄMMIO³Â¸¯Êý¾ÝÎó²î
¾Ý3ÔÂ2ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼ÁË´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËIntel CPUµÄMMIO³Â¸¯Êý¾Ý£¨Memory Mapped I/O Stale Data£©Îó²î¡£¡£¡£Îó²î×î³õÓÉIntelÓÚ2022Äê6ÔÂ14ÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃÀ´ÔÚÐéÄâ»úÖÐÔËÐеÄÀú³Ì»á¼ûÁíÒ»¸öÐéÄâ»úÖеÄÊý¾Ý¡£¡£¡£ÕâЩÎó²î°üÀ¨¹²Ïí»º³åÇøÊý¾Ý¶ÁÈ¡£¡£¡£¨CVE-2022-21123£©¡¢ ¹²Ïí»º³åÇøÊý¾Ý²ÉÑù£¨CVE-2022-21125£©¡¢ÌØÊâ¼Ä´æÆ÷»º³åÇøÊý¾Ý²ÉÑù¸üУ¨CVE-2022-21127£©ºÍ×°±¸¼Ä´æÆ÷²¿·ÖдÈ루CVE-2022-21166£©¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-security-updates-for-intel-cpu-flaws/
3¡¢Ñо¿Ö°Ô±Åû¶Õë¶ÔÄ«Î÷¸ç½ðÈÚ»ú¹¹µÄATM¶ñÒâÈí¼þFiXS
ýÌå3ÔÂ4Èճƣ¬£¬£¬£¬£¬£¬£¬£¬Metabase QµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪFiXSµÄÐÂÐÍATM¶ñÒâÈí¼þ¡£¡£¡£×Ô2023Äê2ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ±»ÓÃÓÚ¹¥»÷Ä«Î÷¸çµÄÒøÐС£¡£¡£FiXSµÄÏÔÖøÌØÕ÷Ö®Ò»ÊÇʹÓÃWindows GetTickCount API£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ×îºóÒ»´ÎATM»úÖØÆô30·ÖÖÓºóÈ¡¿î¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬³õʼ¹¥»÷ÔØÌåÉв»ÇåÎú£¬£¬£¬£¬£¬£¬£¬£¬µ«FiXSʹÓÃÁËÒ»¸öÍⲿ¼üÅÌ£¨ÀàËÆÓÚPloutus£©¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ËüÓ빩ӦÉÌÎ޹أ¬£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÈκÎÖ§³ÖCEN XFSµÄATM¡£¡£¡£
https://www.metabaseq.com/fixs-atms-malware/
4¡¢ÀÕË÷ÍÅ»ïPlay¹ûÕæ´Ó¼ÓÖݰ¿ËÀ¼ÊÐÇÔÈ¡µÄÔ¼10GBÊý¾Ý
3ÔÂ5ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïPlayÒÑ×îÏÈй¶´Ó°Â¿ËÀ¼ÊÐÇÔÈ¡µÄÊý¾Ý¡£¡£¡£°Â¿ËÀ¼ÊÐÓÚ2ÔÂ10ÈÕÅû¶ÁËÒ»´ÎÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷»î¶¯Ê¼ÓÚ2ÔÂ8ÈÕ¡£¡£¡£Å¦Ô¼ÊÐÓÚ2ÔÂ14ÈÕÐû²¼³Æ£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÊܵ½ÀÕË÷¹¥»÷Ó°Ï죬£¬£¬£¬£¬£¬£¬£¬ÍâµØ½øÈë½ôÆÈ״̬¡£¡£¡£3ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Å¦Ô¼Êгƹ¥»÷Õß´ÓÆäϵͳÖлñÈ¡Á˲¿·ÖÎļþ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÍþвҪ¹ûÕæ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬PlayÔÚÆäÍøÕ¾Ðû²¼ÁË10GBµÄRARÎĵµ£¬£¬£¬£¬£¬£¬£¬£¬Éæ¼°Éí·ÝÖ¤ºÍ»¤ÕÕµÈСÎÒ˽¼ÒÐÅÏ¢ÒÔ¼°²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÈôÊÇûÓз´Ó¦£¬£¬£¬£¬£¬£¬£¬£¬½«ÉÏ´«ÍêÕûµÄת´¢ÐÅÏ¢¡£¡£¡£
https://securityaffairs.com/143037/cyber-crime/play-ransomware-leaks-city-of-oakland.html
5¡¢Mustang PandaʹÓÃкóÃÅMQsTTang¹¥»÷Å·ÖÞµÄ×éÖ¯
3ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ESETÅû¶ÁËMustang PandaʹÓÃкóÃÅMQsTTangµÄ¹¥»÷»î¶¯¡£¡£¡£»£»£»£»£»î¶¯Ê¼ÓÚ2023Äê1Ô£¬£¬£¬£¬£¬£¬£¬£¬ESET»¹·¢Ã÷Õë¶Ô±£¼ÓÀûÑÇ¡¢°Ä´óÀûÑÇÒÔ¼°Öйų́ÍåµÄ×éÖ¯µÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Åú×¢¹¥»÷ÖØµãÊÇÅ·ÖÞºÍÑÇÖÞ¡£¡£¡£MQsTTangÖ§³Ö³£¼ûµÄºóÃŹ¦Ð§£¬£¬£¬£¬£¬£¬£¬£¬ÆäÌØµãÖ®Ò»ÊÇʹÓÃMQTTÐÒé¾ÙÐÐC&CͨѶ¡£¡£¡£Õâ¸öкóÃÅÌṩÁËÒ»ÖÖÔ¶³Ìshell£¬£¬£¬£¬£¬£¬£¬£¬Ã»ÓÐÈκÎÓë¸ÃÍÅ»ïµÄÆäËü¶ñÒâÈí¼þÏà¹ØµÄ¸½¼Ó¹¦Ð§¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬£¬ÕâÅú×¢Mustang PandaÕýÔÚΪÆä¹¤¾ß̽Ë÷еÄÊÖÒÕÕ»¡£¡£¡£
https://www.welivesecurity.com/2023/03/02/mqsttang-mustang-panda-latest-backdoor-treads-new-ground-qt-mqtt/
6¡¢½ðÈÚÊÖÒÕ¹«Ë¾Hatch Bank½ü14Íò¿Í»§µÄСÎÒ˽¼ÒÐÅϢй¶
ýÌå3ÔÂ2ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬Hatch Bank͸¶£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃGoAnywhere MFTÈí¼þÖеÄÎó²îÇÔÈ¡ÁËÆä139493¸ö¿Í»§µÄÊý¾Ý¡£¡£¡£Hatch BankÊÇÒ»¼Ò½ðÈÚÊÖÒÕ¹«Ë¾£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíСÆóÒµ´ÓÆäËû½ðÈÚ»ú¹¹»ñµÃÒøÐÐЧÀÍ¡£¡£¡£2023Äê1ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬FortraµÃÖªÆäÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£2ÔÂ3ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Hatch BankÊÕµ½FortraµÄ֪ͨ£¬£¬£¬£¬£¬£¬£¬£¬»ñϤÆäÔÚFortra GoAnywhereµÄÎļþÔ⵽δ¾ÊÚȨµÄ»á¼û¡£¡£¡£Í¨¹ý¶Ô±»µÁÊý¾ÝµÄÉó²é£¬£¬£¬£¬£¬£¬£¬£¬È·¶¨¿Í»§µÄÐÕÃûºÍÉç»áÇå¾²ºÅÂë±»¹¥»÷ÕßµÁÓᣡ£¡£¸Ã¹«Ë¾½«ÎªÊÜÓ°ÏìÓû§Ìṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hatch-bank-discloses-data-breach-after-goanywhere-mft-hack/


¾©¹«Íø°²±¸11010802024551ºÅ