¼ÓÄôóYellow PagesÔâµ½Black BastaµÄÀÕË÷¹¥»÷

Ðû²¼Ê±¼ä 2023-04-26

1¡¢¼ÓÄôóYellow PagesÔâµ½Black BastaµÄÀÕË÷¹¥»÷


¾ÝýÌå4ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ £¬¼ÓÄôóĿ¼³öÊéÉÌYellow Pages Group͸¶ÆäÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£Black BastaÉù³ÆÆäΪ´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬ £¬²¢¹ûÕæÁ˰üÀ¨Éí·ÝÖ¤¼þ¡¢Ë°ÎñÎļþºÍÉúÒâЭÒéµÈÐÅÏ¢µÄÎļþÑù±¾¡£¡£¡£¡£Æ¾Ö¤Ð¹Â¶ÎļþµÄÈÕÆÚ¿ÉÒÔÈ·¶¨£¬£¬£¬£¬£¬£¬£¬ £¬¹¥»÷ËÆºõ±¬·¢ÔÚ3ÔÂ15ÈÕ»òÖ®ºó¡£¡£¡£¡£¸Ã¹«Ë¾¶Ô´ËÊÂÕö¿ªÊӲ죬£¬£¬£¬£¬£¬£¬ £¬·¢Ã÷Ô±¹¤Êý¾ÝºÍÉÌÒµ¿Í»§µÄÏà¹ØÐÅϢй¶¡£¡£¡£¡£ËûÃÇÏÖÒÑ֪ͨÊÜÓ°ÏìµÄСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬£¬ £¬²¢ÌåÏÖÏÖÔÚ»ù±¾ÉÏÒѾ­»Ö¸´ÁËËùÓÐЧÀÍ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/yellow-pages-canada-confirms-cyber-attack-as-black-basta-leaks-data/


2¡¢VMwareÐÞ¸´ÔÚPwn2OwnºÚ¿Í´óÈüÖб»Ê¹ÓõÄÁ½¸öÎó²î


¾Ý4ÔÂ25ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ £¬VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ £¬ÐÞ¸´ÁËÔÚPwn2Own Vancouver 2023ºÚ¿Í´óÈüÉÏÑÝʾµÄÁ½¸öÎó²î¡£¡£¡£¡£µÚÒ»¸öÊÇÀ¶ÑÀ×°±¸¹²Ïí¹¦Ð§ÖлùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î(CVE-2023-20869)£¬£¬£¬£¬£¬£¬£¬ £¬¿É±»ÍâµØ¹¥»÷ÕßÓÃÀ´×÷ΪÖ÷»úÉÏÔËÐеÄÐéÄâ»úVMXÀú³ÌÖ´ÐдúÂë¡£¡£¡£¡£µÚ¶þ¸öÊÇÓëVM¹²ÏíÖ÷»úÀ¶ÑÀ×°±¸µÄ¹¦Ð§ÖеÄÐÅϢй¶Îó²î(CVE-2023-20870)£¬£¬£¬£¬£¬£¬£¬ £¬¹¥»÷Õß¿ÉʹÓøÃÎó²î´ÓVM¶ÁÈ¡ÖÎÀí³ÌÐòÄÚ´æÖаüÀ¨µÄÌØÈ¨ÐÅÏ¢¡£¡£¡£¡£VMware»¹ÎªÎÞ·¨Á¬Ã¦×°Öò¹¶¡µÄÓû§ÌṩÁËÔÝʱ½â¾öÒªÁ죬£¬£¬£¬£¬£¬£¬ £¬¼´¹Ø±ÕÐéÄâ»úÉϵÄÀ¶ÑÀÖ§³Ö¡£¡£¡£¡£


https://securityaffairs.com/145287/security/vmware-fixes-critical-zero-days-pwn2own.html


3¡¢KasperskyÅû¶TomirisÕë¶ÔÖÐÑǵØÇøÍøÂçÇ鱨µÄ»î¶¯


4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬KasperskyÅû¶ÁËTomirisÔÚÖÐÑǵØÇøµÄ×îл¡£¡£¡£¡£¹¥»÷Ö÷ÒªÕë¶ÔCIS¹ú¼ÒµÄÕþ¸®ºÍÍâ½»»ú¹¹£¬£¬£¬£¬£¬£¬£¬ £¬ÆäÌØµãÊÇÇãÏòÓÚʹÓûù±¾µ«ÓÐÓõĴò°üºÍ·Ö·¢ÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬ £¬ÎÞÒâ»áʹÓÃÉÌÒµ»ò¿ªÔ´RAT¡£¡£¡£¡£TomirisʹÓÃÁËÖÖÖÖ¸÷ÑùµÄ¶ñÒâÈí¼þÖ²Èë³ÌÐò£¬£¬£¬£¬£¬£¬£¬ £¬ËüÃǵĿª·¢ËÙÂʺܿ죬£¬£¬£¬£¬£¬£¬ £¬²¢Ê¹ÓÃÁËËùÓпÉÒÔÏëÏóµÄ±à³ÌÓïÑÔ¡£¡£¡£¡£TomirisʹÓõŤ¾ß¿É·ÖΪÈýÀࣺÏÂÔØ³ÌÐò¡¢ºóÃźÍÎļþÇÔÈ¡³ÌÐò¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ £¬¸Ã»î¶¯ÖÐʹÓõÄKopiLuwakºÍTunnusSched½«ÆäÓëTurlaÁªÏµÆðÀ´¡£¡£¡£¡£


https://securelist.com/tomiris-called-they-want-their-turla-malware-back/109552/


4¡¢Ñо¿Ö°Ô±ÑÝʾÕë¶ÔIntel CPUµÄÐÂÐͲàÐŵÀ¹¥»÷ÒªÁì


4ÔÂ24ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËÓ°Ïì¶à´úIntel CPUµÄÐÂÐͲàÐŵÀ¹¥»÷ÒªÁ죬£¬£¬£¬£¬£¬£¬ £¬¿Éͨ¹ýEFLAGS¼Ä´æÆ÷й¶Êý¾Ý¡£¡£¡£¡£ÕâÖÖ¹¥»÷²»ÏñÆäËü²àÐŵÀ¹¥»÷ÄÇÑùÒÀÀµ»º´æÏµÍ³£¬£¬£¬£¬£¬£¬£¬ £¬¶øÊÇʹÓÃ˲ִ̬ÐÐÖеÄÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬£¬ £¬Í¨¹ýʱÐòÆÊÎö´ÓÓû§ÄÚ´æ¿Õ¼äÖÐÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¹¥»÷·ÖÁ½¸ö½×¶Î£¬£¬£¬£¬£¬£¬£¬ £¬µÚÒ»½×¶ÎÊÇ´¥·¢Ë²Ê±Ö´ÐУ¬£¬£¬£¬£¬£¬£¬ £¬²¢Í¨¹ýEFLAGS¼Ä´æÆ÷±àÂëÉñÃØÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ £¬µÚ¶þ½×¶ÎÊÇÕÉÁ¿KCCÖ¸ÁîµÄÖ´ÐÐʱ¼äÀ´½âÂëÊý¾Ý¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ £¬Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬£¬ £¬ÕâÖÖ׼ʱ¹¥»÷²»È绺´æ×´Ì¬µÄ²àÐŵÀ¹¥»÷¿É¿¿£¬£¬£¬£¬£¬£¬£¬ £¬ÒªÏëÔÚ×î½üµÄоƬÖÐÈ¡µÃ¸üºÃµÄЧ¹û£¬£¬£¬£¬£¬£¬£¬ £¬¾Í±ØÐ轫¹¥»÷ÖØ¸´Êýǧ´Î¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/intel-cpus-vulnerable-to-new-transient-execution-side-channel-attack/


5¡¢Î¢ÈíÔٴηºÆð¹ÊÕÏ£¬£¬£¬£¬£¬£¬£¬ £¬¶à¸öЧÀÍÖеÄËÑË÷¹¦Ð§ÎÞ·¨Ê¹ÓÃ


ýÌå4ÔÂ24Èճƣ¬£¬£¬£¬£¬£¬£¬ £¬Î¢ÈíÕýÔÚÊÓ²ìÓû§ÎÞ·¨ÔÚ¶à¸öMicrosoft 365ЧÀÍÖÐʹÓÃËÑË÷¹¦Ð§µÄÎÊÌâ¡£¡£¡£¡£¸ÃÎÊÌâÓ°ÏìÁËOutlook¡¢ExchangeºÍSharePointµÈЧÀÍ¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬£¬ £¬Î¢Èí»¹ÔÚ½â¾öÁíÒ»¸öÓ°ÏìÁËTeamsµÄÎÊÌ⣬£¬£¬£¬£¬£¬£¬ £¬ÓÐÓû§±¨¸æËµÔÚÆô¶¯Èí¼þʱ¿´µ½¹ýʧ¡£¡£¡£¡£×èÖ¹4ÔÂ25ÈÕ10:20 EDT£¬£¬£¬£¬£¬£¬£¬ £¬Î¢Èí³Æ´ó´ó¶¼Óû§µÄMicrosoft 365ËÑË÷ÎÊÌâÒÑ»ñµÃ½â¾ö¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬£¬£¬£¬ £¬Î¢ÈíÒ²Ôø·ºÆð¹ÊÕÏ£¬£¬£¬£¬£¬£¬£¬ £¬µ¼Ö¶à¸öMicrosoft 365ЧÀÍ̱»¾£¬£¬£¬£¬£¬£¬£¬ £¬È«ÇòÓû§ÎÞ·¨µÇ¼ÕË»§¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-365-search-outage-affects-outlook-teams-and-sharepoint/


6¡¢JFrogÐû²¼¹ØÓÚ¶ñÒâÈí¼þWhiteSnakeµÄÆÊÎö±¨¸æ


4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬ £¬JFrogÐû²¼ÁËÕë¶ÔPython¿ª·¢Ö°Ô±µÄ¶ñÒâÈí¼þWhiteSnakeµÄÆÊÎö±¨¸æ¡£¡£¡£¡£Ñо¿Ö°Ô±×î½üÔÚPyPI´æ´¢¿âÖз¢Ã÷ÁËÒ»¸öÓÃC#¿ª·¢µÄжñÒâÈí¼þpayload¡£¡£¡£¡£Í¨¹ý¼ì²âÈ·¶¨ÁË22¸ö°üÀ¨ÏàͬpayloadµÄ¶ñÒâ°ü£¬£¬£¬£¬£¬£¬£¬ £¬Í¬Ê±Õë¶ÔWindowsºÍLinuxϵͳ¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬ £¬Õë¶ÔWindowsµÄpayload±»È·¶¨ÎªWhiteSnakeµÄ±äÌ壬£¬£¬£¬£¬£¬£¬ £¬¾ßÓз´VM»úÖÆ£¬£¬£¬£¬£¬£¬£¬ £¬Ê¹ÓÃTorЭÒéÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬£¬ £¬²¢ÇÒÄܹ»´ÓÄ¿µÄÇÔÊØÐÅÏ¢²¢Ö´ÐÐÏÂÁî¡£¡£¡£¡£¶øLinux°æ±¾µÄpayloadÊÇÒ»¸ö¼òÆÓµÃ¶àµÄPython¾ç±¾£¬£¬£¬£¬£¬£¬£¬ £¬×¨×¢ÓÚÐÅÏ¢ÇÔÈ¡¡£¡£¡£¡£


https://jfrog.com/blog/new-malware-targets-python-developers-uses-tor-for-c2-communication/