MIT·¢Ã÷Õë¶ÔApple M1 CPUµÄ¹¥»÷·½·¨PACMAN

Ðû²¼Ê±¼ä 2022-06-13

1¡¢MITÑо¿ÍŶӷ¢Ã÷Õë¶ÔApple M1 CPUµÄ¹¥»÷·½·¨PACMAN


¾ÝýÌå6ÔÂ11ÈÕ±¨µÀ£¬ £¬£¬ÂéÊ¡Àí¹¤Ñ§Ôº£¨MIT£©µÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄÓ²¼þ¹¥»÷ÊÖÒÕPACMAN£¬ £¬£¬¿ÉÒÔÈÆ¹ýApple M1 CPUÉϵÄÖ¸ÕëÑéÖ¤¡£¡£¡£Ö¸ÕëÉí·ÝÑéÖ¤´úÂë(PAC)ÓÃÀ´¼ì²âºÍ±ÜÃâÄÚ´æÖÐÖ¸ÕëµÄÒâÍâ¸ü¸Ä£¬ £¬£¬ÕâÖÖÐµĹ¥»÷·½·¨¿É±»¾ßÓÐÎïÆÊÎö¼ûȨÏ޵Ĺ¥»÷ÕßÓÃÀ´»á¼û´øÓÐApple M1 CPUµÄMacµÄµ×²ãÎļþϵͳ£¬ £¬£¬²¢¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐС£¡£¡£Apple¹«Ë¾ÌåÏÖ£¬ £¬£¬ÕâÖÖ²àÐŵÀ¹¥»÷»¹ÐèÒªÆäËüÇå¾²Îó²î²Å»ªÉúЧ£¬ £¬£¬Òò´Ë²»»á¶ÔMacÓû§×é³ÉÍþв¡£¡£¡£


https://securityaffairs.co/wordpress/132154/hacking/pacman-attack-apple-m1-cpus.html


2¡¢ConfluenceЧÀÍÆ÷Ôâµ½AvosLockerµÈÀÕË÷ÍÅ»ïµÄ¹¥»÷


ýÌå6ÔÂ11Èճƣ¬ £¬£¬¶à¸öÀÕË÷ÍÅ»ïʹÓÃOGNL×¢ÈëÎó²î(CVE-2022-26134)¹¥»÷Atlassian ConfluenceЧÀÍÆ÷¡£¡£¡£Prodaft·¢Ã÷£¬ £¬£¬AvosLockerÍÅ»ïÕýÔÚ´ó¹æÄ£É¨Ãè²¢ÈëÇÖ̻¶µÄConfluenceЧÀÍÆ÷£¬ £¬£¬ÒѾ­ÀÖ³ÉѬȾÁËÃÀ¹ú¡¢Å·Ö޺ͰĴóÀûÑǵȵØÇøµÄ¶à¸ö×éÖ¯¡£¡£¡£±ðµÄ£¬ £¬£¬²¿·ÖÒÑÔâµ½¹¥»÷µÄÄ¿µÄ±¨¸æ£¬ £¬£¬ÀÕË÷Èí¼þCerber2021£¨Ò²³ÆCerberImposter£©Ò²ÔÚÕë¶Ôδ´ò²¹¶¡µÄConfluenceʵÀý¡£¡£¡£Î¢ÈíÒ²ÔÚ6ÔÂ10ÈÕ֤ʵ£¬ £¬£¬ËûÃǼì²âµ½ÓÐConfluenceЧÀÍÆ÷±»ÓÃÀ´×°ÖÃCerber2021¡£¡£¡£


https://www.bleepingcomputer.com/news/security/confluence-servers-hacked-to-deploy-avoslocker-cerber2021-ransomware/


3¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔÀ­¶¡ÃÀÖÞµÄLinux¶ñÒâÈí¼þSymbiote


¾Ý6ÔÂ9ÈÕ±¨µÀ£¬ £¬£¬BlackBerryºÍIntezer·¢Ã÷ÁËÒ»ÖÖеÄÏÕЩ²»¿ÉÄܼì²âµ½µÄLinux¶ñÒâÈí¼þSymbiote¡£¡£¡£¾ÝÐÅ£¬ £¬£¬Symbiote±³ºóµÄÔËÓªÍÅ»ïÓÚ2021Äê11Ô¾Í×îÏÈ¿ª·¢¸Ã¶ñÒâÈí¼þ£¬ £¬£¬Ö÷ҪʹÓÃËüÀ´¹¥»÷À­¶¡ÃÀÖ޵ĽðÈÚÐÐÒµ£¬ £¬£¬°üÀ¨°ÍÎ÷ÒøÐкÍCaixaµÈÒøÐС£¡£¡£¸Ã¶ñÒâÈí¼þ»áѬȾĿµÄϵͳÉÏËùÓÐÕýÔÚÔËÐеÄÀú³Ì£¬ £¬£¬ÇÔÈ¡ÕÊ»§Æ¾Ö¤£¬ £¬£¬²¢Îª¹¥»÷ÕßÌṩºóÃÅ»á¼ûȨÏÞ¡£¡£¡£Ëü»¹Ê¹ÓÃÁËÀ©Õ¹µÄ²®¿ËÀûÊý¾Ý°ü¹ýÂËÆ÷(eBPF)¹¦Ð§À´Òþ²ØÆäÍøÂçÁ÷Á¿£¬ £¬£¬ÒÔÈÆ¹ýÇå¾²¹¤¾ßµÄ¼ì²â¡£¡£¡£


https://thehackernews.com/2022/06/symbiote-stealthy-linux-malware.html


4¡¢ÒÁÀÊLycaeumʹÓÃеÄDNSºóÃŹ¥»÷Öж«µÄÄÜÔ´ÐÐÒµ


ZscalerÔÚ6ÔÂ9Èճƣ¬ £¬£¬ÒÁÀÊAPT×éÖ¯LycaeumʹÓûùÓÚ.NETµÄDNSºóÃŹ¥»÷Öж«µÄÄÜÔ´ºÍµçÐÅÐÐÒµµÄ¹«Ë¾¡£¡£¡£LyceumÒ²³ÆHexane»òSpilrin£¬ £¬£¬Ö®Ç°Ê¹ÓÃDNSËíµÀºóÃŹ¥»÷Öж«µÄͨѶЧÀÍÌṩÉÌ¡£¡£¡£´Ë´Î»î¶¯Ê¹ÓõÄжñÒâÈí¼þÊÇ¿ªÔ´¹¤¾ß¡°DIG.net¡±µÄ¶¨Öư汾£¬ £¬£¬¿ÉÓÃÓÚ¾ÙÐÐDNSÐ®ÖÆ¹¥»÷¡¢Ö´ÐÐÏÂÁî¡¢·Ö·¢ÆäËüpayloadºÍй¶Êý¾Ý¡£¡£¡£¹¥»÷ʼÓÚÒ»¸ö´øÓжñÒâºêµÄWordÎĵµ£¬ £¬£¬Î±×°³ÉÒÁÀʾüÊÂÖ÷ÌâµÄÐÂÎű¨µÀ¡£¡£¡£µ±Ä¿µÄÆôÓúêÖ®ºó£¬ £¬£¬DNSºóÃŽ«Ö±½Ó±»·ÅÈëStartupÎļþ¼Ð¡£¡£¡£


https://www.bleepingcomputer.com/news/security/iranian-hackers-target-energy-sector-with-new-dns-backdoor/


5¡¢ÃÀ¹úÒ½ÁÆ»ú¹¹YRMC֪ͨԼ70Íò»¼Õ߯äÊý¾Ý¿ÉÄÜй¶


¾ÝýÌå6ÔÂ11ÈÕ±¨µÀ£¬ £¬£¬ÃÀ¹úÑÇÀûÉ£ÄÇÖÝÓÈÂíµØÇøÒ½ÁÆÖÐÐÄ(YRMC)³ÆÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£¡£¡£4ÔÂ25ÈÕ£¬ £¬£¬YRMC·¢Ã÷²¿·ÖÄÚ²¿ÏµÍ³Ñ¬È¾ÁËÀÕË÷Èí¼þ¡£¡£¡£Ö®ºó£¬ £¬£¬¸Ã»ú¹¹Á¬Ã¦½ÓÄÉÐж¯£¬ £¬£¬¹Ø±ÕÁËϵͳ²¢ÓëÖ´·¨²¿·ÖÏàͬ¡£¡£¡£¾­ÊӲ죬 £¬£¬¹¥»÷ÕßÔÚ4ÔÂ21ÈÕÖÁ4ÔÂ25ÈÕ»á¼ûÁËYRMCµÄÍøÂ磬 £¬£¬²¢ÓÚ´Ëʱ´úɾ³ýÁËϵͳÖеIJ¿·ÖÎļþ¡£¡£¡£´Ë´ÎÊÂÎñ¿ÉÄÜй¶ÁËÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢¿µ½¡°ü¹ÜÐÅÏ¢ºÍÒ½ÁÆÐÅÏ¢µÈ£¬ £¬£¬Éæ¼°Ô¼700000Ãû»¼Õß¡£¡£¡£YRMCÒÑÏòÊÜÓ°ÏìµÄ»¼Õß·¢ËÍ֪ͨÓʼþ£¬ £¬£¬²¢ÎªÇкÏÌõ¼þµÄÈËÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ¡£¡£¡£


https://www.databreaches.net/yuma-regional-medical-center-notifying-approximately-700000-patients-of-ransomware-attack/


6¡¢Unit 42Ðû²¼¹ØÓÚÀÕË÷Èí¼þ¼Ò×åHelloXDµÄÆÊÎö±¨¸æ


6ÔÂ10ÈÕ£¬ £¬£¬Unit 42Ðû²¼Á˹ØÓÚÀÕË÷Èí¼þ¼Ò×åHelloXDµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äê11ÔÂÊ״α»·¢Ã÷£¬ £¬£¬»ùÓÚй¶µÄBabukÔ´´úÂë¡£¡£¡£Hello XDÏÖÔÚ²¢Î´Ê¹ÓÃTorÖ§¸¶ÍøÕ¾£¬ £¬£¬¶øÊÇÖ±½Óͨ¹ýTOX̸ÌìЧÀ;ÙÐÐ̸ÅС£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÆäÖÐÒ»¸öÑù±¾×°ÖÃÁËMicroBackdoor£¬ £¬£¬ÕâÊÇÒ»¸ö¿ªÔ´ºóÃÅ£¬ £¬£¬¿É±»ÓÃÀ´ä¯ÀÀÎļþϵͳ¡¢ÉÏ´«ºÍÏÂÔØÎļþ¡¢Ö´ÐÐÏÂÁî²¢½«Æä×ÔÉí´ÓϵͳÖÐɾ³ý¡£¡£¡£±ðµÄ£¬ £¬£¬ÔÚÑùÌìÖ°Îöʱ´ú£¬ £¬£¬Unit 42·¢Ã÷ÁËÒ»¸öǶÈëʽIPµØµã£¬ £¬£¬Ê¹ÆäÍÆ¶Ï¿ª·¢Õß¿ÉÄÜÊǶíÂÞ˹ÍÅ»ïx4k£¬ £¬£¬Ò²³ÆÎªL4ckyguyºÍunKn0wn¡£¡£¡£


https://unit42.paloaltonetworks.com/helloxd-ransomware/