ºê³ž(Acer)Ô¼160GBµÄÃô¸ÐÊý¾Ýй¶²¢ÔÚºÚ¿ÍÂÛ̳³öÊÛ

Ðû²¼Ê±¼ä 2023-03-08

1¡¢ºê³ž(Acer)Ô¼160GBµÄÃô¸ÐÊý¾Ýй¶²¢ÔÚºÚ¿ÍÂÛ̳³öÊÛ


¾ÝýÌå3ÔÂ6ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬ £¬Öйų́Íå¿Æ¼¼¹«Ë¾ºê³ž(Acer Inc.)µÄ´ó×ÚÊý¾Ýй¶¡£¡£¡£¡£¡£¹¥»÷ÕßKernelwareÔÚÒ»¸öÊ¢ÐеĺڿÍÂÛ̳ÉϳöÊÛËûÃÇÉù³ÆÔÚ2023Äê2ÔÂÖÐÑ®´ÓAcerÇÔÈ¡µÄ160GBÊý¾Ý¡£¡£¡£¡£¡£¹¥»÷Õß͸¶±»µÁÊý¾Ý°üÀ¨ÊÖÒÕÊֲᡢÈí¼þ¹¤¾ß¡¢ºó¶Ë»ù´¡ÉèÊ©ÏêϸÐÅÏ¢¡¢BIOSÓ³Ïñ¡¢ROMÎļþ¡¢ISOÎļþºÍÌæ»»Êý×Ö²úÆ·ÃÜÔ¿(RDPK)µÈ¡£¡£¡£¡£¡£×÷Ϊ¹¥»÷Ö¤¾Ý£¬£¬ £¬£¬£¬£¬ £¬¹¥»÷Õß¹ûÕæÁËAcer V206HQLÏÔʾÆÁµÄÊÖÒÕʾÒâͼ¡¢Îĵµ¡¢BIOS½ç˵ºÍÉñÃØÎĵµµÄÆÁÄ»½ØÍ¼¡£¡£¡£¡£¡£AcerÈ·ÈÏÆä¹©Î¬ÐÞÊÖÒÕְԱʹÓõÄÎļþЧÀÍÆ÷±»ÈëÇÖ£¬£¬ £¬£¬£¬£¬ £¬¿ÉÊǿͻ§Êý¾Ý²¢Î´ÊÜÓ°Ïì¡£¡£¡£¡£¡£


https://www.hackread.com/acer-data-breach-hacker-sell-data/


2¡¢GoogleÐû²¼3Ô·ÝAndroid¸üУ¬£¬ £¬£¬£¬£¬ £¬×ܼÆÐÞ¸´60¸öÎó²î


¾Ý3ÔÂ7ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬ £¬GoogleÐû²¼ÁË2023Äê3ÔµÄAndroidÇå¾²¸üУ¬£¬ £¬£¬£¬£¬ £¬¹²ÐÞ¸´ÁË60¸öÎó²î£¬£¬ £¬£¬£¬£¬ £¬°üÀ¨Á½¸öÑÏÖØµÄRCEÎó²î¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²îͨ¹ýÁ½¸ö×ÔÁ¦µÄÇå¾²²¹¶¡Ðû²¼£¬£¬ £¬£¬£¬£¬ £¬¼´2023-03-01ºÍ2023-03-05¡£¡£¡£¡£¡£Á½¸öRCEÎó²î»®·ÖΪCVE-2023-20951ºÍCVE-2023-20954£¬£¬ £¬£¬£¬£¬ £¬GoogleÒÑÒþ²Ø¹ØÓÚËüÃǵÄËùÓÐÐÅÏ¢£¬£¬ £¬£¬£¬£¬ £¬ÒÔ±ÜÃâ¹¥»÷ÕßÔÚÓû§Ó¦ÓøüÐÂ֮ǰ¾ÙÐй¥»÷¡£¡£¡£¡£¡£±¾ÔÂÐÞ¸´µÄ×îÑÏÖØµÄÎó²îÊDZÕÔ´Qualcomm×é¼þÖеÄCVE-2022-33213ºÍCVE-2022-33256¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/android-march-2023-update-fixes-two-critical-code-execution-flaws/


3¡¢Î÷°àÑÀ°ÍÈûÂÞÄÇÕïËùÒ½ÔºÔâµ½Ransom HouseÀÕË÷¹¥»÷


ýÌå3ÔÂ6Èճƣ¬£¬ £¬£¬£¬£¬ £¬Î÷°àÑÀ°ÍÈûÂÞÄÇÕïËùÒ½Ôº(Hospital Clinic de Barcelona) Ôâµ½¹¥»÷¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö¸ÃÖÐÐĵÄÅÌËã»úϵͳ崻ú£¬£¬ £¬£¬£¬£¬ £¬150Ïî·Ç½ôÆÈÊÖÊõºÍ¶à´ï3000ÏÕß¼ì²é±»×÷·Ï£¬£¬ £¬£¬£¬£¬ £¬Ò½ÔºÕýÔÚ½«ÐµĽôÆÈ²¡Àý×ªÒÆµ½ÊÐÄÚÆäËûÒ½Ôº¡£¡£¡£¡£¡£ÍâµØÒ»¼ÒÇå¾²»ú¹¹Í¸Â¶£¬£¬ £¬£¬£¬£¬ £¬Õâ´Î¹¥»÷À´×ÔÀÕË÷ÍÅ»ïRansom House£¬£¬ £¬£¬£¬£¬ £¬ÀÕË÷Èí¼þѬȾÁËҽԺʵÑéÊÒ¡¢¼±ÕïÊÒºÍÈý¸öÖ÷ÒªÖÐÐĵÄÒ©·¿ÒÔ¼°¼¸¸öÍⲿÕïËùµÄÅÌËã»ú¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúϵͳºÎʱ¿É»Ö¸´Õý³£¡£¡£¡£¡£¡£


https://securityaffairs.com/143121/cyber-crime/hospital-clinic-de-barcelona-ransomware.html


4¡¢µÂ¹úºÍÎÚ¿ËÀ¼Ö´·¨²¿·Ö¾Ð²¶DoppelPaymerµÄ½¹µã³ÉÔ±


3ÔÂ6ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬ £¬Å·ÖÞÐ̾¯×éÖ¯Ðû²¼£¬£¬ £¬£¬£¬£¬ £¬µÂ¹úºÍÎÚ¿ËÀ¼µÄÖ´·¨²¿·Ö¾Ð²¶ÁËÀÕË÷ÍÅ»ïDoppelPaymerµÄÁ½Ãû½¹µã³ÉÔ±¡£¡£¡£¡£¡£¾Ð²¶Ðж¯±¬·¢ÔÚ2023Äê2ÔÂ28ÈÕ£¬£¬ £¬£¬£¬£¬ £¬Í»»÷ËѲéÁËÒ»ÃûµÂ¹ú¹úÃñµÄºâÓ£¬ £¬£¬£¬£¬ £¬²¢ÔÚÎÚ¿ËÀ¼¶¼»á»ù¸¨ºÍ¹þ¶û¿Æ·ò¾ÙÐÐÁËÆÕ±éËѲé¡£¡£¡£¡£¡£µÂ¹úÕþ¸®ÒÔΪ£¬£¬ £¬£¬£¬£¬ £¬DoppelPaymer»î¶¯Éæ¼°5¸ö½¹µã³ÉÔ±£¬£¬ £¬£¬£¬£¬ £¬ËûÃÇά»¤¹¥»÷»ù´¡ÉèÊ©¡¢Êý¾ÝÐ¹Â¶ÍøÕ¾¡¢´¦Öóͷ£Ì¸Åв¢½«·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£Ö´·¨²¿·ÖÏÖÔÚÒÑ·¢³ö¾Ð²¶Á£¬ £¬£¬£¬£¬ £¬ÔÚÈ«Çò¹æÄ£ÄÚͨ¼©ÁíÍâ3ÃûÏÓÒÉÈË¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/core-doppelpaymer-ransomware-gang-members-targeted-in-europol-operation/


5¡¢SentinelOnÅû¶ʹÓÃRemcos RATÕë¶Ô¶«Å·µÄ´¹Âڻ


3ÔÂ6ÈÕ£¬£¬ £¬£¬£¬£¬ £¬SentinelOnÅû¶ÁËʹÓÃDBatLoader¼ÓÔØ³ÌÐò·Ö·¢Remcos RATµÄ´¹Âڻ£¬£¬ £¬£¬£¬£¬ £¬Ö÷ÒªÕë¶Ô¶«Å·»ú¹¹ºÍÆóÒµ¡£¡£¡£¡£¡£¹¥»÷ʼÓÚ°üÀ¨¼Ù·¢Æ±ºÍÕбêÎļþµÄ´¹ÂÚÓʼþ£¬£¬ £¬£¬£¬£¬ £¬°üÀ¨DBatLoader¿ÉÖ´ÐÐÎļþµÄtar.lz´æµµ¡£¡£¡£¡£¡£µÚÒ»½×¶Îpayloadαװ³ÉOffice¡¢LibreOffice»òPDFÎĵµ£¬£¬ £¬£¬£¬£¬ £¬Æô¶¯ºó»á´Ó¹«¹²ÔÆÐ§ÀÍÖлñÈ¡µÚ¶þ½×¶Îpayload¡£¡£¡£¡£¡£¼ÓÔØRemcos RAT֮ǰ£¬£¬ £¬£¬£¬£¬ £¬DBatLoader½¨Éè²¢Ö´ÐÐWindowsÅú´¦Öóͷ£¾ç±¾£¬£¬ £¬£¬£¬£¬ £¬ÒÔʹÓÃ2020ÄêËê¼µÄWindows UACÈÆ¹ýÒªÁì¡£¡£¡£¡£¡£×îÖÕ£¬£¬ £¬£¬£¬£¬ £¬Í¨¹ýÀú³Ì×¢ÈëµÄ·½·¨Ö´ÐÐRemcos¡£¡£¡£¡£¡£


https://www.sentinelone.com/blog/dbatloader-and-remcos-rat-sweep-eastern-europe/


6¡¢KasperskyÐû²¼2022ÄêH2¹¤Òµ×Ô¶¯»¯ÏµÍ³ÍþÐ²Ì¬ÊÆµÄ±¨¸æ


3ÔÂ6ÈÕ£¬£¬ £¬£¬£¬£¬ £¬KasperskyÐû²¼2022ÄêH2¹¤Òµ×Ô¶¯»¯ÏµÍ³ÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬£¬£¬£¬ £¬È«ÇòÊܵ½¹¥»÷µÄICSÅÌËã»úµÄ°Ù·Ö±ÈΪ34.3%£¬£¬ £¬£¬£¬£¬ £¬ÂÔ¸ßÓÚ2022ÉϰëÄ꣨31.8%£©¡£¡£¡£¡£¡£Ö÷ÒªÍþвȪԴÊÇ»¥ÁªÍø£¨19.9%£©¡¢µç×ÓÓʼþ¿Í»§¶Ë£¨6.4% £©ºÍ¿Éж³ýµÄ×°±¸£¨3.8%£©¡£¡£¡£¡£¡£Êܵ½´ËÀ๥»÷×î¶àµÄµØÇøÎª·ÇÖÞºÍÖÐÑÇ£¬£¬ £¬£¬£¬£¬ £¬Õ¼±È40.1%¡£¡£¡£¡£¡£Î÷Å·ºÍ±±Å·ÊÇ×îÇå¾²µÄµØÇø£¬£¬ £¬£¬£¬£¬ £¬»®·ÖΪ14.2%ºÍ14.3%¡£¡£¡£¡£¡£KasperskyÔÚ2022ϰëÄêÔÚ¹¤Òµ×Ô¶¯»¯ÏµÍ³Éϼì²âµ½À´×Ô7684¸ö²î±ð¼Ò×åµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£   

 

https://securelist.com/threat-landscape-for-industrial-automation-systems-for-h2-2022/108958/