MIT·¢ÏÖÕë¶ÔApple M1 CPUµÄ¹¥»÷·½Ê½PACMAN

Ðû²¼Ê±¼ä 2022-06-13

1¡¢MITÑо¿ÍŶӷ¢ÏÖÕë¶ÔApple M1 CPUµÄ¹¥»÷·½Ê½PACMAN


¾ÝýÌå6ÔÂ11ÈÕ±¨µÀ£¬ÂéÊ¡Àí¹¤Ñ§Ôº£¨MIT£©µÄÑо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖеÄÓ²¼þ¹¥»÷¼¼ÊõPACMAN£¬¿ÉÒÔÈÆ¹ýApple M1 CPUÉϵÄÖ¸ÕëÑéÖ¤¡£Ö¸ÕëÉí·ÝÑéÖ¤´úÂë(PAC)ÓÃÀ´¼ì²âºÍ·ÀÖ¹ÄÚ´æÖÐÖ¸ÕëµÄÒâÍâ¸ü¸Ä£¬ÕâÖÖÐµĹ¥»÷·½Ê½¿É±»¾ßÓÐÎïÀí·ÃÎÊȨÏ޵Ĺ¥»÷ÕßÓÃÀ´·ÃÎÊ´øÓÐApple M1 CPUµÄMacµÄµ×²ãÎļþϵͳ£¬²¢¿ÉÄܵ¼ÖÂÈÎÒâ´úÂëÖ´ÐС£Apple¹«Ë¾ÌåÏÖ£¬ÕâÖÖ²àÐŵÀ¹¥»÷»¹ÐèÒªÆäËüÄþ¾²Â©¶´²ÅÆøÉúЧ£¬Òò´Ë²»»á¶ÔMacÓû§×é³ÉÍþв¡£


https://securityaffairs.co/wordpress/132154/hacking/pacman-attack-apple-m1-cpus.html


2¡¢Confluence·þÎñÆ÷Ôâµ½AvosLockerµÈÀÕË÷ÍÅ»ïµÄ¹¥»÷


ýÌå6ÔÂ11Èճƣ¬¶à¸öÀÕË÷ÍÅ»ïÀûÓÃOGNL×¢Èë©¶´(CVE-2022-26134)¹¥»÷Atlassian Confluence·þÎñÆ÷¡£Prodaft·¢ÏÖ£¬AvosLockerÍÅ»ïÕýÔÚ´ó¹æÄ£É¨Ãè²¢ÈëÇÖ̻¶µÄConfluence·þÎñÆ÷£¬ÒѾ­ÀÖ³ÉѬȾÁËÃÀ¹ú¡¢Å·Ö޺ͰĴóÀûÑǵȵØÓòµÄ¶à¸ö×éÖ¯¡£´ËÍ⣬²¿ÃÅÒÑÔâµ½¹¥»÷µÄÄ¿±ê³ÂËߣ¬ÀÕË÷Èí¼þCerber2021£¨Ò²³ÆCerberImposter£©Ò²ÔÚÕë¶Ôδ´ò²¹¶¡µÄConfluenceʵÀý¡£Î¢ÈíÒ²ÔÚ6ÔÂ10ÈÕ֤ʵ£¬ËûÃǼì²âµ½ÓÐConfluence·þÎñÆ÷±»ÓÃÀ´°²×°Cerber2021¡£


https://www.bleepingcomputer.com/news/security/confluence-servers-hacked-to-deploy-avoslocker-cerber2021-ransomware/


3¡¢Ñо¿ÍŶӷ¢ÏÖÕë¶ÔÀ­¶¡ÃÀÖÞµÄLinux¶ñÒâÈí¼þSymbiote


¾Ý6ÔÂ9ÈÕ±¨µÀ£¬BlackBerryºÍIntezer·¢ÏÖÁËÒ»ÖÖÐµļ¸ºõ²»ÐÐÄܼì²âµ½µÄLinux¶ñÒâÈí¼þSymbiote¡£¾ÝÐÅ£¬Symbiote±³ºóµÄÔËÓªÍÅ»ïÓÚ2021Äê11Ô¾ͿªÊ¼¿ª·¢¸Ã¶ñÒâÈí¼þ£¬Ö÷ÒªÀûÓÃËüÀ´¹¥»÷À­¶¡ÃÀÖ޵ĽðÈÚÐÐÒµ£¬°üÂÞ°ÍÎ÷ÒøÐкÍCaixaµÈÒøÐС£¸Ã¶ñÒâÈí¼þ»áѬȾĿ±êϵͳÉÏËùÓÐÕýÔÚÔËÐеĽø³Ì£¬ÇÔÈ¡ÕÊ»§Æ¾¾Ý£¬²¢Îª¹¥»÷ÕßÌṩºóÃÅ·ÃÎÊȨÏÞ¡£Ëü»¹Ê¹ÓÃÁËÀ©Õ¹µÄ²®¿ËÀûÊý¾Ý°ü¹ýÂËÆ÷(eBPF)¹¦Ð§À´Òþ²ØÆäÍøÂçÁ÷Á¿£¬ÒÔÈÆ¹ýÄþ¾²¹¤¾ßµÄ¼ì²â¡£


https://thehackernews.com/2022/06/symbiote-stealthy-linux-malware.html


4¡¢ÒÁÀÊLycaeumÀûÓÃеÄDNSºóÃŹ¥»÷Öж«µÄÄÜÔ´ÐÐÒµ


ZscalerÔÚ6ÔÂ9Èճƣ¬ÒÁÀÊAPT×éÖ¯LycaeumÀûÓûùÓÚ.NETµÄDNSºóÃŹ¥»÷Öж«µÄÄÜÔ´ºÍµçÐÅÐÐÒµµÄ¹«Ë¾¡£LyceumÒ²³ÆHexane»òSpilrin£¬Ö®Ç°Ê¹ÓÃDNSËíµÀºóÃŹ¥»÷Öж«µÄͨÐÅ·þÎñÌṩÉÌ¡£´Ë´Î»î¶¯Ê¹ÓõÄжñÒâÈí¼þÊÇ¿ªÔ´¹¤¾ß¡°DIG.net¡±µÄ¶¨Öư汾£¬¿ÉÓÃÓÚ½øÐÐDNS½Ù³Ö¹¥»÷¡¢Ö´ÐÐÃüÁî¡¢·Ö·¢ÆäËüpayloadºÍй¶Êý¾Ý¡£¹¥»÷ʼÓÚÒ»¸ö´øÓжñÒâºêµÄWordÎĵµ£¬Î±×°³ÉÒÁÀʾüÊÂÖ÷ÌâµÄÐÂÎű¨µÀ¡£µ±Ä¿±êÆôÓúêÖ®ºó£¬DNSºóÃŽ«Ö±½Ó±»·ÅÈëStartupÎļþ¼Ð¡£


https://www.bleepingcomputer.com/news/security/iranian-hackers-target-energy-sector-with-new-dns-backdoor/


5¡¢ÃÀ¹úÒ½ÁÆ»ú¹¹YRMC֪ͨԼ70Íò»¼Õ߯äÊý¾Ý¿ÉÄÜй¶


¾ÝýÌå6ÔÂ11ÈÕ±¨µÀ£¬ÃÀ¹úÑÇÀûÉ£ÄÇÖÝÓÈÂíµØÓòÒ½ÁÆÖÐÐÄ(YRMC)³ÆÆäÔâµ½ÁËÀÕË÷¹¥»÷¡£4ÔÂ25ÈÕ£¬YRMC·¢ÏÖ²¿ÃÅÄÚ²¿ÏµÍ³Ñ¬È¾ÁËÀÕË÷Èí¼þ¡£Ö®ºó£¬¸Ã»ú¹¹Á¢¼´½ÓÄÉÐж¯£¬¹Ø±ÕÁËϵͳ²¢ÓëÖ´·¨²¿ÃÅÏàͬ¡£¾­ÊӲ죬¹¥»÷ÕßÔÚ4ÔÂ21ÈÕÖÁ4ÔÂ25ÈÕ·ÃÎÊÁËYRMCµÄÍøÂ磬²¢ÓÚ´ËÆÚ¼äɾ³ýÁËϵͳÖеIJ¿ÃÅÎļþ¡£´Ë´Îʼþ¿ÉÄÜй¶ÁËÐÕÃû¡¢Éç»áÄþ¾²ºÅÂë¡¢½¡¿µ±£ÏÕÐÅÏ¢ºÍÒ½ÁÆÐÅÏ¢µÈ£¬Éæ¼°Ô¼700000Ãû»¼Õß¡£YRMCÒÑÏòÊÜÓ°ÏìµÄ»¼Õß·¢ËÍ֪ͨÓʼþ£¬²¢ÎªÇкÏÌõ¼þµÄÈËÌṩÃâ·ÑµÄÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ± £»¤·þÎñ¡£


https://www.databreaches.net/yuma-regional-medical-center-notifying-approximately-700000-patients-of-ransomware-attack/


6¡¢Unit 42Ðû²¼¹ØÓÚÀÕË÷Èí¼þ¼Ò×åHelloXDµÄ·ÖÎö³ÂËß


6ÔÂ10ÈÕ£¬Unit 42Ðû²¼Á˹ØÓÚÀÕË÷Èí¼þ¼Ò×åHelloXDµÄ¼¼Êõ·ÖÎö³ÂËß¡£¸Ã¶ñÒâÈí¼þÓÚ2021Äê11ÔÂÊ״α»·¢ÏÖ£¬»ùÓÚй¶µÄBabukÔ´´úÂë¡£Hello XDĿǰ²¢Î´Ê¹ÓÃTorÖ§¸¶ÍøÕ¾£¬¶øÊÇÖ±½Óͨ¹ýTOXÁÄÌì·þÎñ½øÐÐ̸ÅС£Ñо¿ÈËÔ±·¢ÏÖÆäÖÐÒ»¸öÑù±¾°²×°ÁËMicroBackdoor£¬ÕâÊÇÒ»¸ö¿ªÔ´ºóÃÅ£¬¿É±»ÓÃÀ´ä¯ÀÀÎļþϵͳ¡¢ÉÏ´«ºÍÏÂÔØÎļþ¡¢Ö´ÐÐÃüÁî²¢½«Æä×ÔÉí´ÓϵͳÖÐɾ³ý¡£´ËÍ⣬ÔÚÑùÌìÖ°ÎöÆÚ¼ä£¬Unit 42·¢ÏÖÁËÒ»¸öǶÈëʽIPµØÖ·£¬Ê¹ÆäÍÆ¶Ï¿ª·¢Õß¿ÉÄÜÊǶíÂÞ˹ÍÅ»ïx4k£¬Ò²³ÆÎªL4ckyguyºÍunKn0wn¡£


https://unit42.paloaltonetworks.com/helloxd-ransomware/