Realtek SoCÖеÄ©¶´Ó°Ïì¶à¸öOEMµÄÊý°ÙÍòÉ豸

Ðû²¼Ê±¼ä 2022-08-17
1¡¢Realtek SoCÖеÄ©¶´Ó°Ïì¶à¸öOEMµÄÊý°ÙÍòÉ豸

      

¾Ý8ÔÂ16ÈÕ±¨µÀ£¬Ñо¿ÈËÔ±Ðû²¼ÁËÀûÓÃRealtek RTL819xƬÉÏϵͳ£¨SoC£©µÄÍøÂçÉ豸ÖЩ¶´µÄ¹¥»÷´úÂ룬Ԥ¼ÆÊÜÓ°ÏìÉ豸¶à´ïÊý°ÙÍǫ̀ ¡£ÕâÊÇ»ùÓÚ¶ÑÕ»µÄ»º³åÇøÒç³ö©¶´£¨CVE-2022-27255£©£¬CVSSÆÀ·ÖΪ9.8£¬¿ÉÓÃÀ´¿ØÖƶà¸öԭʼÉè±¸ÖÆÔìÉÌ(OEM)µÄÉ豸£¬°üÂÞ·ÓÉÆ÷¡¢APºÍÖÐ¼ÌÆ÷µÈ ¡£¾ßÌåÀ´Ëµ£¬Ô¶³Ì¹¥»÷Õß¿Éͨ¹ýÆäÀûÓôøÓжñÒâSDPÊý¾ÝµÄSIPÊý¾Ý°üÖ´ÐдúÂë¶øÎÞÐèÉí·ÝÑéÖ¤£¬RealtekÒÑÔÚ3Ô·ÝÐÞ¸´¸Ã©¶´ ¡£


https://www.bleepingcomputer.com/news/security/exploit-out-for-critical-realtek-flaw-affecting-many-networking-devices/


2¡¢°¢¸ùÍ¢¿Æ¶û¶àÍß˾·¨»ú¹¹Ôâµ½PlayÍÅ»ïµÄÀÕË÷¹¥»÷

      

¾ÝýÌå8ÔÂ15ÈÕ±¨µÀ£¬°¢¸ùÍ¢¿Æ¶û¶àÍß˾·¨»ú¹¹ÔÚÔâµ½PlayÍÅ»ïµÄÀÕË÷Èí¼þ¹¥»÷ºóITϵͳ¹Ø±Õ ¡£¹¥»÷·¢ÉúÔÚ8ÔÂ13ÈÕ£¬ÏµÍ³ºÍÍøÂçÃÅ»§ÖÐ¶ÏÆÈʹԱ¹¤Ê¹ÓñʺÍÖ½À´Ìá½»¹Ù·½Îļþ ¡£Clar¨ªn±¨µÀ³Æ£¬¹¥»÷Ó°ÏìÁË˾·¨»ú¹¹µÄϵͳºÍÊý¾Ý¿â£¬ÊÇÀúÊ·ÉÏÕë¶Ô¹«¹²»ú¹¹×îÑÏÖØµÄ¹¥»÷ ¡£ËäÈ»¸Ã»ú¹¹ÉÐδÅû¶´Ë´Î¹¥»÷µÄϸ½Ú£¬µ«ÓмÇÕß͸¶£¬¼ÓÃÜÎļþÌí¼ÓÁË¡°.Play¡±À©Õ¹Ãû£¬Õâ¿ÉÄÜÓë2022Äê6Ô¿ªÊ¼»îÔ¾µÄÐÂÀÕË÷ÍÅ»ïPlayÓÐ¹Ø ¡£


https://www.bleepingcomputer.com/news/security/argentinas-judiciary-of-c-rdoba-hit-by-play-ransomware-attack/


3¡¢Î¢Èí³ÆÒÑ×èÖ¹SEABORGIUMÍÅ»ï½üÆÚµÄµöÓã¹¥»÷»î¶¯

      

¾Ý΢Èí8ÔÂ15ÈÕ͸¶£¬ÆäÒÑ×èÖ¹ÁËSEABORGIUMÍŻҲ³ÆColdRiverºÍTA446£©½üÆÚµÄ¹¥»÷»î¶¯ ¡£¸ÃÍÅ»ïÓë¶íÂÞ˹ÓйØ£¬Ö÷ÒªÕë¶Ô±±Ô¼¹ú¼Ò£¬ÇÔÈ¡µç×ÓÓʼþºÍÎļþµÈ ¡£SEABORGIUMÊ×ÏÈͨ¹ýµç×ÓÓʼþ¡¢É罻ýÌåºÍLinkedInÕÊ»§´´½¨Î±ÔìÉí·Ý£¬²¢ÓøÃÐé¼ÙÉí·ÝÁªÏµ¸ÐÐËȤµÄÈËÀ´½¨Á¢ÈÚÇ¢µÄ¹ØÏµ£¬×îÖÕ·¢Ë͵öÓãÓʼþ ¡£Î¢ÈíÌåÏÖÒѽÓÄÉÐж¯£¬½ûÓÃÁËÓÃÓÚ¼àÊÓ¡¢µöÓãºÍÇÔÈ¡µç×ÓÓʼþµÄÕÊ»§£¬²¢¹ûÈ»ÁË69¸öÓë¹¥»÷»î¶¯Ïà¹ØµÄÓò ¡£


https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/


4¡¢Symantec·¢ÏÖShuckwormÕë¶ÔÎÚ¿ËÀ¼×éÖ¯µÄ¹¥»÷»î¶¯

      

8ÔÂ15ÈÕ£¬Symantec³Æ·¢ÏÖÕë¶ÔÎÚ¿ËÀ¼µÄShuckwormËÆºõÕýÔÚÏòÄ¿±ê·Ö·¢ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ ¡£»î¶¯ÓÚ7ÔÂ15ÈÕ¿ªÊ¼£¬Ê¼ÓÚÒ»¸öͨ¹ýϵͳĬÈÏä¯ÀÀÆ÷ÏÂÔØµÄ×Ô½âѹ7-ZipÎļþ£¬Ëæºómshta.exe»áÏÂÔØÒ»¸öXMLÎļþ£¬¸ÃÎļþ¿ÉÄÜαװ³ÉHTMLÓ¦Ó÷¨Ê½(HTA)Îļþ£¬È»ºóÖ´ÐÐPowerShellÇÔÈ¡·¨Ê½ ¡£±»Ñ¬È¾É豸Öл¹ÓÐÁ½¸ö°üÂÞjuiceºÍjustice×ÖÑùµÄVBSÏÂÔØÆ÷£¬·ÖÎö·¢ÏÖËüÃÇÊÇPterodoºóÃÅ£»Ñо¿ÈËÔ±»¹·¢ÏÖÁ˶à¸ö°üÂÞntuser×ÖÑùµÄ¿ÉÒÉÎļþ£¬´ó¶àÊý±»¼ì²âΪGiddomeºóÃÅ ¡£


https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/russia-ukraine-shuckworm


5¡¢Ñо¿ÈËÔ±¼ì²âµ½¶à¸öÖ¼ÔÚÖ´ÐÐDDoS¹¥»÷µÄ¶ñÒâPyPi°ü

      

ýÌå8ÔÂ15Èճƣ¬CheckmarxÑо¿ÈËÔ±¼ì²âµ½Ê®¼¸¸ö¶ñÒâPyPi°ü£¬Ö¼ÔÚ¶ÔCounter-Strike 1.6·þÎñÆ÷Ö´ÐÐDDoS¹¥»÷ ¡£ËüÃÇÓÉÃûΪ¡°devfather777¡±µÄÓû§Ðû²¼£¬Ê¹ÓÃÁËÓëÁ÷ÐÐÈí¼þ°üÏàËÆµÄÃû³ÆÀ´ÓÕÆ­Èí¼þ¿ª·¢ÈËÔ±£¬ÈçGesnim(Ä£·ÂGensim)ºÍipaddres(Ä£·Âipaddress)µÈ ¡£Ñо¿ÈËÔ±³Æ£¬ÅäÖÃÃüÁî¶ñÒâÈí¼þ½«Ä¿±êÖ÷»úÌí¼Óµ½DDoS botÖУ¬Ïò¶íÂÞ˹Counter-Strike 1.6 ·þÎñÆ÷·¢ËÍÁ÷Á¿£¬Ä¿±êËÆºõÊÇͨ¹ýѬȾ´óÁ¿µÄÉ豸À´·¢ËÍ×ã¹»¶àµÄÁ÷Á¿Ê¹·þÎñÆ÷Òò²»¿°Öظº¶ø¹Ø±Õ ¡£


https://www.bleepingcomputer.com/news/security/malicious-pypi-packages-aim-ddos-attacks-at-counter-strike-servers/


6¡¢KasperskyÐû²¼2022ÄêQ2ÒÆ¶¯ÍþÐ²Ì¬ÊÆµÄͳ¼Æ³ÂËß

      

8ÔÂ15ÈÕ£¬KasperskyÐû²¼Á˹ØÓÚ2022ÄêQ2ÒÆ¶¯ÍþÐ²Ì¬ÊÆµÄͳ¼Æ³ÂËß ¡£2022ÄêµÚ¶þ¼¾¶È£¬Kaspersky¼ì²âµ½ÁË405684¸ö¶ñÒâ°²×°°ü£¬»·±È¼õÉÙ110933¸ö£¬Í¬±È¼õÉÙ480421¸ö ¡£Òƶ¯¶ñÒâÈí¼þ°´ÀàÐÍÖУ¬AdWareÕ¼±È×î´ó£¬Îª25.28%£¬Æä´ÎÊÇRiskTool£¨20.81%£©ºÍľÂí£¨20.49%£© ¡£Ôâµ½ÒÆ¶¯¶ñÒâÈí¼þ¹¥»÷×î¶àµÄ¹ú¼ÒÊÇÒÁÀÊ£¨26.91%£©£¬Æä´ÎÊÇÒ²ÃÅ£¨17.97%£©ºÍÉ³ÌØ°¢À­²®£¨12.63%£© ¡£


https://securelist.com/it-threat-evolution-in-q2-2022-mobile-statistics/107123/