Ó¢ÌØ¶ûÈ·ÈÏAlder Lake CPUµÄUEFI BIOSÔ´´úÂëй©

Ðû²¼Ê±¼ä 2022-10-10
1¡¢Ó¢ÌضûÈ·ÈÏAlder Lake CPUµÄUEFI BIOSÔ´´úÂëй©

      

¾ÝýÌå10ÔÂ9ÈÕ±¨µÀ£¬Ó¢ÌضûÒѾ­Ö¤Êµ£¬Alder Lake cpuµÄUEFI BIOSÔ´´úÂëй¶¡£Alder LakeÊǵÚ12´úÓ¢ÌØ¶û¿á¦ÖÃÆ÷£¬ÓÚ2021Äê11ÔÂÐû²¼¡£ÉÏÖÜÎ壬TwitterÓû§freakÐû²¼Á˾ݳÆÊÇAlder LakeµÄUEFI¹Ì¼þÔ´´úÂëµÄÁ´½Ó£¬¸ÃÁ´½ÓÖ¸ÏòGitHub´æ´¢¿âICE_TEA_BIOS£¬ÆäÖаüÂÞ5.97 GBµÄÎļþ¡¢Ô´´úÂ롢˽Կ¡¢¸üËûÈÕÖ¾ºÍ±àÒ빤¾ß¡£ÎļþµÄ×îÐÂʱ¼ä´ÁΪ22Äê9ÔÂ30ÈÕ£¬Ä¿Ç°Éв»Çå³þÔ´´úÂëÊÇÔÚÍøÂç¹¥»÷ÆÚ¼ä±»µÁ»¹ÊDZ»ÄÚ²¿ÈËԱй¶¡£²»Í⣬ӢÌضûÒÑÈ·ÈÏÔ´´úÂëÊÇÕæÊµµÄ£¬ÊÇËüµÄרÓÐUEFI´úÂë¡£


https://www.bleepingcomputer.com/news/security/intel-confirms-leaked-alder-lake-bios-source-code-is-authentic/


2¡¢Ó¢¹úEasylifeÎ¥·´Êý¾Ý±£»¤ºÍÓªÏú·¨±»·£¿î150ÍòÓ¢°÷

      

10ÔÂ6ÈÕ±¨µÀ³Æ£¬Ó¢¹úÁãÊÛÉÌEasylifeÒòÎ¥·´Êý¾Ý±£»¤ºÍÓªÏú·¨¶ø±»¸Ã¹úµÄÐÅÏ¢¼à¹Ü»ú¹¹·£¿î½ü150ÍòÓ¢°÷¡£ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÌåÏÖ£¬EasylifeÔÚδ¾­¿Í»§Í¬ÒâµÄÇé¿öÏÂʹÓÃÆä¸öÈËÐÅÏ¢ÏòËûÃÇÍÆÏú½¡¿µÏà¹Ø²úÎ¶øÕâÖÖ¡°ÒþÐΡ±Êý¾Ý´¦ÖÃÊÇ·Ç·¨µÄ¡£¼à¹Ü»ú¹¹µÄÁíÒ»ÏîÊӲ췢ÏÖ£¬ÔÚ2019Äê8ÔÂÖÁ2020Äê8ÔÂÆÚ¼ä£¬EasylifeÏòÔڵ绰ƫºÃ·þÎñ(TPS)×¢²áµÄÈ˲¦´òÁËÁè¼Ý130Íò´ÎÀ¬»øÓªÏúµç»°¡£ICOÒòÎ¥·´Êý¾Ý±£»¤·¨¶ÔEasylife·£¿î135ÍòÓ¢°÷£¬ÒòÓªÏúµç»°·£¿î13ÍòÓ¢°÷¡£


https://www.infosecurity-magazine.com/news/retailer-easylife-fined-15m-data/


3¡¢SynopsysÑо¿ÈËÔ±Åû¶Ò˼ÒÖÇÄÜÕÕÃ÷ϵͳÖеÄ2¸ö©¶´

      

ýÌå10ÔÂ7ÈÕ±¨µÀ³Æ£¬SynopsysÑо¿ÈËÔ±·¢ÏÖÒ˼ÒÖÇÄÜÕÕÃ÷ϵͳÖдæÔÚ2¸ö©¶´¡£ÆäÖÐÒ»¸ö©¶´×·×ÙΪCVE-2022-39064£¬¿É±»¹¥»÷ÕßÓÃÀ´Í¨¹ýЭÒé·¢ËͶñÒâ֡ʹÒ˼ҵÄTR?DFRIµÆÅÝÉÁ˸£¬Èç¹û¶à´ÎÖØ¸´·¢ËͶñÒâÏûÏ¢£¬µÆÅÝ»áÖ´Ðгö³§ÖØÖã¬Ö®ºóÓû§ÎÞ·¨Í¨¹ýÒ˼ÒÖÇÄܼҾÓÓ¦ÓûòTR?DFRIÒ£¿ØÆ÷¿ØÖƵÆÅÝ¡£ÁíÒ»¸ö©¶´ÎªCVE-2022-39065£¬¿Éµ¼ÖÂTR?DFRI¶ÔÉ豸Ò£¿ØÆ÷ºÍÒ˼ÒÖÇÄܼҾÓÓ¦ÓÃûÓÐÏìÓ¦¡£ 


https://therecord.media/researchers-find-bugs-in-ikea-smart-lighting-system/


4¡¢Ó¢¹ú±£ÏÕ½»Ò×ËùÀͺÏÉç½«ÖØÆôϵͳÒÔÓ¦¶Ô½üÆÚµÄ¹¥»÷ʼþ

      

¾Ý10ÔÂ7ÈÕ±¨µÀ£¬Ó¢¹ú±£ÏÕ½»Ò×ËùÀͺÏÉ磨Lloyd¡¯s of London£©Í¨¹ýÖØÆôÆäϵͳÀ´Ó¦¶Ô¿ÉÄܵÄÍøÂç¹¥»÷¡£Lloyd'sÔÚÆäÍøÂçÉϼì²âµ½ÁËÒì³£»î¶¯£¬²¢ÕýÔÚÊÓ²ì¸ÃÎÊÌâ¡£´ËÍ⣬Ëü»¹ÖØÖÃÁËÍøÂçºÍϵͳ£¬²¢¹Ø±ÕÁËÍⲿÁ¬½Ó£¬°üÂÞLloydµÄÊÚȨƽ̨¡£¸Ã¹«Ë¾ÌåÏÖ£¬ËûÃÇÒÑ֪ͨÊг¡¼ÓÈëÕߺÍÏà¹Ø¸÷·½£¬Ò»µ©ÊÓ²ì½áÊø£¬½«»áÌṩ¸ü¶àÐÅÏ¢¡£¸Ã¹«Ë¾²¢Î´¹ûÈ»¹¥»÷ϸ½Ú£¬µ«Õë¶Ô¸Ãʼþ½ÓÄɵĴëÊ©±íÃ÷Õâ¿ÉÄÜÊÇÀÕË÷¹¥»÷¡£


https://www.databreaches.net/lloyds-of-london-reboots-its-network/


5¡¢BlackByteÀûÓÃWindowsÇý¶¯·¨Ê½ÖеÄ©¶´Èƹý¼ì²â

      

SophosÔÚ10ÔÂ4ÈÕ³ÆÆä·¢ÏÖÁËBlackByteÔËÓªÍÅ»ïÕýÔÚʹÓõÄ×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯·¨Ê½(BYOVD)¹¥»÷À´ÈƹýÄþ¾²²úÎï¡£¹¥»÷ÕßÀûÓÃÁ˺Ϸ¨µÄÇý¶¯·¨Ê½RTCore64.sysÖеÄ©¶´£¨CVE-2019-16098£©£¬¸Ã©¶´¿É±»¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÓÃÓÚ¶ÁÈ¡ºÍдÈëÈÎÒâÄڴ棬²¢µ¼ÖÂȨÏÞÌáÉý¡¢´úÂëÖ´ÐлòÐÅϢй¶¡£¸ÃÈÆ¹ý¼¼Êõ¿É½ûÓÃÁè¼Ý1000¸öÇý¶¯·¨Ê½£¬Äþ¾²²úÎïÒÀ¿¿ÕâЩÇý¶¯·¨Ê½À´Ìṩ±£»¤¡£´ËÍ⣬¶ÔÀÕË÷Èí¼þÑù±¾µÄ·ÖÎö·¢ÏÖËüÓ뿪Դ¹¤¾ßEDRSandblastʹÓõÄEDRÈÆ¹ýʵÏÖÓÐÐí¶àÏàËÆÖ®´¦¡£


https://news.sophos.com/en-us/2022/10/04/blackbyte-ransomware-returns/


6¡¢Zscaler³ÆÐ¶ñÒâÈí¼þLilithBotÓëEternityÍÅ»ïÓйØ

      

10ÔÂ5ÈÕ£¬ZscalerÅû¶ÁËжñÒâÈí¼þLilithBotÓëEternityÍÅ»ïÖ®¼äµÄ¹ØÏµ¡£EternityÔËÓª×ÅÒ»¸öͬÃûµÄ¶ñÒâÈí¼þ¼´·þÎñ(MaaS)£¬Óë¶íÂÞ˹Jester GroupÓйØ¡£LilithBotÓÉEternityͨ¹ýרÓõÄTelegram channel·Ö·¢£¬¿ÉÒÔͨ¹ýTor½øÐйºÖá£Ëü¾ßÓи߼¶¹¦Ð§£¬¿ÉÓÃ×÷miner¡¢stealerºÍclipper¡£¹¥»÷Õßͨ¹ýÌí¼Óй¦Ð§£¨°üÂÞ·´µ÷ÊÔ¹¦Ð§ºÍ·´ÐéÄâ»ú¼ì²é£©À´²»Í£ÔöÇ¿¶ñÒâÈí¼þ¡£´ËÍ⣬Ñо¿ÈËÔ±»¹ÌṩÁ˹¥»÷Ïà¹ØµÄIOCÒÔ¼°MITRE ATT&CK¼¼Êõϸ½Ú¡£


https://www.zscaler.com/blogs/security-research/analysis-lilithbot-malware-and-eternity-threat-group